Saturday, August 31, 2019

Information Technology for Managers Essay

Introduction In a fast rising popularity of technology, companies will use this to gain a competitive advantage. IT works in helping businesses reach their strategic goals. In the case for Sophia the goal would be to drive up her sales to meet with the standards that stiff competition has set up. Not knowing much about technology, Sophia would require help from an outside source in order to have the technology portion running smoothly. Website One of the best ways to improve the IT component is to open up a website with the help from the website onepageapp.com. This vendor is perfect for small companies to start up a website to your liking. One page app would assist in the purchase of a domain name for the site people go to visit. With a drag and drop interface the site being designed to Sophia’s preferred theme and the main content she would prefer on the site. One page app offers a few monthly plans starting from eight dollars all the way to two hundred. In Sophia case, the best plan would be the twenty nine dollars a month that includes up to twenty additional users, forty newsletters a month and even priority support if having any issues within the website. One of the best incentives here is that when launching with one page app it also creates a website version for mobile phone and tablets. With the increased use of smartphones and the emergence of ipads, people who use these devices on the often can view your website in read able and simple form. Another excellent feature one page app offers is engine optimization. The high use of search engines a good way to have website noticed is through the search results. With proper formatted HTML, Meta tags, meta descriptions, and sitemaps the results on search engines would attract more people viewing the website (OnePager, 2013). Sophia would be given useful analytics with one page app as the traffic the site receives would be documented along with the keywords used to gain the hits. The knowing of the keywords is valuable as we can use this information on seeing what foods people are searching on the web and what products are getting them redirected to Green Peppers website. Trying to further promote the interested item menu would only draw more interest from customers. Onepager allows for a great two stay connected  with customers. Having customers sign up for newsletters can have Sophia sending mass emails to subscribers for upcoming events and new menu items they may have. It’s a great way to keep good relation by also sending coupons for deals and such. If Sophia has trouble understanding these new online concepts she can elect to hire a part time employee or increase the duties of a current employees to keep the website updated. Constantly updating the site is crucial to stay competitive with any other restaurants. Twitter Social Media is a great way for small companies to get some easy exposure. As of September of 2013 there are 200 million twitter users (Canadian Press, 2013). With so many users using one application, generating awareness of a company proves to be beneficial. Having a company twitter account is a great way in getting Sophia’s restaurant known. Twitter can help generate feedback on previous customer experience and ways they could make some improvements. This has worked well with some bigger companies where a customer would tag the business in their tweet expressing some displeasure and the company comes up with a reply to compensate the experience with apologies or even future deals. Customers have already had issues with Green Peppers ordering techniques and this would be a good way for Sophia to gather some feedback. Green Pepper could also seek suggestions on different types of recipes customers would like to see being served. It would allow for them to add menu items that have potential on gaining popularity. Green Pepper would also be able to see what customers are saying about the local competition when it comes to service they provide and quality of food they tend to serve. This benchmark is probably the best when measuring the success of your current business. Opening a twitter account is completely free and very easy to use. Tweets could be sent from any smartphone making it convenient to access for all users. Tweeting out special promotions going on would bring in more customers and consumers are always finding ways to eat for less money. Hash tags are a great way to research what most of the world is talking about. For example, if a celebrity tweets about how much they love Indian or Chinese food, it would provide Green Pepper with a great opportunity to  tweet something to its followers referencing that comment to keep Green Pepper relevant. Facebook Like twitter, having a Facebook account is free. With a positive word of mouth rating of a restaurant being most valuable to a company, Facebook is a good tool to enforce that. Facebook allows for Green Pepper to post restaurant’s menu and updates for its followers to see. Green Pepper can take pictures of their most visually appealing menu items and post the pictures for display in order to entice more customers. They can show videos on the process they take into making the Indian fused Chinese dishes. Fusion food being seemed risky for some consumers, they can showcase the dish on the flavors added and how it is prepped. Listing the benefits of the human body that certain spices can offer, appeals to many health conscious customers. Keeping the account active is the most important as the regular customers who eat at Green Pepper would want to know what deals are occurring. It’s a great way to engage with the customers and making their personal experience at Green Pepper the best it could possibly be. Major fast food chains take great advantage of this by offering coupons online for their followers and always encouraging them to follow them on social media sites like Facebook and twitter. (Brandon, 2011) Replying to a post that a customer had at Green Pepper makes it feel more personal and the customer feels more satisfied as their questions and concerns are being noted by Sophia. Since Green Pepper is a small restaurant every negative comment about the service is a big issue on the company’s image. Having a negative word of mouth comments spread can cause customers to decline fast. Getting customers to partake in polls and quizzes is a free research base as companies can get a lot of info based on the poll results (Eldon, 2009). Offering the meals that customers prefer is an important way in staying relevant. Having someone over-look the operation of Facebook could be great by hiring a part time employee or even increasing the responsibilities of a current employee working at Green Pepper. Group on Groupon is website offering deals that many businesses are taking part in. Restaurants can offer deals on menu items for a fraction of cost if bought on Groupon. This is a great way into bringing customers into the restaurant and having them try other items on the menu and if they are satisfied with the service they could become returning customers. Another incentive is when a voucher is purchased not every customer goes and actually uses it. Many vouchers do have an expiry date and if the customer waits to long the voucher would no longer be valid and Green Pepper would still get half the purchase cost of the voucher. Since Groupon is running their site the only costs occur when the voucher is actually bought from a customer as Groupon takes half that money. They work as a great middleman between Green Pepper and future customers. The downside of this route is that Groupon takes half the proceeds from the voucher. An example is having an 80 dollar menu voucher sold on Groupon for 40 dollars. Groupon then keeps 20 dollars of that and gives the remaining 20 to Green Pepper. Other flaws being seen in their business model in an article in Forbes magazine â€Å"Groupon’s biggest victims are the small businesses that get suckered in to accepting Groupons. Restaurants lose money on them because consumers flood the restaurants, order very low priced meals, strain waiters and cooks, get lousy service, and never return.† (Cohan, 2012). Sophia must know the capacity restrictions well and if offering a Groupon deal then must be fully staffed for that day. Allowing customers to leave the restaurant on a negative really affects the company image especially being a small restaurant. Recommendation The way for Green Pepper to optimize its profits would be to hire a part time employee to run the social media aspects in Facebook and twitter along with working with one page app and keeping the website updated. Many young adults have some experience in social networks and finding a University student who could work part time wouldn’t be difficult. They would oversee the twitter updates and tweeting on the regular. They could update the Facebook Photo album with menu dishes as well as keeping in contact with the customers leaving feedback on the social sites. One page app makes the design of the website so simple just would need the employee to making sure site is  running smoothly and keeping in contact with the developers if any problem occurs. They would work with Sophia and teach her a little about the technology components as one page app allows many users having access to the website. The switch to technology focus should not be a hard one but instead a smart one.

Friday, August 30, 2019

Louis XIV: his domestic and foreign policies Essay

Louis XIV strove vigorously for supremacy in foreign affairs. He was to use his foreign policy to establish a universal monarchy for himself or alternatively to use it to secure natural frontiers for France thus improving its defenses. He worked successfully to create an absolutist and centralized state. During his reign Louis was involved in four major wars, some of which Louis may be accountable as the provocateur; however, I believe that mainly his motives were purely defensive. The war of Devolution served as a pretext which nettled him part of Flanders, although the Dutch then moved against him with the Triple Alliance. Louis was determined to crush Holland and this began the third of the Dutch wars, which depleted his treasury. Louis proved an incredibly extravagant spender, dispensing huge sums of money to finance the royal court. The following ten years the king limited his policies to diplomacy. Louis continued the nobility’s exemption from taxes but forced its member into financial dependence to the crown and the provincial nobles also lost political power. Louis does have a genuine concern for his country and despite his dubious methods he does manage to secure the territories that he wishes to secure. He curtailed local authorities and created specialized ministries. Louis’s grandson retained the Spanish throne but the war of Spanish Succession left France in great debt and a weakened military. Louis used the bourgeoisie to build his centralized bureaucracy. He illustrated new administrative methods to make him more in control. Louis’s general Colbert worked to improve the French economy. Colbert worked to create a favorable balance of trade and increase France’s colonial holdings. He achieved a reputation for his work of improving the state of French manufacturing and bringing the economy back from the brink of bankruptcy. He reduced the national debt through more efficient taxation. His principal taxation devices included the aides, the douanes, the gabelle, and the taille. Louis spent so much money on luxury and wars; France actually became increasingly impoverished. The aggressive and opportunistic implementation of Louis’s policies understandably persuaded those threatened by it that the king’s intention was expansionist and his intentions unlimited. There had been acts of gratuitous violence as well which underlined the arrogance and ruthlessness of French conduct. In conclusion it seems that by the end of his reign the wars had placed him in a strong and secure position in Europe yet his intention was not entirely  for glory.

