Wednesday, October 30, 2019

ETHICS (Effective Technical and Human Implementation of Essay

ETHICS (Effective Technical and Human Implementation of Computer-supported Systems) Coursework Assignment Case - Essay Example There are only slightly differentiations made on the initial booking system – as being established in the firm in 1998. Now, 10 years after the weaknesses of the specific system have become obvious. The system does not include features that allow its users to proceed fast with each booking. As a result delays are noticed in the completion of bookings in the firm’s various departments. A new booking system is required the soonest possible. Current booking system is also unable to help the firm’s employees with the cross references in data held in the central database. As a result, important details on the clients’ health are often ignored. The main reason for the system’s failure is believed to be the fact that there is only one central point of booking – established in the booking office. However, the computers in the firm’s various departments should also offer access to the clients’ booking details – there is no way for the firm’s employees to be informed on existing bookings. Delays in the process of the clients’ booking details are also a common phenomenon with the firm’s current booking system. The improvement of the firm’s booking process could be achieved only by the replacement of existed system – by an appropriately customized IS. The main features of the suggested system will be: a) all the firm’s computers will have access to the booking details of the firm’s customers – in case that there is a need for changing these details then this task will be performed through the computer of the firm’s booking office, b) reports will be delivered for the firm’s employees, c) there will be no issue of delivering a false report on client (cross – reference of data). The performance of the new system will be based on specific criteria. The production of accurate reports on the

Monday, October 28, 2019

Product Life Cycle Concept Essay Example for Free

Product Life Cycle Concept Essay Michael Porter’s framework of competitive analysis is applicable to our business organization known as D.T.DOBIE TANZANIA LTD which falls under the automobile industry in Tanzania and worldwide in the following ways: A.Barriers to entry/threat of new entrants. Its true that the average person cant come along and start selling brand new cars. The emergence of foreign competitors with the capital, required technologies and management skills began to undermine the market share of brand new car sellers. The following factors are barriers to automobile seller’s new entrants: * Knowledge and Technology Ideas and knowledge of servicing its supplied products is the one that provides competitive advantage to D.T Dobie over others. D.T Dobie uses machines of highest technology on checking and servicing its cars in which, gives them power to provide guarantee of up to one year service to its product since they are assured of what they are doing. The machines used by the skilled labor of D.T Dobie to service and check the product are of high quality and they are very expensive in such a way that for new entrants firm in that business its an ownership barrier. * Access to distribution The demand for brand new cars in Tanzania is very low since they are sold at price that individual can’t afford. D.T Dobie is a greater supplier of brand new cars to Tanzania government institution, most United Nations (UN) organizations such as UNICEF, ILO, UNESCO, representative’s offices in Tanzania and embassies offices. Since these agencies are the most buyers of brand new cars, it has made D.T Dobie to have almost the access to distribution channel of selling brand new cars in which this act as barrier to new entrants since the buyers are few. * Cost of entry Initial capital required to set up a new firm is very high, it makes the chances of new entrants to be very less. * Product differentiation and cost advantage The product has to be different and attractive to be accepted by the customers. D.T Dobie is the greater seller of brand new NISSAN, MITSUBISHI, MERCEDES BENZ, HONDA and HYUNDAI in which made them different from its competitor since it sells many brands than others. By being supplier of government cars has made them to be exempted when importing cars for government institution uses. B. Bargaining power of suppliers: The bargaining power of suppliers is also described as the market of inputs. Suppliers of raw materials, components, labor, and services (such as expertise) to the firm can be a source of power over the firm, when there are few substitutes. Suppliers may refuse to work with the firm and also may charge excessively high prices for unique resources. For organization of our choice i.e. D.T Dobie its suppliers for motor vehicles are TOYOTA, NISSAN, MITSUBISHI and MERCEDES BENZ. D.T Dobie is the seller of brand new car in Tanzania where by its inputs i.e. imported new cars from great multinational companies are so important for its survival, this leads the suppliers having great power over D.T Dobie since it’s not manufacturer but the buyer of finished product. Increase in production cost to one of suppliers on specified product may lead to switching cost which will be relative to D.T Dobie switching cost. Degree of differentiation of inputs: D.T Dobie supplier’s supply different brands in which is difficult for them to switch from one supplier to another. For example if they are required by its customers i.e. government to supply cars that’s engine capacity is V8 that pushes them to deal with TOYOTA since other suppliers are not producing cars with that engine capacity. For parts suppliers, the life span of an automobile is very important. The longer a car stays operational, the greater the need for replacement parts. On the other hand, new parts are lasting longer, which is great for consumers, but is not such good news for parts makers. C. Bargaining power of customers: Buyers refer to the customers who finally consume the product or the firms who distribute the industry’s product to the final consumers. Bargaining power of buyers refer to the potential of buyers to bargain down the prices charged by the firms in the industry or to increase the firms cost in the industry by demanding better quality and service of product. Since our organization of our choice D.T Dobie supplies and sell brand new cars in Tanzania, its customers are few since who can afford to buy brand new cars are government institution, most united nations (UN) organizations such as UNICEF, ILO, UNESCO, representatives offices in Tanzania, embassies offices and individuals who can afford to do so. Since its customers only want quality and guaranteed products this act as driving force to D.T Dobie to supply not only quality products but also quality parts and servicing those cars for the whole year as guarantee after being sold out. Since D.T Dobie is greater supplier of brand new NISSAN, MITSUBISHI, MERCEDES BENZ etc. cars in Tanzania availability of substitute products such as FORD, RANGE ROVER, LAND ROVER which are supplied by its competitors like CMC motors and sold at same or at lower price than D.T Dobie’s have made some of its customers to shift to those brands as it’s known customers are very sensitive to price. Most of those mentioned above customers purchase in large quantities. They have full information about the product and the market. They emphasize upon quality products. They pose credible threat of backward integration. In this way, they are regarded as a threat. D. Threat of Substitute Products: Substitute products are goods or services from outside a given industry that perform similar or the same functions as a product that the industry produces. Rather than looking at the threat of someone buying a different car, there is also a need to also look at the likelihood of people taking the bus, train or airplane to their destination. When determining the availability of substitute’s time, money invested, personal preferences and convenience in the auto travel industry should be considered. D.T.Dobie should consider the following factors when analyzing this force: * Price Band The threat that consumer will switch to a substitute product if there has been an increase in price of the product or there has been a decrease in price of the substitute product. If the price of the cars sold by D.T.Dobie will increase the main expected customers i.e. the one switching from bike to car will not move to car and will remain in the bike only. Thus the price is kept checked in this manner. * Substitutes performance The performance of the substitute sector also plays an important role in the success of the business. If the price of other dealers such as Africariers increases or the price band of the small segment falls, it will have effect on the quantity required in the market. It’s just on the price but also the features and the other services associated or it may be the status symbol story. * Buyers willingness Products with improving price/performance tradeoffs relative to present industry products. It will determine the willingness of the buyer to buy from D.T.Dobie.The willingness of the customers to go forward to try the new product in the market such as Mercedes Benz reduces the threat from substitute products. E. Competitive Rivalry: This force analyses the level of competition between existing players in the industry. Because an industry’s firms are mutually dependent, actions taken by one company usually invite competitive responses. Thus in many industries firms actively compete against one another. Highly Competitive industries generally earn low returns because the cost of competition is high. The auto industry is considered to be an oligopoly (a market condition in which sellers are so few that actions of any one of them will materially affect price) which helps to minimize the price-based competition. Below are factors which are seen in this force: * Price Competition Advertising battles may increase total industry demand, but may be costly to smaller competitors. Products with similar function limit the prices firms can charge. Price competition often leaves the entire industry worse off.. * Product Quality Increasing consumer warranties or service is very common these days. To maintain low cost, companies consistently has to make manufacturing improvements to keep the business competitive. This requires additional capital expenditure which tends to eat up companys earning. On the other hand if no one else can provide products/ services the way you do you have a monopoly. D.T.Dobie enjoys the monopoly of selling new cars are there are no competitors in this segment. * Unique Selling Point Also D.T. Dobie has advantage over its rivals because it represents a premium brand which is recognized over the world, they found a niche in the market where have a leading brand like Mercedes-Benzes a and a brand which people aspire to own .Also they are lucky to have Nissan one of the most renowned Japanese brands which is an equal pillar of their business. * Expansion DT Dobie is looking to grow and move forward, both in its native Tanzania and in surroundings regions. By building strong relationships and working closely with strategic partners, DT Dobie’s footprint keeps on growing. Also they are expanding by appointing more dealers around the country. * Investment In terms of investing in our own equipment, this takes priority; they put all eyes on technology so they are not behind the rest of the world. Even if the latest technical advancement s are available to the company, DT Dobie makes sure any investment is benefiting to the organization as a whole .Every five years D.T. Dobie has an equipment review which makes sure the company is on right track, ensures investments have been successful and assesses whether upgrades need to be made in order to reach the next level, they are absolutely up to date. Also ensures that its vehicle testing equipment has modern standards which outnumber it from its rivals. CONCLUSION: In general, any CEO or a strategic business manager is trying to steer his or her business in a direction where the business will develop an edge over rival firms. Michael Porters model of Five Forces can be used to better understand the industry context in which the firm operates. Porters Five Forces model is a strategy tool that is used to analyze attractiveness of an industry structure. Porters Five Forces model views the business from inside and outside. It focuses on assessing competitive position within the industry.

