Saturday, August 31, 2019

Business Strategic Plan and Presentation Essay

http://www.homeworkbasket.com/BUS-475/BUS-475-Week-5-Individual-Final-Strategic-Plan-and-Presentation Resources: Vision, mission, values, SWOTT analysis, balanced scorecards, and communication plan Write a 700- to 1,050-word section for your strategic plan in which you add your strategies and tactics to implement and realize your strategic objectives, measures, and targets. Include marketing and information technology strategies and tactics. Develop at least three methods to monitor and control your proposed strategic plan, being sure to analyze how the measures will advance organizational goals financially and operationally. Finally, recommend actions needed to address ethical, legal, and regulatory issues faced by the organization, and how they can improve corporate citizenship. Combine your completed strategic plan. This includes the vision, mission, values, SWOTT analysis, balanced scorecard, and communication plan. Your consolidated final strategic plan should be 2,800 to 4,200 words in length. Prepare three to five Microsoft ® PowerPoint ® slides in which you briefly outline the vision, mission, values, and balanced scorecard that you have developed for your business. For More Homework Goto http://www.homeworkbasket.com

Friday, August 30, 2019

The Subcommittee on Terrorism and Homeland Security

The Subcommittee on Terrorism and Homeland Security made a report on Counterterrorism intelligence Capabilities and Performance before the 9/11 attack. According to this report, one of the reasons why this tragedy was not prevented was their less than satisfactory management of resources particularly information that could have be used to forewarn about terrorist intentions. It was reported for example, that the FBI, Homeland Security and the other agencies had very limited ability to watchlist terrorist suspects because of their inadequate access to up-to-date data collected by the different agencies and resources.In addition, it was found out that the actions of the FBI were more towards the investigation of possible terrorist attacks and less focus was placed on the prevention of such. (Report of Subcommittee on Terrorism and Homeland Security, 2002). These features harmed the Intelligence Committee’s ability to foresee possible threats of terrorism. Needless to say, forekn owledge of an attack is necessary for its prevention. This necessitates infiltrating communities especially those with significant Arab populations.Still, it is important to note that this infiltration is not an act of discrimination but an act based on the great probability that those involved in terrorism would belong to such nationality. There is a greater probablility that sympathizers and supporters of terrorism would belong to the members of the Islamic population than other populations of different religions. The situation demands that efforts never go below minimum if the safety of the population is to be considered. But this infiltration has drawbacks. One, it sacrifices the people’s liberty and privacy.Two, it creates exaggerated fear among the people especially if the infiltration is most obvious. To minimize the resultant fear among the people, it is necessary that infiltration be done in the most discreet way possible. Clearly, barricading the community with FBIs would not be wise as this would not only cause alarm but would also harmful to the intelligence we are trying to gather. This demands the need for informants and secret agents in the said community, from the said community and in all parts of the community, including mosques.It is very important that informants who are to be sent are selected among those already living in that population. These people are already knowledgeable about their community; they know the important people; have a personal concern over the safety of their community and would be more knowledgeable in finding important information given the right directions. This limits the time and effort required for information gathering, focusing the officials’ efforts in the interpretation and analysis of data, which speeds the process of investigation.The result is a more efficient transmission of deeply analyzed information, which is exactly what is needed in the prevention of terrorism according to the Subcommit tee on Terrorism and Homeland Security (2002). But then, using informants, especially if these informants were selected from the same community involved would entail precautions. The danger here lies on the informant’s loyalty. Since the informant is selected from those already living in that population, it would be wise to assume that his loyalty is not absolutely focused towards the progression of the government’s cause.The possibility that his loyalty would lie towards the side of a guilty individual or the investigated individual, who, like him belongs to the same community cannot be denied. Also it cannot be ascertained whether or not he is in league with the terrorists and is providing them with reports, or probably bound by the same ideals completely against the government’s. In using informants from the involved community, the danger lies in the uncertainty of one’s role: who is pulling the strings and who is the marionette. To manage this danger requires the use of a trusted agent who is beyond the bounds of devotion instilled by community membership.This agent would act as the control, monitoring the local informants’ actions and reporting any act that signals treachery. This way, it is possible to determine the reliability of the reports given, pinpoint possible leak in intelligence and manipulate information disseminated, to the advantage of the intelligence committee. Definitely, there is more to war ethics than preventing needless deaths through terrorism, that is, the need to protect the people has made it to the point that the liberty and privacy of the people are sacrificed.Some means of protecting the people such as expanded surveillance and â€Å"seize and interrogate anyone (O’Connor, 2006)† is in itself an act that would incise the people’s freedom. Infiltrating the community with informants and agents, may also, in a way, harm community’s liberty and privacy but in a relativel y less degree compared to other counterterrorism strategies. According to O’Connor (2006), counterterrorism strategies involving technology and the use of informants are the most effective in terms of ensuring the people’s safety and at the same time limiting disadvantages in people’s liberty.In any case at this point, all actions aiming to provide people with their deserved safety entail a cost to the people’s civil liberty. 2. In any undertaking, it is very important to stick to the objective. This does not exclude counterterrorism, war against terrorism or any war for that matter. The war against terrorism is not an end in itself but simply a means to another end which are to protect the peoples’ rights to safety and to provide, in the long run, freedom. I intend to base my answers on these premises.All peoples in the act of terrorism or fighting against the ideals of counterterrorism with the intention of harm would be enemy combatants, without any distinction of citizenship, soldier or non-soldier. This is very different to the status accorded to different people involved in the war on terrorism today where they are classified as enemy combatant, unlawful combatants, prisoners of war or noncombatant, each with different provisions ideally based on International Standards. Whether or not a terrorist is a citizen of Afghanistan, or a citizen of the United States, anyone captured in the act of terrorist violence is considered a terrorist.Simply being an American does not excuse someone from the punishment accorded to crimes of terrorism and the only possible status, rights and protection I could afford an American citizen in the act of terrorist violence is that of a criminal charged with terrorism. He will be interrogated, given a trial and punished according to law without disregard to his rights as human that is without the use of unnecessary torture. A foreign national engaged in terrorism in the United States would be treated in the same way, based on his actions and without regard to his nationality.There would be no more and no less harsh treatment given to a foreign national engaged in terrorism compared to an American counterpart. â€Å"American national birth should not protect American-born terrorists or fail to protect naturalized citizens (Criticisms of the War of Terrorism, 2006). † In affording rights, status protection and punishment, giving such special considerations would be a question to the justice system and to the real intent and objective of this undertaking. Counterterrorism is not a matter of nationality and citizenship.Counterterrorism is defending the peoples’ rights and freedom, a state’s sovereignty against people who disregard such ideals by instilling fear and uncertainty through violence. Double standards should have no place in the justice system. If nationality and citizenship is to be considered, in deciding rights and punishment, then the effor ts to realize the underlying goal which is the safety of the people would be for naught. This would not be counterterrorism but a war against a specific community. This can be applied in the case of the American Citizen who fights against American forces.Again, this is beyond the matter of citizenship. If the American citizen fights against the American forces, he is considered as a threat against the realization of the objectives of the war against terrorism, which is to protect the innocent citizens. The American forces would have no reason not to fight back. Torturing any of these subjects would never be justified in the context of just war. I, personally would say that the torture of these subjects would not be necessary. Eliminating terrorism does not entail the necessity to torture any of the perpetrators of terrorism.Elimination and torture may be similar in a way that it would provoke the wrath of the enemy but they are different in a way that elimination is exactly what it is—that is, it is supposed to eliminate terrorism by eliminating its perpetrators possibly through conviction and application of just laws. Torture, on the other hand would only provoke the wrath of the enemy without the assurance of eliminating terrorism resulting in possible retaliation. Surely, the means of saving lives of peoples would not be limited on a torture or no torture system.Solving terrorism with terrorism is not only unjust but also unwise. 3. Disregarding popular theories on just war, let me say that a war that is just is a matter of perspective. To the leaders, all wars are just as long as it promotes the ideals and purpose they try to protect and achieve. To the US and maybe to some, the war against terrorism is just because its purpose is supposedly to protect the lives, safety and liberty of innocent people against terror. To the leaders of the terrorists, they are supposedly protecting a certain ideal.To some, war is a religious undertaking. Terrorism may be an unpopular act to most but to its supporters, terrorism is their means of fighting for their ideals and achieve their purpose, which they personally believe are just whether others agree or not. But to some people especially those affected negatively by this war, this war would never be possibly just. The families left behind by innocent people who died in the 9/11 attack and those civilians who have become victims of bombs would never think of agreeing to any argument saying that wars could possibly be just.Those who sympathize with these civilians and those who fear the possibility that someday they would become the unknowing victims of war would think the same way. Theorists, most popular of whom, St. Augustine, conceived of criteria that characterize a just war. The just war theory provided guidelines in determining when a war is just (jus ad bellum), how combatants should fight in war (jus in bello), and when to end a war (Just War, 2006). According to the Jus ad bellum, wars should only be engaged in if there is a just cause.Just cause means that wars should only be engaged in to correct wrongdoings, as an act of defense against threats to freedom, rights and sovereignty. The cause is said to be just if it is an act to resist aggression (Orend, 2005). Right intention is also necessary in a just war. Engaging in war for material gains is