Case Analysis About E Commerce Law

I. Introduction: In this age of mobile phone shopping, online bookings, web based promotions and social networking, legitimate business transactions and permit applications can now be served via the internet. As early as June, 2000, the Philippine government through the Senate and the House of Representatives approved the E-Commerce Law in recognition of the vital role of information and communications technology (ICT) in nation-building. Known as the â€Å"Electronic Commerce Act of 2000† or House Bill No. 971, the act was passed because of the need to create an information-friendly environment which supports and ensures the availability, diversity and affordability of ICT products and services that provides for the recognition and use of electronic transaction and documents in the country. The bill likewise recognizes the responsibility of the private sector in contributing investments and services in telecommunications and information technology as well as the need to devel op appropriate training programs and institutional policy changes.The House Bill also took cognizance of the human resources involved in the use of ICT, the population capable of operating and utilizing electronic appliances and computers and its obligation to facilitate the transfer and promotion of adaptation of these technologies. But, in order to ensure network security, connectivity and neutrality of technology for the national benefit, information infrastructures comprised of telecommunication networks and information services shall be organized and deployed.E-commerce is a system that includes not only those transactions that center on buying and selling of goods and services to directly generate revenue, but also those transactions that support revenue generation, such as generating demand for those goods and services, offering sales support and customer service, or facilitating communications between business partners. II. Reaction and Analysis of every provision: Declarati on of Policy Section 1 : Short title It names the title of the act which is known as the â€Å"Electronic Commerce Act of 2000†Section 2:   Ã‚  Declaration of Policy. Reaction and Analysis: This provisions explains the content of the policy, which creates an environment friendly to promote the ICT products and services in an affordable way so that it can develop the training programs, policy of institutions, human resources, the labor force, the operations of electronic appliances especially the computer system. It promotes also the technology so that the network security and the connections of technology in the country will be safeguard or protected.It gives benefits to the nation in terms of organizing the arrangement of the country’s information infrastructures and the understanding between communication networks and information services which connects to the global network in a legal act on its systems and facilities. In my opinion the declaration of the policy h as an advantage in our country because it makes the business industry with the use of ICT be a good transactions in global markets that helps our assets and profits increase, that’s a help for our country’s budget.Declaration of Principles for Electronic Commerce Promotion Section 3. Objective Reaction and Analysis: In this provision, It discusses the principles of the E commerce promotion which indicates the role of the government, every government official must be fair in giving shares and allowance in the lack of human resources and secure the common good, their settlements and goals should be done in the future and provide the necessities. The action of the private sector and in making the policy should be compromised.As the role of the private sector, the E commerce development must be widened in market forces and they must pursue a fair competitive market. The International coordination and harmonization will make the government policies that affect the e commerc e to be facilitated in a unified environment for good standards. In Neutral Tax Treatment, it will conduct the transactions in the use of e commerce that must take an unbiased or fair tax treatment in comparing transactions in non-electronic and taxation of e commerce and that must be guided in a least difficult manner.In the protection of the users, they must have privacy or not be exposed with regards to industry led solutions, it shall be agreed with the law that business must be available to the consumers and the business users must not have a disclosure to the public and environment. E commerce awareness points to the government and the private sector, they will inform the society about the ability of the e commerce and the impact of it in economic foundations. The government will provide opportunities to SMES, well it will provide investments in information technologies and encourage capitals for them.The government will also provide skills development for the employees genera ted with e commerce but they should still promote non or formal skills development programs. They will also provide online database for health services, public libraries, in this case I think it will be easier for us to find our needed information. Internet users will have an essential voice in the governance of the domain name system as well as the access to public domain information.All of the principles is informative and useful in a way that our country will have an easier work and life because of technology and a good contribution to our economy. Chapter III – Objective and Sphere of Application Section 3: Objective Reaction and Analysis: In this provision, it discusses the main goal of the law, which pursues a domestic and international dealings and agreements with the storage of information through the use of electronic technology so that the electronic documents of activities will be authenticated.The act also promotes the usage of electronic transactions in governmen t and public to worldwide. Despite these aims and objectives, many are still skeptical on the methods provided under the law to ensure the integrity and security of these electronic transactions. Most of them question the admissibility and weight given to electronic evidence, its authenticity and integrity as well as the manner used to verify the same, and the impact of its legal recognition on the Philippine legal system. Section 4. Sphere of ApplicationIn this section, this act must apply to any kind of electronic data message and document that is utilized in the occurrence of commercial and non commercial activities like what the section 4 stated, which are to include domestic and international transactions. In this section, it tells that the objective of the law must have a good practice and it should be used not only stating these aims but should become true. PART II ELECTRONIC COMMERCE IN GENERAL Chapter I – General Provisions Section 5: Definition of TermsIn these prov ision, it discusses the definitions of terms. The Addressee is a person who is intended by the originator to receive the electronic data message or electronic document, but does not include a person acting as an intermediary with respect to that electronic data message or electronic document. Commercial Activities must be given a wide interpretation so that it will cover the matters from the relationships of a commercial either contractual or not. It refers to the dealings with the rights of intellectual property.It also discussed the definition of computer where in it’s the main source of e commerce activities that provide connecting transactions and databases. I also learned about the convergence where in it is the ability of different network platforms to carry any kind of service; and the coming together of consumer devices. The Electronic data message explained that it is also an interchange with electronic document where in there are information stored by means of elect ronic. The ICT, it a system that is used for processing electronic documents as well as recording the data.Electronic signature refers to any distinctive mark, characteristic and/or sound in electronic form, representing the identity of a person and attached to or logically associated with the electronic data message or electronic document or any methodology or procedures employed or adopted by a person and executed or adopted by such person with the intention of authenticating or approving an electronic data message or electronic document. Electronic key refers to a secret code, which secures and defends sensitive information that crosses over public channels into a form decipherable only by itself or with a matching electronic key.This term shall include, but not be limited to, keys produced by single key cryptosystems, public key cryptosystems or any other similar method or process, which may hereafter, be developed. Intermediary refers to a person who in behalf of another person and with respect to a particular electronic data message or electronic document sends, receives and/or stores or provides other services in respect of that electronic data message or electronic document. Non-Commercial Activities are those not falling under commercial activities.Originator refers to a person by whom, or on whose behalf, the electronic data message or electronic document purports to have been created, generated and/or sent. The term does not include a person acting as an intermediary with respect to that electronic data message or electronic document. Person means any natural or juridical person including, but not limited to, an individual, corporation, partnership, joint venture, unincorporated association, trust or other juridical entity, or any governmental authority.Service provider refers to a provider of online services or network access. With help of definitions and terms, it is easier to understand what is e commerce all about and what are the relations of t hese terms to this law, because the law always pertains to electronic people, activities so by this explanation, we will be clarified with the content of the law. Chapter II – Legal Recognition of Electronic Data Messages Legal Recognition of Electronic Data Messages and Electronic Documents Section 6: Legal Recognition of Data Messages Reaction and Analysis:In this provision, it says that every information in the form of electronic data message or document must be approved always in a legal purpose. It says that the person should provide a written information to another person in conversion to electronic data message or document. The non electronic form of data must meet the requirements of the provision of the information and must be the same as the form of electronic data message or document. The operation of the requirement of the law has no limit for the information to be displayed with time or location until a functional equivalent will be implemented.The functional equ ivalent, says that electronic documents can never be the same as paper type, they still have difference. But electronic documents can do the purpose of paper type of documents like for example as a record or database of information from the paper. So I think the electronic data message can hold the paper based document by the person who write, and its still different from each other because the original form of the information is in written form while the electronic data message are in computerized type.Sec 7 Legal Recognition of Electronic Documents Reaction and Analysis: In this provision, it discusses the electronic signatures that are now recognized to be equivalent to the signature of a person on a paper based document, it explains the procedures provided on it like a method used to indicate the party to enter to the electronic document that is needed for his approval through the electronic signature. It is appropriate for its purpose for the electronic document where in it was generated with any agreement.With this situation, It is needed to the said party so that it will go to the transaction with electronic signature while the other party will have an access to verify it and for them to decide to go again with the flow of transaction valid by the same process. Well this serves a good transactions of contracts with use of electronic signatures from person to another person. Sec. 8. Legal Recognition of Electronic SignaturesThis provision examined some important legal issues associated with electronic signatures. I think the government should come out with some legislation. There should be some kind of legislation that should be out in our country that says that electronic signatures are an acceptable form and can legally replace paper-based forms of signature. Then only we businesses may be thinking of using it. Sec 9 Presumption Relating to Electronic SignaturesIn this provision, it explains the electronic signature correlations, it means that this was connected by the person with the intention of signing in the approval of the electronic document but the person depending on the electronic documents finds or notices a defects wich the signature has no dependency will not be affixed. This means that when Person A’s signature is attached to a document, one may presume that it is A’s signature and that he was the one who signed it with the intention of signing or approving the same.I think this is right so as they can easily detect a person’s signature electronically. Section 10 Original Documents It explains that the law requires information to be maintained in its original form, the integrity of the electronic document from the time it was created in its final form is shown by aliunde which means it is an evidence clarifying a document but not deriving from the document itself, otherwise the information is has the ability to be displayed to the person whom it is to be presented. This means that it applies whet her the requirement is in he form of an obligation or the law simply provides consequences for the information not being presented or maintained in its original form. This provision of law will be a great help to those who go to court presenting electronic evidence. While the old prototype could only conceive of original document as being generally single, this covers the way for the existence of many originals as long as the provision’s criteria of integrity and reliability are met. Section 11: Authentication of Electronic Data Messages and Electronic DocumentsThis section explains that the electronic signatures must be validated by proof than a letter associated with an electronic data message or document in a security procedure. And it can detect errors or alteration of communication, The supreme court may adopt such authentication procedures, including the use of electronic notarization systems as needs, as well as the certificate of authentication on printed or hard copi es of the electronic documents or electronic data messages by electronic notaries, service providers and other certification authorities. It provides the rules on evidence.Prone to the different characters of electronic data messages vis-a-vis paper or other objects, authentication procedures will have to be