Monday, September 30, 2019

Sun Also Rises vs. Hills Like White Elephants

Alcoholic Vail ?In many Hemingway novels and short stories, excessive drinking generally plays a major role in the relationships between the characters. This is very apparent in â€Å"Hills Like White Elephants† and The Sun Also Rises. The alcohol provides a gateway for the for the characters to forget about their personal problems, as well as, act out against their problems and short comings. ?In â€Å"Hills Like White Elephants,† both the girl and the American man drink alcoholic beverages all throughout their conversation to avoid each others’ company, as well as the problems that are occurring within their relationship.They begin drinking the largest beers available the moment they arrive at the train station. It’s almost as if they begin drinking to consume their free time with anything else that is available other than discussion. The girl, Jig, strikes up small talk mentioning how the hills resemble the shapes of white elephants. In the same breath she asks to order more drinks â€Å"Anis del Toro†¦Could we try it? † (Hills 211). She does this to presumably put off the inevitable oncoming conversation about the unborn child she was carrying.The reader can infer from the back and forth conversation that they are speaking of pregnancy. The use of â€Å"white elephants† in the description of the hills is used to describe a valuable but burdensome possession which its owner can not get rid of but whose cost is not proportionate to its worth or usefulness, in this case referring to a child abortion. This idiom can set the background for the awkward conversation. The couple drinks primarily to avoid thinking or conversing about the pregnancy; however this leads the reader to believe that much deeper problems must exist in their relationship.The baby is only a small tip of the iceberg. Jig, implies this when she states that she and the man never do anything together as a couple except try various new drinks, almost as if the both of them are constantly trying to invent new ways to avoid each other. At the end of their frank conversation both Jig and the American man are drinking alone â€Å" He walked through the barroom where people waiting for the train were drinking. He drank an Anis at the bar. † (Hills 214).The girl sits at the table alone and the man sits at the bar continuing to drink, suggesting that the two will eventually break their relationship, leading them to go their separate ways. ?In The Sun Also Rises, nearly all of the characters are alcoholics. No-matter their location, they are drinking, and in most case, in excess. Their drinking often provides them with a route to escape their reality. Their drunkenness allows all of the characters in the novel to endure lives that are extremely lacking in purpose and personal affection.As with Jig and the American in â€Å"Hills Like White Elephants†, Jake and Brett continually drink and talk about what their lives could be together, although that dream never materializes. In the novel, Hemingway attempts to portray the downsides to excessive binge drinking. During the novel, the frequent use of alcohol tends to bring out the worst behavior in some of the characters, in particular Mike Campbell (SAR 97). Mike is constantly drunk and has a terrible temper with violent outbreaks, which most commonly occur during his frequent bouts of drunkenness â€Å"I’m rather drunk, I think Ill stay rather drunk.This is all awfully amusing, but it’s not too pleasant for me. It’s not too pleasant for me. † (SAR 133). This shows that Mike is perfectly away of his abuse of alcohol and its effects on him, but he consciously chooses to continue the habit. Hemingway also subtly makes a connection that the frequent drunkenness worsens the constant emotional turmoil that Jack and his friends encounter. Following the Brett-Romero-Cohn love drama the only thing Jake has to fall back on is alcohol. This time however, even the booze wouldn’t help dull his feelings.Jake clearly needed something to cure his problems rather than search for something to cover them up, â€Å"Id believe anything. Including nightmares’,’Whats the matter? Feel low? ’,’Low as hell. † (SAR 147). The constant intoxication allows the characters to put off their problems and allow them to fester instead of confronting them, much like Jig and the American man in â€Å"Hills Like White Elephants†. ?In both the short story and the novel, it is very apparent that the abuse of alcohol plays a detrimental role in the development of the characters.They use and abuse this substance to run away from the problems that they desperately do not want to face. They use alcohol as a distraction as well as a source of entertainment to mask their problems. The use of alcohol in both stories generally leads to negative consequences for all parties involved.Works Cited Hemingwa y, Ernest. â€Å"Hills Like White Elephants. † The Complete Short Stories of Ernest Hemingway. New York: Scribner's, 1987. N. pag. Print. Bloom, Harold. Ernest Hemingway's The Sun Also Rises. New York: Chelsea House, 1996. Web.

Sunday, September 29, 2019

Chapters 11-16 of the novel Essay

Frankenstein is a novel written by Mary Shelley in the late 17th century which depicts a story about a scientist in Geneva who becomes obsessed with creating life. In his journey he comes across some notes of a professor in which specific notions on creating a living creature are contained. With these notes and his wild imagination Frankenstein puts together parts of corpses and revolutionises science by successfully creating a living creature. However, all is not merry, as Frankenstein realises his creation is disparate to human beings but that he has transformed what was once a dead corpse into a wretched monster. After abandoning his creation and later trying to kill it so as to cover up his unworthy work, Frankenstein effectively drives the monster out of his lab to fend for himself. At the end of Chapter 10 the reader is given Frankenstein’s view of his creation; he says ‘breathless horror and disgust filled my heart’ at this very point we begin to see Frankenstein’s dream to create life disappear and the reader is left feeling as horrified and disgusted as Frankenstein, towards the monster. Frankenstein continues his horrid reaction by stating ‘a thing such as Dante could not have conceived’ this phrase puts to light the actual horror of the monster because Frankenstein states that even Dante, a fantasist of evil, was not able to come up with such a creation. In Chapters 11 to 16 of the novel we see the epic voyage through the eyes of the monster as Shelley adopts the persona of the monster. Shelly’s portrayal of the monster in this distinguished technique helps us to better understand what the monster thinks and how his emotions change as he becomes more conscious of himself and his surroundings. Our feelings towards the monster change significantly and we begin to see a very different and unexpected side of him. The monster begins by telling us about his first memory of himself; he says that ‘a strange multiplicity of sensations seized me, and I saw, felt, heard and smelt at the same time’ this portrays the monster as a new born baby learning about the simple senses that all humans use. As the monster introduces us to his first day in the woods he says that ‘I felt tormented by hunger and thirst’ this illustrates the monster as a normal person who has to feed himself to live. Also the monster tells us ‘feeling pain invade me on all sides, I sat down and wept’ here we are able to distinctively see that the monster is no more different than a small child as both cry when they seem to find no remedy for their pain. Also we are introduced to the feelings of the monster which come to play a very important role in his later life. As we become more learned about the monsters feelings and actions we are presented by the more intellectual and able side. He begins by telling as that he is able to distinguish between insects and herbs and continues to show how rapidly he is able to learn by differentiating one herb from another. This shows the immense intellect of the monster and also makes the reader more attached since there becomes a similarity between the monster and humans. The monster tells us that he ‘began also to observe, with greater accuracy, the forms that surrounded me’ this shows that the monster is able to process his sight with major accuracy and is able to learn about his surroundings easily. He continues to say ‘my mind received every day additional ideas’ now we are able to understand that the monster has the ability of thought and has an imagination, the one attribute that differentiates humans from all other creatures. As we continue we see that the monster is able to learn physically from its mistakes, ‘I thrust my hand into the live embers, but quickly drew it out again with a cry of pain’ this once again represents the human like intellect of the monster being able to assess mistakes so as not to repeat it again. Furthermore, the monster inhabits the nature of cooking as he experiments with his newly found fire, he begins to see that the ‘berries were spoiled from this operation, and the nuts and roots much improved’. The actual mental intellectual ability of the monster is portrayed by Shelley as the monster inhabits in the cottage of the De Lacey’s. Here the monster is educated to the language of his fellow inhabitants who he reluctantly segregates himself due to being in doubt of acceptance from them. The monster begins his quest to understand the language of his company by observing their sound and actions. He says ‘I found that these people possessed a method of communicating their experience and feelings to one another by articulate sounds. ‘ However we are also presented with the less able understanding of the monster as he struggles to understand the words connected with feeling such as ‘good’, ‘dearest’ and ‘unhappy’. This once again clearly exposes the monster with human like intelligence since it needs to be able to experience feelings to be able to understand it. We are introduced to a new member of the family, an Arabian, who is unable to speak the language and thus is taught by her companions and at the same time the monster is able to educate himself as he eavesdrops between the holes in the walls separating his feeble habitation from the family’s cottage. The monster learns all his facts and details of humans and logic by listening to the various texts and conversations of the De Lacey family. He says ‘I obtained a cursory knowledge of history†¦ it gave me an insight to the different manners, governments and religions of the different nations of the earth’. Shelley portrays the monsters thoughts and feelings at this new acquired knowledge in a very intense way. The monster begins to question the very being that he is ‘what was I? †¦ I was, besides, endued with a figure hideously deformed and loathsome’. Here we begin to see that the monster becomes evident of his deformity. From the beginning of the monsters tale to the very end we are introduced to the lonely figure and outcast to society that the monster exists as. The first evidence of the social disregard comes from Frankenstein himself, after he realises that he has created nothing but a monster, he abandons his creation and kicks him out of the lab. From then on the monster is faced with negligence from every human who he unfortunately appears in front of. The monster is very adamant at questioning himself to the reality to his being. He says ‘And what was I? Of my creation and creator I was absolutely ignorant’, here we begin to realise that the monster begins to get upset about his lonely being. This interrogation that the monster puts to him leads him to become upset and we see his emotions beginning to cloud his judgement. ‘Was I then a monster, a blot upon the earth, from which all man fled, and whom all men disowned? ‘ the monster is able to understand his position in the human society here, as he examines the actual creature that he is presented as to humans.