outside the scope of right intention. In general, intention should always be to defend or correct suffered wrong doings (Orend, 2005). The proportionality and last resort states that gains should always outweigh the casualties incurred and wars should only be engaged in if all other possible means have been exhausted to no avail.Jus ad bellum also emphasizes the importance of legitimate authority and the probability of success. War should only be engaged in if the chance of success is high because doing otherwise would undermine the theory of proportionality, also one criterion in considering a war as a just war (Or end, 2005). In engaging in a just war, combatants are expected to act in a way that violence and casualties are restrained and attempts to recognize human rights of both allies and enemies are made.According to the Jus in bello, combatants of a just war are expected to apply the principle of discrimination in which war is directed only to the perpetrators of wrong and definitely not to civilians. Similar to the Jus ad bellum, in the Jus in bello, proportionality is expected. In this case, the force to be implemented must be justified when compared to the problem that occurred and the possible good outcome. The more civilian casualties, the more the war being waged are questionable (Just War, 2006).The Jus in bello also preaches the use of minimum force, respect for prisoners of war, and derides the use of torture (Orend, 2005). In the same way, in the just war theory, wars should be terminated only with just cause: if both parties are willing to negotiate and violations made by the aggressor have already been recognized and vindicated; right intention, discrimination, proportionality and public declaration and authority (Orend, 2005). Fighting terrorism would cease to be just if it has lost the purpose and ideals which are its foundations.That is, if fighting terrorism has become a mere machination for purposes other than the ideals it stands for. Fighting terrorism would cease to be just if it resorted to unnecessary ways; if it violates human rights; if it in itself resorted to terrorism which is the exact ideal it is supposed to stand against. Fighting terrorism would cease to be just if it has become an act against the principles proposed by the just war theory. Others assert that the presence of any civilian deaths would define an unjust war (Bell, 2006).If all these would classify wars as unjust, then the impossibility of a just war is definite especially when applied to the war on terrorism. Still, criticisms of the just war theory stresses the inapplic ability of the just war theory in the present real wars, such as today’s war on terrorism which is unconventional one. When fighting terrorist groups such as the Al Qaeda, the conventional guidelines for war become obsolete. Therefore, â€Å"just war† has to be redefined (Bell, 2006). 4. Schools, colleges, universities, the press and some institutions have the power to carry out or instill ideas among the people.Unfortunately for the government, these institutions are the breeding ground of radical ideas, some, supporting terrorism and most of which pertaining to anti-militaristic views attacking any actions involving the war against terrorism, inspiring terrorist support. People who incite violence when they glorify violent acts against America may be responsible, indirectly for such acts because of the inspiration they give. They are indeed indirectly accountable but they should not be punished unless they themselves engage in violent acts directly.America, as it pro fesses, hold most deeply their love for freedom and democracy, and part of this freedom and democracy that they allow their people is the freedom to express one’s insights, beliefs and emotions. If a person feels like glorifying violent acts against America, if that person feels that in himself, he is against the beliefs and ideals that America stands for, then he or she is free to communicate, glorify or say anything about it whether or not it inspires violent acts among others. He should be free to say everything as long as he does not directly engage in such violence.It is, after all, his right. Now this freedom allowed to citizens is exactly what makes it difficult for the government to deal with schools, mosques and charities that indirectly support terrorism because imposing sanctions on such indirect actions would undermine the liberty that they strive to protect. The only thing the government can do is to make parallel actions that would negate the actions of the supp orters of terrorism. If there are local institutions that support terrorism, then they would have to use their power to tap what available resources they have, to negate such support and ideals.They have to make an effort to promote their ideas and market it, indirectly targeting the ideas of the supporters of terrorism and at the same time, indirectly making an effort to reach out and win the key supporters of terrorism. Part of the war against terrorism is to put out ideas that make possible the perpetuation of support of terrorism and not the people who support these ideas (if they do not directly engage in terrorism). In this case the war against terrorism is simply not a guns and bombs war, but also a challenge to make some people realize the correctness of the ideas imposed.If the ideas that support terrorism start from ideas imposed by some institutions, then actions should be targeted toward making powerful institutions publicly support ideas like the government’s. Or better yet, infuse anti-terrorist ideas to the institutions that support terrorism. In a way, this would be propagating anti-terrorist ideas as well as killing ideas that support terrorism. 5. â€Å"The fight against terrorism is now the first and overriding priority of the Department of Justice. (US Department of Justice, 2004).† Following this is the revision of the US Patriot act, which expands the power of Intelligence Officials in gathering information. In general, the main purpose of this expansion is for a more efficient targeting and prevention of terrorism by revising previous acts that limited the government’s ability to gather and use information and provide sanctions to terrorists. The revisions include a freer access to information, allowing information sharing among government agencies, â€Å"strengthening criminal laws against terrorism and updating the law to reflect new technology (US Department of Justice, 2004).All these revisions are said to be re quired to eliminate hindrances to the investigation of terrorist acts. The main purpose of this revision is to provide a more efficient means of using critical information especially those related to terrorism. Prior to the approval of the USA Patriot Act was a report submitted by the Subcommittee on Terrorism and Homeland Security in 2002, analyzing the possible causes of failure to prevent the 9/11 attack.The main points of the report is the mismanagement of intelligence caused mostly by certain restrictions in the law prior to the 9/11 attack, and the need for certain revisions to accommodate the present need regarding terrorism (Report of the Subcommittee on Terrorism and Homeland Security, 2002). Apparently, the revisions in the US Patriot Act are the response. Undeniably, the revisions in the US Patriot Act are a significant incapacitation of terrorist plans and are a great advancement, although not absolute, in terms of reducing the number of terrorist attacks and thus, ensur ing the safety of the people.This has been proven by situations exemplified in a report by the US Department of Justice in 2004 entitled, â€Å"Report from the Field: The US Patriot Act at Work. † The US Patriot Act has temporarily slowed and probably prevented many acts of terrorism, thus improving the perceived safety of the population. But this advantage comes with the price of increased deprivation of civil liberty. The Act could definitely justify secret wiretaps, increase arrests even at a lower threshold of evidence, increased secret access to personal accounts, records, technological usage, mails and conversations (O’Connor, 2006).The not so few accounts of erroneous arrests that have been recorded since the approval of the US Patriot Act confirm this (Criticisms of the War on Terrorism, 2006). Critics of Militarism and the US Patriot Act, and the proponents of civic liberty agree that â€Å"it is better to think before doing anything drastic (O’Connor, 2006). Those for the Patriot Act agree that in the war against terrorism, time is of the essence as a moment of hesitation could disastrously spell doom (Department of Justice, 2004).Another point to be considered in the US Patriot Act is the span of time when provisions of the Act would still be deemed effective in preventing terrorism and ensuring the peoples’ safety. Anyone motivated by a perceived moral cause would not be stopped by simple revisions of laws, or more appropriately, by â€Å"laws† per se. And this is exactly what characterizes the terrorists in question: their motivation to terrorize is beyond any physical or material cause; they are motivated by their perceived definition of morality and justice.Soon, they will find a loophole in the laws that are presently slowing them down, and continue towards their goals. The question now is would the government foresee possible threats that are beyond the treatment of laws? And if they do, how would they handl e and prevent these possible threats? Would it spell more demands on the peoples’ civic liberty in exchange for the more extensive need for safety? And if they do, what if the bombs and terrorist attacks are mere guises to remove our attention from how they are working on their real target—the peoples’ liberty—the ideal the state is trying to protect.Because if you are a terrorist, what better way to attack than attacking the foundation of your enemies’ framework. Is it not possible that the state is unknowingly working towards the achievement of the enemies’ real goal? Although the approval of the Act has provided the government with better capability to reduce threats of terrorism, it is still very important, especially with the erratic movement of priorities, that such questions be given consideration and other threats to the peoples’ security continue to be studied, understood and monitored (Report of Subcommittee on Terrorism and Homeland Security, 2002).Given the present circumstances when the safety of the peoples is at risk, the US Patriot Act seems to be working satisfactorily in terms of preventing terrorist attacks. It would not be wise to change the provisions of the Act if the objective is to ensure the peoples’ safety. But it would be nice to be hopeful that there would someday be a proposal that would ensure the peoples’ safety without sacrificing the peoples’ liberty. At present, all we can do is choose the lesser evil, and think of ways to eliminate â€Å"evil† as a choice.References Anti-Americanism. (2006, August 5). In Wikipedia, The Free Encyclopedia. Retrieved 02:02, August 6, 2006, from http://en. wikipedia. org/w/index. php? title=AntiAmericanism &oldid=67844288. Bell, D. (2006). Can the War be Just? Or What is Just War Good For? In Crosscurrents Magazine. Retrieved August 6, 2006, from http://www. crosscurrents. org/Bellspring2006. pdf Criticisms of the War on Terrorism. (2006, August 4).In Wikipedia, The Free Encyclopedia. Retrieved 02:03, August 6, 2006, from http://en. wikipedia. org/w/index. php? title=Criticisms_of_the_War_on_Terrorism&oldid=67579159. Just War. (2006, August 6). In Wikipedia, The Free Encyclopedia. Retrieved 02:02, August 6, 2006, from http://en. wikipedia. org/w/index. php? title=Just_War&oldid=67920472. O’Connor, T. (2006, June 6). Civic Liberties in Domestic Terrorism. In Megalinks in Criminal Justice. Retrieved August 6, 2006, from http://faculty. ncwc. edu/toconnor/429/429lect19. htm. Orend, B. (2005). War. In The Stanford Encyclopedia of Philosophy.Retrieved August 6, 2006, from http://plato. stanford. edu/archives/win2005/entries/war. Report of Subcommittee on Terrorism and Homeland Security, House Permanent Select Committee on Intelligence on Counterterrorism Intelligence Capabilities and Performance Prior to 9-11 (2002, July). In Federation of American Scientists Intelligence Resource Program. Retrie ved August 6, 2006 from http://www. fas. org/irp/congress/2002_rpt/hpsci_ths0702. html. US Department of Justice (2004, July). Report from the Field: The US Patriot Act at Work.

