Wednesday, October 30, 2019

Organizational Environment Assignment Example | Topics and Well Written Essays - 750 words

Organizational Environment - Assignment Example Therefore, the firm should consider the factors such as the availability of the commodity, which will ensure sustained supply hence the customers, are not disappointed (Jones, 2010). They should also consider their technical ability or their ability to invest in the machinery, which will ensure that there is value addition to the product as well as large-scale productivity. The young agile manager should also go out and ascertain the actual market by quantifying it before making the enormous investment. The manger should also consider conducting intensive research on the possible ways of differentiating the product to attract a wider market through the ever-growing technology and the cultural diversity. Technology available should also be considered as the firm tries to venture into production, as technology will facilitate both mechanization and automation, which will go the large way to enlarge the production of the Kaolas. The natural factors enhancing the survival of the animals have to be considered as they affect production (Ito & Rose, 2004/2005, winter). 1. What additional factors should be considered if Krazy Koalas decides to expand to Ireland, Spain, and possibly the Middle East? Due to geographical differences between the US and Ireland, Spain, and the Middle East, the political, social and economic factors will tend to be different. Therefore the other factors which have to be considered before extending the supply of the Kaolas in the Ireland, Spain and middle east are:- political factors, these are the decisions pertaining to taxation, investments and fiscal policies of the country. If the policies of the mentioned governments are not in favor of imports or policies are designed to discourage the importation from certain countries then it would be costly hence unwise to expand their markets to these countries. Socially, the company should consider cultural diversity between these two countries, in one way or the other there might be cultures, whi ch would not support the consumption of koalas in some form (Jones, 2010). Therefore, the essence of research on the different cultures and the name they give to the product or the form in which they are likely to consume it for the sake of providing a better product to the right group of people. Such studies will facilitate differentiation, which is healthy for increased production. Economically, factors such as the inflation rates and exchange rates must be looked at as they are likely to determine whether it is economical to produce and supply to these countries or not. As at this time, the fall in value for the dollar has made the affordability of the koalas in both Spain and Ireland to increase, as they are quite affordable. 2. What are your specific recommendations for Krazy Koalas? What should the company do, and why? Krazy koala is a company, which has shown prospects of growth due to the ever-increasing demand for the products they offer. The management should therefore be tasked with the responsibility of ensuring that they differentiate the products they are providing to widen the base of their supplies as well as try and block the potential competitors. The management can also look for ways of minimizing the production costs as much as possible which would make way for the expansion of the profits to support the firm in its

Monday, October 28, 2019

Aztec Calendar Stone Essay Example for Free

Aztec Calendar Stone Essay Obtaining the knowledge that was passed down to them from earlier Mesoamerican cultures, the Aztecs carved the calendar stone in 1479 (Smith 253). At the time, the Aztecs lived in a very civilized world filled with amazing architecture, an impressively complex government system, and they also employed intricate systems of writing and calendric systems (Taube 7). The Calendar Stone was made by basalt stone. For the Aztecs, everything was pictorial in nature around this era. The calendar stone depicted different pictograms or Codex Magliabechianoand, which was primarily written on religious documents (Aztec-History). Art was centered around religion in this era. So the pictograms of the gods on the calendar stone would correlate with that subject matter. The Aztecs were a highly ritualistic civilization devoted to divination and their Gods. The Aztec calendar stone was created as a divinatory tool which was used for rituals, to forecast the future, and to determine which days were lucky and which days not for the outcome of various actions and events (Smith 254). The calendar had two systems. It had the sacred Tonalpohualli, which was based on the 260-day cycle and the Iuhpohualli, which was a 365-day cycle (Palfrey). Seen by the count, there is a five day difference between these two calendars. The five day differences were thought to be the most unholy, unlucky days of the year (Smith 257). The world was thought to be coming to an end. On the Aztec Calendar, the year was divided into 13-day periods. Each group of 13 days had a different deity ruling over the unit. This is because these units were thought to have a special symbolic influence and the deities were to ensure a positive outcome (Smith 256). In the middle of the Sun Stone, is the sun god Tonatuih. His tongue protruding between his teeth resembles a sacrificial flint knife. In his claw like hands he clutches human hearts (Palfrey). ‘Many scholars have debated on the stone’s meaning and purpose. Some suggest that, fixed horizontally; it served as a sacrificial altar, which would make sense because the stone was dedicated to the sun deity. Most agree though, that it offers a graphic representation of the Mexica cosmos’ (Palfrey). In The Aztecs, Smith sums up what is to be believed the thought of the Aztecs when they carved the calendar stone â€Å"The Aztec calendar stone conveyed the message that the Aztec empire covered the whole earth (territory in all four directions), and that it was founded upon the sacred principles of time, directionality, divine warfare, and the sanction of the gods† (Smith 270). Keeping the Aztec calendar is proof of ancient cultures mathematical and scientific achievements without the aid of modern technology. The study of the sun stone could lead to further advances in mathematics and acts as a road map to our celestial bodies from that era of our history. The Aztecs believe they felt justified in believing in this calendar because of numerous events that changed the course of history for them. Because Aztec Indians were fervent astronomers, they tracked the stars and correlated that between the days to create this sun calendar. Examples of events happening within the timeline of the calendar stone being built are these: Between 1452 and 1454, their capital city Tenochtitlan suffered from flood and famine, the following year on 4/16/1445 (Julian calendar) there was an eclipse of the sun. From 1473-1479, there were 4 more solar eclipses within a five year time frame (Aveni, Calnek). During this time the Aztec nation conquered and sacrificed many of the neighboring towns. Their leaders were wounded or killed, followed by violent earthquakes (Aveni, Calnek). There may have been even more visible eclipses seen by the Aztecs that have not been discovered because they were lost, or destroyed, or even confused with other natural events (Aveni, Calnek). If one were to take into consideration the Aztecs being a society with strong beliefs in deities, the Aztecs constant state of turmoil from wars and death and then couple that with a constant flow of solar eclipses; it wouldn’t take much to consider that the Aztecs might have thought there Gods were planning on ending their world†¦. again. The Aztecs might have carved this massive calendar from stone to give their future generations a chance to do things right, where they did not. Many other artifacts of the same caliber and craftsmanship were excavated around the time the calendar stone was. This was an amazing find, because in the early colonial period of the sixteenth century, pre-Hispanic stone sculptures were considered potent satanic threats to successful conversion (Taube 25). With the Spaniards thinking this, this lead to the destruction of many great pieces of art, manuscripts, and other forms of architecture. Thankfully, with the Aztecs foreseeing this frame of mind being a possibility and other circumstances occurring, many artifacts survived by being hidden in caves, on mountain tops, and even buried under Mexico City (Taube 25). After the artifacts were excavated, rather than being destroyed, they were treated as objects of curiosity and to be studied (Taube 25-26). I account for any differences between reception then and today by knowing people today have so many different religions and beliefs. Whereas the Aztecs were ignorant of the different beliefs we have today. They just had knowledge of what was taught to them by their elders as we do ours. There were not that many differences and very many similarities between American Indians of this era. In the way they did things to their architecture and sculptures. As a matter of fact, the Aztecs calendar was based of the earlier Mayan cultures. The Aztec calendar stone and Mayan calendar share many similarities. Both calendars have ritual days. The Aztec ritual day that was formed is the Tonalpohualli and the Maya ritual day is the Tzolkin. The day names on both calendars are also very similar. Both calendars used 18 months with 20 day counts along with other counts. The Aztec and Maya calendar stone is believed to have both mythological and astronomical significance. Both Native American cultures regarded their calendars as religious. Using the calendars, the Aztec and Maya priests dictated when to grow crops, when the dry and rainy seasons were, when to go to war, etc. (World Mysteries). The main way the Aztec calendar differed was in their more primitive number system and less precise way of recording dates. The year also started with different months. The Maya calendar tracked the movements of the planets and the moon. From this came their reckoning of time, and a calendar that accurately measures the solar year to within minutes. The Aztecs also kept the two different aspects of time, the Tonalpohualli, which was counting the days and the Xiuhpohualli which was counting the years (World Mysteries). The Aztecs believed they were living in the fifth and final stage of life. Because the Maya used a 360 day long cycle, they could tell that there were time periods way longer than the age of our universe (World Mysteries). It helped me figure out what some of the major celestial events where during the time the Aztec Sun Calendar was created. Palfrey, Dale. Mysteries of the Fifth Sun: The Aztec Calendar. n. p. Web. 8 January 1999. http://www. mexconnect. com/articles/199-mysteries-of-the-fifth-sun-the-aztec-calendar This is a website with basic information about the Aztec Sun Calendar. It gave me more insight into what the calendar looked like. Aztec-History. N. p. , nd. Web. 1996-2012 http://www. aztec-history. com This website has an enormous amount of information about Aztec Indians, from clothing to their demise and pretty much everything in between. The website gave me most of the information about the calendar stone I have so far. Smith, Michael. The Aztecs. Blackwell Publishers Inc. , 1996. Print. The book is Aztec Indians and their culture. This book helped me to understand the calendar stone more and why it was just a big part of Aztec life. Taube, Karl. Aztec and Maya Myths. British Museum Press, 1993. Print. This book detailed facts and myths about Aztec and Mayan Indians. This book helped me find what the Aztecs art and idols were see as in the early colonial period.

