Wednesday, July 31, 2019

Strategic Analysis

Introduction to Business Submitted to: Miss. Rabia Hassan Assignment # 1 Section: K Topic: Strategic Alliance Tata and Starbucks Group Members: * Khubaib Yaqub * Rana Zeeshan * Momna Ahmad * Iqra Pervaiz * Aimen Naqvi * Iqra Tariq * Huma Akram TATA Coffee and STARBUCKS Indian Coffee Industry: India is the fifth largest producer of coffee in the world, producing more than four percent of the world’s coffee, with the bulk production in southern states. In India the average coffee consumption per day is estimated to be ten cups per day. Only India produces its coffee in indoor facility.Indian coffee has a unique historic flavor and aroma. Tata Coffee: Tata produces coffee on its private land. They process the beans and export green coffee. Tata also manufacture and exports Instant coffee. Starbucks: Starbucks is an International chain of coffee and coffeehouse based in Seattle and Washington. Starbucks prefers quality over price and is specialized in coffee and related beverages. Starbucks does the business of coffee, Italian-style espresso beverages, cold blended beverages, high quality teas and coffee related equipment and accessories. About the Deal:Starbucks is joining hands with Tata to set up stores in Tata group’s retail outlets and hotels other then sourcing and roasting beans at Tata Coffees Kodagu facility with its particular process. The deal includes opening cafes, roasting and sourcing beans. Both Tata and Starbucks will have to solve the franchisee-led business model of Starbucks. Both companies have agreed to set up a 50:50% joint venture of growing hot beverages in India Market with a name called â€Å"Tata Starbucks Ltd†. Starbucks will be operated and owned across India through this venture. Their brand name will be named as Starbucks Coffee â€Å"A Tata Alliance†.Tata and Starbucks have agreed to open 50 cafes in several cities of India in 2012 starting with Delhi and Mumbai. Youth of India has increased the use of we stern Coffee Cafes. In India competitors of Starbucks includes Barista, Cafe coffee Day and Costa Coffee. Together Tata and Starbucks will control a market of Coffee Cafes which is estimated at over Rs. 700 crore a year. The agreement of separate roasting and sourcing between Tata Coffee Ltd and Starbucks Coffee Company Ltd in future will roast coffee to supply to Tata Starbucks and will export to Starbucks Coffee Company for its overseas operations.India produces Coffee over Rs. 3, 000 crore a year. Objectives of Tata Coffee behind this Deal: * Opportunity for TATA coffee to provide roasted coffee beans to Starbucks in India. * Get a chance to jointly invest in facility for export to other market. * Starbucks will provide new technology to the promotion of responsible agronomy practices. * A long term relationship will be formed with this MOU signed with Starbucks. * Tata coffee becomes Asia’s biggest publicly traded coffee grower. Vision: * Tata coffee will become the prefe rred choice in elite market. Customer satisfaction, centricity, quality, sustainability, and an engaged workforce will be our drivers to achieve Rs. 1, 000 crore enterprise by 2015. * In Future Tata coffee shall be perceived as one of the most respected organizations in the plantation and extraction business. Mission: * To simantinaously improve value to stakeholders through our operations while ensuring and improving the ecological wealth entrusted to us. * Enhance quality of life of the people. * Be an exemplary corporate citizen havingTata values with total commitment to the communities in which we operate. | Values: * Integrity * Understanding * Excellence * Unity * Responsibility * Safe working Environment| | | | | Objectives of Starbucks Behind this deal: * Through this MOU Starbucks will be able to India’s market. * India can be a useful source of coffee in domestic market for Starbucks. * Starbucks will have the opportunity to get the knowhow of India market through T ata Global Beverages. * There will be synergy because Tata also has a business I retail market. Mission Statement:To establish Starbucks as the premier producer and provider of the finest coffee in the world while maintaining our uncompromising principles as we grow. Environmental Mission Statement: * To understand and share environmental problems. * Inventing a flexible solution to bring a change. * Revolutionise to buy and sell products which are environment friendly. * Recognizing that fiscal responsibility is essential to our environmental future. * Instilling environmental responsibility as a corporate value. Guiding Principles: * To be assertive and provide a good working environment. An essential way of our business is to discourage discrimination. * Apply the highest standards of excellence to the purchasing, roasting, and fresh delivery of our coffee. * Making the customers enthusiastically satisfied. * Positive contribution towards communities and our environment. * To und erstand that profitability is essential to our future success. Advantages: * Tata and Starbucks both are the companies are leading in their sector respectively. * It is going to be a social project in India. * High quality green coffee beans are going to be produced. Considered jointly investing in additional facilities for exports to other markets. * Sources will be utilized by both in encouraging core competency. * The consumption of coffee is expected to grow at 6% annually. * Other companies can also approach Tata coffee for their raw product. * With the help of this deal Tata coffee will enhance to the branded coffee retail market. Competitive Advantage of Tata Coffee: Tata has maintained a strict consistency in quality whereas Tata is the world’s largest indoor coffee plantation company producing heavy quantity of special, strain specific and premium coffee.Tata’s coffee has a major consumption in Arabic-centric markets. Competitive advantage of Starbucks: Starbu cks has the largest number of coffee houses in the world having a very strong brand image. They have loyal customers all around the world. Disadvantages: * The selling price of Starbucks is not cheap. * The entry of Starbucks has on the out-of-home coffee consumption market and this will effect alliance of Tata coffee with Barista. * There is no exclusivity for each other from both sides. * The demand I India is highly elastic so Starbucks will have to address its pricing issues. There are several competitions in the segment of Starbucks. * Coffee price continue to rule at historical laws and this definitely has an effect on the bottom line of Tata coffee. Conclusion: * This deal will be beneficial for both Tata and Starbucks as it is opening new phases for both. * Starbucks will be able to enter India’s market after having the MOU signed. * Tata will have the opportunity to enter into retail outlet business by joining hands with Starbucks. * A Revolution will take place in I ndia’s coffee retail outlet business.