Thursday, August 29, 2019

Smart Car

‘ Case 10-2) 1 The Smart Car In 1991, Nicolas Hayek, chairman of Swatch, announced an agreement with Volkswagen to develop a battery-powered â€Å"Swatch car. † At the time, Hayek said his goal was to build â€Å"an ecologically inoffensive, highquality city car for two people† that would sell for about $6,400. The Swatchmobile concept was based on Hayek's conviction that consumers become emotionally attached to cars just as they do to watches. Like the Swatch, the Swatchmobile (officially named â€Å"Smart†) was designed to be affordable, durable, and stylish. Early on,Hayek noted that safety would be another key selling point, declaring, â€Å"This car will have the crash security of a Mercedes. † Composite exterior panels mounted on a cage like body frame would allow owners to change colors by switching panels. Further, Hayek envisioned a car that emitted almost no pollutants, thanks to its electric engine. The car would also be capable of gasolin epowered operation, using a highly efficient, miniaturized engine capable of achieving speeds of 80 miles per hour. Hayek predicted that worldwide sales would reach one million units, with the United States ccounting for about half the market. Some observers attributed the hoopla surrounding the Swatchmobile concept to Hayek's charismatic personality. His automotive vision was dismissed as being overly optimistic; less ambitious attempts at extending the Swatch brand name to new categories, including a brightly colored unisex clothing line, had flopped. Other products such as Swatch telephones, pagers, and sunglasses also met with lukewarm consumer acceptance. The Swatchmobile represented Hayek's attempt to pioneer a completely new market segment. Industry observers warned, oreover, that the Swatch name could be hurt i f the Smart car were plagued by recall or safety problems. In 1993, the alliance with Volkswagen was dissolved; Hayek claimed it was because of disagreement on the co ncept of the car (Volkswagen officials said low profit projections were the problem). In the spring of 1994, Hayek announced that he had lined up a new joint venture partner. The Mercedes-Benz unit of Daimler-Benz A G would invest 7 5 0 million Deutsche marks in a new factory in Hambach-Saargemuend, France. In November 1998, after several months of production delays nd repeated cost overruns, Hayek sold Swatch's remaining 19 percent stake in the venture, officially known as Micro Compact Car GmBH [MCC), to Mercedes. A spokesman indicated that Mercedes' refusal to pursue the hybrid gasoline/battery engine was the reason Swatch withdrew from the project. The decision by Mercedes executives to take full control of the venture was consistent with its strategy for leveraging its engineering skills and broadening the company's appeal beyond the luxury segment of the automobile market. As Mercedes chairman Helmut Werner said, â€Å"With the new car,Mercedes wants to combine ecology, emoti on, and intellect. † Approximately 8 0 percent of the Smart's parts are components and modules engineered by and sourced from outside suppliers and subcontractors known as â€Å"system partners. † The decision to locate the assembly plant in France disappointed German labor unions, but Mercedes executives expected to save 500 marks per car. The reason: French workers are on the i ob 2 75 days per year, while German workers average only 242 days; also, overall labor costs are 40 percent lower in France than in Germany.MCC claims that at Smart Ville, as the factory is known, only 7. 5 hours are required to complete a vehicle. This is 25 percent less time than required by the world's best automakers. The first 3 hours of the process are performed by systems partners. A Canadian company, Magna International, starts by welding the structural components, which are then painted by Eisenmann, a German company. Both operations are performed outside the central assembly hall; the body is then passed by conveyer into the main hall. There VDO, another German company, installs the instrument panel.At this point, modules and parts manufactured by Krupp-Hoesch, Bosch, Dynamit Nobel, and Ymos are delivered for assembly by MCC employees. To encourage integration of MCC employees and system partners and to underscore the need for quality, both groups share a common dining room overlooking the main assembly hall. The Smart City Coupe officially went on sale in Europe in October 1998. Sales got off to a slow start amid concerns about the vehicle's stability. That problem was solved with a sophisticated electronic package that monitors wheel slippage. Late-night TV comedians gave the odd-looking car o respect and referred to it as â€Å"a motorized ski boot† and â€Å"a backpack on wheels. † During the first quarter of 1999, the 150 Smart dealers in 19 countries in continental Europe sold a total of 8,400 cars, an average of 5 6 cars each. Thesales pictu re was brightest in the United Kingdom, where a London dealer sold 160 vehicles between the Smart launch in October 1998 and M a y 1999. The brisk sales pace in Britain was especially noteworthy because MCC was only building left-hand drive models (the United Kingdom is the only country in Europe in which right-hand drive cars are the norm).Industry observers noted that Brits' affection for the Austin Mini, a tiny vehicle that first appeared in the 1 9 60s, a ppeared to have been extended to the Smart. M C C reduced its annual sales target from 130,000 to 100,000. Robert Easton, joint chairman of DaimlerChrysler, went on record as being skeptical of the vehicle's future. In an interview with Automotive News, he said, â€Å"It's possible we'll conclude that it's a good idea but one whose time simply hasn't come. † In 2000, the Smart exceeded its revised sales target, and interest in the vehicle was growing. Wolf-GartenGmbH & Company, a German gardening equipment company, annou nced plans to convert the Smart to a lawn mower suitable for use on golf courses. A convertible and diesel-engine edition have been added to the product line. In 2001, executives at DaimlerChrysler announced plans to research the U. S. market to determine prospects for the Smart. The announcement came as Americans face steep increases in gasoline prices. Visit the Web site www. smart. com Discussion Questions 1 . Assess the U. S. market potential for the Smart. Do you think the car will be a success? Why or why not? 2.Identify other target markets where you would introduce this car. What sequence of countries would you recommend for the introduction? Sources: D n McCosh, â€Å"Get Smart: Buyers Ty to J m the Queue,† f ie New York Times a r up (March 19, 2004), p. Dl; Nicholas Foulkes â€Å"Smart S t G t Ee Smarter,† finonciol Times e e vn s (February 14-15, 2004), p W10; W Pinkston a d S o Miler, â€Å"DaimlerChrysler Se r . il n ct t es T w r ‘Smart' Debut in U . S. ,† The Woll Street Journol (August 20, 2001), pp. B 1, B4; o ad Miler, â€Å"Daimler May Roll O t Its Tiny Cr Here,† f ie Woll Street Journol (June 9, 2001), u a p.B1; Miler, â€Å"DaimlerChrysler'sSmart Cr M y Have a New Use,† f ie WollStreetlournol aa (February 15, 2001), pp. B1, B4; Haig Simonian, â€Å"Carmakers' Smart Move,† Financial Times (July 1,1997), p. 12; William Taylor, â€Å"Message a d Muscle: A Interviewwith S ac n n w th Itan Nicolm Hayek,† Horvord Business ~ eview ~ o r c h ~1993), pp. 99-1 10; Kevin ( ~ril Helliker, â€Å"Swiss Movement: Cn Wriiatch Whiz Switch Swatch Cachet to a Automobile? † a n f ie Woll Street Journal (March 4,1994), pp. A1,A3; Ferdinand Protrman, â€Å"Off the Wrist, w th n O t the Road: A S ac o Wheels,† f ie New York Times (March4,1994), p. (1. no Smart Car ‘ Case 10-2) 1 The Smart Car In 1991, Nicolas Hayek, chairman of Swatch, announced an agreement with Volkswagen to develop a battery-powered â€Å"Swatch car. † At the time, Hayek said his goal was to build â€Å"an ecologically inoffensive, highquality city car for two people† that would sell for about $6,400. The Swatchmobile concept was based on Hayek's conviction that consumers become emotionally attached to cars just as they do to watches. Like the Swatch, the Swatchmobile (officially named â€Å"Smart†) was designed to be affordable, durable, and stylish. Early on,Hayek noted that safety would be another key selling point, declaring, â€Å"This car will have the crash security of a Mercedes. † Composite exterior panels mounted on a cage like body frame would allow owners to change colors by switching panels. Further, Hayek envisioned a car that emitted almost no pollutants, thanks to its electric engine. The car would also be capable of gasolin epowered operation, using a highly efficient, miniaturized engine capable of achieving speeds of 80 miles per hour. Hayek predicted that worldwide sales would reach one million units, with the United States ccounting for about half the market. Some observers attributed the hoopla surrounding the Swatchmobile concept to Hayek's charismatic personality. His automotive vision was dismissed as being overly optimistic; less ambitious attempts at extending the Swatch brand name to new categories, including a brightly colored unisex clothing line, had flopped. Other products such as Swatch telephones, pagers, and sunglasses also met with lukewarm consumer acceptance. The Swatchmobile represented Hayek's attempt to pioneer a completely new market segment. Industry observers warned, oreover, that the Swatch name could be hurt i f the Smart car were plagued by recall or safety problems. In 1993, the alliance with Volkswagen was dissolved; Hayek claimed it was because of disagreement on the co ncept of the car (Volkswagen officials said low profit projections were the problem). In the spring of 1994, Hayek announced that he had lined up a new joint venture partner. The Mercedes-Benz unit of Daimler-Benz A G would invest 7 5 0 million Deutsche marks in a new factory in Hambach-Saargemuend, France. In November 1998, after several months of production delays nd repeated cost overruns, Hayek sold Swatch's remaining 19 percent stake in the venture, officially known as Micro Compact Car GmBH [MCC), to Mercedes. A spokesman indicated that Mercedes' refusal to pursue the hybrid gasoline/battery engine was the reason Swatch withdrew from the project. The decision by Mercedes executives to take full control of the venture was consistent with its strategy for leveraging its engineering skills and broadening the company's appeal beyond the luxury segment of the automobile market. As Mercedes chairman Helmut Werner said, â€Å"With the new car,Mercedes wants to combine ecology, emoti on, and intellect. † Approximately 8 0 percent of the Smart's parts are components and modules engineered by and sourced from outside suppliers and subcontractors known as â€Å"system partners. † The decision to locate the assembly plant in France disappointed German labor unions, but Mercedes executives expected to save 500 marks per car. The reason: French workers are on the i ob 2 75 days per year, while German workers average only 242 days; also, overall labor costs are 40 percent lower in France than in Germany.MCC claims that at Smart Ville, as the factory is known, only 7. 5 hours are required to complete a vehicle. This is 25 percent less time than required by the world's best automakers. The first 3 hours of the process are performed by systems partners. A Canadian company, Magna International, starts by welding the structural components, which are then painted by Eisenmann, a German company. Both operations are performed outside the central assembly hall; the body is then passed by conveyer into the main hall. There VDO, another German company, installs the instrument panel.At this point, modules and parts manufactured by Krupp-Hoesch, Bosch, Dynamit Nobel, and Ymos are delivered for assembly by MCC employees. To encourage integration of MCC employees and system partners and to underscore the need for quality, both groups share a common dining room overlooking the main assembly hall. The Smart City Coupe officially went on sale in Europe in October 1998. Sales got off to a slow start amid concerns about the vehicle's stability. That problem was solved with a sophisticated electronic package that monitors wheel slippage. Late-night TV comedians gave the odd-looking car o respect and referred to it as â€Å"a motorized ski boot† and â€Å"a backpack on wheels. † During the first quarter of 1999, the 150 Smart dealers in 19 countries in continental Europe sold a total of 8,400 cars, an average of 5 6 cars each. Thesales pictu re was brightest in the United Kingdom, where a London dealer sold 160 vehicles between the Smart launch in October 1998 and M a y 1999. The brisk sales pace in Britain was especially noteworthy because MCC was only building left-hand drive models (the United Kingdom is the only country in Europe in which right-hand drive cars are the norm).Industry observers noted that Brits' affection for the Austin Mini, a tiny vehicle that first appeared in the 1 9 60s, a ppeared to have been extended to the Smart. M C C reduced its annual sales target from 130,000 to 100,000. Robert Easton, joint chairman of DaimlerChrysler, went on record as being skeptical of the vehicle's future. In an interview with Automotive News, he said, â€Å"It's possible we'll conclude that it's a good idea but one whose time simply hasn't come. † In 2000, the Smart exceeded its revised sales target, and interest in the vehicle was growing. Wolf-GartenGmbH & Company, a German gardening equipment company, annou nced plans to convert the Smart to a lawn mower suitable for use on golf courses. A convertible and diesel-engine edition have been added to the product line. In 2001, executives at DaimlerChrysler announced plans to research the U. S. market to determine prospects for the Smart. The announcement came as Americans face steep increases in gasoline prices. Visit the Web site www. smart. com Discussion Questions 1 . Assess the U. S. market potential for the Smart. Do you think the car will be a success? Why or why not? 2.Identify other target markets where you would introduce this car. What sequence of countries would you recommend for the introduction? Sources: D n McCosh, â€Å"Get Smart: Buyers Ty to J m the Queue,† f ie New York Times a r up (March 19, 2004), p. Dl; Nicholas Foulkes â€Å"Smart S t G t Ee Smarter,† finonciol Times e e vn s (February 14-15, 2004), p W10; W Pinkston a d S o Miler, â€Å"DaimlerChrysler Se r . il n ct t es T w r ‘Smart' Debut in U . S. ,† The Woll Street Journol (August 20, 2001), pp. B 1, B4; o ad Miler, â€Å"Daimler May Roll O t Its Tiny Cr Here,† f ie Woll Street Journol (June 9, 2001), u a p.B1; Miler, â€Å"DaimlerChrysler'sSmart Cr M y Have a New Use,† f ie WollStreetlournol aa (February 15, 2001), pp. B1, B4; Haig Simonian, â€Å"Carmakers' Smart Move,† Financial Times (July 1,1997), p. 12; William Taylor, â€Å"Message a d Muscle: A Interviewwith S ac n n w th Itan Nicolm Hayek,† Horvord Business ~ eview ~ o r c h ~1993), pp. 99-1 10; Kevin ( ~ril Helliker, â€Å"Swiss Movement: Cn Wriiatch Whiz Switch Swatch Cachet to a Automobile? † a n f ie Woll Street Journal (March 4,1994), pp. A1,A3; Ferdinand Protrman, â€Å"Off the Wrist, w th n O t the Road: A S ac o Wheels,† f ie New York Times (March4,1994), p. (1. no

