Advancement of technology has been happening in all aspects of life

Name

Professor

Course

Date

Violence in The Media

Advancement of technology has been happening in all aspects of life, from home appliances such as television, children toys, and kitchen appliances such as micro waves. The manufacturing field has also adopted new technology to improve on the type of goods produced and the quality. Many countries have even adopted the use of technology to make weapons and also launch attacks, the United States of America has been known to use drowns to attack what they consider as combatants (Grady, pg 150).

The rise in violent acts among small children has been on the rise in the recent years, there have been cases where children as young as nine have shot felloe classmates. Such incidences have caused a lot of worry in the community thus posing the question what is really responsible for such happenings. In an article in the CNN website written by Sasha Emmons, in parenting.com the author blames the media for the rise of violent acts in small children (http://www.cnn.com/2013/02/21/living/parenting-kids-violence-media).

According to Sasha the media has contributed a lot to the rise of violent acts in children, she argues her reason based on a research that established “Ninety percent of movies, 68% of video games, and 60% of TV shows show some depictions of violence,” Most movies always have the bad guy and the good guy and most children always take the side of either (http://www.cnn.com/2013/02/21/living/parenting-kids-violence-media).. “With both preschool and school-aged children, studies have found that they are more likely to imitate the violence they see on screen if someone they see as a ‘good guy’ is using the violence to solve a problem, especially if there are no realistic consequences for the violence.”Violence in the media has also been known to have other effects on children, such as fear “With toddlers and preschool-aged children, everything can seem much more immediate — and so seeing violence on TV can leave them feeling like their world is a scary place, where things like that might happen at any moment (http://www.cnn.com/2013/02/21/living/parenting-kids-violence-media).”

There are at least two sides on the issue, even though a majority blames the media for the rise of violence, there are some who are of the opinion that the media is not responsible for some behavior in children. According to Gwenn O’Keeffe, M.D., CEO of Pediatrics at times “We have to allow for some normal child role-playing that lets kids sort out good versus evil and what’s acceptable in society.”She argues that even though the media is full of violence, children have to be given a chance to be children when they grow up they will differentiate the right from the wrong (http://www.cnn.com/2013/02/21/living/parenting-kids-violence-media).

According to me the article is well researched, violence in the media is indeed responsible for the increase of violence among children. In most movies or even video games for the kids, the “good” guys always use violence to defeat the “Bad Guy.” This may be taken by the child that the only way to defeat any person who is bad is through violence (http://www.cnn.com/2013/02/21/living/parenting-kids-violence-media).

Conclusion

Technology has proved useful in many areas; various happenings in the world can be broadcasted within seconds thus helping people keep in touch with the happenings in different parts of the world. The United States of America has used technology to launch attacks in the fight against terrorism. But just like so many other things it has a negative effect in which in this case is the exposing of children to a lot of violence in the media.

Work Cited

Emmons, Sasha. “Is media violence damaging to kids?.” CNN. Cable News Network, 21 Feb. 2013. Web. 11 Nov. 2013. <http://www.cnn.com/2013/02/21/living/parenting-kids-violence-media>. Grady, Wayne. Technology. New York: Groundwood Books, 2010. Print.

Mount Everest-1996

Mount Everest-1996

Name

Institution

Why did this tragedy occur? What is the root cause of the disaster? Create a fishbone diagram to analyze possible root causes. Include an actual diagram.

As the group continued to climb the summit at 5: 30 am, Krakauer and Ang Dorje, realized that the ropes were missing for the remaining 500 meters climb. They wasted a lot of time affixing the rope so that they could reach the summit while they ran out of oxygen canisters. Since time was wasted in affixing the remaining ropes, the storm braving-sub zero temperatures caused death of the mountain climbers. The cause of the tragedy was the mistake by the Montenegrin expedition who wasted all the ropes up to 400 meters, wasting Hall’s and Fischer’s team a lot of time to finish climbing the remaining 8,500 meters up to the summit (Roberto & Carioggia, 2003).

What is your evaluation of Fischer and Hall as leaders? What were their strengths and weaknesses as leaders?

He was revealed authoritative type of leadership. He stuck to his goals no matter whether others were suffering or not. One of the strengths of Hall was a goal oriented person. He maintained his agility to finish up the expedition, without worrying about the dangers ahead. However, he was poor at capacity building and independent-minded; the team led by him complained of fatigue and illnesses at the first summit, yet he did not give them attention (Roberto & Carioggia, 2003).

Fischer used participatory type of leadership; he screened the interest and needs of everybody before starting the expedition and would not leave those injured behind. One of his strengths was team building; he put the needs of everyone first before his. However, he had a vulnerable at the expense of his life. For example, he risked climbing the Everest summit without using the supplementary oxygen (Roberto & Carioggia, 2003).

What is the culture of the group? How would you evaluate their interpersonal processes using concepts from the book?

Initially, the Fischer group expressed a clan culture in which everyone participated to assist where possible when they were climbing a mountain. On the other hand, the Hall’s group developed from competing culture in which people that joined the expedition was ambitious to satisfy their own needs. However, the two engaged into a competent culture when they scrambled for the supplement oxygen during the tragedy. The group suffered from tension whereby everyone was worried that something would go wrong; causing panic and their deterioration of health. During the tragedy, the groups had dynamic interpersonal relationship as team members struggled to get back to safety at the lower summit (Roberto & Carioggia, 2003).

Pick three of the group members and individually describe their motivation to be part of the group using theories from the book. You should have three answers, pick members that have different motivations.

During the tragedy, Boukreev character revealed that the incidence was a result of human error. He descended quickly to get warm at camp IV and when questioned, preferred to stay at the camp while monitoring the clients’ situation. He refused to help Fischer, who was dying from the cold temperatures. The theory of human error depicts that the deaths could have been avoided, such as in the case of Boukreev (Roberto & Carioggia, 2003).

Krakauer proved justified the competing theory by recognizing that mistakes could be done, and the natural factors were inevitable. Scholar of the competing theory argued that climbing Everest Mountain was always the risked, and not just, as a result, of the human factors.

Lastly, Harris showed attributes during the incidence ascertains the competing theory by desperately trying to rescue Hall, he climbed up the summit despite the cold temperatures. He focused on saving those who were suffering from the cold blazing weather (Roberto & Carioggia, 2003).

Pick two of the decisions made in this case and individually describe what kind of the decision process was used. You should have two answers

Fischer made strategic decisions from the beginning of the expedition. He noted that the confidence of the one individual could affect the welfare of the whole group; therefore, he planned carefully, considering the conditions and needs of his entire team before climbing the mountain. On the other hand, the two teams engaged in tactical decisions whereby they needed to make hard choices in the face of the dangerous cold weather. As a result of limited time, they had to make quick response decision to save the lives of those who were dying (Roberto & Carioggia, 2003).

What kind of lessons can be learned from this case for general managers in business? Create an organizational scenario that might benefit from this knowledge.

