Wednesday, October 30, 2019

Businese Law Essay Example | Topics and Well Written Essays - 2500 words

Businese Law - Essay Example By this time Karter had not parted with the money to purchase the paintings. Therefore Karter purchases the paintings knowing very well that Jimmy had repudiated his offer and was not going to make any good payment of them. 1 In Dickinson Vs Dodds, 1876, the defendant gave the plaintiff a written offer to sell him his house for 800 on Wednesday. The offer was to be left open until next Friday 9 a.m. On Thursday the defendant sold the house to someone else. On that very evening, the plaintiff was told of the sale by a third party, but before 9 a.m. on Friday the plaintiff delivered his acceptance to the defendant which the defendant refused to receive. It was held by the court that there was a proper revocation of the offer and the plaintiff could not accept it. 2 Even though Karter had revoked his offer of purchasing the paintings, the revocation / refusal was not procedurally done legally. Under the rules governing any revocation of an offer, that withdrawal must be committed to the person to whom it was made. It means that had Karter not taken the initiative of calling Jimmy would have continued to be silent of his withdrawn intention to purchase the paintings. 3 On the other hand, Karter would be to blame because he had acted outside the agreed terms of their agreement with Karter. According to their agreement Jimmy had expressly told Karter not to spend more than $ 1,000 USD. These terms were very certain but Karter ignored them and purchase paintings worth $5,000 USD. The expression by Jimmy to Karter to only spend $1,000 USD was in fact a term that was too "heavy" to be overlooked. This is because: - (a) Jimmy would not have entered into the contract if the statement was not made. The statement was important because it showed the maximum amount of money that he had and which he was willing to spend on paintings. (b) The statement was made immediately alongside the other agreements meaning that the representer highly regarded its importance. But Karter can still argue that he had thought that the statement was not a term of the contract since it was not followed by a written agreement. Jimmy could have reduced his oral expression into writing. Though he did not expressly state that he could not purchase the paintings if they cost over $1,000 USD, it was implied that he was not going to spend over $1,000 USD in paintings. These are implied terms that parties probably had in mind but did not bother to express. They have to be implied by the courts. Additionally, the parties would have expresses this agreement in writing if they had foreseen the difficulty occurring. Such terms the parties could have expressed in writing had they seen the difficulties are implied by the courts because of the court's view of fairness or public policy. Vincent acted in good faith in selling his painting and cannot be held responsible. He was made to believe in statements that were not true. He was in fact misrepresented by Karter who told him that he had been authorized to purchase the painting on behalf of Jimmy. Misrepresentation renders the contract voidable at the option of the innocent party. The statement was made are the time the contract was made and it induced Vincent into the contract. 4 Vincent could not have entered into the contract if: - (i) He knew that Karter's statement was false. (ii) He would have made the contract despite the misrepresentation. (iii) He did not know that there had been a misrepresentation i.e. after entering into the

Monday, October 28, 2019

Atlantic Slave Trade Essay Example for Free

Atlantic Slave Trade Essay A slave can be defined as a person who is the property of and wholly subject to another, a bond servant or a person entirely under the domination of some influence or person. Slavery was well recognized in many early civilizations. Ancient Egypt, Ancient China, the Akkad Ian Empire, Assyria, Ancient India, Ancient Greece, the Roman Empire, the Islamic Caliphate, the Hebrews in Palestine, and the pre-Columbian civilizations of the Americas all had either a form of debt-slavery, punishment for crime, enslavement of prisoners of war, child abandonment or birth of slave children to slaves. However, as the sixteenth century approached, so did the change in the way slavery would be looked at, for years to come. The Atlantic slave trade became the name of the three part economic cycle that involved four continents for four centuries and millions of people. The Atlantic slave trade or the middle passage, triangular trade and slavery affected the economy of Europe, Africa and the Americas in both negative and positive aspects. Starting in the 1430’s Portuguese were the first to sail down the coast of Africa to search for gold and jewels. The Portuguese had to extend their power across the co+ast because Sub-Saharan Africa’s trade routes were controlled by the Islamic Empire. By 1445, The Portuguese conquered three African countries and created trading posts. This allowed them access to Europe across the Sahara. Initially, the Portuguese traded copperware, cloth, tools, wine and horses for pepper, ivory and most importantly gold. The first slave purchase is said to have taken place in 1441 when the Portuguese caught two African males while they were along the coast. The Africans in the nearby village paid them in gold for their return. Eventually, they developed the idea that they could get more gold by transporting slaves along Africa’s coast. The Muslims were enticed by the idea of slavery as they used them as porters and for profit. Portugal had a monopoly on the export of slaves in Africa for more than two hundred years. This encounter is the beginning of one of the most tragic events in history, the Atlantic triangular trade (Thomas 1997). A triangular trade evolves when a region has export commodities that aren’t required in the region which its major imports come and provides a method for trade imbalances. The triangular trade is named for the rough shape it makes on a map. It worked like a triangle between all the colonies that were involved. For centuries the world was took part in its most successful trading system. There where nearly fifteen million Africans were shipped to both North and South America for more than three-hundred. Slaves, cash crops and manufactured goods were the most traded between the Americas, Europe and Africa. The Europeans controlled the first stage of the trade by carrying supplies for sale and trade such as, cloth, spirit, tobacco, beads, shells, metal goods and guns. This was their method of which were used to help expand empires and capture more slaves. These goods were exchanged for purchased and kidnapped African slaves (www. nmm. ac. uk/freedom/viewTheme. cfm/theme/triangular). African kings and merchants would capture the slaves or organize campaigns ran by the Europeans. The motives of the Europeans were based on one thing; they lacked a major source, a work force. It was stated that the Indigenes people were unreliable and Europeans were unsuited to the climate. However, Africans had experience in agriculture, keeping cattle, content with the climate. Africa soon became reliant on the slavery of their people and the profits that came along with it. The next stage involved the slaves being transported by voyage to the Americas and Caribbean, the middle passage (PBS. â€Å"The African Slave Trade and the Middle Passage. † http://www. pbs. org/wgbh/aia/part1/1narr4. html). The middle passage was a perilous, horrendous journey slaves made across the Atlantic Ocean to the Americas. The final stage of the Atlantic slave trade was the return to Europe from the Americas with the produce from the slave-labor plantations. Most regions of North and South America were used to provide these raw materials to Europe for manufacturing. This wasn’t the first or only slave trade, but it was the cruelest. What began as a quest for gold ended as a quest for slaves, leaving a major stamp on African and American history (Thomas 1997). Before undergoing the middle passage, slaves faced human misery and suffering. Kidnapped slaves were forced to walk shackled in slave caravans to European coastal forts. Due to the lack of food and energy, half of the slaves became sick and were killed or left to die. Some had the strength to make it so they were left in underground dungeons. For years, Africans were stranded in these dungeons across the coast of Africa.. There, they wait on the embarked horrid encounter of the entire slave trade, the middle passage. None of the previous passengers returned to their homeland so none of the Africans knew what they were about to endure. The voyages were generally organized by companies and investors because they were a huge financial burden(â€Å"The African Slave Trade and the Middle Passage). Two theories show the packing of slaves in the European ships; loose and tight packing. Loose packing carried less slaves with the hopes of more room and more slaves making it to the Americas alive and in fair condition. This was exchanged for tight packing. Captains believed despite more casualties, this would yield a greater profit. On occasion, veterinarians inspected the slaves before the voyage to determine which slaves could make it across the Atlantic Ocean. The enslaved Africans were chained together by hand and foot, not even being able to lie on one’s side. They ate, slept, urinated, defecated, gave birth and died all in that one spot. There was overcrowding, inadequate ventilation and little to no sanitation. Twenty percent of every hundred died along the way from either suffocation, starvation, amoebic dysentery, scurvy or a disease such as small pox. The slaves that died were thrown overboard as well as the slaves that showed illness. Some threw their self-overboard risking their life rather than deal with these horrific measures. Approximately fifteen million captured Africans were sent to the Americas. The middle passage was the longest, most dangerous part of the Atlantic slave trade (â€Å"The Middle Passage Experience†). From the seventeenth century on, slaves became the focus of trade between Europe and Africa. Europe had already colonized North and South America as well as the Caribbean islands from the fifteenth century onward. This created an insatiable demand for African laborers, who were deemed â€Å"more fit† to work in the tropical conditions of the New World. The numbers of slaves imported across the Atlantic Ocean steadily increased, from approximately 5,000 slaves a year in the sixteenth century to over 100,000 slaves a year by the end of the eighteenth century (www. mariner. org/captivepassage). Upon their arrival to the Americas, the slaves were washed, greased and placed inside dungeons. The grease added a more appealing look making the slaves appear healthier so the profit would be much higher. European slave traders made sure all of their potential properties were in well condition before bidding. They were branded with a hot iron to keep their identity as a slave. There were two main types of slave auctions; highest bidder or grab and go auctions. Highest bidder was a bidding process which the buyer with the highest bid would get the slave. Grab and go auctions was the process in which the buyer would give the trader an agreed amount of money in exchange for a ticket. This process was where the slaves were released from their dungeon and the buyers would rush and grab the slave they wanted, Each slave would be sold to an owner who owned a great deal of land and worked on either a plantation or mine and there, the living conditions were still only barely better (Curtin 1969) A prominent African, author and a major influence on the enactment of the Slave Trade Act of 1807, Olaudah Equiano was well aware and very familiar with the Atlantic slave trade. At the age of eleven, Equiano and his sister were kidnapped from his village in Nigeria. He survived the middle passage, and taken to the West Indies. He tells how he was bought by Captain Pascal, a British naval Officer as a â€Å"present† for a cousin. He tells how was enslaved in North America for ten years, working as a seaman. In 1766, he bought his freedom and wrote an autobiography, â€Å"The Interesting Narrative of the Life of Olaudah Equiano,† Equiano gave a firsthand look of the conditions enslaved Africans were forced to live. This document was one of the first documents that explained, thoroughly, the terrible human cruelty of the Atlantic slave trade (Wright et al. 001). Although many lives were taken or at risk, The Atlantic slave trade fulfilled its major goal, profit and change the three continents. Europe, America and Africa’s economy were all affected by the slave trade. Europe’s economy was suffering before the slave trade. The Atlantic slave trade was during the time of recovery for Europe and completely recovered their economy. Because of the success of the trade, they needed more people to manufacture raw materials and export them to Africa. The great supply of jobs created many exports and the income to buy imports. By the end of the slave trade, Europe’s economy was in well standings as one of the wealthiest continents in the world. The America’s economies rose too. They were honored with a free workforce that provided many resources from sugar to cotton. The free labor allotted for them to received one hundred percent of the profit. They were importing more slaves and exporting the goods made by them to gaining wealth. America’s economy became agriculturally stable and soon industrialized. Europe and the Americas economies were affected in a positive way. However, Africa’s economy received a negative effect. Many, for years lived in fear due to slavery. African villages became small and poor. All of the kingdoms that were strong at one time, collapsed and were conquered. They received raw material goods from the slave trade but with nothing shown. The African kings prospered only because they were heavily involved in the slave trade. As the kings’ wealth grew, their economy was at a standstill and eventually failed. The Atlantic slave trade, human cruelty and evil at its finest, had a substantial effect on Europe, the Americas and Africa (www. understandingslavery. com).