Tuesday, July 30, 2019

Women Organizers in the Civil Rights Movement

Women organizers in the Civil Rights movement (1950's-1960's) Women have always been regarded as key parental figure in raising and developing children in the society. During the period of 1950 to 1970, many parts of the world were marred with civil rights movement. The movements were characterized with protests and civil resistance complaining about discrimination economic and political self sufficiency. Women took up the initiative to participate in these movements. This situation later led to serious confrontation between government authorities and activists.Thousands of people took part in the civil right movement of that period especially in the United States. The key leaders of the campaign, include; Martin Luther King, Malcolm X, Stokely Carmichael, Rosa Parks, James Meredith and Medgar Evers, played crucial roles for of the achievements of the Civil Rights Movement in America[1]. This paper covers factors that motivated women, the contributions they had, roles they played as well as the problems they encountered during the civil rights movement of 1950’s and 1960’s.Most of the women who were involved in these movements were born during the slavery period, hence the pain and suffering they experienced at that time stimulated them to speak out against oppression. One of the most vocal women who started to speak against oppression was Wells Barnett. She began her struggle in 1909, by travelling abroad to seek international attention on this issue[2]. She also formed National association for the advanced of Colored people. Her efforts were later joined by the struggle for gender sensitization by Mary Church Terrell. She was very vocal and spoke about segregation of the blacks in public eating joints.She led most of the citizens to boycotts and picketing to attract attention to racial injustice[3]. She established the black club movement that led to the formation of National Association of Colored Women similar to that of Barnett. She was also very instrumental in bringing up socially progressive institutions such as mother clubs and nursery schools. The three year struggles with authorities bow her fruits when the Supreme Court ruled that segregation of public eating places was unconstitutional[4]. Another very instrumental lady in these movements was Mary McLeod.She often worked together with both Terrell and Barnett. Mary became the president of National Association of Colored Women[5]. Being at the supreme of the organization, she became a good friend of Sara Roosevelt the mother of Franklin Roosevelt mayor of New York. She used the good rapport she had with this politically influential family to continue her struggle for social justice of the black[6]. She was later appointed to be the head of National Youth Council by President Roosevelt. Eleanor Roosevelt took the same path after being inspired by Terrell and Mary McLeod.After her husband was elected as the 32nd president Eleanor became instrumental in fighting inj ustice by calling for international and national attention to the effects of oppression and racial discrimination. She took a bold step and resigned from the Daughter of American Revolution since they had differed in ideologies. Ella baker was another activist who dedicated her time to speak out against oppression. She was regarded as the leader behind the scenes. She struggled to study due to the fact that her family was not well of. She graduated and became a teacher.She relocated to New York and quit her profession to engage in social change. She got involved with NAACP in the grassroots level in recruiting more people to the organization. She also was instrumental in the formation of other small organizations such as Student Nonviolent Coordinating Committee and the Mississippi Freedom Democratic Party. These movements later were used by Martin Luther King Jr. to organize his boycott and nonviolent movement. The wave of women participation in the civil movement was unstoppable. Rosa Park, who was famously regarded as the mother of the civil rights movement, was also contributed in this struggle.She is believed to have started the main struggle of these civil rights movement. She experienced difficulty in completing her education due to the strict regulations for the black children. The black children were meant to study for only five moths in a year and the rest of the year they spent time in the cotton fields as laborers. Rosa graduated from high school after she got married to Raymond parks[7]. This sparked her efforts to fight racial injustice. She joined National Association for the Advancement of Colored People Montgomery chapter as the only woman. She was very instrumental member of this organization and was elected secretary.Her active involvement in National Association of Advanced Colored People led to her arrest on 1955[8]. Rosa’s life as an African American continued to face challenges. The mistreatment she received from the whites while she was in a bus made her to launch a huge boycott of using Montgomery buses by the Afro-Americans. She decided to organize this boycott after she got arrested for refusing to give out her seat to a white passenger in the bus. The boycott lasted for 381 days prompting her to be absorbed by the Montgomery Improvement Association which was formed by Martin Luther King Jr[9].This act of boycott was followed by a series of escalating protest, movements and insurgencies by African Americans. During the time for boycott Rosa coordinated for the blacks to get rides from car pool ups and other whites who offered to help. The used the slogan ‘don’t use the bus today. Don’t use it for freedom. ’ The boycotters together with Mrs. Rosa Park took the case to court disputing the segregation in buses[10]. They later worn the case after the court ruled on their favor. After the successful boycott Rosa and her families were not secure in Montgomery. They relocated to Detro it where she worked for congressman John Conyers.She continued to raise her voice and incited the youth to take up the struggle for African American Social and American progress. After the women political council had initiated the boycott in Montgomery, Martin Luther king came to the limelight taking all the credit as the leader for the nonviolent resistance. Martin Luther King Jr. and Malcolm X traversed different sections of the country giving powerful speeches and mobilizing nonviolent movements. Sparks of none violent movements were seen in other parts of the country[11]. These nonviolent movements escalated to violent racial rebellion in major cities in the U. S. s the movement went militant it provoked the whites against pro-black policies and the police. The success of events of this decade was at the peak when the Supreme Court decides the case of brown v board of education ruling in favor of brown. The court declared that segregation of schools unconstitutional. In the 1960 ’s many women rights group were established to continue the fight against racial injustice and oppression. This was the decade that saw progressive women rights movement in the United States and world Wide. Most of these groups comprised of female students who advocated for equal employment opportunity for both men and women.They also lobbied for enforcement of equal rights laws. Later that decade national organization for women was formed to replace women commission and it continued with the fight against sexual discrimination. The commission was disbanded due to lack of funds. The women equity action league founded in 1968, sought to investigate inequalities in faculty pay and promotions of both men and women in education workforce. These remarkable women played an important role in inspiring other activists and grassroots leaders who in turn mobilized more and more people to join the struggle.These women also helped millions of women to gain their fundamental rights as wom en. They were mostly motivated by the mass followers they had. Motivation also came from the cases they had in courts which ended up favoring the blacks and declaring most of the segregation unconstitutional. They drew their inspiration from civil rights movement they had organized. The organizations they were involved with had a lot of confidence in them hence they elected these women to high posts which favored their situation and gave them an upper hand in organizing the struggle[12].To overcome the problems they encountered they formed organizations such as national Organization for women. National Organization of Women key mandate was to enlighten the women to fully participate in mainstreaming of American society. These organizations brought them together in unity and increased their awareness on critical issues that affect them. This enabled them to have a strong voice over the oppression and neglect they were facing and forced the federal government to enforce the law. The i deologies fomented by certain black power movement were destructive and fostered cultural conflict.This posed a challenge to the efforts of the women who organized movements before. The other major challenge that affected these courageous women is the fact that most of the influential leaders, who had followed suit to lead mass movement, ended up being arrested or assassinated[13]. A good example is the cases of Malcolm x and Martin Luther King. The women’s morale was undermined by these acts. The supremacy of the white also undermined their efforts in the sense that they seemed to bend the law on their favor and oppressed the blacks in all sectors.The civil war escalated by the Ku Klux Klan and the lynch mob in the south were meant to threaten the activists from pursuing further with their quest[14]. The vocal contribution of Martin Luther King Jr. was faced with bomb attacks to his church and residence. The mass movements in America were a vital process to transform America to its current state. The vibrant voices of these women led to signing of the civil rights act to law. The law protects all minorities and women from discrimination in voting employment and use of public areas. They were also rendered freedom of choice.This was viewed as victory for both blacks and women. The revival of the African American militancy was an exceptional progress to the realization of democratic ideals[15]. The shared commitment to take the risk and highlight injustice and press the course for change resulted to the change in attitude of many American citizens. They tore down the oppressive racial and segregation system that had dominated the country for a long time thus bringing a remarkable transformation of American life. Bibliography Bermanzohn, Sally Avery. â€Å"Violence, Nonviolence, and the Civil Rights Movement. New Political Science 22, no. 1 (March 2000): 31-48. Academic Search Complete, EBSCOhost (accessed April 15, 2011). Gates, Henry Louis Jr. Bearing witness: selections from African-American autobiography in the twentieth century. New York: Pantheon Books, (1991). Greenblatt, Alan. â€Å"Race in America. † CQ Researcher 13, no. 25 (July 11, 2003): 593-624. http://library. cqpress. com/cqresearcher/cqresrre2003071100. Hine, Darlene Clark. Hine sight: black women and the re-construction of of American history. Bloomington: Indiana University, (1994). Jost, Kenneth. â€Å"School Desegregation. † CQ Researcher 14, no. 5 (April 23, 2004): 345-72. http://library. cqpress. com/cqresearcher/cqresrre2004042300. Naylor Gloria. Critical Perspectives Past and Present. New York: Amistad, (1993). ———————– [1] Greenblatt, Alan. â€Å"Race in America. † CQ Researcher 13, no. 25 (July 11, 2003): 593-624. http://library. cqpress. com/cqresearcher/cqresrre2003071100. [2] Darlene, Hine Clark. Hine sight: black women and the re-construction of of American history. Bloomingt on: Indiana University, (1994). [3] Naylor Gloria. Critical Perspectives Past and Present. New York: Amistad, (1993). [4] Henry Louis, Gates Jr.Bearing witness: selections from African-American autobiography in the twentieth century. New York: Pantheon Books, (1991). [5] Darlene, Hine Clark. Hine sight: black women and the re-construction of of American history. Bloomington: Indiana University, (1994). [6] Sally Bermanzohn, Avery. â€Å"Violence, Nonviolence, and the Civil Rights Movement. † New Political Science 22, no. 1 (March 2000): 31-48. Academic Search Complete, EBSCOhost (accessed April 15, 2011). [7] Greenblatt, Alan. â€Å"Race in America. † CQ Researcher 13, no. 25 (July 11, 2003): 593-624. http://library. cqpress. com/cqresearcher/cqresrre2003071100. 8] Bermanzohn, Sally Avery. â€Å"Violence, Nonviolence, and the Civil Rights Movement. † New Political Science 22, no. 1 (March 2000): 31-48. Academic Search Complete, EBSCOhost (accessed April 15, 2011 ). [9] Gates, Henry Louis Jr. Bearing witness: selections from African-American autobiography in the twentieth century. New York: Pantheon Books, (1991). [10] Hine, Darlene Clark. Hine sight: black women and the re-construction of of American history. Bloomington: Indiana University, (1994). [11] Jost, Kenneth. â€Å"School Desegregation. † CQ Researcher 14, no. 15 (April 23, 2004): 345-72. ttp://library. cqpress. com/cqresearcher/cqresrre2004042300. [12] Jost, Kenneth. â€Å"School Desegregation. † CQ Researcher 14, no. 15 (April 23, 2004): 345-72. http://library. cqpress. com/cqresearcher/cqresrre2004042300. [13] Hine, Darlene Clark. Hine sight: black women and the re-construction of of American history. Bloomington: Indiana University, (1994). [14] Greenblatt, Alan. â€Å"Race in America. † CQ Researcher 13, no. 25 (July 11, 2003): 593-624. http://library. cqpress. com/cqresearcher/cqresrre2003071100. [15] Gloria Naylor. Critical Perspectives Past and Present . New York: Amistad, (1993).