Most of the organizations lack teamwork and proactive decision making process. According to the Everest incidence, failure of the members to help one another whilst saving their own individual lives cost others to die. The managers in organizations should engage the employees in the implementation of projects which improve the overall performance of the business.

References

Roberto, M.A., Carioggia, G.M. (2003). Mount Everest. New York, NY: Harvard University Press

Challenges Resulting from Effects of Globalization in China

Challenges Resulting from Effects of Globalization in China

Today, I will be discussing the challenges resulting from effects of globalization in China. Having seen how it has developed since 1954, joining the World Trade organization, and gaining footing on the international market, the effects of globalization have been steady from that period to date.

From the period shown above, the global economy shifted significantly with the focus on China showing great political, economic, and social changes. New opportunities for enterprises to enter the Chinese market emerged (Sharif et al., 2020). The impact of globalization on the Chinese economy are the most significant. The economy of China rose, and continues to rise, to levels equal to some of the developed nations in the world. While globalization brought about development tin China, it also created a heap of problems. In this report, environmental issues resulting from globalization will be discussed.

Issues Resulting from Globalization

Some of the major causes of challenges include environmental issues, pressure to achieve the SDG’s in line with the UN’s projections, change of culture, human rights issues, and the rights of workers.

Environmental Problems

China is currently the largest global source of greenhouse gas emissions (Zhang & Chiu, 2020). Recent years have seen China suffer from poor air quality as a result of pollution. The poor quality of air and the ongoing pollution are attributed to the carbon-intensive industries within the country, noted by Umar et al. (2020) to be the hallmarks of Chinese development and a direct result of globalization. The carbon intensive industries have caused other environmental issues including soil contamination and scarcity of water.

China’s Environment Challenge

The increased flow of products, people, ideas, capital, services, and goods across international borders have affected the Chinese environment with noticeable force. In China, increased emissions are only the beginning of the problem. As Chinese products travel further to other countries across the globe, the nation consumes more fuel and more greenhouse gas emissions are yielded. As a direct result, pollution, ocean acidification, and climate change are observed (Zhang & Chiu, 2020).

Due to the land-based transportation of materials and ready products from and to other countries, China has witnessed habitat destruction due to the need to expand its infrastructure including bridges and roads.

Image 1: China’s transport infrastructure development 1978-2015

(Source: Lee, Lee, & Chang, 2015)

Image 1 above shows how the country has invested heavily on the development of a transport infrastructure to cater for the increased need to transport people and products in and out of regions in China. The graph shows that the transport development system was very low in 1978, rising steadily from then to 2005. From there, the growth of the transport network was significantly stable and very high until 2012. In 2013 to 2015, fewer highways have been constructed in China.

Habitat loss and pollution have been the main challenges that have resulted due to the expansive nature of development tin the Chinese transport sector. Even as more Chinese vessels use the sea, the risks of accidents and oil spills is significantly high. The marine environment has also been in danger due to the adverse effects of globalization.

Honorable Mentions

It is important to consider that the UN SDG’s have also been a challenge because of the pressure to attain certain development agendas. Ideally, western countries and the developed world have piled pressure on China to ensure that it has reduced its contribution to environment pollution, yet also stipulated a need to raise the country’s GDP per capita. Another major challenge has been the rights of workers in China. Low wages and poor work conditions, compared to the developed world, have been noted to be a key challenge as China continues to develop in line with globalization and other causes (Wan, Lu, & Chen, 2007). This issue is tied to human rights as pressure is mounted on China to provide better work environment for its industries.

Conclusion

China’s environmental issues have been the focus of this presentation. Globalization has, undoubtedly, led to a need to expand and grow industries in China. This has led to a need to create more road networks, increase its presence in the sea, and orchestrated a rise in the industries within the country, all leading to environmental degradation.

Thank you for your time. I will take all the questions that you may have regarding my presentation.

References

Lee, C. C., Lee, C. C., & Chang, C. P. (2015). Globalization, economic growth and institutional

development in China. Global Economic Review, 44(1), 31-63.

Sharif, A., Godil, D. I., Xu, B., Sinha, A., Khan, S. A. R., & Jermsittiparsert, K. (2020).

Revisiting the role of tourism and globalization in environmental degradation in China: Fresh insights from the quantile ARDL approach. Journal of Cleaner Production, 272, 122906.

Umar, M., Ji, X., Kirikkaleli, D., Shahbaz, M., & Zhou, X. (2020). Environmental cost of natural

resources utilization and economic growth: Can China shift some burden through globalization for sustainable development?. Sustainable Development, 28(6), 1678-1688.

Wan, G., Lu, M., & Chen, Z. (2007). Globalization and regional income inequality: empirical

evidence from within China. Review of Income and Wealth, 53(1), 35-59.

Zhang, W., & Chiu, Y. B. (2020). Globalization, Country Risks, and Trade in Tourism Services:

Evidence from China. Sustainability, 12(14), 5869.

Challenges Facing County Governments

Name

Professor Course

Date

Challenges Facing County Governments

Counties are facing many issues that are becoming more demanding by the day. One such issue is problems with structural finances. Property taxes are going down when the growing cost of services is increasing, and the infrastructure in place is aging. These warrant repairs and maintenance of infrastructure under local governments such as roadways, sidewalks, water and sewer lines as well as municipal facilities. The growth of metropolitan areas is also causing increasing stress on roadways meaning these part of infrastructure requires attention as well. On top of these, counties have to deal with the economic impacts of climate change that bring about water scarcity and extreme weather. Technology is also bringing about regulatory problems to local governments as vocal parties demand that these advanced technologies be bound by regulation in ways that ensure existing industries are protected.

Declining county funding is a very significant problem for county governments. In addition to this, state governments are limiting the counties’ capacity to raise revenue. Forty-five states have put some limitations on the abilities of counties to raise money through property tax. Counties are forced to cut funding from crucial areas such as public safety to cover the deficits. States are increasing mandates for counties to implement without providing the funding required to do so.

To deal with the fragmentation of programs and services, county governments should engage nonprofits an social enterprises to generate a hybrid model of public services and one driven by profit. The need for public trash collection, habilitation of people dependent on drugs, safe housing options, and so forth have been answered by private entities. Citizens are given some degree of power to resolve their own issues that would otherwise burden these governments. Citizen engagement is thus essential, and the use of technology can help further this initiative. Citizen engagement means collaborative work that aides in building on past developments and incorporating new services.

Differences Between Strong-Mayor, Weak-Mayor and Council-Manager

A weak mayor kind of government uses a mayor-council method where he/she is subordinate to the council in terms of the mandate for policymaking and administration powers. The council employs a city manager and appoints the mayor as opposed to being elected. The council-manager is appointed by the council in which the mayor is a member. The mayor is elected by the citizens. A strong mayor or the mayor-council form of government has the mayor as the chief executive officer of the city and does not employ as city manager, maybe an admin to help run daily affairs. The strong-mayor form of government is the most desirable for me because, as a mayor, one would like to do things his way. The issues one promised the electorate deal with once elected will be easily executed without needing approval and without including limitations.