Saturday, October 26, 2019

Children With Behavioral Disorders in Single Parent Homes Essays

Unfortunately, we live in a world were economic times are tough. It can be a struggle for parents to adequately support children - especially if there is only one parent. According to Organization for Economic Cooperation and Development about 15.9 percent of children world wide live in single-parent households. In the United states alone there are approximately 13.7 million single parents today, and those parents are responsible for raising 21.8 million children (approximately 26% of children under 21 in the U.S. today). The question we must ask is, What struggles and psychological effect does separation and divorce have on the parents as well as the children? Divorce is the final termination of a marital union, canceling the legal duties and responsibilities of marriage and dissolving the bonds of matrimony between the parties. In most countries divorce requires the sanction of a court or other authority in a legal process. The legal process for divorce may also involve issues of spousal support, child custody, child support, distribution of property and division of debt. Shared custody is awarded in approximately twenty percent of all divorce child custody cases. When shared custody is not awarded, the court will award one parent sole custody of the child. A court may also award a parent joint custody. Joint custody is a court order whereby custody of a child is awarded to both parties. In joint custody both parents are "custodial parents" and neither parent is a non-custodial parent; or, in other words, the child has two custodial parents. Seventy percent of all child custody cases name the mother as the custodial parent. A â€Å"b roken family† will effect the mother, father and child in different ways; with mothers usua... ...1%) as likely to have one or more total problems than those from two-parent families, twice as likely to have an emotional disorder, etc(National Longitudinal Survey of Children and Youth ). Works Cited See e.g., Cal. Fam. Code sect. 3004 http://www.leginfo.ca.gov/cgi-bin/displaycode?section=fam&group=02001-03000&file=3000-3007 1988 Census "Child Support and Alimony: 1989 Series" P-60, No. 173 p.6-7, and "U.S. General Accounting Office Report" GAO/HRD-92-39FS January 1992 Center for Disease Control National Principals Association Report on the State of High Schools Fulton County Georgia Jail Populations and Texas Dept. of Corrections, 1992 GROWING UP IN CANADA, National Longitudinal Survey of Children and Youth (Human Resources Development Canada, Statistics Canada, Catalogue no. 89-550-MPE, no.1, November 1996, p. 91) Available from StatCan.

Thursday, October 24, 2019

Colloid Cysts, Physical and Personal Impacts on Patient and Spouse :: Medical Medicine Papers

Colloid Cysts, Physical and Personal Impacts on Patient and Spouse Introduction: The patient is a 45 year old male who was in a car accident that involved alcohol on July 29, 2004. I have known the patient for three years and will be referring to aspects of the patient that I know to be true, but am unable to cite all details due to learning them via the dynamics of the relationship. The patient and the patients’ spouse have requested complete anonymity for the purpose of this paper. The car accident resulted in a series of injuries for the patient which were a fractured pelvis, a lacerated bladder, internal organ bruising, a moderate concussion, and sciatic nerve palsy (nerve damage). The moderate concussion was determined by a computerized axial tomography (CAT) scan which also showed the colloid cyst. The patient believes he was made aware of the cyst; however his memories are not absolute and the spouse was not made aware at the same time. The cyst was mentioned (again) at the end of September and the brain surgery happened on February 13, 2005, six and a half months later. This series of interviews has occurred during the two months after the surgery. (Patient, Patient Spouse, personal communication, April, 27, 2005) Symptoms: The patient was suffering from intense dizzy spells for a year prior to the car accident. The patient is a licensed chiropractor and as he put it, â€Å"Doctors make the worst patients†, so he rationalized the dizziness and never expressed a need or desire to medically investigate it. The patient had not been experiencing the most common symptom, a headache. (Patient, Patient Spouse, personal communication, April 28, 2005) In the literature about colloid cysts there is a high prevalence of symptomatic headaches in the patients, often it is the headaches the patients are trying to resolve when the colloid cyst is discovered. (www.healthcentral.com/encyclopedia) The car accident fractured the patient’s pelvis so the treating physicians rebuilt his pelvis and began physical therapy before they scheduled the colloid cyst surgery. It was at this time the patients spouse learned about the cyst; it had been two months since its discovery. After becoming aware of the cyst, the patient presented with mild headaches. (Patient Spouse, personal communication, April 28, 2005) Surgery: The surgery occurred six and a half months after the CAT scan.

Wednesday, October 23, 2019

Database Implementation Plan for Riordan Manufacturing

Database Implementation Plan for Riordan Manufacturing Riordan Manufacturing has asked our firm, LTB and Associates, to develop a web-based plan to be used as a Business-to-Business web site in order to purchase materials from their vendors. We have examined Riordan’s products and business systems, interviewed Riordan’s employees, and have determined the best course of action to implement the plan. Riordan Manufacturing is a plastics manufacturer based in several locations across the world. With three plants based in the continental US, which are located in Albany, Georgia; Pontiac Michigan; and in San Jose, California, which is the company headquarters. A fourth plant is located in Hangzhou, China will not be part of the plan as they purchase materials locally. This where we explain how the database will be set up. Refer to the ERD, Sequence diagram, Use Case diagram, and Class Diagram that follow [pic] [pic] The following paragraphs will describe the considerations that Riordan Manufacturing will need to make in implementing the database plan.Database Management System and Data Where ever it is possible to for our firm to do so, LTB and Associates will make a recommendation on the choice to make. In order to implement the database properly, these recommendations should be implemented in order to offer the tightest amount of security that will be possible. Type of Online Processing Riordan Manufacturing will need to decide between real-time asynchronous processing and batch processing. Real-time asynchronous processing is applicable when the processing must be performed immediately or when the results must eventually be communicated back to an on-line user. One of the problems with real-time processing is that real-time timers and events are required; they are expensive as the computer resources that are used to raise, maintain and check events. Another problem with timer or even processes is that they create locking problems as they may contend with on-line processes for resources and for access the same data. Batch solutions are ideal for processing that is not real-time event based. Batch processes are data-centric and can efficiently process large volumes of data off-line without affecting the company’s on-line system. Batch processing will allow business function to execute on a periodic or recurring basis; or it can operate over data that matches a given criteria. After studying Riordan Manufacturing’s Inventory and Supply Chain processes, the recommendation is for the company to go with batch processing for replenishment of raw materials for the operations. With daily reporting of the materials used at the end of each manufacturing run as the current method of inventory control, batch processing will work well. While real-time processing works well for online shopping, it is not the best approach to take for this application. Access Privileges Normally it is not considered a good security risk to grant access to individuals/companies who are located outside of the normal company network and/or firewall. But in order to provide a better integration of the database between Riordan Manufacturing and vendors/suppliers it is necessary to allow limited access. Riordan shall determine the types of privileges to grant to vendors. These privileges include (a) view, (b) insert, (c) update, and (d) delete (logical deletion only). Riordan shall also determine the type of data vendor should be able to access. The data should only relate to the materials that have been used in the daily manufacturing run; materials that have been previously placed on order; and the estimated projections of materials needed for the upcoming week. This will allow both Riordan Manufacturing and the suppliers to determine the present and short-term inventory needs. Bandwidth High speed access of the Internet has decreased in cost in recent years and the increased utility and the increased ease of use versus the cost of acquiring and maintaining the access has become more financially feasible. LTB and Associates recommend that Riordan acquire the appropriate bandwidth that will allow for the effective flow of information and which will support concurrent access of the company database. Security With the ever-growing threats that are present in the web-based global economy, there is an increased awareness of security. This includes both corporate and political terrorism as well as the knowledgeable lone user bent on mischief. LTB and Associates recommend that the administration plan should ensure that there are methods of data security implemented as information travels over the internet. An effective firewall should be implemented to deny access to unauthorized people. Data should be encrypted. Whenever possible, a Virtual Private Network be established between Riordan Manufacturing and the larger and more critical suppliers Database Administration Plan To ensure the productivity, continuity, and performance of the database for Riordan, proper maintenance, database backup, and change management procedures must be developed and implemented. The database must be backed up regularly in case the system needs to be restored due to data corruption or the loss of the data center due to natural or man-made disasters. Database backups are also critical for testing upgrades, fixes, and enhancements that will need to be migrated into production. Periodic maintenance is also a key to database performance and continuity. Applying operating system patches and security updates to the servers that house the databases help keep the software updated and the servers performing efficiently. Consistent re-indexing of the database can help keep performance high as the database grows in size. Another very important part of administering a database is change management. Database upgrades, fixes, and enhancements must be tested and implemented in a manner that minimizes potential errors, disruption to users, and preserves an audit trail for troubleshooting and compliance issues. Database Backup Plan In order to minimize potential data loss and downtime, the database will be backed up each night and stored in a secure location on the network. Storing the backups on the network will help facilitate transferring the backup to the disaster recovery site. Once the backup is created and stored on the network, a copy will be encrypted and transmitted to the disaster recovery ite. The backup can then be easily restored at the disaster recovery site as needed, or used in a development environment for testing upgrades, fixes, and enhancements. Database administrators will also have the ability to create backups as needed for testing or emergency purposes. Database backups will be restored to the disaster recovery database at least bi-monthly to verify that the backups are generating correctly and that the disaster recovery-restore process is working as it should. Maintenance Plan Once a month, the database servers will undergo scheduled maintenance. Operating system patches, security updates, and database application patches will be applied to the hardware housing the database in order to ensure the system is kept up to date. Database hardware will also undergo diagnostic checks to ensure everything is working properly. At this time the database will also be re-indexed to preserve performance as the database grows. The patches, security updates, and database application patches will be applied to the development servers one week prior to implementation on the production server. Applying the maintenance related patches to the development system a week prior to implementation in the production system will allow time to monitor the development systems for any issues resulting from the patches and ensure the patches are safe to install into production. For emergency maintenance issues such as hardware failures or power outages, the disaster recovery database will be restored from the latest production backup and work should be closely coordinated with the server team to ensure proper procedures are followed. Change Management The backbone to any administration plan is change management. Maintenance, database backups, upgrades, and other events must be carefully tested, planned, and executed to minimize potential consequences including data corruption and downtime, and changes must be closely tracked to preserve the integrity of the database, maintain a log of changes for troubleshooting potential issues, and ensure proper testing and compliance controls are met. The database team will use Microsoft’s Visual Source Safe (VSS) as the main tool for version control. Patches, fix scripts, and any other code that applies to the databases will be stored in VSS and roper code check in and check out procedures will be followed to ensure the proper code changes are migrated to the database. Only database administrators will have the ability to migrate changes to the databases. Developers can check out and modify code, but cannot implement any changes in the databases. All changes will be properly tested in a development database and signed off on by the appropriate par ties. A network of IT and business â€Å"approvers† will be established for each business area (for example: accounting, procurement, sales, etc. ) and will be responsible for signing off on changes that affect their particular areas. There will be at least one main approver and one backup approver that are subject matter experts for their respective business areas so that all areas utilizing the database will have a representative. Approvers will be the preferred testers, but other users may test changes as long as the approvers review the test results prior to signing off on the test. Signoff for changes will be obtained via email using a template that details the change to be made, a tracking number for the change, and the location in VSS where the change is stored, so that the database administrators will be able to pull the change directly from VSS for implementation. Database administrators will not proceed with migration of a change until all appropriate approvers have responded in the affirmative. Disaster Recovery Plan (DRP) While preparing a disaster recovery plan (DRP), it is essential to think about the hardware, software and data that will be used to allow for an organization to continue operations in the event of a natural disaster or a disaster caused by human hands. In considering the idea of protection of the database, this plan will not only help preserve the company’s investment but also secure the customers faith in Riordan. Some companies spend some 25% of their information technology budget on disaster recovery plans. LTB and Associates recommends the implementation of a DRP. The cost of implantation and the subsequent maintenance versus the cost of a data loss is negligible in the impact it would have. The first step in drafting a disaster recovery plan is conducting a thorough risk analysis of the database systems. Make a list all the possible threats to system operation and evaluate the likelihood of their occurrence. The threats can include electronic-based; such as virus attacks or data deletions, deliberate or accidental; and natural disasters, such as fire, flood, storm or earthquake. Once the threats have been identified and ranked in likelihood of occurrence; what can be done to minimize or limit the impact from these disasters. The more preventative actions we can establish in the beginning the better. It is better to take a proactive rather than a reactive approach in determining and documenting the DRP. The recovery procedure will be written in a detailed plan defining the roles and responsibilities of the IT staff. Defining how to compensate for the loss of various aspects of the network (databases, servers, communications links, etc. ) and specify who will arrange for these repairs and how the data recovery process will occur. Communication Plan During a disaster situation, all parts of the communication plan should be cleared with a central location. All information should be reviewed by management before being released. LTB and Associates recommend that the following steps be implemented. 1. Communication methods need to be established in advance. (Wireless or satellite telephone systems, email address, etc†¦) 2. Develop templates for press releases, and include the skill sets of key employees, customer information, supplier information. Include maps of locations that may be difficult to communicate in. Develop logs that can be used to track incoming and outgoing communications. 3. Make sure that these processes are easy to understand. 4. Develop a contingency plan should the computer network where data is stored is damaged. Use text files and several copies in different storage devices and store this information in a remote server or on removable media which is then stored offsite. 5. Determine what is to be considered as privileged/proprietary information; establish which levels of management and the key personnel to have access to the information; and the approvals for accessing the information 6. Develop a set of detailed documents and instructions that can be shared with employees. . Establish a set of technology based tools. 8. Develop a detailed training plan; be sure to include all key personnel, top management and support personnel that can interface with customer and/or suppliers. 9. Develop relationships with News Service agencies. 10. Establish and train employees as observers to watch for individuals with microphones and notepads; make sure they are aware of the proper channels of communications. 11. D o plan periodic mock scenarios and drills of disasters in order to review the DRP. LTB and Associates recommends that the follow items be purchased, maintained, implemented, and stringently adhered to at every Riordan Manufacturing plant in the continental USA. †¢ Prevention Plan †¢ An electronic manual. †¢ A printed hardcopy manual. †¢ Data and Software Backups †¢ Daily backups, local to each plant and stored offsite. †¢ Weekly backup, to be performed system-wide by the Atlanta, Georgia plant and stored offsite. †¢ Storage area networks. †¢ Surge Protectors and Power Supply Fault Switches. †¢ Anti Virus, Firewall and Security Software. †¢ Fire Prevention and Detection Smoke detectors and fire alarm systems. †¢ Fire extinguishers. †¢ Review and update insurance policies for all facilities and equipment. Disaster Recovery Process. In the event of a disaster occurring at any Riordan Manufacturing plant the following steps should be taken to restore the operation of the system to normal operation. The steps c an apply to any and all sites. 1. Contact the proper level of management and notify pertinent personnel a. Determine if the equipment is functional and has suffered no damage. b. Repair or replace the equipment as needed per the situation. 2. Retrieve the latest weekly backup from the Atlanta, Georgia server and/or facility. (Note – if the Atlanta plant is the affected plant, retrieve the last weekly back up from the offsite storage facility) 3. Restore the database to the server. Perform a system check for proper operation. 4. Retrieve the latest daily backup from the offsite storage facility. 5. Restore the database to the server. Perform a system check for proper operation. 6. Retrieve and key in any pertinent data that was recorded on hardcopy sources from the affected plant and double check accuracy with personnel if possible.