different too. This law requires for electronic data messages to be authenticated by validating a claimed identity of a user, device, or information system. Electronic signatures are to be authenticated by proof that a symbol or character representing the person named t attached to or that an appropriate technology or security was used with the intention of authenticating or approving the electronic document. Section 12.Admissibility and Evidential Weight of Electronic Data Message or electronic document. In this section, it serves as a guide to a data message is allowed in evidence and to how much weight is to be given them . It says that there’s no rule shall render the data message that is not allowed on the sole ground that it is in electronic form or on the ground that it is not in the standard written form. Evidential weight is to be given such electronic document after assessing the reliability of the manner in which the originator was identified, and other relevant factors have been given due regard.Section 13,  Retention of Electronic Data Message or Electronic Document. In this provision, it explains that electronic data message or original form must remain usable for reference and it will maintain the format when it was sent or received, It makes us identify the originator, the addressee which was explained in section 6, it also indicates the time and date of the electronic data message. The person required to maintain the forms can do it in a different way by using the services of a third party. Like for example, the BIR, demands the retention of receipts for at least three years, so that they can audit it.The effect is that this can r elieve business corporations from having to keep the required documents in paper form. It would be a good way to access the receipts and easier to find. Section 14. Proof by Affidavit, This provision also matters in section 12 and 9, it will take for granted to establish by an affidavit given to the deponent. So that it would inform the deponent about the rights of parties. This is useful as the requirements may prove to be more demanding and set in one’s way. Section 15. Cross – Examination.In this section it discusses that in any statement contained in affidavits and shown in courts, are subject to the right of the person against whom the affidavit is executed so that it can test the accuracy and truth of the affidavit by cross-examination, which means the interrogation of a witness called by one's opponent. As I understand,the process of cross-examination is presumed to be necessary because most witnesses come forward to support one side or the other. In the case of the defense, a witness might omit certain information which the prosecution might find interesting or relevant.A prosecution witness might, likewise, omit information. Cross-examination ensures that the trial is fair, and that all information is truly out on the table. CHAPTER III. COMMUNICATION OF ELECTRONIC DATA MESSAGES OR ELECTRONIC DOCUMENTS Section 16. Formation of Validity of Electronic Contracts. In this provision it says that a contract is a meeting of the minds and generally could take whatever shape or form, many of them are still afraid of that contracts entered into electronically may encounter some problems.Many transactions and other forms of trade are now conducted electronically. For example, most people will at least be familiar with, if not frequent users of, ATMs situated outside or inside banks. When a bank’s customer withdraws money or uses an ATM for other purposes, an electronic transaction takes place. More and more business is now done electronicall y, often with the parties never physically meeting each other. Online shops, for example, allow potential customers to browse, select and purchase goods without ever asking a salesperson for advice or assistance.Negotiations, giving quotes or submitting tenders for work may all be done electronically and indeed are. A great deal of information is now passed electronically within organizations and from one organization to another. This all raises a number of legal questions, specifically with regard to electronic contracts. Some of the most important issues include whether an electronic contract is valid, that is, whether it must comply with certain formalities, whether electronic signatures are admissible as evidence of intent and agreement, and what law applies to an electronic contract.Section 17. Recognition by Parties of Electronic Data Message or Electronic document. In this provision, it says that the originator and the addressee of an electronic data message or electronic doc ument, a declaration of will or other statement must not be denied legally, validity or enforceability solely on the ground that it is in the form of an electronic data message or electronic document. Section 18. Attribution of Electronic Data Message.This section says that of the originator if the originator him/herself sent it and it was sent by an information system programmed by or on behalf of the originator to operate automatically. The addressee is used to pertain an electronic data message or electronic document as well as the originator. The addressee must apply a procedure which the originator approved and as the addressee receives the electronic message which results from the action of a person, it will enable to access a method to identify electronic message or document on his own way.An electronic message is deemed to be sent by the originator of the message if it is sent by a person who has the authority to act on behalf of the originator in respect of that message or if the message is sent by an information processing system programmed by, or on behalf of the originator to operate automatically. The notion that one has to physically put pen to paper to sign a contract is now a thing of the past.A person who receives an electronic message is entitled to regard the message as being that of the originator except in instances where he has received notice from the originator that the message was not sent by him or the addressee knew or should have known that the message was not sent by the originator had he exercised reasonable care. Originator doesn’t include Intermediary. For example, Person A uses his yahoo account to send an email message to person B which is the addressee. Here, Person A is the originator & Yahoo is the intermediary. Person A is on vacation.During vacation he has turned his vacation responder on with the following message:â€Å"Thank you for your email. I am on vacation, will reply your mail as soon I get back†. He re, though person A has programmed an information system to operate automatically on his behalf. Still Person A is the â€Å"originator† in this case. Section 19. Error on Electronic Data Message or Electronic Document. In this provision, it explains that the transmission of electronic data message between the addressee and the originator that resulted in error, it will enter to the designated information system or which is not designated by the addressee for the purposes.Section 20. Agreement on Acknowledgement of Receipt of Electronic Data Message or Electronic Document. In this provision the originator has not agreed with the addressee that the acknowledgment of receipt of electronic record be given in a particular form or by a particular method, in any communication by the addressee will be automated or otherwise any conduct of the addressee, sufficient to indicate to the originator that the electronic record has been received. The originator has not agreed with the addre ssee that the acknowledgement be iven in particular method, an acknowledgement may be given by or through any communication by the addressee, automated or otherwise, or any conduct of the addressee, sufficient to indicate to the originator that the electronic data message or electronic document has been received. The originator has stated that the effect or significance of the electronic data message e or electronic document is conditional on receipt of the acknowledgement thereof, the electronic data message or electronic document is treated as though it has never been sent, until the acknowledgement is received.What exactly did the originator of the message intend to send? Under the Act, there is a presumption that the electronic message is what the originator intended to send, and the addressee can act on that presumption unless the originator can show that the addressee knew or should have known that the electronic message received was an error. Therefore parties to a commercial transaction have to take precautions to ensure that any messages to be sent contains accurate information and are indeed intended for the recipient.For example, Person A sends an email to Person B asking her that he would like to purchase a car and would like to know the prices of the cars available for sale. Person B in return sends person A catalogue of prices of the cars available for sale. Now this action of Person B is sufficient to indicate to person A (the originator) that his email (i. e. the electronic record) has been received by the addressee. Section 21.Time of Dispatch of Electronic Data Messages or Electronic Documents. In this provision, with regards to the issue of time of dispatch, an electronic message is deemed by the Act to be sent when it enters an information processing system outside the control of the originator. Therefore it would appear that the time of dispatch will be when a person clicks the ‘Send’ button when e-mailing or the ‘Buy/Pu rchase’ button on an online store.An electronic message is deemed to be received when the message enters the designated information system (where there is a designated system), for instance, when a message enters the inbox folder of an e-mail account, or where there is no designated system, when the addressee comes to know about the message. Where the parties agree or the originator requests that receipt of the electronic message is acknowledged, that message will be treated as though it has never been sent until the acknowledgment is received.If the method of acknowledgment has not been agreed by the parties, any acknowledgment (automated or otherwise) or any conduct of the addressee which is enough to communicate receipt, will suffice as acknowledgment. Example of this: Person A composes a message for person B. At exactly 12. 00 noon she presses the â€Å"Send† button. When she does that the message leaves her computer and begins its journey across the Internet. It i s now no longer in Person A’s control. The time of dispatch of this message will be 12. 00 noon. Section 22. Time of Receipt of Electronic Data Messages or Electronic Documents.This provision explains that the time of receipt of an electronic communication is the time when it becomes capable of being retrieved by the addressee at an electronic address designated by the addressee. The time of receipt of an electronic communication at another electronic address of the addressee is the time when it becomes capable of being retrieved by the addressee at that address and the addressee becomes aware that the electronic communication has been sent to that address. An electronic communication is presumed to be capable of being retrieved by the addressee when it reaches the addressee’s electronic address.Section 23. Place of Dispatch and Receipt of Electronic Data Messages or Electronic Documents. – How does one determine the location of dispatch and receipt of electroni c messages? The Act deems an electronic message to be sent from the originator’s place of business and received at the addressee’s place of business. If there is more than one place of business, it will be considered sent from the place of business that has the closest relationship with the transaction or in the absence of that, from the principal place of business.In circumstances where the originator or addressee has no place of business, it will be deemed sent or received, as the case may be, at the originator’s or addressee’s ordinary place of residence. Example of this is: person A has entered into contract with a US based company. Company has its server in Brazil. Even if the company has its mail server located physically in Brazil, the place of receipt of the order would be the company’s office in USA. Section 24. Choice of Security Methods. This provisions explains the choice of type or level of security for their own purposes is recognized in this section .But still, this is prior to rules and guidelines which government can declare in terms of e- commerce transaction security. In my opinion, security is perhaps one of the greatest concerns of the millions of users that routinely exchange data over the Web or store information in computers which may be accessed by unauthorized parties. The government should protect the confidentiality and integrity of data being transferred or stored, they need to develop a new standard which defines authenticated encryption mechanisms that provide an optimum level of security.PART III ELECTRONIC COMMERCE IN CARRIAGE OF GOODS Section 25. Actions Related to Contracts of Carriage of Goods. This provision explains that the law is designed to apply to actions on contracts related to carriage of goods. What is figured is that airway bills, bills of lading, receipts, sales, transfers of ownership, and other documents or papers related to carriage of goods by land, sea, or air may now be do ne electronically. For example, buying online gadgets through the net, it is by shipping procedures.Section 26. Transport Documents. In this provision, It follows therefore that electronic documents facilitated and transacted though online basis are as important and valid as that of actual use of paper documents. This is according to SEC. 26 under Transport Documents where the law requires that any action referred to contract of carriage of goods be carried out in writing or by using a paper document, that requirement is met if the action is carried out by using one or more data messages or electronic documents.In almost all electronic transactions, online orders are subject to a verification procedure conducted by the store for their protection as well as customers from credit card fraud or identity theft. This is a normal procedure to verify that the card owner or that order and that ship-to information are legitimate. This process rarely delays an order, and generally requires ei ther a simple call-back which can be done through phone calls or by fax messages. The B store for example stresses the importance of knowing what â€Å"bill-to nformation† on the checkout process means. The bill-to address is the address to which your bank mails your monthly credit card statement. The bill-to address you give the store must agree with the address that the card issuing bank has on file. Then, be sure to provide the correct information, even if the items are to be shipped to a different location. PART IV ELECTRONIC TRANSACTIONS IN GOVERNMENT Section 27. Government Use of Electronic Data Messages, Electronic Documents and Electronic Signature.In this provision, it says that the government must