Challenges facing African American Visual Artists

Challenges facing African American Visual Artists

Student’s Name

Institution

Challenges facing African American Visual Artists

Many African American visual artists meet a lot of problems in their work which hinders their working up to date. David C. Driskell who was an American artist but had an African origin is an excellent example of what artists with African origin faces in America. David C. Driskell drew pictures as well as painted walls, and during this time, he suffered a lot of challenges which according to him, shuttered his work. However, the spirit he had on artist did not sink, and as a result, David C. Driskell became a hero whose work remains in displays, and other exhibitions are set aside in his commemoration (Bey, 2011). This paper will consider more on the challenges which African American visual artists such as David C. Driskell and other professional minority artists faced throughout history and up to the present date (Landsmark, 1998).

One of the significant challenges which African American artists faced and continue to face up to present day is racism. David C. Driskell, for example, suffered a lot of racism in Chicago where he was brought up. In most instances of his career, he struggled to ensure that racism which he encountered from white American artists did not affect his work of drawing pictures and painting walls. Many of the American art was shifting towards artists such as Jackson Pollock and Pop arts who viewed skills at their job as superior and the work by David C. Driskell as inferior. David C. Driskell, however, took this challenge as a catalyst to propel the scope and quality of his work. (Driskell, 1995). David C. Driskell had a belief that heroes are not born with power but instead, are made by achievements of the human spirit which is not determined by whether a person is black or white as none of the races is superior as compared to the other (Calo, 1999).

In one of the interviews which Curlee Holton was asked concerning the challenges which African American artists face, he said that the primary problem in art industry was questioning which African American visual artists and other professional minority artists faced was on identity by birthright. Many people in people in the world especially the white people lack the sense of identifying the black people where they regard their heritage as inferior and theirs as superior (Davis, 2003). Curlee Holton said that African American artists were denied the right of expressing what they can draw or paint by the American artists hence shut down their freedom of expression. In the recent exhibition held in the commemoration of the art by David C. Driskell, Curlee Holton said that a black artist being given a chance to express what he can do without external influence is one of the most significant achievements which African American artists will have ever achieved (Douglas & Ater, 2007).

Additionally, another greatest challenge African American artists as well as other professional minority artists faced and continued to face up to date is that few American people were and are willing to buy their arts. Bennie Andrews who is one of the best-known artists in America said that only a few people had purchased his paintings even in his hometown of Atlanta (Driskell et al. 2001). He once said that being an artist is not easy but being an African artist is even more desperate. The work of African American artists seems to be even getting much tougher which is a report by several people who are involved in selling and also in exhibiting works made by black people. Mary Schmidt who works in s national museum in America said that it is hard for a black artist to be known because many people have no interest in their work (Kirschke, 2007).

As discussed above, it is clear that many American African artists and other professional minority artists face a lot of challenges which hinders their work to a great extent. Racism which is one of the problems they face makes the career of some artists to sink hence talents and works goes unnoticed. American African artists should be given equal opportunities to express what they can do as well as providing necessary support to develop their art without any form of discrimination.

Reference

Bey, S. (2011). Aaron Douglas and Hale Woodruff: African American art education, gallery work, and expanded pedagogy. Studies in Art Education, 52(2), 112-126.

Calo, M. A. (1999). African American art and critical discourse between World Wars. American Quarterly, 51(3), 580-621.

Davis, J. (2003). The end of the American century: current scholarship on the Art of the United States. The Art Bulletin, 85(3), 544-580.

Douglas, A., & Ater, R. (2007). Aaron Douglas: African American Modernist. Yale University Press.

Driskell, D. C., Cosby, B., & Hanks, R. (2001). The other side of color: African American art in the collection of Camille O. and William H. Cosby, Jr. Pomegranate.

Driskell, D. C. (Ed.). (1995). African American visual aesthetics: A postmodernist view (p. 1). Washington, DC: Smithsonian Institution Press.

Kirschke, A. H. (2007). Art in crisis: WEB Du Bois and the struggle for African American identity and memory. Indiana Univ Pr.

Landsmark, T. C. (1998). Comments on African American contributions to American material life. Winterthur Portfolio, 33(4), 261-282.

Challenges Faced By Clinical Psychologists

Challenges Faced By Clinical Psychologists

Student’s Name

Institutional Affiliation

Course Number and Name

Instructor Name`

Due date

TITLE

Challenges Faced By Clinical Psychologists

References

Cavanagh, M., & Lane, D. (2012). Coaching psychology coming of age: The challenges we face in the messy world of complexity. International Coaching Psychology Review, 7(1), 75-90.

Dickey, L. M., & Singh, A. A. (2017). Finding a trans‐affirmative provider: Challenges faced by trans and gender diverse psychologists and psychology trainees. Journal of clinical psychology, 73(8), 938-944.

Harvey, V. S., & Pearrow, M. (2010). Identifying challenges in supervising school psychologists. Psychology in the Schools, 47(6), 567-581.

Motorcycle Mechanics

Motorcycle Mechanics

Motorcycles are not only a source of entertainment; they can also be a source of transportation and income if someone wanted to make a career of them. Motorcycles are used in many aspects of life. Children, as well as adults, ride motorcycles on trails, open fields and on motocross tracks. They may race, jump or do stunts with the motorcycle. Groups, such as Harley Davidson owners, get together to ride for charity events. Because motorcycles are so cheap to ride, they are great source of transportation. A motorcycle can get 60 to 70 miles per gallon whereas a small Toyota Camry can get 18 to 23 miles per gallon. Industries such as farming, delivery, entertainment, aviation and even the military are known for their use of motorcycles within their operations. Due to the popularity of the motorcycle there has been an emergence of self-taught mechanics. Not all these mechanics can keep up with the new technologies and advancements. “The impact of new technology on the motorcycle industry has been dramatic” (Motorcycle 1). Electronic ignitions, fuel systems, drive trains, and turbocharged engines are just a few areas of advancement. Well-trained technicians are needed and sought after. Job opportunities are available for these well-trained technicians. The motorcycle industry has a lot to offer someone who is interested in a motorcycle mechanic career.

It is always a good idea to understand the history of a subject prior to getting into specifics. Motorcycles originally looked like glorified bikes. They had front and rear wheels that were the same size, with a pedal crank mechanism to turn the rear wheel. Gottlieb Daimler is credited with building the first motorcycle in 1885. It was constructed mostly of wood with iron wheels and was powered by a single-cylinder engine. Most of the early models were three and four-wheeled designs. The two-wheeler was introduced in 1892. “It used a 5-cylinder engine built as the hub of its rear wheel. The cylinders rotated with the wheel, and its crankshaft constituted the rear axle” (Tharp 1). It wasn’t until Hildebrand & Wolfnueller invented and patented a two-wheeler in 1894 that the two-wheeler became success. Still production and manufacturing was a slow process and motorcycles were not readily available for purchase. In 1885, the “French firm of DeDion-Buton built an engine that was to make the mass production and common use of the motorcycles possible” (Thorpe 2). The engine was small, light and a four-stroke. It had a battery and coil ignition instead of a hot tube. A lubrication system was invented to drip oil in metered doses. Soon the engine was copied and was used by Harley-Davidson in the United States. The first U.S. production began in 1892 in Waltham, Massachusetts. The motorcycle was called the Orient-Aster and contained the DeDion-Buton engine. Production continued at a slow pace until 1960. Between 1960 and 1970 over five million motorcycles were produced and sold. During the 1970’s oil crisis, the motorcycle became the preferred mode of transportation (Lear 3). Today there are over “10 million motorcycles in the United States that are commonly used for commuting as well as for various racing competitions” (“Motorcycle Mechanics” 338).

