Wednesday, December 25, 2019

Robert J. Sampson s Theories On Urban Neighborhoods And...

Robert J. Sampson is a criminologist, Henry Ford II Professor of the Social Sciences and chair of the sociology department at Harvard University. He focuses heavily on the intersectionalities of race, poverty, age, and broken families in urban neighborhoods throughout his career. Robert emphasis that these intersectionalities are the causation of crime. Sampson is not a personality, biological, or opportunity theorist, but an soc-ecology theorist. He uses his theories that are more in a macro level. Sampson frequently studies the connection between neighborhoods and criminal behavior. He published many articles with many great criminologists, and wrote theories on urban neighborhoods. Neighborhoods and Violent Crime: A Multilevel Study of†¦show more content†¦He realize how important it is to know the psychological aspect of an individual, but felt the obligation to look at the fundamentals of social patterns. In 1977 he graduated with a bachelor’s degree in sociology. He then entered graduate school in SUNY Albany, where he is specifically studying sociology and the roles of society. While doing that he met and work with powerful sociologists. One of the sociologist Travis Hirschi, who help him promote his research on crime from his article Causes of Delinquency. It was his most cited and influential studies of crime, and he became more interested in criminology. Sampson was also introduced to sociologists that made a huge impact on his whole career. The Chicago School of Urban Sociology talked about the rapidly growing population in the early 1900s in Chicago. In that particular time. Sociologist focus on the social criminal behavior can be influenced by urbanization, immigration, and social structures. Sampson said â€Å"One way I look at the city is to try to understand how different social phenomena are clustered in the same places and follow similar patterns over time.† (Profile of Robert J. Sampson) Sampson move to Chicago where he had a faculty teaching position in 1984 at the University of Illinois at Urbana–Champaign. But in 1991 he went to the University of Chicago, where he develops a project to study the urban neighborhoods in Chicago. Sampson and other researchers created thisShow MoreRelatedPoverty Is Not Only An Individual Problem2983 Words   |  12 PagesPoverty is not only an individual problem, but a societal problem. Harrell R. Rodgers wrote an article, â€Å"Why are People Poor in America?† Rodgers gives two categories of theories that are used when cultural /behavioral or structural/economic. Behavior/culture theorists look at the behavior, culture and values of the poor as the reason for poverty. While structural /ecIn western culture statistics are an excessively used tool in describing social issues. Numbers help explain a situation, butRead MoreEssay on Criminological Theories13456 Words   |  54 PagesStudent Study Guide for Ronald L. Akers and Christine S. Sellers’ Criminological Theories: Introduction, Evaluation, and Applications Fourth Edition Prepared by Eric See Youngstown State University Roxbury Publishing Company Los Angeles, California 1 Student Study Guide by Eric See for Criminological Theories: Introduction, Evaluation, and Application , 4th Edition by Ronald L. Akers and Christine S. Sellers Copyright  © 2004 Roxbury Publishing Company, Los Angeles, CaliforniaRead MoreEssay on The Rich Get Richer and the Poor Get Prison12486 Words   |  50 PagesAmerican University or the same criminal behavior, the poor are more likely to be arrested; if arrested, they are more likely to be charged; if charged, more likely to be convicted; if convicted, more likely to be sentenced to prison; and if sentenced, more likely to be given longer prison terms than members of the middle and upper classes.1 In other words, the image of the criminal population one sees in our nation’s jails and prisons is distorted by the shape of the criminal justice system itself. It

Tuesday, December 17, 2019

The Ecological Kuznets Bend ( Ekc ) - 6381 Words

This paper introduces a basic history of the ecological Kuznets bend (EKC). The EKC suggests that pointers of natural debasement first ascent, and afterward fall with expanding salary per capita. Late confirmation demonstrates nonetheless, that creating nations are tending to natural issues, now and again receiving created nation benchmarks with a brief while slack and in some cases performing superior to anything some well off nations, and that the EKC results have an exceptionally wobbly factual establishment. Another era of decay and productive wilderness models can help unravel the genuine relations in the middle of improvement and the earth and may prompt the destruction of the exemplary EKC. Introduction: The world is rising up out of the most extreme financial emergency of our lifetimes. Yet, the social and human expenses are high, and the capacity of our economies to develop and thrive will depend like never before on the nature of government activities and on solid and successful worldwide co-operation. Restoring dependability, confidence and development remains the need. The OECD has been working with the world s administrations and different associations to beat the emergency and get our economies moving once more. It is serving to shape the post-emergency world economy – to make it more grounded, cleaner and more pleasant. We have to convey higher development, work creation, neediness lessening and lower deficits. Any

Sunday, December 8, 2019

Importance of Information Technology in Tourism Industry

Question: Discuss about the Importance of Information Technology in Tourism Industry. Answer: Introduction Information technology is very important part for every organization. There are many organizations in different industries that are using information technology in the business operations as they understand the importance and benefits of information technology. Not only organization, governments operating in the different countries are also using information technology in their management system. With the information technology, employees in the organizations feel relaxed as information technology are very helpful in reducing their workload in the business operations. Due to information technology, employees are able to manage the data of their work. In starting, employees can face difficulties in managing data on computers who are still managing data on paper but by the training, they would be comfortable with the information technology. In this report, for the discussion, Ritz-Carlton millennia hotel will be taken as this company is using information technology in its business oper ations. Ritz-Carlton millennia hotels information technology Ritz-Carlton millennia hotel is the largest company in the retail sector. Having the tagline of Always low prices, Ritz-Carlton millennia hotel always has low pricing strategy. On the basis of this strategy, the company has adopted and implemented the information technology in the business operations. Ritz-Carlton millennia hotel has used the information technology for the major business operations i.e. supplier and customer management, supply chain management, inventory management and customer services. In this report, the importance of the information technology in the business of Ritz-Carlton millennia hotel will be examined and importance of information technology in the company will be defined. This hotel is run by the Ritz Carlton group which has around 84 luxury hotels in around 26 countries. The main branch of this hotel is in Singapore. The hotel has superb structure which attracts the travelers. The hotel has also the perfect venue for the occasions such as reception and we ddings because the hotel provides high class facilities to the customers. The management of the hotel also provides cheap holiday packages to the customers and also provides the facility of e-bookings by online commerce system. Need of information technology There are four main aspects of information technology that can be used by any organization. Those four factors are hardware or external devices, software, telecommunication services, and human ware which include the strategies and techniques to manage the customers effectively. By the use of telecommunication software such as Google plus app, social media app, travel apps, Smartphone apps, tourism industry is able to help the managers and consumers of the tourism industry are able to connect all over the world. The hardware such as smart phones, laptops, computers and digital televisions, online payments systems which have decreased the operational cost as well as time in the tourism industry. From some years, the organizations in the tourism industry have implemented innovative human software system such customer relationship management (CRM), data base management system (DBMS), and management information system (MIS) to improve the management system to fulfill the demands of the cu stomers. Basically, an organization can make effective e decisions by the help of information technology. By implementing the information technology in the business, the organization will also be able to manage the process and procedures of the business to attract and target more and more customers. Importance of Information Technology Every organization builds up an information technology for improving the business strategy. The information technology can be described as a set of interconnected essentials that work together to accomplish a common goal and objective. Technology has become an important part of business organization from last few years. So, the use of information technology is become vital in the business. Along with this, increasing competition in the market is also a reason to adopt information technology in the business operations. Information technology is the key factor of increasing competitiveness of the organization in the market. Use of information technology in the tourism sector The tourism industry is continuously growing industry across the world as compared to the other industries. This industry is earning around more than 35% compared to other industries. The tourism organizations are using effective and high speed technology for the business operations and many software applications to manage the customers and supply chain within the organizations[6]. There are many benefits for the tourism companies by adopting the information technology in their business operations. Those benefits are as follows: The hotels and tourism companies are able to offer information individually and personally related to the travel packaged and hotel rates to the customers on their websites. By the economic and social ratings of places and the hotels on the social media, customers are now able to select the preferred and appropriate destinations and hotels, By improving the brand image through promotions and discount packages among the customers, organization can attract more customers, By the customer relationship management technology, the company is able to acquire loyal customers. It can be possible by gathering valuable information of customers by using CRM software. Information technology is useful for communicating with the customers. Basically, the devices in Information technology are used to analyze the data of regular customers. By the CRM system, the hotels are able define the objectives and job descriptions to the employees effectively. By using the Information technology in the hotel management, employees are able to reduce the workload in the operations. By the data management of the employees through Information technology, hotels are able to satisfy the customers as well as employees. Benefits and advantage of IT in tourism sector The Information technology has many benefits for the travel and hotel industry. Information technology has provided many easy modes for making payments. There is e-payment system by which customers need not come physically to make payments for hotel bookings. They can easily do it by the online payment system. Through Information technology, hotels are able to create their own websites to create brand awareness among the customers. By providing information regarding hotel and travel packages on social media, hotels are able to get the reviews from the customers. On the various social sites, hotels have created the pages for interacting with the customers. Now, many of the websites are also providing mobile portability so that customers would be able to view them as and when they want. The implementation of Information technology in the business unit of tourism industry can provide wide benefits to the organization. In the tourism sector, Information technology can increase the efficiency of the operations of hotels. Along with this, Information technology provides various opportunities to the hotel as well as customers. The internet is the profitable medium for the hotel industry in terms of sales. The operational cost in the tourism industry has been decreased as product distribution and services of the hotels are no more dependent on the printed catalogues and information can be reached to millions of the customers by the internet. Risks IT brings in tourism industry Although, Information technology has provided various opportunities to the tourism industry but broad use of the technology may bring some negative outcomes in the business operations of the organization. There are risks by implementing new technologies in the business operations. It can create problems for the employees and staff because they are unaware of new system and technology. Information technology risk includes human error spam, failure of hardware and software, and virus attack. These risks can impact the privacy of the customers as well as hotels. The risks of Information technology can be related to privacy, security and confidentiality. There can be risk related to security of the customers. The extensive use of online payments can result of incorrect financial transactions. The wrong operation can affect the goodwill and brand image of the company. The information of hotel and travel packages on the social media may be misled by hackers. Managing and monitoring Information technology There is great importance of Information technology in the organization. Regarding the implementation of new technology, it can be said that it requires balance between individuals and departments. It is not easy to implement information technology in the business operations as it requires more time and a vast amount. To manage and monitor the information technology, Ritz-Carlton millennia hotel has to do proper planning of cooperation of employees. In starting, it may create some issues and losses in the business but the fact is that technology would bring global competitiveness for long term. Hotel needs to ensure that all the systems are interconnected to each other. Conclusion Information Technology in the tourism industry has brought development in recent years and it will grow continuously in the future. The hotels in the tourism industry are going ahead as compared to others industries. Information technology includes all kinds of new and modern technologies such as mobile apps, e systems, video conferencing, and satellites systems in the business which helps the tourism industry as well as all the industries to make proper management system for the business and customers. The information technology plays an important role in increasing the productivity and efficiency of the organization so that the organization can be able to improve the relationship with the customers in the business process. References Ali, A. and Frew, A. (2014), ICT for sustainable tourism: a challenging relationship?, Inf Technol Tourism, 14(4), pp.261-264 Andreu, L., Alds, J., Bign, J. and Mattila, A., (2010), An analysis of e-business adoption and its impact on relational quality in travel agencysupplier relationships: Tourism Management, 31(6), pp.777-787 Balaguer, J. and Pernas, J. (2013), Relationship between spatial agglomeration and hotel prices, Evidence from business and tourism consumers: Tourism Management, 36, pp.391-400 Barreda, A. Bilgihan, A. (2013), An analysis of user?generated content for hotel experiences, Journal of Hospitality and Tourism Technology, 4(3), pp.263-280 Berne, C., Garcia-Gonzalez, M. Mugica, J. (2012), How ICT shifts the power balance of tourism distribution channels, Tourism Management, 33(1), pp.205-214 Carvo, S. (2010), Embracing user generated content within destination management organizations to gain a competitive insight into visitors' profiles: WW Hospitality Tourism Themes, 2(4), pp.376-382 DiPietro, R. Wang, Y. (2010), Key issues for ICT applications: impacts and implications for hospitality operations: WW Hospitality Tourism Themes, 2(1), pp.49-6 Dudensing, R., Hughes, D. Shields, M. (2011), Perceptions of tourism promotion and business challenges: A survey-based comparison of tourism businesses and promotion organizations: Tourism Management, 32(6), pp.1453-1462 Gjerald, O. Lyngstad, H., (2015), Service risk perceptions and risk management strategies in business-to-business tourism partnerships. Tourism Management Perspectives, 13, pp.7-17 K, S. (2014), Significance of User-Generated Content in Travel and Tourism: An Exploratory Study, Journal of Tourism Hospitality, 03(03) Minghetti, V. Buhalis, D. (2009), Digital Divide in Tourism. Journal of Travel Research, 49(3), pp.267-281 eri?, M. Gil-Saura, I., (2012), ICT, IMC, and Brand Equity in High-Quality Hotels of Dalmatia: An Analysis From Guest Perceptions, Journal of Hospitality Marketing Management, 21(8), pp.821-851 THE RITZ-CARLTON, M., (2015), Luxury Hotels Singapore - Singapore 5 Star Hotel | The Ritz-Carlton, https://www.ritzcarlton.com/en/Properties/Singapore/Default.htm (Accessed on 12th January 2017)

