Tuesday, December 31, 2019
World Systems Theory By Sociologist Immanuel Wallerstein
In the perspective of world-systems theory, the United States is considered a core country, whereas the global South (Africa, Latin America, and evolving Asia including the Middle East) contains a multitude of peripheral countries. With such extensive poverty impeding the progress of countries within the global South, it is possible that the United States can provide effective assistance. However, an explanation must be presented to express how these core countries and peripheral countries become just that, in order to determine how they can change their status. This paper intends to address how countries grow, how the US can aid the global South in the struggle of poverty, and the possibility of altering trade policies to eventuallyâ⬠¦show more contentâ⬠¦When it comes to sovereignty, there are two types: internal and external. Internal sovereignty occurs within your borders, whilst external sovereignty is when other countries recognize this total autonomous power that has ac cumulated. Wallerstein agreed with the concept of less borders and more commonalities. He theorized that the core and the periphery should think and act more as a whole rather than different parts, as those parts affect the outcome of the same machine. Therefore, it would stand to reason that if the United States were to assist the global South in reducing poverty, that it would actually be beneficial for the system as a whole. US aid: In the current world-economy, core countries such as the US go through increases in wages, employment, and general prosperity. However, when this phase comes to an end, it is the peripheral countries that bear the burden. (Wallerstein, 30) For example, letââ¬â¢s say that the US produces a product. The production of this good does quite well, until there is a tipping point, otherwise known as an ââ¬Ëoverproductionââ¬â¢. The product is manufactured at such a high rate that it surpasses the actual demand for said good. Due to the surplus, the prices become more competitive and continue to decline, which means that there is less of a profit. So, core countries then outsource their production processes toShow MoreRelatedWorld System Theory : Immanuel Wallerstein980 Words à |à 4 PagesImmanuel Wallerstein (1930-) is a famous American historian, sociologist, and political scientist. His radicalism and his bold and pragmatic critique of capitalism have made him become the representative in social sciences field. (Wang Zhengyi. 2000) Owing to the obvious origins of his writing and Marxist theory, and the continuation of a large number of terms in Marxism, such as capital, relations of production, and class, Wallerstein is also regarded as the representative of the new Marxist schoolRead MoreImmanuel Wallersteins World Systems Theory1893 Words à |à 8 PagesTwo theories of Globalisation that explain it relatively effectively are Immanuel Wallerstein s World-Systems theory and John W. Meyer s World Polity Theory. Contrary to the tendency of classical sociologists to focus on society within the nation-state, World-systems theory portrays nation-states as units within the larger world system. Wallerstein described the ââ¬Å"world Systemâ⬠as an international class system based on countries as units instead of individual people. He thought there are three mainRead MoreAnalysis of Religion and Globalization by Peter Beyer Essay1604 Words à |à 7 Pagesimplications of theories of global change for the study of religion generally and, through a series of case studies, applications of those theories to specific religious movements. In particular, Beyer is interested in the seeming contradiction of the persistence of conflict between social units within a globalizing world that is more and more becoming a single place. The first half of his book, the introduction and four chapters, is taken up with theoretical definitions of religion as a social system andRead MoreHuman Sex Trafficking Throughout The World2642 Words à |à 11 PagesHuman Sex Trafficking Reflects the Continuing Inequalities and Conflicts in our Modern World The image above helps illustrate this issue as it portrays the essence of how a human being is used and abused as a commodity as a result of the sex trafficking industry in the world. The bar code symbolizes various aspects of the capitalist world we live in. It represents a product, a good to be sold, traded, used and consumed. The bar code on the arm of a human being is degrading and shocking, butRead MoreConstructivism, Symbolic Interactionism And Social Conflict Theory1509 Words à |à 7 PagesSuch theoretical approaches of functionalism, symbolic interactionism and social conflict theory allow us to critically analyse and discuss the importance of globalisation, giving deeper insight into this social phenomenon. Globalisation according to Giddens is the intensification of worldwide social relations which distant localities in such a way that local happenings are shaped by an event occurring many miles away and vice versa (1990, p.64). Due to the advancement in technology, g lobalisationRead MoreNeorealist and Neo-Marxist Approaches to Globalization2148 Words à |à 9 Pagesanarchical international system. Waltzââ¬â¢s Theory of international Politics (1979) seeks to provide a scientific explanation of the international political system. A scientific theory of international relations leads us to expect the certain pattern that states to behave in predictable ways. In Waltzââ¬â¢s view the best IR theory is a neo-realist systems theory that focuses centrally on the structure of the system, on its interacting units, and on the continuities and changes of the system. In classical realismRead MoreSociology and Social Change6068 Words à |à 25 Pagesout to be subordinate to a boss who belongs to a socially inferior group. à If individuals learn to recognize that which is not so obvious when they face drastic social transformations, we can assert that it is also under such conditions that sociologists further their knowledge of society and its regularities. It is thus not surprising that the scientific study of society was born in the midst of the most drastic transformations ever experienced by humankind, the 19th Century passage from a socialRead MoreSociology and Social Change6058 Words à |à 25 Pagesout to be subordinate to a boss who belongs to a socially inferior group. à If individuals learn to recognize that which is not so obvious when they face drastic social transformations, we can assert that it is also under such conditions that sociologists further their knowledge of society and its regularities. It is thus not surprising that the scientific study of society was born in the midst of the most drastic transformations ever experienced by humankind, the 19th Century passage from a socialRead MoreEssay on Colonial Oppression of Women1123 Words à |à 5 Pageschallenging discourses. The present day world with the constant cultural encounters and clashes as well as the ideas regarding pluralism and multiculturalism motivates a curiosity on the part of the onlooker to search the answer to the question who is who in todays world when there is a continuous struggle between different countries not only politically and militarily but also culturally. In this situation the division of the world to First, Second and Third World countries also provides the opportunityRead MoreThe Origin of Social Stratification5566 Words à |à 23 Pagesdoctrines. ORIGINS OF SOCIAL STRATIFICATION In early societies, people shared a common social standing. As societies evolved and became more complex, they began to elevateà some members. Today, stratification, a system by which society ranks its members in a hierarchy, is the norm throughout the world. All societies stratify their members. A stratified society is one in which there is an unequal distribution of societyââ¬â¢s rewards and in which people are arranged hierarchically into layers according to how
Monday, December 23, 2019
Sociological Viewpoint of Deviance Essay - 2108 Words
Sociological Viewpoint of Deviance Deviance is a wide-ranging term used by sociologists to refer to behaviour that varies, in some way, from a social norm. In this respect, it is evident that the concept of deviance refers to some form of rule-breaking behaviour. In relation to deviance, therefore, the concept relates to all forms of rule-breaking whether this involves such things as murder, theft or arson - the breaking of formal social rules - or such things as wearing inappropriate clothing for a given social situation, failing to produce homework at school or the breaking of relatively informal social rules. In practice, the study of deviance is usually limited to deviance that results inâ⬠¦show more contentâ⬠¦Individuals, who anticipate necessary adjustments of social morality to changing conditions, may be stigmatised as criminals at first. Crime is the precondition and the proof of a societys capacity for flexibility in the face of essential change. In Some societies, the crime rate may become pathol ogical and as such, this indicates a society that is sick, which means that it is suffering from social disorganisation. Durkheim does not, however, provide any indication of what a normal crime rate might be, or how it could be calculated. (Giddens (2001), p. 200) Durkheim also ignores conflicts about morality within a society, which is the stock in trade of the labelling theorist. Equally important, Durkheim, while accepting the relative nature of crime, also seems to think that some acts seem constant, in terms of being defined as criminal, in all societies. That is, he recognises a minimum content of natural law. Finally, Durkheim, while regarding a certain rate of crime as a normal inescapable feature of society, also was aware that particular societies might be in a pathological condition, which generates excessive deviance. This leads into the area of anomie and the work of Robert Merton. (Giddens (2001), p. 203) Robert Merton argues that both human goals and constraints on behaviour are socially based (we learn them), andShow MoreRelatedSociology: Value Conflict1346 Words à |à 6 Pagestheir deviance for granted, as one cannot assume that these people have actually committed a deviant act or broken some rule, because the process of labeling theory may not be infallible. In other words, to be deviant behavior deviant does not necessarily mean that the individual is, or has been deviant in the past. In addition, Kai T. Erikson (2005) also highlights the way social reaction affects the deviant individual. He reinforces what Becker had previously suggested saying that deviance is notRead MoreSociological Theory Of Labelization967 Words à |à 4 Pageshas been an evident stimulator in life, causing no surprise that labeling is the most influential motivator in human behavior. The theory that labelization is the most prominent human motivator is supported by multiple sociological and psychological studies: socialization, deviance, and social psychology (McLeod). Examples of the labeling theory at work are portrayed in many pieces of literature and art. Picasso painted Portrait of Dora Maar in 1937. Using oil pastels, Picasso depicted the abilityRead MoreThe Causes Of Deviant Behavior, Psychological Approach And Sociological Approach1676 Words à |à 7 PagesDeviance is a kind of behaviour which is contrary to the dominant norms and values of society. In reality, there are many different theories to explain the causes of deviant behaviour, including biological approach, psychological approach and sociological approach. This essay will be using two criminological perspectives which are the biological and sociological explanations to analyse the causes of crime in depth, and evaluate the two perspectives and the related criminological evidence. SociologyRead MoreA Comprehensive Look At Information Regarding The Transgender Community1420 Words à |à 6 Pagesshowcase the actions transgender people must face in several states throughout the nation when they partake in social deviance through body alterations. Next, data highlighting how groups on each side of the issues are struggling to gain social control over the public opinion of the transgender community. Now, the transgender issue in America incubuses a plethora of sociological concepts; however, the four key concepts listed above will allow readers to understand the major issues society has withRead MoreDeviance and Social Control914 Words à |à 4 Pagesnorms become highly significant in a society and may become laws. According to the control theory, as we network with the members of our society we will ultimately conform to these norms. Hence, those who violate these norms result in exhibiting deviance, or a behavior that violates societyââ¬â¢s social standards. A person can gain this deviant behavior by physical or behavioral traits, thus acquiring a negative or positive social stigma. The term stigma is used to categorize the labels a society usesRead MoreEssay Deviance is Relative1566 Words à |à 7 Pagesââ¬Å"Deviance is Relativeâ⬠is a controversial topic that has caused intrigued sociologists to have debates in order to come to a conclusion. Because there is no absolute standard application towards deviating behavior, we can only gain knowledge through practical implications, main ideas, and concepts processes. Practical Implications of ââ¬Å"Deviance is Relativeâ⬠There is no absolute way of defining deviating acts. Deviance can only be defined in a relation to certain norms, but no standards are permanentRead MoreSociological Theory Of The Television982 Words à |à 4 PagesDeviance is a behavior, trait, belief, or other characteristic that violates a norm and causes a negative reaction (Ferris Stein 154). The television Jane The Virgin embodies this sociological theory and is intended for an audience of young and older adults. Types of deviance that is featured is that Jane Villanueva who has hopes of being a teacher and author goes to the doctors for a routine physical examination. However, while there she accidentally gets artificially inseminated. The intendedRead MoreHotel Rwanda vs. Erin Brockovich1660 Words à |à 7 Pagessimilar end with the endangerment of thousands of people. We will examine how these deviant decisions affect both their societies and the reasons behind these atrocious acts. Hotel Rwanda is a very graphic film filled with a tremendous amount of deviance and social problems. The Hutu tribe feels that the Tutsi should not be in power and the Hutu extremists try to overtake their position. The social problem is they want control over their part of Africa but do not have the proper means to go aboutRead MoreMedia and Cultural Influences on Sexual Orientation1097 Words à |à 4 Pagessomeone of the same sex was something that could be socially acceptable, if not possible. It took a while for society to realize that it was okay to date people of the same sex, and until that mindset was developed, homosexuality was seen as a social deviance. Because homosexuality was not socially acceptable, people that identified as gay or lesbian did not feel like they fit in with society and as a result, suffered low self-esteem. Bullying and discrimination It is no quick or easy task for societyRead MoreSociological Imagination Was Coined By Sociologist C. Wright Mills1649 Words à |à 7 PagesSociological imagination was coined by sociologist C. Wright Mills in 1959 to describe the ability to remove oneself from a given situation whether it affects your life or not personally and try to imagine the situation or conflict from a different perspective or more global view. Itââ¬â¢s the personal perspective that affects our judgments, opinions and actions to a situation. Removal of the personal viewpoint gives us an unbiased way to make a decision that is fair. Removing past prejudices and mores