Saturday, October 26, 2019

Bram Stokers Dracula Meets Hollywood Essay -- Film Films Movie Movies

Bram Stoker's Dracula Meets Hollywood For more than 100 years, Bram Stoker’s Victorian novel, Dracula, has remained one of the most successful and revered novels ever published. Since its release in 1897, no other literary publication has been the subject of cinematic reproduction as much as Dracula. Dracula has involuntarily become the most media friendly personality of the 20th century. When a novel, such as Dracula, is transformed into a cinematic version, the end product is usually mediocre and provides non-existing justice to the pain staking work endured by the author. Due to production costs and financial restrictions, the director and screenplay writer can never fully reproduce an entire literary work into a screen version. With the complications of time restriction in major motion pictures, a full-length novel is compacted into a two-hour film. This commonly leads to the interference in the sequence of events, alternation of plots and themes, and the elimination of important characters or events. But the one true adversary of novel-based films is Hollywood fabrication. Producers, directors, and playwrights add or eliminate events and characters that might or might not pertain to the storyline for the sake of visual appeal, therefore defacing the author’s work. The above explanations have not paralyzed the countless attempts made by directors to bring the legendary Dracula to the big screen. Some cinematic reproductions of the novel have been more successful and critically acclaimed than others. According to Stuart, â€Å" From 1897 to 1993 there have been at least 600 vampire movies. Dracula has been portrayed on film at least 130 times† (Stuart 217). But three versions of the genre have emerged as the most d... ...James Craig. Dracula in the Dark: The Dracula Film Adaptations. Westport: Greenwood Press, 1997. Skal, David J. The Monster Show: A Culture History of Horror. New York: W.W.Norton & Co., 1993. Silver, Alain, and James Ursini. The Vampire Film: From Nosferatu to Bram Stoker’s Dracula. New York: Limelight Editions, 1994. Tibbetts, John C., and James M. Welsh. Novels into Films: The Encyclopedia of Movie Adapted from Books. New York: Checkmark Books, 1999. Filmography Browning, T. (Director), & Fort, G. (Screenplay). (1931). Dracula [Motion Picture]. United States: Universal Studios Murnau, F.W. (Director). (1922). Nosferatu: Eine Symphonie des Grauens [Motion Picture] Germany: Prana Films Coppola, Francis F. (Director), & Hart, James V. (Screenplay). (1992). Bram Stoker’s Dracula [Motion Picture]. United States: Columbia Pictures

Thursday, October 24, 2019

Physical Education in School Essay

In the last ten years, our culture has changes dramatically. Our nation was once a physically active nation, yet now it seems that society discourages physical activity. Everyone knows that physical fitness is important to his or her health. Physical education helps students improve their knowledge about health issues and practices that will lead to a more enjoyable life. Some schools do not require students to participate in physical education classes, but it is important for young kids to stay physically active. The rise of obesity in young children has become a growing concern in America. Physical education should be required every year for all public school students. Some students are physically unable to participate in physical education. I agree that if a student has a note from their doctor that it is fine for them not to participate. All the others should be required to participate though. Their involvement in physical education teaches them about lifelong fitness. While I attended grade school, physical education helped play a valuable role in my life. I became involved in several different sports because of participation in physical education classes. During school we played football games during physical education. In addition, we learned some of the basics of baseball and softball. I played football and baseball for years because of my involvement in physical education classes. After graduation, I still kept the same habits from grade school, by continuing to stay physically active. I participate in softball tournaments occasionally to keep myself in shape. In addition, I try to lift weights four or five days a week. Read more:Â  Physical Education Essay Students who do not participate in physical education more than likely will not be physically active as adults. By not teaching children about physical education, it almost certainly adds to the problem. Some students do not want to participate in physical education because they are worried about sustaining injuries. Their argument is children participating in physical activity are at a higher risk of injury than those who are in academic classes. By not being physically active, a student is at greater risk for sustaining an injury. It is important to stretch and warm up before starting any work out. Students learn this from their participation in physical education class. Stretching helps in developing overall flexibility, particularly in the spine, shoulder, and hip areas. The kind of stretching depends on the type of activity a person plans to engage in. For instance, if one is about to play sports, the recommended kind of stretching would be the ones that mimics the movements of the activity the student engages in. Warming up also helps to avoid injury. To warm up start at a gentle pace, and then slowly increase the pace until the heart rate increases and the body temperature rises. Warming up also helps to loosen up muscles and jump-starts the fluids in the joints. If a student is not required to participate in gym class, they may not be aware of warming up to prevent them from sustaining injuries if they decide to start a workout regimen or any kind of physical activity. Obesity is becoming a concern among young kids now. The Southeast now has a new name. Instead of the Sun Belt, some call the Southeast the diabetes belt. Almost every time I turn on the news there is a story about the rising epidemic of obesity. With teenage obesity as prevalent as it is, it is imperative that physical education classes be mandatory at all grade levels nationwide. The amount of obese youth has steadily risen in the last twenty years. It is an obvious fact that physical education classes, when made mandatory, would help improve the physical health of the youth across America. It is important for the student to learn how to keep ones self in proper physical condition. In addition, by making physical education mandatory for all schools nationwide it will help make the students realize how important it is to stay physically active. Obesity also leads to hypertension, sleep apnea, diabetes, asthma, and many other serious problems. Physical education classes can help to reduce the chances for those problems, but there are other steps to take. Exercise is important, but diet is also a major factor in health. Eating healthy foods and exercising will make students be much healthier. In conclusion, all schools should make it mandatory for students to have physical education classes every year. Our society is becoming unhealthier every year because of students lack of exercise. They need to be educated in physical fitness. They can achieve this by participating in physical education classes, learning how to warm up, stretch, and exercise. Obesity is growing in our population every year. Everyone should participate in physical education classes to learn about, and prevent obesity. If we continue with the lack of physical education in schools, we will continue to contribute to the poor health of students.

Wednesday, October 23, 2019

Sociological Perspective

The Sociological perspective stresses the social context in which people live. In other words it’s why we do the things that we do, such as our beliefs, attitudes, and guidelines we live by. It examines how these contexts influence people’s lives. It can also be defined as understanding human behavior by placing it within its broader social context. At the center of the sociological perspective is the question of how groups influence people, especially how people are influenced by society. A society is a group of people who share a culture and a territory. Sociology is similar to the other social sciences; it is also different as well. The other social sciences include anthropology, economics, political science, and psychology. Like sociology, anthropology studies the culture within. It also studies a group structure, belief systems, and deals with communication. Economics is similar to sociology because if refers to how societies goods and services are distributed, and how that distribution results in inequality. With political science you study how people govern one another, and how those in power affect people’s lives. Last but not least there’s psychology. Like sociology, psychology studies how people adjust to the difficulties of life. With similarities come all kinds of differences in most cases. Sociologists focus primarily on industrialized societies unlike anthropology which focus on tribal people. Economists and political science focus on more than one social institution, sociology focus on a single institution. Unlike psychologists, sociologists stress factors external to the individual to determine what influences people and how they adjust to life. Psychologists focus on the internal parts of your life. Most of the questions on the common sense quiz were a little shocking. Half of them were really shocking to me. One that surprises me was number two. One thing that really surprises me is the fact that women’s earnings have only gone up slightly. You would think that in the world we live today it would be equal well, to me it should be. It’s been many years since women have not been treated equally. I like to treat everyone equally, that should be the way of life. The fact that crime rate outside of fast-food restaurants is higher than crime rates outside of topless bars is very surprising and somewhat funny. I can see why though, sort of, like it said; topless bars hire security so I guess that’s the reason why the crime rates higher at a place that doesn’t have any security at all. It’s funny because there’s usually a lot of people outside of a fast-food restaurant and what are they going to do run through the drive threw and steal your food. Extensive testing of Islamic terrorist’s shows that they’re more normal then mentally ill. Get out of here, someone that wants to kill their own race and sacrifice themselves is most certainly mentally ill. Ok, there doing it because they think that that’s what there god wants. I just think that someone that wants to sacrifice themselves to their gods is mentally ill; to me it’s just not the way of life. Another one that was shocking to me was that bicyclists today that wear helmets are more likely to have a head injury than the bicyclists that don’t wear a helmet. I can see that the reason why is because the ones that wear the helmet are more likely to do something crazy than the ones without. It just really surprises me cause you think the ones not wearing a helmet would cause more head injuries. I’m terrified to do something crazy on a bike therefore I don’t need a helmet but you should always wear one. In conclusion sociology is a lot more interesting to me than any other science. It studies why we do the things that we do, and why different cultures have different ways of life. I know I’m really going to enjoy the rest of this class and will learn many new things that I never thought of before.