Sunday, December 1, 2019

Night by Elie Wiesel an Example of the Topic Literature Essays by

Night by Elie Wiesel by Expert Bella Hamilton | 19 Dec 2016 Larson: Firstly, as a reporter, it is my duty to congratulate you on your winning the Nobel Prize for such a small book of just 128 pages. Need essay sample on "Night by Elie Wiesel" topic? We will write a custom essay sample specifically for you Proceed Wiesel: It is a small book going by the number of pages. But going by its contents, it is the story of the four darkest years of the century, which concerns the entire humanity. Larson: There are several books on World War II, and the Nazi cruelties. What makes your book special? People Often Tell EssayLab professionals: How much do I have to pay someone to write my paper in time? Essay writers propose: Essay Help Provided Here With Beneficial Facilities! Top Essay Writing Company Wiesel: It is not for me to say that the book is special. Readers have found something touching about the contents. But I do wish to say one thing. The book is not written by pen, but through the strong emotions of the heart. Larson: What was the special appeal about the contents of the book? Wiesel: The story of the intense human tragedy. Many of the readers of the book, who directly and indirectly suffered the consequences of World War II, must have recollected their missing mother, raped sister, God forbid, friends and relatives, blood stream, the flying pieces of human flesh and the stinking bodies etc. Larson: Now, coming to your inpidual suffering, what was the life like between the years 1941 to 1945? Wiesel: The expectation of death every moment! The strong feeling that how God can run the affairs of human beings like this? How, human beings, claiming to be sparks of pinity, behave in such a dastardly manner. How can they gas the babies, bayonet and kill them in the most heinous manner? Why those who have the cross dangling on the neck, have no Christ in the heart? Larson: Please describe in detail about the concentration camps. Wiesel: It doesnt need the intelligent vocabulary for the graphic description. Horrid, horrid and more horrid! As I and my father were shifted from camp to camp, we never thought we shall stay alive to reach the next camp. With every shifting, the number of internees diminished. The style in which internees were butchered, are not even comparable to an animal slaughterhouse. Even the killing of animals has a purpose-to secure meat and protein for the appetite of human beings. Here the killings were purposeless. Without any previous enmity! Larson: Name the worst thing that happened to you. Wiesel: That I am still alivethe day we were separated from the rest of the family, mother and my dear sister, life was worst than death thereafter. We were a happy family. Larson: As a boy of 15 then, how did you absorb such grave shocks? Wiesel: My father beside was a great consolation. But for his presence, I just do not know what would have happened to me. Perhaps I would have been a patient in the lunatic asylum. Larson: And what was the silver lining? Wiesel: The final liberation by the American troops. Larson: Did you ever have the ambition to become a writer? Wiesel: Nevernor did I have any opportunity or enthusiasm to write down the notes of the day to day happenings during those four demonic years. Slightest suspicion on the part of the camp authorities would invite tortuous death. The dark events that were committed to memory, also by knowing which, the world outside would have a chance to know the realities of that ignoble period, are taken care of in the book. The description of the brutalities can go on and on endlessly. That is not the main purpose of the book. The book is a silent prayer to humanity that all must strive that such events are never repeated in future. Larson: How this can be achieved? Wiesel: If you mean any political creeds such as Capitalism, Socialism, Communism or Fascism can achieve it, it is impossible. The inpiduals are he building bricks of the society. The inpiduals need to change. Can any religion change people? The answer is both yes and no. Any religion, as it is practiced by the followers today, can not change the society. Mind-level conflicts are bogging down the real growth of religions. But practice of true spirituality can change human beings. Spirituality is something that transcends the mind. At that level, all differences cease; conflicts are no more there. We need to give such an orientation to human beings, right from childhood. When the thought process of the inpiduals changes, the action process also changes! When the thoughts are changed, the mind is changed; when the mind is changed, the man is changed; when the man is changed, the society is changed. Universal peace then becomes an attainable reality. Larson: How your Night is different from your other works A Beggar in Jerusalem, The Fifth Son etc. Wiesel: They are also issue-based books. But Night is something special. Such a book can be written by any author only once in the lifetime. It is a not a well-researched book as such. It is straight from the heart. It is the song of my life and that of my Jewish community. Larson: From a boy in the concentration camp, to become a Professor at the Boston University, and to win the Nobel Prize! Is not the change metamorphic? Dont you still believe in God? Wiesel: An inpidual thinks of issues related to God etc. from the level of the progression of his mind. It is true that as an intensely suffering and a boy with a shattered personality and the devastated family, anybody in my position would turn cynical and will not believe in the existence of God. I was not wrong then; and I am not wrong now. Some Supreme Power ever runs affairs of the world. Larson: Night is your first novel. Its success rate is tremendous. What are your feelings about it? Wiesel: Not one of joy for the success as such. It is the success of human tragedy. But if the number of copies sold is any indication, for the stir that it created in the readers heart, and for the positive outcomes of the samewell, I feel I am amply rewarded. Larson: Recollection of the past is sweet, when the present state of affairs is sound. Is that so in your case well? Wiesel: No. How do you say that the present state of affairs is sound? Mindless violence on various pretexts is happening even now, tough on a smaller scale. This has to totally stop. Wiesel can never be the normal man, whatever is the level of present comfortable conditions. The image of the horror camps and that of the pile of stinking bodies at the crematoriums is ever imprinted on the portals of his mind. Larson: Thank you very much for the information Mr. Wiesel. Any final message to the humanity! Wiesel: The pages of human history daubed in bloodshed on account of mindless violence in World War I and II, Nanking, Nazi concentration camps, religious intolerance, color and race conflicts, aggrandizement of wealth, and territorial annexations, ask the crying question. How to make this Planet Earth heaven-like? The answer is simple and direct, Eyes full of understanding, hearts full of love and the life that refuses conflictsenough, these alone are enough! References Cited: Wiesel, Elie: Book: Night. Mass Market Paperback: 128 pages Publisher: Bantam (March 1, 1982) Language: English ISBN-10: 0553272535,ISBN-13: 978-0553272536