Riding safety is an important aspect to the motorcyclist that needs to be addressed. Safety is the responsibility of the rider. “In an average year 166,000 Americans will be hospitalized as a result of a motorcycle accident. 4,700 of them die. Many others will be crippled for life. In some countries the death rate for motorcyclists is up to nine times higher than that for person riding in a car” (“Motorcycle Safety” 1). A motorcyclist needs to ride with extreme care. Steering, accelerating and braking require skill and a high degree of coordination. A motorcyclist should never drive while under the influence of alcohol. It is very important that one learns how to ride and do so safely. Wearing proper attire is also a necessary component to safety. It should not only provide comfort but also visibility and protection. A helmet, eye protection, jacket, gloves, and boots are the basic attire. The helmet is the most important piece of equipment. It should have a snug fit and be fastened securely under the chin. The helmet should also be certified by the Department of Transportation. Goggles or a face shield are both good for eye protection. Being able to see is an important aspect when riding. Wind that blasts into eyes can be very dangerous. Objects blown into the eyes can cause blurred vision. Jackets made of leather provide a great deal of protection. It is wise to wear gloves and boots in order to provide additional protection. Proper riding apparel will not prevent accidents, but it will decrease the chance of serious injuries.

Finally, motorcycles are a great source of income because one could make a career out of repairing motorcycles. Technician, service writer, parts manager and service manager are a few of the careers available within the motorcycle industry. This paragraph will be focused more on the technician’s career. The technician can make or break a facility. If the technician is knowledgeable and does quality work, the reputation of the facility will be good. If, on the other hand, the technician is not knowledgeable and his quality is lacking, the reputation of the facility will be poor and they will lose customers. One of the tasks a technician will perform is rebuilding a motorcycle engine. A motorcycle engine can be either a two-stroke or a four-stroke.

The two-stoke is preferred by racers and will be the one discussed in this paper. “A two-stroke engine is a simply constructed engine. Two-stroke engines do not have valves, which simplifies their construction and lowers their weight. This makes the two-stroke engine lighter, simpler and less expensive to manufacture and repair. The piston, cylinder, and crankcase serve dual roles in developing power” (“Motorcycle Mechanics” 74). The engine is made up of two parts: a top end and bottom end. The top end contains the cylinder, the cylinder head, piston, the piston rings and the wrist pin. The bottom end contains the crankshaft, the crankcase, the seals, the bearings and bushings. The cylinder’s job is to seal and guide the piston so that it can react to the power of the expanding gases. There are a series of passageways called ports that move gases in and out of the engine. According to David, former motorcycle mechanic, the cylinder head is the area where the gas and oxygen mix on the down stroke, but on the upstroke it is compressed and ignited by the spark plug to produce a mini explosion, which creates power. The cylinder head vibrates constantly and is subject to high temperatures. During a rebuilding job, the cylinder must be inspected thoroughly to make sure there is no warping. If warped, sanding it with emery paper can repair it. The main job of the piston is to hold the ring. The ring must be tight in order to get a good tight seal in the cylinder. If the seal is tight there will be good compression. Lack of compression means a lack of power, preventing the engine from working efficiently. The piston and the piston pin need to be checked for scratches and cleanliness during a rebuild. If any dirt or deposits are left on the piston or the ring it will cause the rings to stick and lead to power loss. So it is very important to take the time to thoroughly check and clean the piston and the piston pin. When replacing a piston, make sure there is enough clearance in the cylinder. Motorcycle books can be purchased with exact measurements and clearance values in them. If there is not enough clearance the piston will shake (seizure) resulting in noise, damage to the cylinder wall and loss of power.

In the bottom end of the engine, the crankshaft continually spins giving the piston the power to continue to work. The crankcase houses the crankshaft. It operates under conditions of high stress. “Atmospheric pressure and the partial vacuum created by the piston causes air to flow through the carburetor to pick up a charge of fuel and then to flow into the crankcase and later in to the cylinder. When the piston has closed off the intake port, the crankcase is sealed” (Motorcycle Mechanics 78). With the continued motion of the piston, the fuel mixture in forced through the transfer ports. Crankcase seals are used to prevent leakage so pressure can build in the crankcase. It is very important to locate and correct crankshaft problems to prevent more serious trouble later. The crankshaft must be measured according to specific measurements. If the crankshaft is seriously damaged, it is better to throw it away and buy a new one. Oil seals are also important during a rebuild job. The seals prevent loss of oil from the engine. The seals also prevent compression leaks. Since compression is needed to move the piston, the seal is important. In addition to preventing leaks, oil seals prevent entry of dirt and particles. During rebuilding jobs, oil seals must always be replaced. Never try to reuse and old oil seal. Finally, the bearings should always be checked whenever the engine is disassembled. Always check for wear (pit marks) and cleanliness. Spin the bearing, listening for noise and roughness. Make sure the spinning is done while the bearing is lubricated. Never spin a dry bearing. All these parts work together to create enough power to move the motorcycle. It all starts when the spark plug fires. Fuel and air in the cylinder have been compressed so when the spark plug fires the fuel ignites. This small explosion causes the piston to go downward. As the piston is moving downward it is compressing the fuel mixture in the crankcase. Once the piston starts reaching the bottom of its stroke, the exhaust port is uncovered. The pressure that has been built up in the cylinder now forces out the exhaust gases. By the time the piston is all the way at the bottom of its stroke the intake port opens. The fuel mixture rushes in the cylinder, filling it up with fresh fuel. During this time, the crankshaft is moving and it forces the piston upward towards the spark plug, which is called the compression stroke. As the piston compresses the fuel, a vacuum is created opening the reed valve and forcing fuel into the carburetor. As the piston reaches the top of its upward stroke, the spark plug fires again. This repeats over and over again.

Two stroke engines require a special fuel mixture. Two-stroke oil must be mixed with the gasoline. In most cases, the mixture is a 32:1 ratio, which means thirty- two parts gas with one part oil. The oil seems excessive, but it is needed in order to keep all moving parts lubricated. The oil lubricates the crankshaft, connecting rod and the cylinder walls. If the gas is not mixed with oil, the engine will run poorly.

There is a lot more to motorcycle riding than meets the eye. A motorcyclist has many responsibilities. It doesn’t matter if a person rides for entertainment, sport, or necessity: the responsibility is the same. Motorcycles are very powerful and must be driven responsibly. Proper riding techniques, safety gear and proper maintenance are key to long and happy riding. If lucky, motorcycle riding can lead to a satisfying career.

Bibliography:

Lear, G. Motorcycle Mechanics. Englewood Cliffs, NJ:Prentice-Hall Inc.,1977.

Motorcycle Mechanic Institute. The Complete Guide to Motorcycle Mechanics. Phoenix, AZ:

Prentice Hall, 984.

Motorcycle Safety. 4 Dec. 2003.