Why Texas Democrats Trust the Supreme Court more than Other Government Branches

Despite the Supreme Court being the least understood branch of government, it is the most trusted. Democrats in Texas believe that supreme court judges follow the law and not political ideas when rendering their decisions on issues. Texas Democrats believe that Supreme Court judges base their decision solely on the law. There have been partisan battles recently over the highest court in the land. However, a majority of people, including Texas Democrats, believe that the court holds a moderate position in this liberal-conservative continuum. This opinion about the supreme court by Texas Democrats increases with more knowledge on the court and the decision of judges. In essence, the Supreme Court is specially capable of commanding respect, especially when compared against other government branches, and most of all, those citizens that are aware of the roles of justices under the constitution.

Why Republicans and Independents in Texas Trust Trump more than the Supreme Court

Trust in the executive, particularly Trump, is strongly related to party support. Almost all Republicans have trust in the president because he is, of course, conservative as they are. Republicans trust the Supreme court more than they distrust it but not as much as they trust the president. Some believe that the Supreme Court sometimes leans to the liberal side. A good example is a decision made by the supreme court in the last few terms. The decision to stop President Trump’s addition of work as an eligibility requirement for Medicaid is one that may be considered by liberals as to lean towards the liberal direction because it was President Obama who expanded this program. Independents do not support the Supreme court as much as they do the president because they believe that the Supreme Court may be leaning to one side of this partisan continuum. Unlike the president who has the right to have biased ideas, the Supreme Court should be strictly unbiased, and when a little biasness is perceived, independents would rather side with the side that is not selling out. Independents in Texas might have supported Trump despite them being on no side, which means they have trust in him.

Effects of voter ID laws on Turnout in Texas

The Texas voter ID laws require voters to have with them a government-issued ID such as an identification certificate, a driver’s license, a US passport or a military ID. Such requirements disenfranchise minority voters who face significant limitations when applying for these IDS. The laws accept a license to carry a gun but decline a government or school-issued ID, which is just absurd. It is known that white people in Texas are the minority with licenses to carry handguns. Minorities face huge barriers to obtain a gun license; that is why these laws can be perceived to be discriminatory. Other states permit various forms of ID that are excluded from Texas laws, which keep a lot of people from voting. These laws, according to Judge Nelva Gonzales Ramos from the US District Court of Southern District of Texas, had a discriminatory effect. These laws affect voter turn out by targeting particular races and enacting restrictions that most certainly appear to keep them away from the ballot. These patterns of requirements under these laws cannot be explained by grounds other than race.

Barriers should not accompany the right to vote. The voter ID laws keep many away from the ballot, deprive them of their constitutional right to vote, and directly oppose the country’s progress towards including more Americans in the democratic process. Many Americans do not have access to the forms of identification included in these laws. These voters are disproportionally low-income, from racial minority groups, and other vulnerable demographics. These voters have a hard time obtaining ID because either they cannot afford to obtain the documents required to obtain a photo ID card issued by the government. A study by GAO indicates that voter ID laws reduce voter turn out by about 2 to 3 percentage points, which means tens of thousands of Texas residents cannot vote.

Why I oppose these laws

I oppose these laws because almost 11 percent of Americans do not have a government-issued photo ID (ACLU). Again, obtaining this ID requires money, an expense that low-income Americans cannot foot. This includes the combined cost of document fees, waiting time, and the cost incurred during travel. When these costs are combined, they come to between $75 to $175. The elderly and people with disabilities cannot be able to travel as well as those people coming from rural areas. People from Rural Texas travel up to 170 miles to the next ID office.

The discriminatory aspect of these laws mostly influences my stand against this law. Minority voters do not have the IDs required for voting as compared to white people. A quarter of African-Americans across the nation of voting age do not have photo IDs from the government in which is quite disproportional, considering only 8 percent of whites lack these photo IDs. Besides, allowing permits for handguns to vote and disallowing other forms of ID such as student IDs is straight-up discriminatory. Again, the majority of minorities do not have handgun permits, which are also hard to obtain when one is from either of these groups.

The Role of the Media in elections

The media is central to the proper function of a democratic nation. The media usually plays a watchful role. They conduct autonomous scrutiny and discuss the strengths and shortcomings of candidates, bodies that oversee elections, the government, and informs the public of the extent these agencies have carried out their mandate as required and join them in holding them accountable. The media also ensure public participation in elections by educating them on how to exercise this democratic right. They also provide reports on how the election is progressing. The media give candidates as well as their affiliated parties a platform to communicate with the electorate. It also allows the public to communicate their ideas, concerns and needs to the authorities and to people seeking to join the administration and provide a platform for them to interact on these issues.

The media so far has played most of its part as the backbone of this democratic nation. It has informed, criticized, and stimulated debate on various crucial occasions. The credibility of the media has, however, been in question. Its effectiveness is based on its responsibility to get its facts right, which I believe it has done. The media has dug deep, collected opinions from different people, and countercheck their facts thoroughly. It has not held back in rooting out deception and exposing liars, hypocrites, and the corrupt using counterchecked facts.

Where the media does not show much merit is avoiding to cause panic by exaggerating facts. It appears that the media these days is reliant on the information that cause havoc in order to draw public attention. The press is yet to lose the respect of the people and the nation at large, but there have been instances of irresponsibility, exaggeration, and mongering to influence sales.

Challenges that hinder minor party candidates from succeeding in statewide

Minority party candidates are a long way from ousting the Republican and Democratic hegemony that has characterized American politics for way over 150 years. Republicans and Democrats still reinforce archaic laws that ensure voters have only two choices at the ballot. When these two parties came to power during the early years, each with its turn, they created restrictions that bar outsiders from participating fully in the state as well as national elections.

In Arizona, for instance, Republicans and Democrats need to collect 6,000 valid signatures in order to be included in the ballot. However, this number is six times higher for independents who are required to bring them in the form of valid petitions. In reality, an independent would need to collect around 50,000 signature to make sure that they have 37,000 that are valid (Galen). Only candidates that are able to fund themselves or have independent notoriety can be able to make these targets. It is clear that these two dominant parties have no interest in entertaining further competition. Even if independents join the Green or Libertarian parties, which are considered traditional failures, they solve the ballot problem, but still, they suffer from the wasted-vote theory where voters see them as fringe groups with no likelihood of winning.

Works Cited

ACLU. “Oppose Voter ID Legislation – Fact Sheet.” American Civil Liberties Union, 2017, www.aclu.org/other/oppose-voter-id-legislation-fact-sheet.

Galen, R. “Opinion | Reed Galen: Here’s How to End America’s Ballot Box Duopoly.” NBC News, 17 Apr. 2018, www.nbcnews.com/think/opinion/how-republicans-democrats-prevent-independent-candidates-getting-ballot-ncna866466.