Saturday, October 26, 2019

Cooperative Learning in Mathematics Essay -- Math Education Learn Educ

Cooperative Learning in Mathematics There have recently been many new trends towards the use of cooperative learning in many classrooms, particularly in mathematics classrooms. Cooperative learning involves students working together to accomplish shared goals. In this type of situation, students must feel they can only reach their learning goals if the other students in their group also reach their own learning goals. Students have to understand their achievements are interrelated. Cooperative learning helps students to fully understand the mathematical concepts and assists them in developing social skills that will take them through life. There are different methods of teaching, in addition to cooperative, such as competitive and individualistic. In competitive learning, students are graded on a curve, which means they have to work against each other and try to work faster and more accurately than their fellow students. In individualistic learning, students work towards goals that are separate from their peers. When working on their own, they can work on their own pace, and work for their own set of goals. (Johnson 104). When using cooperative learning, it includes characteristics of both individualistic and competitive learning. In order for a cooperative learning environment to be most effective, there needs to be group rewards along with individual accountability. When each individual succeeds in their group, the group is rewarded; this prevents certain students from dominating the work. There are different methods for cooperative learning that incorporate individual and group rewards. One such method i s Student Teams– Achievement Divisions (STAD). With motivation to win, the groups compete ag... ...athematics. The students develop social skills and learn to work as part of a group. This greater understanding of mathematics and the social skills will stick with the students for the rest of their life. Works Cited Bol, Linda, Nunnery, John A., and Whicker, Kristina M. â€Å"Cooperative Learning in the secondary mathematics classroom.† The Journal of Educational Research. Sept./Oct. 1997. (p. 42-8). Leiken, Roza, and Zaslavsky, Orit. â€Å"Cooperative Learning in Mathematics.† Mathematics Teacher. March 1999.(p. 240-6). Lew, Marvin and Mesch, Debra. â€Å"Isolated Teenagers, Cooperative Leanring, and the Training of Social Skills.† The Journal of Psychology. (p. 323-333). Johnson, David W., and Johnson, Roger T. â€Å"Using Cooperative Learning in Math† Teaching and Learning Middle Grade Mathematics.-Student Resource CD. Key College Publishing. 2004.

Thursday, October 24, 2019

Screen Adaptations of Classic Literature Should Always Remain True to The Details of The Original Novel. :: essays research papers

There are many issues involved with adapting a classic novel for the small screen, but probably the most important of these is the degree of loyalty the adaptation should make with the original novel. For a director it is almost impossible to remain perfectly loyal to the novel. For instance,around the time of the first director, David Lean, filmmaking had not advanced to such a stage for it to be possible to, as shown in the book, animate the roots of a tree to look like dead people’s hands. Another problem in directly adapting the novel is that there is simply not enough time to include all the details of a book into a small length of time. Many directors today find this difficult and have to resort to leave out large, but usually unneeded, parts of the novel. The first adaptation of Great Expectations was directed by David Lean. Shot in 1946 this adaptation was in glorious black and white. It would have been possible to shoot the adaptation in colour, but possibly budget issues might of occurred as colour filming was a new innovation and still quite expensive. The adaptation starts with the view of a large, leather-bound book entitled, â€Å"Great Expectations†. The book opens and a voice over reads the first few lines describing the character Pip. The voiceover is obviously a grown-up Pip reading. Wind sound effects are heard and the book’s pages are blown over and over until the scene fades to Pip running into the graveyard. The rest of the scene remains true to the book almost exactly. The lighting is dark, to portray the time of dusk and this gives the scene a mystifying feel because you cant quite see all of the set. Close-up shots and over-the-shoulder shots are used to portray Pip’s and Magwitch’s feelings. Panning shots are also sometimes used, not only to show the surroundings, but to also convey how the graveyard is getting darker. In conclusion, David Lean took the â€Å"faithful to the book† route when he directed the adaptation of Great Expectations. The next adaptation was drected by Julian Amyes in 1981. Between Lean’s adaptation and Amyes’ adaptation, there had been countless stage performances of Great Expectations. This mean that most of the population knew of the story of Great Expectations. To ensure that Ames’ adaptation went down in history and wasn’t forgotten, Amyes had to make a few changes to the story.

Wednesday, October 23, 2019

M&M’s Case Study Essay

1. Introduction and Background The major purposes of effective leadership and management consist in timely monitoring of organisational environment, development of adequate responses to environmental challenges and further strategic planning and changes[1]. Relevant leadership strategies and implications can solve numerous business challenges and help organisations to overcome diverse external as well as internal pressures and crises[2]. This strategic report is aimed at the identification of the key business challenges of M&M’s through external and internal analysis and further development of solutions and specific recommendations on how effective leadership can meet these challenges in this organisation. M&M’s is a popular confectionary brand, which belongs to Mars Incorporated. The brand’s name is an abbreviation for its creators such as Mars and Murrie. The main products of M&M’s are chocolate and peanut colourful candies with the letter ‘m’ on one side[3]. The product was firstly launched during the World War II, and the main customer of M&M’s was the US army. In 1980, the firm began its foreign market expansion[4]. Nowadays, Mars Inc., the parent company, is one of the biggest confectionery manufacturers in the world. M&M’s chocolate beans are sold in more than 70 countries around the world. The company employs more than 40,000 people all over the globe. It should be noted that M&M’s is a private firm, which started from a family business. In 2010, total revenue of the parent company, Mars, constituted $30 billion[5]. M&M’s uses flat organisation structure, which makes the company very responsive to the needs of its em ployees as well as customer. The main competitors of M&M’s are Hershey, Nestle, Cadbury and Kraft Foods[6]. M&M’s business strategy consists in maintaining high quality of the production alone with high volume and low prices. 2. Environment Monitoring Research and development (R&D) department has always been of great importance for M&M’s. It has been mentioned in the background that multi-level efficiency is one the main principles of the firm. To achieve this efficiency, the company relies on its own market research and general industry publications and analyses[7]. The company’s success formula consists in in-depth customer engagement practices, through which tastes and preferences of customers are studied and analyses. For instance, in 2002, M&M’s monitored customer environment through the internet survey method, when the target population was proposed to select a new colour if candies. As a result, purple candies were added to M&M’s production[8]. Furthermore, it should be noted that in the early 2000s, the external environment began to rapidly change. In response, M&M’s needed to develop adequate measures and strategies in order to remain competitive the market. In this case, M&M’s decided to implement the ‘launch and learn’ approach, which can be considered another successful method of monitoring the environment[9]. As a result, ‘My M&M’s’ brand was introduced to the customers. The main idea of the new brand consisted in customisation. Customers could order chocolate beans, but instead of the letter ‘m’, they could request their names or even images. In-depth market research and monitoring were also made after the launch of the new sub-brand. The new product turned out to be successful and appreciated by customers. In addition, it should be noted that M&M’s uses the benchmarking method when new marketing strategies are tested in smaller focus groups[10]. 3. External and Internal Analysis In order to understand external environment of a company, the PESTEL framework is frequently implemented. It should be noted that PESTEL is an acronym, which stands for political, economic, social, technological, environmental and legal environmental factors[11]. Political †¢ M&M’s sells its chocolate beans in more than 70 countries all over the world[12]. If the government of a country is unstable, it can negatively affect the firm and its sales. For instance, quotas on imports and other restrictions may be introduced. In these conditions, M&M’s will be able to bring only a specific amount of chocolate beans to the local market. The main examples of such countries are Serbia, Thailand, China, etc.[13]. †¢ The main M&M’s markets of presence are the US and the UK, which are characterised by low political risks[14]. Economic †¢ The global economic crisis has negatively affected customers’ buying capacity. However, it should be mentioned, that chocolate beans are a fast-moving consumer good. Thus, it can be sold quickly even during economically pressing times and at low prices unlike cars and electronics, which are durable and high-priced commodities[15]. †¢ As a multinational company, M&M’s opens new factories in different countries. The company hires employees and helps to decrease unemployment in developing economies such as Brazil, Kazakhstan, Mexico, etc. In turn, M&M’s also suffers from unemployment and other macroeconomic conditions in these economies. †¢ The market has reached maturity yet, neither in the US, nor in other countries[16]. Social †¢ The company produces chocolate beans, which are demanded by wide categories of buyers, from kids to adults. †¢ The company’s products are very popular with special events such as weddings and birthdays. †¢ The public is worried about the quality standards used in the company[17]. Technological †¢ Contemporary marketing strategies require from M&M’s using online sales and online customer involvement. Customer engagement marketing methods are also required where the internet serves as the playground[18]. Environmental factors †¢ Chocolate beans production cannot be classified as highly damaging to the environment and employees’ health. †¢ However, M&M’s depends on the production of cocoa beans and weather conditions in which they are cultivated. Such input material as cocoa beans are unlikely to run out[19]. Legal factors †¢ M&M’s has to follow the regulations of the US Department of Agriculture (USDA), Environmental Protection Agency (EPA) and Food Drug Administration (FDA) on the chocolate candies production[20]. †¢ M&M’s has to follow the legislation in all countries where it operates. †¢ M&M’s has to protect its employees’ rights and freedoms. The next step of environmental scanning is SWOT analysis. This analytical framework will help to identify the company’s internal, including strengths (S), weaknesses (W), opportunities (O) and threats (T)[21]. The SWOT analysis also helps to determine whether the company’s resources and capabilities are enough to compete with other organisations in the marker[22]. Strengths †¢ Strong and well-known brand name; †¢ Belonging to the family of the largest confectionary firm; †¢ M&M’s operates in over 65 countries around the globe[23]; †¢ Good reputation among customers and suppliers; †¢ High operational efficiency; †¢ High-quality products[24]; †¢ M&M’s chocolate beans are the best selling candies in the market; †¢ New brand ‘My M&M’s’, which offers customisation; †¢ Strong leadership and teamwork; †¢ Good resource allocation; †¢ Ability to listen to employees’ and customers’ ideas[25]. Weaknesses †¢ M&M’s promotional campaigns require considerable funding; †¢ Employees are resistant to change; †¢ Complex business environment, which causes interest conflicts; †¢ Flat organisational structure has some disadvantages. For example, one employee may have a few bosses. Furthermore, this structure type may limit the company’s growth. †¢ Mars Incorporated was criticised for contracting with low-cost African suppliers of cocoa beans, who used child labour[26]; †¢ Lack of innovative ideas and no recent innovations in the product range. Opportunities †¢ Further market expansion; †¢ Wider diversification of products in the foreign markets; †¢ To meet customer demand; †¢ Technology improvement and development[27]; †¢ Innovation; †¢ Creation of brand-new goods; †¢ Elimination of disadvantages related to flat structure[28]. Threats †¢ Lack of innovations can cause shifts in consumer tastes. To be more specific, customers can stop buying old and outmoded candies and start buying new candies with innovated product and package design. †¢ The number of competitors may increase[29]; †¢ Further growth of trade barriers; †¢ Decrease in consumer demand; †¢ M&M’s rivals’ innovated design can give competitive advantage. The Cultural Web analysis helps to see a more comprehensive and bigger picture of the company’s culture[30]. The framework consists of 6 separate dimensions, which are stories, symbols, power structures, organisational structures, control systems and rituals and routines[31]. Stories Mars Incorporated, the owner of M&M’s, is one of the greatest examples of the so-called ‘American dream’ realisation. Founded in 1911, Mars became a multi-national company with more than 50,000 employees very quickly. Workers of the firm are viewed as the most valuable asset. This idea is one of the main company’s focuses. Employees work in a highly motivating and inspiring environment[33]. They are given bonuses for coming to work on time, which stimulates their performance and productiveness[34]. Symbols Small panned chocolate candies covered with coloured edible shell, which does not allow chocolate to melt in one’s hands, prove to be the major symbol of the company. Furthermore, the letter ‘m’, which stands for M&M’s name is a highly recognisable symbol. In addition, excellent quality and great taste have made M&M’s the world’s best selling candies[35]. Power Structure Mars Incorporated, the parent company of M&M’s, was established as a family business. It was founded by Frank Mars in 1911 in Tacoma. Today, John Mars, a grandson of Frank Mars, is the chairman of the company. Paul Michaels is the company’s CEO at the moment. All the serious decisions in the company are made by the members of the Mars family[36]. Middle managers are given less power in the organisation. They are responsible for ‘insider’ management, and do not participate in taking strategic decisions. Organisational Structure The company has a flat organisational structure. This means that the number of intermediates between top managers and employees is reduced to a minimum. Hence, the role of middle managers is nearly eliminated[37]. Employees are actively involved the corporate decision-making process and can easily access the senior management. This type of organisational structure allows improving communication between management and workers. The company is teamwork oriented, which is another benefit of the flat structure type[38]. Control Systems It has been mentioned that one of the major corporate values and principles in Mars and M&M’s is efficiency. The company’s aim is to generate the maximum revenue using minimum input materials and resources. Another important value is quality, which needs to be given considerable attention and accurately controlled. The company relies on an internal control system, which guarantees achievement of such objectives, as efficiency and compliance with the relevant laws and regulations. Other departments of the organisation are manufacturing, marketing, sales, human resource, research and development, supply, communications and finance[39]. Rituals and Routines Unchanged design of chocolate beans since 1941 may be viewed as one of the key rituals of M&M’s. The firm regularly organises informal events for its employees, which improve communication between organisational members and facilitate learning in the workplace. The slogan of the company illustrates the main distinctive feature of M&M’s chocolate beans: â€Å"Melt in your mouth, not in your hands†[40], which builds strong associations with M&M’s candies. This slogan stimulates customers to test the firm’s promise. Hence, eating chocolate beans that do not melt in hands has become another important ritual. Another important analytical framework, which helps to understand the overall degree of rivalry in the industry where the company operates, is Porter’s Five Forces[41]. According to this model, each industry is influenced by five forces, namely supplier power, buyer power, threats of new entrants, threats of substitutes and degree of rivalry. Supplier power There are plenty of suppliers all over the world that sell cocoa beans. M&M’s buys considerable amount of cocoa beans and is dependent on prices set by the suppliers. Even insignificant growth of prices can result in increase in the prices for the final production by M&M’s. On the other hand, M&M’s can easily switch suppliers since it does not have long-term obligations. Thus, supplier power is low[42]. Buyer power M&M’s is presented in more than 70 countries. This means that the firm’s customers are many and they are highly fragmented. No single customer can significantly impact M&M’s and their pricing policy. It can be concluded that the buyer power is low[43]. Threats of new entrants New entrants in the confectionery market are possible. However, new market players need to meet huge capital requirements in order to enter the market and start accumulating large market share. For this reason, it may be assumed that the threats of new entrants are medium[44]. Threats of substitutes There are plenty of other large multinational companies and highly recognisable brands in the confectionary market (e.g. Kraft Foods, Nestle, Hershey Co and Cadbury). If M&M’s will demonstrate weak innovativeness and creativeness in product range, customers can easily switch to alternative manufacturers and their goods. Threats of substitutes may be evaluated as high[45].

