Tuesday, November 26, 2019

How Votes Are Counted on Election Day

How Votes Are Counted on Election Day After the polls close on  Election Day, the task of counting the votes begins. Each city and state use a different method to collect and tabulate ballots. Some are electronic, others paper-based. But the process of counting votes is generally the same no matter where you live and vote. Preparations As soon as the last voter has voted, the election judge at each polling place makes sure poll workers have sealed all of the ballot boxes and then sends the sealed ballot boxes to a central vote-counting facility. This is usually a government office, like a city hall or county courthouse. If digital voting machines are used, the election judge will send the media on which the votes are recorded to the counting facility. The ballot boxes or computer media are usually transported to the counting facility by sworn law enforcement officers. At the central counting facility, certified observers representing the political parties or candidates watch the actual vote counting to make sure the count is fair. Paper Ballots In areas where paper ballots are still used, election officials manually read each ballot and add up the number of votes in each race. Sometimes two or more election officials read each ballot to ensure accuracy. Since these ballots are filled out manually, the voters intention can sometimes be unclear. In these cases, the election judge either decides how the voter intended to vote or declares that the ballot in question will not be counted. The most common problem with manual vote counting is, of course, human error. This can also be an issue with punch card ballots, as youll see. Punch Cards Where punch card ballots are used, election officials open each ballot box, manually count the number of ballots cast, and run the ballots through a mechanical punch card reader. Software in the card reader records the votes in each race and prints out totals. If the total number of ballot cards read by the card reader does not match the manual count, the election judge can order the ballots recounted. Problems can occur when the ballot cards stick together while being run through the card reader, the reader malfunctions, or the voter has damaged the ballot. In extreme cases, the election judge can order the ballots to be read manually. Punch card ballots and their infamous hanging chads led to the controversial vote count in Florida during the 2000 presidential election. Digital Ballots With the newer, fully computerized voting systems, including optical scan and direct recording electronic systems, the vote totals may be transmitted automatically to the central counting facility. In some cases, these devices record their votes on removable media, such as hard disks or cassettes, which are transported to the central counting facility for counting. According to the Pew Research Center, nearly half of all Americans use optical-scan voting systems, and about a quarter use direct-recording voting machines. Like any electronic device, these voting machines are vulnerable to hacking, at least in theory, experts say. But as of August 2017, there is little to no evidence suggesting that hacking has occurred. Recounts and Other Issues Whenever the results of an election are very close, or problems have occurred with the voting equipment, one or more of the candidates often demand a recount of the votes. Some state laws call for mandatory recounts in any close election. The recounts may be done by a manual hand-count of ballots or by the same type of machines used to make the original count. Recounts do sometimes change the outcome of an election. In almost all elections, some votes are lost or incorrectly counted due to voter mistakes, faulty voting equipment, or errors by election officials. From local elections to presidential elections, officials are constantly working to improve the voting process, with the goal of making sure that every vote is counted and counted correctly. Of course, there remains one absolutely certain way to make sure your vote will not be counted: dont vote. Effect of 2016 Russian Interference on Future Vote Counting Since Special Counsel Robert Mueller issued his â€Å"Report on the Investigation Into the Russia Interference in The 2016 Presidential Election† in March 2019, the U.S. House of Representative has passed legislation intended to reform the voting process and protect future elections. While the Senate Judiciary Committee has advanced two similar bipartisan bills on election security, they have yet to be debated by the full Senate. In addition, several states have announced plans to replace their current voting machines and computerized vote counting systems with more modern and hacker-proof equipment before the 2020 presidential election. According to a report by the Brennan Center for Justice, local election officials in 254 jurisdictions across 37 states plan to purchase new voting equipment in the â€Å"near future.† Election officials in 31 of the 37 states hope to replace their equipment before the 2020 election. In 2002, Congress enacted the Help America Vote Act (HAVA) allocating $380 million to help states strengthen their election security.

Friday, November 22, 2019

Using the Spanish Verb Dejar

Using the Spanish Verb Dejar Like many other verbs, dejar has a basic meaning - in this case, to leave something somewhere - that has broadened over the centuries to be used under a wide variety of circumstances. Most of its meanings, however, pertain at least in a broad sense to the idea of leaving something (or someone) somewhere, placing something somewhere, or abandoning something. Dejar Meaning To Leave While to leave is one of the most common translations of dejar, it should not be confused with to leave in the sense of to leave a place, where salir is used. Thus, shes leaving tomorrow is sale maà ±ana, but I left my keys at home is dejà © las llaves en casa. Examples of dejar with its basic meaning: Dà ©jalo aquà ­. (Leave it here.) ¿Dà ³nde dejà © el coche aparcado? (Where did I park the car?)Dejarà © el libro en la mesa. (I will leave the book on the table.)Dejà © a Pablo en Chicago. (I dropped Pablo off in Chicago.) When the object of dejar is an activity or person, dejar can mean to leave, abandon or give up: Deja su carrera para irse a la polà ­tica. (He is leaving his career to go into politics.)Han fallado en sus tentativas de dejar el fumar. (They have failed in their attempts to quit smoking.)Dejà ³ a su esposa por la mujer que deseaba. (He abandoned his wife for the woman he wanted.) Dejar Meaning To Lend When an object is left with a person, dejar often means to lend. (The verb prestar can also be used with the same meaning.): Como era un buen jefe me dejaba su coche. (Since he was a good boss he would lend me his car.)Me dejà ³ su casa de vacaciones. (He let me use his vacation home.) ¿Me dejas tu telà ©fono?  (Could I borrow your phone?) Dejar Meaning To Pass On In many contexts, dejar can mean to give or to pass on: Mi madre me dejà ³ su capacidad de esperanza. (My mother passed on to me her capacity to hope.)Me dejà ³ su direccià ³n postal para escribirle. (He gave me his mailing address so I could write to him.)Cuando murià ³ me dejà ³ su panaderà ­a en su testamento. (When he died he left me his bakery in his will.)Siempre mi pap le dejaba la tarea mas difà ­cil a mi mama. (My father always passed the most difficult tasks to my mother.) Dejar Meaning To Leave Alone Sometimes, when the object of dejar is a person, it can mean to leave alone or to not bother:  ¡Dà ©jame! Tengo que estudiar. (Leave me alone! I have to study.)No nos dejaba en paz. (He did not leave us in peace.) Dejar Meaning To Allow Another common meaning of dejar is to allow or to let: No me dejaban comprar nada que no fuese reciclable. (They didnt let me buy anything that wasnt recyclable.)El faraà ³n se asustà ³ y dejà ³ salir al pueblo de Israel. (The pharaoh got scared and let the people of Israel go.) Using Dejar With an Adjective When followed by an adjective, dejar can mean to put or leave someone or something in a certain state or condition: La ley no dejà ³ satisfecho a nadie. (The law didnt satisfy anybody.)Me dejà ³ feliz, como ver un oasis. (It made me happy, like seeing an oasis.)El partido me dejà ³ rota la rodilla. (My knee got broken during the game.) Dejar Meaning To Delay or To Stop Sometimes, dejar means to postpone or delay:  ¿Por quà © no deja el viaje para maà ±ana? (Why not put off your trip until tomorrow?) The phrase dejar de usually means to stop or to give up: Hoy dejo de fumar. (Today I give up smoking.)La hepatitis A dejà ³ de ser una cosa de nià ±os. (Hepatitis A is no longer a childrens disease.)Nunca dejarà © de amarte. (Ill never stop loving you.) Using Dejar With Que Finally, dejar que usually means to wait until a certain time: Dejo que las cosas se sucedan naturalmente. (Im waiting until things happen naturally.)La madre no dejaba que los socorristas atendieran a su hija. (The mother didnt wait for the rescuers to help her daughter.)