Tuesday, October 22, 2019

1970 Palestinian Hijackings of Three Jets to Jordan

1970 Palestinian Hijackings of Three Jets to Jordan On Sept. 6, 1970, terrorists belonging to the Popular Front for the Liberation of Palestine (PFLP) almost simultaneously hijacked three jetliners shortly after they took off from European airports on routes toward the United States. When hijackers on one plane were foiled, hijackers seized  a fourth jet, diverted it to Cairo, and blew it up. The two other hijacked planes were ordered to a desert airstrip in Jordan known as Dawson Field. Three days later, PFLP hijackers seized another jet and diverted it to the desert strip, which the hijackers called Revolution Field. Most of the 421 passengers and crew on board the three planes in Jordan were freed on Sept. 11, but hijackers held on to 56 hostages, most of them Jewish and American men, and blew up the three jets on Sept. 12. The hijackingspart of 29 hijackings attempted or carried out by Palestinian factions between 1968 and 1977triggered the Jordanian civil war, also known as Black September, as the Palestine Liberation Organization (PLO) and the PFLP attempted to seize control of Jordan from King Hussein. Husseins toppling failed, however, and the hostage crisis was resolved on Sept. 30 when the PFLP released the last six hostages it held in exchange for the release of several Palestinian and Arab prisoners held in European and Israeli jails. The Hijackings: The Five Planes PFLP hijackers seized a total of five planes during their September 1970 operation. The planes were: Sept. 6: El Al Flight 219 from Amsterdam to New York, a Boeing 707 carrying 142 passengers and crew. It was Hijacked by Patrick Argà ¼ello, a Nicaraguan-American doctor, and Leila Khaled, a Palestinian. An Israeli air marshal and passengers on the plane subdued the hijackers, killing Argà ¼ello. The plane landed safely in London. British authorities released Khaled on Sept. 30 as part of a deal for the release of hostages held in Jordan.Sept. 6: Trans World Airlines (TWA) Flight 741, en route from Frankfurt to New York, a Boeing 707 carrying 149 passengers and crew. Hijackers renamed the plane Gaza One and ordered it to the Jordanian airstrip. It was blown up on Sept. 12.Sept. 6: Swissair Flight 100 from Zurich to New York, a DC-8 with 155 passengers and crew. It was over France when hijackers seized it, renamed it Haifa One, and ordered it to Dawson Field in Jordan. It was blown up on Sept. 12.Sept. 6: Pan American Flight 93, a 747 taking off from Amsterdam and carrying 173 passen gers and crew, was ordered to fly to Beirut, even though the international airport there didnt have a runway for 747s. One more PFLP member, an explosives expert, boarded the plane in Beirut. The hijackers then ordered it flown to Cairo, where it landed at 4:23 a.m. and was blown up shortly afterward.The hijackers told us the plane would be blown up, but they said it so politely and with such smiles that we couldnt take this too seriously, Cornelius Van Aalst, the flights service supervisor, told reporters in Cairo, after the ordeal. The hijackers were very friendly, according to Van Aalst, showing exemplary manners and helping to carry an injured woman in a blanket from the plane. Sept. 9: BOAC Flight 775 from Bombay to London, a VC-10, was seized while flying over Lebanon. (The British Overseas Airways Corporation is the forerunner to British Airways.) PFLP hijackers said they had seized the plane as a ransom for the release of Leila Khaled, the foiled hijacker aboard the El Al plane. The BOAC plane carried 117 passengers and crew. It was allowed to land in Beirut, where it refueled, then flew to Dawson Field in Jordan to join the two other hijacked jets there. Why the Hijackings PFLP leader George Habash had planned the hijackings with Wadi Haddad, his lieutenant, in July 1970, when Jordan and Egypt agreed to a cease-fire with Israel that ended the War of Attrition that had stretched back to 1967. Habash, whose militants had been taking part in raids on Israel from the Sinai, Jordan, and Lebanon, was opposed to the settlement. If a settlement is made with Israel, Habash vowed, we will turn the Middle East into a hell. He was true to his word. Habash was in North Korea (on his way home from Beijing), on a shopping trip for weapons, when the hijackings took place. That created confusion over what the hijackers were demanding, as they had no clear spokesman. At one point a hijacker on board the Pan Am flight said the PFLP wanted the release of Sirhan Sirhan, the Palestinian convicted assassin of Senator Robert F. Kennedy in 1968, and serving a life sentence at the California State Prison, Corcoran. The PFLP then submitted a formal list of demands that called for the release of Palestinian and Arab prisoners in European and Israeli jails. There were about 3,000 Palestinian and other Arab individuals in Israeli jails at the time. Over three weeks, hostages were released in tricklesand the hijackers demands were met. On Sept. 30, Britain, Switzerland and West Germany agree to release seven Arab guerillas, including Leila Khaled, the El Al Flight 219 hijacker. Israel also released two Algerians and 10 Libyans. The Jordanian Civil War PLO leader Yasser Arafat seized on the hijackings to go on the offensive in Jordanagainst King Hussein, who nearly abdicated his throne. A Syrian military column was on its way toward Amman, the Jordanian capital, in support of the Palestinian assault. But with the backing of the United States Sixth Fleet in the Mediterranean and even the Israeli military, which was ready to intervene on the kings behalf, Hussein mobilized his forces and turned them against Palestinians in a bloody three-week war. Hussein triumphed, severely weakening the hijackers stance. A turning point in the battleand the hostage crisiswas the Jordanian militarys rescue of 16 British, Swiss and German hostages held captive near Amman.

Monday, October 21, 2019

Animals in Medical Testing essays

Animals in Medical Testing essays The use of animals in research has been key in the development of drugs and treatments, for human and animal illnesses. Vivisection, which is the practice of experimenting on animals, was first utilized by the ancient Greeks who cut the throat of a pig in order to understand swallowing. To study the beating heart, they cut into a live pigs chest (altweb.htm). These ancient experiments had no intention of making the animal feel pain or suffering, but was a sacrifice of a living animal for the sake of understanding. Western civilization can attribute its accomplishments in the field of medicine to the ancient Greeks in part, for their vast knowledge in medicine, which was fueled by innovative minds who obtained knowledge of the human body by those of the animals. Since the initial discoveries in medicine made by the ancient Greeks, researchers and doctors have used animals to learn how the organs and various systems of the body work, leading to the modern sciences we understand and us e today such as physiology, pharmacology, bacteriology, and immunology. Further improvement in the health and welfare of human and animal life and development in the field of medicine requires animals to be the subjects of experiments prior to human experimentation which may result in harm. Not a single person alive has not benefited from vivisection whether it be using aspirin for a headache, toothpaste, or household products such as cleaners, laundry detergent, lotions, and body ointments. Dont you like to know that these products are safe from cancer causing chemicals or other harmful substances which are undetectable to the human eye? And what of the ones we know who live with an illness or medical condition which requires them to take a prescribed drug, dont you like to know that these people have their drugs available to them and that they will reap healthy benefits from them? Nearly 2 billion prescriptions are filled every year in the...

Sunday, October 20, 2019

Are You Creative

Are You Creative Per Steve Jobs: Creativity is just connecting things. When you ask creative people how they did something, they feel a little guilty because they didn’t really do it, they just saw something. It seemed obvious to them after a while. That’s because they were able to connect experiences they’ve had and synthesize new things. Writers question their creativity. They think it ought to be magic, something that travels down and strikes them out of the ether, when in actuality, creativity isnt so esoteric. While we think it just happens, in reality, it is the culmination of our experiences, our education, and our willingness to let loose of the manacles of rules. The more freedom you allow yourself, the greater your chance of creativity. What does that mean? 1) You avoid copying someone else. 2) You dare to be stupid, ridiculous, just down-right liberated from the norm. 3) You forget about embarrassment. 4) You think 100 percent about the creation instead of how well your creative genius can be marketed. Now, nothing says you cannot be creative in marketing/promotion as well. Again, you dont rely heavily on the how-to books, the classes, or the podcasts that tell thousands of people the secret of marketing. Sorry, but it quits being a secret and quits being quite so phenomenally effective when everyone is doing it. The only reason I might glance at those secrets is to figure out how to avoid what they did and forge an entirely different direction. For instance, selling books for free isnt as financially successful as before. I equate the freebie ebook gimmick to the writing about vampires trend that came and went. And if you are writing to any sort of fad, keep in mind that it too shall wane. Allow yourself to be weird, odd, and abnormal. We admire the people who do take the road less traveled and then find success. So why do we then try to be them, following their steps, copying their lessons, shadowing each move they make? Whywhen we ought to be creating our own path? Creativity takes boldness. Shortcuts are simply flashes in a pan and quickly forgotten.

Saturday, October 19, 2019

Retailling and distribution strategy - Analyse two luxury Essay

Retailling and distribution strategy - Analyse two luxury brands.CHANEL and ARMANI - Essay Example But with the increasing income level and also expenditures of the customers’ good branded companies try and move to other parts of the world to expand their business and also to increase their market share. In this report the two fashion brand giants Chanel and Armani have been selected for studying and understanding the internationalisation strategy of the two different companies. Both the companies have got their presence in not only in their parent nations but also in other parts of the world where they have expanded their business in a successful manner. The distribution channel and the marketing strategy followed by the companies while exploring new markets in the global market can be seen with the help of these two brands. It is very important to have a good distribution channel and also a strong marketing strategy for any company to become successful in the global market environment as the amount of competition is very high across the global market and every company is striving hard to move ahead and capture the maximum market share. Chanel is one of well-known fashion brand which is basically from Parisian fashion house. It was been founded by Gabrielle â€Å"Coco† Chanel and is highly recognised in specialisation for luxury goods and haute couture. Chanel has looked to come up with women’s pants, costume jewellery, fashionable dresses and simple suits. Its designs and creations of the dresses have remained same and consistent from many years without any change (Aaker, 2008, pp. 56-64). Chanel highly involves into designing, manufacturing and retailing of beautiful and fashionable dress items and also accessories. It was founded in 1909 and it has its headquarters in Neuilly Sur Seine in France. Chanel has around 200 boutiques spread across different parts of world. Though, Chanel is not that popular as it always has maintained a low profile in the market and

Apple Computer, Inc Essay Example | Topics and Well Written Essays - 500 words

Apple Computer, Inc - Essay Example One of the most widespread SCM definitions explains this kind of management as a crucial business process integration starting from commercial user and including all goods, services and information suppliers, who can add value for any customer or other person concerned. 2005 is going to be a big year for Apple. Soon, we're going to see updated iPods (probably with wifi), updated G5 (possibly with dual core processors and faster speeds), cheaper iMac G5s (where'd the computer go now), wireless media accessories for your home (AirportExpress on steroids) and the operating system that will be leaving most people asking the question - why Microsoft Windows - Apple's OS X 10.4 Tiger expected out next month. Apple is working with its supply chain to find alternatives that are environmentally friendly and provide functionality equal to that of conventional backlight lamps. So let's try to analyze Apple's predatory supply chain with an iPod example. Steve Jobs had made the smart moves, including the small footprint, the iTunes jukebox ease of use, pricing, and the ability to support music, pod casts, and digital photos. This was all before the launch of the new iPod, capable of storing 150 hours of video. But the smartest move was buying most of the world' s supply of flash memory.