Tharp, Dave.Virtual Museum Curator. The First Motorcycle. December 2002. Motorcycle

search. 6 Dec. 2002.

Advanced Manufacturing Technician Post Concern

Advanced Manufacturing Technician Post Concern

Student’s Name

Institution

Advanced Manufacturing Technician Post Concern

Securing a vocation as an advanced manufacturing technician has been my interest in developing know-how of the career line to follow in life. As the word manufacturing technician depicts, it involves the technicalities to be applied in running equipment and machinery in the industries and other production fields during the manufacturing process. Being a student pursuing electronics related course, I will be receiving my certification in electrical trades at the end of this semester. The ultimate goal of applying the course program was sharpening my knowledge and skills in working as a manufacturing technician in future as if has been my field of interest since the beginning of education curriculum. The coursework provides precise guidelines for understanding that the vacation involves setting up, testing and adjusting plant machinery and equipment (Scott, 2016). In the field of specialization, this will be possible by the application of electrical and electronic technologies which involves a wide variety of the advanced machinery.

Time in the modern society has passed the era of depending on human as the primary sourced of labor. The industries and other production sectors have extensively adopted machine application due to their competence and fast speed performance which cannot be compared to the human rate of doing activities. Relatively, to enhance their functionality, the machines require a dependable source of energy where electricity emerges to be the significant and efficient source in the in the society. For efficiency and proper functionality, these electrical related machinery requires regular repair and maintenance services.

Also, the manufacturing machinery and equipment require set up, testing and adjustment to enhance proper running and functionality (Huang, et al. 2015). The fact that technological advancement has to be adopted and will progress as time goes acted as the motivating factor in pursuing the electrical trading course as it is inevitable to use machinery in the production process. In fact, with industrialization, there will be an expansion in the variety of machinery used to make manufacturing faster as well as improving the quality of the products.

The notion of being part of industrial advancement by taking part in the technology evolution touched the best part of my conscience encouraging me to go for my passionate vocation as a specialist in advanced manufacturing technician. On top of pursuing the electrical trade course as well as having the knowledge and skills in the field, I am bilingual. It is clear that being a manufacturing technician also involves the skills of efficiently communicating with clients and other people in the same area to enhance proper expression of the ideas as the technical area is much involving (Baumers, et al. 2016). Being a hands-on a person becomes another credential as the technicalities applied determines the effectiveness of task performance as well as the machine functionality.

Fixing stuff and finding the problem causing machinery defects becomes my best and joyous moments. This played an essential part in helping me realized my passion as well as the field of specialization being electrical trade sector and having the objective of working with a manufacturing related company.

References

Baumers, M., Dickens, P., Tuck, C., & Hague, R. (2016). The cost of additive manufacturing: machine productivity, economies of scale and technology-push. Technological forecasting and social change, 102, 193-201.

Huang, Y., Leu, M. C., Mazumder, J., & Donmez, A. (2015). Additive manufacturing: current state, future potential, gaps and needs, and recommendations. Journal of Manufacturing Science and Engineering, 137(1), 014001.

Scott, G. (2016). The Industrial Manufacturing Technician Apprenticeship. Work-Based Learning in Action. Jobs For the Future.

Challenges Faced by Immigrants in the United States Between 1880-1920s

Challenges Faced by Immigrants in the United States Between 1880-1920s

Student’s Name

Institution of Affiliation

Date

Life as an immigrant in the United States from 1830 to 1920 was full of challenges, making it hard for the immigrants to survive. During the 1800s, life was not smooth in many parts of the world, and thus, they migrated to the United States, fleeing from crop failure, land and job shortages, rising taxes, and famine. By then, the United States was deemed a land of opportunities, and thus, immigrants believed that going to the United States would provide them with massive economic opportunities (Minkoff-Zern, 2019). However, not everyone sought economic opportunities as others came into the United States seeking personal freedom or relief from political and religious persecution.

The 1870s was characterized by hard economic times, and the European immigrants had to compete with the Americans for jobs traditionally reserved for the Chinese (Sánchez‐Alonso, 2019). As a result, racial hatred and suspicion arose due to economic competition. The feelings of hatred were coupled with anti-Chinese riots and pressure, demanding the exclusion of Chinese immigrants from the United States. As a result, in 1882, the Chinese Exclusion Act was passed, ending the hope of Chinese immigrants into the United States for nearly a century (Burns & Yu, 2018).

Stereotyping and discrimination based on race were common issues among the immigrants when seeking job opportunities (Esses, 2021). Once immigrants settled, they had to look for work, but since the number of job seekers was huge, there were never enough jobs for the immigrants, which prompted potential employers to take advantage of the immigrants. For example, men were generally paid less than native workers, while women found it difficult to get a job. Even if the women got a job, they were paid lower wages than men. Besides wages, immigrants experienced social tensions that made their life in the United States more difficult (Hughes, 2022). They were often stereotyped and discriminated against, with many immigrants suffering from verbal and physical abuse because they were different.

The experiences of immigrants between the 1880-1920s can be considered hostile as they largely involved stereotyping and discrimination from government policies to employers seeking to deny immigrants job opportunities.

Referencing

Burns, R., & Yu, L. S. (2018). The Chinese Exclusion Act. American Experience, PBS.

Esses, V. M. (2021). Prejudice and discrimination toward immigrants. Annual Review of Psychology, 72, 503-531.

Hughes, V. (2022). Tense times for young migrants: temporality, life-course and immigration status. Journal of Ethnic and Migration Studies, 48(1), 192-208.

Minkoff-Zern, L. A. (2019). The new American farmer: immigration, race, and the struggle for sustainability. MIT Press.

Sánchez‐Alonso, B. (2019). The age of mass migration in Latin America. The Economic History Review, 72(1), 3-31.

Advanced Networking Proposal and Network Diagrams – Proposal

Advanced Networking Proposal and Network Diagrams – Proposal

Name:

Instructor:

Course:

Date:

Table of Contents

Executive Summary —————————————————————————3

Project Plan ————————————————————————————5

Components/Network Configurations——————————————————–5

Network Operating System ——————————————————————-6

Data Communication Media ——————————————————————-6

Common Carriers and Service Usage ——————————————————–7

Hardware Needs ——————————————————————————-8 IT Policy ————————————————————————————–9

Network Diagram —————————————————————————-11

Budget —————————————————————————————–12

References ————————————————————————————1

Executive Summary

The Western Count Bank is exponentially growing in size on a Daily basis. However, the bank equipment with old computers approximately five years old has presented problems with the active employees. Moreover, customers and employees have been uncomfortable with some of services offered by bank such as unwitting breakdowns in their systems, lack of support to online banking, and lack of support to mobility. An unreliable networking scheme has attributed to the comprehensive reliance of personal connection between computers for sharing of the ink jet printer. The Western County Bank also only has two routers, one for connection to the Wide Area Network and another for internet connection. This has led to inconveniences in company operations as attributed recently when the routers were under maintenance hence denying the employees access the internet. Owing to this problem, the bank intends to refurbish the networking scheme by introducing redundant connections between the wide area network and the internet connections to avoid occurrence of such problems in future. It also intends to keep its ARIN-assigned (American Registry for Internet Numbers) public Internet Protocol (IP) block and use two internet service providers to ensure network connection reliability. Another problem faced by the bank is that the network routers not only breakdown, but also have problems with minimal filtering in the OSI layers 2-4 of the network. This has prompted the bank to implement security products that can filter OSI layers and ensure that the seven layers of the OSI remain protected from common network attacks. The bank also intends to have a datacenter that has client’s information and applications that every employee can easily access. The Bank also intends to incorporate measures that will ensure that Employees can easily share laser printers and that the datacenter has enough storage capacity for both the current and future operations of the company. The purchased multiprotocol storage area network (SAN) arrays will provide this service.