Traffic jam Essay

Men have stepped on the moon. Now they are going from one place to another within few hours. World fastest car is able to sprint 252mph, but the citizens of Dhaka (sometimes) cannot reach few miles to Gulistan from Mohakhali or any other place to our destination place within hours. You must go out from your house before two or three hours to reach destination which is only 20 or 30 minutes required. Who is responsible for this? Traffic jam is that magician. Traffic jam has become a great monster in our modern life. Traffic congestion is not only affecting our business but the education sector as well. Students cannot do other tasks such as photocopying or collecting notes before attending class in the morning because a lot of time gets wasted on traffic congestions. It wastes lot of working hours of students as well as teachers. In many occasions, students and teachers fail to attend classes in due time. And it is more painful when students fail to reach exam halls and fails just due to a social problem. Now just think everyday how much national time is wasting, how much economical activities are losing, for the traffic congestion problem. This assignment is focusing current situation of traffic congestion problem in Dhaka city. What is Traffic jam? A traffic jam is a long line of vehicles that cannot move forward because there is too much traffic, or because the road is blocked by something. Over the last few years the traffic congestion problem of Dhaka City has visibly been deteriorating steadily. Limited resources, invested for the development of transport facilities, such as infrastructure and vehicles, coupled with the rapid rise in transport demand, existence of old transport and also huge number of non-motorized vehicles on roads, lack of application of adequate and proper traffic management schemes are producing severe transport problems in almost all the traffic route in Dhaka. Citizens constantly complain about the intolerable problems of traffic jam. Background Bangladesh is a populous country & Dhaka, as the capital of Bangladesh, has to accommodate a large share of this population. There are 18 Special Planning Zones (SPZ) in the Dhaka Metropolitan Area, where population has already crossed 11 million. Every year population is increase at the rate of  7 percent in Dhaka. Dhaka Metropolitan Area is expected to become one of the largest cities within the early next century. Everyday lots of people move to Dhaka for the purpose of earning money. Day by day the number is increasing and most part of Dhaka is badly affected by the population growth. Traffic jam has turned daily trips into nightmares to the people of Dhaka. The business community inevitably suffers for the constant waste of its most precious resource of time. Other commuters of being stuck in traffic jam for hours an end, while residents breathe in a lot more lead and almost 10 percent of its population seeks medical treatment each year for air pollution (Faulty vehicles, old vehicles, especially diesel run vehicles, and dust from roads contribute to air pollution) related respiratory illness. The number of automobiles has been increasing in Dhaka city at the rate of at least 10 percent annually, which has been contributing to air pollution on the one hand and traffic congestion on the other. At rush hour, a distance of three to four kilometers can take about an hour to reach. Destinations like Gulisthan, Motijheel, Old Dhaka, Maghbazar, Malibagh, Gulshan, and Dhanmondi are nightmares for commuters from any point in the city. Especially frustrating are the points Hotel Sonargaon crossing, the road in front of the Prime Minister’s office, Maghbazar, Mouchak, Malibagh, Khilghaon, Rampura, Elephant Road, Science Laboratory, Green Road, Jatrabari, Sayedabad, Mohakhali and old parts of the city mainly at Dholaikhal, Postagola, Bangshal, and Chowkbazar. People miss important appointments; are late for work, children and old people fall sick, not to mention the painful site that most of us choose to ignore – a blaring ambulance stuck in the middle of a traffic jam t rying desperately to find a way. The heat released from the engines, especially the private cars that use air conditioners, increase the overall temperature of the city. Continued exposure to pollution from the streets during traffic jams, will have grave consequences in the future health of these people. The economy, meanwhile, is losing out in millions because of traffic jams. Government officials’ estimate a loss of around tk15000 crore annually because of traffic jams. Transport System of Dhaka The transportation system of Dhaka is predominantly road based where non-motorized transport mainly rickshaw has a substantial share. Dhaka  Metropolitan has heterogeneous traffic flows. Rickshaws are the dominating mode of public transport. Trips made by public transport especially buses are very low. A substantial part of total traffic is non-motorized vehicles which enhance serve congestion especially in road intersections. The contribution of Bangladesh Railways (BR) to urban public transport is very small. We listen about big plans of elevated express ways, underground metro rails etc., but in reality it is hard to believe that these plans can ever be materialized by this poor nation having massive corruption in all sectors, from judiciary to education. The 20 year Strategic Transport Plan (STP) includes 17400 square km of water and surface ways in Dhaka and neighboring Narayanganj, Narshingdi, Munshiganj, Gazipur and Manikganj districts. Metro train services, elevated motorwa ys, Bus Rapid Transit (BRT), construction of roads connecting the east of the capital to the west, flyovers, footbridges, new roads, and repair of damaged thoroughfares are the main features of the plan. Under the plan, the government will construct and reconstruct 330 km of roads and highways including 50 new roads, flyovers, elevated expressways, metro (underground railway), circular waterways, bus rapid transit, rapid mass transit, bus-route rationalization, traffic system development and safe environment. The Major factor behind traffic Jam There are many reasons behind traffic jam in Bangladesh. Among them some major factors are as follows: 1. Around 60 percent of the city roads are encroached by hawkers, and dumping of construction materials. 30 types of motorized and non-motorized vehicles are plying on the same street, causing haphazard traffic jams. 2. Undisciplined traffic signal in the road and also faulty traffic signaling systems. Traffic police have to maintain the signaling system. Sometimes they maintain the signal manually, which may create more congestion problem. 3. Unplanned growth of Dhaka, Dhaka centric development of the country, the lack of east-west connecting roads, unplanned construction inside the city, and increased number of private transports has the contributory factors to traffic congestion. 4. Indiscipline attitude among the road user, driver don’t comply with traffic rules. 5. No knowledge about traffic rules which encourage people to violating the rules. 6. Outside the mall and right beside the road,  occupation of tea-stalls and shops make difficult for pedestrians to use the pathway. 7. Enforcement of rules by dishonest persons (traffic police) who are busy in collection of illegal money from traffic rules violators. 8. Dhaka City has very inadequate road networks. For a standard city, where the minimum road requirement is 25% to 30%, Dhaka has only 7.5% road of its total area. 9. Illegal parking is another reason for traffic jam. Cars, trucks and other vehicles are parked almost everywhere. 10. Some traffic police officers are busy for extracting money for the illegal parking and violation of signal by stopping the vehicle in the middle of the road. 11. Inadequate manpower and narrow road spaces and overtaking tendency of drivers create pro-longed traffic congestions and intensify sufferings of commuters keeping people motionless as well as creating suffocating condition in the streets 12. There are bus terminals not authorized by the traffic department and the bus drivers do not go by traffic rules. Also buses stop randomly to pick up and drop passengers. 13. Each day around 80 trains enter and exit the city, which causes six hours halt of traffic in total through each level crossing. Such types of level crossing create intolerable congestion at Magbazar, Mohakhali, Staff road, Karwan Bazar and other places. 14. VIP protocol maintaining is another reason for frequent traffic jams in the streets 15. Divider problem in the city’s different important roads also causes congestion. 16. On the same road the uncoordinated road digging by Dhaka City Corporation (DCC), Dhaka Electric Supply Authority (DESA), Water and Sewerage Authority (WASA), Bangladesh Telegraph and Telephone Board (BTTB), Titas Gas and other utility service providers without any integration together make reasons for further road congestion. 17. In any roundabout in Dhaka the plying CNG, rickshaw, bus, etc form multiple lines. They do this to grab a tiny space out of sheer desperation. 18. Most of time, we see that during jam traffic police just let one side go for like 5 minutes or more which increase the jam more. They should manage it more professionally. 19. With mass transport not allowed through BUET and DU it creates excessive pressure on the adjoining roads. 20. Illegal occupation of roads by small traders and vendors is one of the causes of traffic jam in the town. No one is aware about it. Bus drivers are mostly responsible for traffic jam. They even don’t care about the traffic rules and signals, which may create the congestion. 21. Now a days the  number of buses increases day by day. And the local buses are run very faster. They don’t maintain the rules of the street. They just drive and occurring heavy traffic jam. 22. The numbers of old transportation are still in Dhaka city. Those are illegal. They don’t have their fitness. But they are still running in the Dhaka city. 23. More than seven hundred thousand rickshaws ply the city road, but only seventy five thousand have legal number. This huge number of rickshaws is creating traffic congestion. From time to time attempts are made to reduce the number, but the initiative usually produces no results. 24. Most foot-over bridges and underpasses remain unutilized by the pedestrians reasoning dark and dodgy atmosphere inside as billboards block view from outside. Unhygienic passageways, steep stairs and pathway encroached by hawkers make it difficult to move on the bridge and that’s why they don’t want to use the foot-over bridge. 25. Many compressed natural gas (CNG) refueling stations and petrol pumps are located near to the intersections that disturb or block the streets when large queues of vehicles break into the road. Although there is rule to set up refueling stations having vacant spaces to accommodate thirty vehicles to wait inside the compound, it has been overlooked. 26. A lot of the plush shopping malls in the city have resulting illegal road occupation by vehicles. Between Panthapath and Sonargaon intersection the traffic jam at anytime of the day is horrible because of the city’s biggest shopping mall constructed in the area. 27. Some people don’t want to use the parking space, too many people are habituated and love to park them on the street so that can resulting traffic congestion. 28. The fines for traffic violations are too meager to raise fear to the violators. The following remedial measures can be adopted for eliminating the traffic congestion problem in Dhaka city. Here three types of remedial is discussed – Short term suggestions 1. All offices should start at 7.30 AM and all education institutes should start at 8 AM, Banking should start at 9 AM and all can be end within just 2.30 PM, 4.30 PM & 4 PM. 2. Water transport should be established like other developed countries surrounding Dhaka city. By that WASA don’t need to block the street. 3. Population control must be implementing as very strictly like china, if we cannot control over the population then we cannot  give the place to our next generation. From now, from today we should not take more than one child. 4. Pedestrian facilities should be increase. Cycle path should be provide 5. Political interface must be avoid 6. There should be a whole â€Å"park† to educate on traffic system for the residents and children especially since one of the main reasons for road accidents and drivers not following rules is because of the abundance of fake licenses 7. Through lane system different sort of vehicle will run in different lane. If any driver breaks the rule he has to face some legal consequences like jail and financial penalty. 8. The government has divided Dhaka into seven zones with shops and businesses in each to observe a different weekly holiday, which may resolve some pressure of traffic. 9. People are habituated and thus love using the shortest way by crossing over the street. Now, that it poses risk for the vehicles and create unnecessary traffic block let apart risking the pedestrians’ lives, are not their concern. Create awareness to the people to use the foot over bridge, and zebra crossing to passing the road. Also make the passageway clear and hygienic to motivate people to use the foot-over bridge and underpasses. 10. Rickshaw and other non-motorized vehicle strictly banned from the street. 11. The rules for CNG refueling station have to be strictly maintained. Those are overlooked the rule are not able to do business. Midterm suggestion 1. CNG conversion for all types of personal cars (Private cars, light motor vehicles etc.) will need to be forbidden. This is to reduce traffic congestion on the streets of Dhaka city. In Bangladesh the price of CNG is comparatively cheap as a consequence many private vehicles were in the streets. In the year 2009 the number of registered vehicles was 5lac and 27,000 among these 2lac are private vehicles. 2. To reduce air pollution and traffic congestion in Dhaka city, the use of private motor vehicles must be abridged. 3. The number of rickshaw pullers is vast. Almost there are no roads or street or lane for them. So, DMP need to make an extra lane for keep the road free from traffic jam. 4. Installing of CCTV sets to monitor traffic movement. 5. Free the footpaths from illegal occupation of hawkers and bus counters. 6. Private vehicles with less than four or five passengers would not be allowed to ply the city streets. 7. From now the capital city of Dhaka should be blocked or fixed for limited persons as who can maintain living status of education, rules-regulations, civic sense, morality, regular tax payer and good service contributor etc. 8. The highway bus, truck enter and travel the city between 11pm to 6am. Other than it is banned to travel in city highway. 9. BRTC have to create lots of bus stoppage in the street but in a planned way, basically those place where so crowded. Without those stoppage any bus are not allow to stop. And also stoppage should be outside from the street, otherwise buses occupying road spaces which may block the traffic flow. 10. Traffic management system has to be stronger enough. Every driver should have to follow the traffic system. DMP have to create some steps by those citizens and drivers are able to make some knowledge about the traffic system. If the people are well known about the signal system than it will stop them to violating the traffic system. 11. In front of every shopping mall an extra road need to construct as a stoppage. Long term suggestion 1. Government can shift all wholesale markets, government administrative offices, Dhaka central jail, all industries, tanneries, to outside of Dhaka city. Industrializations should be based on upozilla; it should not depend on metropolitan cities. Then rural areas will grow up step by step. 2. Every school has to own the transport for the student – especially at the primary level. There are around 400 private & government schools in the capital. BRTC has already launched bus service for school going students to ease off traffic jam in the capital. 3. All import-export connected offices should go to near port areas of Chittagong or Mongla, or in on the way to any port where they can send the goods easily for shipment. There is no need that those offices are to be Dhaka based. 4. DHAKA city’s public transport service may have improved somewhat over the past year with the introduction of new Bangladesh Road Transport Corporation (BRTC) buses on major routes but it is not yet to be good enough to be of ‘capital quality’. 5. All main roads should be one way. All type car parking must band in all roads. 6. Stopping of buses in middle of roads should be band except bus stops. All  type stands of buses trucks, taxies, CNGs etc should band in the roads. 7. Flyovers are constructed at important intersections to reduce traffic congestion. Expressways should be introduced for passengers to cover long distances over busy routes, like from Gabtoli to Motijheel, Gulistan to Airport directly without any stoppage. 8. The city’s lone dependency on surface transportation system should be diversified to monorail, metro rail, and elevated expressways. Like other developed countries in the world we also have to build the underway monorail, which minimize the traffic congestion. 9. There are lots of vehicles are travel in Dhaka but the parking place is very few. So, to minimize the traffic congestion government have to Increase Street parking facilities. 10. In Dhaka there are lots of school, college, and university, some of which were construct in front of main street, some of which were residential area and also some were in commercial area. Those have to build in some specific area, not to build in the residential or commercial area or in front of the street. Conclusion While very little can be done to change the larger picture now, there are a number of smaller factors which aggravate the traffic situation in the city. Mega city Dhaka would get better result through traffic management, physical restriction on car use, parking control, bus priority and provision for cyclists and pedestrians. While relocating some of these establishments may not be feasible any longer, especially since the university campuses have become an integral part of city life, which the authorities in these institutions could allow a better flow of traffic during extreme traffic scenarios and the government should develop alternate roads and flyover along these places to smoothen the flow of traffic. Road building is a supply side measure taken on the basis of time saving but added that over the last decade, there has been a change of emphasis because of the notion that supply generates its own demand. The BRTA have to stop registration of small cars for a certain time and increase gas price have been shelved on the ground of socio-economic and political impact. Most of the cases, if any decision taken has gone against a certain quarter was either withdrawn or halted in the middle of implementation. The BRTA is yet to be strict on issuing new driving license and those of drivers driving with illegal vehicles. It has not done any improvement in its training module for both  new and semi skilled old drivers keeping mind of the time. But the drivers are the forces responsible for killing more than 3000 people every year and deteriorating the traffic jam situation occupying the maximum road capacity. The minister admitted the government’s failure in controlling the traffic situation in Dhaka. My point is failure or success comes after taking an action. But the government did not take any action at all to solve the problem.