Tuesday, October 22, 2019

The History of Buenos Aires, Argentina

The History of Buenos Aires, Argentina One of the most important cities in South America, Buenos Aires has a long and interesting history. It has lived under the shadow of the secret police on more than one occasion, has been attacked by foreign powers and has the unfortunate distinction of being one of the only cities in history to be bombed by its own navy. It has been home to ruthless dictators, bright-eyed idealists and some of the most important writers and artists in the history of Latin America. The city has seen economic booms that brought in stunning wealth as well as economic meltdowns that have driven the population into poverty. Foundation of Buenos Aires Buenos Aires was founded twice. A settlement at the present-day site was established briefly in 1536 by conquistador Pedro de Mendoza, but attacks by local indigenous tribes forced the settlers to move to Asuncià ³n, Paraguay in 1539. By 1541 the site had been burned and abandoned. The harrowing story of the attacks and the overland journey to Asuncià ³n was written down by one of the survivors, German mercenary Ulrico Schmidl after he returned to his native land around 1554. In 1580, another settlement was established, and this one lasted. Growth The city was well-located to control all trade in the region containing present-day Argentina, Paraguay, Uruguay and parts of Bolivia, and it thrived. In 1617 the province of Buenos Aires was removed from control by Asuncià ³n, and the city welcomed its first bishop in 1620. As the city grew, it became too powerful for the local indigenous tribes to attack, but became the target of European pirates and privateers. At first, much of the growth of Buenos Aires was in illicit trade, as all official trade with Spain had to go through Lima. Boom Buenos Aires was established on the banks of the Rà ­o de la Plata (Platte River), which translates to River of Silver. It was given this optimistic name by early explorers and settlers, who had gotten some silver trinkets from local Indians. The river didnt produce much in the way of silver, and settlers didnt find the true value of the river until much later. In the eighteenth century, cattle ranching in the vast grasslands around Buenos Aires became very lucrative, and millions of treated leather hides were sent to Europe, where they became leather armor, shoes, clothing and a variety of other products. This economic boom led to the establishment in 1776 of the Viceroyalty of the River Platte, based in Buenos Aires. The British Invasions Using the alliance between Spain and Napoleonic France as an excuse, Britain attacked Buenos Aires twice in 1806 to 1807, attempting to further weaken Spain while at the same time gaining valuable New World colonies to replace the ones it had so recently lost in the American Revolution. The first attack, led by Colonel William Carr Beresford, succeeded in capturing Buenos Aires, although Spanish forces out of Montevideo were able to re-take it about two months later. A second British force arrived in 1807 under the command of Lieutenant-General John Whitelocke. The British took Montevideo but were unable to capture Buenos Aires, which was ably defended by urban guerilla militants. The British were forced to retreat. Independence The British invasions had a secondary effect on the city. During the invasions, Spain had essentially left the city to its fate, and it had been the citizens of Buenos Aires who had taken up arms and defended their city. When Spain was invaded by Napoleon Bonaparte in 1808, the people of Buenos Aires decided they had seen enough of Spanish rule, and in 1810 they established an independent government, although formal Independence would not come until 1816. The fight for Argentine Independence, led by Josà © de San Martà ­n, was largely fought elsewhere and Buenos Aires did not suffer terribly during the conflict. Unitarians and Federalists When the charismatic San Martà ­n went into self-imposed exile in Europe, there was a power vacuum in the new nation of Argentina. Before long, a bloody conflict hit the streets of Buenos Aires. The country was divided between Unitarians, who favored a strong central government in Buenos Aires, and Federalists, who preferred near-autonomy for the provinces. Predictably, the Unitarians were mostly from Buenos Aires, and the Federalists were from the provinces. In 1829, Federalist strongman Juan Manuel de Rosas seized power, and those Unitarians who did not flee were persecuted by Latin Americas first secret police, the Mazorca. Rosas was removed from power in 1852, and Argentinas first constitution was ratified in 1853. The 19th Century The newly independent country was forced to continue to fight for its existence. England and France both tried to take Buenos Aires in the mid-1800s  but failed. Buenos Aires continued to thrive as a trade port, and the sale of leather continued to boom, especially after railroads were built connecting the port to the interior of the country where the cattle ranches were. Towards the turn of the century, the young city developed a taste for European high culture, and in 1908 the Colà ³n Theater opened its doors. Immigration in the Early 20th Century As the city industrialized in the early 20th century, it opened its doors to immigrants, mostly from Europe. Large numbers of Spanish and Italians came, and their influence is still strong in the city. There were also Welsh, British, Germans, and Jews, many of whom passed through Buenos Aires on their way to establish settlements in the interior. Many more Spanish arrived during and shortly after the  Spanish Civil War  (1936 to 1939). The Perà ³n regime (1946 to 1955) allowed  Nazi war criminals  to migrate to Argentina, including the infamous Dr. Mengele, although they did not come in large enough numbers to significantly change the nations demographics. Recently, Argentina has seen migration from Korea, China, Eastern Europe and other parts of Latin America. Argentina has celebrated Immigrants Day on September 4 since 1949. The Perà ³n Years Juan Perà ³n  and his famous wife  Evita  came to power in the early 1940s, and he reached the presidency in 1946. Perà ³n was a very strong leader, blurring the lines between elected president and dictator. Unlike many strongmen, however, Perà ³n was a liberal who strengthened unions (but kept them under control) and improved education. The working class adored him and Evita, who opened schools and clinics and gave state money away to the poor. Even after he was deposed in 1955 and forced into exile, he remained a powerful force in Argentine politics. He even triumphantly returned to stand for the 1973 elections, which he won, although he died of a heart attack after about a year in power. The Bombing of the Plaza de Mayo On June 16, 1955, Buenos Aires saw one of its darkest days. Anti-Perà ³n forces in the military, seeking to dislodge him from power, ordered the Argentine Navy to bombard the Plaza de Mayo, the citys central square. It was believed that this act would precede a general coup dà ©tat. Navy aircraft bombed and strafed the square for hours, killing 364 people and injuring hundreds more. The Plaza had been targeted because it was a gathering place for pro-Perà ³n citizens. The army and air force did not join in the attack, and the coup attempt failed. Perà ³n was removed from power about three months later by another revolt which included all of the armed forces. Ideological conflict in the 1970s During the early 1970s, communist rebels taking their cue from  Fidel Castros  takeover of Cuba attempted to stir up revolts in several Latin American nations, including Argentina. They were countered by right-wing groups who were just as destructive. They were responsible for several incidents in Buenos Aires, including  the Ezeiza massacre, when 13 people were killed during a pro-Perà ³n rally. In 1976, a military junta overthrew Isabel Perà ³n, Juans wife, who had been vice president when he died in1974. The military soon began a crackdown on dissidents, beginning the period known as La Guerra Sucia (The Dirty War). The Dirty War and Operation Condor The Dirty War is one of the most tragic episodes in all of the History of Latin America. The military government, in power from 1976 to 1983, initiated a ruthless crackdown on suspected dissidents. Thousands of citizens, primarily in Buenos Aires, were brought in for questioning, and many of them disappeared, never to be heard from again. Their basic rights were denied to them, and many families still do not know what happened to their loved ones. Many estimates place the number of executed citizens around 30,000. It was a time of terror  when citizens feared their government more than anything else. The Argentine Dirty War was part of the larger Operation Condor, which was an alliance of the right-wing governments of Argentina, Chile, Bolivia, Uruguay, Paraguay, and Brazil to share information and aid one anothers secret police. The Mothers of the Plaza de Mayo is an organization of mothers and relatives of those who disappeared during this time: their aim is to get answers, locate their loved ones or their remains, and hold accountable the architects of the  Dirty War. Accountability The military dictatorship ended in 1983, and Raà ºl Alfonsà ­n, a lawyer, and publisher, was elected president. Alfonsà ­n surprised the world by quickly turning on the military leaders who had been in power for the past seven years, ordering trials and a fact-finding commission. Investigators soon turned up 9,000 well-documented cases of disappearances and the trials began in 1985. All of the top generals and architects of the dirty war, including a former president, General Jorge Videla, were convicted and sentenced to life imprisonment. They were pardoned by President Carlos Menem in 1990, but the cases are not settled, and the possibility remains that some may return to prison. Recent Years Buenos Aires was given autonomy to elect their own mayor in 1993. Previously, the mayor was appointed by the president. Just as the people of Buenos Aires were putting the horrors of the Dirty War behind them, they fell victim to an economic catastrophe. In 1999, a combination of factors including a falsely inflated exchange rate between the Argentine peso and the US dollar led to a serious recession and people began losing faith in the peso and in Argentine banks. In late 2001 there was a run on the banks and in December 2001 the economy collapsed. Angry protestors in the streets of Buenos Aires forced President Fernando de la Rà ºa to flee the presidential palace in a helicopter. For a while, unemployment reached as high as 25 percent. The economy eventually stabilized, but not before many businesses and citizens went bankrupt. Buenos Aires Today Today, Buenos Aires is once again calm and sophisticated, its political and economic crises hopefully a thing of the past. It is considered very safe  and is once more a center for literature, film, and education. No history of the city would be complete without a mention of its role in the arts: Literature in Buenos Aires Buenos Aires has always been a very important city for literature. Porteà ±os (as the citizens of the city are called) are literate and place great value on books. Many of Latin America’s greatest writers call or called Buenos Aires home, including Josà © Hernndez (author of the Martà ­n Fierro epic poem),  Jorge Luà ­s Borges  and Julio Cortzar (both known for outstanding short stories). Today, the writing and publishing industry in Buenos Aires is alive and thriving. Film in Buenos Aires Buenos Aires has had a film industry since the beginning. There were early pioneers of the medium  making films  as early as 1898, and the world’s first feature-length animated film, El Apà ³stol, was created in1917. Unfortunately, no copies of it exist. By the 1930s, the Argentine film industry was producing approximately 30 films per year, which were exported to all of Latin America. In the early 1930s, tango singer  Carlos Gardel  made several films which helped catapult him to international stardom and made a cult figure of him in Argentina, although his career was cut short when he died in 1935. Although his biggest films were not produced in Argentina, they nevertheless were hugely popular and contributed to the film industry in his home country, as imitations soon popped up. Throughout the latter half of the twentieth century, Argentine cinema has gone through several cycles of booms and busts, as political and economic instability have temporarily shut down studios. Currently, Argentine cinema is undergoing a renaissance and is known for edgy, intense dramas.