Sunday, December 15, 2019
Ecological Problems Free Essays
In our lessons we amused about Earth, environment and many environmental problems (à global warming, ozone houl, waste production, etc. ). Nevertheless some of big environmental problems we are omited. We will write a custom essay sample on Ecological Problems or any similar topic only for you Order Now I would like describe this phenomenons in this work. First problem is deforestation of Amazon rainforest and second is poluting of seas and oceans. At the end of this work I would like write somethink about The Czech Republic and problems what we have here. AMAZON FOREST This forest is very importatnt for the future of the world. This area contains one third of the world? s trees. However, the trees are disappearing. This is causing changes in the climate ââ¬â In Peru there is less snow In Bolivia there is less rain and more wind. Why are the Amazon forests being cut? People need the land ,people have money from the trees,people built roads and Brazil owes money to internacional organization and they cut trees and they pay back debt. What will happen if more of the Amazon forest cut down? There will be serious effects on the world? s climate. The air that we breathe will lose some of it? s oxygen. It means that in the air will be more carbon dioxide. It will become difficult- perhaps even impossible ââ¬â to breathe! With more carbon dioxide in the air -the temperature will rise, the ice -capsat the North and South Poles will melt, the sea level will rise, and hundreds of coastal cities will flood. OCEAN Seas and oceans are very important for human life. There live many kinds of animals for example whales dolphins, sharks, fishes etcâ⬠¦ Sea? s fish are very important because they are important part of human food. The most fish consume China, Russia and Japanesse. Very important is water from the sea. This water contains mineralsand for example our is from this water. In the bottom under the land there is crude oil and gus. But people are very inconsiderate and they cause that our seas are polutted in this time saes and oceands are our big garbage dump. We should ask if we will continue what we will do in the future? CZECH REPUBLIC Also Czech Republic has its own problems. Probably the worst problem is air pollution. People burn brown coal which is the dirtiest kind. Factories fill the air with smelly and dangerous smoke. In winter the air is unpleasant In parts of country especially in Northern Bohemia, Prague and around Ostrava people have many health problems. Another big problem is the destruction of nature. Industry and ever-increasing population destroying many forests. This problem is called deforestation. People always need more space, factories, paper, wood. In the past twenty years people dosroyed many beautiful old forests in Moravia and Bohemia. But people establish CH KO ââ¬â Landscape protected area here live many endangered species and you can find here many interesting plants. In LPA people canââ¬â¢t make a noise ,faire,drop a litter go out from signated pathsâ⬠¦ How to cite Ecological Problems, Essay examples
Saturday, December 7, 2019
Professional Research and Communication Survey Process
Question: Discuss about Professional Research and Communication for Survey Process. Answer: Likert scale is a psychometric scale using to accumulate responses in the survey process. The Likert scale facilitates to execute the sum of all Likert items (Wakita, Ueshima Noguchi, 2012). In the particular survey process, total 100 responses have been selected for accumulating responses on the topic. In this context, the survey questionnaire includes the option like below: 1: The staff member appears knowledgeable regarding the stores product. Likert Items Responses (%) Total number of respondents Number of Responses 1- Strongly Disagree 10 100 10 2- Disagree 25 100 25 3- Unsure 17 100 17 4-Agree 32 100 32 5-Strongly agree 16 100 16 Table 1 By analyzing the above table, it can be assessed that the particular arrangement of the Likert items is wrong. Consequently, it is unable to provide the valid calculation. The summary of the collected data does not indicate a valid way of calculation. The Likert scaling is a bipolar scaling, which facilitates to measure either positive or negative responses of the respondents (Boone Boone, 2012). In this particular survey question, the arrangement of the Likert scale needs to be following manner: Likert Items Total Number of respondents Number of Responses Responses (%) 1- Strongly agree 100 16 16 2- Agree 100 32 32 3- Unsure 100 17 17 4- Disagree 100 25 25 5-Strongly disagree 100 10 10 Table 2 For accumulating the information from the positive type of question, the surveyor needs to arrange the options from positive to negative. Consequently, it would facilitate in providing valid data and information on the topic (Hair et al., 2016). For example, by calculating the responses from the table 1, we get the 3.19 as an average score. On the contrary, by calculating the responses from table 2, we get 2.81 as an average score. Calculation from Table 1: (10+50+51+128+80)/100=3.19 Calculation from Table 2: (16+64+51+100+50)/100=2.81 2: In the survey process, there are several techniques to accumulate the data from the respondents. Most o the time, the respondents is not aware of the products or the services (Mackey Gass, 2015). Consequently, they randomly provide feedbacks to the survey questions. It decreases the data reliability. Hence, the interested customers can obtain the knowledge on the products or services before participating in the survey process. For example, if a customer wants to provide feedback on the particular product without having knowledge, he might not be able to deliver the accurate information on the topic. Hence, the organization or the surveyor can involve those customers, who have adequate knowledge of the product and services. On the contrary, it is not possible for the surveyor for engaging a huge number of respondents, who have adequate knowledge of the particular product or services (Taylor, Bogdan DeVault, 2015). Hence, it can be assessed that the random selection of the respondent s would facilitate the surveyor for conducting a large assessment process. Sometimes, large organizations conduct a survey on the online platform for accumulating a huge amount of data on the research topic. However, some organizations believe that the survey process must involve the interested customers having adequate knowledge on the topic. It facilitates in obtaining the valid and reliable data on the research topic. On the contrary, it has been seen that the customers, who have the product knowledge, provide a biased answer to the surveyor. Generally, in the survey process, they show their liability on the particular brand. Consequently, it decreases the data validity and reliability (Panneerselvam, 2014). Hence, it can be assessed that the new survey techniques need to utilize for obtaining accurate information on the research topic. In recent years, an online survey has been increasingly popular due its easy accessible nature. On the other hand, it facilitates to conduct the survey process in both domestic and international platform. 3: There are four types of the quantitative data including nominal, ordinal, interval and ratio (Treiman, 2014). The first survey question indicates the subtype nominal measurement scale, as it does not include the numerical significance. The sub-type of the nominal scale includes the two categories. For example, the demographic question on the gender includes two options such as male and female. Hence, it indicates the nominal scale. The nominal subtype scale is often called the dichotomous. The Fahrenheit thermometer is related to the interval scale, as the difference between each degree is known. In the interval scale, we know the numeric order along with its exact differences between values. Kelvin thermometer is also related with the interval scale. In the Kelvin thermometer, the exact difference between each degree is measurable. The fourth question is related to the numeric value, which can be related with the ratio scale. In the ratio scale, a wide range of the interferential and descriptive data can be applied. The particular question would consist of the numeric option. Moreover, the option can be started from the Zero. Hence, it can be assessed that the particular question is related to the ration scale (Zhu, 2014). The bank account balances can be related to the ratio scale, as the ratio between the both accounts can be evaluated. Moreover, it also can be absolute zero. The ratio analysis suggests the possibilities for conducting the statistical analysis (Grbich, 2012). On the other hand, these variables can be subtracted, added, multiplied and divided. 4: Descriptive non-experimental study: In the non-experimental research design, no external variable are introduced (Gelman et al., 2014). In this particular design, the variables are not manipulated or controlled in a systematic manner. In this scenario, drinking the orange juice three times per day would facilitate the players in performing in the better manner. In the non-experimental study, no values are included. Hence, it can be assessed that the hypothesis testing may not provide the proper outcome in the non-experimental study. On the contrary, the research situation does not allow conducting the research or experiment in an effectual manner (Creswell, 2013). However, in this scenario, the non-experimental study should not be followed. It should be evaluated whether the players can perform in a better manner after having the orange juice or not. Consequently, the descriptive design would not be applicable for this particular research. Quasi-experimental study The quasi-experimental design is one of the important parts of the research, as it facilitates in evaluating the proper analysis of the research. However, the particular research design does not include key ingredients of the research. The quasi-experiment research is feasible, as it does not include the time and logistical barriers (Ioannidis et al., 2014). However, the particular research design is based on the random assignment selection. Consequently, the randomization would cause the lack of data validation (Tibshirani, 2014). In this scenario, the data has been given, and the research needs to be executed based on that provided data. Hence, it can be assessed that the quasi-experiment is not the right approach to analysis the particular research scenario. Experimental study: The experimental research study is the most authentic method of analyzing the research topic. The prime benefit of the experimental study is that it facilitates to gain the insight into the instruction method (Bechhofer Paterson, 2012). In this scenario, the data are pre-validate. Consequently, it will enhance the research activity in an effectual manner. In the experimental process, two examinations need to be conducted. First, the coach needs to conduct the experiment on the performance of the players before taking orange juice. Second, an examination of the performance of the players needs to be taken post drinking of juice. Hence, it can be assessed that the experimental study would be the best possible solution for the particular research, as the variables can be controlled in an effectual manner. References: Bechhofer, F., Paterson, L. (2012).Principles of research design in the social sciences. Routledge. Boone, H. N., Boone, D. A. (2012). Analyzing likert data.Journal of extension,50(2), 1-5. Creswell, J. W. (2013).Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications. Gelman, A., Carlin, J. B., Stern, H. S., Rubin, D. B. (2014).Bayesian data analysis(Vol. 2). Boca Raton, FL, USA: Chapman Hall/CRC. Grbich, C. (2012).Qualitative data analysis: An introduction. Sage. Hair Jr, J. F., Hult, G. T. M., Ringle, C., Sarstedt, M. (2016).A primer on partial least squares structural equation modeling (PLS-SEM). Sage Publications Ioannidis, J. P., Greenland, S., Hlatky, M. A., Khoury, M. J., Macleod, M. R., Moher, D., ... Tibshirani, R. (2014). Increasing value and reducing waste in research design, conduct, and analysis.The Lancet,383(9912), 166-175 Mackey, A., Gass, S. M. (2015).Second language research: Methodology and design. Routledge. Panneerselvam, R. (2014).Research methodology. PHI Learning Pvt. Ltd.. Taylor, S. J., Bogdan, R., DeVault, M. (2015).Introduction to qualitative research methods: A guidebook and resource. John Wiley Sons. Treiman, D. J. (2014).Quantitative data analysis: Doing social research to test ideas. John Wiley Sons Wakita, T., Ueshima, N., Noguchi, H. (2012). Psychological distance between categories in the likert scale comparing different numbers of options.Educational and Psychological Measurement,72(4), 533-546. Zhu, J. (2014).Quantitative models for performance evaluation and benchmarking: data envelopment analysis with spreadsheets(Vol. 213). Springer.