The Western County Bank intends to implement a simple guest wireless access point in their main office protected through simple pre-shared key authentication and provides internet access in the headquarters database to any interfacing apps. Moreover, each employee will possess a company email, which employees may use for financial purposes accessible by outside systems and networks through an internet connection. In addition to upgrading equipment and implementing a network, the bank intends to have an integrated authentication through Microsoft Active Directory (AD) infrastructure that will establish employee authentication before delegating network access to any mobile device. Lastly, the bank faces limited power supply especially in locations wireless access points are to be deployed. The solution for this problem will involve implementation of Power over Ethernet (PoE) at the access layer of the switched infrastructure.

Implementing this network proposal assures the bank of a reliable renewal from their previous computer systems and network infrastructure. Firstly, old operation systems will undergo complete reinstallation and vital information maintained in the new network system. Following this is the creation of new configurations and network designs that conform to the standards set by the company detailed in occasions of rolling out new computers layouts, connection equipment, and peripherals. When the configuration and design is established, a suitable network Operating system will be selected to control, manage, and share the company apps and information. The configurations, design and network operating systems form the key components of a prosperous network. Therefore, the wide and the local area network, types of media communication, and components will undergo examination and documentation in the network design phase to establish how the different parts of the network link and function. The new network services will be managed by corporate IT policy compiled by company network consultants, directors and owners. Lastly, the budget penned at the end of this proposal should give the West County Bank a rough estimate of the work time and network installation costs.

Project plan

Components/ Network Configuration

The West County Bank raises the question: “is there a need for the network?” clearly, the network needs to be established if the organization is to fulfill their intentions of using a network that can share apps, information, or software and particularly, to achieve the notion of utilizing a datacenter. A logical network topology setup with the provided information and the intentions of the company would require the utilization of a star topology. Star topology, utilizing a server-based network scheme, will provide access to centrally polled accounts and file storage servers enabling easier, cardinal access hence allowing the staffs use single account authentications (Newman, 2010). Employees need to have access to all services and files simultaneously. This calls for utilizing a server, which will process several requests of similar data without deterioration in its performance. This design will also allow client computers, server, and laser printers to be linked to a cardinal switch that can share data across the local area network (LAN) and the wide area network (WAN). Redundant routers, connected to a modem, will give access to the wide area network and the internet source ISP (Tian et.al, 2004). The server purposes will include hosting the bank’s database of client files, a server for various desired printers, and hosting all employees’ bank e-mail accounts. Nevertheless, despite the star topology ability to provide the staff with enhanced and flexible network architecture for a formidable working environment, it remains susceptible to probable downfalls. Physically wiring the system to link the various computers utilizing star topology requires extra workforce and cabling for installation. Requirement of the cabling to run via tight enclosures, ceilings, or under the carpet can be strenuous and time consuming. Considering the growth rate encompassed for West County Bank necessitated by employment of a server-based network, it should suffice for the difficulties involved in the setup and utilization of the new network.

Network operating system

The star topology network, client computers, and the server configuration management and governance will be designated to Microsoft’s latest edition of server operating system that is Windows Server 2008 Enterprise Edition. With the implementation of the Windows 2008 server, along with windows operating systems for the network terminals, the networks services of the bank, its office production apps, security software, and specialization software will operate effectively for the bank staff. This will ensure compatibility with programs such as windows based elective services that include SQL 2005, Exchange Server 2007, or share point server. Productivity programs of the office such as spreadsheets, word processors, and presentation software will be availed for staff use with the installment of Microsoft’s Office 2007 suite. Operating systems of Microsoft and their programs work perfectly and possess high-level file compatibility. Third-party business software for accounting such as Sage Simply Accounting, MYOB Business essentials, works well across networks based on windows and with software for Office Productivity.

Data communication media

Updating the computer equipment will also encompass implementation of new communication media. CAT6 Ethernet cable best suit the specs of the new computers, network equipment, and servers. All the new units have gigabit transfer compatible NICs (network interface cards) and because CAT6 is the only UTP (unshielded twisted pair) cable that can handle gigabit transfer, it is the best choice for the communication media. Gigabit network cards and CAT6 cables will allow the management and employees access to files, server resources, and provide a reliable channel for communication to business agendas. Stationary computers of the bank Utilizing CAT6 cabling enjoy comprehensive network access (Tian et.al, 2004). The main office and the other two branch offices will have a wireless access network to meet the needs of the employees who carry laptops and tablets and other guests who might come for consultancy and auditions. Simple pre-shared key authentication will provide security for the wireless network that gives access to the internet and other interfacing apps in the datacenter. The wireless access points will enhance the business’s laptops and tablets mobility capabilities. Employees with tablets and laptops, while in office, will chose to either connect to the wireless network or plug CAT6 UTP cables to access the network resources of the business.

Common carriers and services usage

Every staff is set to be equipped with a computer that is connected to the network to necessitate access and use of office resource and communications. Two internet service providers will install the internet access of the bank. The selected services will be supplied a business connection speeds of 10Mbps for download and 2Mbps for Upload. The network access will be accessible only to the management and the staff with no exception to the outside public. Business employees as arbitrators between clients and the bank’s services will handle any services or requests by clients. The staff will access the services of the company via their laptop, tablet, or workstations, link to the server that contains the desired information, and use the company software to meet the requests of the client. All employees will be required to possess login passwords for their accounts to give them clearance to access client/bank information. The staff will then select the best software to complete the client request with software installed either on their personal laptop or on network software.

Hardware needs

The new proposal is a server-client network that primarily relies on the main server and its given service. The chosen hardware for the network configuration is from Dell’s business solutions. Dell’s PowerEdge 2800 III will manage the resource and the services of the bank. This server normally utilizes an 8 GB 677 MHz RAM, two Intel 2.0GHz Xeon Quad Core processors, and a storage of two 500GB SATA 3Gbps HDD (hard disk drives). Storage of the server will be supported by the already purchased multiprotocol storage area network (SAN) array. The disk arrays will ensure that the bank does exhaust storage space by consecutively replacing full disks. With these configurations and specs, the server will have the ability to process many request simultaneously for all the bank’s employees with slight or no loss in performance. Dell’s OptiPlex 755computers will replace the old stationary computers used by employees. Every computer will be equipped with Widows Vista Business, which utilizes 2 GB 667 MHz DDR2 RAM, 2.33 core 2 Duo processor, and an 80GB SATA 3Gbps HDD. These computers together with the server and the desktop towers have expandable memory slots for future upgrades. Laptops availed for employee mobile services are Latitude D630 generations that have 4GB RAM 667 MHz RAM, Intel 2.2 GHz Core 2 Duo processors, and 320 GB storage capacity. Their high RAM capacity essentially had little significance to operation specifications but only provided relevance to the computers of the present age. To receive internet connection from local ISP, two D-Link Gigabit routers will be put between the internet access media and backbone switch. This backbone switch will manage and control all the local network traffic and will be a combination of four Dell PowerConnect 2724 48-port Gigabit switches. All the tablets, laptops and personal Smartphones connect to a wireless access point, Linksys for instance, to access the internet and network services. Four switches were picked to support 1 server, 3 wireless access points, 3 laser printers, 2 Dell Color Laser 3110cn, 50 laptops and computers, and still have excess ports available for any upgrade required in future.