Monday, July 29, 2019

International Accounting Essay Example | Topics and Well Written Essays - 1500 words - 1

International Accounting - Essay Example As the first step, the fourth and seventh company law directives obliged the companies and group of companies to prepare accounts on a harmonised basis (Accounting Harmonisation). The main aim of the IASB/IASC was to overcome the international trade barriers arising out of different national laws. As Akyuz, Bulca, and Mustafa (n.d.) opine, the IASB/IASC thought that accounting harmonisation process would bring coordination in accounting procedures across the Europe and subsequently it would lead to the establishment of a single market. In order to harmonise the international accounting practices as a whole, the IASB/IASC firstly gave emphasis on the community law harmonisation. It is essential to note that a harmonisation programme at community had not been experimented until IASB/IASC did it. Forex News (2010) reflects that the accounting harmonisation process had been mainly practiced through policies which might drive member states to achieve the proposed objectives. Similarly, th e multinational companies were facing troublesome challenges to prepare coordinated financial statements at the end of the year since they might have branches across the globe and each branch would have distinct accounting practices in accordance with respective nation’s law. ... As a result of these differences in opening and closing of financial periods, IASB/IASC faced cumbersome difficulties in launching the proposed harmonization process simultaneously across the Europe. Heterogenic accounting philosophies prevailed in different countries were some other barriers which the IASB/IASC had to deal with. In the opinion of Fritz and Lammle (2003) some specific environmental factors play crucial role in moulding the accounting practices of each country and these factors vary from country to country. In most parts of Europe, professional accounting organisations did not have the authority to fix accounting standards; it was completely left to the choice of governmental authorities. Likewise, the vague interpretations and ineffective supervision of IAS/IFRS caused further problems toward the harmonisation process. They could not ensure the convergence of various interpretations of standards. It can be seen that height of IASB’s aims also adversely affecte d the effectiveness of IASC/IASB. It targeted the formulation of a single global market with common accounting practices in its premature stage and it seems to be highly challenging. Similarly, acceptance of IAS/IFRS at SEC was a major challenge to IASC/IASB. Moreover, national standard-setter, governments, and companies tried to influence the operations of IASB in order to defend their own interests. Support from IOSCO and IFAC International Organisation of Securities Commission (IOSCO) is the security regulators’ organisation that represents more than 80 countries and it works for enhancing cross border capital accumulation. Similarly, International Federation of Accountants (IFAC) aims at initiating of a world-wide

Sunday, July 28, 2019

DRVVT test Lab Report Example | Topics and Well Written Essays - 500 words

DRVVT test - Lab Report Example This means that there is the presence of common pathway clotting factors in at least 30% activity. Failure to detect APS could be as a result of mishandling of patient samples. In this case, there could be an introduction of protein contaminants of the same nature thus make it difficult to distinguish APS proteins from the other protein contaminants. Anionic phospholipids serve as strong cofactors required for the gathering of 3 different coagulation complexes when they get exposed on the apical cell membrane surface. These coagulation complexes are the tissue factor-VIIa complex, the Xa-Va complex, and the IXa-VIIIa complex, which participate in blood coagulation. In this way, they are able to enhance the activity of phospholipid-dependent coagulation factors. Vitamin K is an essential contributor in the synthesis of a number of proteins that participate in blood coagulation and also anticoagulation. It is an essential cofactor for a carboxylase enzyme that catalyses the carboxylation of glutamic acid residues found on vitamin K-dependent proteins that participate coagulation. These proteins include prothrombin factors II, VII, IX and X Sources of vitamin K include leafy greens, liver, and cauliflower. Vitamin K is also largely synthesized in the large intestines by bacteria. It is important to note that vitamin K is fat-soluble in nature and that obtained from foods as well as that produce by microbes in the large intestines get absorbed into intestinal lymph together with other

Saturday, July 27, 2019

Ethical Code of Conduct Case Study Example | Topics and Well Written Essays - 1000 words

Ethical Code of Conduct - Case Study Example The case study "Ethical Code of Conduct" talks about an ethical code of conduct which exists at least in every profession. In the accounting profession, for instance, every accounting officer has to abide by the rules and ethical principles of accounting. An accountant must maintain his loyalty to the ethical provisions. Every accountant has to ensure that no one influences him to do something that would be unethical no matter the circumstances. The reason for this is that the result may be as stated earlier, criminal and ethical violations and also may be detrimental to many others who have interests in the company. In the case of Northstar Company, the accountant is faced with an ethical issue. He has to increase expenses arbitrarily for no justifiable reasons that would also affect everyone in the company. As a result of increasing expenses despite having had low-income investors capital may be at risk considering there is no guarantee that increasing expenses would justifiably in crease income. In fact, the President seems to be having no good motive for the company other than getting his incentive. Fooling the company that it made profits yet it does not mean well for the company’s future. The company may continue making losses a matter that would lead to loss of employment for other members of staff. They could lose essential factors for the investors such as markets through improper financial investments. Under these circumstances, the best thing to do is find out why there was low income during the current year.

Friday, July 26, 2019

Fundamental of International Buisness Essay Example | Topics and Well Written Essays - 1500 words

Fundamental of International Buisness - Essay Example As the discussion declares the company decided to expand globally It also wanted to get ahead of other retailers who were also heading in the same direction. In addition to greater growth, by gaining international reach, Wal-Mart has been able to demand deeper discounts from the local operations of its global suppliers thus increasing its potential to lower customer prices , gaining market share and ultimately earning greater profits. This paper stresses that Walmart is arguably as american a company as it can get.So when the decision was made to expand globally,there was plenty of skepticism to go around.Some of the major management decisions involved questions concerning where to begin , how to go about it and how to customize their products to a foreign clientele. While its retailing practices thrived in America ,there were a multitude of challenges it would have to face in other countries where infrastructure is different, government policies vary, and customer tastes and preferences are â€Å"foreign†. Not to mention the competition in the form of established retailers already having the leading edge .After its successful venture into the foreign market in the border and neighboring countries of the United States notably Canada and Mexico(where it’s the biggest private employer),it looked towards Europe for its next move. UK and Germany, countries with the biggest family incomes, became its next targets.

Thursday, July 25, 2019

Banking System in the United Kingdom Essay Example | Topics and Well Written Essays - 2500 words

Banking System in the United Kingdom - Essay Example Investments will be conducted outside the fence and will be allowed to fail without the government stepping in. This report is predicted to be one of the biggest shake-ups in banking within the United Kingdom in a generation. This commission was formed by the United Kingdom in June 2010 by Sr. John Vickers and is comprised of two main proposals. One proposes a retail ring-fence for UK banking operations and measures to upgrade the loss absorption of UK banks. The second proposes improving issues affecting UK banking markets and focuses mainly on attention to financial stability. The following information will attempt to show how over reliance on the banking industry in the United Kingdom has affected the economy in an economic downturn or recession. It also will show what effects deregulation has had on the United Kingdom economy and the banks. It will also delve into the economic downturn, the history, its effects, and what is going on now. And finally how can the United Kingdom avo id a double dip recession. ... also says that it is necessary for the state or international entities to take part because business forces and normal banking activities are not able to provide the required funding. This thought can be justified if there is evidence present that shows market failure or any deliberate government policy that contributes to this sector. This gives the impression that dangers are present regarding how banks compete. Banks compete unfairly on terms of deposit, misdirected resources in any economy, and build losses that eventually have to be supported by the public through government budgets (Latter 1997). Latter points out that as a matter of principle, it is better to give support to regions of the economy in as clear means as possible and with as little damage as possible to the forces driving the market. He further adds that this could mean subsidies might come directly from the fiscal budget or interest rate subsidies rather than less visibly through the bank itself. All banks shoul d be able to compete for business and control their own subsidies (Latter 1997). Causes of the banking crises are continually being debated. Several have been attributed to the structure of the banking system, while others have been attributed to macro/micro forces or regulatory factors. Others include harmful strategies of specific banks, operational failings, and fraud. When dealing with macro forces, triggers can includes the collapse of asset prices in real estate, a sharp upheaval in interest rates, or a sharp fall in the exchange rate. Another trigger could be a sudden slowdown in general inflation or the beginning of a recession. Banks have typically prospered in a high inflation environment. Another problem that is noted is sharp shifts in related pricing, or dropping of subsidies

Wednesday, July 24, 2019

Defintion essay on leisure time Example | Topics and Well Written Essays - 750 words

Defintion on leisure time - Essay Example Thesis statement: Do spare time or leisure time varies among countries and individuals or not. Leisure time and children: The time spent by children for leisure time activities varies depending upon factors like economic condition, culture etc. In America and Europe, children are far ahead in spending their leisure time. Compared to North Americans, East Asians are far behind in spending their leisure time. But children in European countries are above North Americans and below East Asians in leisure time usage. But when one considers elders, the senior citizens get more leisure time and engage in different types of activities. The middle aged people do not get sufficient time to engage in leisure time activities. When one considers the younger generation, they get enough time to engage in leisure time activities. The leisure time activities of children include games, sports, cultural dealings amusement and community service. In the middle-childhood, they indulge in computer usage, watching television, art activities, sports, reading, church activities, housework, shopping etc . In the journal article ‘The Benefits of Adult Piano Study as Self-Reported by Selected Adult Piano Students’ from the ERIC academic database, Peter J Jutras makes clear that: â€Å"Findings suggest that students are interested in technical improvement, but they also place high value on the enjoyment and self-growth† (Peter 1) student community shows much interest in wise usage of their leisure time. For instance, when they involve in playing piano, they does not consider it as mere enjoyment but they also consider the technical improvement and self-growth. So, one can see that children are in fond of leisure time and really enjoy the same. But the adults engage in team sports like soccer, volleyball, basket ball etc, and women spend time for

Congress Essay Example | Topics and Well Written Essays - 1250 words

Congress - Essay Example Thus, the veracity of the claim of the ‘broken branch’ and the possible solution for fixing the ‘broken branch’ are discussed in the discussion which ensues forthwith. What Organizational Changes Congress Might Make To Work More Effectively It is true that in light of the limitations prevailing upon the Congress, there are some changes that can be ratified to make the Congress more effective. One of the changes which the Congress can make to work more effectively is instituting a room for the selection of an effective party leader with juniors working under this party leader. Another way to fix the US Congress is to build a better and more dynamic electoral system. This artifice can be achieved by establishing open primaries which would end gerrymandering among politicians. This is because, gerrymandering effectively provides politicians with a leeway which they use to pull away from their own districts. There cannot be proper representation in the event tha t politicians make a dereliction on their own jurisdiction. Conversely, amendments can be made to the rules of the Congress to make Congress function more effectively. The crux of the matter herein is that experts such as Mann and Ornstein contend that the problem besetting the Congress is not really about the representatives in the Congress, but the outdated traditions, procedures and rules which govern the operations of Congress which bar legislative processes and progress. Particularly, Article 1, Section 5 of the American Constitution reads that each House has the capacity to determine the Rules of its Proceedings. In this light, in the event that an incumbent Congress finds the rules, traditions and rules of its predecessor [to be] unproductive, archaic or inhibitive, members of the Congress may move in to amend these laws (Mann and Ornstein, 48). Amendments can also be made so that the remunerations of Congressmen can be tied to their performance. While some such as Vermeer ha ve christened this move as No-Budget-No-Pay principle, there is a strong push to this effect to bar Congress from getting paid, in the event that Congress fails to make budget spending and decision in time. The need for this move is underscored by the fact that since 1952, Congress has passed budget planning and spending bills in a timely manner, only four times. Despite this state of affairs, the gravity of the matter is underscored by the dire financial and political situations which stem from the failure of the Congress to pass budget spending and planning, as was seen on October 1, 2013. In this case, the US government came to a sudden halt when the House Republicans failed to agree on their efforts to link the passage of the 2014 budgets of the federal government since they were fighting against the implementation of the healthcare reform. Consequently, 40% [800,000 workers] of the US’ public service was temporarily forced out of work, while 1 million federal American em ployees were made to work without payment (Vermeer, 220). It is also important to have the Congress [to] have all presidential nominations either conformed or rejected within 90 days, after that the Senate receives the presidential nominations. The importance of this proposal has its underpinnings in developments which have taken place in the US Congress. In 2011, more than 200 positions that had been presidentially appointed remained unfilled, following the senators’