Thursday, November 21, 2019

The Impact of the Black Death during the 14th Century Essay

The Impact of the Black Death during the 14th Century - Essay Example Cultural changes occurred as people had to cope with the consequences of the plague, creating a situation where changes occurred in order to combat the disease through means that reflected beliefs and traditions. The effects of the plague were written about through firsthand accounts of its devastating effects by Henry Knighton. He relates that in one day 1312 persons died from the disease. In relating the devastating effects of the disease in regard to how the affects reached farther than just human mortality, he reports that the sheep populations were also affected, creating a sense of the expanding ripples of effects that spread throughout all of human existence as the disease became an enemy to fight against and try to prevail. Knighton reports that the Scots believed that the disease was a condemnation of the English who seemed to have caused the wrath of God. However, soon the disease reached the Scottish shores and five thousand Scots were dead from the disease.1 One of the pr ominent theories on how the disease began its travels across the known world was through the use of a disease as a biological weapon. Allegedly, the Mongols during their siege of Caffa in Crimea hurled dead bodies, rotting with disease, into the holds of their enemies.2 From there, the disease began to proliferate and travel through trade routes as individuals and vermin carried the disease. A key understanding was made during the development of the plague in regard to the epistemology of disease control. According to Walsh, â€Å"Global shipping traffic has long served as a conduit for disease.3 The plague was spread through maritime routes, the rats on board the ships carrying fleas that transmitted the plague.4 While full understanding of how disease was spread was not understood, it was understood how this disease was traveling from place to place, but finding a way to contain the disease was not as easily grasped. In Venice, however, ships were quarantined in order to prevent the spread into the city, but this was not successful and even Venice eventually fell to the disease.5 It was during the period of time of the Black Plague that the term quarantine was coined in regard to efforts to contain the spread of the disease.6 The impact of the plague was harsh, quick and severe, impacting regions through decimations of populations that significantly changed the course of human development in the Western world. As an example, the art world was detrimentally affected as both artists and clients of artists were lost, thus changing the landscape. The first half of the 14th century had seen a great deal of activity, the world of art beginning to experience an expansion in style which was halted during the first breakout of the plague in 1348 and again in 1361. Central Italy was the core of the explosion in art advancement, but during this time it was stalled as it was also one of the worst areas hit by the plague.7 Death became personified in many of the works o f the period, stalking the population through imagery that suggested that there was an intent behind the spread of the disease as it ravaged populations and spread across continents. A preoccupation with death is visibly evident in the artwork of the period as well as the literature.8 It can be said that it was during this time that death became known as a cruel specter in the

Tuesday, November 19, 2019

Trauma Causing Vertebrobasilar Stroke Research Paper

Trauma Causing Vertebrobasilar Stroke - Research Paper Example . . Background: Stroke is one of the major causes of death and disability worldwide. While the elderly are most affected since the risk factors of stroke are high blood pressure and age, yet the incidences of stroke are increasing in young. The most perilous of the stroke is vertebrobasilar stroke effecting the posterior circulation of brain. This review deals with the different aspects of vertebrobasilar stroke in general and trauma due to sports activity in particular, as the cause of vertebrobasilar stroke Objective: The review aims to study the pathophysiology, risk factors, aetiology, diagnosis, treatment available and prognosis of vertebrobasilar stroke along with a systematic study of the common sports activities leading to vertebrobasilar stroke and their relative significance in causing this stroke. Methods: The literature search is based on relevant data available on Medline, Pubmed, Krager, Elsevier, Cochrane system database, NIH database. Relevant articles from various journals Stroke, Neurology Lancet etc were also referred to. The search was performed between 21 September & 3 December, 2010. Relevant data from 1973 to 2010 was used for data analysis. Data Analysis: An analysis of data was done based on central value calculation of frequency of vertebrobasilar stroke due to trauma and testing significance of population mean using ANOVA and P-value calculation. Results: Football is the major cause of vertebrobasilar stroke followed by soccer, both contact games. From 4 samples data (Soccer, football, equestrian sports and yoga injury), it is obvious that the football injuries, with the highest central value (16.89) are the most significant cause of vertebrobasilar stroke Stroke, in general is a temporary or permanent loss of brain activity due to cessation or reduction of blood supply to brain due to an obstruction of blood flow in arteries, which are the channels of blood supply to