Tuesday, November 26, 2019

How Votes Are Counted on Election Day

How Votes Are Counted on Election Day After the polls close on  Election Day, the task of counting the votes begins. Each city and state use a different method to collect and tabulate ballots. Some are electronic, others paper-based. But the process of counting votes is generally the same no matter where you live and vote. Preparations As soon as the last voter has voted, the election judge at each polling place makes sure poll workers have sealed all of the ballot boxes and then sends the sealed ballot boxes to a central vote-counting facility. This is usually a government office, like a city hall or county courthouse. If digital voting machines are used, the election judge will send the media on which the votes are recorded to the counting facility. The ballot boxes or computer media are usually transported to the counting facility by sworn law enforcement officers. At the central counting facility, certified observers representing the political parties or candidates watch the actual vote counting to make sure the count is fair. Paper Ballots In areas where paper ballots are still used, election officials manually read each ballot and add up the number of votes in each race. Sometimes two or more election officials read each ballot to ensure accuracy. Since these ballots are filled out manually, the voters intention can sometimes be unclear. In these cases, the election judge either decides how the voter intended to vote or declares that the ballot in question will not be counted. The most common problem with manual vote counting is, of course, human error. This can also be an issue with punch card ballots, as youll see. Punch Cards Where punch card ballots are used, election officials open each ballot box, manually count the number of ballots cast, and run the ballots through a mechanical punch card reader. Software in the card reader records the votes in each race and prints out totals. If the total number of ballot cards read by the card reader does not match the manual count, the election judge can order the ballots recounted. Problems can occur when the ballot cards stick together while being run through the card reader, the reader malfunctions, or the voter has damaged the ballot. In extreme cases, the election judge can order the ballots to be read manually. Punch card ballots and their infamous hanging chads led to the controversial vote count in Florida during the 2000 presidential election. Digital Ballots With the newer, fully computerized voting systems, including optical scan and direct recording electronic systems, the vote totals may be transmitted automatically to the central counting facility. In some cases, these devices record their votes on removable media, such as hard disks or cassettes, which are transported to the central counting facility for counting. According to the Pew Research Center, nearly half of all Americans use optical-scan voting systems, and about a quarter use direct-recording voting machines. Like any electronic device, these voting machines are vulnerable to hacking, at least in theory, experts say. But as of August 2017, there is little to no evidence suggesting that hacking has occurred. Recounts and Other Issues Whenever the results of an election are very close, or problems have occurred with the voting equipment, one or more of the candidates often demand a recount of the votes. Some state laws call for mandatory recounts in any close election. The recounts may be done by a manual hand-count of ballots or by the same type of machines used to make the original count. Recounts do sometimes change the outcome of an election. In almost all elections, some votes are lost or incorrectly counted due to voter mistakes, faulty voting equipment, or errors by election officials. From local elections to presidential elections, officials are constantly working to improve the voting process, with the goal of making sure that every vote is counted and counted correctly. Of course, there remains one absolutely certain way to make sure your vote will not be counted: dont vote. Effect of 2016 Russian Interference on Future Vote Counting Since Special Counsel Robert Mueller issued his â€Å"Report on the Investigation Into the Russia Interference in The 2016 Presidential Election† in March 2019, the U.S. House of Representative has passed legislation intended to reform the voting process and protect future elections. While the Senate Judiciary Committee has advanced two similar bipartisan bills on election security, they have yet to be debated by the full Senate. In addition, several states have announced plans to replace their current voting machines and computerized vote counting systems with more modern and hacker-proof equipment before the 2020 presidential election. According to a report by the Brennan Center for Justice, local election officials in 254 jurisdictions across 37 states plan to purchase new voting equipment in the â€Å"near future.† Election officials in 31 of the 37 states hope to replace their equipment before the 2020 election. In 2002, Congress enacted the Help America Vote Act (HAVA) allocating $380 million to help states strengthen their election security.

Friday, November 22, 2019

Using the Spanish Verb Dejar

Using the Spanish Verb Dejar Like many other verbs, dejar has a basic meaning - in this case, to leave something somewhere - that has broadened over the centuries to be used under a wide variety of circumstances. Most of its meanings, however, pertain at least in a broad sense to the idea of leaving something (or someone) somewhere, placing something somewhere, or abandoning something. Dejar Meaning To Leave While to leave is one of the most common translations of dejar, it should not be confused with to leave in the sense of to leave a place, where salir is used. Thus, shes leaving tomorrow is sale maà ±ana, but I left my keys at home is dejà © las llaves en casa. Examples of dejar with its basic meaning: Dà ©jalo aquà ­. (Leave it here.) ¿Dà ³nde dejà © el coche aparcado? (Where did I park the car?)Dejarà © el libro en la mesa. (I will leave the book on the table.)Dejà © a Pablo en Chicago. (I dropped Pablo off in Chicago.) When the object of dejar is an activity or person, dejar can mean to leave, abandon or give up: Deja su carrera para irse a la polà ­tica. (He is leaving his career to go into politics.)Han fallado en sus tentativas de dejar el fumar. (They have failed in their attempts to quit smoking.)Dejà ³ a su esposa por la mujer que deseaba. (He abandoned his wife for the woman he wanted.) Dejar Meaning To Lend When an object is left with a person, dejar often means to lend. (The verb prestar can also be used with the same meaning.): Como era un buen jefe me dejaba su coche. (Since he was a good boss he would lend me his car.)Me dejà ³ su casa de vacaciones. (He let me use his vacation home.) ¿Me dejas tu telà ©fono?  (Could I borrow your phone?) Dejar Meaning To Pass On In many contexts, dejar can mean to give or to pass on: Mi madre me dejà ³ su capacidad de esperanza. (My mother passed on to me her capacity to hope.)Me dejà ³ su direccià ³n postal para escribirle. (He gave me his mailing address so I could write to him.)Cuando murià ³ me dejà ³ su panaderà ­a en su testamento. (When he died he left me his bakery in his will.)Siempre mi pap le dejaba la tarea mas difà ­cil a mi mama. (My father always passed the most difficult tasks to my mother.) Dejar Meaning To Leave Alone Sometimes, when the object of dejar is a person, it can mean to leave alone or to not bother:  ¡Dà ©jame! Tengo que estudiar. (Leave me alone! I have to study.)No nos dejaba en paz. (He did not leave us in peace.) Dejar Meaning To Allow Another common meaning of dejar is to allow or to let: No me dejaban comprar nada que no fuese reciclable. (They didnt let me buy anything that wasnt recyclable.)El faraà ³n se asustà ³ y dejà ³ salir al pueblo de Israel. (The pharaoh got scared and let the people of Israel go.) Using Dejar With an Adjective When followed by an adjective, dejar can mean to put or leave someone or something in a certain state or condition: La ley no dejà ³ satisfecho a nadie. (The law didnt satisfy anybody.)Me dejà ³ feliz, como ver un oasis. (It made me happy, like seeing an oasis.)El partido me dejà ³ rota la rodilla. (My knee got broken during the game.) Dejar Meaning To Delay or To Stop Sometimes, dejar means to postpone or delay:  ¿Por quà © no deja el viaje para maà ±ana? (Why not put off your trip until tomorrow?) The phrase dejar de usually means to stop or to give up: Hoy dejo de fumar. (Today I give up smoking.)La hepatitis A dejà ³ de ser una cosa de nià ±os. (Hepatitis A is no longer a childrens disease.)Nunca dejarà © de amarte. (Ill never stop loving you.) Using Dejar With Que Finally, dejar que usually means to wait until a certain time: Dejo que las cosas se sucedan naturalmente. (Im waiting until things happen naturally.)La madre no dejaba que los socorristas atendieran a su hija. (The mother didnt wait for the rescuers to help her daughter.)

Thursday, November 21, 2019

The Impact of the Black Death during the 14th Century Essay

The Impact of the Black Death during the 14th Century - Essay Example Cultural changes occurred as people had to cope with the consequences of the plague, creating a situation where changes occurred in order to combat the disease through means that reflected beliefs and traditions. The effects of the plague were written about through firsthand accounts of its devastating effects by Henry Knighton. He relates that in one day 1312 persons died from the disease. In relating the devastating effects of the disease in regard to how the affects reached farther than just human mortality, he reports that the sheep populations were also affected, creating a sense of the expanding ripples of effects that spread throughout all of human existence as the disease became an enemy to fight against and try to prevail. Knighton reports that the Scots believed that the disease was a condemnation of the English who seemed to have caused the wrath of God. However, soon the disease reached the Scottish shores and five thousand Scots were dead from the disease.1 One of the pr ominent theories on how the disease began its travels across the known world was through the use of a disease as a biological weapon. Allegedly, the Mongols during their siege of Caffa in Crimea hurled dead bodies, rotting with disease, into the holds of their enemies.2 From there, the disease began to proliferate and travel through trade routes as individuals and vermin carried the disease. A key understanding was made during the development of the plague in regard to the epistemology of disease control. According to Walsh, â€Å"Global shipping traffic has long served as a conduit for disease.3 The plague was spread through maritime routes, the rats on board the ships carrying fleas that transmitted the plague.4 While full understanding of how disease was spread was not understood, it was understood how this disease was traveling from place to place, but finding a way to contain the disease was not as easily grasped. In Venice, however, ships were quarantined in order to prevent the spread into the city, but this was not successful and even Venice eventually fell to the disease.5 It was during the period of time of the Black Plague that the term quarantine was coined in regard to efforts to contain the spread of the disease.6 The impact of the plague was harsh, quick and severe, impacting regions through decimations of populations that significantly changed the course of human development in the Western world. As an example, the art world was detrimentally affected as both artists and clients of artists were lost, thus changing the landscape. The first half of the 14th century had seen a great deal of activity, the world of art beginning to experience an expansion in style which was halted during the first breakout of the plague in 1348 and again in 1361. Central Italy was the core of the explosion in art advancement, but during this time it was stalled as it was also one of the worst areas hit by the plague.7 Death became personified in many of the works o f the period, stalking the population through imagery that suggested that there was an intent behind the spread of the disease as it ravaged populations and spread across continents. A preoccupation with death is visibly evident in the artwork of the period as well as the literature.8 It can be said that it was during this time that death became known as a cruel specter in the