Wednesday, August 28, 2019

The Goals of the Change Initiative Essay Example | Topics and Well Written Essays - 1250 words

The Goals of the Change Initiative - Essay Example Our main aim will be to create a leaner centralized structure of organization that will provide the best practices and the required expertise in all aspects of the business success, efficiency, and communication. Other critical sections that will also be addressed are legal governance, human resource management, Information Technology architecture, and yield Monetization (Glinow & Mohr man 1990). We shall evolve our research team so that everyone gets an opportunity to contribute to change in creative innovation process. With the help of our Computer Aided Design designers, we shall renovate our technology infrastructure to allow open APIs, simplify the sales strategy by ensuring that we keep track of our partner account strategy and finally push forward for more effectiveness via organization. Having carried out this business examination, today, we will make imperative changes to our business organization. These changes will include even the most difficult decisions that can be made about workforce reduction (Reduction in Force). However this time I believe we can do without the RIF- Reduction in Force rather we will go the attrition way. This is whereby some positions will be done away with incase those holding them retire or quit the job (Glinow & Mohr man 1990). I believe this is better than layoff and we will have to enhance communication among our workers. These changes will enable this business to concentrate more on the leading brands and focus on our strengths in research, the widely known wind tunnel technology. We will also be able to focus and propel our efficiencies throughout the company. A lot of support has been requested from the management especially the human resource department since the reorganization about to be effected is going to be work intensive. The following is an overview of the transformation that is going to take place; Employees: There has been a problem with our employees for quit sometime now. Many employees feel like the company is disintegrating due to the difficulties in communication which, in turn, makes it more difficult to get the projects completed in a timely manner (Heller 2006). This has led to rumblings among the staff about quitting. Since Pegasus is located in a highly concentrated technical area of the country, there are other companies that pay better and seem to be more competitive for contracts. The leadership is scared of losing their best and brightest employees and feels the urgent need to streamline their organization to remain effective, efficient, and competitive. The company is concerned about this issue since it's these employees who have contributed to its success and it's very disheartening to watch our colleagues leave! These changes we intend to make are part of our long term growth and development strategy. I have organized for the employees to meet their specific managers so that they can have discussion on more specifics and how these transformations will influence their personal ambitions and individual roles at the company

Tuesday, August 27, 2019

Online booking system for parking Literature review

Online booking system for parking - Literature review Example Context of the project It is evident that the number of vehicles in the country has increased exponentially over time. However, the number of parking spaces has not been changed to reflect the increase in the number of vehicles. Inevitably, finding an open parking space has been one of the greatest headaches for vehicle owners (Banman, 2009). The situation becomes even worse during peak hours when there is heavy vehicular movement. In some instances, a person has to drive around town in the search of empty parking spaces. This leads to wastage of fuel and time since the search may take long. This project will help to ensure that a person can check and book available parking space from any place. The portal for online booking for parking system will make it possible for a person to check for available parking spaces and drive straight to the place. This will result in significant savings in terms of money and time. Suffice to say, the use of internet has become almost second nature to most people (Stobbs, 2012). In the United States, the internet penetration rate stands at eighty one percent. Almost half of the population possesses either a smart phone or a tablet. Thus, there is a sufficient number of people using the internet who can benefit from this service. Overall objectives The speci?c objectives of this project are as follows: (i) To investigate extend to which online booking system can be implemented for car parking. (ii) To design an online booking system for car parking. (iii) To implement a software prototype for the car parking system. (iv) To validate the software prototype implemented during the course of the project. Techniques for realization In order for this project to be successful, it will be necessary to apply various techniques. One of the critical factors for the successful realization of this project is intensive research. There is need to conduct a comprehensive research on the issue of car parking and the way that online systems can he lp in mitigation of the problem. Also, the project should be implemented using hardware and software that is up to the task. The success of software related projects depends on the system specifications that are selected. This is critical as it determines the performance of the system under the given circumstances. The realization of the project will also depend on the ease of usability of the online booking system for car parking. The user interface should be fast and intuitive such the user can easily navigate through it (Stobbs, 2012). Structure of the contextual report This contextual report will first evaluate the existing technologies in the area of car parking. The existing literature in online booking systems and car parking will be reviewed. This will help to give a solid background of the topic of online booking system for car parking. A comparative analysis of the existing and proposed car parking systems will help to show the existing gaps and the potential benefits of t he project. A section on market research will shed light on the potential clients of the proposed system. The patterns in the car parking industry will be evaluated to investigate the underlying trends. Finally, the requirement specifications for the online booking system for car parking will be outlined. Section 2: Literature review Technological overview At the early stages of commercial car parking, most of the work was done entirely on paper. The parking attendant

Monday, August 26, 2019

Synthesis of Research Problem, Method, and Design-Hypothetical Designs Paper

Synthesis of Problem, Method, and Design-Hypothetical Designs - Research Paper Example These challenges, which include dishonesty and plausible misjudgments, threaten the quality of results obtained through this process. Certain measures have, however, been put in place, to ensure high quality, and error free results. There is little or no attention given to the efficiency and throughput of the crowdsourcing process or the integrity of the results obtained. It is argued that the numbers of task workers and tasks are always small, thereby, resulting in crowdsourcing techniques that are not conscious of the number of tasks, potential worker behavior and efficiency of the process. This research aims at proposing a crowdsourcing, result-improvement technique that is independent of task complexity and sizes and ensures result quality, integrity, as well as efficiency and throughput of the process. The hypothesis being studied in this case is that crowdsourcing result-improvement techniques that are task size and complexity independent ensures result integrity, quality, effi ciency as well as throughput. Hypothetical Designs Quantitative design This design will utilize experimental research method - methods that aim at maximizing replicability, generalizability, and objectivity of results; mostly concerned with prediction (Creswell, 2009). The focus will be to test several existing crowdsourcing techniques including r-Redundancy, v-Voting, and Vote Boosting techniques on a large number of tasks that will be handled by a large number of users. These techniques will be considered as experiment participants. The independent variable in this case would be the crowdsourcing techniques, including r-Redundancy, v-Voting, Vote Boosting techniques and the technique that this research will propose. The independent variables will be studied in two level; low task, less complex task level, and high number of tasks, and complex tasks level. Consequently, the dependent variables will be integrity, quality, efficiency as well as throughput. The experiment will be set in such a way that, the tasks set for testing, will have two definitive parameters including the accuracy of the tasks initial states and the number of options available per decision. 8 sets of 100,000 tasks with 3, 4, or 5 options and 75%, 85%, and 95% as the accuracy for the initial set tasks. There are about 4 to 10 decisions distributed normally. The user network or population tested also has two parameters including mean probability for committing errors and for dishonesty. Values of 3%, 6% and 20% are used for both dishonesty and making of errors. These probabilities were distributed exponentially over [0, 1] around their mean values. Simulations for about 40 input-aggregation functions with each one receiving one input are run repeatedly. For this experiment, the proposed quantitative hypothetical design is deemed to be extremely expensive even in the event that only few points in a parameter space are covered. Qualitative Design In this case, this research method will aim at understanding and discovering the perspectives, thoughts and experiences of previous researchers and participants in the same field in order to understand reality, purpose and meaning (Trochim & Donnelly, 2008). The focus will be to review and evaluate literature on previous and current research