Saturday, September 28, 2019

Victim's Movement Essay Example | Topics and Well Written Essays - 250 words

Victim's Movement - Essay Example Laws like Victims of Crime Act (VOCA) established the Office for Victims of Crime (OVC), the Victims’ Bill of Rights in 1990, Violent Crime Control and Law Enforcement Act of 1994 which includes the Violence Against Women Act (VAWA) and the subsequent Constitutional Amendment in 1996, were passed by government and promoted. Universities also expanded and established victim-related courses with the U.S. Department of Justice sponsoring the first National Victim Assistance Academy in 1995 (Wallace and Roberson, 2010). Undeniably, the movement succeeded, but an increase in crime rate and severity of crimes today need more educated and trained professionals for support and intervention. One goal the movement should strive for in the next ten years is to develop a plan to maximize government and the universities’ support with regard to intervention. Next, establish permanent information exchange with universities, regarding the changing needs of victims, modus operandi of criminals based on victims’ stories, and other information which may help universities update and improve victim services curriculum, aimed at skills and competency improvement of students when they graduate and practice. Lastly, an organization composed of representatives from the US Attorney’s office, FBI, military and other federal agencies, university and leaders of the different organizations involved in victims assistance and intervention, doctors, psychologists and psychiatrists and other such profession als need to be established. The organization shall serve as a coordinating body dealing with data and information on changing needs of victims and modus operandi of criminals. From the data, the organization can come up with a standardized manual dealing on victim assistance and intervention. All the goals mentioned above will surely make a big difference in

Friday, September 27, 2019

Information Based Decision Making Essay Example | Topics and Well Written Essays - 2500 words

Information Based Decision Making - Essay Example In general a decision is made depending on the situation and the issue. The decision made cannot be favorable for everyone in all circumstances. It may lead to improvement or adverse effects on the situation. The information from the concerned department is the important part of decision making process. A decision is made only after collecting the relevant information. Thus information plays a major role in any decision. As a strategic manager I should design a strategy that helps in the process of decision making. This strategy must incorporate the plans that improve the existing situation. The strategy should consist of step by step procedure. The data and information must be selected when using the information based decision making. The nature of the data is an important aspect of information based decision making. (Johnson, 2008).The decision can be made only based on the nature of data. To get the data the data source must be selected well in advance. Once the data source is selected the corresponding data can be retrieved from the specified source. The identification and selection of data involves ascertaining the nature of data, data selection criteria and analyzing the legal requirements of data collection and storage. These are outlined in the following steps. Data is generally given as an input to the corresponding information system. The raw data is processed in the system after which it is given as an output. This output is referred as the information. Data can be in the form of a text file, image, video or an audio. Hence the data can be in any format that is understandable by the respective information system. This data is processed to form complete information. Data is an abstract type of information. The data can be either quantitative or qualitative. The nature of data has gone through various phases of improvement. Due to the latest technologies and the advancements, data's nature is completely different when compared to the initial stages. The nature of the data and the information must be assessed so that the decision is made according to the nature and type of data. The type of data may also differ from one system to another. The decision will differ based on the type of data. The processed information is then analyzed after which the next step begins. Criteria for Data Selection Data selection is an important aspect of information based decision making. Data selection is done based on various criteria. The data must satisfy the criteria to enter in to the system. The data selection criter

Thursday, September 26, 2019

The Dangers Of Cell Phones For Human Health Essay

The Dangers Of Cell Phones For Human Health - Essay Example Supporters of cell phones say that cell phones provide us with a number of facilities, such as ease of communication, neighborhood crime watch, use in emergencies, and use as reminders. However, there also exist some risks regarding the use of cell phones. Some of the risks include road accidents, increased number of crimes, and weakening of eardrums. Today, almost every person keeps a cell phone in the car while traveling because a cell phone has become one of the major necessities of life. Use of cell phone while driving may result in slower braking reactions, slower reactions to traffic signals, and difficulties in making quick decisions. If we compare the ratio of road accidents that used to occur in a year before the 2000s with today, we come to know that the ratio of road accidents due to use of cell phones during driving has been increased by 75 to 80 percent approximately. â€Å"In a study done in April 2006, it was found that 80% of car crashes involved the driver not paying attention right before the accident† (Russell). The reason is that cell phones distract the driver’s attention, which results in road accidents. â€Å"According to several resources, every year, about 21% critical vehicle crashes happen due to cellphone use and require teens among age party 16 to 19 ages† (He). Supporters of cell phones say that cell phones do not take much attention of the users; rather they make people more responsible as they have to take care of themselves and other people while on road. However, this viewpoint is very illogical because accidents just need a little negligence to occur and that negligence can take place at any stage of cell phone use. Cell phones also create risks for health. Excessive use of cell phones can affect our eardrums and can cause skin cancer as well. Today, a large number of young adults use a hands-free system to hear songs from their cell phones.

Wednesday, September 25, 2019

Week 5 LT Essay Example | Topics and Well Written Essays - 250 words

Week 5 LT - Essay Example succeeded have always made the appropriate choices on the particular metrics to use, and ensuring that they are updated on a regular basis in ensuring that they are up to the task in their performances (Goetsch and Davis, 2012). Ideally, by the formations of partnerships and other similar associations, companies can hasten product development as well as a fastened marketing, which otherwise would take long periods to achieve. Alliances never create value automatically; however, achievement of success requires the development of performance measures dealings without a full-blown acquisition, thereby requiring the use of metrics for development and implementation of successful alliances (Goetsch and Davis, 2012). Development of metrics for quantification of benefits generated by a company is tedious; therefore, requiring a balanced scorecard, which measures the overall quality of the working relationship, the strategic value and the operational effectiveness together with the financial performance (Goetsch and Davis, 2012). Ideally, a balanced scorecard shows precise appropriateness in the measurement of a number of aspects, contrary to metrics in that overreliance on financial metrics is a shortsighted development, such as an example of establishing an underperforming alliance for the sake of remaining relevant in a competitive

Tuesday, September 24, 2019

ETMA05 Essay Example | Topics and Well Written Essays - 2000 words

ETMA05 - Essay Example Under each respective heading a review of the advantages and disadvantages of litigation and ADR will be provided. The section titled â€Å"The ADR Process† will focus on exploring the issues which should be considered before making a decision whether or not ADR is suited to a particular case. This section mainly focuses on the Civil Procedure Rules 1998, particularly the overriding objective, which provides assistance in determining whether or not a case is suited to the ADR process. The section titled â€Å"Civil Trial† considers the advantages and disadvantages of litigation as a form of dispute resolution. Conclusion In the Conclusion, the findings will be summarised then an opinion shall be formed. This is in respect of what issues a solicitor should consider with a client before deciding if the case is suited to the ADR process. The conclusion refers to the main points in the Introduction and draws a close to the detailed points made in the main body of the essay. Question 2 Introduction Alternative dispute resolution (‘ADR’) is the term given to a variety of methods of resolving disputes other than by initiating court proceedings. Some examples of ADR are negotiation, mediation, arbitration, conciliation and adjudication. The various different forms of ADR vary considerably in terms of the procedure they adopt and the outcomes they are able to produce. For instance, arbitration is more akin to the court process, as it can produce a decision which is binding on the parties. Mediation, on the other hand, is more flexible in the approach which is adopted and the outcome can only be determined by mutual agreement between the parties. Irrespective of which form of ADR is used however, ADR now plays an important role in the English legal system. The important role ADR now enjoys largely results from a major review of the civil court rules and procedures in March 1994, which was carried out by Lord Woolf. The principal objective of th e review was to improve access to justice, whilst reducing the costs associated with litigation, thereby making the system more lay person friendly by reducing complexities, and removing unnecessary differences between practice and procedure. The review resulted in the Civil Procedure Rules 1998 (‘CPR’), which came into effect on 26th April 1999. Albeit, even prior to the introduction of the 1998 Rules, it became apparent that ADR was going to play an important part in the new civil justice landscape. ADR is now an entrenched and integral part of the new civil justice system. The new civil justice system therefore operates on the premise that, inter alia, litigation ought to be avoided wherever possible. Where litigation is deemed necessary, however, Lord Woolf’s opinion was that the procedure ought to be less adversarial and more cooperative. ADR is a process that neatly fits into this new civil procedure framework. In fact, under the new CPR a party/person who fails to seriously consider ADR at the pre-trial stage could expose that party to a penalty at the costs stage of the litigation process. It follows therefore that legal representatives are under a professional duty to consider ADR, as an alternative to litigation, as a means of reaching an amicable settlement. Collectively all methods of resolving disputes

