Wednesday, August 26, 2020

Ethics 2 Article Example | Topics and Well Written Essays - 500 words

Morals 2 - Article Example There are notwithstanding, certain impediments, which limits from the examination being a finished observational investigation. Right off the bat, the example picked is from one geological network in Canada. Also, the enterprises picked doesn't cover certain significant areas like style and lodging industry, which needs to keep up their CSR exercises as well. However, it may be noticed that the principle segments, which are profoundly responsible to the social qualities, are thought about. Thirdly, the example size picked is 16 individuals from places of initiative in particular. A general perspective on the representatives and officials ought to have been gathered so as to pass judgment on the mindfulness towards CSR even at the base level in the ventures. Rules and arrangements are handily planned yet the usage is realized through legitimate degree of mindfulness and duty. The observational examination directed here essentially calls attention to an area explicit contextual analysi s including a few directors from certain picked areas. Fourthly it might be noticed that the meetings were maybe not directed in an orderly way with a similar arrangement of inquiries posed to every respondent. Or maybe various respondents appear to offer thoughts from different points and the peruser has little thought regarding what inquiries were posed. Fifthly, a possibility of predisposition emerges inferable from the purposive inspecting strategy. The scientists appear to have acquired an example so as to demonstrate their foreordained thought. My involvement with Saudi Arabia shows that the country’s household organizations are not worried or influenced by the worldwide principles of CSR the board. Or maybe they give most weight on the neighborhood society and investigate their inclinations first. The organization where I worked provided merchandise requiring little to no effort/limits to the nearby purchasers and ingested neighborhood individuals as their representatives particularly for the low talented positions. Saudi Arabia has along these lines gotten away from the impact of worldwide guidelines of CSR, which probably won't be possible

Saturday, August 22, 2020

Is literature the expression of the human condition Free Essays

string(204) appear to be nothing but bad for ME to stay†I couldn’t sit idle, and I didn’t need to be hung in the event that I could So I ran constantly till I found the kayak; advised Jim to hustle, or theyd get me get away. Is Literature the Expression of the Human Condition Oh indeed, is writing the outflow of the human condition or is it not? Truly, writing is and for just one explanation, Normans Conquest 1066. Yet in addition writing is recorders of history, accounts of time. Writing likewise a grouping of words, it can comprise everything being equal, communicating the human condition, feelings, recorders, it characterizes life. We will compose a custom paper test on Is writing the declaration of the human condition or then again any comparable theme just for you Request Now The human condition is encounters of being human in a social, social, and individual setting, it’s a part of positives and negatives of being human. So forward, writing is appeared in Death of a Salesman, where Willy is stuck in his wn past and everybody except him realizes that. In any case, similar to all people, we as a whole have dreams, expectations, and plans. â€Å"LINDA: He’ll discover his direction. WILLY: Sure. Certain men Just don’t begin till further down the road. Like Thomas Edison, I think. Or then again B. F. them was hard of hearing. [He begins for the cash on Biff. † Goodrich. One of room entryway. ] I’ll put my Willy trusting that one day for Biff to be a renowned sales rep, similar to outstanding amongst other sales rep out there, at the top with Thomas Edison, or B. F. or then again Goodrich. In any case, both Linda and Willy realized that Biff could never be a significant accomplishment in business, however despite the fact that they knew it, they despite everything trusted and put stock in him. The American dream was to be the main, at the top better than every other person and that’s what Willy consistently needed, he needed to be the best, particularly the best sales rep. He was living before and demolishing all expectations of ever turning into the best. He Just couldn’t handle on the way that what's to come was coming sooner then he thought, and wasn’t prepared for it. CHARLEY: â€Å"Nobody dast accuse this man. You don’t see: Willy was a sales rep. Furthermore, for a sales rep, there’s no absolute bottom to the life. He don’t put a jolt to a the law or give you medication. He’s a nut, he don’t disclose to you man a long distance in the blue riding on a grin and an ack†that’s a shoeshine. Furthermore, when they start not grinning seismic tremor. And afterward you get yourself several spots your cap and your wrapped up. No one dast accuse this man. A sales rep is got the chance to dream kid, it goes with the job. Charley demanding that Willy a sales rep and regardless of he generally will be, his fantasy will never bite the dust, and in any event, when your sales rep and it’s not going the best it can or you’re not the best on the planet there’s no absolute bottom. Additionally as should be obvious in Great Gatsby ,Literature is communicating that people can be part by riches The poor do whatever them might feeling like doing, nave their own gatherings and hen the more well off class remain with their gathering and have their own occasions. Yet in addition in this book it demonstrate one man’s love for a ladies and to what extent and how far individuals are eager to go to demonstrate their affection. Well for Gatsby he Just never abandoned the young lady he had always wanted, he followed her, set up each second splendidly, arranged everything. â€Å"Whenever you want to reprimand any one†¦ Just recall that all the individuals in this world havent had the points of interest that you’ve had. â€Å"(l) throughout everyday life, not every person has the open doors as others would get, so it’s like that expression â€Å"Don’t Judge a book by its spread. † Because on the off chance that you are scrutinizing individuals Just off looks, or what you figure they may be or what they may have done, you may never know, and possibly you would not be right. No one can tell what a few people have experienced, until that day you figure out how to go up to them and quit Judging and converse with them and discover who they truly are. In people we have the power to consistently Judge somebody, will it be looks, riches, character, how they talk, or what they do. Regardless of where you go it’s in the human condition that somebody or everybody will Judge you, it is possible that it will be told you directly or in their brain. It’s human instinct for Judging, to likewise discuss climate how we will get treated or act. â€Å"Gatsby’s wonder when he previously selected the green light toward the finish of Daisy’s dock†¦. is dream must have close that he could barely neglect to get a handle on it. He appeared to be so didn't have the foggiest idea about that it was at that point behind him. † (182) Gatsby gets so near the young lady he’s in adoration with, so close however yet up until now. Feelings i s one of the key part to the human condition, love can assume a major job throughout everyday life, it can assume responsibility for your psyche, soul, heart, everything, it very well may be the best inclination on the planet or it very well may be the most noticeably awful. It can feel like paradise however hurt like damnation. Be that as it may, on the off chance that affection didn’t hurt or give the torment it gives, at that point there would be no motivations to return to it. Or on the other hand to continue falling all through adoration. In The Adventures of Huckflnn, Huck lies all through the book, yet at times it’s generally advantageous, to either spare himself or somebody he thinks about. Be that as it may, it’s like Truth versus Falsehoods versus Life and demise, for instance â€Å"Honest, I’ll reveal to you everything Just as it occurred, your highness. The man that had a-holt of me was awesome to continued saying he had a kid about as large as me that he was sorry to see a kid in such a me, and ied a year ago, and risky fix; and when they was totally shocked by final resting place, he gives up sure! finding the gold, and made a scramble for the of me and murmurs, ‘Heel it now, or theyll hang ye, and I lit out. It didn’t appear to be nothing but bad for ME to stay†I couldn’t sit idle, and I didn’t need to be hung on the off chance that I could So I ran constantly till I found the kayak; advised Jim to hustle, or theyd get me escape. You read Is writing the statement of the human condition in classification Writing and when I arrived I and hang me yet, and said I was afeard you and the duke so was Jim, Jim on the off chance that I 55) wasn’t alive now, and I was dreadful sorry, and was horrendous happy when we see you coming; you may inquire Huck is deceiving spare himself, yet in addition he got fortunate that the man that was holding him, his child kicked the bucket that year and was around his age and stature, yet it helped n to remember his child. The man felt frustrated about Huck, that he was in such a hazardous fix, so whenever the man got an opportunity to allow Huck to run, he did. The human condition, resembles whenever we get an opportunity to lie we for the most part take it, Just as long as we get what we need, Just set up words and make it into sentences that individuals need to hear, however it’s all bologna. A pleasant over being a butt nugget, out on the planet there are predominantly butt nuggets, yet ho can truly accuse them since if your too decent you get underestimated. In Winesburg Ohio, writing is communicated through a large number of ways, in the entirety of the short stories. In â€Å"Hands† a person utilizes his hands to talk yet he got kick out of his old neighborhood for doing that, for the town individuals thought he wasn’t equivalent to them, and they didn’t like individuals who where extraordinary, they needed everything a similar everybody the equivalent. The happening to industrialization, went to by all the thunder and clatter of issues, the deafening cries of millions have come among us from abroad, trains, the development of urban areas, of voices that he proceeding to happen to the structure of the interurban vehicle lines that weave in all through towns and past farmhouses, and now these later days the happening to the autos has worked an enor mous change in lives and in the propensities for thought of our kin of Mid-America. â€Å"(56) Urbanization and travel have changed America, as the humankind began to change did as well development, voyaging, and more to progress into what's to come. Making life simpler, yet in Winesburg Ohio, towns were loaded with one kind of individuals in such a case that you were distinctive they would either force you to leave the town or wind up murdering you, having somebody diverse then veryone else Just wasn’t regular for them. Going on, Narrative of the Life of Frederick Douglass, as a slave enduring was an every day thing, and white people were dumb for insistence†¦ â€Å"l have regularly been totally amazed, since I went toward the north, to discover people who could talk about the among slaves, as proof of their It is difficult to singing, satisfaction and joy. think about a more prominent misstep. Slaves sing most when they are generally troubled. The melodies of the slave distresses of his heart; and he is calmed speak to the by them, just as a hurting heart is eased by its regularly tears. In any event, such is my experience. I have sung to suffocate my distress, yet sometimes to communicate my satisfaction. Weeping for Joy, and singing for Joy, were unprecedented to me while in the Jaws of subjugation. the same The singing ofa man give occasion to feel qualms about away a ruined considered as island may be as fittingly proof of satisfaction and bliss, as the singing of a slave; the melodies of the one and of the provoked by a similar feeling. (2. 9) other are The white people that seen the slave singing tunes, and moving idea that they were glad, yet never truly comprehend that they were seeking after bondage to stop, to be free. Each man and each lady ought to have equivalent rights regardless of what shading dark, white, yellow, blue.. ect. All people are equivalent that how God made us, Just in light of the fact that some are preferable in different things over others, doesn’t make them less human or equivalent, servitude could work in any case. So why set yourself in a place that you wouldn’t need to be in, in any case. The Things They Carried, as writing is the outflow of the human condition, it very well may be a not all that pretty site at time. Life’s effectively like a war, it’s like the combat zone of life