Friday, October 18, 2019

B-Corp Business Essay Example | Topics and Well Written Essays - 1000 words

B-Corp Business - Essay Example In order to become a B-Corp, there exists the whole certification process named â€Å"B-Corp Certification†. This certification implies the process of validating the company’s social and environmental performance which is measured through the special impact assessment framework (Bcorporation.net, n.d.). The process of certification has three stages: meet performance requirement; meet legal requirement; and make it official (Bcorporation.net, n.d.). The company’s performance is assessed based on the overall impact which it has on the stakeholders. This assessment is lasting for 1-3 hours, depending on the company’s size, location, and sector in which it operates. Then, one of the B Lab staff members appoints an Assessment Review session in order to clarify questions and enable the company to refine the answers (Bcorporation.net, n.d.). In case the company’s score is between 80-200 points, the B Corp team members provide the applicant with information on how to submit supporting documentation. When Assessment review stage is completed, the company has to complete Disclosure Questionnaire, where it informs about any sensitive practices, sanctions and fines related to this company or its partners (Bcorporation.net, n.d.). While the majority of such disclosures are not essential, there are cases when there are material disclosures which require more attention. In this case, the company’s management will need to provide more information on this issue. Decision about acceptance and membership/participation of the company in the B Corp community is made by the B Lab’s Board of Directors and Standards Advisory Council (Bcorporation.net, n.d.). The B Corp Certification process should be completed every two years. As it has been already mentioned the B Corp community is comprised of more than 1000 businesses. These companies operate in 60 different

Vermont Teddy Bear Research Proposal Example | Topics and Well Written Essays - 500 words

Vermont Teddy Bear - Research Proposal Example Validation of Organizational Vision In specific, it is an understanding that vision and mission of a company plays the most crucial role in providing a fundamental basis to the organization, as well as a sense of strategic understanding to its employees and stakeholders. However, at the same time, it is essential that processes of the organization should be in line with the identified aims and value statements of the company as mission and values provide a virtual roadmap to achieve some target in the future. For this reason, the proposed research will include analysis of mission, objectives, and value statements of Vermont Teddy Bear (VTBC, 2011) along with their comparison analysis with existing strategic processes of the organization. In this regard, website of Vermont Teddy Bear (VTBC, 2011), as well as published brochures and reports will be an efficient way of getting hold of its mission, objectives, and values statements. At the same time, the same resources will be helpful in the evaluation of their implementation and effectiveness in different processes of the organization.

Thursday, October 17, 2019

The History of Film Style. Narrative Structure and Cinematic Style Essay

The History of Film Style. Narrative Structure and Cinematic Style - Essay Example Classical Hollywood Cinematic style was developed in 1917 to 1960 and this style became popular due to international dominance of Hollywood films. Classical Hollywood Cinematic style has attained popularity at the global mainly due to unified driving force behind called as motivational convention. The period in which classical Hollywood films got famous is known as â€Å"Golden age of Hollywood† (Jewell 2007). After Golden age of Hollywood, innumerable films have been produced that have gained popularity at the global level, one of which is seven awards winning recent film entitled as "Lantana". Along with the rise of Classical Hollywood films attention of film professionals also diverted towards arts films during 1960s. Art films involve reflection of high cultural and educational values. These films focus on the authorial expressivity of the director on actions and perceptions of characters. In both types of cinematic work, innovative techniques or styles are used for the de velopment and exploration of new ideas (Jewell 2007). This paper aims to evaluate narrative styles and cinematic techniques of Classical and Art films of Hollywood. Also, most importantly the influence of these styles on New Hollywood and New Australian film directors with reference to an Australian film Lantana (2001) by Ray Lawrence. It is an Australian film that won seven awards and popularity all over the world. In this film, some most prominent traditional stylistics and narrative techniques of classical and art films era have been adopted. The term classic flickers some timeless, great, old, black and white films on our mind screens and these are true stereotypes. However, there are some traditional styles, modes of representation and techniques, which are used to make classical films to awe-inspiring in quality. In almost all classical films an element of â€Å"auteurism† has been observed, which implies that the vision and viewpoint of the director should be clearly r eflect in the film (D. Bordwell 1997). A touch of auteurism has been clearly reflected in the film Lantana (2001) by Ray Lawrence. This touch was noticed with the intensity and analysis of a complex series of relationships in suburban Sydney, and the mysterious crime scenes. In art film cinema different films such as auteur films are presented that clearly depicts viewpoints and perceptions of directors like Classical Hollywood films. An element of "auteurism" was prioritized in both classical and art films of Hollywood. Thus, it is noteworthy here that the new directors have also adopted theory of auteurism in their films that clearly reflects thoughts and ideas of a director. For instance, Lantana movie critics have claimed that the way whole movie has been designed and produced reflects upon the personality analysis of Lawrence, and it can be explicitly observed the way he presented emotional bonds in the film are his own perspectives. Also, film literature has evidenced that the film Picnic at Hanging Rock released in 1975 was based on the Joan Landsey book related to unpredictable disappearance of a schoolgirls. Scholars have written that this was a sharp you turn in the development of Australian cinema, as it was the first quality film in which the theory of Auteurism was applied and as a result Weir became the first director to reflect inferiority of Australian culture (Weir 1975). Radical techniques have been employed to create a sense of profound thoughts through photography, which ensured that photography focus everything in shot and implementation of a â€Å"Mise-en-Scene† stylistic technique allow viewers observe deeply. While using this stylistic

Thomas Hobbes Essay Example | Topics and Well Written Essays - 500 words

Thomas Hobbes - Essay Example Contrarily, by the theory of his equality and the seed of superiority already existent within everyman becomes the eternal hamartia, which clashes with the very idea of the "common power" that man tries to bind the others into, where each will always try to supercede the other. "Warre" is the result of every man trying to hold every other man in awe! The will is not inclined towards any disposition and everybody is live "without security" and depends on his own individual strength, which only makes his life "nasty, brutish and short.". However, Hobbes points out that these acts of passion and desire that override man's nature and make him abuse one another are no sin and are only viewed as wrong when measured against some Law that makes it look so. Thus, he talks about man's nature pitted against the Law that can only be laid down when it agrees with man and which then gives man the consciousness of it's existence and what it forbids. Therefore, where there is no law or no consciousness of what is forbidden (he takes the example of primitive America ruled by savages) where the notions of justice and injustice have no place because they are not part of any faculty of the mind or the body.

Wednesday, October 16, 2019

The History of Film Style. Narrative Structure and Cinematic Style Essay

The History of Film Style. Narrative Structure and Cinematic Style - Essay Example Classical Hollywood Cinematic style was developed in 1917 to 1960 and this style became popular due to international dominance of Hollywood films. Classical Hollywood Cinematic style has attained popularity at the global mainly due to unified driving force behind called as motivational convention. The period in which classical Hollywood films got famous is known as â€Å"Golden age of Hollywood† (Jewell 2007). After Golden age of Hollywood, innumerable films have been produced that have gained popularity at the global level, one of which is seven awards winning recent film entitled as "Lantana". Along with the rise of Classical Hollywood films attention of film professionals also diverted towards arts films during 1960s. Art films involve reflection of high cultural and educational values. These films focus on the authorial expressivity of the director on actions and perceptions of characters. In both types of cinematic work, innovative techniques or styles are used for the de velopment and exploration of new ideas (Jewell 2007). This paper aims to evaluate narrative styles and cinematic techniques of Classical and Art films of Hollywood. Also, most importantly the influence of these styles on New Hollywood and New Australian film directors with reference to an Australian film Lantana (2001) by Ray Lawrence. It is an Australian film that won seven awards and popularity all over the world. In this film, some most prominent traditional stylistics and narrative techniques of classical and art films era have been adopted. The term classic flickers some timeless, great, old, black and white films on our mind screens and these are true stereotypes. However, there are some traditional styles, modes of representation and techniques, which are used to make classical films to awe-inspiring in quality. In almost all classical films an element of â€Å"auteurism† has been observed, which implies that the vision and viewpoint of the director should be clearly r eflect in the film (D. Bordwell 1997). A touch of auteurism has been clearly reflected in the film Lantana (2001) by Ray Lawrence. This touch was noticed with the intensity and analysis of a complex series of relationships in suburban Sydney, and the mysterious crime scenes. In art film cinema different films such as auteur films are presented that clearly depicts viewpoints and perceptions of directors like Classical Hollywood films. An element of "auteurism" was prioritized in both classical and art films of Hollywood. Thus, it is noteworthy here that the new directors have also adopted theory of auteurism in their films that clearly reflects thoughts and ideas of a director. For instance, Lantana movie critics have claimed that the way whole movie has been designed and produced reflects upon the personality analysis of Lawrence, and it can be explicitly observed the way he presented emotional bonds in the film are his own perspectives. Also, film literature has evidenced that the film Picnic at Hanging Rock released in 1975 was based on the Joan Landsey book related to unpredictable disappearance of a schoolgirls. Scholars have written that this was a sharp you turn in the development of Australian cinema, as it was the first quality film in which the theory of Auteurism was applied and as a result Weir became the first director to reflect inferiority of Australian culture (Weir 1975). Radical techniques have been employed to create a sense of profound thoughts through photography, which ensured that photography focus everything in shot and implementation of a â€Å"Mise-en-Scene† stylistic technique allow viewers observe deeply. While using this stylistic

Tuesday, October 15, 2019

Short Answers Essay Example | Topics and Well Written Essays - 500 words - 1

Short Answers - Essay Example (Mulvey, 1989) The growing theory of the spectacle is old to be remarkably striking in old English, and making important classifications of the theory itself. This is attained powerfully by the changing scenerior of an inspirational moment, powerfully explored by the situationsits approach, known by its distinct approach to environmental challenges. The concept is derived from the growing list of the societal understanding of built intellectualism. The shocks that were historical identified explore remarkable moments, which are fascinating and are unique especially when important derivatives remarkably involving good moments and good political landscapes. Particular words are uniquely important and their meanings are hugely significant to the cultures that explore them. Writings as explained by various philosophers are based on changing linguistic trends, and which are meaningfully explored through generations and through periods of change. Denotative and connotative meaning provides various angle derivatives that are best known for semiotics or in other instances semiology. Semiotics is old linguistics that is defined in today’s language as the core concept within which concepts of language are established. The finger derivative in a signifier provides a lasting solution to word changes, making visual derivatives at various points. Denotative is defined by a signifier and which identify an obvious meaning of a specific sign. For example in accordance with a camouflaged statement, the obvious theory is to provide a conventionally agreeable statement that is also referred to as the first order signification. On the other hand, connotative meaning offers the socio-cultural as well as the personal associations relative to emotional, ideological levels of the given sign. The theories defining the visual culture are defined by