Tuesday, July 23, 2019

Economic Impact of Legalizing Online Poker Research Paper

Economic Impact of Legalizing Online Poker - Research Paper Example For instance, efficiency gains along with improved disposable earnings have given customers additional time for relaxation and entertaining activities. Besides, altering socio-demographic traits have worked as stimulants to customer using money on poker and other gambling activities. A latest as well as broad study of the economic costs and gains of legalized poker showed that the net economic gain was equal to 4.2 billion USD during 2010, up from 2 billion USD during 2000. Government profits obtained from government-owned lotteries, casinos, and VLTs increased from less than 500 million USD during 2000 to 2.1 billion USD by 2005, and arrived at 8.7 billion USD during 2009. Between 2002 and 2007, entire gambling profits for local governments raised from 2.2 billion USD to 5.1 billion USD (Mallios, 2010). Largely, the fraction of profits obtained from other gaming activities as well raised in this phase. 1.1 Existing State of Regulation Even though a few types of interstate poker are specifically prohibited in federal law, states may permit participants inside the state’s limits to participate online. Quite a lot of current lawmaking plans - on both the state as well as federal levels - are trying to modify the nature of online poker. The economic impact of these federal plans would rely on the particular components of the suggestion eventually implemented, but the possibility is there for a national bill to obstruct the state’s capability to authorize and indict a payment on online poker actions. 1.2 Level of Gaming Industry in US The gaming business has acquired presence in US during recent years, mainly because of the escalating ethnic gaming business that created by the â€Å"passage of the Indian Gaming Regulatory Act† (Chambers, 2011). During 2010, more or less 70 tribal casinos along with 95 card rooms functional in California only provided jobs for almost 55000 and 15000 locals, respectively. With workforce of 70,000 workers, the gam bling business is similar in size to businesses like â€Å"Transit & Ground Passenger Transportation or the combination of the Mining and the Power Generation & Supply industries† (Chambers, 2011). In addition, these services raised 9 billion USD and 950 million USD in gambling profits during 2010. Actual casinos as well give taxes and fees to the government. Whereas comparatively small piece of information regarding the general net fiscal effect of these businesses is accessible, a recent study showed that United States tribal casinos raised more or less 9 billion USD for profits, of which the State got around 400 million USD from tribal poker compacts (Anderson, 2011). Some time back, the finance department reported that the state collected 200 million USD in General Fund profits from poker during year 2010-11. Besides, card clubs paid the state approximately 7 million USD for licensing fees during 2009. While it is noted that a fraction of these profits are utilized for le ssening of poker related expenses as well as regulation of the gaming business, overall, this industry gives around 400 million USD per annum in revenues to the state. 1.3 Case of Online Poker Online gambling sites offer a range of

Monday, July 22, 2019

Racial Diversity of Native Americans Essay Example for Free

Racial Diversity of Native Americans Essay Native Americans were settled in the country before anyone else. But they ended up being the most â€Å"abused† out of any race that ever settled in the country. Native Americans had to fight for land that was originally theirs and sometimes fight just to stay alive. The fight was usually the same too. If it wasn’t against settlers, it was against the government. In some areas, it’s still happening today. Now it’s just with land developers. What has been forgotten is the rich culture that Native Americans possess. There are states that have many towns whose names are originated from Native American names. But they only serve as a small reminder of who used to reside on that land, centuries ago. These people are now residing on reservations that they were forced to move to and some still reside there today. There are small tribes scattered all over the United States, but the larger ones are as such. The Apache Nation still resides in the Southern Plains, Southwest and Southeast of the United States. Cherokee are located in East Tennessee and North Carolina. Cheyenne are in the Plains, along with the Sioux. Chinook reside along the Northwest Pacific Coast. The Iroquois are located in the Northeast of the United States, while Mohawk are primarily in New York. The Navajo Nation is located in New Mexico, Arizona and Utah. Except for a few Native Americans that made it into the history books like Pocahontas (1595-1617); Geronimo (1829-1909); Squanto (1581-1622) and Cochise (1815-1874), the history of the Native American is not one to be proud of. Some of the incidents that they had to endure are: Iroquois, the â€Å"Northeast† Native Americans welcomed some of the first European immigrants in the early 1600’s. They taught the immigrants how to survive in the new world. In return their land was taken or purchased for next to nothing and in the end they were pushed out. Currently, Native Americans living in Virginia are not recognized as Native American because of Walter Ashby Plecker. He was a White Supremacist and the first registrar of the state Bureau of Vital Statistics. He believed the Native Americans had been crossbred with the African American population. So a law was passed in 1912 by the state’s. General Assembly, which stated only two races would be recognized, ‘white’ and ‘colored’. Plecker had so much power that he was able to pressure the local government into reclassifying the Virginia Native Americans as ‘colored’. All of the records of the race were then destroyed. Ironically enough, as a â€Å"Thank you† to the Native Americans, the Indian Citizen Act of 1924 was put in place. The law gave official citizenship to Native Americans across the country. It was done because of the heroic service of many Native Americans during World War I. Native Americans are one the most culture filled races in the world. From totem poles, to peace pipes to even currently dream catchers, all of these things had special meanings and purposes to the Native American people. The Europeans probably appreciated these things initially, but over time they tried to make them all disappear. The more time the Europeans spent with the Native Americans, the more they didn’t like their customs. So eventually the Europeans tried to force their culture on the Native Americans via ‘deculturalization’. Over time, the Native Americans were forbidden to speak their language, practice their religion and cultures. The Europeans even forced the English language on the Native Americans. They were punished or even jailed when they attempted to ignore these new rules that were placed upon them. Native American children were removed from their families and sent to boarding schools, so they were ‘Americanized’. These children were forced to change their hair and wear clothing that felt wrong to them. The process demoralized the Native Americans and broke their spirit. As if the practice of ‘deculturalization’ wasn’t enough, as if these people slowly losing their property to the settlers was not enough, the government took another step in constraining the Natives. President Andrew Jackson decided that the Natives weren’t being pushed out fast or far enough so on May 28, 1830, the Indian Removal Act became a law. The purpose was to make the Natives leave their land all together and move to the area of the country commissioned as ‘Indian Territory’. Initially, it was to be a peaceful, legal trade of property. Trade the property in the Southeast United States for the property in the ‘Indian Territory’. The Natives that did not comply were eventually forced out all together. The Cherokee Nation specifically moved west crossing the Mississippi River from the Southeast. This trek became known as Trail of Tears because approximately 4,000 Cherokee died from starvation, exposure, and illnesses. One of the last battles between the government and the Natives happened in 1890. Disdain towards the ‘white man’ started the sparks flying in South Dakota and it turned into a power struggle over firearms. When the bullets stopped flying, it ended up being one of the worst massacres on record. On December 29, 1890, warriors, women, and children were ferociously slaughtered by the U. S. Cavalry at Wounded Knee, South Dakota. Because the American government’s forces were so much stronger than the Natives, there was really nothing they could do to stop anything the government did. Many tried to appeal to the courts, but the cases were always lost. So the Native Americans did what they could to start over again on the reservations and made it a point to never trust the ‘white man’ again for anything. The United States government decided to resolve issues with Native Americans. One of the first things done was the Indian Reorganization Act, put into law on June 18, 1934. The purpose was to decrease the federal control of Indian affairs and increase Indian self-government and responsibilities. The act encouraged written charters and constitutions giving the Natives the power to handle their own affairs. Also funds were made available for revolving credit programs for the Native Americans for all that were interested in purchasing tribal land, for education and to assist in organizing the tribes. Many tribes and villages accepted the act and moved forward with plans to make improvements for themselves, as well as the tribe. Many improved their economic position, while others did purchase land to expand the acre size of the reservations. Improvements were also made within the health and educational services on the reservations and children were able to go to public schools. Currently there are over 500 recognized tribal governments in the United States. There are currently more than 5 million Native Americans alive today, according to the 2010 census bureau. They are self-governed and considered to be independent people. They are also one of the most resilient people in this country’s history. Even though life on the reservations is still difficult to this day, due to unemployment and high rates of alcoholism, Native Americans have a true spirit of survival. Despite how they were treated when the Europeans got settled, Native Americans always believed that the spirits would always watch over them and bring them over the mountain of despair. And it did. REFERENCES All About History (2002-2013) Native American History. Retrieved by http://www. allabouthistory. org/native-american-history. htm American Indian Heritage Foundation. (2012) Native American Culture. Retrieved by http://www. indians. org/articles/native-american-culture. html Census Bureau. (2012). The American Indian and Alaska Native Population: 2010. Retrieved by http://www.census. gov/prod/cen2010/briefs/c2010br-10. pdf Creations, N. (2013) Native History, Native Experiences- Native Voices of First Nations People. Retrieved by http://firstpeoplesvoices. com/beginning. htm Encyclopedia Britannica. (2013). Indian Reorganization Act. Retrieved by http://www. britannica. com/EBchecked/topic/285946/Indian-Reorganization-Act PBS. (1995). Trail of Tears. Retrieved from http://www. pbs. org/wgbh/aia/part4/4h1567. html The Wild West (2012). War Between the Settlers and The Native American Indians. Retrieved by http://www. the-wild-west. co. uk/war-settlers. htm.