Advances in Technology

Advances in Technology

Introduction

Technological advancement is the order of the day in the 21st century. This comes along with plenty of positive value addition to the human life. An advance in technology is brought about by the rapid expansion of research and development sector in the multi-national companies. A perfect example of a company that invests in research and development is; Samsung technologies. This is one of the revolutionary companies that work day and night towards investing in new technologies. The rapid discovery of electrical appliances such as; microwave LED television, iPod, 7D technology, computers, cable internet and health technologies are enough evidence to support the rapid evolution of technological advancements.

Investing in health technology is one of my strategic investment areas. Developing a machine that helps HIV patients to reduce the number of viruses in the body by only exposing oneself to rays, without necessarily swallowing the anti-retroviral drugs is among my key investment plans in technology. Out of 9 billion of the planet’s population, 973 million people suffer from HIV. This exposes better side of the remaining earth’s people to contracting this disease. Therefore, to contain this menace, a machine that kills 95% of HIV virus inside the body of the victim is my technological investment goal.

Across the globe, HIV virus is a menace to every living population. This virus affects both the victims and the people close to the victim. This health technology reduces the number of deaths from the HIV patients. Thus, it works closely to saving more and more lives that are lost day-to-day from this dangerous disease. It also cuts on the budget of the victims in buying the drugs. Constant use of the drugs means a negative effect on one’s budget. This technology cuts on the victim’s expenditure by 300%. A victim needs to go for this type of treatment only twice a year, as a result, a significant reduction of budget expenditure is a notable thing to the society.

In conclusion, advancements in technology are the key strategic goals of any individual in the 21st century. This is due to its efficiency and simplicity. It doesn’t have plenty of negative impacts to the population using it.

Works Cited;

“Health Care Technology Today.” PT In Motion 5.5 (2013): 36-45.

Mount Kilimanjaro

Name

Professor

Course

Date

Mount Kilimanjaro

Mount Kilimanjaro for an extended period, has been termed as “The Shining Mountain.” A number of scientists articulate Kilimanjaro’s crest might soon stand out no more. In line with Professor Lonnie who is a lecturer at Ohio State University, the mountain’s ice fields could vanish by 2020. In his article published on October 18, in the years 2002 in the journal Science, Lonnie and his cowriters depict that the ice on the peak that formed over 11,000 years before has declined by 82 percent greater than the preceding century. The writers establish that the current, theatrical decline in the mountain’s ice top is predominantly remarkable given its diligence through numerous earlier shifts in ambiance, including a relentless 300-year-long dearth that effected human inhabitants living in the expanse approximately 4,000 years ago.

The images depict two angle views of the mountain on the month of February in 1993, as well as on the month of February in 2000. These representations were obtained by the Landsat 5 along with Landsat 7 satellites, correspondingly. The pictures illustrate extremely vegetated topography (green colors) just about the bottom of Kilimanjaro, whilst the foliage is comparatively sparred up the boundaries of the 19,335-foot stratovolcano. The light tans at elevated elevations illustrate rock, and naked land facade, exposing the crisscrossing drainage terrains stamped into Kilimanjaro’s countenance over the times by precipitation and snowmelt. At this point, the pictures have been swathed over a digital height model to provide a better intellect of the mountain’s 3D outline. It must be depicted that the disparities in the summit’s manifestation, in these prospects, are outstanding in large part to cyclic disparities in snow cover. It is never feasible to differentiate cyclic snow from frost in these representations; thus they cannot be employed as a sign of the velocity of the ice loss.

The initial well-certified atlas of the ice spheres atop Kilimanjaro was done in 1912. As a minimum, four surveys done from 1912 disclose, there has existed a continuing decline in the amount of the frost. Mount Kilimanjaro was instigated well-known in the western humankind by the highly praised essayist Ernest Hemingway who inscribed the small story “The Snows of Kilimanjaro” in periods of 1930’s. When one reflects on Africa, snow is typically one of the final aspects that come to mentality, other than Mount Kilimanjaro located in the region of Tanzania had a significant snow and ice topped peak for more than 11,000 years. The use of “had” is because the snow is speedily fading. It is yet an additional illustration of how an aspect so enduring has fallen casualty to man’s disparaging ways.

Mt Kilimanjaro’s significance far surpasses a pleasant photo chance or insight for a work of fiction. The ice ceiling was extremely significant to the adjacent area and was as well the basis of the Nile River. Numerous villages bank on the snow and frost liquefied water. Living things on the plains neighboring Kilimanjaro are presently vanishing and numerous plants are as well at jeopardy. Despite the reality that there is still several disputes amid the scientific society as to what is the basis of the diminishing ice; the universal consensus is global warming associated climate alteration. It is a strange characteristic this creation and the next creation have been onlookers to a number of the utmost global ecological mayhems for millions of years; along with maybe a “benefit” that people would wish not to encompass. No person would have contemplated that a creature, man, could precise such a duty so rapidly across the whole globe; even in locales that no person has hardly visited.

Summary

The decline of Kilimanjaro’s ice top has turned out to be the placard infant for the outcomes of universal warming. A number of scientists, elected officials and Media have been spiritual in censuring human actions. Nevertheless, fresh research depicts that the origins of Mt. Kilimanjaro’s well-established glacier decline is far extra multifaceted, probably effecting from a normal climate change that happened over 120 years that passed. This is lengthily before extensive use of fossil power. Therefore, scientific proof notifies us that the reduction of Kilimanjaro’s ice ceiling is merely an element of the recede and gush of the never-ending sequence of nature. This symbolizes an ideal instance of why methodical “accord” does not match scientific reality. This is the motive why people ought not act in rush, centering their deeds on methodical closes that have not been methodically scrutinized and analyzed regardless of being extensively quoted.

Analysis

The decline of Kilimanjaro’s ice top (not be puzzled with the “snows” of the mountain, which still change with the weather conditions) has grown to be the placard child for the outcomes of human-centered universal warming. The account is easy to enlighten – particularly with an associated series of snaps depicting the decrease of the mountain’s ice top. Any person can perceive the theatrical changes. Judgments of contemporary inspections with momentous photographs and journalism accounts merely seem to endorse the story (The Center for Science and Public Policy, 2). Melting ice appears to be an ideal symbol for universal warming; certainly, famous scientists, chief media outlets, in addition to, affiliates of the U.S. governing body have all associated melting ice with people-stimulated climate change.