Monday, October 14, 2019

Psychology Adrian Monk Essay Example for Free

Psychology Adrian Monk Essay Adrian Monk, portrayed by actor Tony Shalhoub, is the main character in the USA Network series MONK. Monk is a former homicide detective for the San Francisco Police Department, suffering from an anxiety disorder known as obsessive-compulsive disorder (OCD), as well as numerous phobias. After Monk’s wife was murdered, his disorder worsened leading to his suspension from the police force. When the series opens, Monk works as a private police homicide consultant and undergoes therapy to overcome his anxiety disorder and phobias. He is assisted by a private nurse who helps him cope with his disability on the job. Part One—Case Study Character Background The episode â€Å"Happy Birthday Mr. Monk† shows that Monk, born October, 17, 1959, is a California man of Welsh ancestry. Monk is 50 years old, and was born in Marin County, CA. He stated, â€Å"His alma mater is the University of California, Berkley. † His parents were very strict and authoritarian. Monk’s father Jack Monk abandoned the family when Monk was eight years old. Jack said that he was going to get Chinese food, but he never came back. Ambrose Monk, Monk’s brother, is agoraphobic and afraid to go out in public. Monk’s mom died in 1994. Because of these childhood family events, Monk is already a very sensitive and fragile person. Mr. Monk dislikes unorganized, rude, dirty, and filthy people. He also dislikes murderers, people who commit evil acts, and criminals on the loose. That is the reason he became a homicide detective. Mr. Monk likes people who help others, such as his physician and Trudy. In addition, he likes organized, clean, and tidy people. Mr. Monk’s strength is that he is a very clever detective. Plus, he has an amazing photographic memory, which helps him catch criminals. His weakness is that he has many phobias, which affect his performance as a detective. Mr. Monk doesn’t have any friends because of the weird and odd behaviors caused by his OCD. His family consists of his assistants/nurses Sharona, and then Natalie. He also works with people in the homicide department, namely Captain Leland Stottlemeyer and Lieutenant Randy Disher. Stressors/Pathology Mr. Monk does not have any relationships with anyone, mainly because of his odd behaviors. He acts strangely in front people because of his OCD. In the episode â€Å"Mr. Monk Makes A New Friend† he annoys a new friend by calling him too much. Monk explains himself, stating, â€Å"I can’t not call him or hear his voice. † It is very annoying to call a friend every hour. That is one example of how Mr. Monk has difficulty with personal relationships. His wife, Trudy Monk, with whom he had a meaningful relationship, died in a car bomb. Before his wife’s death, Mr. Monk’s OCD symptoms had alleviated. After Trudy was murdered, the OCD symptoms intensified, and those around him could clearly see that he had issues, which affected his job performance and led to his isolation. When the series begins, Mr. Monk’s condition is somewhat stable, but his lives in an overly organized apartment. The battle Monk faces daily is how to make it through the day with his OCD. He tries to avoid everything that makes him uncomfortable or is viewed as a threat. Mr. Monk stresses over the fact that every room must be neat and tidy. Plus everything must be a multiple of 10; for example he buys a box of eggs, which contains 12 eggs and deliberately throws two eggs away. Mr. Monk doesn’t have any history of this disorder, but his brother was agoraphobic. Symptoms Other symptoms of OCD manifest themselves typically as ritual behavior such as repetitive hand washing. Mr. Monk needs to wash his hands every time he touches an object or shakes a hand. He becomes obsessed with shapes. For example, his toast has to be a perfect square. Numbers occupy his time. As mentioned above, everything must come in multiples of 10. He has the typical preoccupation with dirt and germs. For example, he can’t stay in an untidy or dirty room; he has to tidy it up. Mr. Monk is terrified of germs, milk, dust, and heights. So what Mr. Monk does all day is try to stay away from all of these fears. These symptoms never emerged in the series; rather, the viewer is led to believe that Mr. Monk had OCD since he was born. However, the viewer is also informed in conversations with the police sergeant and with Monk’s nurse and therapist that what triggered this disorder was the murder of his wife. Immediately after his wife died, his disorder worsened. Outcome of Case Monk’s treatment was to go to Dr. Charles Kroger for psychotherapy that would aid him to cope with his disorder. In the sessions, Mr. Monk talks about what he did during the day and the goals he accomplished. The treatment is not entirely effective, but it helps Mr. Monk relax and get all the stress out. In the long term, Mr. Monk cannot overcome his disorder because he cannot imagine that he can be cured. In addition, he is not a risk taker, meaning he could never do anything that would make him uncomfortable. Because of this, there is little hope that he will be able to completely overcome his disorder. This makes sense because his disorder is inherited, and not attributed to environmental causes. Part Two—Disease Diagnostic Criteria Obsessive Compulsive Disorder (OCD) is a pattern of recurring obsessions and compulsions that are severe enough to be time consuming and interfere with a person’s daily functioning. They must cause marked distress (such as pain or physical harm to the person) or significant impairment. Usually, they take more than one hour of a person’s time. It is important to specify whether or not the patient has poor insight, meaning that the person does not realize that the obsessions or compulsions are unreasonable or excessive. At some point, the person must realize that their obsessions and compulsions are not reasonable (i. e. , normal). â€Å"Obsessions are consistent ideas, thoughts, impulses, or images that are experienced as intrusive and inappropriate and that cause marked anxiety or stress† (DSM IV-TR, 300. 3). Most common obsessions are about contamination with dirt or germs, repeated doubts, a need to have things in a particular order, horrible impulse, the need to shout obscene words, or sexual impulses. Compulsions are repetitive behaviors which people do to reduce the anxiety or distress of the obsessions. For example, repeated hand washing is a compulsion, which satisfies the obsession of repeated thoughts of contamination from dirt. For a complete list of Diagnostic Criteria from the DSM IV-TR, see Appendix A. Etiology (Causes) Nearly 1 to 2 percent of the population suffers from OCD. Most of those begin to be afflicted in early adulthood, and it is often preceded by a particularly stressful event such as pregnancy, childbirth, or family conflict. It may be closely associated with depression, with the disorder developing soon after a bout of depression or the depression developing as a  result of the disorder. Men and women are equally affected. A fairly high proportion (as much as 50 percent) do not marry (Baldridge 2001). Although Obsessive-Compulsive Disorder usually begins in adolescence or early adulthood, it may begin in childhood. Modal age at onset is earlier in males than in females: between ages 6 and 15 years for males and between ages 20 and 29 years for females. For the most part, onset is gradual, but acute onset has been noted in some cases. The majority of individuals have a chronic waxing and waning course, with exacerbation of symptoms that may be related to stress. About 15% show progressive deterioration in occupational and social functioning. About 5% have an episodic course with minimal or no symptoms between episodes (DSM IV-TR, 300. 3) No cause for OCD has been isolated. Four theories exist which try to explain the basis of OCD psychologically: guilt, anxiety, and superstition. 1) The theory of guilt has its origins in Freudian psychoanalysis. Freud believed that patients with OCD developed repetitive rituals, such as hand washing, to replace obsessive thoughts about sex. The obsessive ritual, then, was seen as a way to replace the guilt of being overwhelmed by forbidden, sexual thoughts. 2) The anxiety hypothesis poses that OCD behaviors develop to reduce anxiety. Many thought or action patterns emerge as a way of escape from stress, such as daydreaming during an exam or cleaning one’s room rather than studying for a test. If the stress is long lasting, then a compulsive behavior may set in. 3) The superstition theory proposes a connection between a chance association and a reinforcer that induces a continuation of that behavior. In other words, a particular obsessive-compulsive ritual may be reinforced when a positive outcome follows the behavior; anxiety results when the ritual is interrupted. 4) A fourth theory is accepted by those who believe that mental disorders are the result of something physically or physiologically amiss in the sufferer, employing data from brain structure studies, genetics, and biochemistry. Brain chemistry has been found to be altered in those suffering from OCD, along with increased metabolic activity. In addition, relatives of OCD sufferers are twice as likely as unrelated individuals to develop the same disorder, indicating that the tendency for the behavior could be inheritable (Baldridge 2001). Treatments OCD is one of the most difficult disorders to treat. Treatments usually fall into four categories: psychotherapy, behavioral therapy, drug therapy, and psychosurgery. The goal of psychotherapy in treating OCD is to find and then remove an assumed repression so that the patient can deal honestly and openly with whatever is actually feared. It is hoped that in dealing with the fear, the compulsions that have developed to replace the fear will lessen. The most effective type of psychotherapy for obsessive-compulsive disorder is behavioral therapy. It can help by desensitizing the patient to the feared object or situation. For example, the therapist will aid the patient in replacing the symptoms of the obsession or compulsion with preventive or replacement actions, such as a non vocal, internal shout of â€Å"stop! † when obsessive thoughts enter the mind or the action of snapping a rubber band on the wrist. Behavioral therapy may also help by gradually lengthening the time between the stimulus and response. For example, a patient may hold dirt and then gradually lengthen the amount of time after which he or she will wash his or her hands. While behavioral treatment can help to control OCD, it does not â€Å"cure† the disorder. Drugs used to treat OCD include antidepressants, tricyclic, monoamine oxidase inhibitors (MAOIs), LDS, and tryptophan. Antidepressants help by reducing depression by correcting the serotonin abnormality in the brain, which may decrease the need for compulsive behavior. MAOIs may help OCD associated with panic attacks, phobias, and severe anxiety. With drug therapy, it should be noted that when the drugs are stopped, the patient often returns to the obsessive-compulsive behavior. Psychosurgery to reduce OCD is a last resort. The patient would undergo a lobotomy in which the frontal cortex would be separated from the lower brain area in an 8-centimeter square area. A combination of behavioral therapy, psychotherapy and drug therapy is recommended. General Research Behavioral treatments are new ways to deal with the disorder. For example, someone with an obsession about germs might be asked to practice handling dirt and then not washing his hands for increasing lengths of time. With repeated exposure to the anxiety-provoking object or situation without performing the compulsion, usually the anxiety lessens, and the compulsion weakens its hold. Obsessions can fall into one of five categories: 1. Obsessive doubts, which are persistent doubts that a task has been completed. 2. Obsessive thinking, which is an almost infinite chain of thought, targeting future events. Obsessive impulses, which are very strong urges to perform certain actions, whether they be trivial or serious, that would likely be harmful to the obsessive person or someone else and that are socially unacceptable. 4. Obsessive fears, which are thoughts that the person has lost control and will act in some way that will cause public embarrassment. 5. Obsessive images, which are continued visual pictures of either a real or an imagined event. (DSM IV-TR, 300. 3) Compulsions on the other hand are repeated, ritualized behaviors. For example, fearing one has forgotten to turn off an appliance, such as a stove, is a common obsession. It is likely to be accompanied by a compulsion to check repeatedly, perhaps hundreds of times each day, perhaps to see if the appliance has been turned off. Compulsions are repetitive behaviors, the goal of which is to prevent or reduce anxiety or distress, not to provide pleasure or gratification. In most cases, the person feels driven to perform the compulsion to reduce the distress that accompanies an obsession or to prevent some dreaded event or situation. For example, those with obsessions about being contaminated may reduce their mental distress by washing their hands until their skin is raw. There is difference between OCD and obsessive-compulsive personality disorder (OCPD). A personality disorder is, on the one hand, a type of mental illness characterized by serious and persistent distortions in the total personality. Every perception, attitude, feeling and behavior is affected. OCD, on the other hand, is an anxiety disorder. Like other anxiety disorders, fear is at its root—fear of a hot appliance burning down the house, for example, or fear of the body being contaminated by germs. The fear produces an anxiety which can only be alleviated by a ritual, or compulsion, which will reduce the fear. Conclusion Evaluation of Case In conclusion, Adrian Monk has Obsessive-Compulsive Disorder. He satisfies the following OCD patterns of behavior: 1. Washer, because he is afraid of contamination; 2. Checker, because Mr. Monk repeatedly checks if the door is locked, or whether the oven is turned off. Mr. Monk checks everything a dozen time just to make sure. For example, he checks his oven if it is closed everyday at least twelve times; 3. Arranger, because he always arranges his utensils based on size and shape and his books based on color. He cannot function in a messy room or disorganized room. In addition, Mr. Monk has other phobias, such as fear of blood and fear of the woods. He is terrified of germs, milk, heights, and spiders. Mr. Monk has a rule that everything he has must come as a multiple of ten. When he buys milk, he gets 10 bottles even though he lives alone and the milk will expire before he has time to drink it all. Monk’s symptoms may improve with therapy, but his OCD will not completely resolve.