Monday, October 21, 2019

Scott Joplin Essays - Rags, Music, Ragtime, American Music

Scott Joplin Essays - Rags, Music, Ragtime, American Music Scott Joplin CHOW, BENJAMIN F EXTRA CREDIT In the late 1890s ; a craze for a new kind of music called ragtime swept the country off its feet. Instant popularity of ragtime increased before the turn of the century. By 1910, the ragtime mania reached its peak in all elements of music: popular dance, theater, and movie music. Scott Joplin was a young black man that mastered and polish this subtle art. Born in Texarkana, Texas on November 29, 1868, Scott became facinated with the piano at an early age and was mentored by a old german teacher that took him in as a pupil. Scotts style of piano playing stress his smooth singing tone and subtle sense of rhythm. Scott has the tendency to turn melodic lines into delicate and but simple notes. Generally all of his pieces share the customary ragtime layout and composition of a pair of contrasting lines, each repeated and followed by the return to the first line, then a new section consisting of two or three repeated lines emerge and is usually subdominant. In Scotts piece the Magnetic Rag. The reappearance of the orginal theme at the close of the piece, shares a shocking likeness to Beethovens famous reoccuring I am Death Theme. In the Magnetic Rag, the return of the opening theme at the end of the piece creates a rondo-like structure with a scheme ABCDA, with the outer A section and the central C section stands in tonal harmony. This can be compared to his other famous pieces of work Maple Leaf Rag and The Entertainer which all exercise the reappearing theme that shows a tendency to round out by always returning to the home key. Magnetic Rag was the last piece that Scott completed. It was subtitled : syncopation classiques because of his wonderful blend of syncopation on every up-beat and mad-cow improvisations tailored to sound like European dance music that influenced early ragtime.

Sunday, October 20, 2019

The Counseling Administration

The Counseling Administration and ethical convictions of a client. Clients Ethic Women have an ethical responsibility for their own lives, and only in urgent cases, when the abonent cannot do that, the consultant is entitled to take temporary responsibility for their lives. The purpose of counseling is to help the clients make a positive responsibility for themselves and their relatives. In modern society, people often appear in a situation of shortage of communication and loneliness, looking for a contact to share their experiences and challenges. In order to open the way to a true dialogue with the woman who needs help, you need, first of all, to be fully accessible to her without constraint, concealment and bias. Presence in dialogue means linguistic conformity and identity. Some centers use the consultative talks slang. The consultant should know and understand the jargon, as they can open the way to empathic relationship with the abonent. However, the content side of the jargon is limited, using it, it is impossible to achieve meaningful changes. The application of the consultant is only to achieve initial understanding. As soon as it appears, you should move away from using jargon synonyms or related words from the arsenal of the regulatory language, the importance of which for further positive change is significantly higher. Some women commonly use terms of psychology and psychiatry to describe their condition, such as "stress", "depression", "phobia", "addiction", etc. They should be taken, but after that systematically encourage the person to describe her condition or desired objectives in concrete terms of action ("see", "hear", "feel", "I want"). For example, the description of the specific features of depression makes them visible, tangible, and measurable, that is more accessible to awareness. It also creates an opportunity for distanced perception. Then the most significant for the women signs of depression, such as fear, are translated into action ("What are you afraid of now?"). The consultation dialogue plays a significant role in contextual issue. It can perform, often against the will of communicant, a variety of functions, such as: to blame to advice to assign responsibility to create comfort, to create tension to oppose, to give orders, to protect etc.Using open-ended questions is the best form of consultative conversation. They allow the women to reveal their feelings and concerns, give them freedom to respond in a way that they prefer. Such questions help the abonent to understand the situation. ("What is your feeling?", "How you reacted to what happened?" Etc.). Questions that begin with "what" and "how" encourage women to extend the joint discussion of problems and feelings, clarify complex situation. Consultants usually avoid questions that begin with "why" - "Why do you have an idea of suicide?", "Why did you decide to call us?". On these issues, there is a hidden reproach, blame or censure (Brown, 2007). Telephone conversation is different from full-time counseling conversation because in a telephone dialogue nonverbal bodily movements are excluded. The particularly important characteristics of different voices are the tone, volume, tempo, timbre. During the dialogue, be sure to monitor compliance with verbal expressions and intonation interlocutors. Intonation and modulation of voice truly reflect the emotional state of a person using fixing on her feelings. Psychological support for women is based on the principles of anonymity, absolute openness and accessibility, privacy, which contributes to the establishment of trust and friendly dialogue, aimed at mobilizing the intellectual, spiritual and physical resources of the individuals in order to overcome their crisis. The consultant must maintain a high degree of reflexivity, monitoring, as the state of the society, and for our own. The necessity and usefulness of such services is sufficiently proved with international experience, and the fact that the number of services and outstanding people in them continues to grow, and have subscribers who say a grateful "thank you" for the fact that they live on, for their help in resolving any problem, for the preservation of the family. The very few people address the professional help of counseling centers There are some reasons, one of which is the lack of awareness about their operation. Advertising often only discourage potential abonent, as presents the service as the treatment of pathologies. Thus, a person feels herself a patient, sick person. The media spread information according to which, to ask for help means that people get ready to template solutions to your problem. This contradicts the basic principle of social work - the principle of individual help.