Work Cited

The Center for Science and Public Policy. White Paper: The Consensus on Kilimanjaro is

Wrong (2003). Web. 15 Jun. 2012. Available at

<http://www.ff.org/centers/csspp/pdf/Kiliman-MAC-4-8-04.pdf>

Movements and Muscles involved in Spiking a Volleyball

Name

Professor’s name

Course

Date

Movements and Muscles involved in Spiking a Volleyball

Volleyball is one of the many sports that are played using a simple technique; the capability to deliver a ball to a net against all efforts of the opposing team. A volleyball spike refers o the strong attacking action carried out by a person to score against the opposing team. Both muscular and skeletal systems are critical to the performance of body movements. A volleyball spike occurs in four key phases, namely the approach, arm cocking, arm acceleration, and follow-up. There are various movements that take place in the shoulder complex when spiking a volleyball. Both the glenohumeral and shoulder joints become elated, horizontally abducted, and externally rotated in preparation for the spike. The joints also go through scapular posterior tilt, trunk extension and right rotation, upward and external rotation and side flexion. The shoulder is classified as a diarthrosis, and its structure type is ball and socket. The main shoulder movements that take place are abduction, rotation, and extension at three degrees of freedom.

Some of the muscles involved in a volleyball spike include hamstrings, quadriceps femoris, gastrocnemius, and biceps brachii. Hamstrings have their origin in ischial tuberosity and insertion is the medial tibial condyle. Because the hamstrings are often activated during spiking, they are deemed eccentric. The quadriceps femoris originates from the femur and ilium. The femus is the thighbone while the ilium is the upper pelvis. The two come together at the kneecap and insert at the tibia. Quadriceps femoris functions concentrically. The gastrocnemius originates in the lateral head, which is the posterolateral aspect of the femure media head condyle. The gastrocnemius is both concentric and eccentric. The biceps brachii originated at the scapula and its insertion of the radial tuberosity of its radius. As regards its functioning, the biceps brachii is concentric.

Advanced Networking Proposal and Network Diagrams – Proposal

Advanced Networking Proposal and Network Diagrams – Proposal

Name:

Instructor:

Course:

Date:

Table of Contents

Executive Summary —————————————————————————3

Project Plan ————————————————————————————5

Components/Network Configurations——————————————————–5

Network Operating System ——————————————————————-6

Data Communication Media ——————————————————————-6

Common Carriers and Service Usage ——————————————————–7

Hardware Needs ——————————————————————————-8 IT Policy ————————————————————————————–9

Network Diagram —————————————————————————-11

Budget —————————————————————————————–12

References ————————————————————————————1

Executive Summary

The Western Count Bank is exponentially growing in size on a Daily basis. However, the bank equipment with old computers approximately five years old has presented problems with the active employees. Moreover, customers and employees have been uncomfortable with some of services offered by bank such as unwitting breakdowns in their systems, lack of support to online banking, and lack of support to mobility. An unreliable networking scheme has attributed to the comprehensive reliance of personal connection between computers for sharing of the ink jet printer. The Western County Bank also only has two routers, one for connection to the Wide Area Network and another for internet connection. This has led to inconveniences in company operations as attributed recently when the routers were under maintenance hence denying the employees access the internet. Owing to this problem, the bank intends to refurbish the networking scheme by introducing redundant connections between the wide area network and the internet connections to avoid occurrence of such problems in future. It also intends to keep its ARIN-assigned (American Registry for Internet Numbers) public Internet Protocol (IP) block and use two internet service providers to ensure network connection reliability. Another problem faced by the bank is that the network routers not only breakdown, but also have problems with minimal filtering in the OSI layers 2-4 of the network. This has prompted the bank to implement security products that can filter OSI layers and ensure that the seven layers of the OSI remain protected from common network attacks. The bank also intends to have a datacenter that has client’s information and applications that every employee can easily access. The Bank also intends to incorporate measures that will ensure that Employees can easily share laser printers and that the datacenter has enough storage capacity for both the current and future operations of the company. The purchased multiprotocol storage area network (SAN) arrays will provide this service.

The Western County Bank intends to implement a simple guest wireless access point in their main office protected through simple pre-shared key authentication and provides internet access in the headquarters database to any interfacing apps. Moreover, each employee will possess a company email, which employees may use for financial purposes accessible by outside systems and networks through an internet connection. In addition to upgrading equipment and implementing a network, the bank intends to have an integrated authentication through Microsoft Active Directory (AD) infrastructure that will establish employee authentication before delegating network access to any mobile device. Lastly, the bank faces limited power supply especially in locations wireless access points are to be deployed. The solution for this problem will involve implementation of Power over Ethernet (PoE) at the access layer of the switched infrastructure.

Implementing this network proposal assures the bank of a reliable renewal from their previous computer systems and network infrastructure. Firstly, old operation systems will undergo complete reinstallation and vital information maintained in the new network system. Following this is the creation of new configurations and network designs that conform to the standards set by the company detailed in occasions of rolling out new computers layouts, connection equipment, and peripherals. When the configuration and design is established, a suitable network Operating system will be selected to control, manage, and share the company apps and information. The configurations, design and network operating systems form the key components of a prosperous network. Therefore, the wide and the local area network, types of media communication, and components will undergo examination and documentation in the network design phase to establish how the different parts of the network link and function. The new network services will be managed by corporate IT policy compiled by company network consultants, directors and owners. Lastly, the budget penned at the end of this proposal should give the West County Bank a rough estimate of the work time and network installation costs.

Project plan

Components/ Network Configuration

The West County Bank raises the question: “is there a need for the network?” clearly, the network needs to be established if the organization is to fulfill their intentions of using a network that can share apps, information, or software and particularly, to achieve the notion of utilizing a datacenter. A logical network topology setup with the provided information and the intentions of the company would require the utilization of a star topology. Star topology, utilizing a server-based network scheme, will provide access to centrally polled accounts and file storage servers enabling easier, cardinal access hence allowing the staffs use single account authentications (Newman, 2010). Employees need to have access to all services and files simultaneously. This calls for utilizing a server, which will process several requests of similar data without deterioration in its performance. This design will also allow client computers, server, and laser printers to be linked to a cardinal switch that can share data across the local area network (LAN) and the wide area network (WAN). Redundant routers, connected to a modem, will give access to the wide area network and the internet source ISP (Tian et.al, 2004). The server purposes will include hosting the bank’s database of client files, a server for various desired printers, and hosting all employees’ bank e-mail accounts. Nevertheless, despite the star topology ability to provide the staff with enhanced and flexible network architecture for a formidable working environment, it remains susceptible to probable downfalls. Physically wiring the system to link the various computers utilizing star topology requires extra workforce and cabling for installation. Requirement of the cabling to run via tight enclosures, ceilings, or under the carpet can be strenuous and time consuming. Considering the growth rate encompassed for West County Bank necessitated by employment of a server-based network, it should suffice for the difficulties involved in the setup and utilization of the new network.

Network operating system

The star topology network, client computers, and the server configuration management and governance will be designated to Microsoft’s latest edition of server operating system that is Windows Server 2008 Enterprise Edition. With the implementation of the Windows 2008 server, along with windows operating systems for the network terminals, the networks services of the bank, its office production apps, security software, and specialization software will operate effectively for the bank staff. This will ensure compatibility with programs such as windows based elective services that include SQL 2005, Exchange Server 2007, or share point server. Productivity programs of the office such as spreadsheets, word processors, and presentation software will be availed for staff use with the installment of Microsoft’s Office 2007 suite. Operating systems of Microsoft and their programs work perfectly and possess high-level file compatibility. Third-party business software for accounting such as Sage Simply Accounting, MYOB Business essentials, works well across networks based on windows and with software for Office Productivity.