Due to limited power supply faced by the bank, especially in areas that wireless networks are to be deployed, the various networks switches mentioned above are PoE enabled. This implies that the need for power will be catered for and employees do not have to connect their devices to a power source and at the same time to the cables (Tian & Cox, 2004).

Corporate IT policy

Network resource and internet availability for any business, specifically businesses dealing with personal and customer data, are key tools to assist in business operations. However, networks are susceptible and require constant control and monitoring (Riles, 2001). Internet access of the business will be availed by two local ISPs to ensure business efficiency and to ensure that resources of the network will be open to its management and staff with no constraints related to time of application. This does not mean that the network is not going to be checked but rather creates an environment suitable for the staff in their work place. Monitoring network and transfer of data will be done to preserve the integrity of customer data, protect employee wellbeing, and maintain integrity of operating business systems. The bank staff will use the internet during working hours to serve business operations, but during breaks or after working hours, they are allowed to utilize the internet for their own desires. Management and employee emails will undergo intense checking before authentication. In fact, management and employee authentication will be done via Microsoft Active Directory (AD) infrastructure. This also applies to their mobile devices to mitigate security concerns. Emails will firstly undergo complete scan of any attachments to locate the possibility of any threats towards the banking system before allowing employees read the contents of the email. Every employee has the responsibility to inform the IT management in case the employee receives questionable email.

Security is essential especially in the deployment of any network having an internet connection. The latest protection and bandwidth checking software will be used to ensure that unauthorized third parties do not access bank information and data files (Peterson & Davie, 2011). The preferred software for this task is the Microsoft Active Directory (AD). The management and the staff will have passwords and user accounts with administrative rights and specific security clearance. Only the IT manager will have full control and access to client/strict bank information. There is needs for a backup system to cater for any outages in the network. The most vital information requiring back up is on the bank’s older computers since loss of information as delicate as banking information could bring problems to the organization. Since the bank wants to utilize the new network as a system facilitating the staff gain access and share resources, the information will be stored on the central server (Riles, 2001). Cloud computing will also be adopted by the bank for storage of its vital information and avoid problems that come with outages (Riles, 2001).

The server and information systems will undergo a weekly backup of system configurations and information. This length of the chosen period was short because it is easier to perform system rollback as compared to long period rollbacks. Employees and client accounts will be stored on servers in both local and remote locations. Finally, Western County Bank is interested in integrating their main internal web-based application with a “Software as a Service” (SaaS) provider that specializes in online banking services. The web-based application was designed to easily integrate into a cloud-computing environment.

Software as a Service and Virtualization is a key trend in many businesses today. Businesses are virtualizing their operations to way a tame cybercrime that is on the rise. In addition to cloud computing, the network topology will allow for virtualization and online banking services provided by a SaaS company of choice (Antonakos & Mansfield, 2009).

Network diagram

The diagram below is a basic layout of how the new network system will appear and operate. However, the diagram does not illustrate the actual measurements and positions of the equipment. Routers displayed do not show the redundancy that the new network intends implement. The connections correctly show the network peripherals and computers, however, the laptop and desktop computers are all directly linked. The illustration below shows only some computers to prevent consumption of large space.

Budget

The proposed budget for the new rollout will include the cost of the software, hardware, labor, and external resources. The budget includes a five-week time span for complete installation.

Week 1

Oder software, network peripherals, hardware, and internet services

Information backup form old computers

Start office organization to conform to the bank’s new network

Week 2

Arrival of ordered materials

Removal of old computers and other hardware at the discretion of the bank

Installation of internet by two ISPs

Week 3

Setting up and configuration server and backbone network setups

Wiring the backbone switches to workstations and wireless access points for laptops, tablets and Smartphones

Week 4

Installation of computers and laptops with Operating Systems, software, and other configurations

Linking all computers to network and testing

Week 5

Training IT managers on the usage of specific network set ups

Training employees too

Finalizing and troubleshooting any possible issues and cleaning p any excess materials

The cost for training employees and installation will be averaged at $150 dollars per hour. There will be 35 hours per week spent on network installation. This generates 175 total hours, and the cost of the total services is $ 26250.

Software and hardware description Cost Per Unit Total Cost

2 Dell PowerEdge 2900 III Servers w/

Windows Server 2008

w/30 CALS and Symantec

Multi-Server Security Suite $7,833 $15,666

35 Dell OptiPlex 755 Desktop

Computers w/Windows Vista Business

licenses & Microsoft Office 2007 $1,849 $64,715

15 Dell Latitude D630 Laptops

w/Windows Vista Business licenses $1,735 $26,025

4 PowerConnect 2724

24 Gigabit Ports $369 $1,476

2 D-Link Gigabit Router $90.50 $181.0

3 Linksys Wireless-N Access Point $155.99 $467.97

2 Dell 3110cn Color Laser Printer

w/Network Ready Capabilities $549 $1,098

2000ft. CAT6 Ethernet Cable $298 $298

QuickBooks Enterprise Solutions

50 Users $7,000 $7,000

Sage Enterprise Simply Accounting $2,000 $2,000

Two Cable Internet Access Initial Startup

& then $160 per month $180.00 $180

Total

(including $26250

installation services) $145,356.97

References

Antonakos, J. L., & Mansfield, K. C. (2009). Computer networking for LANs to WANs: Hardware, software and security. Clifton Park, N.Y: Cengage Delmar Learning.Newman, M. E. J. (2010). Networks: An introduction. Oxford: Oxford University Press.

Peterson, L. L., & Davie, B. S. (2011). Computer networks: A systems approach. Burlington: Elsevier Science.Riles, A. (2001). The network inside out. Ann Arbor [Mich.: University of Michigan Press.

Tian, K. Q., & Cox, D. C. (2004). Mobility management in wireless networks: Data replication strategies and applications. Dordrecht: Kluwer.

Motorola mission is to provide integrated communications and embedded electronic solutions to the customer.

Motorola

Motorola mission is to provide integrated communications and embedded electronic solutions to the customer. This includes two-way radio, messaging, satellite products systems, networking and Internet-access products, semiconductor applications, and cellular communication products and systems. Motorola also manufactures and sells automotive and industrial electronics, printed circuit boards, energy storage systems, and ceramic/quartz electronic components (Multex.com, 2000, p. 1). Motorola strives to be the global leader in all aspects of telecommunication applications.

Maintaining the lead in the telecommunications industry requires innovation, motivation, and discipline to stay focused on the mission. Accomplishing the mission is extremely important to Motorola and its shareholders. Motorola has set four main objectives to keep the company focused as the industry leader in the new millennium.