Sunday, November 17, 2019

Inter-vendor Storage Management Application Tools Essay Example for Free

Inter-vendor Storage Management Application Tools Essay Inter-vendor storage application management tools are huge enterprise software applications that are used for robust, reliable, available and effective data management. The applications are both hardware and software dependent. The choice of their implementation depends on the organizational needs and objectives. Various vendors develop and support these tools both for support of business and mission critical applications. Some of the leading Inter-vendor applications tools that have dominated the industry as well as organizational automations in the last two years include VERITAS, Oracle and NetApp (ESM, 2009). VERITAS Its application tools provides for automated storage management software for enterprise business applications which have increased dependence on data from corporate storage infrastructure. VERITAS application tools are vital for boosting administrator productivity and reduce errors in automated storage administration. Among the tools it provides is the Storage Resource Management (SRM) software tools that help to automate the erroneous, tedious and routine tasks in storage administration. The tools are able to predict when the problem is likely to happen and as a result the IT managers are able to head off these problems. The automated storage provisions help the administrators have a continuous, uninterrupted access to the enterprise storage resources. The storage administration by the automated SRM software can accomplish several tasks in use, management and applications of the storage allocations. The automation tools are able to gather data around the storage infrastructure and also give feedback on the successful storage policies and also provide input and reports on the storage environment. The accurate and timely data help managers make informed and intelligent decisions on the future use of the storage. Further administrators are able to report and monitor on resource utilization and performance. When applications crash, the pagers beep and systems panic, it is the administrator that is on the receiving end of a pager to get the problem notification. Such situations prove to be very critical especially for business users due to degraded performance, equipment failure, resource shortages, and corruption of data or storage problem risks. This interruption of application access may in turn lead to incalculable financial losses to the business or organization. Therefore the automated software provisioning has a framework that manages the growing inventory in the components of enterprise storage. When the SRM software tools are deployed into the automated storage provisioning framework, the administrator has an easier access to the event based interventions and rule based policies which adequately resolve and intercept potential problems before they reach their critical levels (Hussain, 2008). The storage management application tool for a web based directory assistance runs on a web server as a data entry component with a more sophisticated management application that runs on a separate application server. When data is entered for the directory assistance, it is updated on the web server and staged on the repository application server and it is then automatically transferred to a relational database in another server by the directory management application. For fault tolerance as provided by the database server, database tables are duplicated using the snapshots from the primary database. The services however are vulnerable to storage failures especially when space allocation to the web server, database and repository is threatened to be exhausted and as a result bring down the system. Organizations of all sizes and in all industries are dependent on enterprise technological infrastructure which means that there is immense need for automated storage management process to avert any failures in the enterprise storage infrastructure. Therefore the SRM software tools and the automated storage provisioning should be implemented to solve the storage management problems. The rule based storage automations streamlines the administrator’s routine which improves productivity, reduces potential errors and system’s availability which impacts business activities and application availability. Oracle and NetApp The Automatic Storage Management (ASM) application tool provides a way to manage storage with an underlying database on a volume manager for the files on the database and an integrated file system. Its gives an alternative to the volume management solutions and file systems for the storage management tasks in the database (Manning Bridge, 2009). On the other hand NetApp filers simplify management and deployment of the enterprise data. The ASM and NetApp storage lower ownership costs and save on costs through the configuration of combined technology. There are combined benefits for using the NetApp for database layered applications and Oracle database which includes practices for deployment of ASM with the storage solutions networked by NetApp. Oracle ASM on NetApp iSAN and SAN storage like Oracle on NAS storage by NetApp has alternative capability for volume management for customers on an Oracle server that can alter, drop and create SQL statements which simplifies the storage provisioning on the database. The NetApp and ASM storage application tools has features that complement one another in performance to avoid errors by balancing of workload and help utilize the disk drive resources available. They also provide for support of online removal and addition of storage capacity that help maximize data availability and at the same time making configuration changes in the storage. The applications tools provide data security and availability since enterprises require high levels of data availability and protection whether there are component failures or faults storage subsystems. These tools include NetApp mirroring solutions that offer protection for disaster recovery requirements and business continuance while ASM provides protection against storage failures. In shared storage, Oracle’s Real Application Clusters (RAC) provides scalability and availability for the Oracle database which requires all servers to have direct read and full access to the database files. The ASM implementation provides a simplified cluster file system with optimized functionality of the volume manager in the shared storage. The NetApp networked storage gives shared access as required by RAC while in SAN environments, ASM provides volume management by Oracle RAC and a capable clustered file system. Both application tools have a rich assortment of storage data management that can be used separately or when combined depending on the customer enterprise requirements or the data infrastructure (Animi et al, 2009). The Automatic Storage Management application tool simplifies the management and configuration of storage management for the Oracle data files in its database. It also complements iSCSI SAN products for storage and NetApp Fibre Channel and while combined, they give full value to both technologies. With several combinations for data storage management and protection exists in the market, the Oracle and NetApp partnership offer powerful combinations that offer best practices to meet business performance and high availability requirements. Storage Management Networking Industry Association (SNIA) SNIA has created Storage Management Initiative Specification (SMI-S) application tool in order to standardize and develop storage management technologies for networking and storage. The SMI-S is for a standardized interface like SAN based storage management which are a challenge for interrogators and end-users to manage especially for multivendor SANs. The applications developed in most cases are unable to work together or are uncoordinated to perform tasks and deliver functionality, security and reliability for increased business efficiency. SMI-S therefore specifies protocols to manage communications with incorporated mechanisms for standard based management. It unifies the storage networks and also the management tools. The set of interfaces will allow the control of heterogeneous storage by storage management software packages. This way storage administrator will create and delete volumes and zones and also monitor array controllers, switches and host bus adapters. The enterprises too can manage with a single management framework their storage capacity independent of manufacturers. The application features have a common and extensive management transport, which has unified and complete which provides control of Zones and LUNs in a SAN context. It also has an automated discovery system with a newer approach in application of the CIM/WBEM technology. This specification helps to secure a reliable interface that can allow for the storage management interface classify, identify, control and monitor logical and physical resources in a SAN. The Technical Specification defines the management of a heterogeneous SAN and describes information from a SMI-S compliant CIM server available to a WBEM client. This information is object oriented, message based, XML based interface that is designed to support requirements of the managing devices through and in SANs. Using the CIM-XML on HTTP standard which is an independent management protocol, vendors increase the functions and features of their products without having to redesign the management storage therefore reducing cost and extending functionality. The SMI-S functional capabilities include the version requirements as provided and stated in the interface. Among them is that it will be able to receive the asynchronous notifications incase the SAN configuration changes. It will also be able to identify the health of vital resources in a SAN and also receive the asynchronous notification incase the SAN resource’s health has changed. It will also identify interconnects available performance in a SAN and receive the asynchronous notification incase a SAN’s interconnect performance changes. It will also identify zones that SAN enforces and help enable or disable, delete or create zones in a SAN. It will also identify the access rights and connectivity to SAN Storage Volumes and also enable or disable, delete or create access rights and connectivity to SAN Storage Volumes. These standards and specifications can only be used by a WBEM compliant and authenticated client. The language chosen for managing information and other related operations is the XML language which will help traverse the organizational firewalls and installed at low costs (Cover, 2010). In midrange computing environments and enterprise class, the SANs are highly emerging due to various functions and applications such as sharing of huge storage resources between multiple systems and having a LAN free backup. Other applications include disaster tolerant and remote online mirroring of critical data and clustering fault tolerant applications and systems with one data copy. While emergence of SANs accelerate, the informational industry requires a management interface for different classes of software and hardware products for multiple vendors to allow interoperation and reliability in order to monitor and control resources. For this reason SMI-S was created to define this interface and provide a standard for heterogeneous, functionally secure and reliable control and monitoring of resources in the complex distributed Inter-vendor SAN topologies. The SMI-S standard can simplify the huge storage management and reduced costs in storage administration but has not solved all storage problems. Since storage is an integral part in IT infrastructure to be managed with a combination of servers, applications and networks, management solutions offered by SMI-S work for servers, storages and networks. In the storage infrastructure, it provides the end-users with a consistency for device discovery, configuration and status information. SMI-S defines the behavior and structure of devices and their management and configuration in the storage infrastructure and provides management of multiple storage devices from multivendor. However, it does not solve the problem of incompatibility of hardware devices from the different vendors while its domain in storage management does not cover remote replication and backup. Conclusion There is countless demand by customers for open software from the computer industry vendors which is the reason multiple vendors such as Oracle and NetApp have had to work more closely to develop common standards, protocols and languages for storage and network management. The multipurpose standards could help storage administrators take control of the distributed applications with a resulting inter-vendor, manageable and open information systems. Using standard based storage management application tools can help increase value of IT investments. Before the multivendor standards were developed by SNIA, the individual users would need to manage the storage devices with vendor specific tools while disparate information was integrated manually. Today’s management standards and specifications are increasingly interoperable while still maintaining competitive advantage among vendors through differentiation.

Thursday, November 14, 2019

The Benefits of Enterprise and Innovation :: essays research papers

The Benefits of Enterprise and Innovation Teens are facing a major unemployment rate when they come out of High School. This unemployment rate could be cut if students would learn and grasp knowledge of business, economy, and new technology. This course should help in grasping all those ideas. This essay will start this process of learning by setting goals and showing how they can be met. The real world is tuff and unpredictable. With this course, preparing for the real world will be much easier.   Ã‚  Ã‚  Ã‚  Ã‚  Signing up for Enterprise and Innovation is as simple as watching the news. Just watching the news tell us about the roller coaster ride called economy and our unemployment rate will make anyone jump and sign up. Signing up just is smart. To succeed in the real world, an edge is needed. This edge starts by picking up a pencil and signing up for Enterprise and Innovation. With this edge a job should be easier to get and more enjoyable.   Ã‚  Ã‚  Ã‚  Ã‚  The goals that were set for this course are quite simple, relative to each other, and helpful. My major goal is to comprehend an edge and understanding in searching for a job and/or running a successful business. This goal also branches off into many smaller goals or steps. One of these steps is to gain experience by taking this course. The experience I will gain is about running a business and by getting knowledge of our economy to help get a job and help keep or get a job promotion . Another step is to seize more experience in interacting with people in a business. This experience will help extremely at giving better knowledge of how a business runs by its job force.   Ã‚  Ã‚  Ã‚  Ã‚  Many things have to be done and met to reach these goals. Though they may seem hard or easy to reach, all goals may grow, shrink, or change entirely. Through this course, focus and concentration is essential. Another way to reach these goals is to not just focus in one direction but open your mind to focus in many directions. This may need information from others, but that is another way of reaching these goals. Cooperation with people is major key in reaching goals. This cooperation is an easy way to reach the goals that were set.