Tuesday, October 22, 2019

Biology Dissertation The Key Points to Consider When Writing

Biology Dissertation The Key Points to Consider When Writing One of the most challenging academic tasks is to write a dissertation. It is very complex, and you should be fully engaged in the process of writing. It becomes even more complex if the problem is difficult or not interesting to you. Thus, it is quite important to choose the topic you like. A biology dissertation may be a bit troublesome. Nonetheless, if you have a good command of the discipline and know how to compose it properly, you will definitely achieve success. Here are some essential prompts on how to complete all stages of your dissertation in biology: Write the title page. It should contain the dissertation title, the name of a researcher, the main reasons for submission of the project, the name of the educational institution, department’s name, the month and year of publishing. This is a special page, which contains your appreciation to those people who helped you to compose your research in biology. Abstract. This is a compulsory element of any dissertation, which covers the major points of the research. Its length ranges from 100 to 150 words. It should include the background of your topic, the objective of the research, its outcomes, and table of contents. Mind that all parts and chapters ought to be enumerated. Introduction. This section should kindle a desire to read your dissertation. Make it catchy, show the importance of your study. Implement a thesis and clearly describe your main purpose and objective to conduct a study. Informative sources. This section is not compulsory. This is the number of articles you’ve read that are related to your paper. Nevertheless, it will only benefit your project. Thus, your readers will see the whole scale of your work and what sources you used. Methodology. You cannot skip this section. A researcher ought to show the methods that were used to conduct the study. Moreover, you should explain why you have preferred these methods. Outcomes. The next step is to represent the outcomes of your research. Evaluate the information you have received. Use all related statistic figures. It’s important to remember that a researcher should not provide his/her personal opinion. Keep it for the section devoted to the discussion. Discussion. This part centralizes the outcomes of your research question. You should analyze and evaluate the findings you have received during the study. This is when you should likewise express your own opinion about the obtained results. Recommendations. Now, you should offer some recommendations in the regard of the obtained results. Interpret your findings and comment on the future of your project. Point out the probable improvements in the field you have selected. Bibliography. This is the full list of all information resources that were used and have contributed to the development of your project. These sections are the inevitable parts of the entire research project. You should find out how to accomplish each quickly and effectively. Take this matter seriously and don’t forget to use some facts to make the paper more catchy. The final evaluation of your biology dissertation is dependent on every stage. Make an effective outline and complete each stage in turn.