accept retentions and creations of electronic data messages or document like issues in permits, licenses and its approval form and issure receipts in the form of electronic. As well as the government business transactions and it is authorized to adopt rules and regulations in the form of electronic documents. In a short explanation all documents that they will create should be in the form of electronic documents or data messages and authorized by electronic signatures as well. Section 28.RPWEB Promote the Use of Electronic Documents or Electronic Data Messages in Government and to the General Public. In this provision, it explains that RPWEB’s role in the use of electronic documents or data messages. They must be the initial platform of the GII which stands for government information infrastracture to control the electronic online transmission and conveyance of government services to improve better technologies or kinds and electronic online wide area networks utilizing, but not limited to, fiber optic, satellite, wireless and other broadband telecommunications.To sum up, RB web’s major task is to . Interconnect all government offices and units, including schools, colleges and universities, government corporations, as well as those at t he local level, by authorizing the use of savings for Internet access, through any Internet Service Provider (ISP) in their area, to facilitate faster communication and data interchange in government. Interconnect all ISPs through Internet exchanges for greater connectivity among users in the country. Speed up implementation of the telephone roll-out programs, articularly in unserved areas in the country. So that our country will hava a better technology. Section 29. Authority of the Department of Trade and Industry and Participating Entities. In this provision, it enables the DTI to promote and develop electronic commerce as well as to promulgate rules and regulations, provide quality standards or issue certifications in the pursuance of this Act’s intentions. I was very pleased to see this attempt by the DTI to develop electronic commerce in our country.I believe that this act will be implemented for the economic future of the country; electronic commerce and the developmen t of new network-based public services is clearly set to become a major contributor to country’s economic growth over the next decade. The DTI has a very important role to play to ensure that the potential benefits for the public, for SMEs and for government can be realised promptly and in a safe manner. PART V FINAL PROVISIONS Section 30. Extent of Liability of a Service Provider.This provision explains the liablilities of the service provider, It exempts ISPs from liability if they can prove that they had no knowledge of the occurrence of the alleged act, and that they had taken sufficient steps to prevent a violation. However, the existing provision does not clearly prescribe liability limits of service providers. For example, if a person makes a representation to a service provider claiming copyright on the material available on the network, will the service provider be liable if he fails to take steps within a reasonable time to remove the infringing material from the ne twork?If the service provider fails to prevent infringement of copyright in the above circumstances, is the plea of not having knowledge of infringement still available to him? If the service provider removes the material from the network in pursuance to the representation made by a person which later on proves false, will the service provider be liable to the person whose material has been removed? The liability of service providers for copyright infringement must be made more explicit.The act must include sections that address the financial aspect of the transaction, and the relationship between an ISP and a third party, because this is vital to determining the identity of the violator. So that if any person with knowledge of the infringing activity, induces, causes, or materially contributes to the infringing conduct of another, the person can be made liable. In order to be exempt from liability, the act requires the service provider to exercise due diligence to prevent the commi ssion of copyright infringement.The Act does not provide the meaning of the term due diligence. If due diligence means policing each and every aspect of the Internet, it can lead to loss of privacy and can ultimately have a disastrous effect. There is a need for a consensus on the meaning of the term due diligence because the primary function of ISPs is to build the Internet, not to play the role of a policeman. If the behavior of an ISP is reasonable, then that ISP should not be held liable for each and every activity on the Internet as has been held by the court.Section 31. Lawful Access. In this provision, it explains that that access to an electronic file, signature or document shall be limited only to those that are authorized to possess and use it. Electronic keys used for identity and integrity may only be made available to another upon consent of the individual in lawful possession of the key. Section 32. Obligation of Confidentiality. This provision explains that those who obtain access to an electronic key, signature or document not to convey or share the same with another.These two sections are important in that it recognizes that these files are property of an individual and can be possessed only by another upon the consent of its owner. It further recognizes the privacy and personal nature of the key by obliging those who gets to possess it not to share it with others. In my own opinion, the person must receive the information in confidence. That means that he or she must be asked to treat the information as confidential or it must be obvious to him or her that the information is given in confidence.The best way to do that is to ask the person to sign a confidentiality agreement. That is not in itself enough. Precautions must be taken (and seen to be taken) to keep the information secret such as logging documents and disclosures, keeping materials under lock and key and extracting confidentiality agreements. Section 33. Penalties. – The fol lowing Acts, shall be penalized by fine and/or imprisonment, as follows: In this provision, issues in security and penalties are addressed in it.The violations are the ff: hacking, is any access in order to corrupt, alter, steal, or destroy using a computer or other similar information and communication devices, without the knowledge and consent of the owner of the computer or information and communications system. For example, an adolescent who would never consider picking someone's pocket or physically damaging someone else's property or home, might be quite willing to steal people's credit card numbers or destroy poorly protected business or government files, since files and credit card numbers are not tangible entities, and the damage is done anonymously.If the individual commits this violation he will have a fine of One Hundred Thousand pesos and imprisonment of 6 months to 3 years. Another violation is piracy, s the unauthorized duplication of an original recording for commerc ial gain without the consent of the rights owner. They will be punished by a minimum fine of One Hundred Thousand pesos (P 100,000. 00) and a maximum commensurate to the damage incurred and a mandatory imprisonment of six months to three years. In my opinion. Penalties like imprisonment are good example of punishing an individual who possess violations and crimes.Section 34. Implementing Rules and Regulations. In this provision, it explains that the DTI, Department of Budget and Management and the Bangko Sentral ng Pilipinas are empowered to enforced the provisions of this Act. Among others, the DTI is empowered to promulgate rules and regulations, as well as provide quality standards or issue certifications, as the case may be, and perform such other functions as may be necessary for the implementation of this Act in the area of electronic commerce.Failure to Issue rules and regulations shall not in any manner affect the executory nature of the provisions of this Act. In my opinion , it is necessary to develop rules and regulations especially in e commerce. We need rules for the settlement of disputes. They also need rules for the organization of their governments. Law is the set of rules that the government enforces through its police, its courts, and its other agencies. It is important to implement rules and regulations so that people can understand what e commerce is and what are the obligations toward this act.Section 35. Oversight Committee. In this provision, it explains that there shall be Congressional Oversight Committee composed of the Committees and Trade and Industry/Commerce, Science and Technology, Finance and Appropriations of both the Senate and House of Representatives which shall meet at least every quarter of the first two years and every semester for the third year after the approval of this Act to oversee its implementation.The DTI, DBM, Bangko Sentral ng Pilipinas, and other government agencies as may be determined by the Congressional Co mmittee shall provide a quarterly performance report of their actions taking in the implementation of this Act for the first three (3) years. Utilizing an oversight committee has several advantages. In my opininion, It is generally much more effective with forming and implementing a new rules and regulations. Also, since the oversight committee is a separate entity, access to classified information such as electronic data messages and documents can be controlled.Since experts are involved, uninformed bias is kept to a minimum. The oversight committee can also operate as a mediating body between the active organization and the public. In this role, the committee can help the public understand what e commerce rules and regulations by publishing reports that communicate the facts in ways the public can understand. The existence of an oversight committee can have an impact on the quality and fairness of fact-finding even before the committee gains access to the relevant information.Gove rnment entities must ensure the standard of their work is acceptable, especially because in the long run it will be more costly and time-consuming if they are forced to go back and correct mistakes when an oversight committee detects errors on the implementation of the act. Section 36. Appropriations. In this provision, It explains that the funds needed to provide the sections 27 and 28 will be charged on the savings of the General Appropriations Act of 2000 in the first year of the effectively of the act. And all the funds for the continuous implementation will be included in the General Appropriations Act.This is important to develop the electronic transactions between the government and to the public and like the section 27 said in order to transact the government business and/or perform governmental functions using electronic data messages or electronic documents, and for the purpose, are authorized to adopt and promulgate, after appropriate public hearings and with due publicat ion in newspapers of general circulation, the appropriate rules, regulations and I think there will be needed funds to implement this. Section 37.Statutory Interpretation. In this provision, it explains that Philippine law on e-Commerce was patterned after the â€Å"UNCITRAL Model Law on Electronic Commerce† adopted by the United Nations Commission on International Trade Law (UNCITRAL) in 1996 the model law is intended to promote the harmonization and unification of international trade law and remove unnecessary obstacles to international trade caused by inadequacies and divergences in the law affecting trade as a result of the information technology revolution.The interpretation of this Act shall give due regard to its international origin and the need to promote uniformity in its application and the observance of good faith in international trade relations. The generally accepted principles of international law and convention and electronic commerce shall likewise be consid ered. Section 38. Variation of Agreement. In this provision, it explains that the variation of agreement is intended to apply not only in the context of relationships between originators and addressees of data messages but also in the context of relationships involving intermediaries.Thus, the provisions of it could be varied either by bilateral or multilateral agreements between the parties, or by system rules agreed to by the parties. However, the text expressly limits party autonomy to rights and obligations arising as between parties so as not to suggest any implication as to the rights and obligations of third parties. Section 39. Reciprocity. This section states that if the other party to a transaction comes from a country that does not grant the Filipino similar rights contained herein, he will not be allowed also to enjoy the benefits of this law's provisions.Section 40. Separability Clause. In this provision it states that any separable provision of this Act be declared unc onstitutional, the remaining provisions shall continue to be in force. To understand generally a separability clause is a clause often included in a legal document (as a contract) stating that invalidation of some sections or clauses in the document will not affect the validity of the remainder. Section 41. Repealing Clause. In this provision, all rules and regulations which are inconsistent with the provisions of this Act will be cancelled legally.Section 42. Effectivity. In this provison, it declares the effectivity of the act wher e in it shall be effective after its publication in the Official Gazette. Conclusions and recommendations: There is high need for such laws to be enforced in order to make sure the balance is maintained between selling and buying along with the right laws. So far the laws such as the limitation of the liability, indemnification, attorney fees, choice of law are the most used and vital ones to make sure that the deals and trading happen legally and gover ned by laws.The electronic buying and selling are the key features of this modern world and internet applications. The way of living is simplified to the core by the extensive and effective applications of the internet and the Ecommerce laws that govern these electronic trading. The modern world is reaping the multipurpose benefits of the internet and its worldwide applications to the maximum. The laws are the heart of any modern day trading or dealing that takes place because they set the way of business and the regulations of the business.When you make any electronic transaction, then you will have to go through the mandatory laws so that they occur under the legal patterns. The limitation of the liability and the choice of the law are vital laws that the ecommerce industry has to go through. As the days pass by, further more laws are going to be implemented in order to make sure the industry and the transactions are under control. Case Analysis about the E Commerce Law Kyle M. Es tanislao SOCULITA 301