The first objective is global leadership in core businesses. Motorola shifted from “product to market organizations” to putting the customers first. In addition, Motorola employed external leadership talent to key positions, and reassigned thousands of engineers to higher-growth businesses. The realignment of personnel increased the digital wireless telephone unit sales by 85 percent (Motorola, 2000, p. 16).

The second objective is total solutions through alliances. Many of these key business alliances are enabling Motorola to bring the Internet to the wireless arena. Motorola led the development of the Wireless Application Protocol (WAP), which standardized the way wireless telephones access and displays Internet content. WAP is supported by more than 175 of the world’s leading telecommunications and software companies.

Motorola has merged with General Instrument Corporation, which integrates broadband technologies to deliver the vast potential of video, voice and data networking to the home. The merger was valued at $17 billion dollars, and was completed on January 5, 2000. The merger also acquired the majority ownership of Next Level Communications, which provides digital subscriber line (DSL) technology. With the formation of SpectraPoint Wireless, Motorola and Cisco Systems has entered the market for broadband access through Local Multipoint Distribution Service (LMDS), which uses point-to-point microwave systems (Motorola, 2000, p. 17).

The third objective is platforms for future growth. This means building expandable telecommunications architectures upon which other companies can build and add value. This feature is extremely vital due to the fast pace of technological innovations. Some of these platforms include Aspiraä that deals with third-generation wireless systems to DigitalDNAä platforms designed to make Motorola a leader in the embedded electronics market place. Motorola has also teamed up with Lucent Technologies with the platform application of StarCore ä concerning digital signal processing (Motorola, 2000, p. 17-18).

The fourth objective is performance excellence. This is measured by providing first class service to customers and financial results. Customer complaints have decreased by 22 percent by implementing a customer-care training program to the sales staff. Financial results for 1999 are also in positive territory. Sales in 1999 rose five percent to $30.9 billon and net earnings were 817 million dollars compared to a one billion dollar loss in 1998. Motorola’s debt-to-equity ratio is improved to 10.1% in 1999 from 26.8% in 1998 (Motorola, 2000, p. 18-19). Performance excellence balances Motorola’s financial results with measures of customer and employee satisfaction, and market share.

Motorola has many strengths, the first and foremost is brand recognition. The name Motorola is known worldwide for quality products. Another strength is the P/E ratio, which is calculated by taking the price per share and dividing it by the earnings per share. The ratio for Motorola is at 68 times, compared to Motorola’s peer group at 62 times (Multex.com, 2000, p. 3). The higher the number shows the confidence shareholders have in the company.

Logistics is another asset that Motorola has in its favor. Motorola owns 126 facilities (manufacturing, sales, service and office), 65 of which are located in the United States, and 61 located in other countries. Motorola also leases 756 such facilities, 385 are located in the United States, and 371 in other countries. In Scotland, Motorola has three manufacturing plants, which employee over 6500 workers, and an additional 3500 workers employed elsewhere in the United Kingdom (Meares, 2000). Motorola has a strong foothold in the United States and overseas to produce and distribute products quickly and efficiently. .

Motorola has been on top of the telecommunications industry for many years. Being on top for a long time can lead to complacency. New innovations and equipment designs by other competitors have reduced Motorola’s market share. For Motorola to stay competitive they must employ the best personnel available and empower them to innovate and create new products and systems.

Another weakness is investing in questionable ventures. This happened to Motorola on the Iridium project. Iridium is company that provided satellite phone service for customers covering the entire globe. The Iridium system consisted of 66 satellites in orbit providing phone coverage no matter where a customer was located. This service is very appealing, but the down side to having this service was the price of the phone, which ranged from three to ten thousand dollars and the usage fee per minute was a little over ten dollars. For some customers this was the perfect service, but Iridium could not generate enough customers to stay solvent. The explosion of the wireless industry and low cellular coverage rates was the downfall of Iridium. Motorola had an 18 percent stake in Iridium and lost over two billion dollars. The Iridium satellite service was turned-off in April of 2000 and Motorola will gradually let the 66 satellites burn up in the earth’s atmosphere. Neither iridium nor Motorola could find a buyer for the Iridium system (Kaiser, 2000).

The state of the economy is in great shape and the technology industry is growing at a rapid pace. Motorola’s stock price has surged over a 150 dollars a share this year and is one of the most actively stocks traded on the NASDAQ (Multex.com, 2000). This insurgence of funds through the sale of stock is an excellent opportunity for Motorola to invest heavily in research and development and buyout smaller competitors. Motorola needs to show extreme caution when investing in research or buying out a competitor since they incurred a tremendous lost with Iridium.

Another opportunity Motorola can expand on is sales overseas. The European market makes up twenty-one percent of sales and Asia-Pacific region only makes up ten percent of Motorola’s sales (Motorola, 2000). These two regions are prime areas to increase market share, the technology boom in these areas are expanding rapidly just like the United States.

The booming economy has been favorable to Motorola, but many of Motorola’s competitors have also reaped the same rewards. Motorola’s four main competitors are Ericsson, Qualcomm, Nokia, and Advanced Micro Devices. Advanced Micro Devices primarily is a manufacturer of semiconductors. Ericsson, Qualcomm, and Nokia primarily deal with cellular phones and systems (Multex.com, p. 2). In fact, Nokia cell phones are taking the market share aware from Motorola due to the new modern designs and features. Qualcomm has developed and patented Code Division Multiple Access (CDMA) technology, which is what current cell phones use. Qualcomm receives royalties off this technology for every cell phone sold.

The government is also a threat to Motorola. The Federal Communication Commission (FCC) regulates and allocates bandwidth. Motorola and other firms must get permission to use certain frequencies. In other countries, the rules and regulations are more lax or they do not have any at all. That is why companies to include Motorola have many manufacturing plants overseas, so they do not have to deal with the stringent rules in the United States.

There are many strategies Motorola can implement to be more successful. Horizontal Integration is one strategy. Horizontal Integration seeks ownership or control over competitors. As stated earlier, Motorola has done this with the acquisition of General Instrument Corporation. This strategy can also backfire, as did the venture with Iridium. Extensive research must be done when a company is looking to expand.

Another strategy that can be implemented is the Join Venture strategy. This strategy involves two or more firms forming a separate organization. Motorola and Cisco Systems accomplished this by forming SpectraPoint Wireless. This strategy is good when risk is involved, losses or profits will be split between the two companies. However, if each firm can provide a unique service or product the other does not have, this alliance can be very powerful.

The Product Development strategy is another alternative Motorola can use to be successful. This strategy increases sales by improving or modifying existing products or services. Motorola has shown improvement with its customer service department and digital cell phone division, but Nokia and Qualcomm are gaining ground with their new products and ideas. Advances in technology happen everyday, if this strategy is not addressed, Motorola will be a follower instead of a leader.

For Motorola to maintain their position as a global leader in the telecommunications industry, the Product Development strategy needs to be implemented. Motorola’s main competitors are developing new products and systems, which are outperforming and selling Motorola products and systems. Money has to be allocated for research and development of new and existing products and systems. Once the quality and performance of the products and systems are improved, sales will increase and consumer and shareholder confidence will rise. This confidence will enable Motorola to focus on overseas sales, especially Europe and the Asia-Pacific region where sales figures are low. The Y2K bug has come and gone, Motorola needs to step up to the forefront of technology and not be the stereotypical brick and mortar company that got passed by in the new millennium.