Sunday, July 21, 2019

The Culture Of Creativity And Innovation Commerce Essay

The Culture Of Creativity And Innovation Commerce Essay Creativity and innovation are two inherent qualities human possess that may not be embedded in each and every individual. An organization acquires staff and individual with various different attributes. However, creativity, for one, may not be amongst their major attribute. I believe that it is not easy for an organization to create a culture of creativity and innovation in an organization due to the diversity among members and the organizational identity but it is not impossible either. Depending on the existing organization culture with an evolving organizational identity and using proper language and discursive elements to bring cultural incrementalism, a culture of creativity and innovation in an organization is achievable. A culture of creativity and innovation in an organization can be created by providing staff of the organization proper understanding of the goals and objective and creating an environment to try new ideas and the right to freedom and get support. I believe that simply implementing theories to an organization wont make it creative or innovative. In order to create a culture of creativity and innovation in an organization, the organization needs to understand the behaviour of the people and needs to be open to new ideas and the changes these ideas generate. In this essay, I have tried to focus on implementing culture of creativity into organizations whilst evaluating existing organizational structure and culture. All the theories discussed and argued will be based upon creativity for an organization. The Weberian Thought and Taylorism along with models of organizational structures have been analyzed to understand how people are provided with authority and how they behave in an organization. HAS and IS approach has been compared alongside Darwins Theory of Evolution to put light into the theory of creativity. In order to implement a new concept of creativity and bring change, Kanter, Stein Jicks Big 3 Model of Change and Lewins Model for organizational change has been compared and contrasted. Organizational Culture is an outcome of cultural processes at work in a particular setting and focuses on people and the shared meaning within them. An organization with a strong culture may find it difficult to adapt with changes. If they want to bring a culture of creativity then the organization may find it hard to cope with it. A strong culture will have people with commonalities and may lack diversity which is essential in generating new and different ideas. However, subcultures can exist in such organization with strong culture which may bring creativity as a result of diversity. Such divisions are responsible for giving a different option or a direction to the organization which can result to new frontiers. Diversity is an integral element of an organizations culture. A manager has to be aware of the differences that exist among various employees working in the organization. People in an organization do not always come from the same background. A manager needs to be aware of the differences between the employees in order to create a friendly working environment. Organization, today, has come a long way from the classical approach of Max Weber (Bureaucracy and rationality) and F.W. Taylor (Division of Labour and Scientific Management). Humans are appendage of industrial machines. Humans can be programmed to perform according to loads, pace and fatigue-Max Weber. In order to establish a creative culture, people need to be given freedom to think and work. Webers theory will bring restrictions on the way people think and work by comparing human with machines. Similarly, Taylors Scientific Mangement theory suggests that certain knowledge, belief needs to be predetermined to create a culture. However, creativity cant be moulded by certain rules and regulations. In such a case, the result would not be original and hence, not creative. Darwins Theory of Evolution states that culture is a process of cultivation, i.e., the improvement of human condition which helps create a creative culture as it focuses on betterment of the human condition. Similarly , HAS and IS Approach provides further light towards organizational culture. HAS approach states that culture is constructed by basic assumptions where as IS approach starts from a clean slate where culture is not defined which can help the creativity flourish as there are no boundaries that needs to be met by the people. In recent times, a symbolic-interpretative approach or a postmodern approach is more popular where people and their behaviour are given importance and actions carried out based on them. A symbolic-interpretative approach would create meaning by associating with human through shared values, traditions and customs whereas the Postmodern approach is where managers are artist in themselves who are open to new ideas and based upon these knowledge and understanding come up with a new perspective with reference to the past. The diagram below shows different elements which collectively form a culture. In order to create a creative and innovative culture in an organization, all the elements need to embrace creativity and work accordingly. Creativity injected in these elements will eventually exude the creative culture of the organization. An artifact who would like to be a symbol of the organisation Organizational structure shows the relationship between members within the organization and the distribution of responsibilities and ultimately power. An organizational structure doesnt necessarily influence the organizational culture. An organization may have a strong, bureaucratic culture or a creative culture regardless of the hierarchical structure. In large organization such as Apple, a creative culture exists despite a hierarchical organizational structure. However, creativity needs to fulfil the goals and objectives of the organization and proper communication is necessary between the staff and the managers. So, a flat organizational structure would help in better communication and instant reaction to any changes even if the organization has a Top-Down hierarchy. Organizational Control helps to create an order to the activities carried out in an organization but it can affect the creativity of an organization as the essence of creativity is freedom and we know that organizational control is quite the opposite. The level of control needs to be determined in such a way that it wont hamper the creativity of the staff. In order to create a creative environment, the control needs to be decentralized. Even though managers are in charge, the employees need to have space to come up with ideas without being controlled. Page 345, teamwork and a concern with employee creativity. Language in the form of narrative and storytelling is essential in shaping a culture of an organization. Narration is bringing experience or sequence of episodes coherently into language. From stories we derive meaning, knowledge and experience, and as a result, we are able to understand our own and others existence. Narration helps improve communication between the manager and the employee resulting to better productivity. It even helps to improve quality of management and leadership and understand the direction the organization wants to take in the future. Stories can help people understand and get new ideas which will create a creative and innovative environment. People can relate to characters of the narration and learn from the events. For eg, learning about how Steve Jobs, CEO of Apple Computers, works can inspire people to come up with new ideas and be more innovative. Organizational Change occurs when a new system is introduced and implemented. It is not easy to bring change to an organization. Changing any functioning of the organization will have to change the perception and attitude of the people as well. Such changes need to be handled delicately without upsetting any party. Cultural Change in organizations can be of three types: Apparent Change, Revolutionary Change and Cultural Change. Apparent Change adapts while preserving its identity whereas Revolutionary change is brought about by outsiders by destroying old ones and creating a completely new culture. However, if creative culture needs to be created, Cultural Incrementalism is a good choice. It incorporates the old culture from narratives along with new ideas to come up with a new culture. In our case, changing the way the people work by providing more freedom or brainstorming and discussion sessions incorporated in an existing culture results to cultural incrementalism and hence, a cre ative culture. There are various theories on how change can be managed. Lewins Model: Unfreezing, Change, Refreezing is one of the most popular theorys for managing change in an organization. However, we are focused on changing the culture into a creative culture. For this purpose, Big 3 Model of Change is appropriate rather than Lewins Model. Lewins Model is effective but it focuses more on the manufacturing and operational side of the organization and doesnt take into account the human perspective. It plans and directs change. However, creativity in an organization cant be planned or directed. Big 3 Model of Change focuses on change can be managed by responding, harnessing and provoking change. According to this model, there are three forces of change: Macroevolutionary (Environmental Level), Microevolutionary (Organisational Level) and Political (Individual Level). This model has been criticised to be too broad but due to its inclusion of behaviour of people at different level and responding acc ordingly, makes it a better option towards managing change than Lewins Model. While creating a creative and innovative culture, a manager should not stray away from the identity of the organization. A creative culture may not be suitable for all types of organization. The working environment needs to be understood before changing or creating a culture and the change needs to align with the identity of the organization. For eg, In a Cafe, creativity has very less to do. The employee has to perform task that is routine and there is no room for improvement in terms of creativity. The identity of the cafe is to provide good service to customers. Albert and Whetten beleive that organizational identity has central, distinctive and enduring features. However, Gioia, Schultz and Corley argue that the organizations identity is fluid and not stable. Balmer emphasises on using evolving rather than enduring because these school of thought believe that even the organizational identity doesnt always remain the same and keeps on evolving with time and environment. Culture an d Identity of an organization go hand in hand and Michael Wood has stated, Identity is not something genetic, safe and secure. It is shaped by history and culture: it is about group feeling; allegiance to the state, but in an open society that can be wide and inclusive. It is always in the making and never made. So, if the organization needs to create an innovative and creative culture, the identity can be moulded accordingly. Example: Creative Industry of Jewellery Design. I interviewed a friend, AKG, who assists her father in a family business in Kathmandu, Nepal. The organization is a family business which is basically a jewellery design outsourcing company for various jewellery shops in Kathmandu. The organization was started by her grandfather 34 years ago, to employ people with a passion for their art-jewel crafting while utilising their abilities to their benefits therefore benefitting the organisation. The people hired were people that were fired by her grandfathers friends because they didnt craft the jewellery according to the specified designs. This gave her grandfather the opportunity to bring the best out of his employees in terms of creativity who believed that happy people make better employees. The organization has AKGs father as in-charge and 14 artisans who were hired by her grandfather. These artisans are responsible for coming up with ideas or working on ideas provided to them by the clients. The designs or ideas from clients are translated to the artisans as some are stories and some are an old piece and brainstorming sessions are carried out to understand the story more deeply. Then this raw idea is given to all 14 artisans along with the old piece or the story. They translate it however they think is best. So, by the end of the time given, AKG and her father along with the 14 artisans come together, discuss and look through all the designs. Then, among the 16 people, voting is carried out and sometimes there is a clear winner. However, at times all the 14 translations are sent to the clients to pick the best which makes it much simpler and the winning craftsman receives 35% of the sales proceeds! All 14 artisans work in the workshops at their home. They work separately and each idea and design is unique. They joined this family business because they were able to express themselves and not work under any restrictions. Before, they had to design what was told by the client or the owner and their own idea would not be given value. But now, they can use their creativity and imagination and work on the designs providing a style of their own. However, despite giving these artisans freedom to come up with new ideas, the manager says it is important to keep sidelines. AKG says. When you have such a thing, you got to keep sidelines. They cant just go tinkering around with everything. We do encourage creativity but its got to be marketable and what we ask of them is to judge for themselves if they would be attracted by the design if they say it in a store. The above example is based on a family business which is different from regular corporations. This firm can be classified as a creative industry due to the nature of work. The organization has a flat structure with the manager looking after the 14 artisans and dealing with clients. Due to the group of artisans working for the company for more than 30 years, a culture has been set on how tasks are carried out. Artisans were hired due to their skills of creativity and with an agreement of freedom to go beyond boundaries and try out new things. Having said that, goals and objectives are predetermined and a basic criterion is set which will fulfil the basic demand of the client. Creativity is the organizational identity for this company and it is reflected in the organizational culture as well. The artisans are able to use their skills without compromising on their creativity. The opportunity to work at their own workshops gives them freedom. Hence, this is an organization based around c reativity of the skilful workers where they are given freedom to come up with new ideas that goes along the story provided by the clients. The added incentive makes the workplace more competitive which will motivate artisans to come up with their best work as per customers requirement. This organization depicts an existing creativity culture which was possible due to the identity that was set when the firm was established. The organizational culture of this firm can be seen as IS approach of the organizational culture as the culture was created and it centred on the creation of meaning. Here, the meaning was freedom to creativity for better satisfaction to the workers. This culture of creativity opposes the Classical approach and Webers Bureaucracy theories. Instead of specialising and setting formal rules and regulations, the artisans were given the freedom to work at their workshops and be creative. So, for a culture of creativity to exist, the organizational structure needs to be flexible and interactive and creativity needs to be an element of the organizational identity. The creative is the place where no one else has ever been. You have to leave the city of your comfort and go into the wilderness of your intuition. What youll discover will be wonderful. What youll discover is yourself.- Alan Alda.