Tuesday, November 19, 2019

Trauma Causing Vertebrobasilar Stroke Research Paper

Trauma Causing Vertebrobasilar Stroke - Research Paper Example . . Background: Stroke is one of the major causes of death and disability worldwide. While the elderly are most affected since the risk factors of stroke are high blood pressure and age, yet the incidences of stroke are increasing in young. The most perilous of the stroke is vertebrobasilar stroke effecting the posterior circulation of brain. This review deals with the different aspects of vertebrobasilar stroke in general and trauma due to sports activity in particular, as the cause of vertebrobasilar stroke Objective: The review aims to study the pathophysiology, risk factors, aetiology, diagnosis, treatment available and prognosis of vertebrobasilar stroke along with a systematic study of the common sports activities leading to vertebrobasilar stroke and their relative significance in causing this stroke. Methods: The literature search is based on relevant data available on Medline, Pubmed, Krager, Elsevier, Cochrane system database, NIH database. Relevant articles from various journals Stroke, Neurology Lancet etc were also referred to. The search was performed between 21 September & 3 December, 2010. Relevant data from 1973 to 2010 was used for data analysis. Data Analysis: An analysis of data was done based on central value calculation of frequency of vertebrobasilar stroke due to trauma and testing significance of population mean using ANOVA and P-value calculation. Results: Football is the major cause of vertebrobasilar stroke followed by soccer, both contact games. From 4 samples data (Soccer, football, equestrian sports and yoga injury), it is obvious that the football injuries, with the highest central value (16.89) are the most significant cause of vertebrobasilar stroke Stroke, in general is a temporary or permanent loss of brain activity due to cessation or reduction of blood supply to brain due to an obstruction of blood flow in arteries, which are the channels of blood supply to

Sunday, November 17, 2019

Inter-vendor Storage Management Application Tools Essay Example for Free

Inter-vendor Storage Management Application Tools Essay Inter-vendor storage application management tools are huge enterprise software applications that are used for robust, reliable, available and effective data management. The applications are both hardware and software dependent. The choice of their implementation depends on the organizational needs and objectives. Various vendors develop and support these tools both for support of business and mission critical applications. Some of the leading Inter-vendor applications tools that have dominated the industry as well as organizational automations in the last two years include VERITAS, Oracle and NetApp (ESM, 2009). VERITAS Its application tools provides for automated storage management software for enterprise business applications which have increased dependence on data from corporate storage infrastructure. VERITAS application tools are vital for boosting administrator productivity and reduce errors in automated storage administration. Among the tools it provides is the Storage Resource Management (SRM) software tools that help to automate the erroneous, tedious and routine tasks in storage administration. The tools are able to predict when the problem is likely to happen and as a result the IT managers are able to head off these problems. The automated storage provisions help the administrators have a continuous, uninterrupted access to the enterprise storage resources. The storage administration by the automated SRM software can accomplish several tasks in use, management and applications of the storage allocations. The automation tools are able to gather data around the storage infrastructure and also give feedback on the successful storage policies and also provide input and reports on the storage environment. The accurate and timely data help managers make informed and intelligent decisions on the future use of the storage. Further administrators are able to report and monitor on resource utilization and performance. When applications crash, the pagers beep and systems panic, it is the administrator that is on the receiving end of a pager to get the problem notification. Such situations prove to be very critical especially for business users due to degraded performance, equipment failure, resource shortages, and corruption of data or storage problem risks. This interruption of application access may in turn lead to incalculable financial losses to the business or organization. Therefore the automated software provisioning has a framework that manages the growing inventory in the components of enterprise storage. When the SRM software tools are deployed into the automated storage provisioning framework, the administrator has an easier access to the event based interventions and rule based policies which adequately resolve and intercept potential problems before they reach their critical levels (Hussain, 2008). The storage management application tool for a web based directory assistance runs on a web server as a data entry component with a more sophisticated management application that runs on a separate application server. When data is entered for the directory assistance, it is updated on the web server and staged on the repository application server and it is then automatically transferred to a relational database in another server by the directory management application. For fault tolerance as provided by the database server, database tables are duplicated using the snapshots from the primary database. The services however are vulnerable to storage failures especially when space allocation to the web server, database and repository is threatened to be exhausted and as a result bring down the system. Organizations of all sizes and in all industries are dependent on enterprise technological infrastructure which means that there is immense need for automated storage management process to avert any failures in the enterprise storage infrastructure. Therefore the SRM software tools and the automated storage provisioning should be implemented to solve the storage management problems. The rule based storage automations streamlines the administrator’s routine which improves productivity, reduces potential errors and system’s availability which impacts business activities and application availability. Oracle and NetApp The Automatic Storage Management (ASM) application tool provides a way to manage storage with an underlying database on a volume manager for the files on the database and an integrated file system. Its gives an alternative to the volume management solutions and file systems for the storage management tasks in the database (Manning Bridge, 2009). On the other hand NetApp filers simplify management and deployment of the enterprise data. The ASM and NetApp storage lower ownership costs and save on costs through the configuration of combined technology. There are combined benefits for using the NetApp for database layered applications and Oracle database which includes practices for deployment of ASM with the storage solutions networked by NetApp. Oracle ASM on NetApp iSAN and SAN storage like Oracle on NAS storage by NetApp has alternative capability for volume management for customers on an Oracle server that can alter, drop and create SQL statements which simplifies the storage provisioning on the database. The NetApp and ASM storage application tools has features that complement one another in performance to avoid errors by balancing of workload and help utilize the disk drive resources available. They also provide for support of online removal and addition of storage capacity that help maximize data availability and at the same time making configuration changes in the storage. The applications tools provide data security and availability since enterprises require high levels of data availability and protection whether there are component failures or faults storage subsystems. These tools include NetApp mirroring solutions that offer protection for disaster recovery requirements and business continuance while ASM provides protection against storage failures. In shared storage, Oracle’s Real Application Clusters (RAC) provides scalability and availability for the Oracle database which requires all servers to have direct read and full access to the database files. The ASM implementation provides a simplified cluster file system with optimized functionality of the volume manager in the shared storage. The NetApp networked storage gives shared access as required by RAC while in SAN environments, ASM provides volume management by Oracle RAC and a capable clustered file system. Both application tools have a rich assortment of storage data management that can be used separately or when combined depending on the customer enterprise requirements or the data infrastructure (Animi et al, 2009). The Automatic Storage Management application tool simplifies the management and configuration of storage management for the Oracle data files in its database. It also complements iSCSI SAN products for storage and NetApp Fibre Channel and while combined, they give full value to both technologies. With several combinations for data storage management and protection exists in the market, the Oracle and NetApp partnership offer powerful combinations that offer best practices to meet business performance and high availability requirements. Storage Management Networking Industry Association (SNIA) SNIA has created Storage Management Initiative Specification (SMI-S) application tool in order to standardize and develop storage management technologies for networking and storage. The SMI-S is for a standardized interface like SAN based storage management which are a challenge for interrogators and end-users to manage especially for multivendor SANs. The applications developed in most cases are unable to work together or are uncoordinated to perform tasks and deliver functionality, security and reliability for increased business efficiency. SMI-S therefore specifies protocols to manage communications with incorporated mechanisms for standard based management. It unifies the storage networks and also the management tools. The set of interfaces will allow the control of heterogeneous storage by storage management software packages. This way storage administrator will create and delete volumes and zones and also monitor array controllers, switches and host bus adapters. The enterprises too can manage with a single management framework their storage capacity independent of manufacturers. The application features have a common and extensive management transport, which has unified and complete which provides control of Zones and LUNs in a SAN context. It also has an automated discovery system with a newer approach in application of the CIM/WBEM technology. This specification helps to secure a reliable interface that can allow for the storage management interface classify, identify, control and monitor logical and physical resources in a SAN. The Technical Specification defines the management of a heterogeneous SAN and describes information from a SMI-S compliant CIM server available to a WBEM client. This information is object oriented, message based, XML based interface that is designed to support requirements of the managing devices through and in SANs. Using the CIM-XML on HTTP standard which is an independent management protocol, vendors increase the functions and features of their products without having to redesign the management storage therefore reducing cost and extending functionality. The SMI-S functional capabilities include the version requirements as provided and stated in the interface. Among them is that it will be able to receive the asynchronous notifications incase the SAN configuration changes. It will also be able to identify the health of vital resources in a SAN and also receive the asynchronous notification incase the SAN resource’s health has changed. It will also identify interconnects available performance in a SAN and receive the asynchronous notification incase a SAN’s interconnect performance changes. It will also identify zones that SAN enforces and help enable or disable, delete or create zones in a SAN. It will also identify the access rights and connectivity to SAN Storage Volumes and also enable or disable, delete or create access rights and connectivity to SAN Storage Volumes. These standards and specifications can only be used by a WBEM compliant and authenticated client. The language chosen for managing information and other related operations is the XML language which will help traverse the organizational firewalls and installed at low costs (Cover, 2010). In midrange computing environments and enterprise class, the SANs are highly emerging due to various functions and applications such as sharing of huge storage resources between multiple systems and having a LAN free backup. Other applications include disaster tolerant and remote online mirroring of critical data and clustering fault tolerant applications and systems with one data copy. While emergence of SANs accelerate, the informational industry requires a management interface for different classes of software and hardware products for multiple vendors to allow interoperation and reliability in order to monitor and control resources. For this reason SMI-S was created to define this interface and provide a standard for heterogeneous, functionally secure and reliable control and monitoring of resources in the complex distributed Inter-vendor SAN topologies. The SMI-S standard can simplify the huge storage management and reduced costs in storage administration but has not solved all storage problems. Since storage is an integral part in IT infrastructure to be managed with a combination of servers, applications and networks, management solutions offered by SMI-S work for servers, storages and networks. In the storage infrastructure, it provides the end-users with a consistency for device discovery, configuration and status information. SMI-S defines the behavior and structure of devices and their management and configuration in the storage infrastructure and provides management of multiple storage devices from multivendor. However, it does not solve the problem of incompatibility of hardware devices from the different vendors while its domain in storage management does not cover remote replication and backup. Conclusion There is countless demand by customers for open software from the computer industry vendors which is the reason multiple vendors such as Oracle and NetApp have had to work more closely to develop common standards, protocols and languages for storage and network management. The multipurpose standards could help storage administrators take control of the distributed applications with a resulting inter-vendor, manageable and open information systems. Using standard based storage management application tools can help increase value of IT investments. Before the multivendor standards were developed by SNIA, the individual users would need to manage the storage devices with vendor specific tools while disparate information was integrated manually. Today’s management standards and specifications are increasingly interoperable while still maintaining competitive advantage among vendors through differentiation.