Change inovation, exsperimintation and risk Essay

Change inovation, exsperimintation and risk - Essay Example The experts believe that innovation is especially important in today’s globalized world. However, the ability to create, conceive of, and bring to market new innovations is problematic if there is no effective leadership in the organization (Leaders are the major influencers of innovation and change for every organization (Sinar, Wellins, Pacione n.d.). According to Kouzes & Posner (2012), great leaders should be committed to both experiments and risk taking as these activities lead to small wins and enable to gain valuable experience for learning. In this case, small wins are â€Å"concrete, complete, implemented outcomes of moderate importance† (Kouzes & Posner 2012, 190). While taking risks and experimenting people, involved in highly intensive psychological environment, experience a high degree of stress and this experience enables them to cope with stressful and challenging situations in a positive manner. Such a behavior is definitely one of the important qualitie s of effective leader (Kouzes & Posner 2012). Sinar E, Wellins R, Pacione C., (n.d.). Creating the conditions for sustainable innovation. The leadership imperative. The Talent Management Expert. Retrieved from

Sunday, August 25, 2019

Men and women struggle with gender expectations when balancing family Essay

Men and women struggle with gender expectations when balancing family and work - Essay Example The women participation rate increased but still lower than for men. The growth in women participation as put forward by Worell (1182) includes; improved education attainment, declining wages for men, declining family size, liberalization of perception of roles performed by men and women within the family as well as increased cost of living. Men and women take up different jobs at the work place. Most women are employed in the service sector with lowly paid wages and are rarely offered management positions. Men on the other hand, work in sectors that require a lot of skills such as engineering and construction where they are highly paid and also take up senior positions in the organizations. Gender pay gap also exists in the workplace where women are paid less than men in performing the same tasks. This can be attributed to gender stereotyping of roles which also leads to women taking up much workload at home and at the workplace. Women thus encounter more challenges than men while t rying to balance family and work. Gender Gender differences play an important role in determining the challenges faced by men and women in balancing family and work and how the challenges are negotiated. Traditionally, men performed heavy tasks such as hunting and gathering while women performed simple tasks and this continues to impact on their daily lives and modern occupational activities where jobs are offered in line with gender stereotype and role (Powell & Graves, 69). Women also were supposed to take care of their families while the men worked to provide for the family; the men were regarded as breadwinners and the women as care givers. This was attributed to biological factors where men are considered masculine and have good leadership skills. Women on the other hand are feminine in nature hence are caring and nurturing and always want to help others. As a result, women are employed in service sector where they interact with people and help them such as education, health an d as care givers. Men get jobs in sectors such as defense, construction, electrical work and engineering and take up leadership roles just as expected by the society (Powell & Graves, 76). Gender thus plays a role in determining occupational preferences of couples. Gender stereotyping also affects employer’s attitudes towards employees. It affects the HR procedures such as hiring, training and development, and promotion. There are those roles expected to be played by men and others for women and this affects recruitment decisions although discrimination based on gender is prohibited. Some employers view women as having more activities at home and therefore work for shorter time than men hence hindering their training and career advancement and consequently promotion decisions. The much emphasis put on women as homemakers affects their job preference whereby they prefer flexible working schedules and shorter working days as compared to men. Men as breadwinners are supposed to work and hence are accorded much search time for jobs and eventually get well paying jobs. Women on the other hand, have limited time to search for jobs and thus end up in lowly paid jobs and this affects work life balance as they don’t have enough to provide for their families (Powell & Graves, 79). Challenges Men and women are faced with various challenges as they struggle with

Saturday, August 24, 2019

Absence and Presence and the Disintegration of the Space-Time Essay

Absence and Presence and the Disintegration of the Space-Time Continuum in Kar Wais (2006) In the Mood for Love - Essay Example Absence and Presence and the Disintegration of the Space-Time Continuum in Kar Wai’s (2006) In the Mood for Love Kar Wai (2000) uses sound to demonstrate that the absence of the actual faces of the spouses engaged in the affair ironically highlights the presence of their affair and how it ruins their marriage. He does not show what these spouses look like at all, and instead, he uses sound to describe who they are as individuals and as spouses. As individuals, Mr. Chan and Mrs. Chow are always physically separated from their spouses. The first time that the audience sees Mrs. Chow is when she is running hastily across the stairs, while Mrs. Chan is walking on an opposite direction. The sounds of their footsteps sound hollow in the Byzantine stairway. These steps have the tone of loneliness in their singleness. Mrs. Chow is not with Mr. Chow, so there is already a foreshadowing that she will never be actually with her husband as a wife. Lee (2008) argued that invisibility on the film represents the presence of something else that is more important. She cites Brunette (2005) who talked about â₠¬Å"formidable absent preferences† (p.89) in the film and Brofen (1992) who said that the uncanny is shown as mobile because it is a â€Å"situation of undecidability†¦ the uncanny in some sense always involves the question of visibility/invisibility, presence to/absence from sight†.Sound is used to suggest the full meaning of the absence of characters in the film.

Friday, August 23, 2019

What Is The Most Important Virtue For Human Fulfillment Essay

What Is The Most Important Virtue For Human Fulfillment - Essay Example In the same regard, it is interesting to note the work of four prominent thinkers of their respective times, namely: Descartes, Spinoza, Emerson and Tolstoy, a brief discourse of which is presented hereunder. The stance of Rene Descartes on the said issue can be summarized as, "I think, therefore I am" (Descartes, 1641). Now a very popular statement, this means much more than the literal meaning. This can be taken as the essence of the entire philosophy of Descartes, wherein he began to understand himself by virtue of his thought processes. On the same lines, his thoughts can be extrapolated upon mankind as a whole. The fact of the matter lies in the fact, that man cannot achieve fulfillment if he does not think; this, even as a proposition is considered to be impossible according to the stance of Descartes. By virtue of undertaking things, dealing with them, and ultimately being deceived by them, it becomes all the more evident to man that there is a reality that exists. This reality can be identified with, and the highest virtue can subsequently be attained by means of thinking. Contemplation gives insight, and ultimately self-actualization. There can be no better strength than realizing one's true potential of existence. Ethics by Spinoza Spinoza's views advocate, "All our endeavors or desires so follow from the necessity of our nature" (Spinoza, 1677). This concept given by him refers to the identification of the power that the human being yields and associates from within himself. Whatever one might seek or ask, it is basically a product of how one identifies with the concept of self. The most significant virtue here becomes knowing about oneself. A person, who realizes himself, is truly the most potent of all. Desires, passions and restraints of the material world, can only be understood with reference to the person. Therefore, if and when a person appreciates his own personal standing and inception, it subsequently becomes the greatest source of endowment and fulfillment for the person. Self-Reliance by Ralph Waldo Emerson Ralph Emerson here postulates, "Insist on yourself; never imitate" (Emerson, 1841). This again is a propagation of the belief that an individual should at all times try to be what he/she is, and not impose a figure, picture of personality which is not a true depiction of the same. If one has the tendency to falsify one's self-image, then true actualization of self can never be there. To be able to appreciate and attain the highest order of fulfillment, the greatest virtue here would be to not pay heed to social and extraneous challenges, and keep representing one's own personality as it is. If in the face of conflict, one tends to shy away from the true sense of being, then it can never really come out. Under normal circumstances, it is always simple to portray oneself; however, the true test of character is when there is antagonism, and yet still a person can attain virtue by means of beings what he truly is. The Death of Ivan Ilych by Leo Tolstoy Leo Tolstoy deliberates upon the topic in the following way, "In place of death there was light" (1886). Though this may seem ironically contrary to the actual concept of life itself, yet this line answers probably the greatest mystery of life - death. So is the virtue of human fulfillment embedded in death Not exactly; it is in understanding the concept of death. It refers to establishing a belief that this entire struggle in life is death itself, and the absolute moment of death, is just the termination of this struggle. The ultimate attainment in life