Monday, October 21, 2019

United States War on Terror Policy Paper

United States War on Terror Policy Paper Executive Summary Combating terrorism is an operation that demands strategic attention and direct accountability in order to enhance national and global security. It is notable that terrorism has become a global issue that has been perceived as a threat to international security and relations. In this case, the United States as a world super power has risen to wage war on terror groups in order to enhance both national and global security.Advertising We will write a custom proposal sample on United States War on Terror Policy Paper specifically for you for only $16.05 $11/page Learn More Currently, the US administration has adopted a policy of military installations all over the world in order to foster its national security as well as safeguard is territorial integrity. Nevertheless, this policy has proved to very costly and to some extent; measures taken have increased the vulnerability of acts of terror than ever before. In order to bring about positive c hange in the management of international peace and security, it is recommended that better polices should be applied by its Administrators to fight terrorism. These policies include use of military forces, detaining as well as prosecution of terror suspects. Needless to say, the three polices have vivid pros and cons as they will be addressed in this policy report. However, it is crucial to mention that each of the policies identified is successful in its own way. In line with this, one of the merits that is common in the policies that have been adopted so far is the centralized legal authority that has endeavored to make the new rules and regulations more effective. Nevertheless, it is imperative to note that war on terror needs a multidisciplinary approach in order to be successful. In this case, the policies must be applied concomitantly, a factor that will largely assist in covering up the impending weaknesses. Besides this, all the above three polices of arresting and prosecuti ng terror suspects have been highly recommended. This is due to the fact that the policies have been proven to be very effective in destabilizing, disrupting and demoralizing terror groups that are both emerging and also existed for long. Introduction It is imperative to note that the topic on war against terror is important since it enhances global understanding, appreciation as well as insurgency against such acts (Romaniuk 2012, p. 151). For instance, the United States of America is one of the global powers that has a been major commentator of strategies and policies meant to suppress terrorism and all acts or intentions related to the vice. It is apparent that the US is the only world super power whose foreign policy needs to be changed in order to make its military power less vulnerable to terrorism. As a matter of fact, the US administration has adopted myriads of strategic policies and responsibilities in order to enhance national and global security.Advertising Looki ng for proposal on political sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More Research has revealed that terror acts have posed threat not just to the US security but also at the global level. Needless to say, Murray (2011, p. 84) asserts that the previous administration under President George Bush was largely counterproductive in fighting terror acts both nationally and globally. Some political analysts argue that the use of open force ideology the Republican government under President George Bush was not fruitful at all in yielding the much expected results in the fight against acts of terror. Nevertheless, it is worth to note that terrorism is very dynamic and there is need to take a leap of imagination in order to come up with policies that will help to end terrorism (Murray 2011, p. 84). It is against this backdrop that this policy paper intends to address current and viable polices that can be employed by the US government in the war on terror. Background of the current situation (current policy) From a careful review of literature, it is imperative to note that the contemporary policies used to fight terror have been perceived as counterproductive (Swain 2012, p 237). In this case, instead of suppressing terror acts, these policies tend to aggregate the situation at hand. Therefore, it is essential to note that there are three essential polices that can be used by the US government in the war against terrorism. In a nutshell, disaggregation approach is a crucial framework that can be used as a legal strategy in US to fight terrorism. In any case, this is one of the grand strategies that the US authority has employed for some decades now to break ties between local and global players who are associated with terrorism. Orr (2012, p.93) reiterates that this strategy is meant to separate terror groups and make them turn against each other; a factor that makes it easy to monitor as well as curb their operat ions. From this strategy, one can derive three important policies that can be used by the US administrators in the war against terror. To begin with, one of the most effective polices entails the approach whereby the US government can seek methods of detaining terror suspects once they have pleaded guilty (Homolar 2011, p. 705). Moreover, another policy that has been perceived to be effective is the prosecution of terror criminals in state departments. Additionally, the policy on the use of military force is effective in suppressing various terror groups that are spread across the globe. In order to understand the rationale and effectiveness of these polices in curbing terrorism, it is important to discuss each one of them in details.Advertising We will write a custom proposal sample on United States War on Terror Policy Paper specifically for you for only $16.05 $11/page Learn More Option 1: current policy of War on Terror Detaining terror suspects in the countries where they are captured is an effective policy since it will help in dispersing and curtailing any form of cooperation by various terror groups. Notably, geographical distance makes it quite cumbersome for terror gangs to spearhead local insurgency (Romaniuk 2012, p. 152). Needless to say, there should be strict domestic and global rules that can be followed to ensure that this policy does not result into political unrest at some point. For instance, certain countries may counteract on realizing that their citizens who have been held as suspects have been detained in foreign countries. In this case, this will ensure that the attitude of the public and perception is not affected by the policy. Nevertheless, this policy has some shortcomings since it becomes quite difficult to detain suspects in countries that are unstable such as Afghanistan, Somalia and Yemen (Morris Crank 2011, p. 219). Therefore, this prompts for centralized locations that have the potential to withhold such suspects from connecting with other terror groups. It is worth to note that the policy of detaining terrorists in countries where they have been arrested can provide an ample ground to aggravate vicious terror acts and thereby causing more harm than good (Tosini 2012, p. 115). In this case, the US government should device legal frameworks and strategies that can be used to determine centralized locations where suspected terrorists can be detained as they await being prosecuted. In addition to this, research has revealed that detaining terror suspects on vulnerable regions has adverse effects towards fighting acts of terror. For instance, numerous countries that have been perceived as failed states counteract against the policy and this makes it hard to achieve positive results. Needless to say, this is a successful option of war on terror even though it can be made effective when reinforced by other policies in addition to political will by the affected countries to arrest and detain terror suspects. The second option According to Swain (2012, p. 237), prosecuting terror suspect is one of the option polices that can help to end terrorism. One of the merits of this policy is that it helps to prevent terror groups from expanding. For instance, when chief suspects are arrested and prosecuted, it largely demoralizes the low-ranking members and often breaks the terror networks. Research has revealed that arresting and prosecuting chief suspects disrupts local and global terrorist operations making it impossible to commit predicate crimes. Nevertheless, Romaniuk (2012, p. 152) argues that one of the demerits of this policy is that it requires the administrators to have sophisticated skills of detecting and arresting terror suspects. This is due to the fact that terrorists often have dynamic skills that are easy to replace with new ones.Advertising Looking for proposal on political sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More In this case, it is probable that the administrators will only be able to arrest and prosecute low-level members leaving behind chief organizers of terror acts. Despite the fact that this policy might be faced by numerous challenges, is definite that it is effective in fighting terror acts. This is due to the fact that it might not wholly help to eradicate terrorism but will highly contribute to decimating the vice (Tosini 2012, p.115). It is imperative to mention that the policy has been amended to boost its effectiveness whereby it targets not merely terror suspects but also those individuals or governments and organizations that fund terrorist activities. The heavy support that terrorists receive mainly through monetary funding is indeed a great threat towards fighting the vice. The third Option In spite of the above options of fighting terror, the US authority should legalize the policy of using military force in countering terrorism. In a more succinct manner, the US administra tion should use legal authority to wage war against organizations, states and individuals who support terror groups (McCrisken 2011, p. 781). It is essential to note that capturing and fighting suspects will not be effective if the policy does not target to paralyze radical clerics who are responsible for training and recruiting terror groups (Tosini 2012, p. 115). From a careful review of history, the US military has waged war against terror in Iran and Afghanistan but this has been more of a losing strategy since the army targets suspects leaving behind the main protagonists (Berkowitz 2012, p.104). Nonetheless, use of military force in terror prone countries will help to disrupt and down-size insurgent networks of terrorism. Needless to say, this policy has proved to be successful in countries such as Afghanistan and Iraq which have been viable breeding grounds for terrorism (Swain 2012, p 237). Nevertheless, it is imperative to take note that this policy can cause deadlier effec ts especially in a case whereby the terror groups decide to avenge in terms of waging war to the opponents. This has been witnessed in Iraq where terror groups counterattack the US army (Orr 2012, p.93). Historical scholars criticize this policy since they claim that it targets to treat the symptoms rather than the cause of acts of terror. In addition to this, this policy can cause catastrophic effects such as mass destruction as it has been witnessed in North Korea and Iran (Anderson 2011, p. 216). In line with this, it has been noted that the public in US has been pessimistic on the military force policy due to the fact that it is expensive and that the operation claims treasure and lives of innocent people. Essentially, this policy is effective especially when there exists an ample data base that can be used to track down and fight terror groups and their associates (Aldrich 2009, p. 122). From a theoretical perspective, the option is successful since it has been used previously in terror prone countries and positive outcomes have been realized. Which policy option do you recommend? According to Orr (2012, p.93), war on terror requires the US administrators to use numerous polices to counter both local and global operations. Needless to say, the identified policies call for myriads of legal frameworks in order to achieve positive results. One of the most effective options of fighting terrorism involves the use of wide ranging authority to arrest and prosecute terror suspects (Buffton 2011, p. 116). In addition, this policy will help to curb local and global terror groups who are responsible for causing insurgency. Moreover, in order to promote long-term interests, the US administrators should use sophisticated strategies to ensure that individuals who are responsible for funding terror groups get prosecuted under legal justification of the rule of law (Anderson 2011, p. 216). References Aldrich, J 2009, US-European Intelligence Co-operation to Counter-Terro rism: Low Politics and Compulsion. The British Journal of Politics and International Relations, vol. 11 no. 1, pp.122-139. Anderson, B 2011, â€Å"Facing the Future Enemy: US Counterinsurgency Doctrine and the Pre-insurgent.† Theory, Culture Society, vol. 28 no. 8, pp.216-219. Berkowitz, P 2012, â€Å"Shawcross on Terror ,† Policy Review, vol. 1 no. 171, pp.103-109. Buffton, D 2011, â€Å"War on terror, inc.: corporate profiteering from the politics of fear.International.† Journal on World Peace, vol. 28 no. 3, pp.115-118. Homolar, A 2011, â€Å"Rebels without a conscience: The evolution of the rogue states narrative in US security policy.† European Journal of International Relations, vol. 17 no. 4, pp.705-711. McCrisken, T 2011, â€Å"Ten years on: Obamas war on terrorism in rhetoric and practice. International Affairs, vol. 87 no. 4, pp.781-801. Morris, T. Crank, J 2011, â€Å"Toward The phenomenology of Terrorism.† Implications for research a nd policy, vol. 26 no. 3, pp. 219-228. Murray, N 2011, â€Å"Obama and the global war on terror.† Race Class, vol. 53 no. 2, pp.84-86. Orr, A 2012, â€Å"Terrorism: A Philosophical Discourse.† Journal of Applied Security Research, vol. 7 no.1, pp. 93-98. Romaniuk, S 2012, â€Å"Slaying the Dragon: Combating Al-Qaeda and the Threat of Militant Islam.† Journal of Politics and Law, vol. 5 no. 1, pp.151-166. Swain, R 2012, â€Å"U.S. Army Doctrine From the American Revolution to the War on Terror.† The Journal of Military History, vol. 76 no. 1, pp. 237-242. Tosini, D 2012, â€Å"The autonomy of law in the war on terror: A contribution from social systems theory.† International Journal of Law, Crime and Justice, vol. 40 no. 2 pp.115-118.

Sunday, October 20, 2019

Leonard Susskind - Theoretical Physicist

Leonard Susskind - Theoretical Physicist In 1962, Leonard Susskind earned a B.A. in physics from City College of New York after transitioning from his plan to get a degree in engineering. He earned his Ph.D. in 1965 from Cornell University. Dr. Susskind worked at Yeshiva University as an Associate Professor from 1966 to 1979, with a year at University of Tel Aviv from 1971 to 1972, before becoming a Professor of Physics at Stanford University in 1979, where he remains to this today. He was awarded the Felix Bloch Professorship of Physics since the year 2000. String Theory Insights Probably one of Dr. Susskinds most profound accomplishments is that hes credited as one of the three physicists who independently realized, back in the 1970s, that a certain mathematical formulation of particle physics interactions seemed to represent oscillating springs ... in other words, hes considered one of the fathers of string theory. He has done extensive work within string theory, including the development of a matrix-based model. Hes also responsible for one of the more recent discoveries in the exploration of theoretical physics, the holographic principle, which many, including Susskind himself, believe will provide great insights into how string theory applies to our universe. In addition, in 2003 Susskind coined the term string theory landscape to describe the set of all physically possible universes that could have come into being under our understanding of the laws of physics. (At present, this could contain as many as 10500 possible parallel universes.) Susskind is a strong proponent of applying reasoning based upon the anthropic principle as a valid means to evaluate which physical parameters its possible for our universe to have. Black Hole Information Problem One of the most troubling aspects of black holes is that when something falls into one, it is lost to the universe forever. In the terms that physicists use, information is lost ... and that isnt supposed to happen. When Stephen Hawking developed his theory that black holes actually radiated an energy known as Hawking radiation, he believed that this radiation would be insufficient to actually resolve the problem. The energy radiating out from the black hole under his theory would not contain enough information to fully describe all of the matter that fell into the black hole, in other words. Leonard Susskind disagreed with this analysis, believing quite strongly that the conservation of information was so important to the underlying foundations of quantum physics that it could not be violated by black holes. Ultimately, the work in black hole entropy and Susskinds own theoretical work in developing the holographic principle have helped to convince most physicists - including Hawking himself - that a black hole would, over the course of its lifetime, emit radiation that contained the full information about everything that ever fell into it. Thus most physicists now believe that no information is lost in black holes. Popularizing Theoretical Physics Over the last few years, Dr. Susskind has become more well-known among lay audiences as a popularizer of advanced theoretical physics topics. He has written the following popular books on theoretical physics: The Cosmic Landscape: String Theory and the Illusion of Intelligent Design (2005) - This book presents Susskinds view of how string theory predicts a vast string theory landscape and how the anthropic principle can be applied to evaluate the various physical properties of our universe against all of the assorted possibilities. This is described above in the string theory section.The Black Hole War: My Battle with Stephen Hawking to Make the World Safe for Quantum Mechanics (2008) - In this book, Susskind describes the black hole information problem (described above), framed as an intriguing narrative about a disagreement within the theoretical physics community ... one which has taken decades to resolve.The Theoretical Minimum: What You Need to Know to Start Doing Physics with George Hrabovsky (2013) - A math-based introduction to the fundamental concepts within classical mechanics, such as conservation of energy and symmetries in physical laws, which is intended to lay the groundwor k for what someone would need to know to proceed to the next level in physics. This is based on lectures that are available online, as described below. In addition to his books, Dr. Susskind has presented a series of lectures that are available online through both iTunes and YouTube ... and which provide the basis of The Theoretical Minimum. Here is a list of the lectures, in roughly the order that I would recommend viewing them, along with links to where you can view the videos for free: Classical Mechanics (YouTube) - A 10-lecture series focusing on the fundamentals of classical mechanicsThe Theoretical Minimum: Quantum Mechanics (YouTube) - A 10-lecture series that tries to understand what physicists know about quantum mechanicsSpecial Relativity (YouTube) - A 10-lecture series explaining Einsteins theory of special relativityGeneral Relativity (YouTube) - A 10-lecture series that lays out the modern theory of gravity: general relativityParticle Physics: Standard Model (YouTube) - A 9-lecture series focusing on the Standard Model of particle physicsCosmology (YouTube) - A 3-lecture series focusing on what we know and understand about the history and structure of our universeString Theory and M-Theory (YouTube) - A 10-lecture series focusing on the fundamentals of string theory and M-TheoryTopics in String Theory (YouTube) - A 9-lecture series focusing on the fundamentals of string theory and M-Theory As you may have noticed, some of the themes repeat between lecture series, such as the two different lecture sets on string theory, so you shouldnt need to watch them all if there are redundancies ... unless you really want to.