Thursday, November 14, 2019

The Benefits of Enterprise and Innovation :: essays research papers

The Benefits of Enterprise and Innovation Teens are facing a major unemployment rate when they come out of High School. This unemployment rate could be cut if students would learn and grasp knowledge of business, economy, and new technology. This course should help in grasping all those ideas. This essay will start this process of learning by setting goals and showing how they can be met. The real world is tuff and unpredictable. With this course, preparing for the real world will be much easier.   Ã‚  Ã‚  Ã‚  Ã‚  Signing up for Enterprise and Innovation is as simple as watching the news. Just watching the news tell us about the roller coaster ride called economy and our unemployment rate will make anyone jump and sign up. Signing up just is smart. To succeed in the real world, an edge is needed. This edge starts by picking up a pencil and signing up for Enterprise and Innovation. With this edge a job should be easier to get and more enjoyable.   Ã‚  Ã‚  Ã‚  Ã‚  The goals that were set for this course are quite simple, relative to each other, and helpful. My major goal is to comprehend an edge and understanding in searching for a job and/or running a successful business. This goal also branches off into many smaller goals or steps. One of these steps is to gain experience by taking this course. The experience I will gain is about running a business and by getting knowledge of our economy to help get a job and help keep or get a job promotion . Another step is to seize more experience in interacting with people in a business. This experience will help extremely at giving better knowledge of how a business runs by its job force.   Ã‚  Ã‚  Ã‚  Ã‚  Many things have to be done and met to reach these goals. Though they may seem hard or easy to reach, all goals may grow, shrink, or change entirely. Through this course, focus and concentration is essential. Another way to reach these goals is to not just focus in one direction but open your mind to focus in many directions. This may need information from others, but that is another way of reaching these goals. Cooperation with people is major key in reaching goals. This cooperation is an easy way to reach the goals that were set.

Tuesday, November 12, 2019

The Continual Emerging Threat and Use of Weapons of Mass Destruction By Terrorist Organizations to the United States of America