Bibliography:

References

Kaiser K. (2000). Motorola still hopes to find a buyer for Iridium.

[On-line]. Available: http://biz.yahoo.com/rf/000501/ik.html

Meares R. (2000). Update2-Motorola spends $2 billion on Scottish chips.

[On-line]. Available: http://www.ameritrade.com/cgi-bin/login.cgi

Motorola. (2000). 1999 Summary Annual Report.

[On-line]. Available: http://www.mot.com/General/Finacial/Annual_Report/1999/99annual

.pdf

Multex.com. (2000). Motorola, Inc. Stock Snapshot.

[On-line]. Available: http://www.multexinvestor.com/download.asp?docid=1346436&ticker

=mot

Quicken. (2000). Motorola Inc. Company Profile.

[On-line]. Available: http//quicken.elogic.com/sec_key.asp?ticker=MOT

Challenges Faced by Transgender Yong Adults

Challenges Faced by Transgender Yong Adults

Student’s Name

Institution of Affiliation

Date

Identity crisis is a common problem among young adults, especially transgender people who experience changes later in their lives. Gender dysphoria is phycological distress that results from an incongruence between an individual’s sex that is assigned at birth and one’s gender identity which they developed later in life. Young adults are at a stage in life that poses a major psychological problem in which a person fails to relate to either socially acceptable gender – male and female. While a person may be born female, and transform later in life to be a male, they may undergo psychological and hormonal changes that they previously not experienced. As a result, most transgender people are vulnerable to symptoms of depression and anxiety as they are not sure whether they will be fully adopted by society for what they have chosen to be and what they were previously. For this assignment, I will analyze the poem, “A letter to the girl I used to be” by Ethan Smith to help understand the challenges that young adults pass through especially those experiencing gender changes.

The text, “A letter to the girl I used to be,” highlights the story of a young man in his early 20’s narrating the changes and challenges that he faced when transforming from a female to a male. According to the poem, Ethan describes how it feels to be trapped inside the wrong body. He writes to a young girl, a female version of his younger self named Emily. Previously, he was a girl, but presently, he is a male. In the poem, Ethan goes back to the days when he was Emily, and here he experiences numerous challenges. For example, he states that every time she goes to watch baseball, a voice he no longer recognizes whispers “Ethan, do you remember? When you were gonna be the first girl in the major leagues-Seattle Mariners. Rally Cap.” By this, Ethan is referring to him as a young girl who reminds him of the time, he was young and wanted to be the first girl baseball league player. When Ethan was Emily, he wanted to be a baseball player, but maybe his ambitions have changed since transforming from a female to a male, and this is why he is conflicted about his past and present interests.

References

Ethan Smith. “A Letter to the Girl I Used to Be.” Retrieved from: https://youtube.be/Lkn06Y8prDU

Motorola Mission

Motorola Mission

Motorola mission is to provide integrated communications and embedded electronic solutions to the customer. This includes two-way radio, messaging, satellite products systems, networking and Internet-access products, semiconductor applications, and cellular communication products and systems. Motorola also manufactures and sells automotive and industrial electronics, printed circuit boards, energy storage systems, and ceramic/quartz electronic components (Multex.com, 2000, p. 1). Motorola strives to be the global leader in all aspects of telecommunication applications.

Maintaining the lead in the telecommunications industry requires innovation, motivation, and discipline to stay focused on the mission. Accomplishing the mission is extremely important to Motorola and its shareholders. Motorola has set four main objectives to keep the company focused as the industry leader in the new millennium.

The first objective is global leadership in core businesses. Motorola shifted from “product to market organizations” to putting the customers first. In addition, Motorola employed external leadership talent to key positions, and reassigned thousands of engineers to higher-growth businesses. The realignment of personnel increased the digital wireless telephone unit sales by 85 percent (Motorola, 2000, p. 16).

The second objective is total solutions through alliances. Many of these key business alliances are enabling Motorola to bring the Internet to the wireless arena. Motorola led the development of the Wireless Application Protocol (WAP), which standardized the way wireless telephones access and displays Internet content. WAP is supported by more than 175 of the world’s leading telecommunications and software companies.

Motorola has merged with General Instrument Corporation, which integrates broadband technologies to deliver the vast potential of video, voice and data networking to the home. The merger was valued at $17 billion dollars, and was completed on January 5, 2000. The merger also acquired the majority ownership of Next Level Communications, which provides digital subscriber line (DSL) technology. With the formation of SpectraPoint Wireless, Motorola and Cisco Systems has entered the market for broadband access through Local Multipoint Distribution Service (LMDS), which uses point-to-point microwave systems (Motorola, 2000, p. 17).

The third objective is platforms for future growth. This means building expandable telecommunications architectures upon which other companies can build and add value. This feature is extremely vital due to the fast pace of technological innovations. Some of these platforms include Aspiraä that deals with third-generation wireless systems to DigitalDNAä platforms designed to make Motorola a leader in the embedded electronics market place. Motorola has also teamed up with Lucent Technologies with the platform application of StarCore ä concerning digital signal processing (Motorola, 2000, p. 17-18).

The fourth objective is performance excellence. This is measured by providing first class service to customers and financial results. Customer complaints have decreased by 22 percent by implementing a customer-care training program to the sales staff. Financial results for 1999 are also in positive territory. Sales in 1999 rose five percent to $30.9 billon and net earnings were 817 million dollars compared to a one billion dollar loss in 1998. Motorola’s debt-to-equity ratio is improved to 10.1% in 1999 from 26.8% in 1998 (Motorola, 2000, p. 18-19). Performance excellence balances Motorola’s financial results with measures of customer and employee satisfaction, and market share.

Motorola has many strengths, the first and foremost is brand recognition. The name Motorola is known worldwide for quality products. Another strength is the P/E ratio, which is calculated by taking the price per share and dividing it by the earnings per share. The ratio for Motorola is at 68 times, compared to Motorola’s peer group at 62 times (Multex.com, 2000, p. 3). The higher the number shows the confidence shareholders have in the company.

Logistics is another asset that Motorola has in its favor. Motorola owns 126 facilities (manufacturing, sales, service and office), 65 of which are located in the United States, and 61 located in other countries. Motorola also leases 756 such facilities, 385 are located in the United States, and 371 in other countries. In Scotland, Motorola has three manufacturing plants, which employee over 6500 workers, and an additional 3500 workers employed elsewhere in the United Kingdom (Meares, 2000). Motorola has a strong foothold in the United States and overseas to produce and distribute products quickly and efficiently. .

Motorola has been on top of the telecommunications industry for many years. Being on top for a long time can lead to complacency. New innovations and equipment designs by other competitors have reduced Motorola’s market share. For Motorola to stay competitive they must employ the best personnel available and empower them to innovate and create new products and systems.

Another weakness is investing in questionable ventures. This happened to Motorola on the Iridium project. Iridium is company that provided satellite phone service for customers covering the entire globe. The Iridium system consisted of 66 satellites in orbit providing phone coverage no matter where a customer was located. This service is very appealing, but the down side to having this service was the price of the phone, which ranged from three to ten thousand dollars and the usage fee per minute was a little over ten dollars. For some customers this was the perfect service, but Iridium could not generate enough customers to stay solvent. The explosion of the wireless industry and low cellular coverage rates was the downfall of Iridium. Motorola had an 18 percent stake in Iridium and lost over two billion dollars. The Iridium satellite service was turned-off in April of 2000 and Motorola will gradually let the 66 satellites burn up in the earth’s atmosphere. Neither iridium nor Motorola could find a buyer for the Iridium system (Kaiser, 2000).