Monday, September 23, 2019

Roles and Responsibilities of a Newly Qualified Nurse. Professional Essay

Roles and Responsibilities of a Newly Qualified Nurse. Professional Role Development - Essay Example This statistic demonstrates the importance of professional role adaptation, growth and development, as well as the significance of knowledge in the roles and responsibilities of a newly trained and qualified nurse. The school-bred values should reconcile with the ‘real world’ values of nursing practice. This is crucial in mitigating discrepancies that may occur when the new graduates take up their roles in healthcare service delivery (Duchscher 2008, p.3). Knowledge on roles and responsibilities is crucial in the pre-empting of role ambiguity and resultant job dissatisfaction and career disillusionment that may arise. The consolidation of the attained knowledge and skills is essential in availing a smooth transition from student to a professional practitioner. For a newly qualified nurse, the core concerns lie in care delivery and management as well as personal and professional development (Burton and Ormrod 2007, p.2). Critical Discussion The fields of practice that new ly qualified nurses can specialize in are diverse and may incorporate acute care of the elderly, coronary and palliative care, mental health nursing, or substance abuse. The roles of a nurse span from being caregivers to counsellors. They also advocate for the client and are change agents in the sense of modifying the client’s lifestyle in a healthier pattern. The primary role of a nurse is provision of proper care and protection to the patients to safeguard their health and wellbeing (Duchscher 2008, p. 5). Nurses’ roles include providing proper health and social care in a safe and valuable manner to patients (Burton and Ormrod 2007, p. 3). In addition, nurses should also respond to patient’s needs and deliver care within their context such as drug administration and infection control. Nurses also provide knowledge and support to patients and monitor vital signs of patients. Newly qualified nurses have a responsibility of maintaining the set standards of care a s well as conform to the set ethical and legal decisions. The transition into the nursing profession, especially the initial adjustment is usually marred by feelings of anxiety, insecurity, inadequacy, and instability. This revolves around the newly trained and qualified nurse’s roles, responsibilities, relationships, and knowledge (Burton and Ormrod 2007, p.4). Transition shock is occasioned by the fact that new graduates are confronted by a wide range and scope of physical, intellectual, emotional, developmental, and sociocultural changes as they take up their fresh roles. The newly trained and qualified nurses must, therefore, institute mechanisms that shape readiness for the new roles. Preparedness and reinforcement in role transition is essential in order to reconcile the associated intensity and duration of the transition experience. Newly trained and qualified nurses should be ready for the escalating workplace expectations. A newly trained nurse should be competent in handling the new roles. The essence of having prior knowledge of the profession and workplace expectations is outstanding as it bridges the transition shock. Knowledge on role transition is crucial in constructing successful integration of nursing professionals into the potentially stressful and highly dynamic context of professional practice. This calls for a better

Sunday, September 22, 2019

Making Sense of Change Management Essay Example | Topics and Well Written Essays - 1250 words - 1

Making Sense of Change Management - Essay Example It accounts for an organizational process which is aimed at the empowerment of the employees towards accepting or embracing a change in their organization or business environment. The strategy begins with a systematic approach for diagnosing the present situation for determining both the need for change and also the capacity of the organization to implement changes. However, at the beginning of the plan, the purpose, objective and process of the change must be specified to every member of the organization. Most organizations have acknowledged the idea of managing innovation in their organizations. In fact, the performance of innovation varies greatly across organizations which suggest that both the organizational and structural factors affect the influence of innovation on performance (Bessant & Pavitt, 2005, p.13). Â  The project aims to explore the changes and innovation management strategy undertaken in US-based Apple Corp Ltd. It makes an analysis of the effectiveness of the strategy undertaken in the organization in bringing about the change with a presentation of suitable arguments to support the topic. Â  The change management strategies are explained in terms of Kotter’s eight steps to change. The theory is one of the most important and most widely accepted texts in modern organizations. It defines eight steps in which changes can be implemented in organizations effectively. Although the steps are primarily meant for organizations, they also find application in personal change initiatives. Successful change management is also explained in terms of the Lewin’s model of organizational change.

Saturday, September 21, 2019

Driving Essay Example for Free

Driving Essay Realistically as you start your day it is safe to assume that you have no intentions of being in a head on collision and your vehicle being bashed nor did the person who was nonchalantly steering the car with their knee while texting as they were driving. Ultimately I think everyone will come across at least one irresponsible driver in their lifetime. Most of us are fortunate enough to survive these encounters, however not everyone is that lucky. Reckless drivers endanger and destroy people’s lives and possessions on a daily basis. Various conducts while driving are considered hazardous. Speeding is a very common practice that can lead to a catastrophe. Drivers that speed are engaging in irresponsible and impetuous conduct. It is especially dangerous to speed in residential neighborhoods where children and pets may be playing. Speeding drivers can also be dangerous in neighborhoods where homeowners in their vehicles are entering and exiting their driveways. Driving at an excessive rate of speed is quite common. This practice is especially dangerous when driving through a residential neighborhood or a school zone. Posted speed limits are not meant to be suggestions; ignore them and you run the risk of being stopped and ticketed by police. Driving Too Slow Some drivers fail to take into account the location where they are driving and drive at the same speed on the highway as they do in a residential area. A better strategy is to look at the posted speed limits and adjust your speed accordingly. Many dangerous driving habits are a result of over confidence. Drivers with years of experience sometimes become dangerous drivers because they are over confident with driving their particular vehicle or a particular route between home and work. They are not prepared when something out of the ordinary occurs.