The utilization of Weapons of Mass Destruction (WMD) by terrorist groups and states alike will continue to threaten the U. S. Homeland and its interests abroad. The National Intelligence Council (NIC) provided the following estimate of this emerging threat in its December 2000 analysis of global trends through the year 2015 (Cordesman, 2002).Strategic WMD threats, including nuclear missile threats in which (barring significant political or economic changes) Russia, China, most likely North Korea, probably Iran, and possibly Iraq have the capability to strike the United States, and the potential for unconventional delivery of WMD by both state or non-state actors also will grow (p. 3).The NIC report additionally goes on to discuss the accessibility and advancement of technology for WMD will increase, saying: Prospects will grow that more sophisticated weaponry, including weapons of mass destruction–indigenously produced or externally acquired–will get into the hands of s tate and non-state belligerents, some hostile to the United States. The likelihood will increase over this period that WMD will be used either against the United States or is forces, facilities, and interests overseas (p. ). For these and other reasons, individuals in the security and law enforcement profession need to continue to maintain their focus on the capabilities and the potentiality of WMD use by a variety of interests. I use this paper as an opportunity to further educate myself on the use of WMD by terrorist organizations. I do this by giving an overview of the many types of threats that fall into the category of WMD, to include chemical, biological, radiological, and nuclear.I then continue my education by looking at the countries involved with WMD. I'll conclude the paper with looking specifically at some of Iraq's capabilities and programs. Chemical weapons pose significant threats to both the civilian populace and military organization. One of the biggest reason chemi cal weapons pose such a threat to both of these groups is the psychological effect caused by their use. Although chemical weapons are no more lethal then conventional weaponry, they cause great fear when even someone thinks of them being used.The most common example would be the exploitations of the media and the footage seen of the Kurds in Iraq when Saddam Hussein used blister and nerve agents. Not only were there dead civilians laying in the streets, but gruesome pictures of the effect that these agents have on the body, both to those killed and survivors. â€Å"Chemical weapons are weapons of terror and intimidation as well as a means of producing casualties and physical destruction† (Cordesman, 2002, p. 101). In 2003 the Department of Defense (DoD) stated that most forms of CW are employed in the liquid form, called droplets.Droplets make the substance more stable and easy for use in weaponry. The DoD also put chemical weapons into two categories, persistent and nonpersi stent–persistent lasting for days, and nonpersistent only lasting from minutes to hours (Defenselink, 2003). The U. S. Centers for Disease Control (CDC) put CWs into a few distinct categories, these being; nerve agents such as VX, blood agents like hydrogen cyanide, blister agents like sulfur mustards, and pulmonary agents like chlorine. The latter are the more commonly used and known, but there are also many more†¦ specially the ones that fall into the commercial category, such as metals, pesticides, etc†¦ (Kahn & Levitt, 2000). Most organizations wishing to use some type of WMD tend not to turn to chemicals as their primary weapon. There are many challenges facing someone that wants to effectively employing CWs. The DoD (Defenselink, 2003) lists a variety of issues concerning the factors that must be considered. These factors include; agent type, how it will be disseminated, amount available to be disseminated (droplet size), meteorological conditions, including t emperature, wind speed and direction.Without the right combination of all of these factors, the desired outcome will be greatly reduced. An additional challenge is that of actually acquiring and/or producing a chemical to be used as a weapon. The Gilmore Commission (1999) gives the following example for explaining just how difficult it would be. It has sometimes been claimed that producing sarin and other nerve agents is a relatively easy process, to the extent, according to one authority, that â€Å"ball-point pen ink is only one chemical step removed†.While sarin may be less complicated to synthesize than other nerve agents, the expertise required to produce it should not, however, be underestimated. The safety challenges involved would, at a minimum, require skill, training, and special equipment to overcome. For this reason, the level of competency required for producing sophisticated chemical nerve agents, including sarin, will likely be on the order of a graduate degree in organic chemistry and/or actual experience as a organic chemist–not simply a knowledge of college-level chemistry, as is sometimes alleges (p. 91).Although the Gilmore Commission points the necessity to have the required level of expertise for composing chemicals into weapons grade, there are many countries that already posses a vast array of CWs. Terrorist organizations without access to CWs or the expertise to produce them, resort to using resources they do have (normally money, but sometimes services) to exchange with countries that do have CWs. According to Cordesman (2002) the following countries are potential national threats because of their chemical weapons program: China, India, Iran, Iraq, Libya, North Korea, Pakistan, and Russia.Russia has the largest stockpile, 40,000 metric tons of chemical agents. Even more frightening is that reportedly some of this stockpile is comprised of â€Å"new agents†. These new agents are designed to circumvent Western detec tion methods and can be hidden within commercial chemical plants. The employment challenges of CWs are far out-weighed by the vast capability to acquire them, and the terror effect they have. Biological Weapons (BW) pose a significant risk to U. S. interests for many reasons. There are a wide range of agents with many different effects and they offer a wide range of ways to attack American citizens, crops, and livestock† (Cordesman, 2002, p. 135). The World Health Organization (2000) explained the significance of BW and diseases by recounting history, pointing out Napoleon's devastating retreat from Moscow. This wasn't caused by the great Russian Army or even the cold temperatures of the Russian winter, but because of typhus, a louse-borne infection that reduced his army from 655,000 to 93,000.Cordesman (2002) states that there are five categories: bacterial agents such as anthrax, rickettsial agents like the Rocky Mountain spotted fever, viral agents like small pox, toxins in cluding botulinum, and fungal agents. The above agents are the major ones that would be used to pose a threat to humans, there are many others that would affect plant and animal life. The Center for Disease Control (Kahn & Levitt, 2000) further categorizes agents that are a threat to national security, labeling them â€Å"high priority†. These high priority agents: â€Å"- can be disseminated or transmitted person-to-person cause high mortality, with potential for major public health impact – might cause public panic and social disruption; and – require special action for public health. † As with chemical weapons, biological weapons offer a psychological threat, but additionally the BWs bring a great deal of physiological issues. Much of the challenge with biological weapons occurs when trying to detect that one (or many) have been used. There are many ways that BWs could be used covertly, and the medical symptoms becoming visible long after the terrorist has departed.The CDC (Kahn & Levitt, 2000) outlines this fact and emphasizing the importance of early detection by the public health infrastructure by giving this scenario: Only a short window of opportunity will exist between the time the first cases are identified and a second wave of the population becomes ill. During that brief period, public health officials will need to determine that an attack has occurred, identify the organism, and prevent more casualties through prevention strategies (e. g. , mass vaccination or prophylactic treatment).As person-to-person contact continues, successive waves of transmission could carry infection to other worldwide localities. Another twist that a terrorist might use to inhibit the effective detection is to employ a variety of different BWs at the same time. Health care workers would potentially read the symptoms of only one of them used, while the other continues to grow, infect further, and kill. In addition to BWs being very opportunisti c for covert use, the DoD (Defenselink, 2003) says that BWs are preferable to chemical or nuclear WMD because of being very compact and low in weight.The DoD additionally went on to say that the â€Å"dissemination of infectious agents through aerosols, either as droplets from liquid suspensions or by small particles from dry powders, is by far the most efficient method† (Defenselink, 2003, p. 5). A Russian assessment of microbiological agents mostly likely to be used identified eleven. The top four were smallpox, plague, anthrax, and botulism. These were at the top because of the ability to be used as an aerosol, and their theoretical lethality rates being 30 percent to 80 percent and because of their capability to be massed produced (Henderson, 1999).There are two countries besides the United States that are well know for their pursuit of weaponizing biological weapons, Iraq and the Soviet Union. In 1975 the Soviet Union used the biotechnology industry as a front for its we apons program, called Bioprepart†. The program had the capability to mass thousands of tons of agents and distribute and store them strategically throughout the Soviet Union. The program also included the ability to rapidly produce these stored agents to weapons grade levels (Alibek, 1999).According to some intelligence analysis this program involved 60,000 to 70,000 personnel (Roberts, 2000). Even more alarming was that a vast amount of these were â€Å"infectious agents designed to follow up a strategic nuclear attack on the United States with contagious diseases designed to decimate the population (Alibek, 1999). Although the looming threat to the United States from the former Soviet Union isn't as prevalent with the ending of the Cold War, the possibility of these technologies and actual agents falling into the hands of rogue states or terrorists, is a very good possibility.The General Accounting Office (GAO) (2000) states that in addition to the large collections of dang erous pathogens, there are also as many as 15,000 underpaid scientists and researchers, and an additional vast amount of specialized equipment and facilities just waiting to be exploited. This concern, in addition to the many outlined above concretely justify the continued efforts by the United States to counter attacks to its interests through the use of biological weapons. The likelihood of a conventional explosive vehicle bomb like the one used in the Oklahoma City bombing by Timothy McVeigh still posses a serious risk.Recently there has been a concern of these conventional vehicle bombs also including radioactive material. â€Å"Radiological weapons are generally felt to be suitable largely for terror, political, and area denial purposes, rather than mass killings† (Cordesman, 2002, p. 194). Cordesman (2002) further goes on to explain that as opposed to nuclear weapons, radioactive material posses such a great threat because of its contamination capability. Therefore, rad ioactive weapons are best suited for use when wanting to deny accessibility of a specific area or building/s.A Gilmore Commission Report (1999) explained that, A combination fertilizer truck bomb, if used together with radioactive material, for example, could not only have destroyed one of the New York World Trade Center's towers but might have rendered a considerable chunk of prime real estate in one of the world's financial nerve centers indefinitely unusable because of radioactive contamination. Radioactive weapons are designated into two categories, â€Å"radiological dispersal devices† (RDD) and â€Å"simple radiological dispersal devices† (simple RDD).As Cordesman (2002) points out, the main difference between the two being that a RDD is designed to â€Å"include any explosive device utilized to spread radioactive material upon detonation†, and the simple RDD â€Å"spreads the radioactive material without an explosion†. There are a couple of differe nt types of radioactive material that could be used as RDD or as simple RDDs. The list includes hospital radiation therapy, radiopharmaceuticals, nuclear power plant fuel rods, and universities, laboratories, radiography and gauging (Cordesman 2002).The Gilmore Commission Report (1999) explains the harmful effects caused by radioactive material by saying, â€Å"Radiological weapons kill or injure by exposing people to radioactive materials, such as cesium-137, iridium-192, or cobalt-60. † The harm is caused by a variety of different ways including in-haling it, or ingesting it (contaminated food or water supply). The level of the harm caused is of course determinate of the amount of exposure to the radioactive material, long periods or short periods. The difficult thing to assess initially is the level of exposure.The U. S. Army (2002) explains that lethal and serious doses are very difficult to determine, even within the same geographical area. Additionally the U. S. Army (2 002) points out that symptoms and effects are largely changed if someone has burns on their body or their body has been through physical trauma, which is almost certainly the case if most scenarios (except for maybe covertly) that would involve radiological contamination. For these reasons, early detection of decontamination is imperative.The U. S. Army's USACHPPM report (2002) goes on to explain that once prompt detection has occurred, â€Å"about 95 percent of external agents can be removed by simple removing outer clothing and shoes†. So where would a terrorist group mostly likely acquire radioactive material to be used as a WMD, and furthermore, what is the likelihood that they would chose radioactive material as their weapon as opposed to, lets say nuclear? The former Soviet Union posses a threat regarding the lack of control over its any radiological materials, especially the â€Å"accumulation of large quantities of plutonium from reactors that is intended for reproce ssing and/or storage. † (Defenselink, 2002, p. 2). The DoD (Defenselink, 2002) also points out that Iraq and Chechnya have furthered their knowledge of radioactive weapons that could be used to contaminate water, food crops, and livestock. It further concludes that with many countries (Korea, etc†¦ ) advancing their nuclear power interests, radiological material will be tougher to monitor and control, and thus easier to acquire.One of our biggest threats may not be from a conventional weapon with radioactive material, or even the contamination of water or food, but direct contamination through the exploitation of a nuclear power plant right here in the United States. Even though an attack on a nuclear power plant would have to take a great deal of timing during the planning phase, it could produce very effective results. â€Å"The possible venting or overload of a reactor could then act as a radiological weapon, and cover hundreds of square kilometers as well as have a m ajor potential affect on regional power supplies (Cordesman, 2002, p. 97). † Some theorize that the method of using an existing nuclear power plant would elevate the hazards that go alone acquiring radioactive material. The Gilmore Commission Report (1999) points out that spent fuel rods are very hot, heavy and thus hard to handle. Cordesman (2002, p. 197) concurs with the Gilmore Commission stating, † A seizure of spent fuel would be particularly dangerous during the first 150 days after the downloading because iodine-131, and iodine-123 are present, which are extremely volatile, and affect the thyroid†.There is still a great deal to be learned about the potential loss and employment of radiological materials, and ultimately the use of it by a terrorist or state would have on a population or army. When it comes to the use of nuclear weapons of mass destruction, the retaliatory consequences of their use would probably discourage the would be state or terrorist to u se them. There are many other reasons that would prohibit a terrorist group from having the capability to do so, but as some experts have argued, when it comes to the homeland defense, security planners must look at a time-frame twenty five years from now (Cordesman, 2002).The DoD (Defenselink, 2002) makes the point by explaining that no one foresaw the Cold War ending so quickly, or that twenty five years ago the Persian Gulf War would have happened†¦ thus the need for such long range planning, and more importantly looking at what the capabilities could be out there, and the United States vulnerabilities to them. A great deal of the threat would come from countries that currently have nuclear programs, whether directly, or indirectly through the proliferation of technical expertise and equipment.Thus, we must look at these countries, and gain a firm understanding of their current programs. The DoD (OSD, 2001) gave the following overview in explaining the states with a potentia l nuclear threat to the United States. -Iran: Iran is currently actively pursuing the acquiring of fissile material and technology for nuclear weapons development. They are doing this by an elaborate system of military and civilian organizations. Iran's claim is that these elaborate systems are for the development of a civilian energy program–the DoD thinks otherwise. Much of the success of Iran's attempts will depend on Russia and China.Russia is currently in a mutual partnership with Iran to build a 1,000 megawatt power reactor. Iran is using this product to both acquire sensitive nuclear technologies, along with weapons-usable fissile material. China on the other hand ended its nuclear projects with Iran in 1997. Additionally, in 1998 China created new export controls over dual-use nuclear equipment†¦ it seems they're living up to their 1997 commitment. – North Korea: In 1994 an agreement between the United States and North Korea ended nuclear weapons material production at two of its facilities.In question, is whether North Korea was able to divert enough plutonium to make a nuclear weapon, the United States thinks it did. Also in question is the spent fuel from one of these reactors that was also removed in 1994. If this fuel was reprocessed it could've produced several nuclear weapons. – Pakistan: In response to India's testing, Pakistan tested six devices in 1998. Pakistan has a very good infrastructure to support a nuclear weapons program, especially facilities that allow for uranium conversion and enrichment.Much of the foreign assistance received by Pakistan was from China. The Pakistan's military government has been and will be for the foreseeable future be in control of its countries nuclear resources, to include research, and wartime command and control. Much of Pakistan's program is designed to deter the threat from India. Pakistan has publicly stated that it will not assemble or deploy its nuclear warheads, nor will it resume testing unless India does so first. – Syria: Syria has no current capability, but does have a small (China supplied) research reactor.Additionally, in 1999 Syria signed an agreement with Russian to build another research reactor. Although it has an interest in nuclear technology, it just doesn't have enough expertise and infrastructure to develop nuclear weapons, and therefore they are not pursuing it. Even though most believe that the retaliatory consequences of using a nuclear weapon would prohibit their use, there are still too many vulnerabilities to the United States which warrant careful consideration and homeland defense planning. One of these vulnerabilities is our communications and intelligence satellites.A nuclear weapon launched to a very high altitude would destroy the DoD's communications and intelligence satellites from the Electromagnet Pulse. We all know the significance of these satellites for the United States' war-fighting capability. Another vulner ability is the contamination of primary facilities, like ports and airfields. Both airfields and ports played an integral part of the success during Operation Desert Storm. The U. S. Air Forces' superiority over Iraq during the Gulf War would not have been as quick and extensive if it had to deal with contaminated and/or destroyed airfields. Defenselink, 2002). With Iraq being the major threat to the United States, both directly and indirectly (support of terrorist groups), Iraq's Weapons of Mass Destruction capabilities are addressed completely separate from the rest of this research. Laqueur (1999) noted that a great deal of Iraq's WMD program was unknown to the United States and world prior to the Gulf War, even though they had used in during the war with Iran and on the Kurds in their own country. Prior to the Gulf War, Iraq admitted to having 2,850 tons of ustard gas, 790 tons of sarin. Additionally, when the Gulf War began, Iraq had fifty missile warheads with chemical weapons . These figures were from Iraq, so the actual extent of their program was unknown (Laqueur, 1999). In October, 2002 the Central Intelligence Agency issued a report outlining its concerns for Iraq's continued development of WMD. Some of the conclusions made by the CIA (2002) include; – Iraq acquiring it's first nuclear weapon will depend mostly on its ability to acquire fissile-material.Once this is done it could have a nuclear weapon within one year. Additionally, Iraq has made an effort to purchase high-strength aluminum tubes that could be use for conventional weapons, but most conclude that it is for the nuclear centrifuge enrichment process. – It is believed that Iraq has stocked a few hundred metric tons of chemical agents, mostly consisting of mustard, sarin, and VX. – Efforts in the biological weapon program are very active and larger than prior to the Gulf War. Iraq still has a small missile force to include Short Range Ballistic Missiles with ranges of 650-900 km. Additionally, extensive research and tests have been done with unmanned arial vehicles, most likely to be used for delivery biological warfare agents. Concluding this review of Weapons of Mass Destruction, as the information provided above points out, there is an obvious threat to the United States' homeland and interests abroad from the use of WMD. Significant differences between nuclear and chemical or biological WMD exist.All three types of weapons can kill or injure personnel and spread contamination over broad areas, only nuclear weapons can destroy equipment and facilities. † (Defenselink, 2002) This of course has a cost factor. Many civilian chemical and biological production facilities can easily be turned into a weapons program, where a nuclear program would cost a great deal more. Henderson (2001, p. 29) makes the point about the attitude of 21st century terrorists by stating, â€Å"Weapons of mass destruction are becoming more accessible to terrorists.T hey appeal most to â€Å"new terrorist† who seek total destruction for symbolic reasons. † From a military standpoint, a great deal more emphasis must be placed on the policy makers and planners for DoD doctrine that applies to chemical, biological, radiological, and nuclear threats. As technology and capable means of proliferation of these threats, so will the use of them against us. Much of this planning as been done in the past, but we have only begun to prepare ourselves for the terrorist or state that is likely to use Weapons of Mass Destruction.Further emphasizing the importance of this issue, the Center for Strategic and International Studies in May of 2001 concluded, â€Å"There is no way to predict the nature of the WMD threat to the U. S. homeland in the near or long term. The U. S. military superiority in itself is no longer sufficient to ensure the safety of the United States. National security planning must be broadened to encompass WMD counterterrorism. à ¢â‚¬  (Cilluffo, Cardash, & Lederman, 2001, p. 9). Only a few months later on September 11, 2001 there point was further made.