The state of the economy is in great shape and the technology industry is growing at a rapid pace. Motorola’s stock price has surged over a 150 dollars a share this year and is one of the most actively stocks traded on the NASDAQ (Multex.com, 2000). This insurgence of funds through the sale of stock is an excellent opportunity for Motorola to invest heavily in research and development and buyout smaller competitors. Motorola needs to show extreme caution when investing in research or buying out a competitor since they incurred a tremendous lost with Iridium.

Another opportunity Motorola can expand on is sales overseas. The European market makes up twenty-one percent of sales and Asia-Pacific region only makes up ten percent of Motorola’s sales (Motorola, 2000). These two regions are prime areas to increase market share, the technology boom in these areas are expanding rapidly just like the United States.

The booming economy has been favorable to Motorola, but many of Motorola’s competitors have also reaped the same rewards. Motorola’s four main competitors are Ericsson, Qualcomm, Nokia, and Advanced Micro Devices. Advanced Micro Devices primarily is a manufacturer of semiconductors. Ericsson, Qualcomm, and Nokia primarily deal with cellular phones and systems (Multex.com, p. 2). In fact, Nokia cell phones are taking the market share aware from Motorola due to the new modern designs and features. Qualcomm has developed and patented Code Division Multiple Access (CDMA) technology, which is what current cell phones use. Qualcomm receives royalties off this technology for every cell phone sold.

The government is also a threat to Motorola. The Federal Communication Commission (FCC) regulates and allocates bandwidth. Motorola and other firms must get permission to use certain frequencies. In other countries, the rules and regulations are more lax or they do not have any at all. That is why companies to include Motorola have many manufacturing plants overseas, so they do not have to deal with the stringent rules in the United States.

There are many strategies Motorola can implement to be more successful. Horizontal Integration is one strategy. Horizontal Integration seeks ownership or control over competitors. As stated earlier, Motorola has done this with the acquisition of General Instrument Corporation. This strategy can also backfire, as did the venture with Iridium. Extensive research must be done when a company is looking to expand.

Another strategy that can be implemented is the Join Venture strategy. This strategy involves two or more firms forming a separate organization. Motorola and Cisco Systems accomplished this by forming SpectraPoint Wireless. This strategy is good when risk is involved, losses or profits will be split between the two companies. However, if each firm can provide a unique service or product the other does not have, this alliance can be very powerful.

The Product Development strategy is another alternative Motorola can use to be successful. This strategy increases sales by improving or modifying existing products or services. Motorola has shown improvement with its customer service department and digital cell phone division, but Nokia and Qualcomm are gaining ground with their new products and ideas. Advances in technology happen everyday, if this strategy is not addressed, Motorola will be a follower instead of a leader.

For Motorola to maintain their position as a global leader in the telecommunications industry, the Product Development strategy needs to be implemented. Motorola’s main competitors are developing new products and systems, which are outperforming and selling Motorola products and systems. Money has to be allocated for research and development of new and existing products and systems. Once the quality and performance of the products and systems are improved, sales will increase and consumer and shareholder confidence will rise. This confidence will enable Motorola to focus on overseas sales, especially Europe and the Asia-Pacific region where sales figures are low. The Y2K bug has come and gone, Motorola needs to step up to the forefront of technology and not be the stereotypical brick and mortar company that got passed by in the new millennium.

Bibliography:

References

Kaiser K. (2000). Motorola still hopes to find a buyer for Iridium.

[On-line]. Available: http://biz.yahoo.com/rf/000501/ik.html

Meares R. (2000). Update2-Motorola spends $2 billion on Scottish chips.

[On-line]. Available: http://www.ameritrade.com/cgi-bin/login.cgi

Motorola. (2000). 1999 Summary Annual Report.

[On-line]. Available: http://www.mot.com/General/Finacial/Annual_Report/1999/99annual

.pdf

Multex.com. (2000). Motorola, Inc. Stock Snapshot.

[On-line]. Available: http://www.multexinvestor.com/download.asp?docid=1346436&ticker

=mot

Quicken. (2000). Motorola Inc. Company Profile.

[On-line]. Available: http//quicken.elogic.com/sec_key.asp?ticker=MOT

Advanced Physical Assessment D.W.2

Advanced Physical Assessment D.W.2

Student’s Name

Institution Affiliation

Introduction

Complications of ear pain present in adults and children. The differential diagnoses in such cases areotitis media and otitis externa including other complications. This paper provides an overview of the two conditions and the factors to consider for differential diagnosis.

Otitis Media (OM)

Otitis media is the inflammation/infection of the middle ear. It starts with an infection making it a middle ear infection occurring when fluid blocks the Eustachian tubes. The symptoms include fever, pain, and impaired hearing and in children troubled sleep, irritability, constant crying, and ear pulling (Acton, 2012). The causes are respiratory infection, allergies, exposure to cigarette smoke, tonsillitis, and for infants feeding while lying down.

Otitis Externa (OE)

Otitis externa is inflammation/infection of the external auditory canal or the ear auricle and times both the external auditory canal and the auricle. It is due to a bacterial infection, irritation, fungal infections, or allergic reactions (Osguthorpe& Nielsen, 2011). The signs and symptoms are hearing loss, tinnitus, occasional fever, erythema, itching, severe deep pain, discharge from the ears, cellulitis, ear pressure, edema, and other bilateral symptoms.

Physical Exam Findings

Physical examination of OM involves the middle ear’sotoscopy. Thefindings are the presence of erythema, bulging, cloud-like appearance, immobility of the tympanic, and presence of an effusion with an inflamed ear canal (Acton, 2012). For OE, physical examination is through the palpitation of the tragus. The external ear canal has edema, narrowing of the canal, erythema, and a cloudy and inflamed tympanic membrane.

Difference in Child and Adult Assessment

During assessment the difference is in the position of conducting the assessment. Childrenlie down with their head turned on one side(Acton, 2012). For adults, they are required to sit with the head tilted on the opposite shoulder. Moreover, pulling of pinna is effective in assessment for children.

Essential Health History Questions

The primary questions to be asked to determine the type, cause and extent of the disease including how the infection began and the duration of the infection. In addition, the current prognosis, onset, and past and family history should be sought. These should be impartial and objective to provide a clear hereditary and medical history.

Conclusion

Ear pain is often a diagnostic problem especially examination exhibits no pathophysiology. The pain can be due to inflammation/infection making it vital to conduct a critical assessment while observing the areas discussed above to eliminate any confusion and ensure the provision of the appropriate treatment.

Reference

Acton, Q. A. (2012). Otitis Media: New Insights for the healthcare professional: 2011 Edition: Scholarly Paper. Atlanta, GA: Scholarly Editions.

Osguthorpe, J. & Nielsen, D. (2011). Otitis Externa: Review and clinical update. South African Family Practice, 53(3), 223-229. http://dx.doi.org/10.1080/20786204.2011.10874089