Sunday, October 13, 2019

Colgate-Palmolive Essay -- Business, Oral Hygiene

Companies use promotional strategies to gain customers and sales. Colgate-Palmolive use different strategies to help increase their sales. While many companies have decreased advertising spending Colgate-Palmolive is one company that has increased advertising spending (Neff & York, 2008). This paper will discuss the current promotional strategies of Colgate-Palmolive. This paper will also discuss the integrated marketing communications (IMC) and make recommendations for the strategies used. Current Promotional Strategies According to Kotler and Keller (2009) â€Å"sales promotion is a key ingredient in marketing campaigns, consists of a collection of incentive tools, mostly short term, designed to stimulate quicker or greater purchase of particular products or services by consumers or the trade.† Colgate-Palmolive offers several promotions to increase sales. Consumers can find coupons and special offers on the company’s website. Consumers can also find sweepstakes and special promotions on the company website (Colgate, 2011). The company uses point of purchase displays to gain those impulse buyers. The company also provides free samples to dentists and other institutions. IMC There are several forms of communication that companies use to sell and brand their product. The company has relied heavily on broadcast advertisements. Commercials have been their main source of advertisement and where most of the advertising budget is used. The company also uses print advertisements in magazines and newspapers. In store displays and point of purchase displays are an advertising tool that the company has used too. The company found that point of purchase displays produced a higher percentage of sales (Quelch & Laidler, 201... ... consumers are not aware of what organizations the company is involved with and the many ways the company gives back to the community. More and more consumers want to purchase items from a company that is a friend to the environment and gives back to the community. Conclusion The company does not only focus on innovative products, but also look for innovative ways to advertise. The company has used traditional methods of advertising such as television commercials and magazine advertisements. The company also uses coupons to give customers incentives to buy their product. The company’s advertising has been very successful, but could use a little improvement. Not many consumers are aware of all that the company does and offers in the community. By spreading the word on the different charities and organizations the company could gain more recognition.

Saturday, October 12, 2019

Florida and the Future of Gay Adoption Essay -- Homosexual Children Pa

Florida and the Future of Gay Adoption The line between public and private is quickly diminishing, if there ever was a line to start. Private ideologies (social and moral/ethical attitudes) have been made public by what legislation does (not) relegate, and then protects the right to privacy for the individuals who abide by these private ideologies. The intrinsic protection of adherents to a dominant ideology forces those with deviant ideology to actively make their private concerns public in order to be granted their "right to privacy." However, even after this guarantee it is not possible for the private to leave the public sphere until the dominant ideology changes radically to incorporate these rights at the same intrinsic level of the original ideology- meaning the right to privacy has to be constantly reiterated until the societal backing makes it dominant. In the case of human and civil rights, legislation has the obligation to intercede on behalf of those disenfranchised by laws, regardless of the impact of or on s ocial attitudes. Once the issue of gay adoption entered the public sphere (i.e. when gay couples were first singled out by the state as ineligible), the only possible way to ensure that these individuals rights would be protected and that one day the rights of all homosexual individuals and couples to adopt would be guaranteed was for the issue to come before the Supreme Court. It is fortunate that the law was not overturned in a lower court, because the decision would not carry the weight of one handed down by the Supreme Court. Florida State Adoption Logo (7). Florida state law currently bans lesbians and gay men from adopting children, preferring rigorously gendered family construction, as is made p... ...al in Challenge to Florida Gay Adoption Ban." American Civil Liberties Union website. 3)Lambda Legal website, "Background on Lambda Legal's Supreme Court Case Challenging Texas's "Homosexual Conduct" Law." 4)"Anita Bryant, b.1940, Singer and Crusader." , St. Petersburg Times Online. 5)"Lawrence & Garner v. State of Texas." , SodomyLaws.org 6)ACLU Lesbian and Gay Rights Project, "Let Him Stay" 7)My Florida Website, The State of Florida's Website 8)Pennsylvania Adoption Exchange, Pennsylvania Adoption Exchange Homepage 9)Lexis Nexis, "U.S. Appeals Court Narrowly Upholds Only Blanket Gay Adoption Ban." The Associated Press State & Local Wire. 10)Human Rights Campaign website, "What's Happening in My State?" Butler, Judith. "Imitation and Gender Insubordination." Inside/Out: Lesbian Theories, Gay Theories. New York: Routledge, 1991. 13-31.

Friday, October 11, 2019

Windhorse Farms

Terry Houston MBA 522-1b2 Professor Watson November 27, 2012 Executive Summary The contents of this case analysis include an overall purpose to provide you, Professor Watson, with an understanding of the business problem that Jim Drescher, owner of Windhorse Farm, must make in a matter of a few days. Without rehashing much of the information that was explained within the case, the bottom line is that Mr. Drescher and his wife must identify how they intend to continue making money owning the farm without them supervising the business anymore.The reason being, that they are reaching a point in their lives that require retirement and realization that they will not be around forever. Problem Statement Above much, the farm is faced with a few main decisions as to how to attack this problem. Among these involve him deciding which product lines he needs to grow, maintain, and/or harvest. This case analysis will identify what alternatives that Mr. Drescher should consider in going forward, c onsidering the â€Å"four filters† (economic, environmental, social, and spiritual impacts) in conjunction with my recommendation on what I feel he should decide to do.Analysis of Situation Acadian Forest Region The case highlights the importance of the Acadian forest region. Throughout the life of Mr. Drescher’s ownership of the farm, over 95 per cent of the harvesting in the region resulted from cutting trees down, making it 1 of the 6 endangered forests in North America. This comes at an ethical and environmental cost for the farm. Because of the situation, the Dreschers have decided to implement sustainability practices within the region. Among these practices include educating the public about the situation and farm goals through Windhorse Farm School and having â€Å"Open Farm Days†.They also implemented organic gardening and alternative energy generation. Because of these newly adopted practices, market interest for continuity of such actions have increas ed and continuing to do so. Wood Products Manufacturing Eco-Woodshop is the main source of income for Windhorse Farm, due to the differentiation and advantage of competition that the farm has. The Dreschers have low overhead costs because they own the farm lands, making it more than possible to make a solid income. Tonewoods Guitar instruments makes up the large majority of wooden instruments made.Of those guitars, those made from red spruce tonewood proved to be the money makers. Yet still, producing these instruments added the economic and social costs of cutting more and more trees down. In addition, it would take the farm to sell about 200 tops annually just to break even, while in their best year, they’ve sold only 25. Having even the opportunity to be successful in this market requires Mr. Drescher to hire a subject matter expert/organization that had beliefs consistent with the culture of the rest of the farm as well as alternative tonewood that would sell, costing eve n more money. Evaluation of AlternativesWithin the case, Mr. Drescher understands that the bulk of what his decision comes down to is of two categories. With regards to tonewood, he had to decide if it’d be better to grow the business or exit the market entirely. Growing the business required careful planning for the future. He also needed to identify the marketing of construction/architectural products. Doing so would require him to either grow the business, leveraging green products, or sell, thus making the business fulfill more of a raw material supplying role. Decision/Recommendation There’s obviously a lot going on within each option.However, it is in my humble opinion that Mr. Drescher and Windhorse Farm should continue its current operation with its Eco- Woodshop. For many years now, the operation has proven to be profitable, allowing the business to stay afloat. Along with the successful application of the various sustainability practices I’ve previousl y mentioned, there proves to be a bright future for the farm. Accordingly, making the public aware of important environmental factors of sustaining a forest region and providing green alternative avenues to do so will only improve the external and internal morality of the farm, in consideration of the â€Å"four filters. Simply â€Å"testing the waters† for guitar production will not prove to be enough in considering tonewood. In comparison to the Eco-woodshop operation, tonewood business success is far riskier. Even in considering another organization that can take the helm for Mr. Drescher to do well in this business, it would still come at more of a â€Å"four filter† cost than the Eco-woodshop operation and its sustainability practices ever could. Simply put, the majority of the culture for the farm would need to change completely, which is something I believe Mr. and Mrs. Drescher are not willing to do.