Saturday, November 9, 2019

Procter & Gamble Resources, Capabilities and Competitive Advantage Essay

P&G – Procter & Gamble is a consumer product company founded and headquartered at Cincinnati, Ohio in 1837 by Mr. William Procter and Mr. James Gamble. It is now led by Mr. Alan.G.Lafley whom rejoins the company in 2010. P&G success was contributed to the heart of its business model – Innovation; and that is not just for newly invented product or service, it was for the goal of recreating needs for the improvement of consumers’ living. And it is a very long culture started where the roots started from the founders; whom are soap and candles makers. The first innovative product – Ivory; started in 1879, by James Norris Gamble who is the son of the founder and a trained chemist. Ivory at then was an inexpensive white soap equal to high-quality, imported Castile soap. It was introduced nationwide through a weekly newspaper. Today, P&G has its presence across 180 countries and a team of 121,000 employees. Its business operations spanned across various segments like Beauty, Grooming, Health Care, Fabric Care & Home Care and Baby Care & Family Care; it is the house to many of the world leading brands like Head & Shoulder, Gillette, Oral B, Fabrics, Pampers and many more. Touching more than 4 billion consumers worldwide every day, the company sales volume as of fiscal year ending June 30, 2013 was more than 80 billion in sales. The Strategy – Unique Value According to Michael Porter, He argued that organizations that focus solely on operation effectiveness is not enough, they will only be successful if they are able to provide a unique value that is sustainable for a long term. Organizations competing in operation effectiveness will only gauge their performance by benchmarking what others are doing; ultimately providing the same value throughout, which is of no value to the customer. Therefore, for an organization to be able to sustain for long term, an organization would require a competitive strategy by performing a different set of activities to deliver an unique value. According to Jay Barney, he also mentioned that an organization will have a competitive advantage against others if they adopt a value creating strategy not done by others yet. And that value will deem to be able to provide competitive advantage and are sustainable in the long term if they have the four attributes – Valuable, Rare, Non-Imitable and Non Substi tutable (V.R.I.N). Valuable would be that the  resource would be able to add value to the organization; Rare would be that the resource is not common within competitors; Non-imitable would be that the competitors are not able to copy them easily or able to produce the exact same set of resources; And lastly, non-substitutable would be that resources are not easily substitutable by equivalent resources that are valuable. Grant, R.M has a very similar theory to Jay Barney’s; he mentioned that for a resource or capability to establish competitive advantage, it must fit into two conditions: Scarcity and Relevance. Scarcity would refer to that it cannot be widely available, while relevance would refer to that it must be relevant to the key success factors in the market, assisting the firm in creating value for its customers or to survive competition. It is also dependant on their durability and whether are they easily imitable. From the above, we get to understand that a firm can only be successful, if they are able to provide a sustainable value that their rivals are not providing. As derived from the V.R.I.N table above, we can see that P&G competitive advantages would be their strong branding, accumulated understanding of consumer’s needs and innovative culture where it is not achievable by their rivals. Driven by an Innovative Culture In 2011, CEO of P&G – Mr. Robert McDonald mentioned that he is on a mission and that is to make P&G the most technologically enabled business in the world. And he get it all started by digitalizing operations everywhere which has eventually contributed to reduction of cost, time and effort, reaping better product yet higher profitability. Within manufacturing, employees can now use Ipads to download real time data for communication, the goal was to integrate their operational and financial system whereby cost of each product line will be displayed, allowing management to make effective market decision at real time. Within Logistics, there is a â€Å"Control Tower† and Distributor Connect† program that were with the intent to monitor all inbound or outbound activities within internal or external resources, it has since been able to effectively reduce deadhead moments. By bringing innovation into their supply chains to deliver better efficiency and lower cost, it is no surprise that P&G was ranked among the Top 5 in the award for  Gartner Supply Chain Top 25. With the effective supply chain, it has help to keep hiking costs at bay, where P&G can price their product competitively; which ultimately spells benefit for the consumers. For retailers, P&G has developed a sophisticated ordering application whereby retailers can now order via wired phone or wirelessly via a mobile app. With that all done digitally, they can now also upload existing shelf photos and receive best practices on product arrangement to maximize sales. In product development, molecules used for research have also been digitalized. When needed, it will be modeled to predict product effectiveness. Back at the roots of their research and development centre, it is inevitable that one would notice the promotion of innovative thinking within their culture. And this strategy is not only for their employees, P&G has also taken the step out to influence their partners. A program called Connect + Develop has been created to embrace open innovation. Not limiting only to their internal resources, P&G no taps onto the vast knowledge that the world can provide. Riding on this program for the past 10 years, it has brought the value that P&G can offer to the market up by 70%. Recognizing its success, it is now a key strategy that is employed throughout every business units. Some of the well known brands that are generated through this program are Olay Regenerist, Febreze and many more. All these processes are made possible because of the analytical thinking skills found within their employees which plays an important factor since it enabled them to come up with innovative ideas often co-related to analytical data collected. And these processes are not internally focuses; it controlled both the macro and micro environment factors that contribute to their success. With a very strong innovation culture, P&G today are currently at over 55,000 active patent filings globally and, as a subset of the active patent filings, about 41,000 granted patents globally. This makes P&G among the world’s largest holders of U.S. and global patents, puttin g it on a par with Intel, Lucent and Microsoft. Understanding and Reaching Out to Consumers like no others With technology, P&G brings their understanding of consumer’s behavior into the digital age. For the past years, P&G has been able to carry out a successful global rationalization. It is achieved through deep understanding of consumer needs. With digital channels on the rise, consumers are now bringing their feedback of a product or service to the digital space through blogging, tweeting and posting comments. P&G see this advantage and make the most out of it to understand a consumer’s behavior towards a product. But since the comments are all over the place, P&G developed â€Å"Consumer Pulse† which uses Bayesian analysis to scan through the universe of comments and categorizing them into individual product. These real time insights are then sent to respective in charge for real time reaction. They then carry out appropriate go to market strategy. And since the whole world is watching, it is an excellent opportunity for them to tap on the effect and go for the creation of a positive and strong branding. And with those, P&G are able to marry the best of what they have, which are the combination of customer behavior data and their top notch research development team – connecting â€Å"what’s needed† with â€Å"what’s possible†. With a establishment of more than 177 years now, P&G has been making a great deal of awareness in the market. Being one of the biggest media buyers, they have constantly been able to come up with message with an impact for their house brands. With all these activities that happen over the years, P&G has become a very strong and reputable branding among consumers which is a very rare intangible resource whereby new entrants or mediocre players in the industry will not be able to be on par within a short period. Surviv ing Competitions – Conclusion Although an organization’s competitive advantage is able to sustain the company in the long term, it is not forever. A new set of competitive advantage may be required if there are changes in the industry or within the organization structure. An evaluation tool like Porter’s five forces will help P&G understand the structure of its industry and see if it is strategically at a winning position against its long standing on par competitors like Unilever, Colgate Palmolive. If the forces are intense, the firm will not be able to earn attractive returns on investment. If the forces are benign, then it would be profitable. In consideration of the threats above, P&G can easily fence off new entrants with the branding that they established over the past 177 years and also its vast array of products by its own R&D. According to Grant R.M., the value of branding is in the confidence that it has instill in the customer, it is an intangible resources that customers are willing to pay a premium for over an unknown brand and branding is considered a very valuable resources as unlike technology, it is long-lived, unless tarnished. Although retailers can easily switch brands, and the threat is considered high. The retailer’s customers however are brand and product conscious; the retailers buying power are greatly affected by the demand of their customers. Further to this, P&G primed themselves for quality and effective product, this is highly credited to their innovative culture and accumulated understanding of their consumers, therefore although the threat of substitute is considered moderate in this industry, they are able to differentiate themselves with their quality, it is only considering to be a threat for cost conscious shoppers who are not looking at quality – which would be a minority group. Given P&G capacity in production today, suppliers bargaining power is considered a low threat for t hem. As the purchase of raw materials would normally be source globally and in bulk for economics of scope and scale, the negotiation power of P&G would be higher than their suppliers. Another theory to support on its success via its competitive advantage was Porter’s theory on generic competitive strategies. It is said that competitive advantages are classified into Low cost or differentiation, which are in relation to the industry structure. It is the ability of how an organization is able to cope with the five forces better than its rival. The two basic types of competitive advantage combined with its activities to achieve them lead to the three generic strategies – cost leadership, differentiation and focus. In this case, P&G are using Porter’s differentiation generic strategy. This strategy calls for the organization to selects the values that consumers perceive as important and position itself strategically to meet those needs. Although the key focus was to seek differentiation, its cost position was not ignored as P&G strive in operation effectiveness by technologically enabling its operation throughout its organization. P&G is currently in a winning position against its rival. Leveraging on its competitive advantage to provide the unique value to consumers, it has gained market share and the its leader position in sales volume (as supported by above bar chart) among its competitors. REFERENCES: (2009, March 16). Wal-Mart tries to cash in on Store brand boom . Portland, Oregon, United States: The Associated Press. Barney, J. (2004). Firm resources and Sustained Competitive Advantage. Strategy: Process Content Context: an international perspective, de Wit & Meyer , 285-292. Chui, M. (2011, November). Mckinsey & Company. Retrieved June 10, 2014, from Inside P&G’s Digital Revolution: http://www.mckinsey.com/insights/consumer_and_retail/inside_p_and_ampgs_digital_revolution Colgate-Palmolive Company. (n.d.). Online 2013 Annual Report. Retrieved June 24th, 2014, from Colgate-Palmolive Company.: http://investor.colgatepalmolive.com/annual.cfm E.Porter, M. (2008). The five competitive forces that shape strategy. Harvard Business Review , 78-93. Grant, R. (2005). Analyzing Resources and Capabilties. Comtemporary Strategic Analysis, Grant,R.M. , 130-185. Independent, I. (2014, June 24). Global power-player has come a long way from humble roots. Retrieved June 24, 2014, from In dependent.IE: http://www.independent.ie/business/personal-finance/latest-news/global-powerplayer-has-come-a-long-way-from-humble-roots-30321097.html Janessa Rivera. (2014). Gartner Announces Rankings of Its 2014 Supply Chain Top 25. Gartner Supply Chain Executive Conference. PHOENIX, AZ.: Gartner, Inc. Johnson, B. (2012, October 29). Procter & Gamble Co.’s Advertising Spending, 1987 to 2012. Retrieved June 10, 2014, from AdAge: http://adage.com/article/special-report-pg-at-175/procter-gamble-s-advertising-spending-1987-2012/237974/ Lafley, A. (2008, August 26). P&G’s Innovation Culture. Retrieved june 2014, 9, from strategy+business: http://www.strategy-business.com/article/08304?pg=0 M.E., P. (2004). Generic Competitive Strategies. Competitive Advantage, porter M.E , 11-25. P&G Annual Cash Flow. (2014, June 23). Retrieved June 23, 2014, from The Wall Street Journal: http://quotes.wsj.com/PG/financials/annual/cash-flow P&G.com Company. (n.d.). Retrieved June 9th, 2014, from P&G.com Home: http://www.pg.com/en_US/index.shtml Patentdocs. (n.d.). Retrieved June 9, 2014, from The Procter & Gamble Company Patent applications: http://www.faqs.org/patents/assignee/the-procter-gamble-company/ PG Science. (n.d.). Retrieved June 9, 2014, from The Magic behind the brand – PG Science: http://www.pgscience.com/home/home.html Porter, M. E. (1996). What