Tuesday, November 12, 2019

The Continual Emerging Threat and Use of Weapons of Mass Destruction By Terrorist Organizations to the United States of America

The utilization of Weapons of Mass Destruction (WMD) by terrorist groups and states alike will continue to threaten the U. S. Homeland and its interests abroad. The National Intelligence Council (NIC) provided the following estimate of this emerging threat in its December 2000 analysis of global trends through the year 2015 (Cordesman, 2002).Strategic WMD threats, including nuclear missile threats in which (barring significant political or economic changes) Russia, China, most likely North Korea, probably Iran, and possibly Iraq have the capability to strike the United States, and the potential for unconventional delivery of WMD by both state or non-state actors also will grow (p. 3).The NIC report additionally goes on to discuss the accessibility and advancement of technology for WMD will increase, saying: Prospects will grow that more sophisticated weaponry, including weapons of mass destruction–indigenously produced or externally acquired–will get into the hands of s tate and non-state belligerents, some hostile to the United States. The likelihood will increase over this period that WMD will be used either against the United States or is forces, facilities, and interests overseas (p. ). For these and other reasons, individuals in the security and law enforcement profession need to continue to maintain their focus on the capabilities and the potentiality of WMD use by a variety of interests. I use this paper as an opportunity to further educate myself on the use of WMD by terrorist organizations. I do this by giving an overview of the many types of threats that fall into the category of WMD, to include chemical, biological, radiological, and nuclear.I then continue my education by looking at the countries involved with WMD. I'll conclude the paper with looking specifically at some of Iraq's capabilities and programs. Chemical weapons pose significant threats to both the civilian populace and military organization. One of the biggest reason chemi cal weapons pose such a threat to both of these groups is the psychological effect caused by their use. Although chemical weapons are no more lethal then conventional weaponry, they cause great fear when even someone thinks of them being used.The most common example would be the exploitations of the media and the footage seen of the Kurds in Iraq when Saddam Hussein used blister and nerve agents. Not only were there dead civilians laying in the streets, but gruesome pictures of the effect that these agents have on the body, both to those killed and survivors. â€Å"Chemical weapons are weapons of terror and intimidation as well as a means of producing casualties and physical destruction† (Cordesman, 2002, p. 101). In 2003 the Department of Defense (DoD) stated that most forms of CW are employed in the liquid form, called droplets.Droplets make the substance more stable and easy for use in weaponry. The DoD also put chemical weapons into two categories, persistent and nonpersi stent–persistent lasting for days, and nonpersistent only lasting from minutes to hours (Defenselink, 2003). The U. S. Centers for Disease Control (CDC) put CWs into a few distinct categories, these being; nerve agents such as VX, blood agents like hydrogen cyanide, blister agents like sulfur mustards, and pulmonary agents like chlorine. The latter are the more commonly used and known, but there are also many more†¦ specially the ones that fall into the commercial category, such as metals, pesticides, etc†¦ (Kahn & Levitt, 2000). Most organizations wishing to use some type of WMD tend not to turn to chemicals as their primary weapon. There are many challenges facing someone that wants to effectively employing CWs. The DoD (Defenselink, 2003) lists a variety of issues concerning the factors that must be considered. These factors include; agent type, how it will be disseminated, amount available to be disseminated (droplet size), meteorological conditions, including t emperature, wind speed and direction.Without the right combination of all of these factors, the desired outcome will be greatly reduced. An additional challenge is that of actually acquiring and/or producing a chemical to be used as a weapon. The Gilmore Commission (1999) gives the following example for explaining just how difficult it would be. It has sometimes been claimed that producing sarin and other nerve agents is a relatively easy process, to the extent, according to one authority, that â€Å"ball-point pen ink is only one chemical step removed†.While sarin may be less complicated to synthesize than other nerve agents, the expertise required to produce it should not, however, be underestimated. The safety challenges involved would, at a minimum, require skill, training, and special equipment to overcome. For this reason, the level of competency required for producing sophisticated chemical nerve agents, including sarin, will likely be on the order of a graduate degree in organic chemistry and/or actual experience as a organic chemist–not simply a knowledge of college-level chemistry, as is sometimes alleges (p. 91).Although the Gilmore Commission points the necessity to have the required level of expertise for composing chemicals into weapons grade, there are many countries that already posses a vast array of CWs. Terrorist organizations without access to CWs or the expertise to produce them, resort to using resources they do have (normally money, but sometimes services) to exchange with countries that do have CWs. According to Cordesman (2002) the following countries are potential national threats because of their chemical weapons program: China, India, Iran, Iraq, Libya, North Korea, Pakistan, and Russia.Russia has the largest stockpile, 40,000 metric tons of chemical agents. Even more frightening is that reportedly some of this stockpile is comprised of â€Å"new agents†. These new agents are designed to circumvent Western detec tion methods and can be hidden within commercial chemical plants. The employment challenges of CWs are far out-weighed by the vast capability to acquire them, and the terror effect they have. Biological Weapons (BW) pose a significant risk to U. S. interests for many reasons. There are a wide range of agents with many different effects and they offer a wide range of ways to attack American citizens, crops, and livestock† (Cordesman, 2002, p. 135). The World Health Organization (2000) explained the significance of BW and diseases by recounting history, pointing out Napoleon's devastating retreat from Moscow. This wasn't caused by the great Russian Army or even the cold temperatures of the Russian winter, but because of typhus, a louse-borne infection that reduced his army from 655,000 to 93,000.Cordesman (2002) states that there are five categories: bacterial agents such as anthrax, rickettsial agents like the Rocky Mountain spotted fever, viral agents like small pox, toxins in cluding botulinum, and fungal agents. The above agents are the major ones that would be used to pose a threat to humans, there are many others that would affect plant and animal life. The Center for Disease Control (Kahn & Levitt, 2000) further categorizes agents that are a threat to national security, labeling them â€Å"high priority†. These high priority agents: â€Å"- can be disseminated or transmitted person-to-person cause high mortality, with potential for major public health impact – might cause public panic and social disruption; and – require special action for public health. † As with chemical weapons, biological weapons offer a psychological threat, but additionally the BWs bring a great deal of physiological issues. Much of the challenge with biological weapons occurs when trying to detect that one (or many) have been used. There are many ways that BWs could be used covertly, and the medical symptoms becoming visible long after the terrorist has departed.The CDC (Kahn & Levitt, 2000) outlines this fact and emphasizing the importance of early detection by the public health infrastructure by giving this scenario: Only a short window of opportunity will exist between the time the first cases are identified and a second wave of the population becomes ill. During that brief period, public health officials will need to determine that an attack has occurred, identify the organism, and prevent more casualties through prevention strategies (e. g. , mass vaccination or prophylactic treatment).As person-to-person contact continues, successive waves of transmission could carry infection to other worldwide localities. Another twist that a terrorist might use to inhibit the effective detection is to employ a variety of different BWs at the same time. Health care workers would potentially read the symptoms of only one of them used, while the other continues to grow, infect further, and kill. In addition to BWs being very opportunisti c for covert use, the DoD (Defenselink, 2003) says that BWs are preferable to chemical or nuclear WMD because of being very compact and low in weight.The DoD additionally went on to say that the â€Å"dissemination of infectious agents through aerosols, either as droplets from liquid suspensions or by small particles from dry powders, is by far the most efficient method† (Defenselink, 2003, p. 5). A Russian assessment of microbiological agents mostly likely to be used identified eleven. The top four were smallpox, plague, anthrax, and botulism. These were at the top because of the ability to be used as an aerosol, and their theoretical lethality rates being 30 percent to 80 percent and because of their capability to be massed produced (Henderson, 1999).There are two countries besides the United States that are well know for their pursuit of weaponizing biological weapons, Iraq and the Soviet Union. In 1975 the Soviet Union used the biotechnology industry as a front for its we apons program, called Bioprepart†. The program had the capability to mass thousands of tons of agents and distribute and store them strategically throughout the Soviet Union. The program also included the ability to rapidly produce these stored agents to weapons grade levels (Alibek, 1999).According to some intelligence analysis this program involved 60,000 to 70,000 personnel (Roberts, 2000). Even more alarming was that a vast amount of these were â€Å"infectious agents designed to follow up a strategic nuclear attack on the United States with contagious diseases designed to decimate the population (Alibek, 1999). Although the looming threat to the United States from the former Soviet Union isn't as prevalent with the ending of the Cold War, the possibility of these technologies and actual agents falling into the hands of rogue states or terrorists, is a very good possibility.The General Accounting Office (GAO) (2000) states that in addition to the large collections of dang erous pathogens, there are also as many as 15,000 underpaid scientists and researchers, and an additional vast amount of specialized equipment and facilities just waiting to be exploited. This concern, in addition to the many outlined above concretely justify the continued efforts by the United States to counter attacks to its interests through the use of biological weapons. The likelihood of a conventional explosive vehicle bomb like the one used in the Oklahoma City bombing by Timothy McVeigh still posses a serious risk.Recently there has been a concern of these conventional vehicle bombs also including radioactive material. â€Å"Radiological weapons are generally felt to be suitable largely for terror, political, and area denial purposes, rather than mass killings† (Cordesman, 2002, p. 194). Cordesman (2002) further goes on to explain that as opposed to nuclear weapons, radioactive material posses such a great threat because of its contamination capability. Therefore, rad ioactive weapons are best suited for use when wanting to deny accessibility of a specific area or building/s.A Gilmore Commission Report (1999) explained that, A combination fertilizer truck bomb, if used together with radioactive material, for example, could not only have destroyed one of the New York World Trade Center's towers but might have rendered a considerable chunk of prime real estate in one of the world's financial nerve centers indefinitely