Thursday, August 13, 2020

11 Black Hat SEO Strategies You Should Avoid

11 Black Hat SEO Strategies You Should Avoid The major search engines and many SEO experts extol the virtues of developing websites that are easy to categorize and navigate, and that contain frequently updated content popular enough to generate organic backlinks and user distribution. By doing so, one can ensure maximum visibility in search results. This is considered practicing white hat SEO â€" the practice of optimizing website results in search through the ethical and strict application of search engine best practices and guidelines.By contrast, many SEO professionals use what are known as black hat SEO strategies. This involves the application of SEO strategies and tactics that are the opposite of search engine practices. More fundamentally, black hat SEO professionals try to fool search engines into thinking that their website is more relevant, popular, and/or useful than it actually is.From a business perspective, black hat SEO should be avoided or at least approached with caution. Black hat SEO can indeed lead to short- term improvements in one’s search engine ranking, as well as site traffic, and even conversions. Nevertheless, the punitive measures a firm may face if caught using them, can be time-consuming and expensive to correct. Therefore, firms should avoid incorporating black hat strategies into long-term strategic marketing and/or digital plans.A compromise between white hat and black hat SEO is known as gray hat SEO. This involves using black hat SEO techniques sparingly enough to avoid the punitive measures commonly employed by search engines. A combination of white hat and gray hat strategies can indeed effect long-term improvements but must be carefully deployed and continuously monitored for best results. © Shutterstock.com | Studio10ArturIf a firm decides that black hat SEO techniques are in its best interest or plans to employ gray hat strategies, in this article, we will provide an overview of the best black hat techniques. These include 1) keyword stuffing, 2) meta tag/description stuffing, 3) cloaking, 4) hidden text, 5) article spinning, 6) doorway pages, 7) duplicate content, 8) unnatural links/link farming, 9) comment spamming, 10) parasite hosting, and 11) Google bombing, as well as 12) other black hat techniques.1. KEYWORD STUFFINGSEO practitioners who saturate text-based content with target keywords engage in a  black hat practice known as keyword stuffing.Search engine crawlers index websites, in part, through analysis of the keywords and key phrases on the website’s pages. Some SEO practitioners incorporate significant amounts of similar keywords and phrases into webpage content, whether or not they are relevant to the content of the pages in question. Generally, a key word density of between 2% and 4% is considered optimal; anything above that is considered black hat. In some cases, this results in grammatically incorrect or even unreadable pages. However, these practitioners hope to improve their website’s chances of being ranked high in searches for those keywords and phrases.This is a widely known practice and penalties can be severe. In 2011, Google released Panda â€" a series of updates that discouraged various black hat abuses, including keyword stuffing. This resulted in significantly diminished search engine rankings for many websites.In general, those who choose to employ this technique should use it sparingly and ensure that the keyword-stuffed content they produce is not unreadable and/or of low utility. Content, such as instructions for a DIY task or an entertaining popular culture, may be popular enough for readers to ignore the repetitive content, and generate the traffic, backlink, and social shares, which along with the extra ke ywords, ensure improvements in webpage visibility.2. META TAG/DESCRIPTIONS STUFFINGIn addition to keyword stuffing, SEO practitioners may engage in meta tag/description stuffing. This is the practice of filling meta tags and meta descriptions with keywords and phrases, again, in an effort to convince search engine crawlers to index and rank webpages high for those keywords and phrases.Because meta tags and meta descriptions are, by nature, self-reported data about what a website is about, it is safe to say that web crawlers pay far more attention to the site content itself than metadata. Meta tag/description stuffing may fool a crawler into ranking a webpage high for particular keywords and phrases, but without keyword stuffing or appropriate keyword usage in the content, any change in search engine ranking due to this technique alone will be extremely brief. Further, this may draw negative attention to the website.For those practitioners who choose to use this technique, meta tag/d escription stuffing should be pared with either a strong content strategy or else keyword stuffing.3. CLOAKINGCloaking is a black hat strategy in which SEO practitioners code their webpages and sites in such a way that crawlers see one version, and users see another. This is antithetical to search engine best practices, which, essentially, call for websites to be designed for humans as if search engines did not exist. In fact, one of Google’s Webmaster Guidelines is “Don’t deceive your users or present different content to search engines than you display to users.”Cloaking is achieved by server-side scripts, which identify the IP address or the User Agent HTTP header of the user accessing the page. Usually, those users identified as web crawlers are served keyword and meta tag/description stuffed content while all others are served human-friendly content.Perhaps the most notable example of cloaking occurred in 2006, when automobile manufacturer BMW, having employed an SEO fi rm that used a cloaking strategy, was severely penalized by Google, by a delisting from search engine results entirely. Luckily for the firm, the duration of the delisting was short.Cloaking has been used to highlight site content in instances when a site’s design is friendly to humans but not particularly friendly to search engine crawlers (i.e. the site contains considerable images and/or animation). This is the ideal use for this black hat SEO technique.4. HIDDEN TEXTSimilar to cloaking is hidden text. This black hat technique refers to text that is configured to be invisible or unreadable. SEO practitioners may hide links or text to increase keyword density on a page or to “improve” internal link structure. Crawlers usually consider hidden text spam, though just as with cloaking, hidden text can be used sparingly to highlight text coded in JavaScript or Flash that is unreadable to or ignored by most search engines.5. ARTICLE SPINNINGSearch engines do assess the frequency o f content updates as a measure of compliance with their best practices. White hat SEO professionals either rely on their in-house marketing and/or copywriting teams to develop or purchase content that is aligned with the firm’s strategic objectives, branding standards, and SEO objectives.However, many SEO practitioners, without this resource to rely on, avoid this by on-site article spinning â€" duplicating content by rewriting it, usually multiple times and publishing each version as a distinct page at periodic intervals. This content is repetitive, and often poorly written; it generally has low value for the website visitor. Generally, SEO practitioners pare article spinning with keyword stuffing.More frequently, article spinning is used as an off-page black hat technique for backlinking purposes. Practitioners create multiple versions of text-based content, embed backlinks to their site, and submit each version to a different site for publication. Many practitioners use article -spinning software for this purpose (though such software often creates unintelligible text).The practice of article spinning is one of which Google and the other major search engines are aware; indeed, Google’s Panda and Penguin updates were designed, in part, to punish against sites that employ this practice. A better strategy is employing writers, or using in-house writers, to rewrite content from different perspectives, which may yield sustainable backlinks and content considered fresh for SEO purposes.6. DOORWAY PAGESDoorway pages are groups of poorly written pages optimized for specific keywords. These pages usually have little content, in favor of calls to action and links that drive users through multiple webpages to a single landing page. Some practitioners use doorway pages to redirect user traffic to sites without their knowledge.As an example, a firm may send out an email about a breaking news story. The recipient may click on the embedded link, and see a page with a t easer image concerning the story and be told to click on a link below. The recipient may then be directed to a second or multiple similar pages, all driving them eventually to a landing page. When these doorway pages mimic the landing page, or otherwise feature links, design features and navigation, they are known as content-rich doorways.As with the aforementioned practices, doorway pages are on the radar of the major search engines, which have, and will, take punitive actions against sites that employ them. Doorway pages can be used to ease navigation by redirecting traffic internally or externally at the user’s direction. However, too many redirects can have a negative impact on SEO.7. DUPLICATE CONTENTDuplicate content can refer to on-site article spinning. However, the phrase also denotes two other common black hat practices. The first refers to the establishment of affiliate programs for website promotion. Practitioners will offer a set of template webpages designed to drive traffic to their website to a group of affiliates. These template websites offer minimal original content, serve no purpose other than SEO, and can quickly be delisted.The other instance of duplicate content is more commonly known as plagiarism lifting content from another published site and publishing it as one’s own. Plagiarism can also refer to paraphrasing said content without attribution in a manner that it is still clearly someone else’s work. Like Google, Bing, and Yahoo are invested in indexing the maximum amount of original content and offering it to search engine users; plagiarism is frowned upon. Further, it can lead to both legal consequences â€" as the original author can initiate civil proceedings for recompense and damages, and reputational harm.Anti-plagiarism applications, available widely online, can quickly detect duplicate content, preventing accidental publication. Moreover, anti-plagiarism algorithms in search engines can detect duplicate content and pena lize the websites on which it appears.8. UNNATURAL LINKS/LINK FARMINGRather than pursuing organic links through white hat techniques, some SEO professionals obtain links from link farms, or buy them from other third parties. While this is not necessarily a bad strategy, irrelevant links â€" links from sources that are obviously unrelated to a particular website, have a negative effect on SEO. Practitioners looking to obtain links from a third party should careful vet the provider site for quality, content, and consistency with the firm’s brand to avoid penalties for irrelevant links.9. COMMENT SPAMMINGA practice more prevalent in the early days of SEO, comment spamming involves including comments on blogs and websites including backlinks to one’s website. However, in 2005, Google introduced the nofollow attribute that, when coded, instructed crawlers to bypass such links when indexing sites. Yahoo and Bing’s crawlers follow the nofollow link but do not include it in their rank ing calculations.However, the ability of webmasters to nullify the link has reduced, but not eliminated, the practice. Moreover, some webmasters do not employ the attribute, making it a viable strategy for some. Further, the addition of these links can result in additional traffic.10. PARASITE HOSTINGAnyone who has ever visited clicked on a website from search results and been taken to another, completely different website, may have seen parasite hosting in action. Parasite hosting involves hosting a website on another individual’s computer or server for SEO purposes. This illegal practice first became prevalent in 2007 and has no gray or white hat counterpart. However, it is still widely used by many practitioners, who often employ a script that redirects traffic away from a website link referred in search results to a site of their own choosing. Because the hijacked website shows no other signs of being compromised, this can be difficult to detect without vigilant and consistent security measures.11. GOOGLE BOMBINGGoogle bombing is a practice some SEO professionals use to reduce their competitor’s rankings. Once used to pull pranks, Google bombing refers to the set of tactics for manipulating the search results of competitors. These can include creating negative pages about competitors, often with a viral hook; media campaigns to generate user-created webpages to redefine or recontextualize a particular keyword or key phrase; and media campaigns to boost the popularity of trending terms and phrases (usually negative ones).Google bombing can be effective for short-term visibility â€" both on- and offline. However, the major search engines often quickly limit their effectiveness once discovered. Google bombs may, however, sustain a lasting public relations impact.OTHER BLACK HAT TECHNIQUESThere are many other black hat techniques including:Pingback spam: Some practitioners set up scripts to notify search engines of content repeatedly to create the illusion that it is new.Cybersquatting: This involves the domain registration of a trademarked name and either used to redirect traffic to a site of one’s own choosing or to otherwise post promotional content.Typosquatting: This involves purchasing a domain name that is a misspelling of a competitor’s brand name and redirecting traffic from it to one’s own site.Cookie stuffing: Practitioners employ this technique when they place cookies on a user’s computer without their knowledge.Social networking spam: Practitioners may flood social networks with spam comments promoting their website and/or target specific users on social networks for the recipients of these messages.Page swapping: Some practitioners “swap” the content of a high performing page with content from a low-performing one.Scraper sites: Scraper sites refer to websites created by programs that “scrape” other sites for unique content and amalgamate it. These sites are often filled with ads, and/or used to promote a practitioner main site.Translated sites/machine translation: Practitioners may use programs to translate content into other languages automatically for SEO purposes. This often yields unintelligible pages.As with all black hat SEO techniques, these may generate short-term improvements in search engine results. However, they may eventually subject a website to punitive measures, as well as alienate website visitors.

Saturday, May 23, 2020

Globalisation and Childhood Culture Free Essay Example, 2500 words

In the contemporary world, globalisation has affected the behaviour of children. The exchange of ideas is fast with modern technology. Children create a relationship and easily maintain them with modern forms of communication. The modern forms of communication have facilitated faster exchange of ideas among people of different cultures. Modern forms of communication such as Facebook, Twitter, Whatsapp, Instagram, and Google+ are some of the modern forms of communication that children use to exchange information (Held McGrew 2003, p. 12). They are fast and convenient. Thus, when dealing with the children, it is important for one to understand the contemporary world for you to relate well with them. Globalisation has resulted in different changes which should be considered when dealing with the children. Globalisation has resulted to change in family structures. Parents spend fewer hours with their children because of the increase in the number of working hours. The families have al so changed from extended families to nuclear than to single-parent families. The rate of divorce is high (Rodd 2013, p. 89). Communalism has been replaced by capitalism as people focus on the pursuit of individual gratification. We will write a custom essay sample on Globalisation and Childhood Culture or any topic specifically for you Only $17.96 $11.86/page Some children prefer staying indoors and learning through computers than going to a class(SCF 2002, p. 63).