Thursday, November 7, 2019

Hispanics essays

Hispanics essays Mainly people recognized in the United States today as Hispanic or Latino are immigrants, or descendents of immigrants from countries that was under the rulings of the immense Spanish empire in the earlier days. Hispanics are one of the fastest growing groups in the United States today. At some indefinite moment within the next seven years, the Latino population in the United States will go beyond forty million, which will make the group the largest minority population (U.S Bureau of the census 1998). The three largest groups of Hispanic Americans are Mexican Americans (57%), who live mainly in the Southwest (the area conquered in 1848 by the U.S during Mexican War); Puerto Ricans (10%), living mainly in the industrial Northeast; and Cuban Americans (5%), concentrated in Florida. This group was comprised largely of political and economic refugees (and their descendents) who immigrated to the United States following the Cuban Revolution in the mid 1980s. Since World War Two, these three oldest and largest Latino communities have been joined by new migrants making the Latino population in the U.S more diverse. Other Hispanic groups gaining in importance are Dominicans, 520,151 of whom (1990) have settled mainly in and around New York City, where they have quickly gained political representation and improved their economic status. Political disorder in Central America has led to a recent flow in immigration from that area. 0f 1,323,830 Central American residents, 565,081 have come from El Salvador, 268,779 from Guatemala, and 202,658 from Nicaragua. The largest group from South America is the Colombians, who in 1990 numbered 378,726, many of them living in the borough of Queens in New York City. Colombians have been unique in importing their lifestyle to the United States. Friends, occupations, servants, goods, all have been replicated (U.S bureau of the census). ...

Tuesday, November 5, 2019

Second Battle of the Marne in World War I

Second Battle of the Marne in World War I The Second Battle of the Marne lasted from July 15 to August 6, 1918, and was fought during World War I (1914-1918). Conceived as an attempt to draw Allied troops south from Flanders to facilitate an attack in that region, the offensive along the Marne proved to be the last the German Army would mount in the conflict. In the opening days of the fighting, German forces made only minor gains before being halted by a constellation of Allied troops. Due to intelligence gathering, the Allies were largely aware of German intentions and had prepared a sizable counter-offensive. This moved forward on July 18 and quickly shattered German resistance. After two days of fighting, the Germans commenced a retreat back to trenches between the Aisne and Vesle Rivers. The Allied attack was the first in a series of sustained offensives that would bring the war to an end that November.      Spring Offensives In early 1918, Generalquartiermeister Erich Ludendorff commenced a series of attacks known as the Spring Offensives with the goal of defeating the Allies before American troops arrived on the Western Front in large numbers. Though the Germans scored some early successes, these offensives were contained and halted. Seeking to continue pushing, Ludendorff planned for additional operations that summer.    Believing that the decisive blow should come in Flanders, Ludendorff planned a diversionary offensive at the Marne. With this attack, the hoped to pull Allied troops south from his intended target. This plan called for an offensive south through the salient caused by the Aisne Offensive of late May and early June as well as a second assault to the east of Reims. German Plans In the west, Ludendorff assembled seventeen divisions of General Max von Boehms Seventh Army and additional troops from Ninth Army to strike at the French Sixth Army led by General Jean Degoutte. While Boehms troops drove south to the Marne River to capture Epernay, twenty-three divisions from Generals Bruno von Mudra and Karl von Einems First and Third Armies were poised to attack General Henri Gourauds French Fourth Army in Champagne. In advancing on both sides of Reims, Ludendorff hoped to split the French forces in the area. Allied Dispositions Supporting the troops in the lines, French forces in the area were buttressed by approximately 85,000 Americans as well as the British XXII Corps. As July passed, intelligence gleaned from prisoners, deserters, and aerial reconnaissance provided the Allied leadership with a solid understanding of German intentions. This included learning the date and hour that Ludendorffs offensive was set to commence. To counter the enemy, Marshal Ferdinand Foch, Supreme Commander of the Allied forces, had French artillery strike the opposing lines as German forces were forming for the assault. He also made plans for a large-scale counter-offensive which was set to launch on July 18. Armies Commanders: Allies Marshal Ferdinand Foch44 French divisions, 8 American divisions, 4 British divisions, and 2 Italian divisions Germany Generalquartiermeister Erich Ludendorff52 divisions The Germans Strike Attacking on July 15, Ludendorffs assault in Champagne quickly bogged down. Utilizing an elastic defense-in-depth, Gouraud’s troops were able to quickly contain and defeat the German thrust. Taking heavy losses, the Germans halted the offensive around 11:00 AM and it was not resumed. For his actions, Gouraud earned the nickname the Lion of Champagne. While Mudra and Einem were being halted, their comrades to the west fared better. Breaking through Degouttes lines, the Germans were able to cross the Marne at Dormans and Boehm soon held a bridgehead nine miles wide by four miles deep. In the fighting, only the 3rd US Division held earning it the nickname Rock of the Marne (Map).   Holding the Line The French Ninth Army, which had been held in reserve, was rushed forward to assist the Sixth Army and seal the breach. Aided by American, British, and Italian troops, the French were able to halt the Germans on July 17. Despite having gained some ground, the German position was tenuous as moving supplies and reinforcements across the Marne proved difficult due to Allied artillery and air attacks. Seeing an opportunity, Foch ordered plans for the counteroffensive to commence the next day. Committing twenty-four French divisions, as well as American, British, and Italian formations to the attack, he sought to eliminate the salient in the line caused by the earlier Aisne Offensive. Allied Counterattack Slamming into the Germans with Degouttes Sixth Army and General Charles Mangins Tenth Army (including the 1st and 2nd US Divisions) in the lead, the Allies began to drive the Germans back. While the Fifth and Ninth Armies conducted secondary attacks on the eastern side of the salient, the Sixth and Tenth advanced five miles on the first day. Though German resistance increased the next day, Tenth and Sixth Armies continued to advance. Under heavy pressure, Ludendorff ordered a retreat on July 20 (Map). Falling back, German troops abandoned the Marne bridgehead and began mounting rearguard actions to cover their withdrawal to a line between the Aisne and Vesle Rivers. Pushing forward, the Allies liberated Soissons, at the northwest corner of the salient on August 2, which threatened to trap those German troops remaining in the salient. The next day, German troops moved back into the lines they occupied at the beginning of the Spring Offensives. Attacking these positions on August 6, Allied troops were repulsed by a stubborn German defense. The salient retaken, the Allies dug in to consolidate their gains and prepare for further offensive action. Aftermath The fighting along the Marne cost the Germans around 139,000 dead and wounded as well as 29,367 captured. Allied dead and wounded numbered: 95,165 French, 16,552 British, and 12,000 Americans. The final German offensive of the war, its defeat led many senior German commanders, such as Crown Prince Wilhelm, to believe that the war had been lost. Due to the severity of the defeat, Ludendorff cancelled his planned offensive in Flanders. The counterattack at the Marne was first in a series of Allied offensives that would ultimately end the war. Two days after the battles end, British troops attacked at Amiens.