Friday, September 20, 2019

Enhancing Security Process And Systems In Hotel Industy Tourism Essay

Enhancing Security Process And Systems In Hotel Industy Tourism Essay Introduction Since its inception hotels have provided travellers with a place to stay away from home and which offers them amenities that would ensure their comfort and security. The hotel industry core value is to deliver quality service to their guest, and with it also comes the obligation of being responsible for their security while under their care. The security of a hotels guest and how the hotel management and staff take the steps to ensure this spells the success or failure of any establishment. A lax security would mean exposing the guest to a different number of risks and would also reflect poorly on the hotels reputation. Therefore security is something the hotel industry should invest upon to ensure its success, because the bottom line is the question of whether or not a guest will choose to return to a hotel depends solely on how safe and secure they feel while staying in a hotel. However this basic premise is not that easy to put in practice. While different establishments have endeavoured to put in place security measures that would ensure the safety of its guests such as ensuring confidentiality of its guests personal data, using surveillance equipment and the like; the fact is technological advancements have also been used by some criminal elements to circumvent security measures for their own unscrupulous intentions. Cases of identity theft using information stored in a hotel guests key cards, and the recent threat of terrorist attacks are but some of the security issues that the hotel industry has to contend with. This paper seeks to study the security measures being put in place by the hotel industry and how it relates to their operational effectiveness. In particular this research study shall aim to achieve the following: To identify the forms of breaches in hotels security system; To identify the security system and other safety policies of three hotels; To determine recommendations that will enhance and further develop the security system of the hotel industry. The method that will be used in this research paper is a case study of the security measures of three hotels: the Hotel Marriott, the Intercontinental Hotels Group, and the Shangrila Hotel. The three hotels were selected in this study because they are known to be among the leaders in the hotel industry; they have faced or are in danger of facing serious concerns related to security (the Marriot Hotel was attacked by terrorist bombers in the past); and they are also leaders in the field of hotel security. The analysis that will be used in this case study will be based on the assessment paper by Alan Orlob the Vice-President of Corporate Security for the Marriott International, the talk delivered by David Bradley Bonnel who is the Director of Global Security for the Intercontinental Hotels Group, and the Security protocol issued by Shangrila Jakarta. This research paper shall also review related literature concerning the hotel industry its values and principles in relation to ensuring security, and related internet sources concerning hotel security procedures and measures. Literature Review According to Capparella J. (2002), the word hotel is derived from the 14th Latin word hoste meaning person or thing that provides something for a guest, usually lodging, and sometimes food. The concept of a hotel was to provide some sort of temporary lodging accommodations for transients. Hotels varied little in ancient times when they were first described as simply being a boarding house providing a place to rest and nothing more. Throughout the early centuries (1 AD forward) the evolution of the hotel was also minimal. In the middle ages the hotel began to transform. European and English inns became the variations of the hotel during the middle ages. More specialized functions and amenities were included in the inns services. Among these amenities include the private rooms, public kitchens and public gathering rooms. Some inns have also constructed small taverns which were aimed to bring comfort and convenience of the traveller. During this period, the hotel variations were no longer treated and viewed as merely a place to spend the night. This development in the middle ages provided the transition of the hotel concept which will later on become part of the hospitality industry. As the said development emerged during the middle ages, the latter part of the period provided another significant advancement in the inns. Laws, rules and regulations pertaining to the operations of the hotel as well as the corresponding responsibility of the owner were imposed. A French law during the 1300s dictates that any lost property of a client must be replaced by the landlord. A century passed when another French law mandates the registration of every hotel to the state. The English around this period has also formed another set of guidelines and regulations that discusses in detail the comfort and cleanliness provided by the hotel to their guests. The said guidelines eventually served as the European standard for hotels. However, in spite of these advancements, a number of hotels and inns remain lacking on measures involving the privacy and security of guests. Rooms that are considered private have no locks and the guests are exposed to an unsecured communal setting. In the 16th century, France established culinary requirements for hotels that offered dining services that were based on a rating system geared toward quality, promotion, and competition. In the next century, this system of rating a hotel was formally established throughout Europe. By the 1700s, particularly in France, is when the hotel industry or hospitality business formally established itself. Lodging also transformed into a mixed-use business that now offered a variety of services and amenities. The standards for quality, comfort, value, and service were now synonymous with any place of lodging adding to its definition of being a temporary place to spend the night. (Caparella, 2002) In America the concept of the hotel as we know it was further developed with the appearance of larger hotels during the 1800s. These hotels differentiated themselves from other lodging types by their size and by offering of luxurious amenities. Most of these hotels were in large cities and along the major travel routes of stagecoaches, and later the railways. (Ibid, 2002) With the passage of time the core aspects of the services provided by the hotel industry was already well established with good service and security as one of the key concerns. Based on common law hotel patrons commonly assume that hotels have created a relatively safe environment, and that the, common law concept of the innkeepers doctrine addresses the hoteliers role in maintaining a safe and secure environment by requiring the hotelier to take all reasonable measures to provide a secure environment for guests and to safeguard guests property. (Feickert, et.al. 2006) The concept of reasonable protection was further advanced by the courts upon which the levels of liability of hotel owners were increased. The small and independent hotels were also similarly held liable to the standards imposed on large and popular hotels thus giving emphasis on the issue of security among the industry regardless of the size and popularity of the establishment. The said impression of the innkeepers doctrines common law aims to highlight the role of the hotelier in sustaining a safe environment through the adaption of all logical measures to ensure a secure environment to be enjoyed by the guests. The concept of reasonable protection was advanced by the court and has developed into increasing levels of liability of hotels. To date, the issue of security within the hotel industry remains a primary concern among hoteliers. The said issue remains foremost in the minds of both the guests and hotel managers particularly in light of the turmoil of world events. Such concerns of managers often dwell on the most acceptable security measures to hotel guests which will directly be viewed as a measure that will ensure safety and security. With these concerns, hotels must also ensure that providing a welcoming environment remains their highest priority. The hotel guests needs reflect their view on the hotel industry. While a traveller looks for adventure in his travels in each area and country, he still expects to rest and relax within the confines of his hotel room. While he expects to experience thrills out of exploring places, he would need to have access to recreational facilities of the hotel such as the use of the pool and the services in the hotel bar. The guest anticipates the best treatment from the employees and expects traits such as honesty and respect for privacy to be recognized. Being on a holiday, the guest does not expect neither hassles nor inconveniences to hamper his trip. Adapting this perspective of the hotel guest, hotels have formed several quick and effective measures to ensure the security of the guest without invading the privacy. Hotels have also become the ideal target for terrorists since 2004, the post-9/11 period. Militants can assume the same type of strategies to give a statement against the Western imperialism. Hotels remain one of the best targets for such terroristic acts since Western businessmen, government officials, diplomats and intelligence officers frequent the hotels. Such place provides the ideal scene for inflicting terror through international media without penetrating the security ranks of Embassies. The shift towards the targeting hotels was traced to the attacks against hotels in several parts of the globe i.e. Pakistan, Iraq, Jordan, India, Afghanistan, and Egypt. Attacks instigated in Amman, Mumbai, Jakarta and Sharm el-Sheikh were coordinated to hit more than one hotel. Addressing this issue, hotels have adapted measures that will develop security within hotels. The hotel security was perceived to have improved since 2004. Such security mechanisms in several hotel have helped saved lives such as the Marriott Hotel in Islamabad. The hotel industrys vulnerability to attacks is caused however by the strategic nature of hotels. In addressing security issues, the typical notion of general manages and security manages is that the installation of obtrusive and indiscrete security mechanisms will only generate more concern from the guests instead of creating a safe and secured environment. Other hoteliers often see security measures as unnecessary and merely increase the hotel expenses. Nevertheless, the security department and its managers role increased throughout the years. A main concern of hotel owners is the merging of security measures in the operations of the hotel. Instead of isolating the security department from others, security must be integrated within the operating procedures of the hotel. Security measure served as part of the hotel security routine particularly different types of technology such as electronic card-locking system, camera and communication system, as well as a closed circuit television. Additional security features can include safe-deposit boxes, guest-door locks as well as the re gular life-safety systems i.e. sprinkler systems, alarms and fire extinguishers. Hotel security features have been increasingly developed in the past years. This can attributed to the increase in neighbourhood crime, technological advancements and a shift in the demographics of the hotel guests. Such is the case of the electronic door locks which generates a feeling of security expected from the safety measure. Hoteliers have also taken a closer look at the needs and wants of the female traveller being primarily concerned over safety and security measures. As expected, hotel managers may face challenges as the media continuously work on bringing criminal actions to the limelight particularly since the news of the 9/11 attack have changed the perceptions on travelling and safety. Body of the Study and Research Results Case Study Number 1: The Marriot Hotel Experience On July 17, 2003 the JW Marriot and the Ritz Carlton in the upscale area of Jakarta, Indonesia were attacked by two suicide bombers. The bomb blast killed nine people and injured about 52 individuals. Based on the investigation following the attacks it was found out that the suspects checked into the hotel as guests, and that the explosives they used were smuggled into the hotel in their luggage which was not checked because it was too big and had to be placed in a trolley. The hotel staff did not noticed anything because they assumed that hotel guests cannot be terrorists. On September 20, 2008 another Marriott hotel was attacked in Islamabad, Pakistan. A dump truck which was filled with explosives was detonated in front of the hotel killing 54 persons and injuring 266 individuals. Based on the report that the Vice-President for Corporate Security Alan Orlob made before the United States Senate Committee on Homeland Security and Government Affairs in 2009, the Marriott security measures helped in preventing a much bigger casualty in both the Jakarta and Islamabad attacks. In Jakarta during the time of the attack the hotel security were on Threat Condition Red. Orlob claims that the checkpoint placed at the hotel gates prevented the suicide bomber from driving a vehicle laden with explosives straight into the lobby of the hotel. Orlob also states that because of the alert response of the Merriotts three security personnel who were manning the checkpoints that day, helped in preventing the driver from entering the lobby of the Hotel. In the Islamabad attacks a combination of a hydraulic barrier and a drop down barrier prevented the vehicle of the suicide bombers from approaching the main premises of the hotel. The vehicle filled with explosives was detonated at the barrier killing 56 people out of the 1,500 people who were billeted at the Marriott during that day. Orlob claims that the casualties would have been larger if there were no security measures that were put in place. During the attacks in Islamabad, Orlob states that the hotel had 196 security personnel, 60 of which were on duty during that day. They also had sixty two CCTV cameras placed on the inside and outside of the hotel and bomb sniffing dogs. However a paper by security expert, John Solomon the Head of Terrorism Research, World Check (2009) states that in both the Jakarta and Islamabad Marriots security program has had shortcomings on two aspects. First is that the hotel did not have adequate measures for screening guest and staff for possible terrorism risk. Solomon pointed out that in both the Jakarta and Islamabad attacks the terrorists were able to study the area of the hotel and gather intelligence information by checking in as guests. The second shortcoming relates to the failure of the hotel security and risk manager to correctly analyze the possible security risks that the hotel faces. According to Solomon the problem is due to security and counterterrorism specialists penchant for analyzing a security threat exclusively on historical patterns. The common practice of hotels is to hire these security specialists to make a risk assessment which the hotel faces. However by seeing terrorist attacks as recurring patterns what happens in the future will be the same to what is occurring in the present and what transpired in the recent past fails to grasp the fact that terrorist tactics are constantly evolving and developing. The result of this way of thinking is that security experts fails to adopt concrete measures that are applicable to the possible dangers the situation poses. Ironically Orlob also had a similar observation when, as part of a team of hotel security specialist, he visited Mumbai, India after the terrorist attacks in 2009 to the Taj Mahal, Oberoi, and Trident hotels. Orlob included these findings in the same Senate Committee hearing that i have mentioned above. According to Orlob the Taj Mahal hotel failed to address the following security concerns: Before the attacks the terrorists were staying in the hotel for several months posing as guests. They were seen taking photographs and have been studying the layout of the hotel; The police who responded to the attacks were not familiar to the building layout and the plans that were outdated and did not indicate the renovations that has taken place; The Taj Mahal hotel lowered their security measures due to a wrong intelligence report that was given to them; The hotel did not have physical security measures such as barriers, sprinkler systems and the like which could have helped to slow down the terrorists if not deter them. Orlob has noted during the Senate Committee report that after the attacks on the Marriott the security measures in placed have already been reviewed and developed to cope with the threat of terrorists groups. Case Study Number 2: The Intercontinental Hotels Group The Intercontinental Hotels Group (IHG) is one of the leading international hotel chains in the world today. Currently there are about 4,186 IHG hotels operating worldwide bearing the IHG brands of InterContinental Hotels, Crowne Plaza Hotels, Holiday Inn and many more which are franchised and are owned by private companies. The IHG main headquarters is based in the United Kingdom and there are regional offices for the Americas and Asia Pacific region. During the 2009 Mumbai terrorist attacks the Intercontinental Hotels Group were able to send out instructions to two of its hotels in the area concerning security measures they should put in place. According to the Director for Global Security of IHG David Bonne, this quick response helped to shield the IHG properties from the attacks. Bonnel points out in a report dated March 11, 2009 that the IHG were able to address the threat posed by the Mumbai incident due to the timely and relevant information shared by individuals who are in charge of the security and counter terrorism program in their respective corporations. This association of professionals dealing with corporate security were instrumental in providing intelligence that helped to facilitate appropriate response to the crisis, effectively deploy resources, and ensured the flow of information between the corporate headquarters and the hotels that were affected by the attacks. Bonnel states that after 9/11 attacks the IHG has developed a security plan that specifically addresses the threat posed by global terrorism. This security plan is based on the provision indicated in Title IX of the 9/11 Commission Act which has mapped out crisis management as the preparedness of the private and public sector on three aspects of operation which deals with rescue, restart, and recovery. According to Bonnel the IHG crisis management system is an integral part of the whole structure of the corporation, organizational culture, and operations of the company, and provides an effective and flexible response to probable and expected threats to security. The IHG system works through different but interconnected aspects which focuses on the following: constant threat assessment; emergency action plans and business continuity plans that are specific to the site involved; a crisis response plan for senior executives; crisis response teams; a network for internal communications; and a training program for emergency response. The IHG crisis management systems main thrust is to ensure that in the event of a threat or crisis its investments and guests are protected and rescued if the need arises, and in the event of damage to the corporations asset, the system ensures continuity in operations and business functions. One of the core aspects of this crisis management system is the development of a comprehensive counter terrorism program which is based on responding to threats and leads gathered from a reliable intelligence network connected with the Department of Homeland Security (DHS). This counter terrorism program works by evaluating and then categorizing all of IHGs hotels against a profile on terrorist risk. Each hotel location will also be assessed in a regional strategic threat assessment. The entire IHG hotels capability to resist an attack will also be comprehensively assessed, and management will be provided with an action plan that would increase the hotels security capability. A strict monitoring of compliance to the plan will also be carried out to ensure its implementation and in order to have a constant evaluation of the whole implementation process. According to Bonnel the IHGs counter terrorism program was designed with the view of implementing it within the framework of mandator y compliance with standards regarding operational and structural safety and security. Case Study Number Three: The Shangri-la Hotel Jakarta Hotel Shangri-la Jakarta is one of the hotels that are in operation in the Southeast Asia region. The information issued by Shangri-la Jakarta states that it has a superb reputation when it comes to ensuring the safety and security of its guests and personnel, and the hotel claims that many experts in security has considered it to be a preferred base in the city in case of emergencies. The security measures implemented by Shangri-la Hotel Jakarta are quite similar to the Marriot and IHG. It has a UVS or Under Vehicle Scanning system which is located at the main gate of the hotel; it has EVDs or Explosive Vapour Detectors; it employs bomb sniffing dogs that have been certified by the Australian Law Enforcement and Working Service Dog Handler Association; its X-ray machines for luggage scanning are state of the art; around 330 CCTV cameras are installed in the hotel; there are around 200 highly trained security staff; there are satellite telephones in case normal phone communications a re cut off; and the hotel also has a helipad on its roof. The Shangri-la Jakarta also boasts of a comprehensive Civil Disturbance Plan designed to address different possible situations that might arise in its country of operation. Like the Marriott and IHG the Shangri-la Hotel Jakarta hires security experts that acts as consultants to the hotel. Reliable intelligence is provided for by these security consultants. The Shangri-la hotels team of local and international experts in security helps in keeping the hotel abreast to the security situation in Jakarta which develops its readiness and capacity to respond to any potential threat to its guests safety and security. The chart below shows the comparative data of the three hotels based on the reference material used: Hotel Marriot IHG Shangri-la Hotel, Jakarta Secondary 1 deadbolt lock Smoke detectors and fire sprinkler systems CCTV cameras Explosive Vapour Detectors X-ray machines CCTV Cameras X-ray machines Smoke detectors and fire sprinkler systems Other security measures possibly use but not identified in reference material used by researcher. UVS (Under Vehicle Scanning) system EVDs (Explosive Vapour Detectors) X-ray machines CCTV cameras Satellite telephones Highly trained security personnel Bomb sniffing dogs Expert Consultant Highly trained security personnel Bomb sniffing dogs Expert Consultant Highly trained security personnel Bomb sniffing dogs Expert Consultant Viewports in all guestroom doors interior corridor access only access control on all guest exterior access doors Viewports in all guestroom doors bollards and barriers Same although not indicated expressly in the reference used by the researcher. Same although not indicated expressly in the reference used by the researcher. Roof helipad Security Guidelines and Emergency Plans Cooperation with International Security specialists groups and Government Agencies concerned Security Guidelines and Emergency Plans Cooperation with International Security specialists groups and Government Agencies concerned Security Guidelines and Emergency Plans Cooperation with International Security specialists groups and Government Agencies concerned Conclusion The case study of the security measures being implemented by the Marriott, IHG, and Shangri-la shows certain similarities in terms of the equipment used, personnel involved, physical structures built, and development of a comprehensive security and crisis management plan. All three has hired security experts to provide detailed intelligence reports and to conduct and develop a crisis and threat assessment in order to develop the hotels preparedness in the event that such threats will occur. It is also clear that security plans are directly related to the hotels image and reputation, and most security plans is actually part of the hotels commitment to its guests to ensure that their peace of mind and security are taken cared of while under their care.