Thursday, August 29, 2019

Two different social networking (Snapchat and Instagram) Essay

Two different social networking (Snapchat and Instagram) - Essay Example First of all, the main distinctive and unique feature of the service is that the picture a person wants to share with a friend is saved on the service only within 24 hours. After this period the picture is being deleted from Snapchat and nobody is able to see it anymore. Also, once a friend gets the photo he can observe it maximum for 10 seconds after this the picture disappears. As for design possibilities of editing pictures Snapchat has not that many functions. The only way user can make the picture is to take it right from the camera provided by the app, he can also add some text or paint something on the photo taken right away. The service has only one communicational function, which to share pictures with friends without possibility to save the pictures or comment (and like) them afterwards. Thus Snapchat is truly a kind of chat that provides its users with possibility to share their photos with saving a high level of privacy. Instagram is the social network whereby internet users can share whatever pictures they wish to share with their followers. Instagram users can either take a photo and post it right away or post any picture from their camera roll. The pictures are being saved on the service for unlimited period of time and the person’s followers can look at them any time they want unless the owner of the profile deletes them by oneself. The way of usage of the app is also different from Snapchat. After choosing a picture a user intends to post he can edit it in multiple ways like using filters or in a manual way. The posted pictures are being showed in a common newsfeed of the user’s followers and they can like it and comment, which makes the application more adapted for open communicational possibilities. If user wants to save a picture, he can visit the other user’s profile and save it print screening the picture he likes. The service is definitely less private, as it allows u sers to steal others’ pictures from their

Wednesday, August 28, 2019

Research and analyze company's current IT situation Essay

Research and analyze company's current IT situation - Essay Example The first outlet of Wal-Mart was opened in the same area in 1962 by the name of Wal-Mart discount store. Thereafter, another 12 retail stores under the ownership of Walton’s family were opened (Wal-Mart). However, it was not until 1969 that the Wal-Mart stores chain was founded (Wal-Mart). The strategy on the basis of which Wal-Mart was founded was providing everyday low prices at any place. It was not until 1970 that the first stock was traded with the formation of Wal-Mart as a public limited company (Wal-Mart). Thereafter, the company’s operations expanded and its distribution centers increased leading to increased growth through acquisitions. Competition also increased with retailers such as K-mart, Costco, Dillard's, Dollar Tree, J.C Penny, Sears and Target (NASDAQ). The bargaining power of customers, therefore, increased with the availability of greater substitutes. This increased the need to manage the operations efficiently and effectively which meant the compan y had to make use of information systems and manage them to sustain their competitive edge. Perhaps the primary reason behind the rapid growth of Wal-Mart is its high responsiveness to customer needs and cost reduction through the integration of information technology and information systems into its supply chain and logistics. This is reflected in Wal-Mart being the first retailer to have adopted the hub-and-spoke system of centralized distribution (Banjo). The hub-and-spoke system revolves around the idea of systems integration with the inflow of products from various places to distribution centers where the orders are consolidated and sent to their respective destinations (Banjo). These enable companies to reduce cycle times, inventory as well as costs of transportation. Wal-Mart has carefully synchronized its business strategy with its MIS strategy. This is in line with literature which suggests that the operational, managerial and strategic needs of corporation must be aligned with the information systems. The model of strategic alignment suggests that the business, IT, Organizational infrastructure and IT infrastructure must be aligned with each other (Venkatraman, Henderson and Oldach). The strategic drivers in the case of Wal-Mart included intense and growing competition, the need to shift to online operations and cutting costs to enhance profits. All these have resulted in Wal-Mart resorting to the use of Management Information Systems in its operations. Although traditionally classified as a brick and mortar company with physical operations only, Wal-Mart can now be categorized as a dot.com corporation as well owing to the foundation of walmart.com. Wal-Mart presents a case of a retailer that has used information technology to achieve and maintain a competitive edge in the market. As mentioned earlier, this is based on the company’s business strategy of offering lowest possible prices (which can come through lowest possible costs). Therefore, cost reduction and responsiveness to customer needs have been at the heart of Wal-Mart’s business strategy. The company has catered to the needs of most of its stakeholders including its vendors, suppliers and customers through the adoption of information systems. Wal-Mart has invested huge sums of money for tracking its inventory across all outlets. The satellite communication system developed in

Tuesday, August 27, 2019

Quantitative research article critique Paper Example | Topics and Well Written Essays - 750 words