Thursday, October 10, 2019

Network Security Plan Essay

INTRODUCTION (Purpose and Intent) The Corporation Tech IT Network Security Plan establishes guidelines for IT practices used on a day to day basis to provide a secure and robust computing environment. These practices are used in order to protect the mission, operation, and reputation of Corporation Tech System and its information systems. These system security policies, standards, and procedures that have been established for the Corporation Tech System, are intended to comply with the regulations and policies set down by the State of Florida, Corporation Tech, and the Federal Information Security Management Act (FISMA). SCOPE These standards and procedures apply to all information systems and resources under the control of Corporation Tech, including all computers connecting to the Corporation Tech network and all Corporation Tech System employees, contractors, and any other individuals who use and/or administer those systems and computers, particularly those involved with information system management. STANDARD PROVISIONS Corporation Tech IT will manage risk by identifying, evaluating, controlling, and mitigating vulnerabilities that are a potential threat to the data and information systems under its control. User accounts and passwords are implemented to maintain individual accountability for network resource usage. Any user who obtains an account and password for accessing a Corporation Tech provided resource, is required to keep these credentials confidential. Users of these systems may only use the accounts and passwords for which they have been assigned and authorized to use, and are prohibited  from using the network to access these systems through any other means. This plan also prohibits the sharing of personal user accounts or passwords for accessing Corporation Tech or Internet computing resources. In the interest of maintaining account security, passwords will be changed on a regular schedule or anytime the integrity of the account is in question. Corporation Tech IT network or computing resources may not be used for personal commercial purposes, for personal profit or to violate the laws and regulations of the United States or any other nation, or the laws and regulations of any state, city, province or other local jurisdiction in any material way. Use of Corporation Tech resources for any illegal activity may result in loss of network access privileges, official reprimand, suspension or dismissal. Corporation Tech will cooperate with any legitimate law enforcement agency or inquiry in the investigation and prosecution of any alleged wrongful activity. Corporation Tech’s network or Internet facilities may not be used to disable or overload any computer system or network, or to circumvent any system intended to protect the privacy or security of another user. Corporation Tech owned networking and communications equipment, may only be moved by Network and Computing Support staff, or authorized agents. Reconfiguration of network hardware or software, except by designated individuals within IT, is strictly prohibited. Prior to connecting any server, network communication or monitoring device to the Corporation Tech Network, approval must be obtained from Data Center Communications. Attachment of any the following devices to the Corporation Tech network, other than those provided or approved by Network and Computing Support, is strictly prohibited: a. DHCP servers. b. DNS servers. c. NAT routers. d. Network Gateways. e. Packet capturing or network monitoring devices. f. Any device that disrupts or negatively impacts network operations. STATEMENT OF PROCEDURES The procedures for conducting a risk assessment and for the control and mitigation of risks to the Corporation Tech Information Systems include: NETWORK CONTROL Corporation Tech IT has software and systems in place that have the ability to monitor and record network, Internet and computer system usage. This includes monitoring and security systems that are capable of recording network traffic, including traffic to World Wide Web sites, chat rooms, newsgroups and e-mail messages, file servers, telnet sessions and file transfers into and out of our internal networks. This capability is necessary in order to maintain the health of Corporation Tech network operations and diagnose network related problems. Corporation Tech IT reserves the right to perform network monitoring at any time. The information collected may be used by technicians and management to assess network utilization and trends, and may also be provided to upper management or other authorities as evidence as part of any investigation of alleged policy violations. Corporation Tech IT reserves the right to perform periodic port scans, segment sweeps, and vulnerability scans on all network segments. Network operations, functions, and resources, which are not required as part of the normal and approved job duties or projects at Corporation Tech, may be bandwidth limited or blocked by network control devices in order to protect the integrity and availability of the overall system. Corporation Tech IT may suspend network access to any location or system that disrupts normal network operations or systems that violate Corporation Tech policy. In this event, an attempt will be made to contact the responsible individual to resolve the problem. DHCP SERVICES Corporation Tech IT provides centralized and redundant DHCP and DNS services for Corporation Tech. Due to the nature of these services, and because of the potential disruption of service and possible security breaches resulting from incorrect setup of additional systems, attachment of unauthorized DHCP or DNS servers is prohibited. The following guidelines must be followed when requesting or using any DHCP or DNS services: †¢ Systems requiring an IP address must support DHCP and be capable of obtaining DHCP address information from one of the centrally administered University DHCP servers. †¢ Using DHCP, devices requesting an IP address will be assigned a dynamic pool address from the subnet to which the device is attached. Devices with dynamically assigned IP addresses may have their address change. †¢ Static IP addresses needed for server class machines or specialized clients must be  requested from the Data Center Communications Team via a Help Desk ticket. DNS SERVICES User workstations, which have been assigned a dynamic pool IP address, will have an associated DNS name assigned by the network. Any DNS name or domain name that is to be associated with Corporation Tech network, must be requested from and/or registered through Web Services. DNS names ending in corptech.com are made available upon request for Corporation Tech approved services. Requests for assignment of DNS names must be for valid Corporation Tech related purposes. DNS names for domains other than corptech.com, and which are to be hosted by Corporation Tech systems, must be requested from Web Services. Any charges for initial or ongoing registration of the requested name are the responsibility of the requestor. DNS names, not in the corptech.com domain, will be handled on a case by case basis. Corporation Tech IT will work with any user requesting a domain name to identify an appropriate and available name, however Corporation Tech IT has final approval for all DNS name assignments. WIRELESS NETWORK SERVICES Because wireless networks can be used to provide access to the same resources and services as wired network systems, the same basic procedures that are used in a wired network environment can also be applied in a wireless network environment. However, due to the nature of wireless networks, additional security and control mechanisms are needed in order to maintain the security, operation and inter-operability of both traditional and wireless systems. Wireless routers are not allowed on the Corporation Tech network unless they have been approved by Corporation Tech IT. Access to the Corporation Tech Wireless network is limited to individuals who have a Corporation Tech account except in locations where the guest network is available. The Corporation Tech Guest Network is segregated from the internal servers and resources used by authenticated users to keep the network secure. The Corporation Tech Guest Network is only available in approved areas, and require a request to be expanded into any other areas. Users of the Corporation Tech Guest Network are required to provide a valid cell phone number in order to authenticate. Destruction and Disposal of Information and Devices Restricted information must be disposed of in such manner as to ensure it cannot be retrieved and recovered by unauthorized persons. When donating, selling, transferring, surplusing or disposing of computers or removable media (such as DVDs), the proper procedures to make data unreadable on those media will be taken. Acceptable procedures are listed on ISSP-009, â€Å"Medial Disposal.† NETWORK ACCESS Anyone who uses the Corporation Tech computing environment must have appropriate status (e.g. management, employee, staff, or authorized third party) and must be properly authenticated when required. Access will be provided to vendors and or other Corporation Tech partners through the sponsored VIP account process, as described on http://www.corptech.com/it/services/vip.aspx. VIP accounts are reviewed and renewed on six month intervals to see if access is still needed. When an employee leaves the organization accounts will be disabled once TERM status is updated, and individual departments must approve re-activation of account access. USER COMPUTING DEVICES Users are responsible for the security and integrity of Corporation Tech information stored on their workstation, which includes controlling physical and network access to the equipment. Users may not run or otherwise configure software or hardware that may allow access by unauthorized users. Anti-virus software must be installed on all workstations that connect to the Corporation Tech Network. Corporation Tech Computers may not be used to copy, distribute, share, download, or upload any copyrighted material without the permission of the copyright owner. PHYSICAL ACCESS Access to Corporation Tech IT Data Center should be restricted to those responsible for operation and maintenance. Access by non-IT personnel is not permitted unless they are escorted by an authorized IT staff member. Computer installations should provide reasonable security measures to protect the computer system against natural disasters, accidents, loss or fluctuation of electrical power, and sabotage. Networking and computing hardware are placed in secure and appropriately cooled areas for data  integrity and security NETWORK HARDWARE Network hardware are housed behind a locked door to protect physical access to switches and other network hardware. Access is only allowed though card access or with a checked out key. All switches and network hardware are password protected at a minimum via a local account setup on the device itself, these passwords are changed periodically as administrators leave the organization. Subnets allowed to authenticate with switch management will be restricted, to create tighter control of backend administration. Exec level access Timeouts implemented on Console and VTY lines, so that any idle sessions are terminated automatically. All switches are time synced using NTP, so that incidents can be tracked and correlated to the proper timeframe. SERVER ENVIRONMENTS All servers are subject to a security audit and evaluation before they are placed into production. Administrative access to servers must be password protected and use two-factor authentication whenever possible. Servers should be physically located in an access-controlled environment. All internal servers deployed at Corporation Tech must be owned by an operational group that is responsible for system administration. Servers must be registered with the IT department. At a minimum, the following information is required to positively identify the point of contact: a. Server owner contact(s) and location. b. Hardware and Operating System/Version c. Main functions and applications d. MAC address (If not a virtual server) Services and applications that will not be used must be disabled where practical. Access to services should be logged and/or protected through access-control methods to the extent possible. The most recent security patches must be installed on the system as soon as practical. Do not use administrator or root access when a non-privileged account can be used. Privileged access must be performed over secure channels, (e.g., encrypted network connections using SSH or IPSec). EXCEPTIONS All requests for exceptions to these standards and procedures will be handled by request, and will follow these guidelines: †¢ Must be submitted in writing to and approved by the CIO or with the proper authority. †¢ Will be reviewed on a case by case basis. NETWORK SECURITY Corporation Tech network design is built around three principles, Defense-in-Depth, Compartmentalization of Information and Principle of Least Privilege. Our first step was to look at what we are protecting, which is ultimately our business and clients