Saturday, July 20, 2019

Simple Network Management Protocol (SNMP) for MIB

Simple Network Management Protocol (SNMP) for MIB SNMP Abstract: SNMP or Simple Network Management Protocol (SNMP) is an application layer protocol that provides the exchange of management information between network devices. SNMP is a part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. Through this research the emergency of network management will be managed for fire alarm, power off. Managing devices such as computers is vital and tracking for its safe and emergency issues will assist in many aspects such as identifying location, solving communication issues etc. In this research we will propose a SMNP based solution for effectively managing computer devices. In this research we will propose a MIB [Management Information Base] using ASN1.0 specification and also proposing a prototype on the implementation. Then based on our proposed prpotype we will evaluate. ASN for the proposed MIB has been designed as part of this research but it could not be implemented with real time implementation due to lack of resource for SNMP based developemnt. Aim: Propose a solution for SNMP based Emergency management for an organization Objectives: Research on network management using SNMP. Proposing an MIB Tree for the emergency network management Critically evaluating the proposed solution for SNMP based emergency network management. Introduction Network management is managing and maintaining different components and its functioning in a network. Network should be managed in an efficient way for avoiding different attacks. Several protocols are used for managing network. Management plays a vital role for monitoring the state of the network and analyses the performance. Among such protocols Simple Network Management Protocol (SNMP) is one which is used for monitoring the network. The main purpose of this protocol is designed for maintaining devices in network in internet protocols (IP). The network management performance can be used for transporting network information and its elements functioning (Stephen F. Bush and Amit B Kulkarni, 2001). SNMP in networks provides reliable and integrated network management. Several attacks may occur in network, for analyzing networks should be managed in an efficient way. The SNMP manages the network with the usage of different commands to the network and is useful in different networks. Th ere are several architectures for SNMP which is used depending upon the network mechanisms. It performs several operations in network for managing different components in the network. For performing all these operations SNMP uses Management Information Base (MIB) for handling components in the network. In this project SNMP and its performance in network is analyzed with the help of case study approach. The emergency preparedness is important part in network management and is equal to other maintenance works. One of the problems in network is traffic (German Goldszmidt and Jurgen Schonwalder, 2003). Sometimes the flow of data is more in network which causes traffic in network. In order to avoid traffic limited number of data should be transmitted in the network. Another problem that occurs in networks is security. Sometimes intruders may involve in network which leads to loss of data, in order to avoid this SNMP protocol performs several operations. For identifying network problems w ith SNMP components in network uses Management Information Base. Manager plays major role in managing the network. SNMP emergency services are very much helpful for the managing the network. This project uses emergency management of SNMP in order to solve problems that occur in networks (Geln E. Clarke, 2005). Hence from above context it can be concluded that SNMP is one of the protocol which helps in managing the network. Several problems may occur in network like traffic and security to the data. SNMP emergency management helps in managing the networks by performing different operations. Research Problem The network management protocols identify the communication between the network management server programs that are executing on the router or host, and the network management client program invoked by the manager. Considering these factors, it can be expected that the network management protocols contains numerous commands (Douglas Comer, 2006). The major disadvantage of constructing the network management protocols is the resulting complexity because this protocol needs an individual command for every operation on the data item. The Simple Network Management Protocol (SNMP) is useful in such types of cases. SNMP makes an interesting approach to network management. In place of defining the large command set, SNMP directs all the operations in a fetch-store paradigm. SNMP makes use of only two commands which allow the manager to store values into the data item and get the value from the data item. Other operations are described as the side-effects of the two operations. The main adva ntage of using the fetch-store paradigm is simplicity, flexibility and stability. SNMP is stable as its meaning remains fixed. SNMP is also easy to understand, debug and implement as it evades the difficulties of using special cases for every command. Finally the SNMP is flexible as it can contain the arbitrary commands in a well-designed framework (Douglas Comer, 2006). Problem Context: Importance of emergency in SNMP In the present scenarios of the Simple Network Management protocol, there are numerous of conditional factors that involves in defining the perspectives of the response in emergency SNMP (Amjad Umar, 2003). The emergency response can be used as a tool guide to the proposed scheme. The situation of the emergency can be found in the several areas of the networking management. The state of emergency can be found in many context such as market demand, failure in the key resources, shortage in the areas of the supply, in the same way there is a need of the emergency can be found in the areas of the political sciences and public administration. As in the same way in this research the point to be focused on is the emergency response of the Simple Network Management Protocols (Harold F. Tipton and Micki Krause, 2004). The factor that contributes to the difficulty in the emergency are lack of flexibility in making decision, lack of available resources, lack of response in option, failure in c ommunicating and cascading the events. To overcome these whole problems in the SNMP emergency, it must have to develop the outstanding plans that can be used for giving the training on the extensive simulation of the Emergency Response. Most of the organizations get failure only because of the one reason that is managing the emergency situations (Rob Cameron, Neil R. Wyler, Trent Fausett, Kevin Fletcher, Patrick Foxhoven and Mark J. Lucas, 2007). If the emergency situations in an organization are maintained in a superior approach then it may lead to loss in the communication, information and essential data. Hence a proper management system is required for organizing the emergency situations in Simple Network Management protocol. This protocol is used to reduce the traffic when a emergency situation is occur in the network, then the preventive measures that has to be taken are recovery, preventives in the system, improving the communication scheme, performance and work on the basis o f the propriety. Research Method: Case study is one of the best methods for researchers; these are effectively used by the people to understand the contest of the study. It is less complexity and adds strength to the data which is used in the research. The steps that is followed in this case study are * Determine the theme of the research * Select the cases and analysis the techniques for gathering the data * Preparation for the collection * Collection of the data according to the field * Estimate and analyze that data * Preparation of the report This study is to manage the emergency in Simple Network Management protocol. The organization that involves in the SNMP managements standards, that provides the major introduction to the organization management. There are several conditions that have an impact on the areas like co-operation and trading (Bill Gillham, 2000). To develop the management system in the SNMP is based on the information and communication. This includes the problems, listing the questions, describing the method that involve in the research. The key features of the report includes the detail of the Simple Network Management Protocols in the management information of specific data that relates to the successes or disappointments experienced by the organizations that were conveyed during data collection and answers or comments illuminating issues directly related to the research questions (Ben Beiske, 2007). The researcher develops each issue using quotations or other details from the data that is collected, and points out the uses of data where it is applicable. The data also includes the confirming and conflicting findings from literature reviews. The report conclusion makes assertions and suggestions for further research activity, so that another may apply these techniques to another electronic community, network and its management to determine whether similar findings are particularly to in communities that belongs to the network (George L. Dunbar, 2005). Final report distribution includes all participants. Within the case study it has been analyzed at the first time whether the technique used with each non-profit organization under study. The assigned investigator studies each organizations written documentation and survey response data as a separate case to identify unique patterns within the data for the single organization. A detailed case study that is, written ups for each organizing management, categorizing interview questions and answers and examining the data for within group similarities and differences. Cross case analysis follows. Investigators examine pairs of cases, categorizing the similarities and differences in each pair (Kathleen Stassen Berger, 2004). Investigators then examine similar pairs for differences, and dissimilar pairs for similarities. As patterns begin to emerge, certain evidence that may stand out as being in conflict with the patterns. In those cases, the investigator conducts follow-up focused interviews to confirm or correct the initial data in order to tie the evidence to the findings and to state relationships in answer to the research questions. Chapters Summary: In summary, here there is a discussion about the case studies in terms of the different types of case studies which is found in the literature. The case studies are considered to be useful in research as it enable researchers to examine data at the fine level. It is an alternative to quantitative or qualitative research, case studies is a practical solution to when a big sample population is difficult to obtain. Although the case studies have a variety of advantages, so it is used for data management for having the better situations and it provide a better insights for the document in detail to which the subjects of Interest is related. Case study method has always been criticized for its lack of severity and the tendency for a researcher. It is the base for establishing reliability and generality in subjected to uncertainty when a small sampling is deployed. Some case study research is dismissed as useful only as an exploratory tool. Hence as the case study have various advantages o ver the qualitative or the quantitative researches. So it is used in this research. Summary of chapters: Chapter 2 includes the Literature review for the related research work. Chapter 3 discusses the analysis of problem requirements which is providing a solution for managing or developing emergency based system. We have used SNMP and MIB based approach to provide the design of the emergency based provision. We will be using MIB tree and ASN based design and development for this. Chapter 4 includes the development and data collection which will be obtained through SNMP Query for Firealarm and Power off. Chapter 5 covers the analysis and evaluationof results or test data, This has the effectiveness of the research and proposed solution for emergency. Chapter 2: Literature Review 2.1 Network Management Network Management is a service which employs different applications, tools and devices to assist the network managers in maintaining and monitoring networks. Hence the meaning of Network Management is different for different users. For example in certain cases the network management involves a single network advisor monitoring the network activity by utilizing an obsolete protocol analyzer. In other cases the network management involves auto polling, distributed database and high end workstations producing real time network topology traffic and changes (Network Management n.d). Architecture of Network Management Many of the network management architectures use similar set of elements, structure and relationships. The managed devices or end devices like the computer systems and network devices run the basic software which allows them in producing alerts when problems are recognized. For instance consider the exceeded user determined thresholds. The alerts received are programmed by the management entities to respond by executing one, group of actions like operator notification, system shut down, automatic attempts and event logging by system repair. Even the entities of the management can be polled for end stations to verify the values of definite variables (Network Management n.d). The polling can be user initiated or automatic but the agents of managed devices react to all polls. These agents are the software modules which first compile information regarding managed devices in which they reside. Later the information is stored in management database and is finally produced to the management entities reactively or proactively of the network management systems (NMSs) through a protocol of network management. The network management protocols include Common Management Information Protocol (CMIP) and Simple Network Management Protocol (SNMP). Figure 1 represents basic network management architecture (Network Management n.d). Sampling Techniques Network Management involves the status information of queue occupancy, latency, load and other parameters which is available from devices like switches, networking interfaces and routers. This information of the network management is accessed by the Simple Network Management Protocol (SNMP) (Edwin A. Hernandez, Matthew C. Chidester, and Alan D. George, 2000). The Network Management Station (NMS) of the SNMP queries the agents or network devices to evaluate the status of the network links or devices periodically. The accuracy of the data measured is determined by period of sampling. A transient activity cannot be detected accurately if the sampling interval is large and a greater storage capacity is required at the NMS as small intervals consume larger bandwidths on the network. For instance, a burst of major action with few seconds is probable to be undetected with sampling interval of some minutes. To balance the accuracy with sampling several sampling techniques have been practical to the managers of network. Some of these sampling techniques are: SNMP Architecture: Simple Network Management Protocol (SNMP) is the network protocol which is used in network management systems. This protocol is designed to administer the devices on an Internet Protocol (IP) network. It collects the information from different network devices such as routers, servers, hubs on an internet protocol. It is used for managing complex networks. The SNMP architecture consists of different set of components such as network management system and the SNMP