Thursday, September 19, 2019

American Dreams Come True Every Day! Essays -- Essays on the American D

â€Å"Life, liberty, and the pursuit of happiness†¦Ã¢â‚¬  are the famous words every American hears throughout their lifetime. These words are part of America’s history through the Declaration of Independence, America is the only country where the â€Å"pursuit of happiness† is actually guaranteed in writing. What exactly are the â€Å"pursuit of happiness,† and the â€Å"American Dream?† As defined by most writers, such as Hemmingway, it’s becoming rich young and having the opportunity and will to do what you please with your wealth. To many foreigners, such as my father, the â€Å"American Dream† is just to escape poverty and retain a better life. Maybe, the â€Å"American Way† is philanthropy, making billions of dollars and giving some of it back to those who really need it. The â€Å"American Dream† is different to all people but always involves one common factor, the almighty â€Å"buck.† Current times call fo r new techniques in gaining the â€Å"American Dream.† The possibilities are endless through the World Wide Web, and the booming economy make it possible for anyone to make a good living.   Ã‚  Ã‚  Ã‚  Ã‚  Henry B. Plant is featured in the article â€Å"Florida’s hidden treasures: Museums, cultural parks† written by Copley News Service in the Washington Post for talking about his dreams. Plant had the goal of turning the Florida wilderness in to a â€Å"shining utopia.† His dreams came true, Plant created a historic museum in the Pinellas Suncoast. He’s able to provide historical information to the public whil...

Wednesday, September 18, 2019

meditation Essay -- essays research papers

Meditation is defined as a mind-body technique, which practices awareness, and induces tranquility in order to connect the mind and the body. It is also described as â€Å"mental fasting,† implying clearing and cleansing of the mind by the absence of distractions and negative emotions (Leikin, 2003). It has shown to benefit its users psychologically, physically, as well as spiritually. Meditation works by bringing about a relaxed and healthy state by physiologically and biochemically altering the body. It is characterized as a state of rest, while allowing the body to become more alert. This is accomplished through a dramatic decrease in metabolism, in turn, relaxing breathing patterns, and thus slowing activity within the nervous system. Upon completion of meditation one is more likely to show faster reactions to certain stimuli, a greater level of creativity, and a more conscious understanding and comprehension (ICBS Inc., 2004). Vast health and spiritual benefits can be ob served, as well. This paper will describe and discuss how meditation came about, the context in which it was used in the past, reasons for its use as compared to modern uses, as well as, ways in which meditating can heal the body and soul. It will also compare different forms of meditation, including; what each method entails, examples of postures to achieve each method, and results that can be achieved. Meditation was originally practiced spirituality in many ancient religions, including Hinduism, Judaism, Christianity, and most commonly, Buddhism. The founder of Buddhism, Siddharta Gotama became the master of the art of meditation and went on to teach it to his followers. He became known as â€Å"Buddha,† (â€Å"Enlightened or Awakened One.†) (Saunders, 2000). Buddhism is one of the world’s oldest and largest religions, starting over 2500 years ago. With Buddha as their leader (not as their God), followers learn the Four Noble Truths; First, â€Å"all existence is suffering,† secondly, â€Å"there is a cause for this suffering,† third, â€Å"the cause may be brought to an end,† and fourth, â€Å"the discipline necessary to bring it to an end is enlightenment (also known as, Buddhism)† (Saunders, 2000). Buddhists basic beliefs entail interconnectedness with everyone and everything, there is no beginning and no end (which involves the concept of reincarnation), and the law of â€Å"cause and effect,† or kharma. (Saunders, 200... ...ing From Within. New York: Alfred A. Knopf, Inc. 1980 Leikin, Jerrold B. American Medical Association Complete Medical Encyclopedia: Meditation. New York: Random House Reference. 2003. Leikin, Jerrold B. American Medical Association Complete Medical Encyclopedia: Transcendental Meditation. New York: Random House Reference. 2003 Lukoff, David. History of Meditation as a Clinical Intervention. 2002. www.virtualcs.com Saunders, E. Dale. Encyclopedia Americana International Edition: Buddha and Buddhism. Volume 4. Connecticut: Grolier Inc. 2000. Smith, Dr. Joseph F. Medical Library: Meditation. October 13, 2004. www.chclibrary.org/micromed/00056320 The Institute for Applied Meditation, Inc. Heart Rhythm Practice. 2004. www.appliedmeditation.org/Heart_Rhythm_Practice.shtml Trivieri, Jr., Larry. The American Holistic Medical Association Guide To Holistic Health: Healing Therapies For Optimal Wellness. New York: John Wiley & Sons, Inc. 2001.   Ã‚  Ã‚  Ã‚  Ã‚   White, Charles S. J. Encyclopedia Americana International Edition: Mantra. Volume 18. Connecticut: Grolier Inc. 2000. Zen Mind International. Meditation. 2004. www.zenmind.com/meditation.html

Tuesday, September 17, 2019

Allegory Essay -- essays research papers

Allegory Plato’s The Allegory of the Cave is a short story specifically discussing the parallels between the shadows the prisoners sees on the wall of the cave, and the illusion, which passes off as truth in today\\'s society. The Allegory of the Cave is about Socrates teaching his student, Glaucon, certain principles of life by telling him one of his allegories. The Allegory of the Cave can be interpreted in many ways; one way is to make a comparison between the story and the way of thinking by individuals in a closed society. Socrates states that the cave is a world many of us would like to see, but is not really how the world is. It is almost like the movie \\"The Matrix\\", where Neo, the main character is to discover that the world he lives in, is not the real world, but a world generated by machines and computers. Only in Socrates\\' allegory, the world is not created by computers, but by individual minds. Socrates wants Glaucon to be a wiser, better-educated man, who will later become a ruler of the State. He wants him to know not only the right, but also experience the wrong, because only a man who knows the bad, can truly understand and appreciate the good. Socrates does this by telling him a story, to let him better understand the principles of life. Men are chained down in a cave and have a wall blocking their view to the outer world. The prisoners can only see the shadows of the objects on the other side of the wall. If the prisoners see the shadows of the men ...