unusable because of radioactive contamination. Radioactive weapons are designated into two categories, â€Å"radiological dispersal devices† (RDD) and â€Å"simple radiological dispersal devices† (simple RDD).As Cordesman (2002) points out, the main difference between the two being that a RDD is designed to â€Å"include any explosive device utilized to spread radioactive material upon detonation†, and the simple RDD â€Å"spreads the radioactive material without an explosion†. There are a couple of differe nt types of radioactive material that could be used as RDD or as simple RDDs. The list includes hospital radiation therapy, radiopharmaceuticals, nuclear power plant fuel rods, and universities, laboratories, radiography and gauging (Cordesman 2002).The Gilmore Commission Report (1999) explains the harmful effects caused by radioactive material by saying, â€Å"Radiological weapons kill or injure by exposing people to radioactive materials, such as cesium-137, iridium-192, or cobalt-60. † The harm is caused by a variety of different ways including in-haling it, or ingesting it (contaminated food or water supply). The level of the harm caused is of course determinate of the amount of exposure to the radioactive material, long periods or short periods. The difficult thing to assess initially is the level of exposure.The U. S. Army (2002) explains that lethal and serious doses are very difficult to determine, even within the same geographical area. Additionally the U. S. Army (2 002) points out that symptoms and effects are largely changed if someone has burns on their body or their body has been through physical trauma, which is almost certainly the case if most scenarios (except for maybe covertly) that would involve radiological contamination. For these reasons, early detection of decontamination is imperative.The U. S. Army's USACHPPM report (2002) goes on to explain that once prompt detection has occurred, â€Å"about 95 percent of external agents can be removed by simple removing outer clothing and shoes†. So where would a terrorist group mostly likely acquire radioactive material to be used as a WMD, and furthermore, what is the likelihood that they would chose radioactive material as their weapon as opposed to, lets say nuclear? The former Soviet Union posses a threat regarding the lack of control over its any radiological materials, especially the â€Å"accumulation of large quantities of plutonium from reactors that is intended for reproce ssing and/or storage. † (Defenselink, 2002, p. 2). The DoD (Defenselink, 2002) also points out that Iraq and Chechnya have furthered their knowledge of radioactive weapons that could be used to contaminate water, food crops, and livestock. It further concludes that with many countries (Korea, etc†¦ ) advancing their nuclear power interests, radiological material will be tougher to monitor and control, and thus easier to acquire.One of our biggest threats may not be from a conventional weapon with radioactive material, or even the contamination of water or food, but direct contamination through the exploitation of a nuclear power plant right here in the United States. Even though an attack on a nuclear power plant would have to take a great deal of timing during the planning phase, it could produce very effective results. â€Å"The possible venting or overload of a reactor could then act as a radiological weapon, and cover hundreds of square kilometers as well as have a m ajor potential affect on regional power supplies (Cordesman, 2002, p. 97). † Some theorize that the method of using an existing nuclear power plant would elevate the hazards that go alone acquiring radioactive material. The Gilmore Commission Report (1999) points out that spent fuel rods are very hot, heavy and thus hard to handle. Cordesman (2002, p. 197) concurs with the Gilmore Commission stating, † A seizure of spent fuel would be particularly dangerous during the first 150 days after the downloading because iodine-131, and iodine-123 are present, which are extremely volatile, and affect the thyroid†.There is still a great deal to be learned about the potential loss and employment of radiological materials, and ultimately the use of it by a terrorist or state would have on a population or army. When it comes to the use of nuclear weapons of mass destruction, the retaliatory consequences of their use would probably discourage the would be state or terrorist to u se them. There are many other reasons that would prohibit a terrorist group from having the capability to do so, but as some experts have argued, when it comes to the homeland defense, security planners must look at a time-frame twenty five years from now (Cordesman, 2002).The DoD (Defenselink, 2002) makes the point by explaining that no one foresaw the Cold War ending so quickly, or that twenty five years ago the Persian Gulf War would have happened†¦ thus the need for such long range planning, and more importantly looking at what the capabilities could be out there, and the United States vulnerabilities to them. A great deal of the threat would come from countries that currently have nuclear programs, whether directly, or indirectly through the proliferation of technical expertise and equipment.Thus, we must look at these countries, and gain a firm understanding of their current programs. The DoD (OSD, 2001) gave the following overview in explaining the states with a potentia l nuclear threat to the United States. -Iran: Iran is currently actively pursuing the acquiring of fissile material and technology for nuclear weapons development. They are doing this by an elaborate system of military and civilian organizations. Iran's claim is that these elaborate systems are for the development of a civilian energy program–the DoD thinks otherwise. Much of the success of Iran's attempts will depend on Russia and China.Russia is currently in a mutual partnership with Iran to build a 1,000 megawatt power reactor. Iran is using this product to both acquire sensitive nuclear technologies, along with weapons-usable fissile material. China on the other hand ended its nuclear projects with Iran in 1997. Additionally, in 1998 China created new export controls over dual-use nuclear equipment†¦ it seems they're living up to their 1997 commitment. – North Korea: In 1994 an agreement between the United States and North Korea ended nuclear weapons material production at two of its facilities.In question, is whether North Korea was able to divert enough plutonium to make a nuclear weapon, the United States thinks it did. Also in question is the spent fuel from one of these reactors that was also removed in 1994. If this fuel was reprocessed it could've produced several nuclear weapons. – Pakistan: In response to India's testing, Pakistan tested six devices in 1998. Pakistan has a very good infrastructure to support a nuclear weapons program, especially facilities that allow for uranium conversion and enrichment.Much of the foreign assistance received by Pakistan was from China. The Pakistan's military government has been and will be for the foreseeable future be in control of its countries nuclear resources, to include research, and wartime command and control. Much of Pakistan's program is designed to deter the threat from India. Pakistan has publicly stated that it will not assemble or deploy its nuclear warheads, nor will it resume testing unless India does so first. – Syria: Syria has no current capability, but does have a small (China supplied) research reactor.Additionally, in 1999 Syria signed an agreement with Russian to build another research reactor. Although it has an interest in nuclear technology, it just doesn't have enough expertise and infrastructure to develop nuclear weapons, and therefore they are not pursuing it. Even though most believe that the retaliatory consequences of using a nuclear weapon would prohibit their use, there are still too many vulnerabilities to the United States which warrant careful consideration and homeland defense planning. One of these vulnerabilities is our communications and intelligence satellites.A nuclear weapon launched to a very high altitude would destroy the DoD's communications and intelligence satellites from the Electromagnet Pulse. We all know the significance of these satellites for the United States' war-fighting capability. Another vulner ability is the contamination of primary facilities, like ports and airfields. Both airfields and ports played an integral part of the success during Operation Desert Storm. The U. S. Air Forces' superiority over Iraq during the Gulf War would not have been as quick and extensive if it had to deal with contaminated and/or destroyed airfields. Defenselink, 2002). With Iraq being the major threat to the United States, both directly and indirectly (support of terrorist groups), Iraq's Weapons of Mass Destruction capabilities are addressed completely separate from the rest of this research. Laqueur (1999) noted that a great deal of Iraq's WMD program was unknown to the United States and world prior to the Gulf War, even though they had used in during the war with Iran and on the Kurds in their own country. Prior to the Gulf War, Iraq admitted to having 2,850 tons of ustard gas, 790 tons of sarin. Additionally, when the Gulf War began, Iraq had fifty missile warheads with chemical weapons . These figures were from Iraq, so the actual extent of their program was unknown (Laqueur, 1999). In October, 2002 the Central Intelligence Agency issued a report outlining its concerns for Iraq's continued development of WMD. Some of the conclusions made by the CIA (2002) include; – Iraq acquiring it's first nuclear weapon will depend mostly on its ability to acquire fissile-material.Once this is done it could have a nuclear weapon within one year. Additionally, Iraq has made an effort to purchase high-strength aluminum tubes that could be use for conventional weapons, but most conclude that it is for the nuclear centrifuge enrichment process. – It is believed that Iraq has stocked a few hundred metric tons of chemical agents, mostly consisting of mustard, sarin, and VX. – Efforts in the biological weapon program are very active and larger than prior to the Gulf War. Iraq still has a small missile force to include Short Range Ballistic Missiles with ranges of 650-900 km. Additionally, extensive research and tests have been done with unmanned arial vehicles, most likely to be used for delivery biological warfare agents. Concluding this review of Weapons of Mass Destruction, as the information provided above points out, there is an obvious threat to the United States' homeland and interests abroad from the use of WMD. Significant differences between nuclear and chemical or biological WMD exist.All three types of weapons can kill or injure personnel and spread contamination over broad areas, only nuclear weapons can destroy equipment and facilities. † (Defenselink, 2002) This of course has a cost factor. Many civilian chemical and biological production facilities can easily be turned into a weapons program, where a nuclear program would cost a great deal more. Henderson (2001, p. 29) makes the point about the attitude of 21st century terrorists by stating, â€Å"Weapons of mass destruction are becoming more accessible to terrorists.T hey appeal most to â€Å"new terrorist† who seek total destruction for symbolic reasons. † From a military standpoint, a great deal more emphasis must be placed on the policy makers and planners for DoD doctrine that applies to chemical, biological, radiological, and nuclear threats. As technology and capable means of proliferation of these threats, so will the use of them against us. Much of this planning as been done in the past, but we have only begun to prepare ourselves for the terrorist or state that is likely to use Weapons of Mass Destruction.Further emphasizing the importance of this issue, the Center for Strategic and International Studies in May of 2001 concluded, â€Å"There is no way to predict the nature of the WMD threat to the U. S. homeland in the near or long term. The U. S. military superiority in itself is no longer sufficient to ensure the safety of the United States. National security planning must be broadened to encompass WMD counterterrorism. à ¢â‚¬  (Cilluffo, Cardash, & Lederman, 2001, p. 9). Only a few months later on September 11, 2001 there point was further made.