Data communication media

Updating the computer equipment will also encompass implementation of new communication media. CAT6 Ethernet cable best suit the specs of the new computers, network equipment, and servers. All the new units have gigabit transfer compatible NICs (network interface cards) and because CAT6 is the only UTP (unshielded twisted pair) cable that can handle gigabit transfer, it is the best choice for the communication media. Gigabit network cards and CAT6 cables will allow the management and employees access to files, server resources, and provide a reliable channel for communication to business agendas. Stationary computers of the bank Utilizing CAT6 cabling enjoy comprehensive network access (Tian et.al, 2004). The main office and the other two branch offices will have a wireless access network to meet the needs of the employees who carry laptops and tablets and other guests who might come for consultancy and auditions. Simple pre-shared key authentication will provide security for the wireless network that gives access to the internet and other interfacing apps in the datacenter. The wireless access points will enhance the business’s laptops and tablets mobility capabilities. Employees with tablets and laptops, while in office, will chose to either connect to the wireless network or plug CAT6 UTP cables to access the network resources of the business.

Common carriers and services usage

Every staff is set to be equipped with a computer that is connected to the network to necessitate access and use of office resource and communications. Two internet service providers will install the internet access of the bank. The selected services will be supplied a business connection speeds of 10Mbps for download and 2Mbps for Upload. The network access will be accessible only to the management and the staff with no exception to the outside public. Business employees as arbitrators between clients and the bank’s services will handle any services or requests by clients. The staff will access the services of the company via their laptop, tablet, or workstations, link to the server that contains the desired information, and use the company software to meet the requests of the client. All employees will be required to possess login passwords for their accounts to give them clearance to access client/bank information. The staff will then select the best software to complete the client request with software installed either on their personal laptop or on network software.

Hardware needs

The new proposal is a server-client network that primarily relies on the main server and its given service. The chosen hardware for the network configuration is from Dell’s business solutions. Dell’s PowerEdge 2800 III will manage the resource and the services of the bank. This server normally utilizes an 8 GB 677 MHz RAM, two Intel 2.0GHz Xeon Quad Core processors, and a storage of two 500GB SATA 3Gbps HDD (hard disk drives). Storage of the server will be supported by the already purchased multiprotocol storage area network (SAN) array. The disk arrays will ensure that the bank does exhaust storage space by consecutively replacing full disks. With these configurations and specs, the server will have the ability to process many request simultaneously for all the bank’s employees with slight or no loss in performance. Dell’s OptiPlex 755computers will replace the old stationary computers used by employees. Every computer will be equipped with Widows Vista Business, which utilizes 2 GB 667 MHz DDR2 RAM, 2.33 core 2 Duo processor, and an 80GB SATA 3Gbps HDD. These computers together with the server and the desktop towers have expandable memory slots for future upgrades. Laptops availed for employee mobile services are Latitude D630 generations that have 4GB RAM 667 MHz RAM, Intel 2.2 GHz Core 2 Duo processors, and 320 GB storage capacity. Their high RAM capacity essentially had little significance to operation specifications but only provided relevance to the computers of the present age. To receive internet connection from local ISP, two D-Link Gigabit routers will be put between the internet access media and backbone switch. This backbone switch will manage and control all the local network traffic and will be a combination of four Dell PowerConnect 2724 48-port Gigabit switches. All the tablets, laptops and personal Smartphones connect to a wireless access point, Linksys for instance, to access the internet and network services. Four switches were picked to support 1 server, 3 wireless access points, 3 laser printers, 2 Dell Color Laser 3110cn, 50 laptops and computers, and still have excess ports available for any upgrade required in future.

Due to limited power supply faced by the bank, especially in areas that wireless networks are to be deployed, the various networks switches mentioned above are PoE enabled. This implies that the need for power will be catered for and employees do not have to connect their devices to a power source and at the same time to the cables (Tian & Cox, 2004).

Corporate IT policy

Network resource and internet availability for any business, specifically businesses dealing with personal and customer data, are key tools to assist in business operations. However, networks are susceptible and require constant control and monitoring (Riles, 2001). Internet access of the business will be availed by two local ISPs to ensure business efficiency and to ensure that resources of the network will be open to its management and staff with no constraints related to time of application. This does not mean that the network is not going to be checked but rather creates an environment suitable for the staff in their work place. Monitoring network and transfer of data will be done to preserve the integrity of customer data, protect employee wellbeing, and maintain integrity of operating business systems. The bank staff will use the internet during working hours to serve business operations, but during breaks or after working hours, they are allowed to utilize the internet for their own desires. Management and employee emails will undergo intense checking before authentication. In fact, management and employee authentication will be done via Microsoft Active Directory (AD) infrastructure. This also applies to their mobile devices to mitigate security concerns. Emails will firstly undergo complete scan of any attachments to locate the possibility of any threats towards the banking system before allowing employees read the contents of the email. Every employee has the responsibility to inform the IT management in case the employee receives questionable email.

Security is essential especially in the deployment of any network having an internet connection. The latest protection and bandwidth checking software will be used to ensure that unauthorized third parties do not access bank information and data files (Peterson & Davie, 2011). The preferred software for this task is the Microsoft Active Directory (AD). The management and the staff will have passwords and user accounts with administrative rights and specific security clearance. Only the IT manager will have full control and access to client/strict bank information. There is needs for a backup system to cater for any outages in the network. The most vital information requiring back up is on the bank’s older computers since loss of information as delicate as banking information could bring problems to the organization. Since the bank wants to utilize the new network as a system facilitating the staff gain access and share resources, the information will be stored on the central server (Riles, 2001). Cloud computing will also be adopted by the bank for storage of its vital information and avoid problems that come with outages (Riles, 2001).

The server and information systems will undergo a weekly backup of system configurations and information. This length of the chosen period was short because it is easier to perform system rollback as compared to long period rollbacks. Employees and client accounts will be stored on servers in both local and remote locations. Finally, Western County Bank is interested in integrating their main internal web-based application with a “Software as a Service” (SaaS) provider that specializes in online banking services. The web-based application was designed to easily integrate into a cloud-computing environment.

Software as a Service and Virtualization is a key trend in many businesses today. Businesses are virtualizing their operations to way a tame cybercrime that is on the rise. In addition to cloud computing, the network topology will allow for virtualization and online banking services provided by a SaaS company of choice (Antonakos & Mansfield, 2009).