data and information. To ensure a sound architecture we started the design of our network with scalability in mind. It is important that our design is flexible enough to meet future needs. The threats we know about and face today may not be the ones we face tomorrow. While developing security requirements for our IT system resources, we will determine if they are mission-critical or data-sensitive resources. This will allow us to determine where data confidentiality and integrity are the most important requirements, or where the priority is continuity of operation (availability). DEFENSE-IN-DEPTH Network safeguards offer the first protection barrier of IT system resources against threats originating outside the network. These threats can be in the form of intruders or malicious code. Our network design offers layered protections. What this means is the security layers complement each other; what one misses the other catches. This will be accomplished by locating security defenses in different places throughout our IT system, as well as not using two of the same types of safeguards. Although this may increase the complexity of our security system and can potentially make management and maintenance more difficult and costly, we believe the safety of the IT system resources should be based on the protection. With defense-in-depth in mind, the first layer of our network security plan starts with our network perimeter security. The principle network security defenses are firewalls, intrusion detection and prevention systems (IPS/IDS), VPN protections and content inspection systems like anti-virus, anti-malware, anti-spam and URL filtering. The traditional first line of defense against attacks is typically the firewall, which is configured to allow/deny traffic by  source/destination IP, port or protocol. It’s very straight forward, either traffic is allowed or it’s blocked. With the advent of Next Generation firewalls, which can include application control, identity awareness and other capabilities such as IPS, web filtering, and advanced malware detection, all of these features can be controlled by one device. COMPARTMENTALIZATION OF INFORMATION Corporation Tech will have IT system resources with different sensitivity levels or different risk tolerance levels and threat susceptibilities. These resources should be located in different security zones. The idea is to hide the data or information and make it available only to those systems where it is necessary for conducting system tasks. Examples of this are: †¢ E-mail, Web and DNS servers are located in the DMZ behind the perimeter firewall. †¢ Databases servers such as SQL servers are located in the Database Zone, within the internal firewall/IPS. †¢ Intranet servers, file servers and user workstations are in the LAN zone within the internal firewall. †¢ The Internet is located in the Internet zone behind the perimeter firewall. Principle of Least Privilege Corporation Tech administrators and users will have minimal privileges necessary for proper functioning within the organization. This rule applies also to data and services made available for external users. An extension to this rule is the â€Å"Need-To-Know† principle which says that users and administrators of Corporation Tech IT system have access to only the information relevant to their role and duties performed. Other points of security that we will address in our network services availability is the single point of failure principle, the separation of duty and job rotation rules. The network paths between users and mission-critical IT system resources, all the links, devices (networking and security) as well as the servers will be deployed in redundant configurations. The goal of the separation of duty and job rotation rule is to limit an employee’s ability to neglect and break the IT system’s security policy. Separation of duty dictates that important tasks/functions should be performed by two or more employees. Job rotation states that there should be rotation of employees in important positions. NETWORK HARDENING For each layer of security, we will ensure they are running the most up-to-date software and operating systems, and that the devices are configured properly. SECURITY ZONES Intrusion Prevention (IPS) devices are responsible for detecting and blocking penetrations and attacks conducted by intruders and malicious malware applications. We recommend an IPS be installed in the network path between potential threat sources and sensitive IT system resources. Attacks through encrypted SSL sessions are a potential vulnerability so we recommend decrypting the sessions prior to it reaching the IPS device in order to inspect unencrypted packets. The IPS will be properly optimized and monitored to catch attackers that have slipped past the first defense (firewall/router). Internal networks will not have direct access to the Internet so a Trojan sent to a user’s workstation through a phishing attack would not allow the intruder to connect to the external network. Internet services are available for internal users only through company email and HTTP Proxy servers. ENABLE SECURE NETWORK ACCESS We will install a VPN that is configured to allow encrypted communication to our network from the outside. Utilizing two-factor authentication, ensuring the integrity of the users making the request. This is external-facing to our network and allows users to tunnel into our LAN from the outside once the appropriate measures are taken to secure access. SEGMENTED DMZ There will be a front-end firewall for the external traffic and a back-end firewall for the internal traffic. Firewall rules will be optimized and tightened on all publicly available systems to allow traffic to only the necessary ports and services living within the DMZ. Firewall rules have been created to only allow the source IP addresses and port to the specific servers and proxies have been added in the network from which administrators are allowed access to the systems. Systems within different VLANs (with a layer 3 switches) have been configured to help isolate and respond to incidents if a server in the DMZ is compromised. Authentication on the LAN is required before access to the DMZ is even attempted. This prevents allowing complete control over these systems at any given time. DEVICE  INTEGRITY All hardware and software will be purchased only from the manufacturer or from resellers who are authorized and certified by the equipment manufacturer. Unused physical interfaces on network devices will be shut down. Access lists that allow only those protocols, ports and IP addresses that are required by network users and services are implemented. Everything else is denied. Network device configuration file are protected from unauthorized disclosure. Steps have been taken to avoid plaintext passwords in the configuration files. This has been accomplished by using encryption and/or a salted hash with iteration to protect the confidentiality of passwords in configuration files. Change passwords/keys immediately if the network device configuration file is transmitted in the clear (or is otherwise exposed) while containing non-encrypted passwords/keys. Secure protocols will be used when transmitting network device configuration files. All unneeded services on network devices must be sh ut down. Log files will be reviewed regularly to gain an in depth understanding of normal network behavior. Any irregularity will be reported and investigated. SECURE MANAGEMENT Only secure protocol standards (SSHv2; IKEv2/IPsec; TLS v1.0+) will be used when performing remote management of network devices. Default usernames and/or passwords will not be used. The network infrastructure security policy should define password length and complexity requirements. Review the network infrastructure security policy. This policy identifies who is allowed to log in to network infrastructure devices and who is allowed to configure network devices, and defines a plan for updating network device firmware at scheduled intervals. PORT VULNERABILITES Port 25 – Is used for SMTP (Simple Mail Transfer Protocol). It uses both tcp and udp protocols. This port used for e-mail routing between mail servers and is susceptible to many known Trojan’s. We are keeping this port in a closed state. Port 80 – Is used for web traffic Hyper Text Transfer Protocol (HTTP). It uses both tcp and udp protocols. Port 80 udp is also used by some  games, like Alien vs Predator. Code Red and Nimda worms also propagate via TCP port 80 (HTTP). Also, a number of trojans/backdoors use these ports. We are keeping this port in a closed state. Port 139 – Is used for NetBIOS. NetBIOS is a protocol used for File and Print Sharing under all current versions of Windows. By default, when File and Print Sharing is enabled it binds to everything, including TCP/IP (The Internet Protocol), rather than just the local network, meaning your shared resources are available over the entire Internet for reading and deletion, unless configured proper ly. Any machine with NetBIOS enabled and not configured properly should be considered at risk. The best protection is to turn off File and Print Sharing, or block ports 135-139 completely. We will leave this port in an open state but will turn off file and print sharing capabilities. Port 1900 – Is used for SSDP, UPnP. UPnP discovery/SSDP, is a service that runs by default on WinXP, and creates an immediately exploitable security vulnerability for any network-connected system. It is vulnerable to denial of service and buffer overflow attacks. Microsoft SSDP Enables discovery of UPnP devices. We are keeping this port in a closed state. Port 2869 – Is IANA registered for: ICSLAP. It uses both tcp and udp protocols and is used for Microsoft Internet Connection Firewall (ICF), Internet Connection Sharing (ICS), SSDP Discover Service, Microsoft Universal Plug and Play (UPnP), and Microsoft Event Notification. We will leave this port in an open state. Port 5357 – Is used by Microsoft Network Discovery, and should be filtered for public networks. It uses both tcp and udp protocols. It is also IANA registered for: Web Services for Devices (WSD) – a network plug-and-play experience that is similar to installing a USB device. WSD allows network-connected IP-based devices to advertise their functionality and offer these services to clients by using the Web Services protocol. WSD communicates over HTTP (TCP port 5357), HTTPS (TCP port 5358), and multicast to UDP port 3702. We will close this port and redirect traffic to HTTPS (TCP port 5358). Port 6839 – This port is not associated with any particular services and should be closed unless it is associated and used. Port 7435 – This port is not associated with any particular services and should be closed unless it is associated and used. Ports 9100, 9101 and 9102 – These TCP ports are is used for printing. Port numbers 9101 and 9102 are for parallel port s 2 and 3 on the three-port HP Jetdirect external print  servers. It is used for network-connected print devices. These ports should remain open to allow print services. There are no listed vulnerabilities associated with these ports. Port 9220 – This port is for raw scanning to peripherals with IEEE 1284.4 specifications. On three port HP Jetdirects, the scan ports are 9290, 9291, and 9292. It is used for network-connected print devices. This port should remain open to allow print services. There are no listed vulnerabilities associated with this port. Port 9500 – TCP Port 9500 may use a defined protocol to communicate depending on the application. In our case we are using port 9500 to access the ISM Server. The ISM Server is used for exchanging backup and recovery information between storage devices. This port should remain open while services are in use. There are no listed vulnerabilities associated with this port. Port 62078 – This port is used by iPhone while syncing. The Port used by UPnP for multimedia files sharing, also used for synchronizing iTunes files between devices. Port 62078 has a known vulnerability in that a service named lockdownd sits and listens on the iPhone on port 62078. By connecting to this port and speaking the correct protocol, it’s possible to spawn a number of different services on an iPhone or iPad. This port should be blocked or closed when service is not required on the device. References BEST: Network Security Policy and Procedures. (n.d.). Retrieved from http://www.ct.gov/best/cwp/view.asp?a=1245&q=253996 Example Security Plan. (2014, November 17). Retrieved from http://www.binomial.com/security_plan/example_security_plan_template.php Hardening Network Infrastructure Security Recommendations for System Accreditors. (n.d.). Retrieved from https://www.nsa.gov/ia/_files/factsheets/Hardening_Network_Infrastructure_FS.pdf Network Security Policy: Best Practices White Paper – Cisco. (2005, October 4). Retrieved from http://www.cisco.com/c/en/us/support/docs/availability/high-availability/13601-secpol.html Paquet, C. (2013, February 5). Security Policies > Network Security Concepts and Policies. Retrieved from http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3 SANS – Information Security Resources | Information Security Policy Templates |.