Monday, September 16, 2019

Big Data Architecture, Goals and Challenges

Big Data Architecture, Goals and Challenges Coupons Jose Christianity Dakota State University Abstract Big Data inspired data analysis is matured from proof of concept projects to an influential tool for decision makers to make informed decisions. More and more organizations are utilizing their internally and externally available data with more complex analysis techniques to derive meaningful insights. This paper addresses some of the architectural goals and challenges for Big Data architecture in a typical organization.Overview In this fast paced information age, there are many different sources on corporate outworks and internet is collecting massive amounts of data, but there is a significant difference in this data compared to the conventional data, much of this data is semi- structured or unstructured and not residing in conventional databases. â€Å"Big data† is essentially a huge data set that scales to multiple potables of capacity; it can be created, collected, collab orated, and stored in real-time or any other way. However, the challenge with big data is that it is not easily handled using traditional database management tools.It typically consists of unstructured data, which includes text, audio and video files, photographs and other data (Kavas, 2012). The aim of this paper is to examine the concepts associated with the big data architecture, as well as how to handle, process, and effectively utilize big data internally and externally to obtain meaningful and actionable insights. How Big Data is Different? Big data is the latest buzzword in the tech industry, but what exactly makes it different from traditional Bal or data analysis?According to MIT Sloan Management Review, big data is described as â€Å"data that is either too voluminous or too unstructured to be managed and analyzed through traditional meaner† (Davenport, Thomas, Berth, & Bean, 2012). Big data is unlike conventional mathematical intelligence, where a simple sum of a k nown value yields a result, such as order sales becoming year-to-date sales. With big data, the value is discovered through a complex, refined modeling process as follows: make a hypothesis, create statistical models, validate, and then make a new hypothesis (Oracle, 2012).Additionally, data sources are another challenging and differentiating factor within big data analytics. Conventional, structured data sources like relational databases, spreadsheets, and yogis are further extended into social media applications (tweets, blobs, Faceable, linked posts, etc. ), web logs, sensors, RIFF tags, photos/videos, information-sensing mobile devices, geographical location information, and other documents. In addition to the unstructured data problem, there are other notable complexities for big data architecture.First, due to sheer volume, the present system cannot move raw data directly to a data warehouse. Whereas, processing systems such as Unprepared, can further refine information by mov ing it to data warehouse environment, where invitational and familiar Bal reporting, statistical, semantic, and correlation applications can effectively implemented. Traditional data flow in Business Intelligence Systems can depict like this, (Oracle. (2012). An Oracle white paper in enterprise architecture) Architectural Goals The preeminent goal of architecture big data solutions is to create reliable, scalable and capable infrastructure.At the same time, the analytics, algorithms, tools and user interfaces will need to facilitate interactions with users, specifically those in executive-level. Enterprise architecture should ensure that the business objectives remain clear throughout big data technology implementation. It is all about the effective utilization of big data, rather than big architecture. Traditional IT architecture is accustomed to having applications within its own space and performs tasks without exposing internal data to the outside world.Big data on other hand, w ill consider any possible piece of information from any other application to be instated for analysis. This is aligned with big data's overall philosophy: the more data, the better. Big Data Architecture Big data architecture is similar to any other architecture that originates or has a inundation from a reference architecture. Understanding the complex hierarchal structure of reference architecture provides a good background for understanding big data and how it complements existing analytics, 81, databases and other systems.Organizations usually start with a subset of existing reference architecture and carefully evaluate each and every component. Each component may require modifications or alternative solutions based on the particular data set or enterprise environment. Moreover, a successful big data architecture will include many open- source software components; however, this may present challenges for typical enterprise architecture, where specialized licensed software system s are typically used.To further examine big data's overall architecture, it is important to note that the data being captured is unpredictable and continuously changing. Underlying architecture should be capable enough to handle this dynamic nature. Big data architecture is inefficient when it is not being integrated with existing enterprise data; the same way an analysis cannot be completed until big data correlates it with other structured and enterprise-De data. One of the primary obstacles observed in a Hoodoo adoption f enterprise is the lack of integration with an existing Bal echo-system.Presently, the traditional Bal and big data ecosystems are separate entities and both using different technologies and ecosystems. As a result, the integrated data analyses are not effective to a typical business user or executive. As you can see that how the data architecture mentioned in the traditional systems is different from big data. Big data architectures taking advantage of many inpu ts compared to traditional systems. (Oracle. (2012). An Oracle white paper in enterprise architecture) Architectural Cornerstones Source In big data systems, data can come from heterogeneous data sources.Typical data stores (SQL or Nouns) can give structured data. Any other enterprise or outside data coming through different application Apish can be semi-structured or unstructured. Storage The main organizational challenge in big data architecture is data storage: how and where the data can be stored. There is no one particular place for storage; a few options that currently available are HATS, Relation databases, Nouns databases, and In-memory databases. Processing Map-Reduce, the De facto standard in big data analysis for processing data, is one of any available options.Architecture should consider other viable options that are available in the market, such as in-memory analytics. Data Integration Big data generates a vast amount of data by combining both structured and unstructur ed data from variety of sources (either real-time or incremental loading). Likewise, big data architecture should be capable of integrating various applications within the big data infrastructure. Various Hoodoo tools (Scoop, Flume, etc. ) mitigates this problem, to some extent. Analysis Incorporating various analytical, algorithmic applications will effectively process this cast amount of data.Big data architecture should be capable to incorporate any type of analysis for business intelligence requirements. However, different types of analyses require varying types of data formats and requirements. Architectural Challenges Proliferation of Tools The market has bombarded with array of new tools designed to effectively and seamlessly organize big data. They include open source platforms such as Hoodoo. But most importantly, relational databases have also been transformed: New products have increased query performance by a factor of 1,000 and are capable of managing a wide variety of big data sources.Likewise, statistical analysis packages are also evolving to work with these new data platforms, data types, and algorithms. Cloud-friendly Architecture Although not yet broadly adopted in large corporations, cloud-based computing is well-suited to work with big data. This will break the existing IT policies, enterprise data will move from its existing premise to third-party elastic clouds. However, there are expected to be challenges, such as educating management about the consequences and realities associated with this type of data movement. Nonparametric DataTraditional systems only consider the data unique to its own system; public data never becomes a source for traditional analytics. This paradigm is changing, though. Many big data applications use external information that is not proprietary, such as social network modeling and sentiment analysis. Massive Storage Requirements Moreover, big data analytics are dependent on extensive storage capacity and process ing power, requiring a flexible and scalable infrastructure that can be reconfigured for different needs. Even though Hoodoo-based systems work well with commodity hardware, there is huge investment involved on the part of management.Data Forms Traditional systems have typically enjoyed their intrinsic data within their own vicinity; meaning that all intrinsic data is moved in a specified format to data warehouse for further analysis. However, this will not be the case with big data. Each application and service data will stay in its associated format according to what the specific application requires, as opposed to the preferred format of the data analysis application. This will leave the data in its original format and allow data scientists to share existing data without unnecessarily replicating it.Privacy Without a doubt, privacy is a big concern with big data. Consumers, for example, often want to know what data an organization collects. Big data is making it more challenging to have secrets and conceal information. Because of this, there are expected to be privacy concerns and conflicts with its users. Alternative Approaches Hybrid Big Data Architecture As explained earlier, traditional Bal tools and infrastructure will seamlessly integrate with the new set of tools and technologies brought by a Hoodoo ecosystem.It is expected that both systems can mutually work together. To further illustrate this incept, the detailed chart below provides an effective analysis (Arden, 2012): Relational Database, Data Warehouse Enterprises reporting of internal and external information for a broad cross section of stakeholders, both inside and beyond the firewall with extensive security, load balancing, dynamic workload management, and scalability to hundreds of terabytes. Hoodoo Capturing large amounts of data in native format (without schema) for storage and staging for analysis.Batch processing is primarily reserved for data transformations as well as the investigati on of novel, internal and external (though mostly external) ATA via data scientists that are skilled in programming, analytical methods, and data management with sufficient domain expertise to accordingly communicate the findings. Hybrid System, SQL-Unprepared Deep data discovery and investigative analytics via data scientists and business users with SQL skills, integrating typical enterprise data with novel, multi-structured data from web logs, sensors, social networks, etc. (Arden, N. (2012).Big data analytics architecture) In-memory Analytics In-memory analytics, as its name suggests, performs all analysis in memory without enlisting much of its secondary memory, and is a relatively familiar concept. Procuring the advantages of RAM speed has been around for many years. Only recently; however, has this notion become a practical reality when the mainstream adoption of 64-bit architectures enabled a larger, more addressable memory space. Also noteworthy, were the rapid decline in me mory prices. As a result, it is now very realistic to analyze extremely large data sets entirely in-memory.The Benefits of In-memory Analytics One of the best incentives for in-memory analytics are the dramatic performance improvements. Users are constantly querying and interacting with data in-memory, which is significantly faster than accessing data from disk. Therefore, achieving real- time business intelligence presents many challenges; one of the main hurdles to overcome is slow query performance due to limitations of traditional Bal infrastructure, and in-memory analytics has the capacity to mitigate these limitations.An additional incentive of in-memory analytics is that it is a cost effective alternative to data warehouses. SMB companies that lack the expertise and resources to build n appropriate data warehouse can take advantage of the in-memory approach, which provides a sustainable ability to analyze very large data sets (Yellowing, 2010). Conclusion Hoodoo Challenges Ho odoo may replace some of the analytic environment such as data integration and TTL in some cases, but Hoodoo does not replace relational databases.Hoodoo is a poor choice when the work can be done with SQL and through the capabilities of a relational database. But when there is no existing schema or mapping for the data source into the existing schema, as well as very large volumes of unstructured or MME-structured data, then Hoodoo is the obvious choice. Moreover, a hybrid, relational database system that offers all the advantages of a relational database, but is also able to process Unprepared requests would appear to be ideal.