Thursday, August 22, 2019

Positive and negative impacts of social networking sites Essay Example for Free

Positive and negative impacts of social networking sites Essay THE POSITIVE PART Social networking Web sites are helping businesses advertise, thus social networking Web sites are benefiting businesses economically. Social networking Web sites are helping education by allowing teachers and coaches to post club meeting times, school projects, and even homework on these sites. Social networking Web sites are enabling advancements in science and medicine. Job hunting Stay in touch with friends Positive causes/awareness THE NEGATIVE PART The very nature of such sites encourages users to provide a certain amount of personal information. But when deciding how much information to reveal, people may not exercise the same amount of caution on a Website as they would when meeting someone in person. This happens because: the Internet provides a sense of anonymity; the lack of physical interaction provides a false sense of security they tailor the information for their friends to read, forgetting that others may see it. Sharing too much information on social networking sites can be problematic in two ways: firstly, it can reveal something about you that you’d rather your current or future employer or school administrator not know, and second, it can put your personal safety at risk. Another potential downside of social networking sites is that they allow others to know a person’s contact information, interests, habits, and whereabouts. Consequences of sharing this information can range from the relatively harmless but annoying—such as an increase in spam—to the potentially deadly—such as stalking. Another great issue of concern with social networking web sites is that of child safety. Read more:  Positive and Negative Effects of Social Media Essay Research has shown that almost three out of every four teenagers who use social networking web sites are at risk due to their lack of using online safety. (Joly, Karine, 2007) A lot of the web sites do have an age requirement but it is easily bypassed by the  lying about of one’s age. Even if they don’t lie about their age the average age requirement is around fifteen years old. Predators may target children, teens, and other unsuspecting persons online—sometimes posing to be someone else—and then slowlyâ€Å"groom† them, forming relationships with them and then eventually convincing them to meet in person In Touch with The World Family living abroad can be kept abreast of the latest happenings in your world as quickly as those living next door. Friends who you haven’t seen since school, and who have since moved away, are able to keep in touch. Social networking sites have made the world a smaller place. Conclusions As with most things in life there are positive and negative sides to social networking, both of which we have now explored. Ultimate belief is that when done in moderation, with checks and balances on how younger people in particular are using them, and with a firm grasp being kept on reality at all time, social networking sites are neither evil or a Godsend. They’re somewhere in between. Social networking isn’t for everyone, but it’s now such a massive part of all our lives, whether we embrace or reject the notion, that it can no longer be ignored. Privacy  Social networking sites encourage people to be more public about their personal lives. Because intimate details of our lives can be posted so easily, users are prone to bypass the filters they might normally employ when talking about their private lives. Whats more, the things they post remain available indefinitely. While at one moment a photo of friends doing shots at a party may seem harmless, the image may appear less attractive in the context of an employer doing a background check. While most sites allow their users to control who sees the things theyve posted, such limitations are often forgotten, can be difficult to control or dont work as well as advertised. Decreased Productivity While many businesses use social networking sites to find and communicate with clients, the sites can also prove a great distraction to employees who  may show more interest in what their friends are posting than in their work tasks. Wired.com posted two studies which demonstrated damage to productivity caused by social networking: Nucleus Research reported that Face book shaves 1.5% off office productivity while Morse claimed that British companies lost 2.2 billion a year to the social phenomenon. New technology products have become available that allow social networks to be blocked, but their effectiveness remains spotty. A False Sense of Connection According to Cornell Universitys Steven Strogatz, social media sites can make it more difficult for us to distinguish between the meaningful relationships we foster in the real world, and the numerous casual relationships formed through social media. By focusing so much of our time and psychic energy on these less meaningful relationships, our most important connections, he fears, will weaken. social networking has become a major part of society. Even big businesses and celebrities are jumping on the social networking bandwagon. Many people wake up each day and check social websites first thing in the morning instead of reaching for a newspaper. According to Mashable.com, as of June 2010, American Internet users spend more than 22 percent of their online time using a social networking site. Since people are spending such a large amount of time surfing social networks, it is important to point out some of the positive and negative effects that social networking can have on a society. Helping Small Businesses Social networking can help small businesses in a big way. Traditional mediums such as print magazine ads and radio commercials can cost thousands of dollars that some small businesses just dont have in a down economy. Social networking allows small business owners to connect with prospects and clients for free, costing nothing but time and energy. Marketers at small companies can post coupons to Facebook groups or run promotions on Twitter. In addition to generating revenue this way, companies also can get positive and negative feedback directly from consumers. Addictive A negative aspect of social networking is that it can be addictive. Spending  too much time on social networking sites can cause people to lose focus on tasks at work or around the house. Social networking needs to be used in moderation. If someone is spending so much time on social networks that they are not sleeping enough hours per night or are ignoring friends and family that want to spend time with them in person, social networking can be a serious problem. Sharing Too Much Another drawback to social networking is that some users are simply sharing too much information. People can lose their jobs or a friendship over leaking information on social networks. Even if a user of a social site has her privacy settings on the highest level, their information can still be passed on by someone on their friends list. It doesnt take much for an angry follower to copy and paste a status or download a picture if they are looking for revenge.

Wednesday, August 21, 2019

Inspectors questions Essay Example for Free

Inspectors questions Essay Eric is not even as caring as Gerald was, he abused his power as a man, taking advantage of her vulnerability and getting her pregnant. He then proceeded to try and make up for his wrong doing by stealing money from his fathers business to help support her. On finding out what he was doing, Eva refused the money and disappeared from Erics life forever.  Mrs Birling was the second to last to have her involvement with Eva Smith revealed by the inspectors questions. Being a lady married to a Birling she had already used her name to have herself made a chairman of a charity committed to helping women in trouble. As a last resort Eva had turned to this charity pleading for help. But after lying to Mrs Birling about her name, instead calling herself Mrs Birling. Mrs Birling was already prejudiced against her case, and made sure that Eva Smith received no help from the charity. She was in a position of social responsibility that she could abuse only thinking about her own name being used unauthorised. Priestly chose a wide range of ways that the Birling family affected Eva Smith, so that the audience could see how many different characters could be affecting someones life forever without their even realising it. These actions are such different scenarios for this encounter, but each has its own significance  The behaviour of each family member was under severe scrutiny by the inspector and the individuals actions were all up for judgement. Sheila for one had her happiness destroyed as well as her faith in her family. Each individual was not only under scrutiny by the inspector but by there family as well. There individual behaviours have an affect on Eva in different ways. Mr. Birling and Sheila left her without any form of occupation or income. Eric and Gerald both got involved with her emotionally and Eric left her pregnant whilst Gerald left her heartbroken. Mrs Birling, at the height of social responsibility, leaves her without a home, support, or any from of income, therefore by now she has no one to turn to and in her own opinion no other options but suicide. The Birling plot is superficial and Priestly has merely used this to alert others and get across his points about social responsibility. The inspector is only on one level, he can be seen as an inspector or on another level their own conscience to help make the family admit they are not perfect and do not think about the consequences of there own actions when interacting with others.  Once the Inspector leaves the house and the Birlings find out he was not a registered inspector, they assume because their reputation has suddenly been taken back to it original state that there is absolutely nothing to worry about. But Eric and Sheila are not so eager to forget and find their parents attitude amazing as well as become concerned that they have not learned anything from this episode. By revealing the involvement of the several characters the theme that social responsibility should not be abused is reinforced.  All other factors such as the inspector and Eva Smith can be forgotten but one fact remains and that is that all of them have been inconsiderate and selfish in their treatment of Eva Smith. Which could easily have resulted how the inspector described, a death by drinking disinfectant on the way to the infirmary.  So, priestly explores the issue of social responsibility using this theme and idea, which is reinforced, by the use of several characters under different circumstances. This play was written in 1945 within a week of world war two ending but set in the year of 1912. This was Priestlys way of expressing a sense of urgency which he thought necessary to pass on to society so that they would not forget what had just transpired and take heed. It is his way of expressing his socialist views.  To explore the issues of social responsibility within this play, Priestly has thought about the plot structure and how he has chosen to set out his dialogue. It is clearly divided into three acts. The first act is the initiation of the play. Its opens and immediately we are told who the characters are, the Birlings, where they are, in a large suburban house, and what they are doing, celebrating the engagement of Sheila Birling to Gerald Croft Gerald I am going to tell you frankly, without any pretences that your engagement to Sheila means an awful lot to me.  We instantly establish that this is a seemingly perfect family that have a good and stable life. There is nothing here to warn us of the shock of the inspectors visit. In this first act we are soon informed a long with the Birlings and Gerald Croft that a young girl, named Eva Smith has committed suicide, by an inspector who arrives shortly after Mr.Birling issues advice to his children and son-in-law to be. Our attention is being focussed in on the Birlings and it also gets us thinking about how they both have affected someone so badly. So it is here that we begin to think about how they both should have been more socially responsible. There is nothing to allow the audience to be distracted from the central theme so there is no sub-plot; it is a very compact structure.