Friday, November 29, 2019
W Ppppp Essay Example
W Ppppp Essay Final Exam Review Note: This hand-out is designed to provide additional review materials for your exam. The practice problems included are not all inclusive and this should be reviewed in conjunction with your practice exam, coursepacket materials and homework problems. Chapter 14 1. On January 1, 2007, Ann Rosen loaned $45,078 to Joe Grant. A zero-interest-bearing note (face amount, $60,000) was exchanged solely for cash; no other rights or privileges were exchanged. The note is to be repaid on December 31, 2009. The prevailing rate of interest for a loan of this type is 10%. The present value of $60,000 at 10% for three years is $45,078. What amount of interest income should Ms. Rosen recognize in 2007? a. $4,508. b. $6,000. c. $18,000. d. $13,524. 2. A company issues $20,000,000, 7. 8%, 20-year bonds to yield 8% on January 1, 2007. Interest is paid on June 30 and December 31. The proceeds from the bonds are $19,604,145. Using effective-interest amortization, how much interest expense will be recognized in 2007? a. $780,000 b. $1,560,000 c. $1,568,498 d. $1,568,332 3. Carr Corporation retires its $100,000 face value bonds at 105 on January 1, following the payment of interest. The carrying value of the bonds at the redemption date is $103,745. The entry to record the redemption will include a a. credit of $3,745 to Loss on Bond Redemption. b. debit of $3,745 to Premium on Bonds Payable. c. credit of $1,255 to Gain on Bond Redemption. d. debit of $5,000 to Premium on Bonds Payable. DR Bonds Payable 100,000 DR Premium 3,745 DR Loss 1,255 CR Cash 105,000 4. The printing costs and legal fees associated with the issuance of bonds should a. e expensed when incurred. b. be reported as a deduction from the face amount of bonds payable. c. be accumulated in a deferred charge account and amortized over the life of the bonds. d. not be reported as an expense until the period the bonds mature or are retired. Page 1 of 10 5. The generally accepted method of accounting for gains or losses from the early extinguishment of debt treats any gain or loss as a. an ad justment to the cost basis of the asset obtained by the debt issue. b. an amount that should be considered a cash adjustment to the cost of any other debt issued ver the remaining life of the old debt instrument. c. an amount received or paid to obtain a new debt instrument and, as such, should be amortized over the life of the new debt. d. a difference between the reacquisition price and the net carrying amount of the debt which should be recognized in the period of redemption as an other expense on the income statement. 6. A corporation called an outstanding bond obligation four years before maturity. At that time there was an unamortized discount of $300,000. To extinguish this debt, the company had to pay a call premium of $100,000. We will write a custom essay sample on W Ppppp specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on W Ppppp specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on W Ppppp specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Ignoring income tax considerations, how should these amounts be treated for accounting purposes? a. Amortize $400,000 over four years. b. Charge $400,000 to a loss in the year of extinguishment. c. Charge $100,000 to a loss in the year of extinguishment and amortize $300,000 over four years. d. Either amortize $400,000 over four years or charge $400,000 to a loss immediately, whichever management selects. 7. On June 1, 2006, Janson Bottle Company sold $400,000 in long-term bonds for $351,040. The bonds will mature in 10 years and have a stated interest rate of 8% and a yield rate of 10%. The bonds pay interest annually on May 31 of each year. The bonds are to be accounted for under the effective-interest method. Instructions (a) Construct a bond amortization table for this problem to indicate the amount of interest expense and discount amortization at each May 31. Include only the first four years. Make sure all columns and rows are properly labeled. (Round to the nearest dollar. ) (b) The sales price of $351,040 was determined from present value tables. Specifically explain how one would determine the price using present value tables. c) Assuming that interest and discount amortization are recorded each May 31, prepare the adjusting entry to be made on December 31, 2008. (Round to the nearest dollar. ) (a) Date 6/1/06 5/31/07 5/31/08 5/31/09 5/31/10 (b) (1) (2) Credit Cash $32,000 32,000 32,000 32,000 Debit Interest Expense $35,104 35,414 35,756 36,131 Credit Carrying Amount Bond Discount of Bonds $351,040 $3,104 354,144 3,414 357,558 3,756 361,314 4,131 365,445 Fin d the present value of $400,000 due in 10 years at 10%. Find the present value of 10 annual payments of $32,000 at 10%. Add (1) and (2) to obtain the present value of the principal and the interest 20,858* 18,667** 2,191 payments. (c) Interest Expense Interest Payable .. Discount on Bonds Payable *7/12 ? $35,756 (from Table) = $20,858 **7/12 ? 8% ? $400,000 = $18,667 Page 2 of 10 Chapter 15: 1. E15-1:Porter Corp. purchased its own par value stock on January 1, 2010 for $20,000 and debited the treasury stock account for the purchase price. The stock was subsequently sold for $12,000. The $8,000 difference between the cost and sales price should be recorded as a deduction from a. additional paid-in capital to the extent that previous net gains from sales of the same class of stock are included therein; otherwise, from retained earnings. b. additional paid-in capital without regard as to whether or not there have been previous net gains from sales of the same class of stock included therein. c. retained earnings. d. net income. 2. Which of the following best describes a possible result of treasury stock transactions by a corporation? . May increase but not decrease retained earnings. b. May increase net income if the cost method is used. c. May decrease but not increase retained earnings. d. May decrease but not increase net income. 3. When a corporation issues its capital stock in payment for services, the least appropriate basis for recording the transaction is the a. market value of the services received. b. par value of the shares issued. c. market value of the shares issued. d. Any of these provides an appropriate basis for recording the transaction. . Direct costs incurred to sell stock such as underwriting costs should be accounted for as 1. a reduction of additional paid-in capital. 2. an expense of the period in which the stock is issued. 3. an intangible asset. a. b. c. d. 1 2 3 1 or 3 5. A feature common to both stock splits and stock dividends is a. a transfer to earned capital of a corporation. b. that there is no effect on total stockholders equity. c. an increase in total liabilities of a corporation. d. a reduction in the contributed capital of a corporation. Stock splits ââ¬â change in par value and change in number of shares Stock dividend ââ¬â DR Retained Earnings and CR CS dividend distributable (and APIC if small stock dividend) 6. On September 1, 2010, Valdez Company reacquired 12,000 shares of its $10 par value common stock for $15 per share. Valdez uses the cost method to account for treasury stock. The journal entry to record the reacquisition of the stock should debit a. Treasury Stock for $120,000. b. Common Stock for $120,000. c. Common Stock for $120,000 and Paid-in Capital in Excess of Par for $60,000. . Treasury Stock for $180,000. 12,000 ? $15 = $180,000. (Credit is to cash. ) Page 3 of 10 7. Long Co. issued 100,000 shares of $10 par common stock for $1,200,000. Long acquired 8,000 shares of its own common stock at $15 per share. Three months later Long sold 4,000 of these shares at $19 per share. If the cost method is used to record treasury stock transactions, to record the sale of the 4,000 treasury shares, Long should credit a. Treasury Stock for $76,000. b. Treasury Stock for $40,000 and Paid-in Capital from Treasury Stock for $36,000. c. Treasury Stock for $60,000 and Paid-in Capital from Treasury Stock for $16,000. d. Treasury Stock for $60,000 and Paid-in Capital in Excess of Par for $16,000. 4,000 ? $15 = $60,000; 4,000 ? $4 = $16,000. Stock Issue: DR Cash 1,200,000, CR Common Stock $1,000,000, CR APIC $200,000 Repurchase: DR Treasury Stock 120,000, CR Cash 120,000 Sale: DR Cash 76,000, CR Treasury Stock 60,000, CR APIC-TS 16,000 8. Colson Inc. declared a $160,000 cash dividend. It currently has 6,000 shares of 7%, $100 par value cumulative preferred stock outstanding. It is one year in arrears on its preferred stock. How much cash will Colson distribute to the common stockholders? a. $76,000. b. $84,000. c. $118,000. d. None. Note: Assumes that the preferred tock is not participating since it does not say that it is. 6,000 ? $100 ? .07 = $42,000 PS Dividend Total Dividend of $160,000 ââ¬â ($42,000 ? 