Tuesday, May 12, 2020

Insider Dealings in Nigeria - 2178 Words

â€Å"EXAMINE THE EFFECTIVENESS OF THE PROVISIONS OF THE INVESTMENT AND SECURITIES ACT (ISA 2007) ON INSIDER TRADING AGAINST THE BACK DROPS OF THE PROVISIONS OF THE CAMA 1990 AND THE COMMON LAW ON THE DUTIES OF DIRECTORS OF COMPANIES IN PREVENTING INSIDER RELATED OFFENCES AND PROTECTING THE INTEGRITY OF THE SECURITIES MARKET IN NIGERIA PRIOR TO AND IN THE MODERN ERA OF THE INTERNET.† SUBMITTED BY AYODELE DOYINSOLA .O LAW/2007/100 DEPARTMENT OF LAW OBAFEMI AWOLOWO UNIVERSITY ILE-IFE OSUN STATE TO PROFESSOR M.T. OKRORODUDU-FUBARA IN PARTIAL FULFILMENT OF THE COURSE â€Å"LAW OF BUSINESS ASSOCIATION† (BUL 502) Concept of Insider dealing One of the areas of company law in which the general equitable rules seem to be inadequate to protect the†¦show more content†¦For example, a fiduciary relationship exist between two parties, when a party expects the other to act for him in such a manner as he would act in absolute honesty, faithfulness and diligence, not minding the fact that he is acting for someone else. If he cannot steal his personal money, then he cannot steal the money put in his care. Common law provides quite a number of duties of a director to a company, however, only few of them relates with insider dealings. Some of these duties include: The duty to act bonafide in the Company’s interest. A director is expected to act honestly, diligently and faithfully in the best interest of the comp- any. This duty is however relative. What happens to be in the best interest of the company to a director may differ from the shareholders view. In the case of Park v. Daily Times Ltd., the court held that the directors had acted improperly and not bonafide for the company’s interest, when they made redundancy payments to the company’s employees on the cessation of the company’s business. Duty to avoid conflict of Interest. In the performance of his duties, a director must not allow a conflict of interest between him and the company. To be strictly avoided are instances in which a director’s personal interest would conflict with the interest of the company, which he is expected to protect. This was the situation in Industrial Development Consultants Ltd.Show MoreRelatedInsider Dealings in Nigeria2188 Words   |  9 Pagesâ€Å"EXAMINE THE EFFECTIVENESS OF THE PROVISIONS OF THE INVESTMENT AND SECURITIES ACT (ISA 2007) ON INSIDER TRADING AGAINST THE BACK DROPS OF THE PROVISIONS OF THE CAMA 1990 AND THE COMMON LAW ON THE DUTIES OF DIRECTORS OF COMPANIES IN PREVENTING INSIDER RELATED OFFENCES AND PROTECTING THE INTEGRITY OF THE SECURITIES MARKET IN NIGERIA PRIOR TO AND IN THE MODERN ERA OF THE INTERNET.† SUBMITTED BY AYODELE DOYINSOLA .O LAW/2007/100 DEPARTMENT OF LAW OBAFEMI AWOLOWO UNIVERSITY ILE-IFE OSUN STATE TO PROFESSORRead MoreThe Importance of Law (Legal Back Up) to an Individual, Organization and Economy of a Country at Large2170 Words   |  9 Pagesoften said that there is no better test of the excellence of a government than the efficiency of its leaders, hence this programme; Leadership Training and Career Development is relevant in this period of the political dispensation of our country, Nigeria. I am indebted to the Almighty God who has laid it upon your hearts as youths to know the importance of good leadership. One of the major problems and serious hindrances to actualising our potentials as developing countries is bad leadership. ARead MoreA Report On Boko Haram4313 Words   |  18 Pagesextremely radical. He was opposed to the western faith which he described as Haram and the root cause of the troubles in Nigeria. He began teaching youth on the effects that western culture had on them. A number of factors were responsible for the success of Yusuf’s radicalization. At the time, Nigeria was very economically unbalanced wealth wise. This is the same case now. Nigeria is home to almost two hundred million people. According to a census, more than sixty percent of this number lives belowRead MoreMaalaysian Automobile Exports of Spare Parts to Nigeria4950 Words   |  20 PagesResearch Methodology And Design 18 5.1 Concept 18 5.2 Research Types. 19 5.3 Research Design: 19 5.4 Data Gathering Method 20 6.0 Ethical Consideration 20 7.0 REFERENCES 21 TOPIC: A study on Malaysian automobile export of spare parts to Nigeria. 1.0 COMPANY OVERVIEW: Proton The Malaysians considered the automotive industry as one amongst the most important and strategic industries when talking about the manufacturing or industrial sector. The automotive industry in the country alone isRead MoreDifferent Approaches to Corporate Reporting Regulation22097 Words   |  89 Pagescountries with a stronger reliance on external ï ¬ nance and arm’s length transactions tend to have stronger reporting regulation (both in terms of rules and enforcement) in securities, investor protection and self-dealing laws than countries with a stronger reliance on relationships and insider governance. Consistent with prior work, I also demonstrate that reporting practices in countries with stronger regulation and enforcement tend to be more transparent based on widely used transparency (or opacity)Read MoreFraud as a Negative Catalyst in the Nigerian Banking Industry5170 Words   |  21 PagesEmerging Trends in Economics and Management Sciences (JETEMS) 2(5):357-363 (ISSN:2141-7024) Fraud as a Negative Catalyst in the Nigerian Banking Industry Akindele R.I Department of Management and accounting Obafemi Awolowo University, Ile Ife, Nigeria ___________________________________________________________________________ Abstract Fraud in the Nigerian Banking Industry before the recent merger and acquisition and recapitalisation efforts was at alarming rate. It has caused many banks to collapseRead MoreFemale Genital Circumcision Female genital circumcision (FGC) is a cultural ritual that is2800 Words   |  12 Pagessafer environment for the ritual to be performed in. The goal of this essay is to know what Female Genital Circumcision is and different types of FGC and why this is performed and why it is important for outsiders to not have ethnocentric views when dealing with this. This essay also deals with why it should be medicalized instead of enforcing laws to ban this years long tradition in all African countries. When challenging female genital circumcision, we are also challenging the people who perform thisRead MoreThe Accounting Profession and Nat39077 Words   |  157 Pagescorrespondence, enquiries, contributions and research notes should be submitted to: The Editor, The Journal of Accounting, C/o Nigerian College of Accountancy, Plot 42T Bauchi Ring Road, Dogon Dutse, P. M. B. 2734, Jos, Plateau State, Nigeria. Subscription Rates: Nigeria Outside Nigeria - N1000 (Exclusive of postage) N1000 $10 (Exclusive of postage) Prof. Edet R. Iwok Editor-in-Chief iv EDITORIAL Like any other profession, Accounting is not static. It constantly responds to the dynamism ofRead MoreAbolition of Universal Banking in Nigeria - Implication for Nigerian Banks10849 Words   |  44 Pagesdomesticating the proposal and making further amendment in line with the peculiarities of their country’s financial system. In apparent response to the developments in global financial community especially the new Basel III, the Central Bank of Nigeria in a Circular No. BSD/DIR/GEN/UBM/03/025 dated September 7, 2010 gave hint to abolishing the operation of the 10-year old universal banking concept. Some of the reasons proffered by the regulatory body for the abolition include the enhancement ofRead MoreFeatures of Decision Making in a Political System2405 Words   |  10 Pagespolitical system might not be as significant in another (Lowery, Poppelaars and Berkhout 2008). Ljiphart (1999) has identified two basic types of decision making in political systems – Majoritarian; examples are the United States of America (US), Nigeria, Sweden, France, etcetera and Consensual; examples are European Union (EU), Belgium, Netherlands and Germany. This essay seeks to focus on how PA can be influenced by the different features in political systems by comparing these institutions using

Wednesday, May 6, 2020

America through the Decades Free Essays

Throughout the history of the United States, there have been important decades that have impacted in different way in the life of American. There are some decades which have greatly changed the life of Americans in a positive way while other decades have had a negative impact in the life of America. In many cases, there are important events that will take place in some years that will have a great impacted in the later life of a nation. We will write a custom essay sample on America through the Decades or any similar topic only for you Order Now One of the most important decades in the history of the United States was the decade between 1940 and 1950s. This decade was defined the entry of the united states into the Second World War and  Ã‚   the consequent formation of the United Nations. Some historians have argued that this decade prepared the United States to play the superpower role that it has assumed in the world. The 1940-1950 decade had a great impacted in defining the American military power that propelled it to a superpower status in the world. This paper will look into some of the most important event that happened in the history of the United States in the 1940-1950 decade. The paper will trace the eventual entry of the United States into the war after the Pearl Harbor attack by Japan and the consequent defeat of Japan and surrender of Germany. The paper will also look into the role that the United States played in the eventual formation of the United Nations that has become an important world body in arbitration of conflicts. 1940-1950 decade The 1940-1950 decade was one of the most trying decades in the 20th century. The decade came immediately after the American economy was recovering from the Great Depression after the New Deal had been reached which greatly changed the economic situation of the country. In this decade the population of the United States stood at 132,122, 000 and at the beginning of the decade, the rate of unemployment stood at 8,120,000. Due to the effect of the Great depression and the cost of the First World War, the national debt stood at $43 billion. Life expectancy stood at 68.2 for females and 60.8 for males.   This was also the decade which saw the Supreme Court make a ruling that blacks have a right to vote which marked the end of the oppressive Jim Crow laws. This decade also saw the end of the Second World War and the rise of the Soviet Union and the United states as the two superpowers in the world which also marked the beginning of the cold war. To the United States, this decade was particular important since it marked the transformation of united states from international alienation to a major player in the global affairs and a major interventionist in global conflicts.   Let us look in the details of the events that shaped the decade. (Threeworldwars, 2008) The 1940s were defined the event surrounding the World War II.   Since American entry into the first world, it had ended its decades of isolation from major global affairs. The First World War has taught America that the world was becoming more integrated and what happened to its world was also likely to happen to her. The First World War had seen American wake up from her status which had bee outlined in the Monroe Document which upheld the principle of non interference in European affairs.   While the First World War was immediately followed by the Great Depression, the 1940s ushered in a new decade past the Great depression but new challenges of the Second World War was another challenge that the country had to go through (Lone star college, 1999). The decade ushered in with the Japanese attack of the Pearl Harbor on December 7 1941. There had been rumors that Japan was planning to attack Pearl Harbor in reiteration for the United States imposition on the country. However American forces did not expect the attack to happen and when it happened, it caught most of them by surprise.   The Japanese planes attacked naval base at Pearl Harbor in Hawaii killing more than 2,300 American and destroying the USS Arizona and USS Oklahoma capsized.  Ã‚   The attack also sank three more ships and 180 aircraft were destroyed. (Herbert, 2004) This attack was a real surprise to the United States government ant it came at a time when the country was involved in a dilemma whether to go to the war or not. Church Hill had made several attempts to influence US President Franklin Roosevelt to join Britain into the war but there was resistance from the congress and the from the US public. The country was busy in reconstructing its economy after the devastating Great Depression.   However the Pearl Harbor attack was the event that made it clear that American had to go to the way regardless of the neutrality status that many had been calling for. How to cite America through the Decades, Papers