Quantitative article critique - Research Paper Example he discusses aspects of the Charter schools as established by the Texas’ legislature, explores their operations, and explains that the legislature established Charter schools in the year 1995, allowing the special schools to operate independently from state regulations that govern district schools. A series of registrations under the Charter followed and the state legislature had to increase the minimum number of Charters to be offered. Schools that specialized in education for at-risk students were however excluded for the limitation on the number of Charters to be offered. Five years after the Charter legislation, the state had offered 178 charters, out of which 140 were operational. The rest had planned to commence operations later while six of the awarded schools had returned their charters and the board had revoked charters for three schools because of administrative or financial technicalities. Almost half of the charter schools served secondary schools while 21 percent served elementary schools, 18 percent served all grades, and 12 percent served other special grades. The schools had an average enrolment rate of 198 students, a rate lower than that for normal public schools. Enrolment however has a wide range and deviation. Analysis of students’ characteristics shows that chatter schools had higher proportions of minority students than normal public school did. Charter schools that offer services to at-risk students however had significant contribution to the observed proportion because of the higher incidence of minority students. Other types of charter schools however have lower percentages of minority students (Clark, 2000). Attendance at elementary and middle levels of chatter schools was similar to attendance in ordinary public schools but is lower at high school level. Higher student mobility was also reported among charter schools. Faculty composition of schools identifies more non-certified teachers in charter schools that among traditional

Monday, August 26, 2019

Workers Without Health Insurance Essay Example | Topics and Well Written Essays - 2250 words

Workers Without Health Insurance - Essay Example It will finally draw a conclusive recommendation on how workers can be provided with medical covers to enhance their heath care service provision. The primary source of health insurance covers in the United States is the employer-sponsored insurance -ESI1. ESI offers job-based health benefits which are in some cases subsidized by the federal government by exempting employer tax on health insurance premiums. In certain companies there are private employer sponsored which are voluntary and depends on the company's financial ability to meet the health care requirement for its entire workforce. Since not all employers offer insurance covers to its employees, not all workers have insurance policies and consequently, their children and spouses do not have them. In most cases, people who are not insured are either workers or family members of the workers. Previous research has shown that most American citizens obtain their health insurances through their employment agencies. However, some working environments do not find it economically possible to offer health insurance services to its workers. These working environments include; those who earn low wages, short job tenures, working part-time or those with low incomes2. In 2003, the Kaiser commission of inquiry reported that of the 124 million workers who were uninsured, 80% of them were self employed and this can be explained by the fact that these group of people do not get access to group insurance which is somehow cheaper. Another group of uninsured workers who formed the remaining percentage were workers with non-working spouses. Causes of medical disenfranchisement People become medically disenfranchised because they lack proper medical insurance cover that they can depend on whenever they are not feeling well. Poor health care in America today has been blamed on lack of worker insurance policies and programs leading to high costs of medical services. As many people continue to work as casuals and part-time jobs, in addition to low wages and salaries, they are not able to meet the medical requirements needed not only by themselves but also by their families. This has led to increased number of people who operate without medical and insurance covers for a better part of their lives. In fact, research has shown that three out five working Americans are not covered with insurance covers. This trend has in the past sparked a lot of condemnation from all quarters especially from government critics. Pressure is therefore building on employers to ensure that all its employees are insured. However, with increased incidences of political unwillingness, societal diversity and stagnating economies, it is no longer economically visible to offer all people the medical insurance cover they need. The burden has been therefore left to the workers to seek private insurance covers, which are very expensive to them.

Sunday, August 25, 2019

Political Economy of Oil Essay Example | Topics and Well Written Essays - 2500 words

Political Economy of Oil - Essay Example The crises that started with the oil crisis in 1970s extended to Gulf War in the 90s. There are different terrorist threats today that affect oil resources such as oil refineries in Saudi Arabia. The deteriorating law and order situation in Iraq also resulted in fear of disruption of oil supply. There are threats of war with Iran that bring greater fears of volatility in the oil-producing region. These & other such factors have kept oil prices very high and they affect current market scenario. The hope for stability in oil prices is dependent on both political & economic stability. Transportation, heating, power generation, the plastics, pharmaceuticals and synthetic fibre industries are the main ways in which oil is consumed. Demand for oil is greater in the developed nations compared to the developing economies. United States of America solely generates a quarter of world oil demand. Asia comes next with Japan having the highest consumption of oil. In Europe no one country can be considered highest oil consuming country instead the demand is evenly generated by all European nations, The demand for oil diminished considerably in Soviet Union after its collapse.US demand for energy is greater and its dependence on oil producing countries is also increasing. The oil supply is mainly provided by large companies operating in countries with large reserves of oil. Countries like UAE, Saudi Arabia, Venezuela, Norway and Kuwait are some of the oil rich countries and are main suppliers of oil to the world. Since supply side of equation plays a crucial role in stabilty of oil markets, the countries producing oil have been trying to stabilize the price of crude oil through production policy. However, the interest of world economy does not lie in bringing stability by production manipulation. Since oil is a resource that depletes with time so its value increases with time as well. A country cannot let go of its future worth or value by increasing its production at the current market price. It is not in the economic interests of such oil producing countries to pursue a production policy incompatible with their own economic interests. Countries like Saudi Arabia have been contributing to the world economy in general and other Western and developed economies like Japan in particular by supplying more oil than it should. For instance Saudi Arabia, of the largest oil producers, increased its production of oil after the oil crises of 1979, resulting in a downward crude-oil price trend in world markets. This manipulation by any country or cartel cannot reap economic benefits in the long run. The market factors should be allowed to play their due role instead of manipulation. There is an increasing trend in demand for crude oil because consumption is greater than the supply. Market economy is the best way to allocate resources. The concept of oil peak suggests that once we reach the stage of peak the economy will be greatly affected. Similarly experts say that world oil reserves will also reach its peak in not so distant future resulting in price hikes and economic recession along with geopolitical repercussions. Oil Situation in USA If we consider the oil peak theory according to which there will be a sharp decline in supply because demand is constantly increasing whereas the speed of finding or exploring new oil sources is not matching that then we come to know that the oil

Saturday, August 24, 2019

Government Article Example | Topics and Well Written Essays - 250 words

Government - Article Example The main point the author made in her article is that education is a right of all people, whether illegal immigrants or not, and asking for immigration papers or making inquiries into their immigration status is a form of discrimination, and constitutes an infringement of his or her civil rights as an individual. School district authorities who require proof of citizenship on enrollment time are guilty of a law passed during the time of President Ronald Reagan, which only requires proof of residency such as a water, phone or electric bill (Armario 1). This knowledge is somehow related to my class because we are being taught how to respect the rights of all people and how not to discriminate against a certain class of people. In other words, America should embrace multi-culturalism from its varied ethnicities, indicated by its motto, â€Å"E Pluribus Unum† or â€Å"one from many† which is indicative of Americas status as the melting pot of the world, ready to welcome anybody to its shores and live freely. The financial crisis resulting from a bursting of the housing bubble and the subprime mortgage collapse has put severe strains on the finances of most states and in particular, those of certain school districts. This caused the recent attempts to exclude the illegals from school. Armario, Christine. â€Å"Public Schools Reminded not to Turn Away Illegal Immigrants.† Associated Press, 6 May 2011. Web. 19 Jun. 2012.

Friday, August 23, 2019

Education Essay Example | Topics and Well Written Essays - 750 words - 9

Education - Essay Example Indeed an education in STEM is critical for the population because this is the kind of education that will make a difference in the future. Without STEM education, engineers, programmers, architects and other technology oriented professionals will not be able to formulate the basic algorithm in creating technology nor will they be able to build any structure that will facilitate technology and it follows that a given country will not have anything to engage in trade to make itself progressive and prosperous if it lacks the aptitude in STEM. Indeed STEM is the necessary education in the future as it would become the primary enabler in industry not only on a national scale but also on a personal level. The world is getting technology oriented and we can even feel it today. Technology permeates and affects every dimension of our life and it is expected that this trend will not only continue in the future but will become more intensive. Virtually almost all product s will have a component of technology and engineering and as long as technology and engineering is involve, so does STEM because technology and engineering speaks the language of numbers and science which is the domain of STEM. Thus it can be inferred that a country’s competitiveness is directly correlated with its aptitude in STEM. A country which has strong score in STEM tends to have a strong technological base to create industry such as the case of Japan who is the leading country in manufacturing electronic products (section for interview) and thus will have a greater chance to prosper. STEM’s importance is not only limited to national scale but can be equally important on a personal level. An aptitude in STEM will tremendously boost an individual’s success in the workplace because he or she has the necessary solid skills (STEM) to get things done. In the new economy of globalization, this skill is indispensable because almost all aspect of

Thursday, August 22, 2019

Newspaper D1 Assignment Example | Topics and Well Written Essays - 250 words

Newspaper D1 - Assignment Example According to Yuan (2010), the Chinese and American employees are employing a range of strategies to address the conflicting dilemmas. The main issues faced are the differing business etiquettes, corporate culture and employment benefits. Some of the problems encountered by the workforce are integrating with the colleagues, compelling the implementation of one’s recommended solution, making decisions by power, dominating among the team members, avoiding discussion of issues, relationship dissolution and third-party process. Moreover, the Americans are willing to confront the conflict rather than the Chinese people who try to avoid them. In order to understand the conflict, it is better to apply the human psychology concept. The idea behind this framework is that each individual has to be understood so that the personal attributes are evident and it will allow the person to utilise his capabilities efficiently in resolving the conflict. Due to globalisation and strengthening of international business avenues, the intercultural business conflicts will have to be minimised so that the desired organisational objectives can be successfully