Saturday, October 19, 2019

Chinese Culture Essay Example | Topics and Well Written Essays - 1000 words

Chinese Culture - Essay Example It was therefore only to be expected that it would also make the usual transition from a feudal to a capitalist society much before Europe. However, that was not to be. China's feudal system lasted for about three thousand years - almost three times that of Europe - and when the last dynasty, the Qing, collapsed in the early 20th century, it was largely because the weakened political system, still feudal in nature, could not recover from the successive blows dealt to it by the extraneous capitalist powers that were intent on exploiting the country politically and economically. What is the reason behind such an extraordinary fall from a glorious past From its position as perhaps the earliest mature and technologically advanced civilization in the world, how did China become the 'sick man of Asia', as it was being called by the end of the 19th century Many explanations have been forwarded for this great longevity and continuity of traditional cultural and socials models in China. First, there is the fact that the succession of Chinese dynasties, though they were often established by minority groups or derived from external origins, caused little disruption in the inherited cultural life of the people. The peaceful traditional Chinese way of life always proved to be more powerful than the military might of the conquerors, and conquered them in the end. This gave rise to a great inertia in the lives of the people which was very difficult to break. Consider the Yuan Dynasty, established by Mongols who invaded from the steppe regions in the late third quarter of the 13th century. The native Chinese population was thoroughly intimidated by this warlike tribe. A peace born of resignation and fear, sometimes known as Pax Mongolica, ruled the country. It has been said that so thorough was the conquest that a naked maiden on horseback could ride the length of the country without fear of molestation. Yet even this indomitable tribe finally embraced the Chinese way of life and even their religion. Similarly the Manchu-s in the middle of the 17th century. Secondly, the recalcitrance described in the last point was an obstacle not only to cultural change, but also economic change. Technology is one of the underpinnings of capitalism, and in this respect China was far ahead of the West until the coming of the European renaissance. The Chinese had the world's first hydraulic clock in the 8th century, and by the 11th century their advanced metallurgical industry was producing vast quantities of military grade iron. Yet the successive governments never wavered from the theory that agriculture was the key to the economy. All their economic and fiscal policies favored agriculture to the detriment of industry. Consequently, a proper industrial infrastructure never emerged. Even a market-oriented agriculture can be the basis of a capitalist transformation. But Chinese agriculture was inward-looking. Farmers were not particularly interested in selling products, but lived off the harvest. So a vast portion of the country's production was never involved in the market. The religion of Confucianism, first embraced by the Han emperors of the third century BCE and continuing as the 'state religion' until the fall of imperialism, preached a political and social ideology that instilled a complex retrospective attitude in the populace. Many scholars think that it was one the

Friday, October 18, 2019

The BRICS Nations in International Business Research Paper

The BRICS Nations in International Business - Research Paper Example The paper tells that the emergence and importance of the BRICS in international business is a reality that for years had been underestimated. The BRICS nations have important roles to play in international business as players and partners. It is, however, paramount that we first understand the term BRICS, before we can give a detailed description of each country’s economy. The word BRICS is an acronym for the world’s largest and strongest emerging economies. These countries are Brazil, Russia, India, China, and South Africa. They are now considered as significant as other global players are and have consequently shifted economic status, from developing to emerging economies. This is because of the rapid and exponential growth that is witnessed in these economies, with statistics indicating that their contribution to the growth of the world’s Gross Domestic Product (GDP) being very significant. In the past decade, the BRICS contributed to more than half of the wor ld’s growth in GDP. The population of these economies has also been singled out as a unique feature. These economies alone constitute half, or a little under half, of the world’s population. Analysts have however pointed to the fact that these economies rarely have anything in common. Their demographic compositions, governance styles, and type of economies, are all different. They may have one or two similarities in their economies but have very little in common. This is the beauty that has been associated with these economies, that despite having very little to share, they each have independently affected global business in ways that are not only noticeable but also strongly profound and significant. These impacts to international business include increased trade levels, increased funding of development or development financing, and donor funding, earlier only a preserve of the western countries. Having looked at the economies forming the BRICS in general, let us now examine them individually.

Analysis of Juicy Couture and a Review of Their Strategic Decision Essay

Analysis of Juicy Couture and a Review of Their Strategic Decision Process in the Changing Market Environment - Essay Example Understand and evaluate the reasons for changes in strategic decisions of Juicy Couture Company Compare the strategies of Juicy Couture Company with other companies Evaluate future strategic directions for the company. Initial Review of Relevant Literature Literature review is an important element of a research study. It is often considered as the foundation of a study. The literature review for this study will be carried out with the help of data from different sources. It will involve in-depth review of the theories on the importance of strategic decisions, which is portrayed by the scholars, in a competitive market environment. The literature review will discuss the origin of strategic decision making and its evolution with changing business environment. The study will also discuss why strategic decision making is important for the success of product innovation. Actions and decisions make the core of the strategic decision-making as well as implementation process. Strategic decisi ons can be considered as rational knowledge application to a problem. It includes finding answers to critical business questions such as different alternatives and consequences of the same. It also analyses the desirability of these consequences and applied criteria for the evaluation of various alternatives. In case of structured problems, a rational solution may be sufficient. But highly unstructured problems require specific solutions brought in only by strategic decisions. Porter (1996) has rightly emphasized that operational effectiveness cannot be considered as strategy. In other words, strategic priority is important for every organisation. According to Prahalad and Hamel (1990), realisation of core competencies can be one of the strategic priorities. According to... As the report declares literature review is an important element of a research study. It is often considered as the foundation of a study. The literature review for this study will be carried out with the help of data from different sources. It will involve in-depth review of the theories on the importance of strategic decisions, which is portrayed by the scholars, in a competitive market environment. The literature review will discuss the origin of strategic decision making and its evolution with changing business environment. The study will also discuss why strategic decision making is important for the success of product innovation. This paper stresses that actions and decisions make the core of the strategic decision-making as well as implementation process. Strategic decisions can be considered as rational knowledge application to a problem. It includes finding answers to critical business questions such as different alternatives and consequences of the same. It also analyses the desirability of these consequences and applied criteria for the evaluation of various alternatives. In case of structured problems, a rational solution may be sufficient. But highly unstructured problems require specific solutions brought in only by strategic decisions. Several studies have confirmed that innovation is the forward step for the companies in order to survive in the market place for a longer period of time. The review on literature will also help in analysing the future scope for the company their effective use of strategies for making their innovations successful.

Thursday, October 17, 2019

Provide a critical discussion of the growing trend to practice Essay - 1

Provide a critical discussion of the growing trend to practice coaching in the workplace - Essay Example In the connection of workplace coaching, leadership is characterized as: the interpersonal techniques included when the one individual (differently alluded to as a director, group leader or line supervisor) enrolls the backing of their work gathering to attain imparted objectives (Mccartney and Campbell, 2006). Backers of managerial coaching highlight its potential to empower line-chiefs to fulfill their leadership work through creating and outfitting the aptitudes, learning and capacities of colleagues to convey propelled and powerful execution (Harney and Jordan, 2008). In spite of the interest in the role of a manager as a coach in both the leadership and HRD rules, very less consideration has been paid to its suggestions for non specific leadership hypothesis (Hagen and Aguilar, 2012). Likewise, despite the fact that it is sanctioned by line chiefs, the writing identifying with managerial coaching is grounded in the knowledge of master and official mentors; there is meager research about the degree to which the same models and behaviours are fitting for both specialised mentors and for line supervisors (Sue-Chan, et al 2010) and little is thought about the individual or expert attributes that may influence the inclination for an administrator to embrace workplace coaching (Hawkins and Smith, 2006). In this setting the paper makes two central commitments. To begin with, it recognizes the behaviours cohorted by line chiefs with workplace coaching and evaluates figures that may influence administrators affinity to embrace coaching. Second, it survey s the meanings of managerial coaching for bland leadership hypothesis. The destinations of the paper are to: Coaching is presently an unmistakable segment of broad methodologies to HRD. Official and management level coaching are progressively pervasive and numerous associations additionally advertise the thought of the supervisor as mentor (CIPD, 2011). Models of coaching in the expert

The Presidency Research Paper Example | Topics and Well Written Essays - 1000 words