Sunday, May 3, 2020

Management in Non Government Organisation †MyAssignmenthelp.com

Question: Discuss about the Management in Non Government Organisation. Answer: Introduction Suaahara is a 5 year old and a community-focused project initiated for the purpose of improving the nutritional status and the health of the children under the age of two years, lactating women and pregnant women. The aim is to address those vulnerable points of the economic development that may result in chronic under-nutrition. There are few focus points of the project that comprises of improvement in the home-based gardening, hygiene and sanitation, water, family planning services, child health (MNCH)services, reproductive planning services, newborn, maternal and nutrition. The Suaahara project have an association and woks within the FCHVs i.e. Female Community Health Volunteers, government system and community extension workers (USAID, 2014). There is distribution of commodities, services and health messages through the discussion forums of mother group and at the household level. There are several initiatives which will be a part of the project working as non-government organisa tion in the future to overcome the issues of nutritional and health status of the children and women. The paper will offer an understanding of the various key aspects of the NGO comprising of the financing, resourcing and structuring afctors (USAID/NEPAL, 2016). The key emphasis will be led upon the practices of the organisation in order to gain more professionalism, transparency, efficiency and accountability in its workings system. the paper will also present the strategies with the help of which the NGO is successful in acquiring efficient funding and managing the internal as well as the external pressure and contradiction in an efficient manner. NGO: Structuring, Resourcing and Financing There are considerable contributions made by USAID to nutrition and health in association with the GON i.e. Government of Nepal and with many other development partners. For strengthening the nutrition and health programs of the nation and as a part of its strategy, USAID with association and in consultation with MOH i.e. the Ministry Of Health and Population as well as with partnership with other associated designed and initiated Suaahara (Good Nutrition), an integrated nutrition project. The project is managed through Save the Children and the key implementing partners of Suaahara includes Jhpiego, Nepal Water for Health (NEWAH), Helen Keller International (HKI), Nepali Technical Assistance Group (NTAG), Nutrition Promotion and Consultancy Service (NPCS) and Johns Hopkins Center for Communication Programs (CCP) (Usaid, 2017). In present time there is there are high initiatives taken by the NGOs for boosting their progress and development that comprises of working for getting more f unding as well as also improving the managerial professionalism. There is an extreme competition between various NGOs in order to attain more amount of funding. Suaahara also take number of initiatives for acquiring funds such as the donors can get tax exemption for the amount they have donated to the NGO or for the charity purpose. It encourages the people to give more funds for the improvement of the nutrition and health of the children and the women. To maintain its place in the competitive market of NGOs, the Suaahara works on four different levels to have higher recognition and visibility (k4health, 2015). These four levels comprises of community that support the communities in adopting practices of child nutrition, maternal nutrition, improvement in the feeding and health practices and optimal care. The second level is district level where Suaahara works for improving the district capacity by having more local developments, agricultural and health developments and physical pla nning. The third level is regional level where Suaahara works in association with government for achieving improved nutrition and strengthening systems, agriculture and health systems. The fourth level is national where Suaahara works for supporting national strategies and policies and promoting the enhanced investments in nutrition and all these work took place in association with the Government (Bela, 2015). Because of high presence on all these levels, there is strong visibility and recognition gained by Suaahara and this helps in attaining strong and high funds. To maintain its place and to grow there are several other initiatives also which are taken by Suaahara such as go mobile, where the donors are not required to visit the website for giving donation, they can offer funds with the help of mobile applications. there are also initiatives of having a jump on the bandwagon where Suaahara increase its presence on social platforms by discussing the social issues and causes on whi ch the Suaahara is working upon.by getting the masses engaged with the causes and significance of donations, there can be attained more competitive advantages in forms of higher funding. For continuing with its work, Suaahara also perform number of initiatives such as there are continuously increased partnerships with institutes as well as with government bodies. The greater the support and association with the government, the better are the chances of future development of the NGOs. As well as the organisation also expand its reach such as covering more number of regions and communities so that more number of individuals can be benefitted from the improvement programs (k4health, 2017). There are extreme pressures faced by Suaahara from the outside or the external factors for being excessive professional, accountable, transparent and efficient in its working. Being working as NGO for the development and improvement of the masses, there are several factors on which these projects and organisations are weighed (Malapit, et al., 2013). To respond efficiently to all these outside pressures, there are number of steps and initiatives taken up by Suaahara such as for increasing the transparency and become one of the most transparent projects working for the social cause, there is an annual report that is published every year that contains all the relevant data and the complete information regarding the funding, expenditures as well as the developments taken place at various community, district, national and international levels. Publishing the entire set of information in the annual reports offers disclosure of all the necessary details in front of the masses and on the ba sis of which there is complete evaluation of the work of the organisation (Webb, et al., n.d.). Thus, it helps Suaahara to achieve improved level of transparency in all its operations and charitable functions. To be called professionally more sound and to sustain the outside pressure for increased professionalism, Suaahara remain professional and extremely formal in taking donations and funding as there are not the donation boxes anywhere or the volunteers does to force individual to donate for the cause. Rather there are appropriate ways of funding and taking donations such as RFA-367-15-000001: USAID/NEPAL NOTICE OF FUNDING OPPORTUNITY FOR SUAAHARA II PROJECT (Usaid, 2015). It is a grants notice through which the donations can be made by institutes, people and other entities. Thus, maintain professionalism in all their workings system so that more number of people can support the cause. For sustaining the outside pressure for remaining highly accountable, Suaahara have an effectiv e check and control of all its activities. There is a complete evaluation of the outcomes or the results of the funds invested on any kind of development. And if there are deviations than the execution processes are checked twice to analyze the point of difference and gaps. The organisation always remained account table for all its activities and projects undertook by providing complete information about the initiatives performed and outcomes achieved. Suaahara offers a complete justification of all its work to the masses and the Government authorities within which the project is taking place. For remaining efficient, there are several steps taken by the organisation to uplift the society and improves the nutrition and health of the children and the women (k4health, 2015). To work upon efficiency, Suaahara always try to improve the outcomes from some of the margin on the last received results. The efficiency level of the organisation can also be checked by comparing the previous yea r data and current year data and analyzing the increase in the level of improvements and developments in the nutritional and improved health level of the children and the women. This will provide a clear view of the efficiency of the working of the organisation. Thus, it can be stated that there are sound steps taken by Suaahara for competing with the other NGOs as well as by improving its level of accountability, efficiency, transparency and professionalism and this offers a number of advantages to the organisation including strong and viable support from the Government (Kc, et al., 2011). There are extreme pressures faced by Suaahara from within or the internal factors for being effective, having good association and coordination with support base, relevant and successful in gaining adequate funding. Being working as NGO for the development and improvement of the masses, there are several internal factors on which the success and potential of these projects are weighed. To respond efficiently to all these within or the internal pressures, there are number of steps and initiatives taken up by Suaahara such as for being effective in all the activities and development functions, the progress is checked that whether with the various initiatives there is improvement in the nutritional and health of the women or not (Cunningham, et al., 2015). There are discussions with the women on their lives before and after the support offered to the by Suaahara initiative. Secondly to respond to the internal pressure of being in touch with the supporter base, the organisation holds reg ular meetings and conferences to have discussions with the supporters so that adequate information can be shared on a regular basis. There is complete data in forms of reports, minutes which are shared with them so that there can be gained more support from them and a proper information can be passed about the developments and initiatives taken for the cause (Webb, et al., n.d.). All such meetings are the way to have higher engagement with the supporters so that they can sense the project is on its actual path and working hard to accomplish the desired goals. to sustain the pressure of being relevant, there are first taken consent from the various supporters, authorities and the relevant members before indulging in any kind of improvement activity or program for the cause. This helps Suaahara to remain highly relevant as once the consent has been received on the upcoming social work performed for the accomplishment of the mission and goals of Suaahara, there is attained high level o f relevancy (Cunningham, et al., 2017). One of the extreme pressures on the NGOs is to acquire maximum funding and grants as it is the core need of any project, organisation or charitable trust to get increased funds for remaining active and achieve long-term sustainability. Thus, to sustain the internal pressure of acquiring funds, Suaahara take number of initiatives such as to attract funding, there is increased promotions and campaigns so that the masses can be attracted and have their engagement in the uplift of the cause by the means of donations and charities (Baker, 2014). The volunteers visit several places, perform campaigning, organize events and encourage the masses to participate in all such events and campaigns so that they can be aware of the key objectives and aims of the project. There is also sent development reports to the government so that they can also lend their support to the development and success of the project. Thus, to overcome and respond all such pressu res imposed from the internal factors, Suaahara take all such initiatives and try to maintain improved association with supporters and have high funding so that the functions do not suffer halt or any kind of pause (Magnani, Gevorgyan and Kurz, 2012). There are number of times when the NGOs have to face or experience pressures both from within as well as from the outside factors and as a result there can be developed number of contradictions which negatively impact the activities, functions and operations of the organisation. These are those situations because of which the projects can experience a halt or have squat growth results. Suaahara also have both the internal as well as external pressures which sometimes contradict and create contradictions (Kenda, et al., 2013). To respond and manage the contradictions there are initiatives and steps taken by the organisations such as there is an external pressure of being highly transparent and have all the functions and activities with high transparency level but at the same time there is an internal pressure to remain competitive and have unique initiatives for acquiring more funding. In such a case, the contradictions take place as for achieving more funds; the organisation has to t ake help of certain strategies and plans which cannot be openly shared because of the market condition of the intense competition in NGOs for achieving grants and funds. Thus, these both pressures pose an extreme burden to Suaahara (Sethi, et al., 2017). Thus, to handle such situations, the organisation works in a mutual way where the amount of donations are transparent but the various other initiatives and activities for which the funds are gathered are not been revealed to the masses and thus, it helps Suaahara in both maintaining transparency as well as remaining competitive. There are also occurrences of contradictory situation when there is an internal pressure of acquiring huge funds, grants and charities and on the similar time there is an external pressure of remaining professional. There are number of times when for acquiring funds there is need to have personal association with the donors and also make them aware of various campaigns, events and encourage them to give dona tions by several means which are sometimes not cover under professionalism (Powelson, et al., n.d.). To manage such contradictions, the NGOs take steps such as the emails, invitations or there is encouragement of the donors which are those individuals or institutes that have an association with the NGO and have already donated in past for the purpose. Thus, by emphasizing those to provide funding will not be an unprofessionalism as they are already associated partners rather than appealing to new set of people, institutes, groups or government bodies. There are various other ways also for managing the various other contradictions such as developing a strong balance between both the factors and the pressures imposed by them so that they do not get contradict with each other. There is a need that the NGOs must work in such a manner that the stakeholders as well as the community or the masses both have a trust on them and support their work and functions. If both the parties will be be nefitted then there are very less chances of occurrence of such contradictions (Profile, 2011). Conclusion There are several practical issues in the management of the NGOs that includes a number of factors such as financing of the contemporary NGOs, human resource mobilization, funding, accountability, governance and internal organisational structures. From this paper, it can be concluded that in such an environment, there is an extreme need to maintain a place and have continuity in working, and for this Suaahara take several initiatives so that it can have increased level of funding. This has been analyzed that there are various efficient ways by which there is acquiring of funds and grants for the project and Suaahara is working efficiently to achieve more funding. It has also been analyzed and identified that there are number of factors that poses internal pressure on the NGOs that comprises of being effective, relevant, in touch with its supporter base, and successful in attracting adequate funding and to manage these pressures the NGOs take potential measures so that they can overco me these pressures such as having increased engagement and discussions with supporters and framing strategies to have more funding. The study also concludes that there are external pressures as well as subject to professionalism, transparency, accountability and efficiency. And to manage and respond to these external pressures, Suaahara as well as other NGOs are required to have a higher flow of information in forms of reports and articles. This will help the NGOs in developing a better engagement with the masses and also sound efficient, transparent and accountable. And lastly it can be stated that there is a n extreme need to manage the contradictions between the internal and the external pressures for smooth functioning of the NGOs and have better results and improvements in the societies. References Baker, R., 2014. Government Efforts and Personal Opinion Explain the Medicalization of Pregnancy and Childbirth Through Time in Lower Mustang, Nepal. Bela, 2015. USAID Call for Suaahara II to improve nutritional status of women and children in Nepal. Accessed on: 3rd October, 2017. Accessed from: https://www.fundsforngos.org/usaid/usaid-call-for-suaahara-ii-to-improve-nutritional-status-of-women-and-children-in-nepal/ Cunningham, K., Headey, D., Singh, A., Karmacharya, C. and Rana, P.P., 2017. Maternal and child nutrition in Nepal: examining drivers of progress from the mid-1990s to 2010s.Global Food Security. Cunningham, K., Ploubidis, G.B., Menon, P., Ruel, M., Kadiyala, S., Uauy, R. and Ferguson, E., 2015. Womens empowerment in agriculture and child nutritional status in rural Nepal.Public health nutrition,18(17), pp.3134-3145. Cunningham, K., Singh, A., Pandey Rana, P., Brye, L., Alayon, S., Lapping, K., Gautam, B., Underwood, C. and Klemm, R.D., 2017. Suaahara in Nepal: An at?scale, multi?sectoral nutrition program influences knowledge and practices while enhancing equity.Maternal child nutrition. k4health, 2015. Suaahara Nutrition Project in Nepal. Accessed on: 3rd October, 2017. Accessed from: https://www.k4health.org/toolkits/suaahara-nutrition-project k4health, 2017. Suaahara Brochure. Accessed on: 3rd October, 2017. Accessed from: https://www.k4health.org/sites/default/files/suaahara_brochure_final.pdf Kc, N.P., Kc, A., Sharma, N., Malla, H., Thapa, N., Aryal, K., Vitrakoti, R. and Bhandari, R.M., 2011. Community participation and mobilization in community-based maternal, newborn and child health programmes in Nepal.Journal of Nepal Health Research Council. Kenda, C., Malapit, H.J.L., Parul, T., Suneetha, K. and Agnes, Q., 2013. Women s empowerment in agriculture, production diversity, and nutrition: Evidence from Nepal.IFPRI discussion papers. Magnani, R., Gevorgyan, A. and Kurz, K., 2012. Market analysis of complementary foods in Nepal.Global Nutrition CRSP Research Briefing Paper,12. Malapit, H.J., Kadiyala, S., Quisumbing, A.R., Cunningham, K. and Tyagi, P., 2013. Women's Empowerment in Agriculture, Production Diversity, and Nutrition: Evidence from Nepal. Powelson, J., Bharati, R., Paudyal, B.R., Gautam, B.P., Thapa, R.K., Brye, L. and Banjara, R., Gender Equity and Social Inclusion Factors Impacting Women to Adopt Improved Health and Nutrition Behaviors in Nepal. InConference Agenda Editor and Committee(p. 35). Profile, C., 2011. Jhpiego in Nepal.provider,2, p.19. Sethi, V., Bhanot, A., Bhalla, S., Bhattacharjee, S., Daniel, A., Sharma, D.M., Gope, R. and Mebrahtu, S., 2017. Partnering with women collectives for delivering essential womens nutrition interventions in tribal areas of eastern India: a scoping study.Journal of Health, Population and Nutrition,36(1), p.20. USAID, 2014. SUAAHARA, AID-367-A-11-00004 Annual Report, August 1, 2013 July 31, 2014 Submitted to USAID/Nepal by Save the Children. Pp.61. Accessed on: 3rd October, 2017. Accessed from: https://pdf.usaid.gov/pdf_docs/PA00KC2M.pdf Usaid, 2015. RFA-367-15-000001: USAID/NEPAL NOTICE OF FUNDING OPPORTUNITY FOR SUAAHARA II PROJECT. Accessed on: 3rd October, 2017. Accessed from: https://www.usaid.gov/documents/1861/rfa-367-15-000001-usaidnepal-notice-funding-opportunity-suaahara-ii-project Usaid, 2017. SUAAHARA PROJECT GOOD NUTRITION. Accessed on: 3rd October, 2017. Accessed from: https://www.usaid.gov/nepal/fact-sheets/suaahara-project-good-nutrition USAID/NEPAL, 2016. SUAAHARA-GOOD NUTRITION (INTEGRATED NUTRITION PROGRAM) Program Description. Pp.27. Accessed on: 3rd October, 2017. Accessed from: https://www.k4health.org/sites/default/files/Suaahara_Program_Description.pdf Webb, P., Ghosh, S., Sapkota, D., Davis, D., Kennedy, E., Gurung, S. and Baral, K., Governance of Nutrition Policies and Programming: Preliminary findings from PoSHAN process research in Nepal. Webb, P., Ghosh, S., Sapkota, D., Gurung, S., Davis, D., Baral, K. and Rana, P.P., Perceptions and Practices Relating to Nutrition Among Decision-Makers at Suaahara sites of Nepal.