2 years since one in arrears and it is cumulative) = $76,000 payable to common stockholders. If it was participating preferred stock, then each would equal dividends and you would need to know the amount of the common stock par to know how to divide it. Refer to example from Ch 15 lecture. . Hernandez Company has 350,000 shares of $10 par value common stock outstanding. During the year, Hernandez declared a 10% stock dividend when the market price of the stock was $30 per share. Four months later Hernandez declared a $. 50 per share cash dividend. As a result of the dividends declared during the year, retained earnings decreased by a. $1,242,500. b. $525,000. c. $192,500. d. $175,000. 350,000 ? .1 0 ? $30 = $1,050,000 Stock dividend: DR RE 1,050,000 and CR CS Dividend Distributable (for par) $50,000 and CR APIC 700,000 $1,050,000 + (350,000 ? 1. 0 (increase for stock dividend) ? $. 50) = $1,242,500. 10. On June 30, 2010, when Ermler Co. s stock was selling at $65 per share, its capital accounts were as follows: Capital stock (par value $50; 60,000 shares issued) Premium on capital stock Retained earnings $3,000,000 600,000 4,200,000 If a 100% stock dividend were declared and distributed, capital stock would be a. $3,000,000. b. $3,600,000. c. $6,000,000. d. $7,800,000. Declaration Date: DR RE 3,000,000 and CR CS Dividend Distributable 3,000,000 Payment Date: DR CS Dividend Distributable 3,000,000 and CR CS 3,000,000 Page 4 of 10 The following data are provided for 11 and 12: 10% Cumulative preferred stock, $50 par Common stock, $10 par Additional paid-in capital Retained earnings (includes current year net income) Net income December 31, 2011 2010 $100,000 $100,000 120,000 90,000 80,000 65,000 240,000 215,000 90,000 Additional information: On May 1, 2011, 3,000 shares of common stock were issued. The preferred dividends were not declared during 2011. The market price of the common stock was $50 at December 31, 2011. 11. The rate a. 90 ? b. 90 ? c. 80 ? d. 80 ? c = $80 ? 400. 12. The book value per share of common stock at 12/31/11 is a. 30 ? 12. b. 200 ? 12. c. 330 ? 12. d. 440 ? 11. $120,000 + $80,000 + (240,000 ââ¬â $10,000) a ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â = $430 ? 12. 12,000 Chapter 18: Solve P18-5 b ââ¬â 1, 2 and 3 using the Completed Contract Method for Practice ER18-1: POC and Completed Contract Methods Toaster Co. entered into the following contract with Oven Inc. to construct a new facility. At the time the contract was negotiated, Toaster was confident that they would be able to complete the contract to Ovenââ¬â¢s specifications. Further, Oven had good credit standing and was expected to pay the contract in full in accordance with the billing terms. The contract started on March 1, 2009 and ended on December 15, 2011 when construction was complete. Toaster Co. Contract price: $10,000,000 Costs incurred Estimated costs to complete Progress billings Cash collections 2009 $3,600,000 4,400,000 3,000,000 2,500,000 2010 $3,800,000 1,000,000 3,500,000 3,000,000 2011 $800,000 0 3,500,000 4,500,000 of return on common stock equity for 2011 is 400. 440. 400. 440. 1) What should Toaster Co. consider in deciding between the Completed Contract and the POC methods? Based on these facts, which method is preferable? Toaster must use the POC method for long-term contracts when all three of the following exist: 1) terms are fixed per the contract 2) buyer is expected to pay and 3) contractor is expected to perform. If Toaster does not meet these three requirements, the completed contract method may be used. The completed contract method may also be used if the contract is short-term or Page 5 of 10 there are inherent hazards. Typically inherent hazards mean they cannot estimate the costs reliably for some reason. In this example, the terms are fixed and known as per above and both parties were expected to perform when the contract was negotiated. Since the contract is longterm and there are no inherent hazards mentioned, the POC method is not only preferred but it would be required. 2) What factors might cause Toaster Co. to use the Installment Sales or Cost Recovery methods? Toaster would have to not qualify for the POC method as discussed above. Further, the collectability of the contract price from Oven would have to be uncertain. The choice between installment sales and cost recovery depends on the level of uncertainty that Oven will pay. The more uncertain Toaster is, the more likely they would use the cost recovery method. ) Prepare the entries for all three years using the POC method. See template for ER18-1. Page 6 of 10 ER 18. 1 % Complete Calculations: 1 2 Costs to Year Date Given Given 2009 2010 2011 3,600,000 7,400,000 8,200,000 3 Estimated Total Costs Given 8,000,000 8,400,000 8,200,000 4 % Complete =2/3 45. 0% 88. 1% 100. 0% 5 Conrtract Price Given 10,000,000 10,000,000 10,000,000 6 Revenue Recognizable =4*5 4,5 00,000 8,809,524 10,000,000 7 Less Pys See PY line 4,500,000 8,809,524 8 Current Year =6-7 4,500,000 4,309,524 1,190,476 1 Year Given 2009 2010 2011 Journal Entries: Estimated Profit =5-3 2,000,000 1,600,000 1,800,000 10 % Complete* =4 above 45. 0% 88. 1% 11 Profit Recognizable =9*10 900,000 1,409,524 12 Less Pys See PY Line 900,000 13 Current Year =11-12 900,000 509,524 390,476 COMPLETED CONTRACT: 2009 2010 3,600,000 3,800,000 (3,600,000) (3,800,000) 3,000,000 (3,000,000) 2,500,000 (2,500,000) 3,500,000 (3,500,000) 3,000,000 (3,000,000) 2011 800,000 (800,000) 3,500,000 (3,500,000) 4,500,000 (4,500,000) CIP AP AR Billings Cash AR CIP Const Expense Revenue Billings CIP 100. 0% 1,800,000 1,409,524 *Note assume 100% of the loss if a loss contract!! 009 2010 2011 3,600,000 3,800,000 800,000 CIP (3,600,000) (3,800,000) (800,000) AP 3,000,000 (3,000,000) 2,500,000 (2,500,000) 900,000 3,600,000 (4,500,000) 3,500,000 (3,500,000) 3,000,000 (3,000,000) 509,524 3,800,000 (4,309,524) 3,500,000 (3,500,000) 4,500,000 (4,500,000) 390,476 800,000 (1,190,476) 10,000,000 (10,000,000) 2011 AR Billings Cash AR Const Expense Revenue Billings CIP (3,000,000) 3,600,000 600,000 (6,500,000) 7,400,000 900,000 8,200,000 (10,000,000) 10,000,000 (8,200,000) 2009 2010 Balance Sheet Presentation: Billings Total (3,000,000) (6,500,000) CIP Total 4,500,000 8,809,524 BS Amount: 1,500,000 2,100,000 Unbilled Unbilled Contract Costs Contract Costs Unbilled Unbilled Contract Costs Contract Costs Inventory Inventory Title: Section: Inventory Inventory 4) Prepare the entries for all three years using the Completed Contract method. See template for ER18-1. Page 7 of 10 5) Now assume the same as above except that in 2010, Toaster ran into some construction delays and actual costs incurred were $2,000,000 higher than stated above. The delays were Toasterââ¬â¢s fault and they were not able to bill Ovens Inc. for these extra costs incurred. Prepare the journal entries for all three years under both the POC and completed contract methods. See template for ER18-1 Part 5). Page 8 of 10 ER 18. 1 Part 5 % Complete Calculations: 1 2 Costs to Year Date Given Given 2009 2010 2011 3,600,000 9,400,000 10,200,000 3 Estimated Total Costs Given 8,000,000 10,400,000 10,200,000 4 % Complete =2/3 45. 0% 90. 4% 100. 0% 5 Conrtract Price Given 10,000,000 10,000,000 10,000,000 6 Revenue Recognizable =4*5 4,500,000 9,038,462 10,000,000 7 Less Pys See PY line 4,500,000 9,038,462 8 Current Year =6-7 4,500,000 4,538,462 961,538 Year Given 2009 2010 2011 Journal Entries: 9 Estimated Profit =5-3 2,000,000 (400,000) (200,000) 10 % Complete* =4 above 45. 0% 100. 0% 11 Profit Recognizable =9*10 900,000 (400,000) 12 Less Pys See PY Line 900,000 13 Current Year 2010 Contrstruction Expense: =11-12 5,838,462 900,000 (1,300,000) 200,000 COMPLETED CONTRACT: 2009 2010 3,600,000 5,800,000 (3,600,000) (5,800,000) 3,000,000 (3,000,000) 2,500,000 (2,500,000) 3,500,000 (3,500,000) 3,000,000 (3,000,000) 2011 800,000 (800,000) 3,500,000 3,500,000) 4,500,000 (4,500,000) 2011 Contruction Expense: 761,538 CIP AP AR Billings Cash AR CIP Const Expense Revenue Billings CIP 100. 0% (200,000) (400,000) *Note assume 100% of the loss if a loss contract!! 