The Presidency - Research Paper Example The American presidency is the most powerful office positions in the universe, considering the fact that the United States of America is the powerhouse of the world. As such, the presidency is among the widely recognized worldwide icons (Watts, 2009). Majority of individuals living outside the US or those who have little knowledge on the history of the presidency would assume that the politics of the presidency as similar to any other in the world (or to the local and congressional elections), but those familiar with its history know the significance of the office. A keen and closer look at the history of the executive branch of the US government will highlight the powers and worldwide impact the office may have on the entire world. Among the main roles of the presidency as described by Article II of the American Constitution, include the chief administrator, chief lawmaker, commander-in-chief, chief of state, and the chief diplomat, just to mention a few. In contrast to local or con gressional elections where several individuals of the same ideology are elected in order for the government to address issues of concern, the presidency, a single individual although under the check of various government divisions, has the power to literary change the entire world. As history has it, US presidents have had the power to implement policies that may bring significant changes in the world, or establish new world orders, as is the case with President Washington. Nonetheless, different presidents in the past have had different policy doctrines that helped them govern the country in their presidential terms (Brinkley & Dyer, 2004). The vast powers held in the presidency office often make the role a contradictory institution and complex one, and very vital to the US government system. Restrictions by political laws on one president act as a liberation for another. A successful policy doctrine for one president may be a complete failure by another, majorly because of the pre vailing political and international relations. The US presidency definition may be a series of contradictions, paradoxes, and clashing expectations. Citizens vote a president based on principles and values that are generally acceptable to the society. A citizen’s vote is dependent on the individual’s beliefs, hopes, and wishes. The presidential elections of 2012 will either give Americans a chance to reinstate President Barrack Obama as their president for another four-year term, or choose another candidate based on their guiding principles and presidential campaign platforms (Peters). The issue of terrorism has been a major topic in the past presidential elections campaigns, with the gradual shift from the democratic diplomacy presidency to the imperial presidency as was imposed by George Bush during his term in office (Brinkley & Dyer, 2004). The 57th Presidential elections to be held on 6th November 2012, is expected to feature the incumbent President Obama on a Dem ocrats ticket, a Republican candidate (yet to be decided), and a third party nominee. The presidential campaigns are often marred with accusations and counter accusation, some of which have seen a Republican Presidential candidate, Herman Cain, suspend his campaign on accusations of a 13-years affair and sexual harassment. The Democrats are pushing tax cut extensions as part of their strategy, as well as maintaining their famous

Wednesday, October 16, 2019

Provide a critical discussion of the growing trend to practice Essay - 1

Provide a critical discussion of the growing trend to practice coaching in the workplace - Essay Example In the connection of workplace coaching, leadership is characterized as: the interpersonal techniques included when the one individual (differently alluded to as a director, group leader or line supervisor) enrolls the backing of their work gathering to attain imparted objectives (Mccartney and Campbell, 2006). Backers of managerial coaching highlight its potential to empower line-chiefs to fulfill their leadership work through creating and outfitting the aptitudes, learning and capacities of colleagues to convey propelled and powerful execution (Harney and Jordan, 2008). In spite of the interest in the role of a manager as a coach in both the leadership and HRD rules, very less consideration has been paid to its suggestions for non specific leadership hypothesis (Hagen and Aguilar, 2012). Likewise, despite the fact that it is sanctioned by line chiefs, the writing identifying with managerial coaching is grounded in the knowledge of master and official mentors; there is meager research about the degree to which the same models and behaviours are fitting for both specialised mentors and for line supervisors (Sue-Chan, et al 2010) and little is thought about the individual or expert attributes that may influence the inclination for an administrator to embrace workplace coaching (Hawkins and Smith, 2006). In this setting the paper makes two central commitments. To begin with, it recognizes the behaviours cohorted by line chiefs with workplace coaching and evaluates figures that may influence administrators affinity to embrace coaching. Second, it survey s the meanings of managerial coaching for bland leadership hypothesis. The destinations of the paper are to: Coaching is presently an unmistakable segment of broad methodologies to HRD. Official and management level coaching are progressively pervasive and numerous associations additionally advertise the thought of the supervisor as mentor (CIPD, 2011). Models of coaching in the expert

Tuesday, October 15, 2019

Agile software development Assignment Example | Topics and Well Written Essays - 2000 words

Agile software development - Assignment Example To begin with, the state of many operating environments of software systems is such that any vulnerability is likely to attract exploits (Paul, 2012). This calls for software testers that are focused, diligent and thorough to ensure that the delivered software products do harbor any vulnerability. Just like the software testers, hackers constantly make efforts to have their hacking skills updated. With such an effort, the hackers increase their ability to identify and exploit newer system vulnerabilities. Thus, testing like a hacker means that a software tester assumes the role of a hacker to be better placed in identifying the security hitches of a system. Secondly, hackers have the main intention of doing what other people have not been able to do and this is why they able to discover system vulnerabilities. To counteract such intentions, testers have to think outside the box about the possible system weakness that attackers and hackers can find attractive. Nothing would be as paining as a tester carrying out a vulnerability assessment only for someone to come after him to find something that he failed to identify. Furthermore, the focus, time and effort spent in a testing activity will dictate the success level of a software project (Khurana, 2009). Based on these facts, testing like a hacker means that a software tester in his effort to eliminate system weaknesses might need to go beyond the testing scope specified in the Test Plan. Finally, the exploitation is known to be a mission for circumventing the security controls of a system by launching an exploit. In the software world, exploits are bugs or issues within the software code that allow hackers to execute or launch payloads against the target software system (P, 2013). Payload here refers to a means of having the target machine turned into a puppet and forcing it to make our wishes. The payloads have the danger of altering the intended software

Dr Jekyll and Mr Hyde Essay Example for Free

Dr Jekyll and Mr Hyde Essay Dr Jekyll and Mr Hyde is a popular novel published in 1886. this book related to many of the Victorian readers. During the Victorian period people lived two lives one side is the almost stiff powerful dull society with more concern of their reputation. However when they were in the comfort of their own homes, emotions which are ceased to be seen and bottled up in public are relieved by drinking alcohol, smoking socializing with friends and intimacy with a partner. Dr Jekyll and Mr Hyde was a successful horror novel of the time, one reason for this is Charles Darwins theory of evolution. Most Victorians rejected the theory as it questioned their faith and powerful race. His theory raised a few eye brows and put many people on edge scaring them at just the thought of evolving from apes and even re-evolving back. Stevenson uses this public fear to shock and scare his audience with horror novel. Gothic horror was every popular around this time and Dr Jekyll and Mr Hyde included many gothic horror features. Some of these features are ; mystery, Gothic architecture, death, decay and secrets. All these create fear tension and a good horror novel. A old dark dangerous London is a good setting for fear and action. Londons scenery was full of medieval and run down neglected buildings. During the day Londons streets are usually busy and booming with business although this novels settings is mainly set during the night early hours of the cold winters morning. back in these days streets were dark and the mortality rates were high. During the day the rough streets are shadowed by aged blistered and distained buildings, but in the dead of night these are hidden as there is nothing to be seen but lamps this creates fear and mystery not knowing what lurks behind the thick wall of darkness. During the bitterly cold nights what is normally full of people the streets are as empty as a church this emphasizes the silence and eeriness of the lamp lit streets, this also relates to gothic architecture. In typical gothic novels the weather is always dark and gloomy. London is already a dark dangerous city but to add to this its now draped in fog and with permanent bad weather to form a sinister London landscape. One street shone out in contrast to its dingy neighborhood. The street was a pleasant and well kept, however one building was quite the contrary, a certain sinister block of building thrust forward this suggests that the discolored blistered and distained building stuck out like a saw thumb. A main theme of the novel is opposites the contrast between nice and ugly. On the face of the building theres a door which was equipped with neither bell nor knocker, blistered and distained which seemed some what of a mystery. For many years this decayed building has been neglected its clear no one has lived there for years. The only company and treatment it receives is the tramps slouched in the recess striking matches on the panels, this is just another reason why people scurry past the square. The building is mystery to everyone local to the area the windows are always shut. Gothic horror novels use mystery and secrets to create fear and tension, this is a affective because the reader starts to imagine what the secret could be. They are often wrong but by picturing it, the human mind often over exaggerates what it could be maybe the readers personal fear. Stevenson does not reveal the secret until the end of the story however he drops in hints and clues so its kind of like a detective investigation. Hydes physical appearance is not disclosed for the first few chapters instead his descriptions are based on how he made other characters feel. This allows the reader to picture Hyde how they think of him, like always the readers imagination is far worse which makes the story interesting. In case of Dr Jekylls disappearance or unexplained absence for any period exceeding three calendar months. The said Edward Hyde should step into the said Henry Jekylls shoes with out further delay, there are two mysteries in this quotation, one being at this point Mr Utterson knows nothing about this Hyde character and has seen him a few time but only remembers him for brutally crushing a little girl. Both the reader and Mr Utterson are confused to why Jekylls will includes this stranger. The second mystery in this quotation is the strange unexplained disappearance of Jekyll, why would such high member of society ceased to exist? And what had caused Dr Jekyll to do this? Hyde is suspected to be linked in with Jekylls peculiar behavior, his barbaric looks and attitude have already gained him a bad name. that sawbones turned sick and white with the desire to kill him. This was a doctors view on Hyde, for a doctor to remark some one in Victorian times like that is a worrying thing as they saw gruesome things on a daily basis. In the opening few chapters Stevenson reframes from describing Hyde, he uses various characters reactions to portray Hydes repulsiveness. He was twice described as deformed He must deformed somewhere, he gives a strong feeling of deformity, although I couldnt specify the point. In Victorian times deformed people were pushed to the boundaries of society showcased for public entertainment as employment in the work place was difficult for them. But no-one dared put Hyde in his place, he was indescribable however when he was described .. the man seems hardly human.. .. Satans signature on his face.. this states his pure evil animal look about him. Hyde run down a helpless little girl with no remorse, Mr Enfield described this most unbelievable event to Mr Utterson, for the man trampled calmly over the childs body and left her screaming on the ground. it was hellish to see it wasnt a man; it was like some dammed juggernaut. Like hes some unstoppable force. Hes seen as hardly human. One of the Victorians greatest fears of the time was evolution Stevenson links Hydes primitive appearance and actions to this. The novel played one peoples fears and maybe opened their eyes to what could possibly happen. Violence can add an element of surprise, this tension could shock and thrill the reader. In a good horror story the reader is unaware who is to be hurt next, this creates fear and mystery. To create more fear the writer builds up to something where the reader is sure some thing is going to happen however it only builds up to a anticlimax, there are usually a few anticlimaxes before a brutal killing. It is possible for the reader to put them selves in the position of the victim, no-one wants to die an horrific death this can make the reader feel sorry for the victim, this can be most affective when the incident reflects a real life circumstance. Mr Hyde broke out of all bounds, and clubbed him to the earth. And the next moment with and ape-like fury, he was trampling his victim underfoot, and hailing down a storm of blows, this shows the true capabilities of Hydes animalistic nature. Ape-like fury relates back to evolution and how his behavior is no better than a ape, with a sudden burst of outrage Hyde beat a well respected old man to death with no emotion accept anger. Hyde is depicted as creature of great evil although we learn of only two of his crimes. Its the nature of both which highlights the violence against two innocent victims. The first violent act was against the small child and a the second a much beloved old man. These attacks were on both harmless beings which emphasize the extreme immortality of Jekylls darker side. Stevenson has created a tremendous amount of fear using the theme of duality, secrets, Darwins theory, and general gothic features. These would be less affective for todays audience. This is mainly because we have now accepted the theory of evolution and the possibility of having to sides to us. This will remain a well respected novel and if it was to be updated the idea of duality would have to be changed a little. The change between the two sides of a person would be random and the person would also not be able to manipulate the change, the character would also have memory loss each time he/she changes.