Saturday, November 9, 2019

Procter & Gamble Resources, Capabilities and Competitive Advantage Essay

P&G – Procter & Gamble is a consumer product company founded and headquartered at Cincinnati, Ohio in 1837 by Mr. William Procter and Mr. James Gamble. It is now led by Mr. Alan.G.Lafley whom rejoins the company in 2010. P&G success was contributed to the heart of its business model – Innovation; and that is not just for newly invented product or service, it was for the goal of recreating needs for the improvement of consumers’ living. And it is a very long culture started where the roots started from the founders; whom are soap and candles makers. The first innovative product – Ivory; started in 1879, by James Norris Gamble who is the son of the founder and a trained chemist. Ivory at then was an inexpensive white soap equal to high-quality, imported Castile soap. It was introduced nationwide through a weekly newspaper. Today, P&G has its presence across 180 countries and a team of 121,000 employees. Its business operations spanned across various segments like Beauty, Grooming, Health Care, Fabric Care & Home Care and Baby Care & Family Care; it is the house to many of the world leading brands like Head & Shoulder, Gillette, Oral B, Fabrics, Pampers and many more. Touching more than 4 billion consumers worldwide every day, the company sales volume as of fiscal year ending June 30, 2013 was more than 80 billion in sales. The Strategy – Unique Value According to Michael Porter, He argued that organizations that focus solely on operation effectiveness is not enough, they will only be successful if they are able to provide a unique value that is sustainable for a long term. Organizations competing in operation effectiveness will only gauge their performance by benchmarking what others are doing; ultimately providing the same value throughout, which is of no value to the customer. Therefore, for an organization to be able to sustain for long term, an organization would require a competitive strategy by performing a different set of activities to deliver an unique value. According to Jay Barney, he also mentioned that an organization will have a competitive advantage against others if they adopt a value creating strategy not done by others yet. And that value will deem to be able to provide competitive advantage and are sustainable in the long term if they have the four attributes – Valuable, Rare, Non-Imitable and Non Substi tutable (V.R.I.N). Valuable would be that the  resource would be able to add value to the organization; Rare would be that the resource is not common within competitors; Non-imitable would be that the competitors are not able to copy them easily or able to produce the exact same set of resources; And lastly, non-substitutable would be that resources are not easily substitutable by equivalent resources that are valuable. Grant, R.M has a very similar theory to Jay Barney’s; he mentioned that for a resource or capability to establish competitive advantage, it must fit into two conditions: Scarcity and Relevance. Scarcity would refer to that it cannot be widely available, while relevance would refer to that it must be relevant to the key success factors in the market, assisting the firm in creating value for its customers or to survive competition. It is also dependant on their durability and whether are they easily imitable. From the above, we get to understand that a firm can only be successful, if they are able to provide a sustainable value that their rivals are not providing. As derived from the V.R.I.N table above, we can see that P&G competitive advantages would be their strong branding, accumulated understanding of consumer’s needs and innovative culture where it is not achievable by their rivals. Driven by an Innovative Culture In 2011, CEO of P&G – Mr. Robert McDonald mentioned that he is on a mission and that is to make P&G the most technologically enabled business in the world. And he get it all started by digitalizing operations everywhere which has eventually contributed to reduction of cost, time and effort, reaping better product yet higher profitability. Within manufacturing, employees can now use Ipads to download real time data for communication, the goal was to integrate their operational and financial system whereby cost of each product line will be displayed, allowing management to make effective market decision at real time. Within Logistics, there is a â€Å"Control Tower† and Distributor Connect† program that were with the intent to monitor all inbound or outbound activities within internal or external resources, it has since been able to effectively reduce deadhead moments. By bringing innovation into their supply chains to deliver better efficiency and lower cost, it is no surprise that P&G was ranked among the Top 5 in the award for  Gartner Supply Chain Top 25. With the effective supply chain, it has help to keep hiking costs at bay, where P&G can price their product competitively; which ultimately spells benefit for the consumers. For retailers, P&G has developed a sophisticated ordering application whereby retailers can now order via wired phone or wirelessly via a mobile app. With that all done digitally, they can now also upload existing shelf photos and receive best practices on product arrangement to maximize sales. In product development, molecules used for research have also been digitalized. When needed, it will be modeled to predict product effectiveness. Back at the roots of their research and development centre, it is inevitable that one would notice the promotion of innovative thinking within their culture. And this strategy is not only for their employees, P&G has also taken the step out to influence their partners. A program called Connect + Develop has been created to embrace open innovation. Not limiting only to their internal resources, P&G no taps onto the vast knowledge that the world can provide. Riding on this program for the past 10 years, it has brought the value that P&G can offer to the market up by 70%. Recognizing its success, it is now a key strategy that is employed throughout every business units. Some of the well known brands that are generated through this program are Olay Regenerist, Febreze and many more. All these processes are made possible because of the analytical thinking skills found within their employees which plays an important factor since it enabled them to come up with innovative ideas often co-related to analytical data collected. And these processes are not internally focuses; it controlled both the macro and micro environment factors that contribute to their success. With a very strong innovation culture, P&G today are currently at over 55,000 active patent filings globally and, as a subset of the active patent filings, about 41,000 granted patents globally. This makes P&G among the world’s largest holders of U.S. and global patents, puttin g it on a par with Intel, Lucent and Microsoft. Understanding and Reaching Out to Consumers like no others With technology, P&G brings their understanding of consumer’s behavior into the digital age. For the past years, P&G has been able to carry out a successful global rationalization. It is achieved through deep understanding of consumer needs. With digital channels on the rise, consumers are now bringing their feedback of a product or service to the digital space through blogging, tweeting and posting comments. P&G see this advantage and make the most out of it to understand a consumer’s behavior towards a product. But since the comments are all over the place, P&G developed â€Å"Consumer Pulse† which uses Bayesian analysis to scan through the universe of comments and categorizing them into individual product. These real time insights are then sent to respective in charge for real time reaction. They then carry out appropriate go to market strategy. And since the whole world is watching, it is an excellent opportunity for them to tap on the effect and go for the creation of a positive and strong branding. And with those, P&G are able to marry the best of what they have, which are the combination of customer behavior data and their top notch research development team – connecting