Tuesday, August 20, 2019

Performance Analysis for AD-HEED and N-HEED

Performance Analysis for AD-HEED and N-HEED 4.1 Results and Discussion In this section, we exhibit and discuss the results of the simulation. This section shows the performance analysis for AD-HEED and N-HEED compared to the original HEED protocol. Every result presented is the average of five experiments. The following sections give a detailed description of the experiments and the results. 4.4.1 Network Lifetime The number of alive nodes for each round is observed for AD-HEED and N-HEED compared to HEED protocol to evaluate the lifetime of the network. In the proposed methods and according to the distance between the CH and its anchor, we proposed AD-HEED30, AD-HEED87, N-HEED30 and N-HEED87. 30 and 87 are the distance between the CH and its anchor (dch_to_Anc) where 30 is the cluster radius and 87 is the threshold distance which depends on the environment. According to simulation results, AD-HEED87 and N-HEED87 have the same results for all experiments so N-HEED87 results will not be appeared in any figure. In all of the experiments, the sensor nodes were deployed uniformly. Figure ‎4‑1 shows the performance of HEED protocol compared to AD-HEED and N-HEED. It is observed that AD-HEED87 outperforms HEED and the other proposed methods. AD-HEED87 increases the network lifetime until all nodes consume their whole energy by more than 150 rounds compared with HEED protocol. N-HEED30 also increases the network lifetime by more than 50 rounds until the whole nodes die. Figure ‎4‑1: Number of alive nodes per rounds Figure ‎4‑2 presents how AD-HEED and N-HEED behave with HEED protocol in term of node death percentage. The figure below shows the number of rounds for 10%, 25%, 50%, 75% and 90% of nodes that consume their whole energy. The results show that AD-HEED and N-HEED outperform HEED throughout the network. There is a slight advantage to HEED on AD-HEED30 in 90% of nodes death .The figure shows that for 10% of nodes death, the best choice is AD-HEED30 and N-HEED30 while the best choice for 75% and 90% of nodes death is AD-HEED87. For 25% and 50% of nodes death the best choice occurs with all proposed methods because they are approximately the same. According to both of figures, the results show that our proposed methods outperform HEED. Figure ‎4‑2: Node death percentage per rounds 4.4.2 Energy Consumption Analysis The performance of AD-HEED and N-HEED is compared with that of HEED protocol in term of energy consumption for data transmission between CHs and the base station. Figure ‎4‑3 reveals the ratio of energy consumption for AD-HEED and N-HEED per rounds compared with HEED. Here, the energy consumption is the energy consumed by nodes to transmit data to the base station. According to the listed parameters, the results show that the energy consumption for data transmission between CHs and the base station is approximately 19% from the whole energy in HEED protocol. According to our experiments, we have a network that consists of 200 sensors deployed in 100m Ãâ€" 100m, the base station located away at (200, 200) from the surrounding area and the initial energy for each node is 2 J. The total energy for 200 nodes is 400 J and then the energy consumed to transmit data from CHs to the base station is 76 J (19% of 400 J). The figure below shows that AD-HEED87 is the lowest energy c onsuming and then N-HEED30 and AD-HEED30 respectively which means that all of them consumed energy lower than that consumed by HEED. AD-HEED87 decreases the energy consumption by HEED by almost 47% and this means it consumes 36 J for data transmission. Figure ‎4‑3: The ratio of energy consumption per rounds Figure ‎4‑4 presents the ratio of energy consumption in data transmission in term of node death percentage. The figure below shows the ratio of energy consumption for 10%, 25%, 50%, 75% and 90% of nodes that consume their whole energy. As it is obviously clear from the figure, AD-HEED and N-HEED consume lower energy than HEED throughout the network. AD-HEED87, N-HEED30 and AD-HEED30 are the lowest energy consumption respectively. Figure ‎4‑4: The ratio of energy consumption for AD-HEED, N-HEED and HEED Table ‎4‑2 reveals the improvement of energy consumed for data transmission of AD-HEED and N-HEED on HEED protocol for 10%, 25%, 50%, 75% and 90% of nodes death. The comparison results shown in Table ‎4‑2 depict that AD-HEED87, N-HEED and AD-HEED30 respectively are more energy efficient than HEED throughout the network. It is worth mentioning here that the data transmission energy is the energy consumed to transmit data from CHs to the base station. Table ‎4‑2: Improvement of AD-HEED and N-HEED on HEED protocol 4.4.3 Variance of the Base Station Location In this set of experiments we evaluate how varying the location of the base station could effect on both schemes; AD-HEED and N-HEED in term of network lifetime and energy consumption. Figure ‎4‑5 compares the lifetime of the network of AD-HEED and N-HEED with HEED, where the network lifetime is the time until the first 10% of nodes die and when the locations of the base station are (150, 150), (200, 200) and (250, 250) on x-coordinate and y-coordinate. Similar comparisons are conducted for the network lifetime in term of HND and LNA10% as exhibited in Figure ‎4‑6 and Figure ‎4‑7 respectively. Both approaches improve the network lifetime with different locations for the base station compared to HEED protocol. Figure ‎4‑5 shows that AD-HEED30 is the best choice where the network lifetime is FND10%. Figure ‎4‑5: Comparing HEED with AD-HEED and N-HEED using different locations of the base station for FND10% metric Figure ‎4‑6 and Figure ‎4‑7 show that AD-HEED87 and N-HEED30 prolong network lifetime in term of HND and LNA10% while AD-HEED30 prolongs network lifetime in term of HND and LNA10% while AD-HEED30 prolongs network lifetime in term of HND. Thus, for the application that requires that at least 90% of nodes should work, AD-HEED30 is the best choice and appropriate for improving the network lifetime in term of FND10%. If the demand of the application is to boost the lifespan of the network in term of LNA10%, then AD-HEED87 will be appropriate because they improve the network lifetime in term of LNA10% significantly. Figure ‎4‑6: Comparing HEED with AD-HEED and N-HEED using different locations of the base station for HND metric It can be easily observed form Figure ‎4‑5, Figure ‎4‑6 and Figure ‎4‑7 that if the base station location is farther, the network lifetime will decrease in term of FND10%, HND and LNA10% in AD-HEED and N-HEED. The decreasing of network lifetime is due to consuming more energy to transmit data to the base station. We know that the anchor or CH consumes (k (Eelec + Eamp * dn)) J to transmit k-bit message to the base station where n = 2 for d 0, and n = 4 for d ≠¥ d0. Thus, the distance between the closest node and the base station according to the experiments is greater than 87 (d0) so n = 4 all the time. In other words, whenever the base station was nearer, CHs and anchors will consume less energy to deliver data to the base station and vice versa. This means that the distance between CHs or anchors and the base station is a critical factor which effects on the energy consumption. Figure ‎4‑7: Comparing HEED with AD-HEED and N-HEED using different locations of the base station for LNA10% metric The following three figures present the energy consumed in Joules by HEED, AD-HEED and N-HEED using different locations of the base station. From the figures, it is clear that AD-HEED and N-HEED consume less energy than HEED protocol throughout the network. The energy saving by the proposed method increases as the location of the base station was farther. The explanation of this was aforementioned. It is clear from the figures that the fraction of improvement decreases as we go through the network lifetime. In other words, the fraction of improvement in the energy consumption for FND10% is greater than that for HND and LNA10%. This is due to that in the earlier periods of the network lifetime there are a lot of nodes that not consume their whole energy. Thus, CHs can select the beast node as anchor which is the closest node to the base station. But in the in the later periods of the network lifetime, a lot of nodes die. Thus, some of CHs may not use anchor to transmit data the base s tation or select a node as anchor which not effect on energy consumption impressively. Figure ‎4‑8, Figure ‎4‑9 and Figure ‎4‑10 reveal that AD-HEED87 is the most energy saving and then N-HEED30 and AD-HEED30. Figure ‎4‑8: The energy consumption using different locations of the base station for FND10% metric Figure ‎4‑9: The energy consumption using different locations of the base station for HND Figure ‎4‑10: The energy consumption using different locations of the base station for LNA10% metric 4.4.4 Variance of the Number of Sensors We also evaluate the effectiveness of increasing number of the nodes on both methods; AD-HEED and N-HEED. Figure ‎4‑11 compares the lifetime of the network of HEED to AD-HEED and N-HEED, where the network lifetime is FND10% and when the number of nodes is varied between 150, 200, 250 and 300 nodes. Identical comparisons are conducted for HND and LNA10% as depicted in Figure ‎4‑12 and Figure ‎4‑13 respectively. Both methods improve the network lifetime as the number of nodes increases. The figures show that, in almost all cases, AD-HEED and N-HEED performs better than HEED. This improvement is also due to using the anchor as intermediate between CHs and the base station. This increases the network lifespan and decreases the energy consumption. The figures show that AD-HEED30 outperforms the others in term of FND10% while AD-HEED87 outperforms the other in term of LNA10% as the number of sensors increases. AD-HEED87 and N-HEED30 are approximately the same with a slight advantage to AD-HEED87 in term of HND. Figure ‎4‑11: Comparing HEED with AD-HEED and N-HEED using different number of sensors for FND10% metric Figure ‎4‑12: Comparing HEED with AD-HEED and N-HEED using different number of sensors for HND metric Figure ‎4‑13: Comparing HEED with AD-HEED and N-HEED using different number of sensors for LNA10% metric The following three figures present the energy consumed in Joules by HEED, AD-HEED and N-HEED using different number of sensors. Figure ‎4‑14: The energy consumption using different number of sensors for FND10% metric It is obviously clear that AD-HEED and N-HEED are more energy efficient because they consume less energy than HEED protocol in all experiments throughout the network. It can be easily observed form the figures that the percentage of improvement is almost the same when the number of the nodes increases. So, the proposed methods doesn’t affect by varying the number of sensors. Figure ‎4‑15: The energy consumption using different number of sensors for HND metric Figure ‎4‑16: The energy consumption using different number of sensors for LNA10% 4.4.5 Results Analysis In HEED protocol, each sensor gathers data and forwards it to its CH. CHs in turn aggregate data from sensors and transmit it to the base station which located far away from the surrounding area. CHs consume their energy during data aggregation from sensors, data compression per signal and forwarding them to the base station. Where ET is energy consumed for transmission of K bits for distance d, ER is energy consumed for receiving, Eelec is energy consumed by the sensor node circuit, Eamp is the energy consumed by amplifier and Efus is the energy consumed for data fusion. Our proposed technique focuses on data transmission between CHs and the base station. The energy consumed by CH to transmit data to the base station directly (EnDir) represents a certain percentage of the whole energy. This percentage differs according to many factors such as the base station location, number of sensors and etc. the energy consumed for direct data transmission is calculated as the following: EnDir = EnCH_to_BS EnCH_to_BS = The energy consumed to transmit data to the base station indirectly via anchor (EnIndir) is calculated as the following: EnIndir = EnCH_to_Anc + EnAnc_to_BS EnCH_to_Anc = (1) EnAnc_to_BS = + (2) Where n =2 if d 0 or n = 4 if d > d0. The energy of (1) is consumed for transmission data to the anchor by CH while the energy of (2) is consumed for receiving data from CH and forwarding it to the base station by anchor. In AD-HEED, CHs transmit the collected data to their anchors if EnDir > EnIndir and anchors in turn transmit data to the base station. Otherwise CHs transmit the gathered data to the base station directly. In N-HEED and in addition to AD-HEED, the current anchors transmit the gathered data to the next anchors if EnDir > EnIndir and the next anchors in turn transmit data to the base station. Otherwise the current anchors transmit the gathered data to the base station directly. Figure ‎4‑17shows the detailed description of how can transmitting data via anchors reduce the energy consumption. If we assume that the point a is the CH, d is the base station and b, c and e are hypothetical points that located in the CH’s transmission range which represented by a circle. The deployment field is 100m x 100m and the base station located away at (200, 200) m from the network field. The transmission range is 30 (cluster radius). ac = ab = 30. ad is the distance between CH and the base station while bd, cd and ed are the distances between the points b, c and e respectively and the base station. According to our proposed technique, CH selects the closest sensor to the base station to be its anchor and it should be closer than CH itself. Firstly, we assume that the distance between the base station (d) and point (c) is equal to the distance between the base station and CH (a). After that, we reduce the distance cd by moving the position of point c and calculate the energy consumed to transmit one byte from CH (a) to the base station directly (EnDir) and the energy consumed to transmit one byte from CH to the base station indirectly (EnIndir) via point (c). This operation repeats many times until EnDir > EnIndir. The same operations are conducted with point (b). After testing and calculation and by assuming that c, b and e are sensors, we get that cd and bd are the maximum distances while ed is the minimum distance in which sending data to the base station indirectly via sensors c, b or e consumes less energy than sending data directly from CH to the base station. Now, we can see that for any sensor located in the gray zone in the circle and has a distance to the base station less than the maximum distance, transmitting data from CH to the base station via any of these sensors will consume less energy than energy consumed by transmitting data from CH directly to the base station. Figure ‎4‑17: The mechanism of sending data via anchors Chapter Two: Conclusions and Future work 5.1 Conclusions In this research, we proposed an efficient mechanism for hierarchal protocols of wireless sensor networks which proved to be more efficient in the use of energy than HEED protocol in most cases. The main contribution is to allow CHs to transmit data by using other sensors called anchors as intermediates which are closer to the base station than CHs. Furthermore, this approach reduces the burden from the CHs which consume their energy by collecting data from sensors and forwarding them to the base station. The sensor which has the collected data compares between the energy consumed in case if it transmits data directly to the base station and if it transmits data indirectly to the base station via its anchor. After that, the sensor decided either to transmit data directly or via anchors to the base station base on way that consumes less energy. We compared and evaluated the proposed approach performance with the HEED protocol in terms of network lifetime and energy consumption. Simula tion results depict that the proposed methods which called AD-HEED and N-HEED perform better than HEED. The improvement percentage relies on the best choice of the distance between the CH and the anchor, the evaluation metrics and the properties of the wireless sensor network. This improvement is because of that the sensor consumes much less energy when they transmit data to sensor closer than another. We know that the CH consumes (k (Eelec + Eamp * dn)) J to transmit k-bit message to the base station. If the distance between CH and the base station less than threshold distance, the energy consumption equation is calculated by using distance to the power of 2 otherwise, to the power of 4. So, the energy consumption is decreased by using anchors which allow sensors to transmit data via short distances until all data received by the base station. According to simulation results, the distance between CH and the base station is very critical factor which effects on the network lifetime and energy consumption .Furthermore; we also conduct a performance evaluation between our proposed approach and HEED protocol by using different number of sensors and different locations of the base station. The simulation results show that the variation in the number of sensors doesn’t affect significantly on the percentage of improvement. The simulation results show also that the percentage of improvement decreases as the location of the base station was farther because the sensors consume more energy whenever transmitting data over long distances. 5.2 Future Work Though considerable effort has been made on this thesis, many ideas regarding the subject are still not investigated. This section outlines and presents some of our future plans to be conducted in order to improve this work. The choosing of anchors in our approach depended entirely on the distance between the sensors and the base station where CHs choose the closest sensor to the base station. We think to make the choosing of anchors more controlled by taking into account different conditions and other related parameters such as the residual energy, the positions of the nodes and the received signal strength. The collected data by sensors is transmitted by CHs to one base station. This assumption is similar to that in HEED protocol. For scenarios where there are more than one base station located in different locations, each CH should transmit data to the suitable base station. Thus, studying how our proposed approach behaves with these scenarios is a very good idea to be conducted for future work. Finally, the energy consumption and network lifetime are the only performance metrics that are used to evaluate our proposed approach. Using other performance metrics such as throughput, latency and packet delivery ratio to evaluate the proposed approach is a good idea to be conducted for future work.