Content And Process Theories Of Motivation Essay

Motivation is a big influencer of productivity. Many supervisors know that what motivates employees to reach their peak performance is not easy. This is because employees respond in many ways to their jobs and their organization’s practices. Thus, a behavior that is motivated is one which is voluntarily chosen by each employee. The content approach to motivation is one that is of the assumption that individuals are motivated by the desire to fulfill inner needs. Content theories are something that is on the needs that motivate people. On the other hand, process approach to motivation is on how and why people choose particular behavior in order to meet their personal goals. Process theories are on the outside influences or behaviors that people choose to meet their needs. These external or outside influences are usually available to supervisors. An example of the content approach to motivation is Maslow’s Hierarchy of Needs which has five level of needs. People go up these levels as their needs are answered. As the lower needs are satisfied, then the higher needs are activated. The most powerful employee need is that one which has not be yet satisfied. Abraham Maslow presented his needs theory in 1942 and then was published in 1954 in Motivation and Personality. This can be advantageous because the employees’ needs are answered as the person is satisfied. But it has its weakness too because it is rigid and does not cover the other small details that need to be taken into consideration when discussing motivations of people. Another content need is the Alderfer’s ERG which identified three categories of needs and its advantage is that there is the addition of the frustration-regression hypothesis that when people are not able to meet their higher level of needs, then, the next lower level needs come out. Meanwhile, another one of the content theory is McClelland’s Learned Needs which divides motivation into the needs for power, affiliation and achievement. This is the theory that is more on people pursuing their goals. People like to control their situations so they take risks and get feedback on their progress. This is mainly what this content theory means. There is also the motivation for power and for affiliation all under McClelland’s Learned Needs. Content needs has advantages especially if the person is motivated internally. But if he is not motivated at all, then these content theories are of not much benefit. (McClelland). Examples of the process theory Vroom’s Expectancy Model which suggests that people must choose among the alternative behaviors because they will be expecting that these behaviors will also lead to one or more desired outcomes and that the other behaviors will also bring undesirable outcomes.   Expectancy states that effort will also lead to first-order outcomes. Equity is the thinking of fairness which is involved in rewards given. Another process theory is the Attention, Relevance, Confidence and Satisfaction (ARCS) Model of Motivational Design or Keller’s ARCS Model of Motivation was conceived in the early 1980s by John Keller. This was derived from his theory of motivation, performance and instructional influence developed in the late 1970s. This is a macro theory that explains a network of relationships of personal and environmental characteristics with focus on the effort, performance and consequences. This is where the idea of reinforcement comes in. It confirms or denies expectations. Several views suggest that internal motivational drives control the lives of peak performers. When one sees a change that lasts, one can be almost be certain that it took roots within the individuals it affects, at the level of their own talents and motives. (Keller). By contrast, many of the quick fixes treat motivation as if it were a fuel one injects into one’s system to make one run, and propose solutions that are external to the individual. Peak performers usually claim that external motivators produce the shortest-lived results. In effect, this theory is based upon the coordinated ideas of many researches that involve human motivation.   It will sustain learner’s motivation to learn. In short, this theory aims at identifying major categories of variables of individual behavior and of instructional design related to individual effort and performance (Wongwiwatthananukit, Supakit)   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The ARCS theory integrates several motivational concepts such as the expectancy-value theory, attribution theory, self-efficacy theory, social learning theory, and environmental theories. An effective way of getting attention, the first building block of the ARCS theory is through the collaborative projects and different methods of presentation. Relevance, the next building block of Keller’s model is achieved by letting students take ownership of the learning experience, making them have more responsibility and commitment to the learning experience. By allowing them to choose a relevant task, they are able to better match their motives and values (Fernandez, Jerry). The third building block is confidence and students’ learning is enhanced because of his achievements. Confidence is ego building and can thus enhance the way they perceive and learn things. The final building block is satisfaction and learners must have the possibilities to apply new skills (Driscoll, 1993, p. 318 as qtd in Fernandez). These process theories are useful because there are many environmental factors that can influence a person in many ways since they are coming from outside the person. The only problem with this is when the person does not give attention to his external environment or when the external circumstances are not good for the individuals concerned. Indeed, motivation is why individuals behave the way they do. Two important dimensions of the â€Å"whys† of behavior are activation and direction. First, when people are motivated, they do something. Their behavior is activated or energized. Second, when people are motivated, their behavior also is directed. Motivation focuses on how adolescents direct their behavior, or put another way, the specific behaviors adolescents select in certain situations but not others. Thus, this is what defines motivation—it is why individuals behave, think, and feel the way they do, with special consideration of the activation and direction of their behavior (McClelland, David). WORKS CITED Keller’s ARC’s Model of Motivation. Retrieved May 6, 2008 at: http://www.ittheory.com/keller1.htm Fernandez, J. Attribution Theory and Keller’s ARCS Model of Motivation. Accessed Retrieved May 6, 2008 at:http://chd.gmu.edu/immersion/knowledgebase/strategies/cognitivism/keller_ARCS.htm Pitt, Douglas C. Leadership and Motivation: The Effective Application of Expectancy Theory. Journal of Managerial Issues. Retrieved May 6, 2008 at: http://www.allbusiness.com/human-resources/employee-development-leadership/801576-1.html Wongwiwatthananukit, Supakit, Applying the ARCS model of motivational design to pharmaceutical education. American Journal of Pharmaceutical Education. Retrieved May 6, 2008 at: http://www.findarticles.com/p/articles/mi_qa3833/is_200007/ai_n8910222/pg_8

Sunday, September 15, 2019

The Zoo Story

Daniel Castellanos THE2000 Ms Janet Roney 12/1/12 The Zoo Story Edward Albee’s â€Å"The Zoo Story† is a one act play that shows what alienation and loneliness can drive a man to do. It is a unique story in the sense that you almost feel as though you are reading in on a social experiment. I consider it is an experiment because of how the reactions between the two characters Peter and Jerry lead up to an intense and life affecting climax between the two. The idea of The Zoo Story is about a middle class man with a wife and two daughters named peter who you can say is quite receptive to what life has given him so far.However, you also have a man named jerry who is just about the opposite. Jerry is unfortunately friendless and not to happy with what life has brought to his plate. One day these two characters have a date with destiny on a New York City park bench. As Peter is minding to himself Jerry comes along and tries to befriend him. The socialization between the two doesn’t go as planned for Jerry. Nevertheless, Jerry walked into that conversation with another plan. It was one that included his own death.Eventually, it ends up into a confrontation between the two where Jerry is punching thus forcing Peter into defending himself. Jerry then pulls out a knife and tosses it towards Peter forcing his hand. In self defense, Peter picks up the knife and holds it up which then leads to Jerry charging towards the knife and thus murdering himself. Peter reactively says â€Å"Oh my God† whereas then with Jerry’s last breath he says â€Å"Oh†¦My†¦ God is a combination of scornful mimicry and supplication†. His last words give you an insight on what this novels idea could be.After reading, I started to relate to how Aristotle’s theory on Plot matches to â€Å"The Zoo Story†. When you think of plot you would consider the arraignment of events such as rising action and climax. Now when you start to stick to gether the structural plots in this story you would begin with the exposition where Peter is sitting on the park bench and soon then enters Jerry. The rising action would have to be the conversation they both shared leading up until the moment Jerry spits and then punches Peter. Of course, the climax is the scene when Jerry then tosses the knife on the floor and hen forces Peter to choose between leaving or quite possibly killing a man with his own weapon. The falling action is when Jerry runs into the blade consequently killing him. Therefore, leading to the resolution which is the last words Jerry is able to say to Peter after his initial reaction to his death. The idea of characters would mainly consist of the protagonist and the antagonist. In The Zoo Story it puts you in the life of Jerry who, to some, would come off as the antagonist however to me I see him as the protagonist.It is clear that Jerry is a man who is lonely and desperate to make a friend. It starts with Jerry try ing to make an effort to communicate with Peter, yet he doesn’t seem all interested. As each new topic Jerry comes up with is diminished it gives me the feeling that all Jerry is trying to do is socialize with another human being. The theme of a play is usually the reason why the playwright would write the play. The theme we come across in this play is Loneliness.