Saturday, October 19, 2019

Proposal for the Formal Analytical Report Essay

Proposal for the Formal Analytical Report - Essay Example cked it can and will grow into a situation that can threaten the abilities of local firms and banks to make a profit due to the decreased trust with which they view the money that comes to their hands on a daily basis. Accordingly, this proposal will work to outline the ways in which banks as well as other firms can institute a series of practices and procedures which can help ebb the tide of counterfeiting as it is currently being experienced in and around the area of Penn State University. The study will have the compound effect of being able to provide local business and banking with appropriate measures which can be implemented to protect against such fraud/counterfeiting, as well as providing a list of specific criterion which should be followed in order to minimize the occurrence an effects of such actions. Likewise, I will offer my plans for developing possible solutions to this problem, discuss my qualifications for conducting the research, and will provide a schedule on whic h I will base my research activities. During the past month and a half there has been a rapid uptick in the number of fake bills being passed in and around Penn State University. This has been occurring at a variety of locations that do not seem to be related other than that are all places of business that handle cash on a daily basis. As such, the issue bears a tangential relation to business and economics due to the fact that retail establishments and individuals are required by law to remit counterfeit money to the requisite authorities without any reimbursement for the face value of the counterfeit bill they obtained as a result of legitimate service, good or other business activity. In this way, the economic loss forms a type of double loss that must be absorbed by the business entity in question. Likewise, although the economic impact of recent rise in counterfeit bills will not have the effect of crippling the local economy, the fact of the matter is that necessarily

Friday, October 18, 2019

What is an Oligopoly Essay Example | Topics and Well Written Essays - 1500 words

What is an Oligopoly - Essay Example Oligopoly, (which is Greek for many sellers) demonstrates a very characteristic feature of mutual interdependence 3of each in the model onto other firm's action. Each firm in an oligopoly recognizes that the pricing or output decisions made by one firm will affect the profits of all firms in the industry.4 Because of this mutual interdependence, the firms in an oligopoly market need to act strategically, and it is this existence of strategic behavior or barriers which distinguish the oligopoly model from perfect competition and monopoly.5 The fundamental features are that sellers are price-makers and the demand curve of every firm is slightly slopping down. As the figure below aptly demonstrates, the demand curve in an oligopoly will be a "Kinked" demand curve which may be similar to the traditional demand curves in the Perfect competition, as they are downward-sloping but it will have a kink or a bend. 6 Before I discuss the barriers utilized by a monopoly it would be useful to show how the factor of interdependence manifests itself as a game theory which can be well illustrated as the prisoner's dilemma as apparent from the diagram below. The above diagram (taken from the internet) shows the classic example of the Game theory being played out between two firms in an oligopoly. These two firms are aware of their price levels and cautious in an increase or decrease in the prices which can break out into a price war/or cause cut-throat pricing which will ultimately cause losses to all the firms in the oligopoly. Economic theory dictates that these firms will inevitably return to the original position in case of such a price war. Barriers in Oligopolies The Game theory as apparent from the diagram above shows some interesting incites into strategic barriers and their dilemmas and this theory became popular in the decade of the 1970s where there was a substantial shift to firm behavior with regards to firm behavior. Barriers in a monopoly can be natural or strategic. They are aimed at keeping competing firms away 7. Market entry is very difficult in oligopolies. Oligopolies operate on a large scale and therefore have high sunk costs( which are industrial expenses that cannot be recovered once a firm has started a business). This means that if large amounts of capital are used to enter an industry which depreciates in value rather quickly there will be a barrier to entry for new aspiring firms. Secondly, if the firm has problems in establishing the reputation of its product through high scale advertising and discount schemes it will be too expensive for other firms to enter the market and actually attain the same level of excellence without incurring large amounts of initial losses. An example of this is the telecoms industry where the various cell phone carriers have established oligopolies in their price and service mechanisms.

Political Influance in Emergency Management Essay

Political Influance in Emergency Management - Essay Example Introduction It has been said that all disaster are â€Å"political†. For instance, the elder President George Bush is said to have lost the election because of perceived deficient response to Hurricane Andrew in 1992. His son, George W. Bush, suffered politically for several years as recovery operations on the Gulf Coast dragged on a pace that constituents considered unsatisfactory (Olasky, 2006). President Jimmy Carter created the Federal Emergency Management Agency in 1979 in order to response to the increasing disasters (Haddow, Bullock & Coppola, 2011). There are numerous environmental threats that United States face today. The environmental disasters include floods, tornadoes, failure of dams, or building structures. Hurricanes and bridge collapses are also considered natural environmental disasters. The federal relief under the Federal Emergency Management Agency (FEMA) has been expanded under the Stafford Disaster and Emergency Assistance Act of 1974 and Hazard Mitigat ion Act of 2000. The FEMA was placed under the department of Homeland Security in 2003. Experts attribute the increase in environmental disasters to increased human encroachment and development to areas that are considered disaster prone and increased occurrence of the weather related disasters due to climate change (Haddow, Bullock & Coppola, 2011). ... Hurricane Katrina that happened in August 29 2005 is one of the disasters that experienced intense political influence (Haddow, Bullock & Coppola, 2011). The hurricane blew across southern Florida roaring in to Louisiana coast with 125 mph sustained winds thus causing a surge in sea waters and leaving 80 percent of the city flooded (Olasky, 2006). Katrina killed about 1,836 people and inflicted damages estimated at $ 125 billion. Contrary to President Clinton who utilized the FEMA to deal with a series of hurricanes, President Bush suffered major political blow due to his ability to intervene in Hurricane Katrina disaster (Olasky, 2006). Given that a large percentage of the population in New Orleans comprised of Black Americans, the slow response made the population question Presidents Bush â€Å"compassionate conservative† policies on the minorities (Olasky, 2006). President Barrack Obama also suffered politically in his early years in office due to the slow response to halti ng the oil spill in Gulf Coast. However, he recovered his politically when the oil spill was finally cleaned up (Olasky, 2006). Last week, citizens across northeastern seaboard were hit by Hurricane Sandy that left thousands homeless and destroyed thousands of businesses. The governor’s of the affected cities called for the state of emergency and President Barrack Obama granted the national disaster proclamation. Hurricane Katrina has changed the dynamics of Presidential elections in the eastern coast. For instance, New York Mayor Michael Bloomberg endorsed President Barrack Obama’s reelection to what he termed as the prompt response to Hurricane Sandy disaster and the urge to people to avoid waters and

Thursday, October 17, 2019

Why did TV spread so fast around the world Essay

Why did TV spread so fast around the world - Essay Example This has seen the rise in demand of the television. Apart from major towns with good transmission signals, it has also made its mark in small towns and villages in Africa. All television is educative television; the question is its ability to educate (Todorovic pp.117). In recent years television has proved to have a great impact on the modern generation both positively and negatively. Curbing this, many television channels operators have come up with a viewer discretion options to give options of choices depending mostly on age. The reason behind this decision is that only modification of the television is the only lasting solution (Webb, pp.170). The fact that the license to air television can be accessed by a myriad of individuals, a massive global rise has been recorded. In many nations globally, individuals can own a television channel. This gives room for individual or organizations to venture business wise. The establishments of many channels play a major role in growing the television community. This is because every persons taste is represented. In addition to that, nations globally have given the freedom of ownership of televisions: one household can own more than one television set as long they can afford it. This makes television easily accessible. Statistics indicate that, more than 50% households globally own more than one set of television (Williams, pp.30). This promotes the growing culture of TVs. Another major reason behind the global widespread of the television is the development of lifestyle and business. In regard to lifestyle, this proves that the world is turning to an ignorant free society. TV is the new source of life skills, opportunities and services. An upgrade in lifestyle definitely needs the access of a television set. The urge of acquiring a modern lifestyle, and keeping in contact in the contemporary trends drives many people to acquire a set and this grows the culture even bigger. Business development

Famous African American of the 20th Century Research Paper

Famous African American of the 20th Century - Research Paper Example In 1964, he became the youngest person who was given the Nobel Peace Prize for his endless efforts to stop racial discrimination and racial segregation. Slavery exists in the world since centuries. It started in America in 1600s with the African Slave Trade when the Africans were transported from the west coast of Africa to the Americas and were sold to slave traders. These slave traders kept them in horrible conditions and were made to do labor intensive work on coffee, tobacco, tea, sugar plantations. They were beaten, lashed, starved and deprived with even basic necessities of life such as food and shelter. The Bible also permitted slavery as well as the early laws of Babylon which stated that a man can own another man like he owns an animal. In other parts of the world the slaves could belong to any race. However, in America the slaves were blacks. The divide between the blacks and white continued to mature and lead to severe riots, protests, and eventually a civil war. Martin Lu ther King rose in 1955 when he was appointed as minister in Montgomery. His tough believes in achieving civil rights and non violence movements also established him as an opponent to the American participation in the war in Vietnam. He recognized that the finest approach to unshackle African American and to give them their rights could be achieved through non violent protests and demonstrations. Several of his beautiful quotations are examples of his support for non violent protests; â€Å"At the center of non-violence stands the principle of love.† He believed that any kind of violent act from the civil rights workers will show the way to the segregationists for opposing actions which will cause grievance and death for his supporters. Through non violent protests his movement gained recognition and many associates and opened up the way for the passing of Civil Rights Bill in 1964-1965. Moreover, King was determined to spread his message to everyone and gain support from all corners regardless of class and race differences. He wanted the white moderate to awake from their deep sleep of negligence of moral and political values. Also he wanted them to appreciate the fact that desegregation will lead to elimination of social and legal prohibitions. He was also dismayed by the indifferent attitude of the moral people towards this discrimination, because of which people with sick intentions were making progress. His â€Å"Letter from the Birmingham Jail† is an essay which clarifies and gives details of the motives behind the non violent civil disobedience movement and also explains the methods used for this mass movement. King was a man who contributed immensely towards shaping and influencing the lives of Americans during the 1950s and 1960s. In this period of time, Americans did not have the courage to stand up for their rights, project their demands and views and accepted whatever was given to them. Martin Luther King was the beam of light that sho wed them the path to freedom and individuality. For example in 1955 after the Montgomery civil rights movement had started an activist Rosa Parks refused to abide by the law for segregation in public buses. A bus boycott was initiated and

Wednesday, October 16, 2019

Why did TV spread so fast around the world Essay

Why did TV spread so fast around the world - Essay Example This has seen the rise in demand of the television. Apart from major towns with good transmission signals, it has also made its mark in small towns and villages in Africa. All television is educative television; the question is its ability to educate (Todorovic pp.117). In recent years television has proved to have a great impact on the modern generation both positively and negatively. Curbing this, many television channels operators have come up with a viewer discretion options to give options of choices depending mostly on age. The reason behind this decision is that only modification of the television is the only lasting solution (Webb, pp.170). The fact that the license to air television can be accessed by a myriad of individuals, a massive global rise has been recorded. In many nations globally, individuals can own a television channel. This gives room for individual or organizations to venture business wise. The establishments of many channels play a major role in growing the television community. This is because every persons taste is represented. In addition to that, nations globally have given the freedom of ownership of televisions: one household can own more than one television set as long they can afford it. This makes television easily accessible. Statistics indicate that, more than 50% households globally own more than one set of television (Williams, pp.30). This promotes the growing culture of TVs. Another major reason behind the global widespread of the television is the development of lifestyle and business. In regard to lifestyle, this proves that the world is turning to an ignorant free society. TV is the new source of life skills, opportunities and services. An upgrade in lifestyle definitely needs the access of a television set. The urge of acquiring a modern lifestyle, and keeping in contact in the contemporary trends drives many people to acquire a set and this grows the culture even bigger. Business development