Thursday, March 26, 2020

The Devil and Tom Walker Summary and Study Guide

'The Devil and Tom Walker' Summary and Study Guide Washington Irving, one of early Americas greatest storytellers, was the author of such beloved works as Rip van Winkle (1819) and The Legend of Sleepy Hollow (1820). Another of his short stories, The Devil and Tom Walker, is not as well known, but it is definitely worth seeking out. The Devil and Tom Walker was first published in 1824 among a collection of short stories called Tales of a Traveller, which Irving wrote as Geoffrey Crayon, one of his pseudonyms.  The Devil and Tom Walker appropriately appeared in a section called Money-Diggers, as the tale chronicles the selfish choices of an exceptionally stingy and greedy man. Historical Context Irvings piece is a relatively early entry into the many literary works considered Faustian tales - stories depicting greed, a thirst for instant gratification, and, ultimately, a deal with the devil as the means to such selfish ends. The legend of  Faust  dates to 16th-century Germany, with Christopher Marlowe dramatizing the legend in his play The Tragical History of Doctor Faustus, first performed sometime around 1588.  Faustian tales have been a hallmark of Western culture ever since, the major theme of plays, poems,  operas, classical music, and even film and television productions. It is perhaps unsurprising that, given its dark subject, The Devil and Tom Walker sparked a fair amount of controversy, particularly among the religious population. Still, many consider it one of Irvings finest stories and an exemplary piece of narrative writing. In fact, Irvings piece triggered a rebirth of sorts for the Faustian tale. It is widely reported to have inspired  Stephen Vincent Benets The Devil and Daniel Webster, which appeared in The Saturday Evening Post in 1936 - more than a century after Irvings story came out. Plot Summary The book opens with the tale of how  Captain Kidd, a pirate, buried some treasure in a swamp just outside Boston. It then jumps to the year 1727, when New Englander Tom Walker happened to find himself walking through this swamp. Walker, explains the narrator, was just the kind of man to jump at the prospect of a buried treasure, as he, along with his wife, were selfish to the point of destruction. While walking through the swamp,  Walker comes upon the devil, a great black man carrying an ax, whom Irving calls Old Scratch. The devil in disguise  tells Walker about the treasure, saying that he controls it but will give it to Tom for a price. Walker agrees readily, without really considering what he is expected to pay in return - his soul. The rest of the tale follows the twists and turns one might expect as a result of greed-driven decisions and deal-making with the devil. Main Characters Tom Walker, the protagonist of the story,  is described as a meager miserly fellow and is probably Irvings most despised (or least likable) character. Despite his many unsavory characteristics, he is also memorable.  Initially, Walker rejects Old Scratchs offer, but he eventually gives in to the devils conditions. Walker has been compared to Faust/Faustus, a character who has appeared in countless works through literary history, from Marlowe, Goethe, and beyond. Walkers wife is such a minor character that her name is never given, but she can be likened to her husband in her miserly nature and volatile temper, as Irving describes: Toms wife was a tall termagant, fierce of temper, loud of tongue, and strong of arm. Her voice was often heard in wordy warfare with her husband, and his face sometimes showed signs that their conflicts were not confined to words. Old Scratch  is another name for the devil. Old Scratch is described as a dark-skinned man. Washington Irving wrote, It is true, he was dressed in a rude, half Indian garb, and had a red belt or sash swathed round his body, but his face was neither black nor copper color, but swarthy and dingy and begrimed with soot, as if he had been accustomed to toil among fires and forges. The actions of Old Scratch are similar to other tales where he is the tempter, who offers the protagonist riches or other gains in exchange for the characters soul. Major Events and Setting The Devil and Tom Walker may be a short story but quite a bit takes place in its few pages. The events - and the locations where they take place - really drive the overarching theme of the story: avarice and its consequences. The events of the story can be divided into two locations: Old Indian Fort Tom Walker meets Old Scratch: Tom takes a shortcut through tangled, dark, and dingy swamplands, which are so dark and uninviting that they represent hell in the story. Tom meets the devil, Old Scratch, at an abandoned Indian fort hidden away in the swamplands.Old Scratch offers Tom Walker great sums of money in exchange for certain conditions. The conditions are, of course, that Walker gives his soul in his deal with the devil.The devil offers Tom riches hidden by Captain  Kidd if Tom agrees to sell his soul to Old Scratch. Tom agrees.Toms wife confronts Old Scratch. She goes into the swamplands, twice, hoping that Old Scratch would make a deal with her instead of her husband. Toms wife absconds with all of the couples valuables for the second meeting, but she disappears into the swamplands and is never heard from again. Boston Bolstered by the ill-gotten riches offered by Old Scratch, Walker opens a brokers office in Boston. Walker lends money freely, but he is merciless in his dealings and ruins the lives of many borrowers, often repossessing their property.A ruined speculator asks for a debt he owes to Tom to be forgiven. Walker refuses, but the devil rides in on a horse, easily sweeps Tom up, and gallops away - and Tom is never seen again. After that, all the deeds and notes in Walkers safe turn to ash, and his house mysteriously burns down. Key Quotes The legend of a man who sold his soul to the devil and its devious consequences has been retold many times, but Irvings original words truly reveal the story. Setting the scene: About the year 1727, just at the time when earthquakes were prevalent in New England and shook many tall sinners down upon their knees, there lived near this place a meager miserly fellow of the name of Tom Walker. Describing the protagonist: Tom was a hard-minded fellow, not easily daunted, and he had lived so long with a termagant wife, that he did not even fear the devil. Describing the protagonist and his wife: ...they were so miserly that they even conspired to cheat each other. Whatever the woman could lay hands on she hid away: a hen could not cackle but she was on the alert to secure the new-laid egg. Her husband was continually prying about to detect her secret hoards, and many and fierce were the conflicts that took place about what ought to have been common property. Laying out the potential moral consequences of greed: As Tom waxed old, however, he grew thoughtful. Having secured the good things of this world, he began to feel anxious about those of the next. The communitys state of mind regarding the death of Walker and his wife: The good people of Boston shook their heads and shrugged their shoulders, but had been so much accustomed to witches and goblins and tricks of the devil in all kinds of shapes from the first settlement of the colony, that they were not so much horror struck as might have been expected. Study Guide Questions Once students have had a chance to read this classic tale, test their knowledge with these study questions: What is important about the title? Had you ever heard the phrase before reading the story?  What are the conflicts in The Devil and Tom Walker? What types of conflict (physical, moral, intellectual, or emotional) do you see?Does Irving reveal character in  The Devil and Tom Walker?  Who was Faust (in literary history)? How could Tom Walker be said to have made a Faustian bargain?How does greed factor into this story? Do you think the Walker familys financial situation plays a factor in their choices?  Ã‚  What are some themes in the story? How do they relate to the plot and characters?  Compare and contrast Tom Walker with Scrooge in A Christmas Carol, by  Charles Dickens  Is Tom Walker consistent in his actions? Is he a fully developed character? How? Why?  Do you find the characters likable? Are the characters persons you would want to meet?  Discuss some of the symbols in The Devil and Tom Walker.  How are women portrayed in this story? Is the portrayal positiv e or negative?  Ã‚  Does the story end the way you expected? How? Why? How did you feel about the ending? Was it fair? Why or why not?   What is the central or primary purpose of the story? Is the purpose important or meaningful?  How essential is the setting to the story? Could the story have taken place anywhere else?  What supernatural or surprising events are employed by  Washington Irving? Are these happenings believable?  How do you think Irvings Christian  beliefs impacted his writing?  Ã‚  What would you trade your soul for?  Do you think Tom and his wife made the right choice?