2009 2010 2011 3,600,000 5,800,000 800,000 CIP (3,600,000) (5,800,000) (800,000) AP 3,000,000 (3,000,000) 2,500,000 (2,500,000) 900,000 3,600,000 (4,500,000) 3,500,000 (3,500,000) 3,000,000 (3,000,000) (1,300,000) 5,838,462 (4,538,462) 3,500,000 (3,500,000) 4,500,000 (4,500,000) 200,000 761,538 (961,538) 10,000,000 (10,000,000) 2011 AR Billings Cash AR Const Expense Revenue Loss on Contract Billings CIP (3,000,000) 3,600,000 600,000 400,000 (400,000) (6,500,000) 9,000,000 2,500,000 10,000,000 (10,000,000) (200,000) 10,000,000 (9,800,000) 2009 2010 Balance Sheet Presentation: Billings Total (3,000,000) (6,500,000) CIP Total 4,500,000 9,000,000 BS Amount: 1,500,000 2,100,000 Unbilled Unbilled Contract Costs Contract Costs Unbilled Unbilled Contract Costs Contract Costs Inventory Inventory Title: Section: Inventory Inventory ER 18ââ¬â2: Installment Sales Method Cornick, Inc. appropriately used the installment method of accounting to recognize income in its financial statement. Some pertinent data relating to this method of accounting include: 2010 2011 Installment sales $750,000 $900,000 Cost of sales 450,000 630,000 Gross profit $300,000 $270,000 Collections during year: On 2010 sales 250,000 250,000 On 2011 sales 300,000 Prepare the journal entries for 2010 and 2011 required under the installment sales metho d. Gross Profit Rates: 2010 = 40% (300,000/750,000)/ 2011 = 30% (270,000/900,000) 2010 2011 DR CR DR CR AR ââ¬â 2010 750,000 0 AR ââ¬â 2011 0 900,000 Revenue 750,000 900,000 COGS Inventory Revenue COGS Deferred GPââ¬â2010 Deferred GP-2011 Cash AR ââ¬â 2010 AR ââ¬â 2011 450,000 450,000 750,000 450,000 300,000 0 250,000 250,000 0 100,000* 90,000** 100,000 190,000 550,000 250,000 300,000 900,000 630,000 0 270,000 630,000 630,000 Deferred GPââ¬â2010 100,000* Deferred GP-2011 0 Realized GP * 250,000 cash * 40% GP Rate ** 300,000 cash * 30% GP Rate Page 9 of 10 ER 18-3: Completed Contract and Percentage of Completion with Interim Loss Russell Custom Builders manufactures commercial building complexes. The following data is available for an airport construction contract: Amount in thousands Contract price: $10,000 2010 2011 2012 Costs incurred each year $1,900 $1,500 $5,000 Estimated costs to complete 3,100 6,000 0 Progress billings 4,000 4,000 2,000 Cash collections 3,000 4,000 3,000 1. Prepare the required entries for all three years under the percentage of completion method and the completed contract methods. See template for ER18-3. 2. Assume now that the project manager miscalculated the buildingââ¬â¢s window widths and all of the windows had to be reordered. This resulted in significant cost overruns. The costs were as follows: 2010 2011 2012 Costs incurred each year $1,900 $6,200 $2,900 Estimated costs to complete 3,100 2,800 0 Prepare the required entries for 2011 and 2012 under the percentage of completion method and the completed contract methods. See template for ER18-3 Part 2). Page 10 of 10 % Complete Calculations: 1 2 Costs to Year Date Given Given 2010 2011 2012 1,900,000 3,400,000 8,400,000 ER 18. 3 3 Estimated Total Costs Given 5,000,000 9,400,000 8,400,000 4 % Complete =2/3 38. 0% 36. 2% 100. 0% 5 Conrtract Price Given 10,000,000 10,000,000 10,000,000 6 Revenue Recognizable =4*5 3,800,000 3,617,021 10,000,000 7 Less Pys See PY line 3,800,000 3,617,021 8 Current Year =6-7 3,800,000 (182,979) 6,382,979 1 Year Given 2010 2011 2012 Journal Entries: 9 Estimated Profit =5-3 5,000,000 600,000 1,600,000 10 % Complete* =4 above 38. 0% 36. 2% 11 Profit Recognizable =9*10 1,900,000 217,021 12 Less Pys See PY Line 1,900,000 13 Current Year =11-12 1,900,000 (1,682,979) COMPLETED CONTRACT: 2010 2011 1,900,000 1,500,000 (1,900,000) (1,500,000) 4,000,000 (4,000,000) 3,000,000 (3,000,000) 4,000,000 (4,000,000) 4,000,000 (4,000,000) CIP AP AR Billings Cash AR CIP Const Expense Revenue Billings CIP 100. % 1,600,000 217,021 1,382,979 *Note assume 100% of the loss if a loss contract!! 2010 2011 2012 1,900,000 1,500,000 5,000,000 CIP (1,900,000) (1,500,000) (5,000,000) AP 4,000,000 (4,000,000) 3,000,000 (3,000,000) 1,900,000 1,900,000 (3,800,000) 4,000,000 (4,000,000) 4,000,000 (4,000,000) (1,682,979) 1,500,000 182,979 2,000,000 (2,000,000) 3,000,000 (3,000,000) 1,382,979 5,000,000 (6,382,979) 10,000,000 (10,000,000) 2012 AR Billings Cash AR 2012 5,000,000 (5,000,000) 2,000,000 (2,000,000) 3,000,000 (3,000,000) Const Expense Revenue Billings CIP (4,000,000) 1,900,000 (2,100,000) (8,000,000) 3,400,000 (4,600,000) 8,400,000 (10,000,000) 10,000,000 (8,400,000) 2010 2011 Balance Sheet Presentation: Billings Total (4,000,000) (8,000,000) CIP Total 3,800,000 3,617,021 BS Amount: (200,000) (4,382,979) Billings in excess of Unbilled contract costs Contract Costs Billings in Billings in excess of excess of contract costs contract costs Current Liabilities Current Liabilities Current Liabilities Current Liabilities Title: Section: ER 18. 3 Part 2 % Complete Calculations: 1 2 Costs to Year Date Given Given 2010 2011 2012 1,900,000 8,100,000 11,000,000 3 Estimated Total Costs Given 5,000,000 10,900,000 11,000,000 4 % Complete =2/3 38. 0% 74. 3% 100. 0% 5 Conrtract Price Given 10,000,000 10,000,000 10,000,000 6 Revenue Recognizable =4*5 3,800,000 7,431,193 10,000,000 7 Less Pys See PY line 3,800,000 7,431,193 8 Current Year =6-7 3,800,000 3,631,193 2,568,807 1 Year Given 2010 2011 2012 Journal Entries: Estimated Profit =5-3 5,000,000 (900,000) (1,000,000) 10 % Complete* =4 above 38. 0% 100. 0% 11 Profit Recognizable =9*10 1,900,000 (900,000) 12 Less Pys See PY Line 1,900,000 13 Current Year 2010 Contrstruction Expense: =11-12 6,431,193 1,900,000 (2,800,000) (100,000) COMPLETED CONTRACT: 2010 2011 1,900,000 6,200,000 (1,900,000) (6,200,000) 4,000,000 (4,000,000) 3,000,000 (3,000,000) 4,000,000 (4,000,000) 4,000,000 (4,000,000) 2012 2,900,000 (2,900,000) 2,000,000 (2,000,000) 3,000,000 (3,000,000) 2011 Contruction Expense: 2,668,807 CIP AP AR Billings Cash AR CIP Const Expense Revenue Billings CIP 100. 0% (1,000,000) (900,000) *Note assume 100% of the loss if a loss contract!! 2010 2011 2012 1,900,000 6,200,000 2,900,000 CIP (1,900,000) (6,200,000) (2,900,000) AP 4,000,000 (4,000,000) 3,000,000 (3,000,000) 1,900,000 1,900,000 (3,800,000) 4,000,000 (4,000,000) 4,000,000 (4,000,000) (2,800,000) 6,431,193 (3,631,193) 2,000,000 (2,000,000) 3,000,000 (3,000,000) (100,000) 2,668,807 (2,568,807) 10,000,000 (10,000,000) 2012 AR Billings Cash AR Const Expense Revenue Loss from contract Billings CIP (4,000,000) 1,900,000 (2,100,000) Billings in excess of contract costs Current Liabilities 900,000 (900,000) (8,000,000) 7,200,000 (800,000) Billings in excess of contract costs Current Liabilities 10,000,000 (10,000,000) 100,000 10,000,000 (10,100,000) 2010 Balance Sheet Presentation: Billings Total (4,000,000) CIP Total 3,800,000 BS Amount: (200,000) 2011 (8,000,000) 7,200,000 (800,000) Title: Billings in Billings in excess of excess of contract costs contract costs Current Liabilities Current Liabilities Section:
Monday, November 25, 2019
13 Quotes About the Joy of Baby Girls
13 Quotes About the Joy of Baby Girls When you think of a baby girl, the mind conjures up images of satin ribbons, pink frilly frocks, dainty shoes, and delicate tutus. But be warned! Girls can be full of surprises, too. If you are having a baby girl, you can gain some invaluable advice from these baby girl quotes. These baby girl quotes present the perspectives of some famous personalities on the experience of raising a girl child. Here are some beautiful baby girl quotes to fill your heart with a yearning for a baby girl. Alan Marshall Beck A little girl can be sweeter (and badder) oftener than anyone else in the world. She can jitter around, and stomp, and make funny noises that frazzle your nerves, yet just when you open your mouth she stands there demure with that special look in her eyes. A girl is Innocence playing in the mud, beauty standing on its head, and Motherhood dragging a doll by the foot. Elizabeth Taylor My mother says I didnt open my eyes for eight days after I was born, but when I did, the first thing I saw was an engagement ring. I was hooked. Kate Douglas Wiggin Every child born into the world is a new thought of God, an ever-fresh and radiant possibility. Proverb Like mother, like daughter. Lewis Carroll I am fond of children... except boys. Joseph Addison Certain is it that there is no kind of affection so purely angelic as of a father to a daughter. In love to our wives there is desire; to our sons, ambition; but to our daughters there is something which there are no words to express. Irish Saying A son is a son till he takes him a wife, a daughter is a daughter all of her life. Phyllis Diller It would seem that something which means poverty, disorder and violence every single day should be avoided entirely, but the desire to beget children is a natural urge. Henry David Thoreau Every child begins the world again... Whitney Houston You dont have a baby based on that publicity madness. People dont live like that. Especially black people who were raised in families with morals and standards and integrity. Lawrence Housman If nature had arranged that husbands and wives should have children alternatively, there would never be more than three in a family. Ace Frehley I look at my kid, and one part of me wants to keep her as my little baby. But, yknow, the bottom line is shes 18! Harold Bloomfield One touch is worth ten thousand words.