Tuesday, October 15, 2019

Equity and Trust Essay Example | Topics and Well Written Essays - 1500 words

Equity and Trust - Essay Example That’s when Lord Longdale ruled that Richard Knight did not make a trust, because his will did not satisfy the three certainty tests named above (Brophy, 2008, p. 91). In the case above, the provisions satisfy only one certainty that is certainty of intention. In Jones vs. Lock 1865, the court denoted that for a trust to be established, it must pass the certainty of intention test. In this case, Robert Jones loosely said that he was going to keep son 900 pounds for his child. Before altering his will, he died. The issue under consideration in this case therefore was on whether the 900 pounds he had offered belonged to the child, or to the residuary legatees. In arriving at their decision, the court held that Robert Jones did not have any intention of initiating a trust for the child; therefore the money was still under his residuary legatees. On this basis therefore, the court denoted that certainty of intention must be proved for a trust be valid. This argument is further rei nforced in the case involving Paul vs. Constance 1977. In this case, the court denoted that prove of certainty of intention is an important factor in determining the validity of a trust (Harrison, 2012, p.29). Sam, in his will provides for the distribution of his shares to Margaret his sister, and four grandchildren. However, he does not specify the amount of shares to be distributed to the individuals. In the case law that involved Palmer vs Simmonds 1854, the court denoted that there wasn’t any trust established when the testator wrote in his will that the bulk of his property should go to four unnamed individuals on an equal measure, but subject to a number of stipulations (Brophy, 2008, p. 41). This is because the Testator was not specific on the value of his property that was to be shared. On this basis therefore, the above provision is not valid, and does not create a trust, because he does not prove certainty of subject matter. Another issue that arises also is that Sa m does not give the names of the grand children under consideration, and it is therefore difficult for the trustees to know whom Sam had in mind. In the case law involving IRC vs. Broad way Cottages, the court denoted that in an instance where it is difficult to establish the specific beneficiaries of a will, then the trust established is void (Brophy, 2008, p. 56). In this case, the testator wrote a will denoting that any income derived from his property should benefit the settlor’s wife, and other relations of the settler. The term relation was not certain, making the will void. On this basis therefore, the provisions in this will are void, and do not establish a trust. (b) In this case, Sam satisfies the certainties established in the Case law of Knight vs. Knight. This provision satisfies the certainties of object, intention and subject matter. For instance, Sam identifies the object to be disposed, and that is a bronze statue of a musician; and the beneficiaries who are the grandchildren of Fiona. The case involving Re Kayford 1975 is a perfect example of a case law that depicts the importance of certainty of intention in a will (Brophy, 2008, p. 67). In this case, the managers of Kayford mailing company were concerned that their organization will be insolvent. On this basis, they opened an account with another bank to keep payments that

Mother Tongue Essay Example for Free

Mother Tongue Essay Today we live in a society that is often called a salad bowl. It is called a salad bowl because it consists of various different people from various different backgrounds. We all live together in a society, but we still retain our own distinct flavors which helps to contribute to the richness and diversity of society. Unfortunately, today we also live in a society in which some of these groups are marginalized and looked down upon by others. Hence, often times as individuals we feel the need to compromise the way in which we communicate our ideas so that we can appeal to the views of the majority. Two authors explore how their attempt to compromise almost caused them to become detached from their roots. In Mother Tongue, by Amy Tan, Tan talks about growing up as a young child in America and learning the English language. She speaks about growing up as a writer and her mothers imperfect diction which had a major influence on her. On the other hand, In her essay, Censoring Myself, Betty Shamieh talks about being an American playwright and having to censor herself because of how her work was viewed. Both authors explore the influence that their background had on their ability to express themselves. As individuals we should not be afraid to express ourselves because of our differences, rather we should use our differences and show how our distinctions make us very unique. Firstly, In Mother Tongue, Tan talks about how her mothers limited English diction skewered her perception of her mother. Tan mentions how, Like others, I have described it to people as broken or fractured English (Tan 273). This shows how Tan viewed her mothers English speaking abilities. She describes it as if her mother spoke damaged English, which needed to be mended or repaired. For Tan it was imperative that she spoke proper English and used proper diction, thus she was ashamed of her mothers English. Tan fell under the impression that her mothers English speaking abilities reflected the quality of what she had to say. Since her mother expressed her words in an imperfect manner, tan believed that her thoughts were also imperfect (Tan 274). Her perception was also supported by how people in society responded to her mother. Tan states that people in  department stores, banks, and restaurants would not take her mother seriously. They would provide her bad service, pretend not to understand her, or act as if they were mute (Tan 274). This further contributed to Tans feeling of embarrassment and shame towards her mother. Tan also describes an incident in which her mother went to the hospital and was told that the hospital had misplaced her CAT scan. The hospital did not show any remorse for losing the scan, nor did they assure her that they would locate it, that is until her mother had Tan speak to the hospital (Tan 275). As a reader this shows us how language is perceived and the role that it plays in the lives of individuals. For Tan it was imperative that she was able to blend in and be like others, so that she wouldnt be ridiculed. Luckily, she was able to realize the positive influence that her mothers diction bought her. Furthermore, Tans mother teaches her to think in a different manner than the other children in her school. Tan states that her developing language skills were influenced by her family and in this case her mother, hence it affected her results on achievement tests. Since her mother taught her to think differently she was unable to perform as well in English as she did in math and science. Later Tan realizes the value of this different systematic way of thinking and it contributes to her rebellious nature towards her teachers who suggested shed be much better in engineering, accounting, or anything else than English, since she was of Asian descent. She decided to challenge this stereotype, and thanks to her mother became a writer, who didnt write using challenging diction that required a lot of thought, but rather diction that could be read and understood by audiences such as her mother. This is the reason she starts writing about her mother: â€Å"I wanted to capture what language ability tests can never reveal: her intent, her passion, her imagery, the rhythms of her speech, and the nature of her thoughts† (Tan 277). She acknowledged the richness that her mothers heritage provided her and then she decided her first reader and critic should be her mother. Overall this taught Tan that she didnt need to compromise to the high caliber and complexity of the English language, but rather she could express her thoughts in a simplistic, yet effective way which could be understood by everyone. In her essay, Censoring Myself, Betty Shamieh talks about being an American playwright and having to censor herself because of how her work was viewed by others. She states: I have been censored in many ways. But I think the most overt example of censorship I have yet faced is my experience with a project called the Brave New World Festival (Shamieh 294). For the Festival she wrote a monologue about being the sister of a suicide bomber in mourning because she was unable to prevent his vicious act of terrorism. Her approach towards writing this play was to promote anti-terrorism, but due to the harsh tragedy of 9/11 she felt that there would be some potential backlash. When she was asked to perform her monologue at the Brave New World Festival, she was very skeptical of being criticized, thus she asked a famous actress named Marisa Tomei to act in the play (Shamieh 295). Post 9/11, president Bush let it be known on national television that he thinks citizens better watch what they say (Shamieh 294). This shows the amount of tolerance that was granted towards individual expression post 9/11, where anything that was said could be viewed in light of terrorism. As an Arab American Shamieh acknowledged that her work would be a source of criticism, but she felt the need to express her view and in doing so had to compromise so that she could get her play preformed. Moreover, Shamiehs play was ridiculed for its content, so being afraid of losing her spot in the festival she produced another piece that could be preformed. This shows the censorship she faced with her work and her need to compromise her writing so that it would appeal to the majority. Shamieh states that: Arab American artist are largely faceless in this country and I felt that, by dropping out, I would be helping those who are trying to keep it that way (Shamieh 295). This portrays Shamiehs want to express her views and to represent the Arab community, whos voices were neglected. Essentially she was trying to give a voice to the voice less. She later presents a story about an Arab-American girl who ends up on a hijacked plane and talks the hijackers out of their plans. Once again her intent was to promote anti-racism, but in a humorous way, yet her new play was not only censored, but this time completely taken out of the festival. This shows the ability individuals had in being ab le to express their ideas. Being an  Arab American, Shamieh had the right to express her views, yet despite this, her work was viewed under a wrong light and taken out of the play. This taught Shamieh that as individuals we will often face censorship for many reasons, whether it may because of our race, ethnicity, gender, sex, etc. For Shamieh, this experience taught her to write about the things she cared about, the things that represented who she was. She acknowledged that she was censoring herself by not producing a play about the Palestinian experience, which was a huge part of who she was (Shamieh 296). As individuals we will often face criticism from others, but the important thing is to express our voices so that we can communicate our ideas and portray ourselves under a proper light. Hence, often times as individuals we feel the need to compromise the way in which we communicate our ideas so that we can appeal to the views of the majority. Authors Betty Shamieh and Amy Tan were both subjected to trying appeal to others. They both explore how they found themselves and attempt to tell readers to express their individuality. As American citizens, majority of us come from different backgrounds which gives us a broader perspective. We should try not to forget our roots and neither should we become entrenched in trying to appeal to others who see us under a different light. We as individual bring about diversity and cultural richness to America, hence we should not be afraid to communicate our ideas in a manner that represents who we are. When we constantly feel the need to compromise we often lose our identities and our own unique individuality. We are discrete individuals and we should utilize our differences, rather than trying to hide or forget them. If we do not s tand up and express our perspectives then others will express them for us. So, thus we need to communicate our ideas in an effective manner, while still retaining our original flavors in the salad bowl. Works Cited 1) Neweib, Janice. Mother Tongue by Amy Tan. The Mercury Reader: A Custom Publication. New York: Pearson Learning Solutions, 2011. 271-277. Print. 2) Silverman, Jonathan, and Dean Rader. Censoring Myself by Betty Shamieh. The World Is a Text: Writing, Reading, and Thinking about Visual and Popular Culture. Upper Saddle River, NJ: Pearson/Prentice Hall, 2011. 294-296. Print.