Friday, March 6, 2020

The Best Free Email Marketing Software Tools You Should Use

The Best Free Email Marketing Software Tools You Should Use Free doesn’t have to mean crap. Not even when it comes to email marketing software. Sure, your email list is valuable. 4,000% ROI-level valuable. But, that doesn’t mean every tool you use to execute an email strategy needs to be expensive. In fact, there are tons of free options out there, and they don’t even entail accepting compromises just to get work done. In this post, we’ll round up the best free email tools you should consider using. Then, we’ll show you how to build an entire workflow using free resources. Whether you’re operating on a shoestring budget, or just need a gadget or two to tackle certain tasks, you’re sure to find something you can use.The Best Free Email Marketing Software Tools You Should Use via @Introducing the Email Subject Line Tester You get one chance to write the perfect subject line for your email. Of course, there’s no way to be sure how it’ll perform until you hit â€Å"send.† But, wouldn’t be great if you could tilt the odds in your favor? That’s where our  Email Subject Line Tester  comes in. It's the best way to: Optimize subject lines: Understand which elements to adjust for best performance. Do better subject line A/B tests: Test multiple options, choose your best scores, and repeat. Improve open rates: 33% of recipients open emails based on the subject line. Test yours to make sure you're getting as many opens as possible. Give it a spin now and start optimizing every subject line you write (before sending it to your list). Try the new Email Subject Line Tester from @All 28 Email Marketing Tools This Post Will Cover You might just want a roundup of all the tools mentioned here. In that case, browse through this list and pick out what you need. Free Email Planning and Research Tools Before you get started creating email content, you have some legwork to do. Here are a few resources to help you plan. Free Email Marketing Calendar Template: We’ve included one in this post to help plan all your send dates. Feedly: One of the best RSS reader apps out there. Follow sources in your industry and surface the best content to share with your audience. Scope: Curious to know how a cool-looking email was coded? Use Scope to dissect it and see what you can learn. Try these free email planning and research tools Free Email Writing Tools Writing email copy isn’t easy. Neither is dealing with shame after sending an email with a spelling error. Tips the odds for success in your favor with a couple free editing tools. Grammarly: There’s nothing worse than sending an email to your entire list with a typo. Use Grammarly to catch them before you hit publish. Hemingway: Is your email copy clear and conversational? Use Hemingway to analyze your writing and make sure it’s easy to read. Write flawless emails with these free editing tools Free Email Design Tools Most email service providers make it easy to create designed emails using WYSIWYG editors and templates. If you prefer to hard code your own emails, though, there are free tools out there to help. BEE Free Responsive Email Builder: This responsive email builder lets you design email newsletters, and then deliver them with whichever service you prefer. Free HTML email template roundup from Colorlib: If you need HTML email templates, you’ll likely find several useful options amongst this enormous roundup. HTML to Text Email Converter: Plain text emails  might not look as attractive as designed emails, but they serve plenty of purposes (they’re easier to read, quicker to load, for starters). Use this tool to convert designed emails into plain text, if you plan to send two versions. Free Formatter: Building emails with HTML? Use this tool to cleanly format your code. Da Button Factory: Use this to build CTA buttons for your HTML emails. PicResize: If you have images in your email, and don’t want to fire up Photoshop to resize them, use PicResize to get the job done quickly. Here's how to design great marketing emails without breaking the bank Free Landing Page Building Tools Each of these tools are meant to do one thing: create conversion-optimized landing pages to direct traffic toward from your emails. MailChimp Landing Page Builder Ucraft Landing Page Builder Vertical Response Landing Page Builder OntraPages Landing Page Builder Xtensio Landing Page Creator Send your email traffic to well-designed landing pages with these free tools Free Email Testing Tools Once you hit Send on an email, it’s gone. Outta there. Not coming back, no matter how bad you need to fix something. Get it right before you deliver with these free resources. Mail Tester: Make sure your email isn’t likely to trip spam filters before you send it. Email Deliverability Test: Ensure your email has a high probability of landing in your recipient’s inbox. Email Subject Line Tester: Optimize subject lines before you send to maximize opens and clicks. This one was built by , and its available as a web-based landing page, or within the platform itself. A/B Split Test Calculator: Use this calculator to determine the statistical relevance of your A/B test results. A/B Split Test Duration Calculator: How long should your A/B tests run for? Here’s one way to find out. Email Rendering Preview: If you’re building HTML emails, it’s always good to know how they will appear in people’s inboxes. This tool lets you take a sneak peek. PutsMail: Test your subject line and body content appearance before sending your email. Test every email before hitting Send with these free tools Free Email Service Providers and Delivery Tools Getting emails built and sent is much easier with an email service provider. Here, we’ll recommend a couple, plus one additional tool for easily automating email promotions from RSS. MailChimp: Free for up to 2,000 subscribers and 12,000 emails per month. Integrates with to plan and schedule emails on your marketing calendar. SendInBlue: Free for 300 emails per day. ChimpFeedr: Create RSS-based email subscription feeds effortlessly. Get started with email marketing using these free email service providers Free Email Measurement and Analytics Tools Most ESPs include built-in analytics, but there are a couple tools we recommend using for building tracking URLs. Google Analytics Campaign URL Builder: Use this to create trackable URLs to use in your email content. Google Analytics: Measure referral traffic and conversions from your emails. Measure the performance of your marketing emails with these free tools Plugging Free Tools Into Your Email Marketing Workflow So, now you have a giant list of free tools. Now, how to actually use any of them? Let’s walk through where they fit in your workflow. Step 1: Planning Your Email Newsletter The first step is figuring out what your email will include. Are you putting together: A sales email. Something informational. A product update. Once you have that down, Then, if your newsletter will be rounding up curated content, check out your feeds in Feedly to find relevant content to share: Finally, plan your send date on the email calendar template we’ve included in this post: Using this template, you can map out the following for each email send: Send date Email creator/owner Email type (promo, newsletter, etc) Target Persona Email List (name of list segment that should receive it) Supporting details on each piece of content included in your email And more. In short, using a calendar is an easy way to keep every email send organized. Or, if you’re a paid customer, in (you can snag a free 14-day trial here): Do This In : Using the MailChimp integration, you can automate marketing email newsletter delivery on your marketing calendar. This helps you see every delivery date alongside the rest of your marketing campaigns, content, and projects. Step 2: Writing Your Email Content Next, fire up a word processor and start crafting your next masterpiece. To make sure it’s readable, scan your content in Hemingway. Then, run it through Grammarly to help catch any typos you may have missed: After that, try ’s Email Subject Line Tester and write several email subject line options you think might work. First, enter your subject line: Then, review your analysis. It’ll start by letting you know if you’re using words that either increase or decrease opens (and includes links to word banks showing you which words to consider adding, or avoiding): You’ll also get recommendations on which style case to use: Then, you’ll see suggestions for word count, number usage, and emojis: Finally, you’ll get an illustrated preview of how your subject line might appear to a reader: Try writing several subject line options until you narrow it down to two that you’ll A/B test. Recommended Reading: Everything You Need to Know About Writing Awesome Email Subject Lines Step 3: Designing Your Email Hand-coding marketing emails is not for the faint of heart. It’s also not necessarily essential, with ESPs offering much of the functionality most marketers might need to develop emails. But, there are benefits to designing emails yourself. You get total control over how your email designs look, and it makes sure your emails are unique and more difficult to duplicate. Using the free tools in this post, you can either create emails totally from scratch (which, realistically, you would probably have a developer take on this task), or use freely available templates and tools to create your own, separate from the templates available in your ESP. Note: If you’re using an email service provider like MailChimp, Campaign Monitor, or another similar service, skip this section. First, you might want to snag some inspiration from another email you’ve seen. Try using Scope, a free tool from Litmus, to see how it was built. All you need to do is visit the site, and click and drag the bookmarklet to your browser toolbar: Next, pull open an email you want to examine in Gmail, and click Scope It in your toolbar: The next step is to click the arrow pointers in the middle right to see the source code, or use the Code/Design toggle switch on the upper right: If you choose to go this route, fire up BeeFree.io and select one of the available templates: Or, select Start From Scratch and create your own: As you’re adding content and graphics to your email, use PicResizer to keep images within a reasonable size before dropping them into your newsletter: Then, once you click Save, you can download your email as HTML and send it with your ESP (or, you can upgrade to a paid plan). Now, according to MailChimp, it’s wise to send a plain text version along with designed emails. So, use their HTML to Text Email Converter to make this process easy: Step 4: Create and Schedule Your Email If you’re not building your email by hand, then create and schedule it using MailChimp. This video will show you how to get it done: If your email has links, you’ll also want to use trackable URLs. Use the Google Analytics Campaign URL Builder  to help you track referral traffic from your email: Step 5: Design Your Landing Page (Optional) If you’re sending marketing emails, there’s a good chance you’re promoting something. That means you might also have a campaign landing page where you’re directing traffic. MailChimp makes it easy to create a landing page quickly with their landing page builder. Here’s how it works: Recommended Reading: How to Write Landing Pages That Convert Step 6: Test Your Email Before Delivery A lot can go wrong with email marketing if you aren’t careful. So, let’s make sure your email is well-optimized for success before hitting send. Start by making sure you’re not likely to end up in the SPAM folder using Mail Tester. First, send your email to the address you’re shown: Then, you’ll receive a report checking your spam score. Next, let’s check your email deliverability. This email deliverability test tool from Send Forensics  will help you determine your deliverability performance according to industry benchmarks, and more. To start, the tool will ask for some information: Then, you’ll get an analysis back with some useful stats and data. Now, most ESPs (like MailChimp) make it easy to set up A/B tests to see which subject line influences the most opens. You might want to test all kinds of different elements, from email layouts, to CTAs, to subject lines, and beyond. To calculate how long you should run an A/B test in order to drive a desired increase in conversions, use VWO’s A/B Split Test Duration Calculator. You can use this for all kinds of different A/B tests (like split testing landing pages, for example), but it works well for our purposes here, too. How do you know if your split test results mean, well, anything? Use this A/B Split Test Calculator. It’ll tell you whether there’s any meaningful statistical correlation between result A and result B, based on your total sample size: Finally, if you’re curious how your email will display in various email clients, use Email Previews. It lets you see how your email will look across 90+ different apps: Step 7: Measure Your Email Marketing Performance Now, once your email is sent, you’ll need to measure its performance, and apply what you learn to your next email send. If you’re using MailChimp, you can find a lot of data right in the app. Follow these three guides: How to use Email Campaign Reports in Google Analytics. How to connect your MailChimp account to Google Analytics. Where to find MailChimp data in Google Analytics. If you’re building your own emails, check out this guide from Smart Insights  on using Google Analytics to measure email marketing performance. Recommended Reading: 20 Email Marketing Best Practices That Will Improve Results What Are You Getting Done With Free Email Software? If you’re serious about email marketing, you’re probably paying for an email provider, and maybe some other tools, too. But, if cost has prohibited you from getting started, hopefully you were pleasantly surprised to learn what you could get done completely for free. Even if you are using a sophisticated email tool stack, hopefully you did find something here you could use, and know exactly where to incorporate it into your workflow.