Friday, November 22, 2019
Who makes a better parent Men or women Essay Example | Topics and Well Written Essays - 1250 words
Who makes a better parent Men or women - Essay Example the children. Thesis statement: Women make a better parent because they are emotionally attached to their children, but without ignoring their responsibilities. First of all, the importance of parenting in this modern age must be unearthed. Unlike animals, a newborn child is helpless and shows dependency towards its mother. When a calf is born, it can stand up, walk, or even it can run. But it is impossible for a human child. The only thing that it can do is to cry to attract its motherââ¬â¢s attention. So, one can see that the initial stages of a childââ¬â¢s growth and development is strictly limited to the sphere of the intimate care provided by its mother. Gradually, the child attains its adolescent age, teen age, youth and adulthood. During these stages of growth and development, the childââ¬â¢s behavior towards its mother undergoes gradual change, (maybe, negative or positive). In general, girls show attachment toward their mothers and boys try to imitate their fathers (there may be exceptional cases). But the point under discussion is still to be explored. The traditional role of men in families is that of the ââ¬Ëbreadwinnerââ¬â¢ or the head of the family structure. Generally, men earn money for the whole family and looks after the other members with due care and responsibility. The image of men in a family is based on responsibility. Besides, men show keen interest to force other members to follow certain disciplinary guidelines. Their role as father and the caretaker of the whole family with responsibility is complex. From a different angle of view, their dual role (both are complex) limits the scope of friendly approach towards children. For instance, they possess an active role in protecting and defending the reputation of the family as a whole. The ââ¬Ëfather imageââ¬â¢ is responsible for the deeds of other family members. So, they do have less time to concentrate upon the
Wednesday, November 20, 2019
Finance discussions1 Essay Example | Topics and Well Written Essays - 1000 words
Finance discussions1 - Essay Example Ford, on the other hand is healthy enough to withstand short term payments without liquidating its inventories. General Motors again has a problem with a large amount of inventory and slow processes that take almost double the time to convert inventory into sales. Low inventory figures for Ford facilitate a high inventory turnover. Ford has the worst accounts receivable with only 0.62 days of sales outstanding, well below General Motors 23 days. This means that receivables are not being collected on time. Ford, with relatively lower sales and higher fixed assets, also utilizes its assets efficiently. Both companies seem to be generating a sufficient volume of business given their total assets. Ford has a slightly higher profit margin on sales than General Motorsââ¬â¢ even though both have approximately the same net income. This is attributed to higher sales of General Motors. In terms of the overall return on the investment earned by both companies, they are neck to neck with General Motors out performing Ford due to large asset holdings of the latter. Fordââ¬â¢s negative equity results from the large amount of retained earning deficit and accumulated comprehensive loss over the years. This has resulted in a negative return of 974% to common stockholders. The recent years of more than 100% debt ratio, have eaten into the equity of the company. General Motors is doing well in this regard with a decent return to its common stockholders of 18%. Ford is highly leveraged with almost 100% debt. It has however, brought this figure down from previous years. Compared to that, General Motors even though highly leveraged itself, seems to be in a safer position with 78% debt. This high amount of debt is affecting Fordââ¬â¢s performance as it lowers its ability to cover its fixed financial charges and bogs down its income, adversely affecting the equity. Overall, Ford has taken more debt than it can
Monday, November 18, 2019
Technology in Zara Term Paper Example | Topics and Well Written Essays - 2000 words
Technology in Zara - Term Paper Example This study discusses that Zaraââ¬â¢s strategy is to focus on the popularity that has been achieved on its consumers rather that popularizing the less recognized stock. The managers are accorded outstanding obligation to determine the products that would have a positive implication on the revenue that would be generated by the company. The desire to trust these employees with the principal decision has led to the generation of the realized profit because the company does not dictate the available merchandize, but have an indirect link to consumers through the manager. An added strategy to regulate the revenue spent is realized in the reduction of advertising fees as the company fails to engage in the process. This strategy is applied in creating a modernized store to attract the customers because of the position in the urban centers that require better display. Zara applied a consistent procedure to ensure its goals are attained, and a wider market niche satisfied. These were categ orized into simpler units.This paper outlines that orders were placed to La Coruna on a two times weekly basis. This ensured that the required items that were on demand delivered to customers and the managers applied a system that checked on the deliveries through a dial-up modem system. Fulfillment was achieved through checking for orders that the customers had been engaged in consuming updating the manuals to satisfy the ordered merchandize.... The managers are accorded outstanding obligation to determine the products that would have a positive implication on the revenue that would be generated by the company. The desire to trust these employees with the principal decision has led to the generation of the realized profit because the company does not dictate the available merchandize, but have an indirect link to consumers through the manager. An added strategy to regulate the revenue spent is realized in the reduction of advertising fees as the company fails to engage in the process. This strategy is applied in creating a modernized store to attract the customers because of the position in the urban centers that require better display. Zara applied a consistent procedure to ensure its goals are attained, and a wider market niche satisfied. These were categorized into simpler units. Orders were placed to La Coruna on a two times weekly basis. This ensured that the required items that were on demand delivered to customers and the managers applied a system that checked on the deliveries through a dial-up modem system. Fulfillment was achieved through checking for orders that the customers had been engaged in consuming updating the manuals to satisfy the ordered merchandize. Value Chain Designing and manufacturing ensured that the latest fashion had been implemented, and a wider collection maintained in stock. The design established the trend within the market to alter the merchandize that would sell more to the clients predicting the future pattern of the goods. This made sure that Zara had stayed with the competitors to capture the consumer market that appreciated the latest trend of items. The
Saturday, November 16, 2019
Mendelian Genetics of Drosophila | Lab Report
Mendelian Genetics of Drosophila | Lab Report Joshua Park Introduction Drosophila melanogaster, known generally as a fruit fly, is a cost-effective model organism with certain qualities that make it an ideal research tool in various fields of science. Drosophila melanogaster are preferred over vertebrate models as a research tool in genetic studies due to its basic food requirements, its ability to produce large numbers of progeny in a short period of time, and quick life cycle. Depending on diet and stress its life span ranges up to an average maximum of 120 days. They are also easy and inexpensive to culture in a laboratory environment, not to mention they take up very little space. In addition, they have diverse phenotypic traits that are easily observable. Its anatomical features like the compound eye allow easy access for phenotypic characterization. They also have abundant genetic variation in a relatively small genome. Approximately 13,600 protein-coding genes are located in only four chromosomes. Many heredity variations can be studied in these flies.An example of this is the gene that codes for eye color in Drosophila, which can result in red, sepia, white, or brown phenotypes. This unique ability to generate many different phenotypes provides D. melanogaster its practicality as an effective research tool for the study of the relationship between genotype and phenotype. In this experiment, we wanted to understand which phenotypic results would result from a mating cross between D. melanogaster parents with certain wild type and mutant phenotypes for eye color and wing size. The wild type phenotype for eye color is red, while the mutant phenotypes are sepia and white. The wild type phenotype for wing size is long, while the mutant phenotype is apterous, or no wing. We also wanted to know the reason for such phenotypic ratios, which we hypothesized to be the Mendelian Law of Segregation in regards to the study of one trait. To do this, we mated D. melanogaster flies with similar and different phenotypes in order to see how well our results agreed with the Mendelian Law of Segregation. We created two crosses: a monohybrid cross where both male and female flies had the wild type phenotype (Bb and Bb), and a monohybrid cross where the male flies had the mutant phenotype (XwY) and the female flies had the wild type phenotype (X+X+). For our first monohybr id cross, we wanted to know what the expected phenotypic ratio would be when crossing wildtype red-eyed flies, according to Mendels first law. We hypothesized that the expected phenotypic ratio for a cross with red-eyed flies would be 3:1 because according to the Mendelian Law of Segregation, the two alleles are separated from each other during gamete formation. For our other monohybrid cross, we wanted to know what the expected phenotypic ratio would be when crossing wildtype red-eyed flies with mutant white-eyed flies, once again according to Mendels first law. We hypothesized that the expected phenotypic ratio would be 1:1 due to the Mendelian Law of Segregation. Using the chi-square test, we will be prepared to reject or fail to reject our hypothesis according to our mating cross results. Title: Mendelian Genetics of Drosophila Material and Methods Students in groups of two were given a number corresponding to a specific fly stock vial. Two culture vials pre-filled with food and cotton plugs were collected at the front of the classroom. The group number and initials were written on the vials. Next, the assigned stock vials were obtained and were lightly tapped on the lab bench to remove the flies from the cotton plug. An anesthesia wand was dipped into the FlyNap and carefully inserted through the cotton plugs into each stock vial. The stock vials were immediately placed horizontally on the lab bench after, preventing the flies from drowning in the food media. After waiting a few minutes for the flies to fall asleep, the wands were removed from the vials and the flies from each vial were dumped onto separate index cards. The flies were observed under a dissecting scope and found to be either male or female based on the body morphology. A lamp light was used for an easier inspection. Using a brush, 5 male and female flies from e ach cross set were transferred to the culture vials. Once again, the vials were made sure to be placed horizontally on the lab bench. Each culture vial was sealed with a cotton plug, and the leftover flies were returned to the stock vials. The vials were returned to the TA for storage. Once larva could be seen in the fly culture vials, the parent flies were put to sleep and removed from the vials to avoid backcrossing. Once it was evident that many F1 offspring had matured into adults, the flies were put to sleep and dumped onto notecards. The flies from the assigned cross set were observed under a dissecting microscope, and the eye color and wing presence was recorded for each fly. For cross set E, both the sex and phenotype for each fly was recorded. After every F1 generation fly was counted for each cross set, they were dumped into the morgue. Results Cross Set: C Table 1: F1 phenotypes for cross set C Phenotype Total number Eye color Wing size Red Long 39 Sepia Long 9 The F1 data that was collected for cross set C is indicated in Table 1. The number of flies for each phenotype is shown. Figure 1: Graphical representation of F1 