The North Face Essay Example for Free

The North Face Essay The majority of the company’s products are sold in premium sporting goods retailers, and specialty backpacking, mountaineering, and skiing retailers. The North Face provides gear for professional and amateur athletes and enthusiasts using high-quality, technical outerwear. This company also sponsors major events to maintain and even increase its public profile. In 2010, The North Face sponsored the Ski Challenge, the Ultra Trail du Mont Blanc in France and the Lava redo Ultra Trail in the Italian Dolomite Mountains (Kennedy, 2012). The North Face has very stiff competition from well known companies such as Columbia Sportswear, and Patagonia. However they have fascinating state of the art technology to distance themselves from their competitors. Despite The North Face filing for bankruptcy in the late 90s, profits have risen by 37 percent the past year. This is mostly because of the popularity of the brand in Asia and its sponsorship for the Winter X-Games. It has earned a reputation as the ultimate, authentic outdoor brand. Their slogan â€Å"Never Stop Exploring,† has become popular amongst all athletes and outdoor enthusiasts. This outdoor apparel powerhouse has a very large and loyal fan base, and the demand for outdoor apparel is on the rise. In North America, performance outdoor apparel has grown 19% from 2004 to 2010. This trend is supposed to continue for at least another five years. As The North Face has been creating products with great quality and endurance, they plan to focus toward a greener supply chain and operations. Partnering with the blue sign sustainability standard for textile production, will help separate The North Face from their main market competitors Columbia Sportswear, and Patagonia. By looking at financial records, The North Face surpasses its second largest competitor, Columbia Sportswear, proving that it is the best in the industry. The North Face is named after the coldest most unforgiving side of a mountain, and has helped explorers reach unbelievable heights in the Himalayas. This remarkably powerful corporation is going to continue to design and provide the best for all outdoor enthusiasts, remaining on top for years to come. The North Face was chosen due to its involvement in both the sport and recreation fields. Their mission statement is â€Å"Never Stop Exploring†. Their vision statement as a business is â€Å"Our passion is beyond setting records and achieving fame. For us, its all about changing lives, not just our lives, but also, the lives of those people who inspire us to aim for extraordinary dreams† (Over 40 Years of Innovation and Exploration, 2012). For more than 40 years, The North Face has been distributing an extensive line of performance apparel, equipment, and footwear. The company’s purpose is to push the boundaries of innovation so their customers can push the boundaries of exploration (Over 40 Years of Innovation and Exploration, 2012). The North Face is extremely proud to be the first choice of equipment and apparel for the world’s most accomplished climbers, explorers, and winter sport enthusiasts. In 1966, Douglas Tompkins and Kenneth Klopp founded The North Face in San Francisco’ North Beach neighborhood. They chose this name of their equipment retail store because the north face of a mountain in the northern hemisphere is generally the most difficult face to climb (Our Story, 2011). By 1968, The North Face was designing and manufacturing its own type of technical mountaineering apparel and equipment. By the end of the 1980s The North Face became the only supplier in the United States to offer a comprehensive collection of high-performance outerwear, skiwear, sleeping bags, packs and tents (Our Story, 2011). The North Face brand was created to give customers exactly what they need and they are concentrating on creating environmental friendly and high sustainability products. They wanted to give the customers huge satisfaction and build trust between them and the brand. By using products, which support better performance and comfort at different locations and climatic conditions, creates a long-term relationship with the customers. In the past innovative product design and consistent development and introduction of new products have always been North Face’s greatest strengths. In 1975 North Face introduced a standard in the outdoor equipment industry with its geodesic dome tent. This design became the standard for lightweight, high-performance tents used in high-altitude and polar expeditions (Our Story, 2011). The geodesic dome also became very popular for general backpacking and camping as well. The same year North Face also introduced another original, sleeping bags incorporating shingled construction of synthetic insulation. Like the dome tent, these sleeping bags have become the industry standard (Our Story, 2011). An â€Å"extreme skiwear† line was later introduced which involved a complete line of severe cold weather clothing. By the late 1980s North Face were the only manufacturer and distributor in the United States of a comprehensive line of premium-grade, high-performance equipment and apparel used in mountaineering, skiing, and backpacking (The North Face Inc, 2009). Currently, Geoffrey D. Lurie leads The North Face team as Chief Executive Officer, and Director (Company Overview of The North Face, Inc. 2011). The North Face is owned by VF Corporation, who is lead by the team of Eric C. Wiseman and Robert K. Shearer (About VF Management Team, 2012). The VF Corporation is a leader in branded lifestyle apparel including jeans wear, outdoor products, image apparel, sportswear and contemporary apparel brands. The principal products and services offered by The North Face are men, women, and children outdoor apparel for hiking, cold weather climates, running, rock climbing, and camping. They offer equipment such as tents, sleeping bags, back packs, and kits for rock climbing, and camping. They offer services such as events throughout the year that give their customers opportunities to enjoy the outdoors while also getting to know the brand. Today, The North Face offers a wide variety of products like outdoor equipment such as thermal tents, and climbing tools. They are very famous on college campuses these days with their outer wear ranging from their jackets to winter hats and gloves. These products meet customers’ needs and wants by providing quality winter and hiking gear. The North Face touches customers emotionally by satisfying their technological needs. Every product they make is made with the thought that â€Å"each consumer is an explorer and they require a product with high quality, comfort and something they would value for the long–term† (Our Story, 2011). They value their customers and stick to their company values of using high quality fabric, testing their products endlessly, and constant improvement (Our Story, 2011). The demand for The North Face products will definitely increase in the future. Global demand for performance outdoor apparel worn by individuals taking part in sports pursuits is outpacing other sectors of the total active sportswear market, according to a new report from just-style, with growth set to soar by 22% over the next six years†(Smith, 2011). In North America, performance outdoor apparel has grown 19% from 2004 to 2010. This trend is supposed to continue for at least another five years. Europe is suppose to have a predicted 18% increase within the next 5 years (Smith, 2011). Outdoor apparel will be very successful in the developed world, but in third world countries they will hardly grow at all. In the past, outdoor retail products were seen more as a luxury rather than a necessity. Lucky for The North Face, the economy hasn’t really impacted the company as a whole compared to the industry in general. The North Face is classified as a â€Å"premium brand†, thus targeting â€Å"high educated individuals†. New stores have continued to open, and plans to grow and expand are emphasized each day. Just like any organization, The North Face has high objectives in regards to their products and services. One objective is to improve the brand value perception from 65% to 85% by the end of the year (2010 Sustainability Report, 2010). Based on a survey that was conducted, 65% of the respondents think that they are getting a great value out of The North Face Products for the amount they pay. Whereas another survey shows that the brand is not too affordable. Another objective for The North Face is to increase customer loyalty from 68% to 85% by the end of 2012 (Over 40 Years of Innovation and Exploration, 2012). Based on the brand research, they found out that only 74% of The North Face customers are more likely to buy its products again. Finally, The North Face plans to expand the product offering of the company from 4 to 6 activities. Their newest targets include runners and bikers. After conducting a survey with their customers, The North Face found that the top activity that respondents participate in, other than hiking, are biking and running. Therefore, The North Face wants to include more gear to accommodate this new market of runners and bikers. In order to reach its goals, The North Face plans on taking steps in order to meet its objectives. To achieve its goals, The North Face plans on creating strong awareness campaigns that emphasize the product technology and value of the products in order to decrease the perception of having prices way too high for a said product (2010 Sustainability Report, 2010). In order to increase customer loyalty The North Face Plans on developing more community outreach programs to engage customers. A simple solution is in place for the running and biking market, just simply begin developing products for that target market. The use of advertisements will help The North Face keep in touch with the customers and constantly remind them of product’s positive values (Over 40 Years of Innovation and Exploration, 2012). Maintaining long-term relationships with happy and satisfied customers will encourage them to continue buying the products. The technology used to make The North Face products is blue sign approved fabric. The blue sign standard guarantees that along the entire production chain products only contain components and pass through processes that are harmless to people and the environment (The Board Room Eco Apparel Environmental Standard, 2012). By supporting the blue sign standard, The North Face can focus not only on creating high performing, quality products but also on assuming greater responsibility for our consumers and the environment by minimizing the ecological impact of their supply chains (Product Responsibility, 2010). In addition to working with their primary suppliers, The North Face works hard to influence additional supply chain partners to partner with the blue sign system in 2010. Viewing the macro-environment surrounding The North Face is very interesting. Many factors influence the production of products, sales, and innovation. Social trends include brand popularity as well as possible body image and health issues. Everyone wants to fit in with the new styles, therefore with The North Face on the rise; sales will increase and