Network diagram

The diagram below is a basic layout of how the new network system will appear and operate. However, the diagram does not illustrate the actual measurements and positions of the equipment. Routers displayed do not show the redundancy that the new network intends implement. The connections correctly show the network peripherals and computers, however, the laptop and desktop computers are all directly linked. The illustration below shows only some computers to prevent consumption of large space.

Budget

The proposed budget for the new rollout will include the cost of the software, hardware, labor, and external resources. The budget includes a five-week time span for complete installation.

Week 1

Oder software, network peripherals, hardware, and internet services

Information backup form old computers

Start office organization to conform to the bank’s new network

Week 2

Arrival of ordered materials

Removal of old computers and other hardware at the discretion of the bank

Installation of internet by two ISPs

Week 3

Setting up and configuration server and backbone network setups

Wiring the backbone switches to workstations and wireless access points for laptops, tablets and Smartphones

Week 4

Installation of computers and laptops with Operating Systems, software, and other configurations

Linking all computers to network and testing

Week 5

Training IT managers on the usage of specific network set ups

Training employees too

Finalizing and troubleshooting any possible issues and cleaning p any excess materials

The cost for training employees and installation will be averaged at $150 dollars per hour. There will be 35 hours per week spent on network installation. This generates 175 total hours, and the cost of the total services is $ 26250.

Software and hardware description Cost Per Unit Total Cost

2 Dell PowerEdge 2900 III Servers w/

Windows Server 2008

w/30 CALS and Symantec

Multi-Server Security Suite $7,833 $15,666

35 Dell OptiPlex 755 Desktop

Computers w/Windows Vista Business

licenses & Microsoft Office 2007 $1,849 $64,715

15 Dell Latitude D630 Laptops

w/Windows Vista Business licenses $1,735 $26,025

4 PowerConnect 2724

24 Gigabit Ports $369 $1,476

2 D-Link Gigabit Router $90.50 $181.0

3 Linksys Wireless-N Access Point $155.99 $467.97

2 Dell 3110cn Color Laser Printer

w/Network Ready Capabilities $549 $1,098

2000ft. CAT6 Ethernet Cable $298 $298

QuickBooks Enterprise Solutions

50 Users $7,000 $7,000

Sage Enterprise Simply Accounting $2,000 $2,000

Two Cable Internet Access Initial Startup

& then $160 per month $180.00 $180

Total

(including $26250

installation services) $145,356.97

References

Antonakos, J. L., & Mansfield, K. C. (2009). Computer networking for LANs to WANs: Hardware, software and security. Clifton Park, N.Y: Cengage Delmar Learning.Newman, M. E. J. (2010). Networks: An introduction. Oxford: Oxford University Press.

Peterson, L. L., & Davie, B. S. (2011). Computer networks: A systems approach. Burlington: Elsevier Science.Riles, A. (2001). The network inside out. Ann Arbor [Mich.: University of Michigan Press.

Tian, K. Q., & Cox, D. C. (2004). Mobility management in wireless networks: Data replication strategies and applications. Dordrecht: Kluwer.

Motorola mission is to provide integrated communications and embedded electronic solutions to the customer.

Motorola

Motorola mission is to provide integrated communications and embedded electronic solutions to the customer. This includes two-way radio, messaging, satellite products systems, networking and Internet-access products, semiconductor applications, and cellular communication products and systems. Motorola also manufactures and sells automotive and industrial electronics, printed circuit boards, energy storage systems, and ceramic/quartz electronic components (Multex.com, 2000, p. 1). Motorola strives to be the global leader in all aspects of telecommunication applications.

Maintaining the lead in the telecommunications industry requires innovation, motivation, and discipline to stay focused on the mission. Accomplishing the mission is extremely important to Motorola and its shareholders. Motorola has set four main objectives to keep the company focused as the industry leader in the new millennium.

The first objective is global leadership in core businesses. Motorola shifted from “product to market organizations” to putting the customers first. In addition, Motorola employed external leadership talent to key positions, and reassigned thousands of engineers to higher-growth businesses. The realignment of personnel increased the digital wireless telephone unit sales by 85 percent (Motorola, 2000, p. 16).

The second objective is total solutions through alliances. Many of these key business alliances are enabling Motorola to bring the Internet to the wireless arena. Motorola led the development of the Wireless Application Protocol (WAP), which standardized the way wireless telephones access and displays Internet content. WAP is supported by more than 175 of the world’s leading telecommunications and software companies.

Motorola has merged with General Instrument Corporation, which integrates broadband technologies to deliver the vast potential of video, voice and data networking to the home. The merger was valued at $17 billion dollars, and was completed on January 5, 2000. The merger also acquired the majority ownership of Next Level Communications, which provides digital subscriber line (DSL) technology. With the formation of SpectraPoint Wireless, Motorola and Cisco Systems has entered the market for broadband access through Local Multipoint Distribution Service (LMDS), which uses point-to-point microwave systems (Motorola, 2000, p. 17).

The third objective is platforms for future growth. This means building expandable telecommunications architectures upon which other companies can build and add value. This feature is extremely vital due to the fast pace of technological innovations. Some of these platforms include Aspiraä that deals with third-generation wireless systems to DigitalDNAä platforms designed to make Motorola a leader in the embedded electronics market place. Motorola has also teamed up with Lucent Technologies with the platform application of StarCore ä concerning digital signal processing (Motorola, 2000, p. 17-18).

The fourth objective is performance excellence. This is measured by providing first class service to customers and financial results. Customer complaints have decreased by 22 percent by implementing a customer-care training program to the sales staff. Financial results for 1999 are also in positive territory. Sales in 1999 rose five percent to $30.9 billon and net earnings were 817 million dollars compared to a one billion dollar loss in 1998. Motorola’s debt-to-equity ratio is improved to 10.1% in 1999 from 26.8% in 1998 (Motorola, 2000, p. 18-19). Performance excellence balances Motorola’s financial results with measures of customer and employee satisfaction, and market share.

Motorola has many strengths, the first and foremost is brand recognition. The name Motorola is known worldwide for quality products. Another strength is the P/E ratio, which is calculated by taking the price per share and dividing it by the earnings per share. The ratio for Motorola is at 68 times, compared to Motorola’s peer group at 62 times (Multex.com, 2000, p. 3). The higher the number shows the confidence shareholders have in the company.

Logistics is another asset that Motorola has in its favor. Motorola owns 126 facilities (manufacturing, sales, service and office), 65 of which are located in the United States, and 61 located in other countries. Motorola also leases 756 such facilities, 385 are located in the United States, and 371 in other countries. In Scotland, Motorola has three manufacturing plants, which employee over 6500 workers, and an additional 3500 workers employed elsewhere in the United Kingdom (Meares, 2000). Motorola has a strong foothold in the United States and overseas to produce and distribute products quickly and efficiently. .

Motorola has been on top of the telecommunications industry for many years. Being on top for a long time can lead to complacency. New innovations and equipment designs by other competitors have reduced Motorola’s market share. For Motorola to stay competitive they must employ the best personnel available and empower them to innovate and create new products and systems.