Monday, October 14, 2019

Downstream Linkages in the Zambian Copper Industry

Downstream Linkages in the Zambian Copper Industry Resource extraction is often regarded by governments and people of resource-rich countries as a solution to poverty alleviation, ranging from tax revenues, technology transfer, and employment creation, export enhancement to upstream and downstream linkages. Downstream linkage industries do promise the widening of employment opportunities and high foreign earnings as a result of value-addition. Western resource intensive economies such as Australia, Canada, US and the like are examples of well-managed, resource-rich economies in which the mineral sectors spurred knowledge-intensive processes, created jobs and foreign exchange earnings and resulted in spill-overs into new industrial and service sectors. The scope of downstream linkages is often considered an important determinant of the extent to which a mineral-rich nation stands to gain additional economic benefits that come with it. This explains the continuous pressure that is always mounted on mining companies by host governments to engage further in downstream activities. However, downstream activities irrespective of their location are influenced by global market dynamics and competitive elements. Therefore, in an attempt to grasp the benefits that come with downstream activities, it is extremely imperative to examine the opportunities, risks and possible ways of striking a balance taking cognizance of the global demand and supply interplay to ensure that the highest possible net positive benefits are achieved and sustained. In focus is Zambia which has been an active copper mining country since 1900s though performed poorly along the line but revamped barely in the last decade. In 1968, Zambia held an important position as a copper producer, with peak output at 815,000 ton and a 15% share of world output, but the abysmal performance of its state-owned enterprises that took over after the 1969 nationalisation resulted in a drop of output to a trough of 250,000 tonnes in 2000 (Radetzki, 2009p.182). Nevertheless, the copper industry has been revitalised with the privatization of the mining sector which occurred between mid-1990s and early 2000s. In the period 2000-2005, copper exports contributed to around half of total foreign exchange earnings, but from 2006 onwards, this share increased to 73.5% 83.2% ( Fessehaie, 2012 p.3). Copper also provided 10% of formal employment and its contribution to GDP in the last decade increased on a yearly basis, reaching 9.1% in 2009. Copper mining has and continues to be one of the largest economic activities in Zambia, comprising approximately 10 percent of GDP and more than 60 percent of exports (Wilson, 2012pp798-799). The paper therefore examined downstream or for ward linkages to copper production in Zambia by first exploring the scope of downstream linkages and examined the risks, opportunities and risks mitigation measures in the downstream sector of Zambias copper industry. The rest of the paper is structured as follows; section two introduces the background and established the theoretical framework. Section three examined the scope of downstream activities, the risks, opportunities and possible measures for risks mitigation and section four concludes with recommendation. 2.0 BACKGROUND 2.1 A Brief Overview of Global Copper Production and Consumption The global cumulative annual growth in global mine output of copper has gone through significant changes over the period 1750 to 2007. It stood at 0.8% in 1750-1800, rose to 2.6% in 1800-1850 and from 1850 and until 1900, the annual growth of copper production accelerated to 4.5%. Output expansion subsequently reduced to an average of 3.3% between 1900 and 1950, and remained at this level until 2007 (Radetzki, 2009p.182). In 2011, global copper production reached an output level of 16100 metric tonnes from 15900 metric tonnes in 2010 with a total reserves value of 690000 metric tonnes (USDSp. 49) (2012). On the other hand, growth rates in global copper consumption fell from 4.48% in the period 150-1973 to 0.65 covering 1973-1983 largely explained by the oil price shocks of the 1970s and 80s and picked up again, reaching 2.51% for period 1983-2003 (Nishiyama, 2005p..132). The period following 1990 saw a significant increase of Asia, especially Chinas share of global copper consumption , currently about 40% (ICSG) which gradual spurred up copper prices in the mid-2000s. The interplay of Chinas demand growth and appropriate timing of additions to production capacity speaks a lot about the future global trends in both production and consumption. 2.2 Overview of Copper Mining in Zambia Copper mining in Zambia dates back to the 1900s under the control of two mining companies, Rhodesia Selection Trust and Anglo-American Corporation (AAC)( Fessehaie, 2011p.16) .The industry came to be nationalized in the late 1960 and was operated under state ownership and control, a typical characteristic of mining operations in mineral exporting countries in the decades following the Second World War. The government, following years of significant losses, privatized its copper mines, which were later consolidated into the Zambia Consolidated Copper Mines (ZCCM), majority-owned by Government (60.3%), with a minority share owned by AAC (27.3%)( Fessehaie, 2011p.16). For instance, Kansanshi mine, the largest copper project in Africa is 80% owned by First Quantum Minerals Ltd and 20% by the state run ZCCM Investments Holdings which replaced ZCCM (ARB, 2012). The mining sector is regulated primarily by Act No. 7 of 2008 (the Mines and Mineral Development Act of 2008). The Zambian copper industry is not insulated from the acquisitions and mergers characteristic of the global mining industry. In 2011, Barrick Gold Corp. of Canada acquired Equinox Minerals Ltd. of Canada (USp43.1). Newshelf 1124 (Proprietary) Ltd. of South Africa, an indirect subsidiary of the Jinchuan Group Ltd. of China acquired Metorex Ltd. of South Africa and its underground Chibuluma copper mine (Metorex Ltd., 2011, p. 8). Konnoco Zambia Ltd., a joint venture of African Rainbow Minerals Ltd. of South Africa and Vale, continues with the development of the Konkola North underground copper mine (African Rainbow Minerals Ltd., 2012, p. 70). Mining companies equally undertake joint ventures in explorative activities in Zambia. Argonaut Resources NL of Australias subsidiary Lumwana West Resources Ltd. in a joint venture with Mwombezhi Resources Ltd. of Zambia set to explore in Northwestern Province (Argonaut Resources NL, 2012, p. 2). Zambias economy is heavily reliant on mining, particularly its copper and cobalt, and the mining sector makes significant contribution to Zambia exports and economic growth. Copper output rose dramatically following the copper price rise in the mid-2000s with annual copper production increased from 335,000 metric tonnes in 2002 to over 569,000 metric tonnes in 2008 (Wilson, 2012) . From 2007, copper exports contributed 73.7-80.5 per cent of total foreign exchange earnings, 10 per cent of formal employment, and in 2010 Zambia was the largest copper producer in Africa and the 7th largest in the world ( Fessehaie, 2012). Copper exports jumped from $474 million in 2000 to almost $4 billion in 2008. In 2010, the mining and quarrying sector accounted for 9.9% of Zambias real gross domestic product (at constant 1994 prices) compared with a revised 9.3% in 2009. Copper exports earnings increased by 15.5% to US $6,660.2 million from US $5,767.9 million in 2010 (Bank of Zambia, 2012, p. 23,) a nd in 2011, copper exports were valued at $6.9 billion (Mobbs, 2012 p.43.1). 2.3 Theoretical Framework The concept of linkage development in the academic discourse has its root from early works of Leontief (1936) who applied an input-output analysis to static quantity modeling (Lenzen, 2003 p.1), modified by Rasmussen (1956) for inter-industrial analysis as setting the basis for structural interdependence. In determining the key sectors of an economy, Hirschman (1958) argued that above-average linkages are pre-requisites for economic development and structural changes within an economy or a region (p1-2). Contrary to this argument, Bharadwaj (1966), Panchamukhi (1975) and McGilvray (1977) highlighted that international comparative advantages, technical and skill endowment, final demand structure are among the driving forces of economic growth and concluded that linkage interconnectedness is a weak rod to rationalising a development policy(1-2) According to Hirschman as cited in Morris et al (2012), there are three main types of linkages in the commodity sector thus, fiscal, consumption and production linkages. In his view, fiscal linkage encompasses royalties and taxes which together form mineral rents; consumption linkage entails the consumption demands of workers of the commodity sector, whereas the production linkage encapsulates both backward and forward linkages. Authors such as Sonis and Hewings (1989, 1999) and Sonis et al. (2000) in their works on the dynamics of backward and forward linkages, and economic landscapes of multiplier product matrices pushed further the arguments of Hirschman and Rasmussen (Lenzen, 2003 p. 2). The linkage thesis has been applied in a number of studies in attempts to examine the impact of mining on economies. Lenzen (2003) utilised the input-output application in his analysis of the key environmentally important factors of production, linkages and key sectors in the Australian economy and concluded without a factual basis that strong forward linkages are characteristic of primary industries like grazing and mining whereas strong backward industries characterized secondary industries (p.29). Similarly, Cristobal and Biezma (2006 p1,5) analysed the forward and backward linkages of mining and quarrying in ten EU countries to determine whether the industry constitute a key sector and came to a conclusion that the mining and quarrying industry has a strong backward link to regional economys production more than other sectors and otherwise holds for forward linkages. Though not a metal mineral, the Southern Louisiana offshores oil fields is the most apparent successful linkage ca pture identified throughout the 20th century. The ability to sustain pre-existing competition and the availability of the commodity in large quantities were largely responsible for the successful linkage capture (Freudenburg and Gramling (1998p 575-576). Moreover, Aroca (2001p 131) employed the input-output Leontief matrix to determine the impact of the mining sector on the Chilean II region and analysed the driving forces to the extent of the impact. With regards to the volume of production, his analysis indicates that the mining sector is very important but loses its importance in developing forward and backward linkages in the economy. Lydall (2009 p.2, 119) investigated backward linkage capture of South Africa platinum group metals and found different categories of supplier firms, ranging from base, medium to large able to satisfy the needs of the various PGM mines, concentrator plants, smelters and refineries. She however cautioned the existence of market-related and firm-speci fic factors militating against the growth and expansion of such linkages. Morris et al (2012 p 1-2,14) examined the underlying factors to linkage capture in the commodity sectors in low income countries in Sub-Saharan Africa with much attention on backward linkage capture and recommended for strategies to be mapped to propel industrial sector upgrading especially in commodity exporting countries. Also, Fessehaie (2012p 2,7) examined the determinants of upstream linkages to copper production in Zambia. She noted that backward linkage was growing and copper mining presents opportunities and recommended that in order to broaden backward linkage to utilize such opportunities there is the need to eliminate barriers to upgrading through an industrial policy which takes care of supplier competitiveness constraints. From the preceding literature reviewed, much attention on linkage capture studies has been directed at the backward linkage capture. The few works on linkage development in Zambia copper (Fessehaie, 2011 and 2012; Morris, 2012), the emphasis has been on the backward linkage. Therefore, the existence of paucity of studies that investigate forward linkages in the mineral sector particularly the copper industry in Zambia exposes a gap which the study aims to contribute to. 3.0 ANALYSIS AND DISCUSSION 3.1 The Scope of Downstream Activities Forward linkages encompass the establishment of downstream activities, at least processing and refining of copper ore and concentrates into primary metal, the fabrication of primary metal into semi-fabricated products and possibly, induced industrialisation. For the purpose of this study, mining ends with primary metal production and downstream activities begins with semi-products fabrication and beyond. Zambian copper industry has long history of existence but became more active and copper mine production of ore, anode and cathode increased following the privatization of the mining industry through the 1990s to early 2000s. The majority of copper ore mined in Zambia is smelted locally before being exported to foreign markets (Fraser and Lungu, 2007 Wilson). Fig 3.1 confirms that though greater share of mine output is refined locally, very less of it is used in the country. The graph covered a short period due to lack of access to up-to-date quality data. Zambias copper is mainly exported as cathode or blister, the standard forms of the internationally-traded commodity. Zambia uses less than 5 percent of its copper output to make fabricated products (World Bank, 2011 p ii). However, finished goods containing copper are mainly imported into the country. Zambia has developed a small copper fabrication industry that produces a narrow range of products for domestic use and for export to regional markets, largely informed by proximity to customers guided by profitability. However, these markets are small, and yet the industry competes with larger and more developed industries especially that of South African copper fabrication industry. Zambias fabrication industry is growing rapidly, but from a small base, led by Metal Fabricators of Zambia Ltd (ZAMEFA), a subsidiary of the US-based General Cable Corporation followed by others such as the Cast Product Foundry Non Ferrous Metals, Kavino and Central African Recycling in the scrap metal busi ness (World Bank, 2011p ii). ZAMEFA which has a domestic, regional and international market orientation produces wire rod, wire, cable, and a few other products. Its product portfolio is growing. Kavino, wire and cable manufacturer has a domestic market orientation whereas Central African Recycling is well positioned to utilized opportunities as they arise. Total number of employees falls below 1000. In 2008, Zambian mine, smelter and refined copper output in tonnes stood at 546 600, 232,000 and 416,900 respectively. The fabricated metals production sector contribution to GDP grew at an annual average of 0.2 percent for the period 2002 to 2008.