agent and the managed device. The managed device is also known as the network elements. It is connected to the data network. The SNMP agent collects the data from the managed device and transforms it to another format using SNMP. This agent acts as a server, switch, hub and many others. The NMS is the one of the module of the SNMP which basically executes the applications which can manage and control the managed devices like physical devices such as routers, network interfaces and software. They manage the remote monitoring of these managed components and do the sampling. Then after do the analysis of the collected information and finally gives the presentation of the information (Steven Karris T, 2004). All the devices in the architecture are referred as managed devices. The managed device in the architecture acts as an SNMP agent which facilitates the network management syst em to recover the status of managed device. All the available information of the managed devices is been addressed through management information base (MIB). There are two types of MIBs. They are scalar and tabular. The scalar object of MIBs denotes the single object instances and the tabular objects of MIBs define the multiple object instances. If the network management system recognizes which device to be managed in MIB then it changes the MIB objects with the relevant requests to the agent of SNMP. The information of MIB is loaded into the network management system with the help of MIB file. The network management system acts as the master device where as the managed device and the SNMP agent acts as a slave device. It provides security by preventing unauthorized users to gain access on the system. This security is performed with the help of community string. This string acts as the password and groups the data either to read-only or read-write areas (Thomas Porter, 2006). The ap plication server of the SNMP agent is designed to run the specific applications. The SNMP agents and the network management systems communicate each other with different set of operations such as read, write and trap. The NMS requests the SNMP agent through read operation and it sends the information through write operation. The notifications are sent from SNMP agent to NMS through trap operation. Hence from the above context it is understood that SNMP is used in many applications. It is implemented in many operating systems. The storage network of the SNMP architecture consists of switch and the hub which acts as the interface between the components. All the devices such as managed devices, MIB are connected only through storage network. Tape library contains more than one tape drives which stores bulk amount of data. It acts as a SNMP agent. The SNMP agent translates the whole information. Different SNMP versions are derived to increase the performance of the system. SNMP ahs the followings: Network Element: if any tool connects to the network then that tool can be called as network element. Some of the tools like gateways, hosts, terminal servers, servers, switches, firewalls, and active hubs. Management station: this station includes a platform which contains software in SNMP that manages and controls the network elements. SNMP agent: it is a software management agent which is responsible for executing the functions in the network management after receiving the messages from the management station. SNMP request: a message which travels from management station to SNMP agent in the network device. SNMP trap receiver: it even receives the notification messages from SNMP agent on network devices. Management information base: it is a method which identifies the elements in SNMP database. SNMP Architecture Simple Network Management Protocol is very popular not only because of its simple operation but also due to easy of usage. This protocol is very useful for manufacturers and seller as it is easy to use SNMP technology for the manufacturers while adding network management functions to their products (Kerrie Meyler, Cameron Fuller, John Joyner Andy, 2008). Components of the SNMP Architecture: The SNMP architecture mainly contains two components, managers and agents, apart from standards which are used for controlling the interactions between components. By using SNMP commands, these managers and agents communicate with each other. These commands are explained in RFC 1157. Here, the managers organize the functioning of agents. The agents provide the data to the managers by interacting with the devices like routers and computers. These devices are also known as managed devices (Ramadas Shanmugam, R. Padmini S.Nivedita, 2002). The protocol used for communication between manager and agent is referred as SNMP. Generally, the SNMP managed network consists of three components; they are (Deon Reynders Edwin Wright, 2003): * Managed devices. * Agents. * Network-management systems (NMSs). Managed devices: It is a network node which includes SNMP agent which exists in a managed network. These devices gather and store the management information. By using SNMP, managed devices enable the management information to network-management systems (NMSs). It also responsible for querying the agents by using SNMP commands. Managed devices can also be known as network elements, these can be any type of devices like routers, switches, hubs, access servers, bridges, IP telephones, printers, or computer hosts (Gilbert Held, 2003). Agent: It is a network-management software module which exists in managed devices. Agent software represents one or more program modules which operate within the managed devices like bridge, router, workstation or gateway. Each of the managed agent stores information and provides these information to the manager after receiving the request from the manager. It translates the management information into a well-suited form with SNMP (Deon Reynders Edwin Wright, 2003). Network-managed systems (NMSs): This system performs applications that examine the managed devices. It provides a large amount of memory resources for network management. In any managed network, there should one or more number of NMSs (Gilbert Held, 2003). SNMP operations SNMP reads or writes the values in applications from SNMP devices. There are four basic SNMP operations, they are Get, Get-next, Set and Trap. Get and Set are the basic operations which are mostly used for reading and writing data to a node which are identified by a specific OID. It also requests the values of one or more SNMP objects and sets the values of SNMP object. Get-next reads the content of the tables at a time and steps through MIB hierarchy. Trap is an asynchronous notification from server (agent) to client (manager) which reports the occurrence of an interesting event. It sends the information in the form of packet to SNMP (Evi Nemeth, Garth Snyder Trent R. Hein, 2006). Basic commands of SNMP Commands are explained in RFCs, there are many RFCs which relate to SNMP components. The importance of these RFCs is it describes the operation of the protocols. Generally, there exists three RFCs; they are RFC 1155, RFC 1157 and RFC 1213. RFC 1155 used for Structure of Management information (SMI), it explains about the data types and structure that should be used for managed objects. RFC 1157 is used for Simple Network Management Protocol (SNMP), it describes protocol and operation of SNMP. RFC 1213 is used in Management Information Base (MIB) (Philip Miller, 1997). By using four basic commands in SNMP, managed devices are monitored and controlled. They are namely read, write, trap, and travel operations (Deon Reynders Edwin Wright, 2003). Read command it is used by NMSs, in order to monitor the managed devices. NMS inspect various variables which are maintained by managed devices. Write command to control managed devices, these commands are used by NMS. The variables in the managed devices are changed by NMS. Trap command- these commands are utilized by the managed devices to asynchronously report the result to the NMS. Whenever there are certain results in the managed devices, then managed devices send rap to NMS (Deon Reynders Edwin Wright, 2003). Transversal operations- NMS make use of these operations to identify the variables which supports managed device and also collects the data in variable tables like routing table. SNMP Network Management Managing a network is very difficult task for any administrator as it deals with huge number of nodes and protocols. The best way to keep track of all the nodes that exists in a network is to identify and implement an effective protocol which can allow a user to read or write a particular piece of information. SNMP is one of the network management protocol preferred by most of the network administrators in organizations. SNMP can be available with three versions; each has enhanced features when compared with its previous versions. SNMPv3 can offer high security features while managing organizational network. A network manager in an organization has to play a key role in managing the networks. Using of SNMP for network management can be advantageous as it can solve most of the problems that exists in a network (Sebastian Abeck and Adrian Farrel, 2008). Thus, performance of network mostly depends on the network protocols used by the administrator. Network management using SNMP protocols can be identified as a request/reply process. SNMP makes use of request messages like GET and SET while managing a network. Through GET request a SNMP server can retrieve the required information from a node where as SET request can stores specific information on a node. SNMP servers mostly use GET requests in order to manage a network. SNMP implementation efficiency largely depends on these requests and replies from the nodes or servers (Dinesh Chandra Verma, 2009). A network administrator has to recognize the network details before implementing SNMP protocols. Client programs in networks can be utilized by network administrators in order to display the actual details of a network. While displaying network details a client program acts like an interface. When a user or administrator wants to access specific information, a request must be sent to the server. For sending request to particular node, a client program makes use of SNMP protocols. R equests from the users will be received by SNMP servers running on the specified node. SNMP server processes these requests and finds the information required for a user. Finally a client program will display the information based on the response received from SNMP servers. The major aspects that has to be understood in SNMP network management is, how a user can specify the information request and how a server recognizes the required information (Larry L. Peterson and Bruce S. Davie, 2007). SNMP makes use of Management Information Base (MIB) for retrieving the required information. MIB performs the function of identifying information from SNMP databases. As SNMP uses MIB, a particular syntax for the requests has to be specified. For implementing SNMP with MIBs a standard specification like ASN.1 can be used. A SNMP client agent keeps an ASN. 1 identifier in MIB, SNMP server searches the required information based on the identifier specified by the client. For managing a network SNMP makes use of various network components. Every SNMP agent will interact with MIBs and Network Management Systems while managing a network (Monique Morrow and Kateel Vijayananda, 2003). Hence from the above discussion it can be understood that, SNMP operates in client/ server mode which establishes virtual connections with the servers to provide information to the Network Management Systems (NMS). The information provided to NMS can provide the devices status at a particular time. MIB in SNMP refers to the databases controlled by SNMP agents and SNMP servers retrieve the information based on MIBs in networks. Network management through SNMP can be an effective and most used method in present organizational networking environments. Many large organizations use SNMP tools for managing their networks effectively. Why SNMP SNMP is defined as simple network management protocol. Network management system will make use of SNMP for communicating with various network objects. SNMP is mostly used for the remote management of network device. SNMP is widely used because it easy to use and user can easily add the network management functions to their new or existing products. SNMP runs on various devices like network tools, core network devices and office network tools (Ray Rankins, Paul Jensen and Paul Bertucci, 2002). SNMP allow network and system administrator to access network devices that are present in their networks such as server, routers etc. SNMP for the management of network device contains one SNMP station and management station. Management station is mainly utilized to arrange the network elements and to receive the SNMP traps from those elements. By making use of SNMP, network monitor can observe changes and alerts that are identified in the network elements. If the size of network is increased th en method called management is required. In SNMP errors obtained are varies from one agent to other agent but will include system failure, disk warning etc (Harold F. Tipton and Micki Krause, 2004). If the device passes an alert to the management station then network management itself involves in rectifying the problem. Time to time configuration request should be send to the device. If provided string is correct then automatically configuration of the device will change according to the requirement. Organizations can identify the status of all equipments and can also perform remote trouble shooting. SNMP is nothing but a protocol that is used to develop and manage nodes that are present in the network system. SNMP allows system administrator to work on the problems that are executed in the network and should plan for the growth of network. Network management service will identify the changes that are done in the network devices based SNMP (Douglas R. Mauro and Kevin James Schmidt, 2005). SNMP consists of three features; they are managed device, agents and network management system. Managed device is usually a network node. It contains SNMP agent that is located on a managed network. Management data that is gathered and stored will be available to network management system of SNMP. Managed devices can also be called as network elements. An agent is nothing but network management module software module which is present in the management device. This device has great knowledge on local management information and this information can ne transferred to SNMP. NMS usually carry out applications that can manage and control the managed device. Hence from the above discussion it is identified that SNMP is a protocol which can help in managing the networks. Why MIB Management Information Base (MIB) is an essential component for handling a network. The importance of MIB increased as it comprises data definitions for managed objects. For managing the networks through SNMP protocol, an information base is necessary. The information base must allow a user to retrieve required data. MIB provides the facility of managing databases in SNMP agents. Managed object instances stored in MIBs will be exchanged between SNMP agents and managers (Stephen B. Morris, 2003). Thus, MIB is necessary for managing the information while implementing SNMP protocol in networks. Managed objects in MIB will be specified with a unique identifier, a user has to send request regarding information by following a particular syntax. MIB in SNMP also helps in recognizing the present status of a network device. Identifying the network information in case of small networks can be done very easily as the host names and IP addresses can be available to the users directly. But in lar ge networks, a MIB