Another weakness is investing in questionable ventures. This happened to Motorola on the Iridium project. Iridium is company that provided satellite phone service for customers covering the entire globe. The Iridium system consisted of 66 satellites in orbit providing phone coverage no matter where a customer was located. This service is very appealing, but the down side to having this service was the price of the phone, which ranged from three to ten thousand dollars and the usage fee per minute was a little over ten dollars. For some customers this was the perfect service, but Iridium could not generate enough customers to stay solvent. The explosion of the wireless industry and low cellular coverage rates was the downfall of Iridium. Motorola had an 18 percent stake in Iridium and lost over two billion dollars. The Iridium satellite service was turned-off in April of 2000 and Motorola will gradually let the 66 satellites burn up in the earth’s atmosphere. Neither iridium nor Motorola could find a buyer for the Iridium system (Kaiser, 2000).

The state of the economy is in great shape and the technology industry is growing at a rapid pace. Motorola’s stock price has surged over a 150 dollars a share this year and is one of the most actively stocks traded on the NASDAQ (Multex.com, 2000). This insurgence of funds through the sale of stock is an excellent opportunity for Motorola to invest heavily in research and development and buyout smaller competitors. Motorola needs to show extreme caution when investing in research or buying out a competitor since they incurred a tremendous lost with Iridium.

Another opportunity Motorola can expand on is sales overseas. The European market makes up twenty-one percent of sales and Asia-Pacific region only makes up ten percent of Motorola’s sales (Motorola, 2000). These two regions are prime areas to increase market share, the technology boom in these areas are expanding rapidly just like the United States.

The booming economy has been favorable to Motorola, but many of Motorola’s competitors have also reaped the same rewards. Motorola’s four main competitors are Ericsson, Qualcomm, Nokia, and Advanced Micro Devices. Advanced Micro Devices primarily is a manufacturer of semiconductors. Ericsson, Qualcomm, and Nokia primarily deal with cellular phones and systems (Multex.com, p. 2). In fact, Nokia cell phones are taking the market share aware from Motorola due to the new modern designs and features. Qualcomm has developed and patented Code Division Multiple Access (CDMA) technology, which is what current cell phones use. Qualcomm receives royalties off this technology for every cell phone sold.

The government is also a threat to Motorola. The Federal Communication Commission (FCC) regulates and allocates bandwidth. Motorola and other firms must get permission to use certain frequencies. In other countries, the rules and regulations are more lax or they do not have any at all. That is why companies to include Motorola have many manufacturing plants overseas, so they do not have to deal with the stringent rules in the United States.

There are many strategies Motorola can implement to be more successful. Horizontal Integration is one strategy. Horizontal Integration seeks ownership or control over competitors. As stated earlier, Motorola has done this with the acquisition of General Instrument Corporation. This strategy can also backfire, as did the venture with Iridium. Extensive research must be done when a company is looking to expand.

Another strategy that can be implemented is the Join Venture strategy. This strategy involves two or more firms forming a separate organization. Motorola and Cisco Systems accomplished this by forming SpectraPoint Wireless. This strategy is good when risk is involved, losses or profits will be split between the two companies. However, if each firm can provide a unique service or product the other does not have, this alliance can be very powerful.

The Product Development strategy is another alternative Motorola can use to be successful. This strategy increases sales by improving or modifying existing products or services. Motorola has shown improvement with its customer service department and digital cell phone division, but Nokia and Qualcomm are gaining ground with their new products and ideas. Advances in technology happen everyday, if this strategy is not addressed, Motorola will be a follower instead of a leader.

For Motorola to maintain their position as a global leader in the telecommunications industry, the Product Development strategy needs to be implemented. Motorola’s main competitors are developing new products and systems, which are outperforming and selling Motorola products and systems. Money has to be allocated for research and development of new and existing products and systems. Once the quality and performance of the products and systems are improved, sales will increase and consumer and shareholder confidence will rise. This confidence will enable Motorola to focus on overseas sales, especially Europe and the Asia-Pacific region where sales figures are low. The Y2K bug has come and gone, Motorola needs to step up to the forefront of technology and not be the stereotypical brick and mortar company that got passed by in the new millennium.

Bibliography:

References

Kaiser K. (2000). Motorola still hopes to find a buyer for Iridium.

[On-line]. Available: http://biz.yahoo.com/rf/000501/ik.html

Meares R. (2000). Update2-Motorola spends $2 billion on Scottish chips.

[On-line]. Available: http://www.ameritrade.com/cgi-bin/login.cgi

Motorola. (2000). 1999 Summary Annual Report.

[On-line]. Available: http://www.mot.com/General/Finacial/Annual_Report/1999/99annual

.pdf

Multex.com. (2000). Motorola, Inc. Stock Snapshot.

[On-line]. Available: http://www.multexinvestor.com/download.asp?docid=1346436&ticker

=mot

Quicken. (2000). Motorola Inc. Company Profile.

[On-line]. Available: http//quicken.elogic.com/sec_key.asp?ticker=MOT

Challenges Faced by Transgender Yong Adults

Challenges Faced by Transgender Yong Adults

Student’s Name

Institution of Affiliation

Date

Identity crisis is a common problem among young adults, especially transgender people who experience changes later in their lives. Gender dysphoria is phycological distress that results from an incongruence between an individual’s sex that is assigned at birth and one’s gender identity which they developed later in life. Young adults are at a stage in life that poses a major psychological problem in which a person fails to relate to either socially acceptable gender – male and female. While a person may be born female, and transform later in life to be a male, they may undergo psychological and hormonal changes that they previously not experienced. As a result, most transgender people are vulnerable to symptoms of depression and anxiety as they are not sure whether they will be fully adopted by society for what they have chosen to be and what they were previously. For this assignment, I will analyze the poem, “A letter to the girl I used to be” by Ethan Smith to help understand the challenges that young adults pass through especially those experiencing gender changes.

The text, “A letter to the girl I used to be,” highlights the story of a young man in his early 20’s narrating the changes and challenges that he faced when transforming from a female to a male. According to the poem, Ethan describes how it feels to be trapped inside the wrong body. He writes to a young girl, a female version of his younger self named Emily. Previously, he was a girl, but presently, he is a male. In the poem, Ethan goes back to the days when he was Emily, and here he experiences numerous challenges. For example, he states that every time she goes to watch baseball, a voice he no longer recognizes whispers “Ethan, do you remember? When you were gonna be the first girl in the major leagues-Seattle Mariners. Rally Cap.” By this, Ethan is referring to him as a young girl who reminds him of the time, he was young and wanted to be the first girl baseball league player. When Ethan was Emily, he wanted to be a baseball player, but maybe his ambitions have changed since transforming from a female to a male, and this is why he is conflicted about his past and present interests.

References

Ethan Smith. “A Letter to the Girl I Used to Be.” Retrieved from: https://youtube.be/Lkn06Y8prDU