Saturday, September 14, 2019

Community Within Maycomb Essay

So often in a society we are misled at the actual courageous and uncourageous acts that are done amongst a society. Most of the time it is usually because we have our own perception that a society is emulated from the way someone may act or the lineage and community in which some are born into. In To Kill a Mockingbird, Harper Lee shows the strengths and weaknesses of a community through the white community, black community, and lastly the community within a family. Though there is much strength in a White community, like holding their values high, there are also weaknesses like being racist toward the â€Å"Blacks. For instance Jem points out a weakness in the White community when he tells Scout, â€Å"They’re real sad†¦ They don’t belong anywhere. Colored folks won’t have ‘em because they’re half white; white folks won’t have ‘em cause they’re colored, so they’re just in-between, don’t belong anywhere. † Back during the 1930’s interracial marriage was unheard of and if it was it was thought of as impure or inadequate therefore disregarded. Experts Joyce Moss and Gorge Wilson say, â€Å"†¦ Racial relations where complicated by various restrictions in the 1930’s. Breaking the taboo against sexual intercourse between a black man and a white woman was considered by most whites and some blacks†¦ most serious offence. This kind of miscegenation would ‘taint’ racial purity. † This then re-states the negativity of racism during the time of Maycomb in the White community. Despite of Macomb’s racist perspectives they also share very important morals between their communities. Atticus Finch shares with Scout,† you never really understand a person until you consider things from his [or her] point of view†¦ ntil you climb inside of his skin and walk around in it. †(Chapter 3) This excerpt shows how high Atticus being from the White community, keeps his standards and beliefs held high so that he may be looked up as Macomb’s role model. In conclusion this states, though Maycomb may struggle with some things that still to this very day affect us as a community, Maycomb is also showing how it is to be keeping their morals in mind. From the outside looking in it may seem as though the Black community has no strength despite the fact there is. During the time period the Blacks had no problem with helping one another. If one didn’t know the other one knew and they assisted one another. During church scout asks â€Å"How we gonna sing [the songs] if their aint any hymn books? † â€Å"[Zebo cleared his throat and read in a voice†¦ ]. We tend to always focus on the main idea but this tiny detail helps the Blacks unite with each other because they are able to participate in activities like sing in church by just being able to work with each other to read the hymnal and be a religious community. Scout being from the White community she doesn’t understand the ways of the â€Å"blacks† and how they choose to be one. KJ The book girl states, â€Å"The black community as a whole is a very close congregation, as it has to be to survive the harsh treatment by the white community†¦Ã¢â‚¬  Because the Blacks have been kind of segregated by the White community, it has taught them to become and be closer. In difference to the negative conversations that go on in the Black community as well. You ain’t got no business bringin’ white chillun here—they got their church, we got our’n. It is our church, ain’t it, Miss Cal? † said Lula. This is the first time Jem and Scout experience direct racism which is usually never heard of because they are white. This makes them in a real uncomfortable position in which they have never been. The weakness in the Black community is they are racist back and don’t want to make a difference well most of them anyway. Even though Lula is from the black community she is prejudice towards the whites. This is a weakness in the black community though they help one another they don’t realize how to be the bigger person in the sense of acting with dignity and not stooping and lowering you self to discriminate against different raced people. There are much strength as well as many weaknesses within the kinship of a Family community. Atticus instills within his kids that, â€Å"I wanted you to see what real courage is, instead of getting the idea that courage is a man with a gun in his hand. It’s when you know you’re licked before you begin, but you begin anyway. † A Review of General Semantics says that,† Atticus agrees to defend a black man named Tom Robinson who has been accused of [a heinous crime] raping Mayella Ewell a white woman. During the trial, Atticus provides sufficient evidence†¦ if fact provides that Mayella’s father Bob[Ewell] is responsible for marks on her face†¦ however the all-white jury convicts Tom[Robinson] away†¦Ã¢â‚¬  Action speaks louder than words have always been the saying for a society especially when parents say it. Atticus is teaching his kids the moral of standing up for what is right and to have full courage when doing so. He defends Tom Robinson to not only prove that this man has done nothing wrong but also to teach his kids the moral of standing up for what you believe in and having courage to do so is far more meaning full than feeling powerful verse feeling courageous for doing the right thing. In contrast to the benefits of a positive family community. In contrast to a positive family environment Robert also know as Bob Ewell, is determined to have a black man imprisoned for a crime that he has not committed. Atticus, while on the trial with Mayella Ewell Atticus asks her, â€Å"Why don’t you tell the truth, child, didn’t Bob Ewell beat you up? † Bob Ewell being a horrifying father has done a crime that if people knew what he has done the community would probably never speak to or even regard him again. He has raped and beaten his own flesh and blood. The inhumanity that he possesses within his family as the head of the house hold is unfathomable.

Friday, September 13, 2019

Explore the potential problems and issues that an organization would Essay

Explore the potential problems and issues that an organization would need to consider when re-sourcing requirements back to thei - Essay Example In recent years however, the benefits of outsourcing have decreased due to increasing costs of production in Asia, long-lead times, poor communication with Asian countries, large quantities for minimum orders, as well as poor quality of products (Green, 2013). Due to these issues, outsourcing countries have made attempts to re-source their production back to their home countries. Undoubtedly, major challenges are foreseen in on-shoring or re-sourcing, not the least of which involves loss of profits, which to any business is always problematic (Green, 2013). Still, businesses have gradually initiated efforts to re-source their production to their home countries mostly because they believe it would be the better option for them in the long run. This paper shall now explore the potential problems and issues than an organization would need to consider when re-sourcing requirements back to their home country and how these potential problems might be addressed or mitigated by the procureme nt function. Body There are different problems which have and will likely emerge for businesses seeking to re-source or in-source their production processes. ... This would imply the importance of some elements of IT skill in the related area, alongside an effective population having the right attitude to flourish in careers related to IT (Williams, 2012). The location need not be in the cities or metropolitan areas, but an area which is still big enough to support the logistics of its production processes. The chosen area must also be low-cost (Qu, et.al., 2010). In general, areas which are the most efficient sources of modern technology have become very expensive areas to reside in; as such, wages for these areas are also expectantly higher than other areas. Under these conditions, it would be difficult for the businesses seeking to establish new re-sourcing areas to achieve profitability without having to sacrifice either the availability of the best technology or the lower wages of the employees (Hirscheim, 2000). The importance of securing an educational system which is responsive to the needs of the industry is also a challenge for thes e businesses. A significant decrease in IT graduates has been observed in the past decade and some areas have even eliminated IT education from their curriculum. The challenge for these corporations would be to revive the enthusiasm of the young population in order to be more responsive to the needs of these businesses and to work out technology issues (Williams, 2012). General Motors has recently considered relevant moves in order to secure insourcing of elements of its production process, mostly bringing back work to Austin, Texas (Thibodeau, 2012). Its insourcing move was however very much challenged with the limited relevant skills needed from its new employees

Thursday, September 12, 2019

Organization of Security Plan Essay Example | Topics and Well Written Essays - 750 words

Organization of Security Plan - Essay Example While the aims of such activities are normally driven by the need to access information enough to compromise the market plans for a business organization, it is fatal in the case of security-related organizations such as the department of Homeland security. In this paper, the aim is to prepare a security plan providing security awareness policy for the Department of Homeland Security. The Department of Homeland security (DHS) is tasked with ensuring that the United States and its citizens are protected against countless threats faced each day. With a workforce of over 240,000 staff, the department’s role is not limited to terrorism. Rather, any activity that seems to jeopardize the security of the American people is detected and subsequently dealt with extensively before it occurs. Cyber-security is on top of the department’s list where cases of hacking are mitigated and culprits arrested where possible. Thus, cyber-attacks are very common to the DHS, and it recently stated that this was one of the major threats the US faces (Kahan, 2014). Though sometimes, mere criminals orchestrate these cases, there is no telling at whose behest they commit such crimes. In addition to cyber-attacks, the DHS faces the issue of terrorism where terror groups would like to exploit any lapses on the department’s part. Since the department plays an integral role in detecting and averting any acts of terrorism directed at the US, this terrorism threat is indeed a real one. The vulnerabilities include the hacking of its own websites by hackers in a bid to access the highly classified materials. Further to this, the vulnerabilities the department faces are the compromise of information by its staff. While such cases might not be common, a vulnerability cannot adequately be mitigated. The non-disclosure contracts signed do not necessarily guarantee that the information pertaining to the operations happening in the department will remain secretive. In order to ensure

Wednesday, September 11, 2019

Critically Consider the Importance of Public International Law to Essay

Critically Consider the Importance of Public International Law to International Business - Essay Example The universal international laws are those laws which govern the relations of one State with all the States in international arena however; particular international law may only be governing the relationships and conducts of one State with another State. (Bederman, 2002) At a larger scale, public international law governs the relationships of the States with each other and plays critical role in authoring treaties and formal agreements between the States. However, if States agree with each other, the overall scope of the law can also be extended to the individual persons and organizations. What is however, critical to note that in public international law, the political and legal elements are closely intertwined with each other hence the overall implications of the public international law can be significant for the nations. (Aust, 2010) The most important issue which has remained the cause of debate is whether States should only be the subjects of international law or should other s ubjects be also brought under its ambit. Public International law and International Business The debate on increasing the scope of international law beyond States therefore outlines that the international business firms, intergovernmental organizations and other relevant bodies should also be brought under the scope. It is because of this reason that Public international law is now applicable on the individuals, relationships as well as transactions which take place across the borders. International law not only governs the use of common resources of the world but also provides framework for managing the transnational problems faced by the international business firms. (Shaw, 2003) The advent of globalization as well as the spread of the communication technologies also necessitated the... This essay approves that public international law governs the domain of States and their relationship with each other however, over the period of time, its scope and application has increased. The subjects of international law are not now just limited to States and how their relationships are governed however; international organizations are also increasingly coming under the ambit of this law and are greatly affected by the international law. This paper makes a conclusion that one of the key elements of international law is that it governs the bilateral agreements between the States. Bilateral agreements however, also provide required level of protection to the international firms in terms of getting protection of their investment. Foreign direct investment is one of the ways through which international firms make entry into the international markets. However, without bilateral agreements between the States, it may be difficult for international firms to take advantage of such opportunities. International law also can provide a very safe conduit to the international firms for settling their disputes with their host countries. Dispute settlement as well as the settlement of the international financing can be effectively done with the help of international law. Another important significance of international law for the international firms protection provided to their intellectual property. International law can also provid e support to the international firms in dealing with issues like child labor, unfair labor practices as well as human rights issues.