Monday, October 14, 2019

Software Process Development: Water Fall Model and the RAD

Software Process Development: Water Fall Model and the RAD Software Process Development Abstract Choosing the best suited Software development system (SDS) for any particular project is the first and foremost thing to do. If this step goes wrong or selecting an unsuited SDS for the project may lead to unsuccessful or incomplete or may be delayed to the time expected. Till now many surveys and investigations are done on finding new processes, rectifying the problems in the pervious projects, etc. the new processes every time comes with a new way of implementation of the software development process. In this project I am investigating on the basic implementation of the SDS with the water fall model and the rapid application development (RAD) model. For this a detailed study of the both the models are done, and then finding out which software development model is best suited for the development of windows applications. For this comparison the yahoo messenger (a windows application) is used as an example. Introduction Software development has become very difficult due to changing requirements, lack of standards, unpredictable schedules, and due to the insufficient training and more than that by the lack of effort by the professionals. After a lot of research, it was clear that the problem is with the process that is used for the software development, rather than the technology, which cause number of the problems in software development and in the maintenance phase. A new terminology is introduced with five levels of the SEI which is known as capability maturity model (CMM). Most of the software life cycle includes six processes they are: requirements engineering, design, programming, integration, delivery, and maintenance. Each of these phases in brief: Requirements Engineering In this phase first all the requirements that are required by the client a0re designers of the site collectively. Then the technique of rapid prototyping in which a prototype program is built that can illustrates the functionality of the desired software model. Using this prototype, clients can understand better how the final product would be, how would be the functionality and from that they can find out whether this is what they really need. If the requirements engineering process is not done properly, the resulting software product will not be useful to the client and it may not run correctly. Design In this process, the analysts and developers decide how to construct the software with the requirements specifications agreed in the requirements specification document. This way of designing is called stepwise refinement, and this allows the developers to control the complexity of the software. After completing the design, it is recorded in design specification document. Programming In this phase, programmers are divided into groups who write the actual code of the software. Before coding starts, the software is divided into separate units called modules. This modularization is done to reduce the complexity of the programming process. This is also responsible for proper documentation that describing the code and for testing the code to ensure that the code is free of bugs. Integration In this phase, the individual modules of the software are combined to form the complete software product. As the modules are developed separately, testing is very important in this integration process. Even when the design is good, some times incompatibilities between modules are likely to exist. All these problems are identified and corrected to complete the integration. Delivery In this phase, the developers deliver the completely working software product to the clients. Usually the clients will test the software to determine whether all the specifications agreed upon in the requirements specification document are fulfilled or not. If the client is satisfied with the software he accepts the software and installs it or else gives back for modifications. Maintenance In this phase, the software undergoes many changes after delivery in order to change the features or to fix the bugs, add new functionality, port the software to new platforms. Its not true that the work is over after delivering the product to client. Actually more work is to be done, after delivering the product, in this maintenance phase. From the investigation done the experts it is surprised to discover that of all the processes, the maintenance phase has the more cost of the life cycle. The diagram below shows the expected costs that are likely to be spending on each of the processes in the software life cycle. As maintenance cost is more, many developers started to use the design approaches that result in software, which is easier to maintain. History of Software Process Models The Software Engineering Institute was established at Carnegie Mellon University in Pittsburgh, Pennsylvania in 1984, under a Department of Defense contract. The mission of this institute is to provide the leadership in advance state of the practice of software engineering that helps to improve the quality of systems that are developed which depend on software. After two years the software process work has began. One of those results was the software process maturity model. In the year of 1987, the Software Engineering Institute and MITRE Corporation produced the first questionnaire on the maturity of a software in general, a set of question that has the options as yes-no are prepared that address organization, management issues and the technical software development process. In the next few years, the Software Engineering Institute developed two methods that are used for the questionnaire to test and conclude the report of an organizations software process. After many reviews, the Capability Maturity Model (CMM) for software was developed which replaced the software process maturity model in the year 1991. The CMM gives the detailed information of the levels of the firms that best suites for the general software process practices that are followed by the firms which are divided into five maturity levels. The questionnaire that are to be satisfied by the firms at there CMM levels , once the current level of operation is attained using the maturity, for further improvement of a companys software process involves in the implementation of the software engineering practices that are needed to reach each of the five levels in an order from the lowest to the highest level. Water Fall Model The water fall model is first and the basic model of software development. From this basic model only all other models were developed. The necessity of developing the water fall model was, until it was developed there was no model or software process work flow model. Thats the reason the water fall was the basic model for software development. Water fall model is divided into separate phases of software development. The phases in Waterfall model are: Requirement Specifications phase, Software Design, Implementation and Testing Maintenance. . All these phases are cascaded to each other so that second phase is started as and when defined set of goals are achieved for first phase and it is signed off, so the name Waterfall Model. All the methods and processes undertaken in Waterfall Model are more visible. All possible requirements of the system to be developed are analyzed in this phase. Requirements are set of functionalities and constraints that the end-user (who will be using the system) expects from the system. The requirements are gathered from the end-user by consulting the customer who have requested for the product. These requirements are analyzed for their validity and the possibility of incorporating the requirements in the system to be development is also studied. Finally, a Requirement Specification document is created which serves the purpose of guideline for the next phase of the model. Next comes the system and software design phase. In this phase, before starting for actual coding, it is highly important to understand what we are going to create and what it should look like? The requirement specifications from first phase are studied in this phase and system design is prepared. System Design helps in specifying hardware and system requirements and also helps in defining overall system architecture. In this phase the estimation of cost for developing the product is also analyzed depending on the requirements. The system design specifications serve as input for the next phase of the model. The next sequential phase is the implementation (coding) and unit testing the software. On receiving system design documents, the work is divided in modules/units and actual coding is started. The system is first developed in small programs called units, which are integrated in the next phase. So that it would be easy to develop the code by dividing the work into small units. Then each unit of work that is divided from the total work is developed individually by each developer and tested for that particular unit of work is done properly or not. This type of testing the individual unit code is called unit testing. In the next upcoming phases the small units of code is to be integrated into one single code and should be tested for the over all functionality. As specified above, the system is first divided in units which are developed and tested for their functionalities . These units are integrated into a complete system during Integration phase and tested to check if all modules/units coordinate between each other and the system as a whole behaves as per the specifications. After successfully testing the software, it is delivered to the customer. The maintenance phase is the most important and it is almost 70% of total software process life cycle. This phase of is virtually never ending phase (Very long). Generally, problems with the system developed (which are not found during the development life cycle) come up after its practical use starts, so the issues related to the system are solved after deployment of the system. Not all the problems come in picture directly but they arise time to time and needs to be solved; hence this process is referred as Maintenance. On the time ruin the problems may occur and the code may not accept the new type of data, and then there is the need to change the part of the code or correct that part of code. Due to some disadvantages of the water fall model later some other models are developed. The disadvantages are The main drawback of the waterfall model is the difficulty of accommodating change after the process is underway. One phase has to be complete before moving onto the next phase Inflexible partitioning of the project into distinct stages makes it difficult to respond to changing customer requirements. Therefore, this model is only appropriate when the requirements are well-understood and changes will be fairly limited during the design process. Few business systems have stable requirements. The waterfall model is mostly used for large systems engineering projects where a system is developed at several sites. Rapid Application Development (RAD) RAD is a software development process initiated by James Martin in 1980s. It is a very high level of application development techniques that uses prototype, iterative customization and CASE tools. RAD is a software development methodology that focuses on building applications in a very short amount of time, traditionally with compromises in usability, features and execution speed. Figure-Traditional RAD The traditional RAD software development cycle follows a rigid sequence of steps with a formal sign-off at the completion of each. RAD is not appropriate for all projects. This is bet suited for the projects that can be divided into small chunks and where scope is small. RAD has many core elements which make it unique are prototyping, iterative development, time boxing, team members, management approach and RAD tools. Prototyping: This part of the RAD can be done by the Computer Aided Software Engineering that focus on capturing requirements, converting them to a data model, converting the data model to a database, and generating code all in one tool. Iterative development: Iterative development means creating increasing functional versions of a system in short development cycles. Each version is reviewed and approved by the client to produce requirements that feed the next version. This process is repeated until all functionality has been developed. Time boxing: Time boxing is adding features to future versions of the software and developing it no time. It is very important aspect of RAD to complete the job in less time and get the best product out than other competitors. Team members: The RAD methodology recommends the use of small teams that consist of experienced, versatile, and motivated members that are able to perform multiple roles. As the client plays a vital role in the development process, dedicated client resources must be available during the initial Joint Application Development (JAD) Management approach: Active and involved management is required to reduce the risks of lengthened development cycles, client misunderstandings, and missed deadlines. In addition to enforcing a strict timeline, management must focus on team member selection, team motivation, and on clearing media or political obstacles. Coding phase: Developing Code in RAD process model takes very short span. At the time of development of these types of projects the there is no need or no time to make the code future enhancements. So the code developed using this process is not the most reliable code. Testing phase: In the testing phase the developed software or website is tested in two ways i.e. alpha testing and beta testing. Alpha testing is the testing done by the developers before delivering the product. This alpha testing can be done in two ways i.e. white box testing and the black box testing. The testing of all the models that are working properly or not and to ensure that each function is fully operational while at the same time searching for the errors in the code is called white box testing. Testing the internal and primitive operations and to sure that all are working according to the specification is called black box testing. Testing done by the customer to check weather all the specification requirements are working properly is called beat testing. If any problem occurs, then the error is set up and just added to the code at the appropriate position. Advantages: Speed and quality are the main advantages of Rapid Application Development, while potentially reduced scalability and feature sets are the disadvantages. The main goal of RAD is the speed delivery of the product using CASE tools, which helps in converting the requirements to code automatically. The speed delivery is the main feature of RAD because the product has the competitors and demand in the market. The software developed by the RAD has versions and each version is better, has new features or at least overcomes the defects of the previous versions. Disadvantages: Scalability and the reduced features are main drawbacks of the RAD Due to very less time using the time boxing the development of the product that can construct the advanced features is not possible. By using time boxing we have very less time to develop much more features and more enhanced features. Yahoo Messenger The versions of yahoo messenger that are developed with the features are: Version 3.0: Yahoo Messenger 3.0 (1.3 MB) The first basic yahoo messenger was version 3.0 with basic features of chat, webcam, file transfer and emoticons that can incorporate in between the text in chat box. Version 3.5: Yahoo Messenger 3.5 (1.9 MB) This version has the new features of mail updates of the user account and the option of my display image. This feature enables the user to show his picture to the person with whom he/she chatting. Version 4.1: Yahoo Messenger 4.1 (2.3 MB) In this version the send contact details, message archive are introduced. Send contact details option enables the user to send the messenger list in his account to others. If message archive option is set then all the conversations done by the account user can be stored in the local system where person chats. Version 5.0: Yahoo Messenger 5.0 (2.2 MB) This version has the new feature of photo share through which two persons can share the pictures by just dragging and dropping the pictures into the sharing box. This is the great feature that had made yahoo! messenger more popular. Version 5.5.1228: Yahoo Messenger 5.5.1228 (2.6 MB) This version has the option to change the skins and the option to join the chat rooms all over the world. Version 6.1922: Yahoo Messenger 6.1922 (4.5 MB) This version ahs the feature of play game with the other person in the chat. And the other new feature is buzz which alerts the with a sound. The chat box is provided with the text format tool bar. Version 7.0: Yahoo Messenger 7.0 (8.2 MB) This version has the drastic changes and much new features than the previous versions. The IM environment option that changes the backdrop of the chat box. Version 7.426: Yahoo Messenger 7.426 (8 MB) This version has the new feature called the voice chat. With this option a person can record his voice message and send it to this other person in the chat. This feature revolutionized the yahoo! Messenger and made popular. Version 7.437: Yahoo Messenger 7.437 (8 MB) In this version we have the plug-ins of yahoo! Games, yahoo! Music and yahoo! Weather. These features enable the users to play the games, listen to music and see the weather report in certain areas all over the world. Version 7. 