Wednesday, February 19, 2020

Dutch Revolt Essay Example | Topics and Well Written Essays - 2500 words

Dutch Revolt - Essay Example In Middle Ages there were tree independent dukedoms: Gelderland and Brabant, counties of Holland, Zeeland and Flanders, and episcopacy of Utrecht. In 1370 in order to protect own interests the cities of Holland, Zeeland and Utrecht as well as the episcopacy of Utrecht established trading-political Hanseatic League. It carried out in practice the intermediation between West, North and East Europe and had a trading hegemony in Northern Europe. In the XV century there was a beginning of state main political institutions formation. The protoplast of future parliament - The States-General - was framed in 1463. Since 1482 the territory of Nederland was a part of Habsburg's realm, and since 1556 a part of Spanish Habsburg's realm. During the times of Charles V regiment (1500 - 1558), there was completed the process of integration with contemporary Belgium and Luxemburg and later on formed the one and undivided state of Hole Roman Empire. In this period of time the term "Dutch Republic" came into existence. In economically developed regions there were circulated monetary rent and different kinds of short-term lease; there were formed the order of farmers who do for on the entrepreneurial basis. There was forming the bourgeoisie and was germinating proletariat. The "proletariat (from Latin proles, offspring) is a term used to identify a lower social class; a member of such a class is proletarian. Originally it was identified as those people who had no wealth other than their sons; the term was initially used in a derogatory sense, until Karl Marx used it as a sociological term to refer to the working class"2.Notwithstanding Spanish authorities were constantly trying to suspend the development of Netherlands. There was inquisition put into action, all people that were in bed odor with it were put to torture. In this time of spiritual oppression and political coercion in Netherlands the new religion doctrine of Calvinism, that is a "system of Christian theology and an approach to Christia n life and thought within the Protestant tradition articulated by John Calvin, a Protestant Reformer in the 16th century, and subsequently by successors, associates, followers and admirers of Calvin, his interpretation of Scripture, and perspective on Christian life and theology"3. Calvinism got its broad spread and opposed itself to theological system of Catholicism.Impassioned and filled inside with religious protest the population of Netherlands excited iconoclast movement destroying icons, statues of Saints and other matters of religion cult. . Relegated Spanish vindicatory army started the severest terror. Finally it flamed up the nationwide war, which got the name of Eighty Years War or Dutch Revolt (1566 -1648).The laboratory movement was headed by William of Orange. It should be mentioned that the struggle against Spanish enslavers pushed forward the increase of national self-consciousness. Exactly this period of time is connected with becoming of Dutch nation and language.

Tuesday, February 4, 2020

Rousseau Essay Example | Topics and Well Written Essays - 2500 words

Rousseau - Essay Example Rousseau was among those social philosophers who explored the paradox that radical political theorists, remain unable to raise to democratic politics, a duality of social interests and diverse conceptions for a modern man in the form of ‘democracy’ and ‘totalitarian’ context. He was such a versatile in his opinion that on one hand he held the opinion to experience democracy, while on the other he felt the urge to be totalitarian. No doubt Rousseau’s ideal of a self-sovereign people along with the conception of democratic control over social life, informed the moral and political vision of nineteenth and twentieth century democratic mass movements, as well as non-democratic variants thereof.Although Rousseau have been the first political theorist to outline the form of a democratic social contract, his obsession with social solidarity precluded his conceptualizing the content of modern democratic political life . What he believed was a modern democrati c policy within which general will involved the establishment of a democratic consensus, among divergent social interests and distinct moral conceptions of the good, on those shared constitutional practices and public goods that reach beyond one’s identity with a particular sub community.Rousseau was among the very few political philosophers and theorists who gave a touch of taste of totalitarian to a full democratic region. He comprehend that if democracy were to be a stable and viable order, a commitment to its political practices and public goods would have to be an integral part of the will of each of its citizens, regardless of their propertied status. Although Rousseau acknowledged that in a free society the existence of such a shared "general will" should not obliterate individual wills, his attitude toward the role of associational life in a democratic order was profoundly ambivalent. Perhaps because he never witnessed a functioning pluralist democracy and vigorously opposed the status and economic inequalities of a commercial, monarchical society, Rousseau could not envision a democracy in which the political interactions of divergent interests forged a commitment to a common political life 3. In his day, status-based interests were a profound barrier to the creation of an egalitarian, democratic order; thus Rousseau never witnessed free associations playing a central role in the life of a demo cratic polity. Although Rousseau is theoretically committed to the sovereign authority of the people, he could be thought of as such a political symbol that severely curtailed the arena for democratic politics by denying any role for particular interests groups or sub communities in political deliberation. He believed a democratic society to be partly constituted through popular participation in the election of government and in popular deliberation about the constitutional structure of society, the nature of the basic laws. But it is also shaped by particular interests defending their concerns in both civil society and the political arena. In a vigorous and egalitarian democratic order, a complex dialectic would persist between the activities of secondary associations and their regulation by broader democratic cultural norms and legislative practices. Although the citizens of a democracy must at times achieve a measure of reflective distance from their particular attachments in order to reason ab out shared institutions and practices, a complete distancing from particular identities will never be fully achieved 4. This mediation between particular and collective identities, and between partial interests and the common good, can only occur politically. There is no Archimedean resolution to this inherent democratic dilemma. For Rousseau the essence of both "natural freedom" and "civil freedom" was the absence of personal dependence on others. In a society characterized by a healthy civic culture, all