data for cross set C Figure 1 presents the data from Table 1 in the form of a bar graph. According to this data, there were more flies with wildtype red eyes (39) compared to flies with sepia eyes (9). There was a total of 48 flies for cross set C. Cross Set: E Table 2: F1 phenotypes and sex for cross set E à à Phenotype Number of Male Flies Number of Female Flies Total number Eye color Wing size Red Long 10 9 19 White Long 10 13 23 The F1 data that was collected for cross set E is indicated in Table 2. The number of flies for each phenotype and sex is shown. Figure 2: Graphical representation of F1 data for cross set E Figure 2 presents the data from Table 2 in the form of a bar graph. According to this data, the number of male flies with wildtype red eyes (10) was equal to the number of male flies with white eyes (10). In addition, the number of female flies with wildtype red eyes (9) was very similar to the number of female flies with white eyes (13). There was a total of 42 flies for cross set E. Phenotype Observed Number (O) Expected Number (E) Deviation (O E) (O E)à ² (O E)à ²/E Red eyes/long wings 39 36 3 9 0.25 Sepia eye/long wings 9 12 -3 9 0.75 Total 48 48 Xà ² = 1.00 Chi-Square Analysis: Table 3:Chi-square analysis for cross set C Cross Set C:à à â⬠¡2 = Degrees of freedom (df) = 1 p-value range = 0.1 Table 4: Chi-square analysis for cross set E Phenotype Observed Number (O) Expected Number (E) Deviation (O E) (O E)à ² (O E)à ²/E Red eyes/long wings 19 21 -3 9 0.429 White eyes/long wings 23 21 2 4 0.190 Total 42 42 Xà ² = 0.619 Cross Set E:à à â⬠¡2 = Degrees of freedom (df) = 1 p-value range = 0.1 The chi-square analysis was completed for both crosses to compare the observed results with the expected results. The p-value for cross set C was between 0.1 and 0.9. The p-value for cross set E was also between 0.1 and 0.9. As a result, we fail to reject the null hypothesis of the chi-square test for both crosses. Discussion According to the results of this experiment, our research hypothesis was supported in each mating cross. We hypothesized that the expected phenotypic ratio for a cross with red-eyed wildtype flies would be 3:1, because according to the Mendelian Law of Segregation, the two alleles are separated from each other during gamete formation. Cross set C produced about three times as many red-eyed wildtype flies compared to sepia-eyed flies, confirming our hypothesis. For our other monohybrid cross, we wanted to know what the expected phenotypic ratio would be when crossing wildtype red-eyed flies with mutant white-eyed flies. We hypothesized that the expected phenotypic ratio would be 1:1 due to the Mendelian Law of Segregation. Cross set E produced equal amounts of red-eyed flies and white-eyed flies, confirming our hypothesis. The ratios obtained for cross sets C and E accurately reflected the expected results for a monohybrid cross and test cross respectively, as claimed by Mendels law o f segregation. The results of the chi-square analysis show that the observed counts were very close to the expected counts. The p-values for both cross sets C and E were between 0.1 and 0.9. Since these p-values were larger than 0.05, it was concluded that we should fail to reject the null hypothesis. Failing to reject the null hypothesis means that the observed data was not statistically different from the expected data. The mode of inheritance for cross set C was determined to be complete dominance. In complete dominance, the dominant allele completely masks the effect of the recessive allele when both are present. Since both parents were found to be heterozygous for eye color (Bb), the dominant red allele masked the effect of the recessive sepia allele. The F1 data for cross set C demonstrates that wild type red eyes are dominant over sepia eyes, since the ratio of red-eyed flies (BB or Bb) to sepia-eyed flies (bb) was calculated to be 3:1, as expected for a monohybrid cross according to Mendels law of segregation. The mode of inheritance for cross set E was determined to be X-linked. Genetic conditions with an X-linked recessive inheritance pattern usually affect only the males in a family. This is because they are caused by altered or mutant genes found on the X-chromosome. Females are born with two X-chromosomes, so the effects of a working gene on one can mask the effects of a mutant gene on the other, which is similar to complete dominance. They will normally be unaffected carriers of the condition. Males have only one X-chromosome, so if they inherit one with a mutant gene (XwY), they will be affected. The F1 data for cross set E demonstrates that the traits for red eyes and white eyes are located on the sex chromosome, since the ratio of red-eyed flies to white-eyed flies was determined to be 1:1. This indicated that the red-eyed female flies were heterozygous for eye color (X+Xw), since the contribution of a mutant allele from both parent flies would result in offspring with red eyes an d white eyes in equal proportions. These results are comparable to the data from Thomas Hunt Morgans experiment with D. melanogaster. In his experiment, he discovered a mutant gene affecting eye color. This mutant gene was expressed as a white color in the eyes. Morgan proceeded to discover that the gene for eye color was inherited in different ways depending on the sex of the fly. This difference came from the fact that female flies have two X chromosomes, while male flies only have one X chromosome and a Y chromosome. Morgan found that this gene had a similar inheritance pattern to the X chromosome. Thus, Morgan concluded that this gene was X-linked. A limitation of this experiment is the fact that we only counted progeny during one session. Multiple trials of counting offspring may have produced closer values to the expected ratios of Mendels law of segregation. Another limitation would be the difficulty of identifying male flies from female flies in a quick and efficient manner. This research has demonstrated the practicality and versatility of D. melanogaster as a tool for research in the lab. Although these fruit flies may seem like very simple and insignificant organisms, they allow us to do research that may otherwise not have been possible. I plan to conduct further studies with D. melanogaster in the field of pharmacology. Since humans share key physiological processes with this organism, D. melanogaster would serve as an effective model for drug discovery. I aim to generate a new drug compound that would greatly aid in the treatment of type 2 diabetes. I hope that the research conducted with these flies will allow for greater discoveries in various fields of science that will contribute to the advancement of mankind. References Jennings, B. H. (2011). Drosophila a versatile model in biology medicine. Materials Today,à 14(5), 190-195. doi:10.1016/s1369-7021(11)70113-4 Morgan, T. H. (1910). Sex Limited Inheritance In Drosophila. Science, 32(812), 120-122.à doi:10.1126/science.32.812.120 Pandey, U. B., Nichols, C. D. (2011). Human Disease Models in Drosophila melanogaster andà the Role of the Fly in Therapeutic Drug Discovery. Pharmacological Reviews, 63(2),à 411-436. http://doi.org/10.1124/pr.110.003293 Prà ¼ÃŸing, K., Voigt, A., Schulz, J. B. (2013). Drosophila melanogaster as a model organism forà Alzheimers disease. Molecular Neurodegeneration, 8, 35. http://doi.org/10.1186/1750-1326-8-35à à à Plagiarism: Types, Causes and Effects Plagiarism: Types, Causes and Effects KENNEDY MULI KAILITI PLAGIARISM Introduction Plagiarism is ideological theft. When a person takes and idea that is not their own and represents it for credit. This is a false representation of oneself by using work or an idea that is not original or stolen from another person. Furthermore different constituencies have different meaning for the history of plagiarism. We might helpfully regard it as a triple entity or triangle. At one point of the triangle is cheating involving written works, the second inadvertent a failure to master conventions and the third are professionals who another work without permission for their own benefit.[1] This is just taking advantage of other peoples creativity without acknowledging them. Plagiarism represents truth without representing the source of the truth so ultimately it becomes its truth from the wrong person. When plagiarism is done without intention, knowledge or as a mistake then its called miss-use of sources. The great controversy on plagiarism is drawing the thin line between the de liberate and mistake and who takes responsibility between the teacher and the student. Plagiarism has been there as long as man existed and there was art and creativity but the realization of the vice and its consequences could have come with the printing press and academic advancement. In the early years of human existence philosophy, music and poetry were the ideologies and their practice as a sign of civilization and social advancement. The mode of education was informal and there was not based on research and writing and though plagiarism was practiced there is no data on who and when it started. In the definition and practice plagiarism was practiced as long as man lived. As people put their ideas and creativity in writing, distribution, business and credit then plagiarism became a parallel business. The publishing and printing companies and the authors had to protect themselves from theft and so the copy right protection laws. The twentieth century has come with innovation, scientific discoveries and research and plagiarism has risen as a competing factor. There is need to protect individual work and publishers from those who plagiarize to avoid the gains achieved so far and chaos and confusion. The world has turned to capitalism and competition for resources and fame. Plagiarism has become more alive in this century and its a moral and legal matter that is challenging every society. The academic world has been transformed to research and analysis and students excel only after writing essays, papers, thesis and publication making plagiarism a great threat. The new form of plagiarism is not for economic and popularity gain but for academic success and it a vice in all learning institutions. There has been so many ideas presented in all academic fields and with technological advancement plagiarism is easy and appealing today than before. There is no limit to the destruction that plagiarism has done economically, politically, socially, emotionally and often leads to enemity, wars and legal disputes. Today in music and art industry plagiarism is a quick fix to fame and riches. Time as a resource today is more precious than ever and people are willing to take shortcuts and achiev e goals within a short time. There is a lot involved in research, organization and tests in order to present work that is credit worthy in all fields of life so there is a trend to take shortcuts. Today there is unwritten policy of publish or perish in universities and so lecturers are likely to redo an old idea thus self -plagiarism. The internet has come of age and information is available all over the web for all disciplines and this is enticing to those who want to plagiarize. There is a demand for innovation, art, music, news and economic benefits are too good attracting the real and fake at the same time. Types of Plagiarism Plagiarism can either be intentional or accidental but the form and modes it takes vary a lot based on the situation. There is concern about academic plagiarism but there is a wide range from the unknown to the known , the written and the spoken and just like theft its trends and forms has no limits. The common one in research are taking some presented idea from a pool of knowledge and presenting it for credit. When one recycles and old concept or idea its self- plagiarism and the copy paste computer technology is a monster that propagates plagiarism. There is a pool of knowledge in all fields and research is ongoing in all parts of the world so plagiarism can arise unknowingly when there is agreement on the same concept and ideology. 14 Seven sons of a Jewish high priest named Sceva were doing this.15 But the evil spirit answered them, Jesus I know, and Paul I recognize, but who are you? 16 And the man in whom was the evil spirit leaped on them, mastered all of them and overpowered them, so that they fled out of that house naked and wounded.