5.0.647: Yahoo Messenger 7.5.0.647 (7.7 MB) This version has very slight difference than its pervious versions with only new feature that is calling pc-to-pc using the VOIP protocol that is developed for voice transmission over Internet. Version 8.0.0.506: Yahoo Messenger 8.0.0.506 (10 MB) This is the very advanced version of the yahoo messenger, which has an option sending the SMS to the mobile directly to the person who has signed in into his mobile device. And the persons who are have the account into the messenger list. The new and smart tool is the audibles tool bar for chat box, which has many prerecorded audibles in different languages and different animated pictures speaking out those audibles. This is how the 11 versions of yahoo! Messenger is developed using RAD. And many other versions are upcoming using this method of software developing such as yahoo! Messenger 8.0(Beta), which is under testing phase. With in 8 years the yahoo had developed 8 versions of Yahoo! Messengers with versions numbered from 3.0 to 8.0.0.506 with pc -to-pc talk and SMS to mobile. Developing Yahoo! Messenger with Water Fall Model The first and the foremost is that in water fall model all the requirements are taken at a time. The design and coding is done in the most common way i.e. from the design phase itself it is designed. Requiremental Analysis and Design: The requirements of the yahoo messenger are the login window, chat window, the server side application for maintenance. All these are the requirements that are required for the development of yahoo messenger. The client application requirements are Login window Frame window Chat window Manage Contacts Authentication message window Then after the language in which the coding is to be done is decided. Data base for the server side application should be developed; the entire design depends on the data base that is structure to store the data of every client. The design of the yahoo messenger is taken up by the minimum and basic requirements. The design is made normally with out nay future plans. Development Diagrams The UML diagrams play an important role in the software development diagrams. These diagrams illustrate the clear cut idea of the software that is being developed. Use case Diagrams: Use cases describe the behavior of the system when one of these actors sends one particular stimulus. This behavior is described textually. It describes the nature of the stimulus that triggers the use case; the inputs from and outputs to other actors, and the behaviors that convert the inputs to the outputs. The text of the use case also usually describes everything that can go wrong during the course of the specified behavior, and what remedial action the system will take. Context diagrams: A context diagram is a data flow diagram, with only one massive central process that subsumes everything inside the scope of the system. It shows how the system will receive and send data flows to the external entities involved. Class Diagrams: Class diagrams are widely used to describe the types of objects in a system and their relationships. Class diagrams model class structure and contents using design elements such as classes, packages and objects. Class diagrams describe three different perspectives when designing a system, conceptual, specification, and implementation. These perspectives become evident as the diagram is created and help solidify the design. Data Flow Diagrams: A data flow diagram (DFD) is a graphical representation of the flow of data through an information system. A data flow diagram can also be used for the visualization of data processing. It is common practice for a designer to draw a context-level DFD first which shows the interaction between the system and outside entities. This context-level DFD is then exploded to show more detail of the system being modeled. Implementation and Coding: In this phase the actually the code is developed. Before that the total code is divided into independent modules, so that the coding becomes easy. So the coding part is divided into modules such as Integration and Unit testing : After the coding is done for individual modules such as data base structure, frame work and the data base or server connectivity module are integrated into one module of code for the code to work with all the functions full. Then this code is tested after the integration is done, to check weather the code is working collectively after integrating the all the modules into one single code. In the testing phase the developed software or website is tested in two ways i.e. alpha testing and beta testing. Alpha testing is the testing done by the developers before delivering the product. This alpha testing can be done in two ways i.e. white box testing and the black box testing. The testing for all the modules is done to check weather all the code is working properly or not and to ensure that each function is fully operational while at the same time searching for the errors in the code is called white box testing. Testing the internal and primitive operations and to sure that all are working according to the specification is called black box testing. Testing done by the customer to check weather all the specification requirements are working properly is called beat testing. If any problem occurs, then the error is set up and just added to the code at the appropriate position. Maintenance Phase: This is phase in which the maximum amount of resources are used. In this water fall model the yahoo messenger requires many changes in the features for adding new features such as the voice chat, video conference, pc to pc call etc. For all these new features the present code is not venerable to add the new models or to integrate, so that the reason why all the code is developed again with new features in the water fall model which consumes more time and resources. Developing Yahoo! Messenger with RAD Instant messenger is first lunched by yahoo named as Yahoo! Messenger on 21 July 1999. The first version of yahoo messenger is version 3.0 for MAC operating system with the features of webcam, file transfer, emoticons. The important requirement of an instant messenger is chat, and this chat is enabled between system to system because the messenger chat box communicate between two systems using there MAC (Message Authentication Code) address. Windows Application version of instant messenger and web messenger are the products of yahoo. Analysis Phase In this phase the requirements such as software hard ware requirements are analyzed and listed for the usage of the development of the product. The main problem is that the windows application cannot be directly connected to the remote database (for authentication, chat, offline message). For that the web service is the best solution that can connect database remotely and can call the methods in the remote classes. Because the web service transmits the data from the remote database, and it is in very robust form to destroy. Then its is to be decided in which platform the project should be developed either in java or Microsoft .net or etc. in some cases the customer itself asks the product to be done in a particular platform. If the customer did not ask for any particular platform we can chose the platform on our own. Estimation of cost is made in this phase itself. The total cost estimation for development, maintenance, etc. the cost for development is calculated in man hours of work. Requirement analysis: Actually the requirement of an software include the requirements of the customer that he want in the software and the other software and hardware requirements that are needed for the software development. The features of the yahoo instant messenger are enhanced form version to version. There are many version of yahoo messenger from version 3.0 to version 8.1. in each version the new changes and features had been added such as voice chat, pc-to-pc call, plug-ins, IM-Environment, SMS to Mobile etc. For developing software or windows application or a web application we need software to develop such as C++, VC++, Java or Microsoft Visual Studio etc. For instant messenger we need to develop a windows application that can be run at the clients pc and we a need a web service to communicate the client-client transaction. The windows application cannot directly communicate with the remote database and cannot communicate with the other client without a web reference. So web service is used a web service for checking the authentication of the users account and his details. The first version of the Yahoo! Messenger 3.0 has only few features such as chat, web cam, emoticons. In the later version the features such as voice chat, pc-to-pc call, plug-ins, IM-Environment, SMS to Mobile added. But all these features are not added at time. They are all added for the future versions of 3.0 to 8.1. With all these requirements a prototype model is prepared. And for designing the software that prototype model should be approved by the client. Hardware Requirements For developing an instant messenger an ordinary system is sufficient. But to make the instant messenger work we need a server that acts as web service for the instant messenger to communicate between the users of the instant messenger. The uninterrupted internet connection to the server is very much important so that no users finds incontinent to work. And steps need to be taken for a fast recovery at the time of crashing of the server. Design phase First the total development of the yahoo messenger is divided into modules. Then the software diagrams are drawn for the convenient for the developing the code. First the context diagram is drawn for the project. Then comes the data flow diagrams in which the flow of the data in the project is shown. The next diagram is the ER-Diagram in which the all the parameters of the total project are represented in diagrams. This diagram is very much useful in developing a database in which a column is made for every single column in the database. In this database the data should be maintained in the tables. And these tables should have the primary keys and foreign keys (primary keys of other table in the current table is called foreign key). In this design phase it self the use case diagrams, activity diagrams and sequence diagrams are developed. Then the use case diagrams which sub parts or modules of the project. Depending on these all diagrams the total project is divided into small modules and these modules are distributed to each team for development. Time boxing is adding features to future versions of the software and developing it no time. It is very important aspect of RAD to complete the job in less time and get the best product out than other competitors. In the design phase a first a prototype model is prepared with all the requirements that are analyses in the requirement analysis phase. And for designing the software that prototype model should be approved by the client. The total project is divided in small chunks so that it would be easy to develop the software in no time. The design phase has many sub phases, they are Software development diagrams: These diagrams are very important and help a lot in the development of the project. The diagrams are Context diagrams, Entity relationship diagrams, Data flow diagrams, Use case diagrams, Collaboration diagrams, Sequence diagrams. All these diagrams act as a blue print of the development of the project and will be very useful at the time of the software development. Development Diagrams The UML diagrams play an important role in the software development diagrams. These diagrams illustrate the clear cut idea of the software that is being developed. Use case Diagrams: Use cases describe the behavior of the system when one of these actors sends one particular stimulus. This behavior is described textually. It describes the nature of the stimulus that triggers the use case; the inputs from and outputs to other actors, and the behaviors that convert the inputs to the outputs. The text of the use case also usually describes everything that can go wrong during the course of the specified behavior, and what remedial action the system will take. The use case diagram gives the details of the requirements, options in the product specified by the client. These requirements dont change whatever the software development procedure used, so that use case diagram is same as that of the diagram that uses water fall model for software development. why in water fall model there is only one main class and all the other sub classes or child classes are developed under it. When a product is developed in .net, default folder AppCode is created in which all the class files, script files are developed. In the figure shown below the the authentication, chat address book, preferences are separate classes developed under the AppCode. Database Design: The design of database consists of making the data tables that are used in the project. Designing the tables includes deciding the primary keys and foreign keys in the tables and the data types of the columns of the tables. After completing all these diagrams and the database design, the project is divided in chunks and distributed among the team members for development of the project. RAD is best