The Search for a Better Reality Essay -- Comparative, Kidd, Chrouch

The Search for a Better Reality Life is not easy. It is all about surviving the storms that you will eventually have to face. As a result, sometimes people feel overwhelmed, and they try to find ways that will allow them to break away from reality. In most cases, individuals resort to escape either because they want to be relieved from all of their responsibilities, or because they are trying to avoid facing unpleasant truths or painful situations. Everyone deals with tough circumstances in a different way. For example, some folks try to avoid problems and painful facts in their lives by drinking, or even doing drugs. They know that using these substances will not solve their problems, but it will buy them some time free of stress and troubles. In addition, other people attempt to find some kind of shelter, where they can feel safe and be happy even if it is doesn’t last long. Overall, these behaviors allow individuals to escape from everything that is too hurtful, or hard for them to deal with. Everyone at some point in their lives has felt the need to escape. Take, for example Sue Monk Kidd’s novel The Secret Life of Bees or Katie Crouch’s Men and Dogs. The Secret Life of Bees is about a young girl named Lily Owens, who searches for answers to her mother’s death, while Men and Dogs talks about a now grown woman named Hannah Legare that is looking for answers to her father’s disappearance. Both of these novels focus on characters that constantly try to get away from difficult situations, or even reality itself. Also, in these works of literature, the protagonists try to escape from the truth. Yet, in contrast, they both eventually realize that facing the facts is much more liberating than avoiding them. Thus, clearly th... ... everyone’s grief in her back, which made her life unbearable. Finally, June tries to avoid getting hurt and potentially losing her freedom by declining Neil’s marriage proposals. In the same manner, Hannah’s brother in Men and dogs tries to escape from dealing with his father’s death, and the fact that he was homosexual by doing drugs (pg. 91). In conclusion, the rhetors of both The Secret Life of bees and Men and Dogs provide multiple examples of the elaborate escape mechanisms that were employed by the characters in these narratives. Through these examples, they show that avoiding problems and hurtful situations only makes people’s lives more miserable. Thus, Sue Monk Kidd and Katie Crouch want individuals to realize that accepting the truth, no matter how bitter it might be, is the only thing that will allow them to move on with their lives, and be happy.

Monday, August 19, 2019

Natality, the Capacity of Being Oneself, and a Ban On Instrumentalization :: Ethical Issues

In modern day society with our rapid development of scientific capabilities, Jurgen Habermas raises our awareness on developing biotechnology and human genetic engineering. He brings up a question pertaining not only to morals, but ethics of this newly developed technology. In this section of the book Habermas agrees that although some forms of genetic manipulations are morally acceptable for screening to rule out diseases, some unbalanced influences threaten future humans and the status of authenticity. However, the problematic character is the moral convictions and norms that situates in forms of ‘being’, which are reproduced through the members’ communicative action. First of all, natality is the production or birth rate of new individuals. Habermas interprets Hannah Arendt that, â€Å"every single birth, being invested with hope for something entirely other to come and break the chain of eternal recurrence, is to be seen in the eschatological light of the biblical promise: â€Å"a child has been born on to us† (H 58). Eternal recurrence also called eternal return per Nietzsche is the life you now live it and have lived it. Eternal recurrence implies a new morality-cheating life of its death. Each time a child is born, so is a new life history. Unfortunately, natural fate is essential for the capacity of being oneself and so the body doesn't lose its worth and feelings of authenticity. Ultimately, the modified person of a suffered socialized fate would see his â€Å"self† slip away and would not be the â€Å"author† of the decisions that affect their lives (H 59,60). It is a false belief that humans desire good things ( Socrates). â€Å"To avoid this, we can achieve continuity of a life history only because we may refer, for establishing the difference between what we are and what happens to us beyond socialization† (H 60). In addition, the capacity of being oneself or authenticity assumes we are inexchangeable. It is for this â€Å"capacity of being oneself† that the â€Å"intention of another person† and trading upon our life history through genetic programs might primarily turn out to be disruptive† (H 57). It fails universalizability test. It is like science is playing God and humans are disposable. Birth constitutes a beginning we should and cannot control. â€Å"No man could be master of himself, except of God's bounty, he was wise enough already to know where the gift came† (L, Augustine 46). Natality, the Capacity of Being Oneself, and a Ban On Instrumentalization :: Ethical Issues In modern day society with our rapid development of scientific capabilities, Jurgen Habermas raises our awareness on developing biotechnology and human genetic engineering. He brings up a question pertaining not only to morals, but ethics of this newly developed technology. In this section of the book Habermas agrees that although some forms of genetic manipulations are morally acceptable for screening to rule out diseases, some unbalanced influences threaten future humans and the status of authenticity. However, the problematic character is the moral convictions and norms that situates in forms of ‘being’, which are reproduced through the members’ communicative action. First of all, natality is the production or birth rate of new individuals. Habermas interprets Hannah Arendt that, â€Å"every single birth, being invested with hope for something entirely other to come and break the chain of eternal recurrence, is to be seen in the eschatological light of the biblical promise: â€Å"a child has been born on to us† (H 58). Eternal recurrence also called eternal return per Nietzsche is the life you now live it and have lived it. Eternal recurrence implies a new morality-cheating life of its death. Each time a child is born, so is a new life history. Unfortunately, natural fate is essential for the capacity of being oneself and so the body doesn't lose its worth and feelings of authenticity. Ultimately, the modified person of a suffered socialized fate would see his â€Å"self† slip away and would not be the â€Å"author† of the decisions that affect their lives (H 59,60). It is a false belief that humans desire good things ( Socrates). â€Å"To avoid this, we can achieve continuity of a life history only because we may refer, for establishing the difference between what we are and what happens to us beyond socialization† (H 60). In addition, the capacity of being oneself or authenticity assumes we are inexchangeable. It is for this â€Å"capacity of being oneself† that the â€Å"intention of another person† and trading upon our life history through genetic programs might primarily turn out to be disruptive† (H 57). It fails universalizability test. It is like science is playing God and humans are disposable. Birth constitutes a beginning we should and cannot control. â€Å"No man could be master of himself, except of God's bounty, he was wise enough already to know where the gift came† (L, Augustine 46).