â€Å"what’s needed† with â€Å"what’s possible†. With a establishment of more than 177 years now, P&G has been making a great deal of awareness in the market. Being one of the biggest media buyers, they have constantly been able to come up with message with an impact for their house brands. With all these activities that happen over the years, P&G has become a very strong and reputable branding among consumers which is a very rare intangible resource whereby new entrants or mediocre players in the industry will not be able to be on par within a short period. Surviv ing Competitions – Conclusion Although an organization’s competitive advantage is able to sustain the company in the long term, it is not forever. A new set of competitive advantage may be required if there are changes in the industry or within the organization structure. An evaluation tool like Porter’s five forces will help P&G understand the structure of its industry and see if it is strategically at a winning position against its long standing on par competitors like Unilever, Colgate Palmolive. If the forces are intense, the firm will not be able to earn attractive returns on investment. If the forces are benign, then it would be profitable. In consideration of the threats above, P&G can easily fence off new entrants with the branding that they established over the past 177 years and also its vast array of products by its own R&D. According to Grant R.M., the value of branding is in the confidence that it has instill in the customer, it is an intangible resources that customers are willing to pay a premium for over an unknown brand and branding is considered a very valuable resources as unlike technology, it is long-lived, unless tarnished. Although retailers can easily switch brands, and the threat is considered high. The retailer’s customers however are brand and product conscious; the retailers buying power are greatly affected by the demand of their customers. Further to this, P&G primed themselves for quality and effective product, this is highly credited to their innovative culture and accumulated understanding of their consumers, therefore although the threat of substitute is considered moderate in this industry, they are able to differentiate themselves with their quality, it is only considering to be a threat for cost conscious shoppers who are not looking at quality – which would be a minority group. Given P&G capacity in production today, suppliers bargaining power is considered a low threat for t hem. As the purchase of raw materials would normally be source globally and in bulk for economics of scope and scale, the negotiation power of P&G would be higher than their suppliers. Another theory to support on its success via its competitive advantage was Porter’s theory on generic competitive strategies. It is said that competitive advantages are classified into Low cost or differentiation, which are in relation to the industry structure. It is the ability of how an organization is able to cope with the five forces better than its rival. The two basic types of competitive advantage combined with its activities to achieve them lead to the three generic strategies – cost leadership, differentiation and focus. In this case, P&G are using Porter’s differentiation generic strategy. This strategy calls for the organization to selects the values that consumers perceive as important and position itself strategically to meet those needs. Although the key focus was to seek differentiation, its cost position was not ignored as P&G strive in operation effectiveness by technologically enabling its operation throughout its organization. P&G is currently in a winning position against its rival. Leveraging on its competitive advantage to provide the unique value to consumers, it has gained market share and the its leader position in sales volume (as supported by above bar chart) among its competitors. REFERENCES: (2009, March 16). Wal-Mart tries to cash in on Store brand boom . Portland, Oregon, United States: The Associated Press. Barney, J. (2004). Firm resources and Sustained Competitive Advantage. Strategy: Process Content Context: an international perspective, de Wit & Meyer , 285-292. Chui, M. (2011, November). Mckinsey & Company. Retrieved June 10, 2014, from Inside P&G’s Digital Revolution: http://www.mckinsey.com/insights/consumer_and_retail/inside_p_and_ampgs_digital_revolution Colgate-Palmolive Company. (n.d.). Online 2013 Annual Report. Retrieved June 24th, 2014, from Colgate-Palmolive Company.: http://investor.colgatepalmolive.com/annual.cfm E.Porter, M. (2008). The five competitive forces that shape strategy. Harvard Business Review , 78-93. Grant, R. (2005). Analyzing Resources and Capabilties. Comtemporary Strategic Analysis, Grant,R.M. , 130-185. Independent, I. (2014, June 24). Global power-player has come a long way from humble roots. Retrieved June 24, 2014, from In dependent.IE: http://www.independent.ie/business/personal-finance/latest-news/global-powerplayer-has-come-a-long-way-from-humble-roots-30321097.html Janessa Rivera. (2014). Gartner Announces Rankings of Its 2014 Supply Chain Top 25. Gartner Supply Chain Executive Conference. PHOENIX, AZ.: Gartner, Inc. Johnson, B. (2012, October 29). Procter & Gamble Co.’s Advertising Spending, 1987 to 2012. Retrieved June 10, 2014, from AdAge: http://adage.com/article/special-report-pg-at-175/procter-gamble-s-advertising-spending-1987-2012/237974/ Lafley, A. (2008, August 26). P&G’s Innovation Culture. Retrieved june 2014, 9, from strategy+business: http://www.strategy-business.com/article/08304?pg=0 M.E., P. (2004). Generic Competitive Strategies. Competitive Advantage, porter M.E , 11-25. P&G Annual Cash Flow. (2014, June 23). Retrieved June 23, 2014, from The Wall Street Journal: http://quotes.wsj.com/PG/financials/annual/cash-flow P&G.com Company. (n.d.). Retrieved June 9th, 2014, from P&G.com Home: http://www.pg.com/en_US/index.shtml Patentdocs. (n.d.). Retrieved June 9, 2014, from The Procter & Gamble Company Patent applications: http://www.faqs.org/patents/assignee/the-procter-gamble-company/ PG Science. (n.d.). Retrieved June 9, 2014, from The Magic behind the brand – PG Science: http://www.pgscience.com/home/home.html Porter, M. E. (1996). What

Thursday, November 7, 2019

Hispanics essays

Hispanics essays Mainly people recognized in the United States today as Hispanic or Latino are immigrants, or descendents of immigrants from countries that was under the rulings of the immense Spanish empire in the earlier days. Hispanics are one of the fastest growing groups in the United States today. At some indefinite moment within the next seven years, the Latino population in the United States will go beyond forty million, which will make the group the largest minority population (U.S Bureau of the census 1998). The three largest groups of Hispanic Americans are Mexican Americans (57%), who live mainly in the Southwest (the area conquered in 1848 by the U.S during Mexican War); Puerto Ricans (10%), living mainly in the industrial Northeast; and Cuban Americans (5%), concentrated in Florida. This group was comprised largely of political and economic refugees (and their descendents) who immigrated to the United States following the Cuban Revolution in the mid 1980s. Since World War Two, these three oldest and largest Latino communities have been joined by new migrants making the Latino population in the U.S more diverse. Other Hispanic groups gaining in importance are Dominicans, 520,151 of whom (1990) have settled mainly in and around New York City, where they have quickly gained political representation and improved their economic status. Political disorder in Central America has led to a recent flow in immigration from that area. 0f 1,323,830 Central American residents, 565,081 have come from El Salvador, 268,779 from Guatemala, and 202,658 from Nicaragua. The largest group from South America is the Colombians, who in 1990 numbered 378,726, many of them living in the borough of Queens in New York City. Colombians have been unique in importing their lifestyle to the United States. Friends, occupations, servants, goods, all have been replicated (U.S bureau of the census). ...