become popular among customers. Since The North Face promotes healthy living, healthy lifestyles among consumers will become a huge trend with trying to stay in shape and avoiding obesity. Politically and economically, healthcare bills could determine if people would venture out and do adventurous activities with risk involved. Higher taxes and unemployment rates will pose a huge threat to The North Face due to its high prices. Currently, natural trends that are being used include the use of blue sign fabric technology explained earlier and finding innovative ways to recycle and reuse resources for future products. Technological trends that are being used include partnering with the most innovative leading materials engineers. With this partnership, The North Face creates the technically advanced fabrics needed to develop clothing and equipment that meet their high standards (Our Research, Design ; Development Process, 2011). One great example is the partnership with W. L. Gore, who helped design PacLite, â€Å"the most compressible, lightest weight GORE-TEX shell fabric available† (Our Research, Design ; Development Process, 2011). As The North Face has been creating products with great quality and endurance, they plan to focus toward a greener supply chain and operations. At least 65 percent of the fabric it uses to conform to the blue sign sustainability standard for textile production by 2015 (Guevarra, 2011). After two years of working with major suppliers to apply blue sign guidelines, 27 percent of the fabric used in The North Face products meets the standard (Guevarra, 2011). The further upstream we go, the more impact we have on [easing] the environmental impacts,† Adam Mott, corporate sustainability manager for The North Face (Guevarra, 2011). With that being said, the greatest benefits result by improving the sourcing and manufacturing of prime materials that are used in its products. The North face customers are usually single middle-middle or upper-middle class people, whose main occupation is teaching or having part time summer jobs. They are college or professional customers between 25 to 45 years old (Demographics of The North Face, 2012). Their income ranges between $40,000 to $60,000 dollars. They are consistent users with heavy frequency of purchase and conduct searches on the Internet (Demographics of The North Face, 2012). Surveys and studies show The North Face customers are interested in running in marathons and also environmentally aware. They enjoy being independent and typically purchase high performance products (Demographics of The North Face, 2012). The company targets prospect customers who are trying to explore new locations for outdoor activities like running. The customers are generally people who are trying to fit in the new environment or society. The North Face has very stiff competition from three major well known companies such as Patagonia, Columbia Sportswear, and Nike. Patagonia and Columbia Sportswear are in the same category of â€Å"outdoor† lifestyle brands, and Nike on the other hand targets a much larger variety of customers. Patagonia’s mission statement states: â€Å"Build the best product, do no unnecessary harm, use business to inspire and implement solutions to the environmental crisis† (Our Reason For Being, 2012). Founded by the mountaineer Yvon Chouinard, Patagonia, like The North Face, is a company that is deeply committed to preserving the earth and creating sustainable products. In 1972, Yvon Chouinard developed the idea of going green mountain climbing after finding out that the climbing gear his company manufactured damaged cliffs (Beginnings and Blacksmithery, 2012). Chouinard later developed aluminum chocks to replace the steel climbing gear. The Columbia Sportswear Company is positioned directly against The North Face and Patagonia. While The North Face and Patagonia target the extreme outdoor adventurers, Columbia Sportswear appeals more to the casual outdoor enthusiast. They believe that â€Å"the outdoors isn’t all about remote expeditions or climbing the world’s highest mountains. Anyone can enjoy the outdoors† (Columbia’s History, 2012). They are definitely aiming to sell to a much larger crowd of customers compared to Patagonia and The North Face. Columbia Sportswear is sold in over 100 countries worldwide. They use state of the art technology known as Omni technology, which focuses primarily on comfort focuses on comfort (Omni-Technology, 2012). Core technologies serve the following functions: thermal comfort, water repellent, lightweight, advanced traction, sun protection, advanced evaporation, advanced cooling, waterproof and breathable (Omni technology, 2012). Nike is the world’s leading supplier of athletic shoes and apparel. Each product line they offer is branded such as, Nike Golf, Nike Pro, Air Jordan, etc. Nike’s marketing and branding strategy is a key component to their huge success. Nike’s logo, â€Å"The Swoosh†, is one of the most recognizable logos in the entire world. They target the mainstream athletic crowd with their apparel, commercials and sponsorships. Competitively, all four companies have incredibly strong cultures and each has their own sets of strengths and weaknesses. Out of these sport and recreation apparel powerhouses, Patagonia, is the most serious threat to The North Face. However The North Face has some unique features that gives it an advantage over Patagonia and the rest of its competition. The North Face is a very trendy brand, and very popular with college students. It is available in thousands of retails stores for easy access, creating more of a mass market appeal. trendy brand of the two, hugely popular among college students and widely available nationwide in thousands of retail locations. Thus, The North Face has more mass-market appeal. On the other hand, Patagonia only has a handful of retail locations in areas that aren’t as populated. This happens to be part of their marketing strategy. The North Face’s marketing strategy is to focus on the athlete and their performance in The North Face gear. Patagonia focuses more on the clothing it sells, not the model. They place an emphasis on the fabric technology that they use in their marketing and only display their clothing on their website and catalogs. This is an area where both of these companies could improve on. North Face as a whole company is financially healthy. This is determined through the financial ratios provided by the annual report of V. F. Corporation for the year 2012. The North Face is a subsidiary to the VF Corporation and is represented as the stock symbol VFC on the New York Stock Exchange. In order to determine The North Face’s health, profitability ratios and its subcomponents were analyzed. Profitability ratios show the business’s ability to generate revenue as compared to its expenses and other relevant costs incurred during a specific period of time (Profitability Ratios, 2012). These ratios include profit margin, return on assets, capital structure, and return on investment. The North Face’s financial ratio for profit margin is 47. 9%. This was determined by taking the net income, dividing it by the corporation’s revenue, then multiplying the quotient by one hundred. The return on assets is 9. 5% which is determined by taking the company’s net income and dividing it by their total assets. The capital structure of the North Face is 24. 3%. To calculate the capital structure, you must take their long term debt, and divide it by shareholders equity plus their long term debt. Calculating the return on investment, you must take the gain from interest; subtract it by the cost of investment, then divide by the cost of investment. The North Face’s return on investment is 14%. The current accounts payable is $868,870,000, current ratio is 1. 91%, the working capital is 1. 2B, and their long term debt is 1. 83B (VF Corporation, 2012). The North Face company is healthy because their working capital is only 300 million less than their long term debt and they have a positive $868,870,000. 00 accounts payable balance. Financial records were not available for Patagonia, The North Face’s top competitor. Columbia Sportswear, The North Face’s second largest competitor, financial ratios were looked at instead. Columbia Sportswear as a company is also financially healthy. This is determined through the financial ratios provided by the annual report of COLM for the year 2012. Specifically we focused on the profitability ratios and its subtopics to determine the health of the company. Their financial ratio for the profit margin is 46%, ratio for return on assets is 7. 5, capital structure -5%, return on investment is 9. 6%, accounts payable is $148,700,000, and their current ratio is 3. 9% (Columbia Sportswear Company COLM, 2012). The North Face exceeds Columbia in all four categories. The North Face’s profit margin is 47. 9% compared to Columbia’s 46%. In return of assets, The North Face comes out on top with 9. 50% opposed to Columbia’s 7. 5%. The North Face’s capital spending is at 24. 0%, way above Columbia’s -0. 05%. In the fourth and final category, return on investment, The North Face closes it out with a 14% to Columbia’s 9. 60%. These ratios are so different because The North Face is more successful and sells more inventory than Columbia. They also get a much larger market draw. The North Faces product and clothing line is helping the company meet its objectives. This is because they are very successful and have nearly a 50% profit margin. In conclusion, The North Face, part of the Vanity Fair Corporation, was founded in 1966 later opening its first retail store in 1968. The company, located in San Leandro, California, brings the most technically advanced products in the market to accomplished mountaineers, climbers, skiers and explorers. The majority of the company’s products are sold in premium sporting goods retailers, and specialty backpacking, mountaineering, and skiing retailers. The North Face provides gear for professional and amateur athletes and enthusiasts using high-quality, technical outerwear. Their slogan â€Å"Never Stop Exploring,† has become popular amongst all athletes and outdoor enthusiasts. This outdoor apparel powerhouse has a very large and loyal fan base, and the demand for outdoor apparel is on the rise. As stated earlier, in North America, performance outdoor apparel has grown 19% from 2004 to 2010. This trend is supposed to continue for at least another five years. As The North Face has been creating products with great quality and endurance, they plan to focus toward a greener supply chain and operations. Partnering with the blue sign sustainability standard for textile production, will help separate The North Face from their main market competitors Columbia Sportswear, and Patagonia. By looking at financial records, The North Face surpasses its second largest competitor, Columbia Sportswear, proving that it is the best in the industry. The North Face is named after the coldest most unforgiving side of a mountain, and has helped explorers reach unbelievable heights in the Himalayas. This remarkably powerful corporation is going to continue to design and provide the best for all outdoor enthusiasts, remaining on top for years to come.