Monday, January 27, 2020

Cloud Computing Solutions For Celcom Axiata

Cloud Computing Solutions For Celcom Axiata Enclosed is report of cloud computing solutions for Celcom Axiata Berhard for your reference and consideration. This report is a summary of findings from study, online researches, and depth interview during March May 2011 as part of assignment for Management Information System in University of Southern Queensland. The report include overview of cloud computing solutions, analysis of current IT infrastructure issues and challenges, and how cloud computing can be beneficial to your company. Cloud computing is latest current disruptive technologies and is the fastest growing form of computing, with an estimated market size in 2009 of $8 billion, and a projected size of $160 billion in 2012 (Gartner, 2008; Merrill Lynch, 2008). As mobile and social computing are growing faster in the history of technology, and enterprise applications will need to adapt to provide similar concept inside company to increase business collaboration and at the end will improve business processes, as well cost reduction. We thank you for good corporation from Celcom IT Infrastructure department by facilitating depth interview and group discussion within IT team during our research. If you have any questions and/or comments regarding of this report please feel free to contact us. Yours sincerely, Sriyani, Aan Fan Jiang TABLE OF CONTENTS Page Executive Summary i Introduction Celcom and business background IT Infrastructure : issues challenges Issues challenges IT Ecosystem Cloud Computing and its business benefits and costs Recommendation of cloud computing adoption Conclusions EXECUTIVE SUMMARY This report evaluates corporate mission, business strategy, grand IT Infrastructure of Celcom Axiata Berhard in order to provide recommendations regarding cloud computing solutions in company IT strategy. A detailed cloud computing definition has provided in this report, followed by differentiation deployment models, service models and also further elaboration to benefits and cost cloud computing solution. A major finding in current complexity IT infrastructure to support business requirement and challenges to reduce increasing cost of maintenance and deployment of IT technology every year. Depth analysis and research to cloud computing solutions provided in the market, and also adoption recommendation have been provided in this report. It is recommended Celcom as multinational company must have strategic outlook on the future of ICT practices as market is undergoing changes due to technological advancements to adapt and follow market trends and increase ability to compete in the market. In this report, company is suggested to run pilot project to adapt sales cloud to improve business process in sales division and develop private cloud computing by doing virtualization Aim of this report is giving ideas to increase productivity, improve business process and keep focus to reduce cost of maintenance and deployment of IT Technology. Company also has huge opportunity to deliver new business services via cloud computing to current business user customers. INTRODUCTION Company Background Celcom Axiata Berhard (Bhd) is one of market leader mobile operator in Malaysia and occupying over one-third of the market share at the end of Year 2010. Under the control of the Axiata Group, was rebranded from Telekom Malaysias international mobile operations unit Telekom Malaysia International (TMI) on March 31 2009 and formerly launching its new identity on April 2 2009. Axiata Groups major shareholder is Khazanah Nasional Berhad, with a 44.51% stake, while its other significant shareholders with over 5% holdings are the Employees Provident Fund Board (14.22%) and Amanah Raya Nominees (8.52%). As the first mobile operator in Malaysia, Celcom has the widest network coverage in the country, covering 98% of the populated areas in the country. Align with their mission to become number one mobile operator in Malaysia by 2013 and vision to deliver best service for customers and growing innovation in mobile technology, currently Celcom closing the gap with over 11 million subscribers by Quarter 4, 2010. Celcoms core business is in providing prepaid and postpaid mobile voice services. Under Prepaid strong hold, has 3 different brands covering different segmentation, Xpax including sub brand UOX and SOX for Youth segment, Blue for Basic Malaysian, and Celcom Sukses for International segment. In postpaid segment Celcom has Postpaid Exec to serve personal user and Celcom Biz to serve enterprise business user. Celcom strong growth has been further supplemented by the growing data services segment and mobile broadband business, making it Malaysias leading mobile broadband provider. All complete information about Celcom Axiata Berhard (Bhd) can be found through company website at www.celcom.com.my Purpose of Report This report was prepared to evaluate the IT Infrastructure and introduce cloud computing as part of IT future strategy to drive greater cost efficiencies, improvement business process as well new revenue stream for the company. It was commissioned by Mr. Noor Kamarul Anuar Nuruddin as Chief Information Technology Transformation Officer of Celcom Axiata Berhard IT INFRASTRUCTURE : ISSUES AND CHALLENGES To serve over 11 million subscriber and more than 3,900 employees nationwide at Head office included 6 regional offices, Celcom is really dependent to integrated, systematic and high standards Information Technology (IT) Infrastructure. Information technology is playing a very critical role to support and enhance business process, nevertheless to meet business expectation in timely manner. Issues Challenges According to General Manager IT Infrastructure there are several challenges in IT organization as listed below: Complexity of IT and Network elements to support business requirements its fact that IT has always been massively complex and considerably inefficient. To support business requirement, most often are not designed for efficiency but to get the job done. New business requirement which forced beyond articulated needs to create first-of-a-kind products and service. New disruptive technology in market like facebook and other social network has direct impact yet create reduction of customer voice usage and impacting to revenue growth slow-down. Increasing operation Maintenance cost Operational expenditure cost keeps increasing year on year by 9% mostly for maintenance legacy system and company profitability growth will be challenging to keep without continuous cost optimization. Continuation of staff reduction in response to smart spending initiative Celcom IT ecosystem To provide internal best solution, Celcom has policy standard operating environment (SOE) to use 2 different vendors in each major component. These 2 vendors should be chosen from Tier 1 and Tier 2 recommendation by Gartner and able to provide best and breed solutions. Gartner, Inc. is the worlds leading information technology research and advisory company headquartered in Stamford, Connecticut, U.S.A., and has 4,400 associates, including 1,200 research analysts and consultants, and clients in 85 countries (http://www.gartner.com/technology/about.jsp). Under current organization, Celcom IT ecosystem consists of: Office automation Office automation is really important to support daily works for all employees. According to Wikipedia (2011, p. 1) office automation refers to the varied computer machinery and software used to digitally create, collect, store, manipulate, and relay office information needed for accomplishing basic tasks. Office automation helps in optimizing and automating existing office procedures which using LAN/WAN as back bone for Celcom offices and 45 branches including administration and management for electronic scheduling and messaging system using Outlook, antivirus, working desktop/laptop, telephony (Pabx), printer, scanner, facsimile, and mobile device for each employee. Enterprise Applications Enterprise applications are systems that span functional areas, focus on executing business processes across the business firm and include all levels of management (Laudon Laudon 2010, p. 82). In Celcom, enterprise application enabling company to execute and optimize business support processes with modular solutions. SAP ERP Financials To handle core accounting and reporting capabilities, receivables management, treasury and shared services SAP Supply Chain Management (SCM) To support day to day business process procurement purchasing or management module, vendor record management, sourcing request for quotation (RFQ) management, contract management, purchase order management, requisition management, invoice processing, and automatic settlement SAP Sales Distribution (SD)To support processing sales quotation, processing sales order, and delivery starter pack reload coupon processing, reporting, and sales commission for dealer SAP provides better insight and visibility across organizations, improve operational efficiency and effectiveness, and increase flexibility to address business change. Human Resources people soft 9.0 To support business process of online attendance, employee claim management, leave, overtime management, record pay and compensation history, payroll and compensation, employee performance and development documents, review and evaluation, record history details employee, and recruitment Knowledge Management Intranet Celcom Blue-Net Intranet base portal with collection of knowledge and information reports compilation includes whitepapers, conference papers presented at various events. Interactive session and discussion forums chat and search engine functionality to ease searching knowledge process. Customer Service Relationship (CRM) handled by system Rover 2 Customer service tools for prepaid activation account service, customer enquiries, reload, customer record data, migration brand (change plan), and bill payment. Call Center (Amdocs) serve for call center agent to handling complaint, record complaint history, case interaction Sales Marketing Next System, Integrated with SAP SD to register activate customer account, ordering stock starter pack recharge, monitor sales performance, distributor allocate to certain id dealer and tagging id base on allocation for commission payment, real time report base on activation and reload denomination. Cube (Desk Next), monitoring sales performance base on distributor until business manager until dealer name, floating stock, activation, distribution allocation, report payment commission base on tier incentive scheme and performance. Reporting Monitoring Operational Data Storage (ODS), consist of internal raw data of sales, revenue, recharge, migration, churn for analysis purposes. Enterprise Information Portal (EIP), is dashboard monitoring daily, weekly, monthly by brand and regional performance. Infrastructure Networking/Telecommunications LAN (local area network) connects network devices over a relatively short distance between floors and Wan (wide area network) connects networking Head office, regional office and branches. Data management and storage A storage area network (SAN) is a dedicated storage network that provides access to consolidated, block level storage. SAN used to make storage devices having accessible to servers and devices appear as locally attached to the operating system. On top of that, for data management and storage also using network attached storage as a convenient method of sharing files for multiple computers with additional benefits of network-attached storage, which giving faster data access, easier administration, and simple configuration Security To protect networks from unauthorized access while permitting legitimate communications and Firewall, Anti Virus, Anti Spamming Back up recovery and monitoring The purpose to do back up, recovery and monitoring is to avoid data losses and ability to recover data in certain time frame where have been defined by user under data retention policy made by company. CLOUD COMPUTING and ITS BENEFITS COST Overview of Cloud Computing Base on NIST Definition of Cloud Computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models (Peter Mell Timothy Grance. 2011, p. 2) Four deployment models differentiation base on NIST definition of cloud computing (Peter Mell Timothy Grance. 2011, p. 3) Private cloud. The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise. Community cloud. The cloud infrastructure is shared by several organizations and supports specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on premise or off premise. Public cloud. The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services. Hybrid cloud. The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load balancing between clouds) Cloud computing is the current highlight among IT expert and strategically to push cloud computing forward. First, Cloud computing enabling technologies such as virtualization, open source, massive scale automation and multi tenancy. Second, more successful vendor with their offerings are filling the market with positive customer experiences. Third, recession continues to squeeze funds from IT budgets and prompt CIOs to look for more ways to save money. By it characteristic flexible and scalable, cloud computing business models base on as-needed basis or popular with pay-as-you-go. These new business models will reduce the amount of capital and resources tied up in in-house IT, automated and charges base on actual usage data and user able to access lightweight applications that are sufficient for specific business needs, self serve. Cloud Computing Solutions Base on NIST Definition of Cloud Computing there are 3services models of cloud computing solution (Peter Mell Timothy Grance. 2011, p. 2) : SAAS Cloud Software as a Service (SaaS). The capability provided to the consumer is to use the providers applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g.,web-based email). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. Cloud Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations. Cloud Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls). Benefits Cost of Cloud Computing Understanding current ecosystem in company, SAAS and IAAS are better option to be adapted to achieve cost reduction and improve business process. Currently, some leading cloud vendors such as Amazon, Sales Force, Google, Citrix and Microsoft, HP are providing cloud computing solutions. Benefits SAAS models Some application offered by clouds vendors can be considered to be applied such as Sales and CRM application where give company more benefits: Lower capital costs flexible pricing models. With cloud computing company dont need to spend large investments on servers and storage, up front licenses fees, maintenance fees for software. New pricing models bring by cloud computing are typically paid for on a per user subscription basis. Mobility and Flexibility. applications can be accessible anytime and anywhere using internet connection Ease of use, maintenance and integration. User friendly application, easy to configure and easy to integrate with other application in current ecosystem Reliable and Secure. There are more cloud computing provider in the market with numbers of client offering reliability and security over data and 24 hours support. Seamless software upgrade. Upgrade to latest software can be done seamlessly to add more features with no additional cost. Benefits IAAS models Company can consider private cloud computing in data center by doing virtualization whereby Virtualization is a converged infrastructure for shared services where as few number of server would be act as a pool of data centers removing hundred over physical servers which seated and eating up floor space and power consumption. Benefit from virtualization can be obtained from 3 areas: Automates application provisioning. Automates application provisioning eliminates number of actual resources and time consumed in internal meetings required for coordination Time savings. Application deployment elapsed time savings; virtualization allows application to be set up in minutes instead of weeks or months. Power infrastructure cost avoidance; Compaq structured data center cutting down electricity cost hence there is no more massive power and cooling needed. RECOMMENDATION OF CLOUD COMPUTING ADAPTION Along the line with company strategy to be number 1 mobile operator in Malaysia by 2013, and look into market maturity company need to improve business process, focus on cost reduction, and drive new revenue stream from non voice and data. Business growth always required more IT investment meanwhile in the same time company need to focus on cost reduction. Current company grand IT infrastructure still using traditional concept where by company buy and have full ownership all hardware and software. All Malaysia mobile operators havent considered cloud computing as part of IT strategy, but major global mobile operators such as ATT, British Telecom, Orange, Verizon include SingTel in Asia region has adapt cloud computing in their IT strategy. To achieve greater competitive advantages and gain more market share we recommend company to start consider cloud computing as part of IT strategy. Meanwhile IT division have to do proper analysis and examination to create comprehensive cloud computing strategy, we suggest company adopt light application sales cloud offered by Sales force and doing virtualization for IAAS as a pilot project to introduce cloud computing solutions. Improvement sales business process using SAAS model Base on observation in sales division, more than 70% time consume by sales agent not for selling but looking for information for new leads dealership, customer complaint, deal updates, administration and approval, data monitoring, product and promotion latest updates and presentations. There is no application collaboration from head office until regional level that can help them to get all above information so they can concentrate more to sales jobs. Sales force offer sales cloud service base on pay per user basis where user can access it anywhere through an Internet-enabled mobile device or a connected computer can be answered to above problems. Sales force founded in March 1999 by former Oracle executive Marc Benioff, Parker Harris, Dave Moellenhoff, and Frank Dominguez specializing in software as a service (SaaS). Currently, have 82,400 customers and over 2,100,000 subscribers. Sales force, service running in the cloud. Some benefits using sales service cloud from Sales Force are: Integrated application and information from leads, account, contact, opportunities, reports and dashboard in one application, hence sales customer service agent will not waste their working time to find information and juggle in different application Real time update information through smart phone hence latest product and promotion can be reached in quicker time for sales and customer service agent. Since every employee in company have been provided blackberry smart phone, from now on blackberry will bring new function to support sales and service. Small investment compare to total cost of ownership internal technology assets from hardware and software acquisition, installation, training, support, maintenance, infrastructure, downtime/failure cost, space and energy. Flexibility upgrade to new software whenever needed without losing cost on prior internal in house investment and additional hardware to support customer growth. Include automatic latest version upgrade without losing time upgrading each of computer unit High adoption due to sales force is using web base application internet and also training support Seamless Integration due to sales force is using different application programming interface (Api) that easily can be integrated with current company infrastructure As we discussed earlier, in cloud business models sales force are giving lower capital cost because company dont need to spend in large servers, storage, license fee and ongoing maintenance by giving flexible pricing models base on number of user starting from USD5 125/user/month Deliver cost optimization through Private Cloud Virtualization For years, IT have been adding servers, storage and networking devices to keep pace with applications and data generation. As a result Celcom has a massive data center where by IT resources locked up in countless number technology structured. To ensure service level agreements (SLAs), IT resources have created over provisioning and underutilization, becoming collectively difficult to manage. As a result, greater budget portion is being spent on operations and create more difficulties for IT to deploy new services in quickly and efficiently manner. To avoid further diminished productivity, complex networking and unnecessary facility cost, IT organization must heads up to private cloud by doing virtualization server. provision and modify complex infrastructure can be done in minutes not months thru self provision from desktop, notebook even tablet pc from anywhere in or out office contrary with legacy system where need more staff and third party to provision. When additional capacity is needed, workload can be moved to where capacity is exists and server that isnt used can be shut down to save energy. Utilization of servers is increasing; reducing loaded of servers needed in data center and minimizes floor space. To get better view how much cost can be saved by doing virtualization, HP technical team did exercise calculation total savings over 3 years together using HP Blade system Matrix. Illustration of calculation as below table : . Launch IAAS as an opportunity to gain new revenue stream In long term strategy, virtualization is also leading company as telecommunication provider to serve Current enterprise business customers (SMEs) by offering Infrastructure as a service (Iaas). These can also be seen as a potential opportunity to gain new revenue streams. As a benchmark ATT Europe Telecommunication provider has launched Sypnotic storage as a service. Sypnotic storage as a service is Web service-based virtualized storage on-demand solution that easily scales up and down with pay-only-for storage used availability. Sypnotic a pay-as-you-go service that is billed based on company actual usage each month. The service has several usage-based components, including virtual machine resources, networking resources, additional storage and data access. (Peter Hall. 2010, p.10). In bottom line, Celcom also has huge opportunity to bundle Iaas service with current business package with voice, broadband, business mobile and email solution to existing Celcom Biz enterprise customers. Celcom can leverage reputations and solid performances to offer reliable, comprehensive and secure cloud services. CONCLUSION This report has analyzed overall the grand IT infrastructure, current disruptive technology of cloud computing solution and overall business strategy. The following points and findings were made in this report: Information technology has enter to new era with cloud computing solutions where offer flexibility, scalability and new pricing model Company must consider cloud computing solutions to achieve improvement in business process, cost reduction and chance to gain new revenue stream by having new product solution for business customers. Celcom as a multinational company must have strategic outlook on the future of ICT practices as market is undergoing changes due to technological advancements. It is also important company to adapt and follow market trends and increase ability to compete in the market. Company to adapt sales cloud offer by sales force to improve business process in sales division. Company to develop private cloud computing by doing virtualization makes it easier for IT to deliver faster and taking advantage of speed to deploy IT-based solutions faster to meet the business needs. In the end, virtualization aim to increase productivity and reduce facility cost. Company also has huge opportunity to deliver new business services by bundle Iaas with current business package such as voice, broadband, business mobile and email solution to existing Celcom Biz enterprise customers. By ensuring the value of services delivered via cloud computing, company not only delivers business value to their business users but increase value preposition and extend company sustainability.