(World Bank, pp 18). 3.2 Risks Associated with Downstream Activities The resource-based industrialiation that characterized the development process of resource-rich developed economies is often quoted to back resource-rich developing countries quest for resource-driven industrialisation which in their view masterminded the in dustrialiation process of some mature economies. However, the growth strategy of the Nordic countries, United States and Canada for instance did not based entirely on mineral extraction but span from a low-technology based on low-cost labour to highly sophisticated knowledge-intensive activities (Walker and Jourdan, 2003. P.30.). Nevertheless, risks, largely economic, abound alongside the potentials of further downstream activities. Downstream activities beyond primary processing are capital intensive and require less skilled labour. Guided by profit motive, firms seriously consider capital cost in securing capital to finance assets. Backed by the electronic revolution, market efficiency sets the ground for capital and skills to be deployed to most productive locations (Walker and Jourdan, 2003p 30) and countries without traditional comparative advantages like Zambia are less strategic in competing for foreign direct investment. Again, the capital intensive nature of further processing of copper questions the employment multiplier and rather breed associated risks of either expanding or contracting employment opportunities. Moreover, the fabrication industry uses 37 percent of copper that is derived from scrap metal which is limited in the country (World Bank, 2011p.iii). Therefore, importing other raw materials including scrap for fabrication may not make any comparative advantage sense in the short to medium t erm and highlights the risk associated with an uncompetitive and injudicious allocation of the nations scarce economic resources. The ability to compete and access adequate market, both regional and global to justify downstream activities on any significant scale comes with a risk. Committing resources into fabrication without any competitive market edge exposes the copper mining sector to possible collapse and the entire economy to possible shocks. This is because upon the small size of the sub-regional market (less than 1 percent) of the global total for fabricated copper products (World Bank, 2011p ii) better established firms in South Africa have captured a greater portion of the regional market. Internal demand for fabricated products is woefully inadequate and therefore, the promised job expansion, high foreign earnings and associated growth potential are easily erodible, if even attained. Walker and Jourdan, 2003p 33 noted that domestic demand was instrumental in Swedens initial resource-oriented industrialisation. Closely linked is tariff escalation that discourages exports of higher value-added products from Low Income Countries (LICs) (IMF, 2011p.16). Tariff escalation and high physical transport cost jointly further accentuate the risks to Zambian copper downstream activities. Consuming countries of copper metal and semi-fabricated products especially the newly industrializing countries and roaring developing countries of China and India, in their industrialization drive, have in one way or the other resort to restrictions in the form of differential tariffs (varies directly with the value already added) on raw materials imports for their industries. Dimaranan et al, (2006 p. 13) note that Indian policy measures in this regard include more effective duty exemptions for intermediates used in the production of manufactured exports. The high transport cost and tariffs imposed on value-added products together can cancel completely if not negate the often expectant high profits and associated em ployment multipliers. The prices for both the primary and fabricated products of the mining industry are characterized by troughs and peaks. However, the existence of terminal markets such as London Metal Exchange (LME), the Commodity Exchange Division of the New York Mercantile Exchange (COMEX/NYMEX) and the Shanghai Metal Exchange (SHME)(ICSGP.33factbook) provides mitigation to the risk on primary metal resulting from price volatilities. On the other hand, high-value added downstream products are more prone to price shocks as there exist no such terminal markets in that sub-sector of the industry. Therefore, the often envisaged employment multipliers and high foreign earnings that motivate pressure for further downstream processing places the entire economy at risk in the event of weak prices without any competitive edge. Mainstream fabricated metal products are largely low margin items. However, high level of capacity utilization and throughput is required to generate sufficient margins which are currently in non-existence in Zambian copper industry. This is largely informed by the uncompetitive and comparative disadvantages to the downstream sector of Zambian copper industry. The situation exposes the downstream copper fabrication industry to the risk of at best earning low margins. In 2008 for example, First Quantum Ltd, a leading European copper rod producer made profits of 12.2% and 49.6% from large Cap Cast Copper Rotors (CCR) rod mill and Oxygen-free High Conductivity (OFHC) rod fabrications respectively (World Bank, 2011p.13) but earned a profit of 85.4% from primary cathode production. Such low margins in fabrication gives the signals that even internationally competitive manufacturers of range of specialist copper products rather earn high margins in primary metal production. 3.3 Opportunities in Downstream Value-addition The existence of copper deposits in substantial quantities is a basic requirement for mining in the first place and possibly, further downstream processing (Freudenburg and Gramling, 1998). The existing domestic and regional market does not incentivise further copper fabricating on any significant scale, but some localised small-scale opportunities may emerge. In this regard, there may be a scope for some gradual scaling-up of existing output and/or product diversification by existing operations especially ZAMEFA and for some small-scale artisanal processing, probably based on scrap metal. Sectorial opportunities could be enhanced if the basic and mainly infrastructural bottlenecks are remedied. One of such opportunities is the World Bank support to revamp Zescos existing distribution networks in selected areas to reduce losses and improve supply quality (World Bank, 2011p.33,34). Depending on the roll-out of electrification extensions, there may be some demand for low and medium vol tage. Moreover, the global copper industry has identified a potential market which could exploit the known biocidal properties of copper in combating Methicillin-resistant Staphylococcus aureus (MRSA,) spread by its use in touch surfaces and all fixtures and fittings in hospitals and clinics. The international competitive nature of the downstream activities of fabrication limit these opportunities as well established firms are ever ready and prepared to cease any market opportunities as they arise and compete out less competitive ones. Chinas dominance in the recent global copper consumption forecloses in comparative and competitive terms, any opportunities of developing an internationally competitive further copper processing in Zambia at least, for the short to medium term. For instance, Chinese refined copper consumption expanded by an annual 15.3% in the 1998-2007 period and by 2007, Chinas share of global copper usage rose from 10.5% to 26.9% (Radetzki , 2009. P. 177) in a decade. Though very important, the geological potential does not itself guarantee comparative and competitive advantage in any appreciable further downstream processing. For instance, Chile, the worlds largest copper producer, accounting 34 percent of world mined copper output and 17 percent of wor ld refined copper output, yet its use of refined copper is less than 1 percent of the world total (World Bank, 2011.8) 3.4 Mitigating Downstream Activities-Associated Risks and the Way Forward Value-addition is critical to ensuring greater benefits and competitiveness for countries incorporated in the global economy (Mtegha and Minnitt, 2006 p. 236) hence further downstream processing should be encouraged and driven by state incentives taking cognizance of the external environment. A strong manufacturing base has to be developed if any significant expansion of copper value-addition activities is to grow. In order to grow and sustain a downstream fabrication sector and even beyond, new sources of accessing competitive foreign direct investment and the continual adaptation and innovation of technology which is critical to maintaining technological competitive edge globally are ideal prerequisites. Moreover, demand is indispensable in industrial development and therefore any effort in that regard must first address the market end of the value chain ranging from local, regional to global levels. The ability to create a clear niche advantage is required if the copper downstream activities are to undergo substantial growth. Ideally, attaining global competitiveness is the single most important driver in mitigating risks ranging from further downstream processing or fabrication. While this may possibly be a long term growth and development goal in the downstream sector, the provision of adequate energy, communication and other infrastructure coupled with the effective and judicious use of economic returns from copper mining for diversification in new comparative advantage industries would in the papers view set the foundation for any competitive industrialisation in the long run. From table 1 below, South Africa is better positioned to cease any downstream copper fabrication and market opportunities at regional level and at the global level, China. 4.0 CONCLUSION AND RECOMMENDATION The study explored the scope of downstream linkages in the Zambian copper industry and examined the risks of engaging in downstream fabrication as well as the opportunities and suggested ways for mitigating the risks. The study reveals a small and modest fabrication activity producing a narrow range of products for domestic use and for export to regional markets, largely informed by proximity to customers guided by profitability. The decision in going downstream beyond primary metal processing encapsulates political and economic dimensions hence, requires striking a balance between both dimensions. Shaping a competitive mining industry alongside conscious efforts to diversify into other industries which gradually grow to shake off the initial copper-based dependence is a policy option and at the same time revitalizing the national science, technology and innovation policy to provide the foundation for long term skills and knowledge development. Chile, having built a competitive minin g industry, diversified its economy into other competitive sectors which propelled its growth. In the short to medium term, developing a competitive copper mining industry is plausible and more realistic in comparative advantage terms while mapping out strategies to attain competitiveness from national, regional to global scales which will mitigate further copper processing or fabrication risks.