Tuesday, November 5, 2019

Second Battle of the Marne in World War I

Second Battle of the Marne in World War I The Second Battle of the Marne lasted from July 15 to August 6, 1918, and was fought during World War I (1914-1918). Conceived as an attempt to draw Allied troops south from Flanders to facilitate an attack in that region, the offensive along the Marne proved to be the last the German Army would mount in the conflict. In the opening days of the fighting, German forces made only minor gains before being halted by a constellation of Allied troops. Due to intelligence gathering, the Allies were largely aware of German intentions and had prepared a sizable counter-offensive. This moved forward on July 18 and quickly shattered German resistance. After two days of fighting, the Germans commenced a retreat back to trenches between the Aisne and Vesle Rivers. The Allied attack was the first in a series of sustained offensives that would bring the war to an end that November.      Spring Offensives In early 1918, Generalquartiermeister Erich Ludendorff commenced a series of attacks known as the Spring Offensives with the goal of defeating the Allies before American troops arrived on the Western Front in large numbers. Though the Germans scored some early successes, these offensives were contained and halted. Seeking to continue pushing, Ludendorff planned for additional operations that summer.    Believing that the decisive blow should come in Flanders, Ludendorff planned a diversionary offensive at the Marne. With this attack, the hoped to pull Allied troops south from his intended target. This plan called for an offensive south through the salient caused by the Aisne Offensive of late May and early June as well as a second assault to the east of Reims. German Plans In the west, Ludendorff assembled seventeen divisions of General Max von Boehms Seventh Army and additional troops from Ninth Army to strike at the French Sixth Army led by General Jean Degoutte. While Boehms troops drove south to the Marne River to capture Epernay, twenty-three divisions from Generals Bruno von Mudra and Karl von Einems First and Third Armies were poised to attack General Henri Gourauds French Fourth Army in Champagne. In advancing on both sides of Reims, Ludendorff hoped to split the French forces in the area. Allied Dispositions Supporting the troops in the lines, French forces in the area were buttressed by approximately 85,000 Americans as well as the British XXII Corps. As July passed, intelligence gleaned from prisoners, deserters, and aerial reconnaissance provided the Allied leadership with a solid understanding of German intentions. This included learning the date and hour that Ludendorffs offensive was set to commence. To counter the enemy, Marshal Ferdinand Foch, Supreme Commander of the Allied forces, had French artillery strike the opposing lines as German forces were forming for the assault. He also made plans for a large-scale counter-offensive which was set to launch on July 18. Armies Commanders: Allies Marshal Ferdinand Foch44 French divisions, 8 American divisions, 4 British divisions, and 2 Italian divisions Germany Generalquartiermeister Erich Ludendorff52 divisions The Germans Strike Attacking on July 15, Ludendorffs assault in Champagne quickly bogged down. Utilizing an elastic defense-in-depth, Gouraud’s troops were able to quickly contain and defeat the German thrust. Taking heavy losses, the Germans halted the offensive around 11:00 AM and it was not resumed. For his actions, Gouraud earned the nickname the Lion of Champagne. While Mudra and Einem were being halted, their comrades to the west fared better. Breaking through Degouttes lines, the Germans were able to cross the Marne at Dormans and Boehm soon held a bridgehead nine miles wide by four miles deep. In the fighting, only the 3rd US Division held earning it the nickname Rock of the Marne (Map).   Holding the Line The French Ninth Army, which had been held in reserve, was rushed forward to assist the Sixth Army and seal the breach. Aided by American, British, and Italian troops, the French were able to halt the Germans on July 17. Despite having gained some ground, the German position was tenuous as moving supplies and reinforcements across the Marne proved difficult due to Allied artillery and air attacks. Seeing an opportunity, Foch ordered plans for the counteroffensive to commence the next day. Committing twenty-four French divisions, as well as American, British, and Italian formations to the attack, he sought to eliminate the salient in the line caused by the earlier Aisne Offensive. Allied Counterattack Slamming into the Germans with Degouttes Sixth Army and General Charles Mangins Tenth Army (including the 1st and 2nd US Divisions) in the lead, the Allies began to drive the Germans back. While the Fifth and Ninth Armies conducted secondary attacks on the eastern side of the salient, the Sixth and Tenth advanced five miles on the first day. Though German resistance increased the next day, Tenth and Sixth Armies continued to advance. Under heavy pressure, Ludendorff ordered a retreat on July 20 (Map). Falling back, German troops abandoned the Marne bridgehead and began mounting rearguard actions to cover their withdrawal to a line between the Aisne and Vesle Rivers. Pushing forward, the Allies liberated Soissons, at the northwest corner of the salient on August 2, which threatened to trap those German troops remaining in the salient. The next day, German troops moved back into the lines they occupied at the beginning of the Spring Offensives. Attacking these positions on August 6, Allied troops were repulsed by a stubborn German defense. The salient retaken, the Allies dug in to consolidate their gains and prepare for further offensive action. Aftermath The fighting along the Marne cost the Germans around 139,000 dead and wounded as well as 29,367 captured. Allied dead and wounded numbered: 95,165 French, 16,552 British, and 12,000 Americans. The final German offensive of the war, its defeat led many senior German commanders, such as Crown Prince Wilhelm, to believe that the war had been lost. Due to the severity of the defeat, Ludendorff cancelled his planned offensive in Flanders. The counterattack at the Marne was first in a series of Allied offensives that would ultimately end the war. Two days after the battles end, British troops attacked at Amiens.

Sunday, November 3, 2019

Language Variety Essay Example | Topics and Well Written Essays - 2000 words

Language Variety - Essay Example At the risk of oversimplification let us ask a fundamental question: What is language "Language is a complicated business. In everyday talk, we use the word 'language' in many different ways. It isn't clear how 'language' should be defined or what the person on the street thinks it actually is!" (Downes, 1998, p.1). We tend to define language differently in different situations. We talk of the incoherent utterances of an infant, as a child's language. When we refer to the melodious intonations of some languages we refer to language in terms of aesthetics. When we talk of language in standardized correctness, we talk of language as grammar. We also talk of language as a skill, a We also tend to define language in terms of the use to which we put it. We talk of legal language. The language used by the legal profession tends to be quite different from our everyday language. We also talk of medical parlance. That is the language used by the medical fraternity. This is again different from the language we use in everyday life. Then you have computer language which is quite distinct from any of the other languages. In a way each specialized profession it seems has its own characteristic language. Chomsky defines language as "a set of very specific universal principles which are intrinsic properties of the human mind and part of our species' genetic endowment" (Chomsky. 1986: 15 ff. as cited in Downes, 1998, p.17). While that may indeed be the best definition of language, the definition of language needs to be examined from a sociolinguistic perspective. What is Sociolinguistics "The most obvious definition of sociolinguistics is that it is the study of language in society" (Schmitt, 2002, p. 150). Schmitt goes on to say that most sociolinguistic studies are basically descriptive, but focus on achieving "scientific objectivity", even when these studies involve intricate influences that society has on language. Sociolinguistic studies also take into consideration "social aspects of language" in a pragmatic way, explaining social influences as accurately as possible. (Schmitt, 2002, p.150) Language Variety 3 A Sociolinguistic Definition of Language Sociolinguistics tends to define language as what the members of a specific society speak. However they also take into consideration the fact that a society may have more than one language or many dialects of the same language, and therefore view language with the conviction that it is not something that is independent of society. (Wardhaugh, 2002, p. ix) Purpose of Language "The notion of discourse is the conceptual link between language and society, looking upwards on the one hand to social structures and cultural meanings and downwards to the nitty-gritty of words and grammar - lexicogrammar - on the other" (Bartlett, n.d, p.113 ). (Bartlett, n.d, p.113) argues that language is a "socially motivated construct" because of what it helps to do. Any language basically serves two purposes: it facilitates interaction and serves as a means of communication. The Common Components of All Languages All languages have three common