[2] This is spiritual plagiarism as people assume the position of Paul and Jesus. Percentage of College Students Admitting to Selected Cheating Behaviors, 1963 and 1993[3] Tests/Examinations 1963 1993 Copied from another student 26% 52% Helped another student cheat 23% 37% Used crib notes 16 % 27% Written Work Copied material without footnoting 49% 54% Plagiarized 30% 26% Falsified a bibliography 38% 29% Turned in work done by another 29% 14% Collaborated on assignments requiring individual work 11% 49% The use of plagiarism has been on the rise just and taking new modes. This research data information show that the percentages have almost doubled in the thirty years. This trend means that in the next century plagiarism will be at level institutions and schools will find overwhelming. There is a great danger for academic and research advancement from plagiarism and there is a wake -up call. The reason for this paper This paper is to demonstrate that I have a clear knowledge of plagiarism and Calvin Theological Seminary rule on plagiarism. I posted this in my paper as a case study and after using the name of the person publishing this information I assumed this is not taking credit or plagiarism. I pledge i will not plagiarize again and action will be taken against me in future as per Calvin Theological Seminary statutes on plagiarism. Max Brewer in his 1907 book Der Deutsche Christus (The German Christ) During the First and Second World Wars, German Protestant leaders used the writings of Luther to support the cause of German nationalism On the 450th anniversary of Luthers birth, which fell only a few months after the Nazi Party began its seizure of power in 1933, celebrations were conducted on a large scale by both the Protestant Churches and the Nazi Party. .At a celebration in Kà ¶nigsberg, Erich Koch, at that time the Gauleiter of East Prussia, made a speech in which he, among other things, compared Adolf Hitler with Martin Luther and claimed that the Nazis fought with Luthers spirit. Such a speech might be dismissed as mere propaganda, but, as Steigmann-Gall points out: Contemporaries regarded Koch as a bona fide Christian who had attained his position [as the elected president of a provincial Church synod] through a genuine commitment to Protestantism and its institutions. Even so, Steigmann-Gall states that the Nazis were not a Christian movement. The prominent Protestant theologian Karl Barth, in1939 stated that the writings of Martin Luther were used by the Nazis to glorify both the State and state absolutism: The German people suffer under his error of the relationship between the law and the bible, between secular and spiritual power, in which Luther divided the temporal State from the inward state, focusing instead on spiritual matters, thus limiting the ability of the individual or the church to question the actions of the State, which was seen as a God-ordained instrument. Effects of plagiarism Plagiarism affects the individual and the society and the effects can be long lasting and devastating. The person involved will lose trustworthy, moral, academic and social standing. This becomes worse when the person is taken to court or loose license of practice and financial loses. Those in the schools are expelled and many years of study and research go to waste. Plagiarism affects just like theft can be too cruel with years of suffering and regret. In the world today there are people that have lost positions of power and authority and careers destroyed. In the society plagiarism can result to financial loses and as companies and jobs are affected, court cases and warring parties, and threatening social standing. Reasons for plagiarism Ignorance and carelessness is the major sources of plagiarism. Ignorance and carelessness are also the major sources of the excuse from students who are caught plagiarizing. Even in cases where there are established writers, politicians, and academics have been caught plagiarizing the most common reason is confusion in my notes.[4] There is always a reason behind every action good or bad and so people have different reasons to justify plagiarism. The world living in the era of quick fix and people have no time to invest in hard work as time becomes the most valuable resource. A majority of the plagiarism is intentional and by people that are well vast in their fields of knowledge but have little time to carry out a research. The financial and positional gain is attractive and is its good luck adventure that usually goes bad and becomes destructive. There is all information in the Web about anything and this makes plagiarism the easy and quick path to take. The economic trends today h ave forced people to do extra work , juggle between multiple careers , become student workers and so there is little time to invest in school and learning hence plagiarism is a solution. Self-plagiarism is one that can be done unaware after years of publishing and at times its miss-understanding and mistakes of not doing a citation. When people do research and writing they do it without fore knowledge of other people involved in the same work so plagiarism out of ignorance may not justify judgement and condemnation. There is a blame and counter by teachers and students but the bottom line is plagiarism is plagiarism. Today learning is intensive and cumbersome and most students had find it hard to match the pace and hence plagiarism. Conclusion Although we are teaching academic writing we cannot discount the cultural context. It invigorates the writing because is connected to the writers identity informing the writers voice -and yes it can be incorporated in to academic writing. Free writing should allow cultural context to serve as the true and comfortable setting in which second language students could get started in the process of writing a personal essay or research paper. [5] When people do research and writing they do it in their character and nature and the work cannot be separate from themselves. All people live and work in communities that influence their thinking and actions and so when writing in their true self their work will be more original. When writing from second language and culture, under strict guidelines and limits and the objective of teaching and learning is defeated by just fulfilling the purpose. There is a reason to demystify plagiarism by teaching students those engaging in research and writing a bout it, and the basic academic law of education is character. There is need for continuous and genuine conversation by all institutions on the standards, punishment, and modes of plagiarism as new method and techniques evolve with technological advancement. Schools and universities need to engage parents and guardians since plagiarism is vice that is academic and moral. The question of self-plagiarism and miss-use of resources, or a typology and its punishment will be there today and as long as there is writing and research. The new trends in plagiarism and its rise is a challenge to all institutions of learning and there is need to teach plagiarism and good academic morals as a mission. Bibliography Blum, Susan D. My Word ! ,New York :Cornell University Press, 2009. Lathrop, Ann, and Kathleen Foss. Student Cheating and Plagiarism in the Internet Era: A Wake-Up Call: A Wake-Up Call. Englewood, Colorado: Libraries Unlimited, 2000. .eBook Collection (EBSCOhost), EBSCOhost (accessed March 9, 2017). Harris, Robert A. The Plagiarism, Handbook Los Angelas: Pyrczack publishing, 2001. Desena, Laura H. Preventing Plagiarism, Urbana: National Council of Teachers of English, 2007 [1] Blum, Susan D. My Word ! New York (Cornell University Press, 2009)12-13 [2] Acts 19: 14-16 (ESV) [3] Lathrop, Ann, and Kathleen Foss. Student Cheating and Plagiarism in the Internet Era: A Wake-Up Call: A Wake-Up Call. Englewood, Colorado: Libraries Unlimited, 2000. .eBook Collection (EBSCOhost), EBSCOhost (accessed March 9, 2017). [4] Harris, Robert A. The Plagiarism Handbook ( Los Angelas: Pyrczack publishing, 2001) ,23 [5] Desena, Laura H. Preventing Plagiarism (Urbana: National Council of Teachers of English, 2007 ),105.
Wednesday, November 13, 2019
Probation and Electronic Monitoring Essay -- essays research papers
I am doing this paper on electronic monitoring. I am doing this paper because I need a paper to write for you and this is the page I opened to in the book to get the idea. No, really because I believe that electronic monitoring is a terrific way to police probation and parolees when probation and parole officers are so severely overworked. By not having to check in on the offenders as much, because at any time we can hit a button and know exactly where they are, or be notified instantly when they are somewhere they shouldnââ¬â¢t be, it would be a lot easier on probation and parole officers. à à à à à Electronic monitoring is a good idea and should be used more. The advances in technology can be very useful in community corrections. Implementing GPS technology into these el...
Monday, November 11, 2019
Acquisitions: Motivations & Challenges Essay
a. Identify five main motivations (discussed in class) for acquiring a company. Provide a specific, real-world acquisition example for each motivation. b. Which three motivations are most relevant to Paragon Toolââ¬â¢s potential acquisition of MonitoRobotics in the Growing for Broke case? c. Identify the four main challenges (discussed in class) when executing a corporate acquisition. Provide a specific, real-world acquisition example for each challenge. 2. Blue Ocean Strategy a. Draw a strategy canvas for the Nintendo Wii and briefly describe what it says about why Nintendo has been successful in such a competitive industry. Include the Sony Playstation and the Microsoft Xbox on the canvas. b. Identify and briefly describe the six paths to finding Blue Oceans. Give a specific, real-world example of each path (other than the examples I gave in class). 3. Cisco Systemsââ¬â¢ Acquisition Strategy a. Outcomes of nearly 75% of corporate acquisitions fail to meet managerial expectations. Identify 7 reasons why Cisco Systems has been more successful than most other companies in executing over 100 acquisitions (see the two attached articles). b. Identify 3 reasons why Cisco Systems began having trouble with its acquisition strategy. 4. Diversification at Starbucks a. Illustrate and concisely explain the Boston Consulting Groupââ¬â¢s Growth-Share Matrix. Make sure you identify: i. the dimensions upon which the Matrix is based ii. each type of businesses embodied in the Matrixââ¬â¢s quadrants iii. the three functional assumptions of the model b. Specifically apply the model to Starbuckââ¬â¢s product diversification efforts since the 1990s (see the attached article). c. Concisely explain two reasons why BCGââ¬â¢s Growth-Share Matrix might not accurately reflect Starbucksââ¬â¢ historical development. 5. Googleââ¬â¢s International Strategy a. Identify and briefly explain the three types of international strategy. b. Identify Googleââ¬â¢s international strategy and explain why Google Finance would have only been possible under that strategy (see Tom Friedmanââ¬â¢s ââ¬Å"Outsourcing, Schmoutsourcing! Out Is Overâ⬠article below). c. Give a specific, real-world example of each of the other two types of international strategy. 6. Reconfiguration in the Personalà Computer (PC) Industry a. Identify and briefly explain six distinct methods that firms can use to acquire the resources and capabilities they need to develop new products and businesses. b. Drawing on our discussion of the strategic sourcing framework, briefly describe and/or illustrate the relative advantages and disadvantages of these methods. c. Both PC software and hardware manufacturers have been forced to adapt to the rapidly evolving industry in order to survive. Using the PC industry, provide a specific example of 5 of these 6 methods. d. Briefly explain why Xerox may be greatest success and the worst failure in the history of the PC industry. 7. Outsourcing at GM a. Concisely describe the Strategic Sourcing Framework. Be sure to identify the relevant costs/advantages associated with the make-or-buy decision. b. In February 2006, GM announced a ââ¬Å"huge package of outsourcing contracts.â⬠See the attached article. Using the Strategic Sourcing Framework and our class discussions of GM, explain why GM chose to do this. c. Concisely describe the disadvantages GM faced in choosing to outsource, like this. 8. In the early 2000s, Boeing began aggressively outsourcing the development and production of the 787 airplane design. By late 2008, Boeing managers admitted that they made some mistakes in pursuing the outsourcing strategy and that Boeing would significantly curtail outsourcing. List Boeingââ¬â¢s initial motivations for outsourcing and the reasons behind its subsequent change of heart. 9. Diversification a. Concisely describe and explain the relationship between diversification and corporate performance. b. Give one example each of companies with very low diversification, very high diversification, and moderate diversification. Make sure these examples accurately reflect the relationship you described in part a. c. In class, I argued that Tyco could be considered an exception to the generally understood relationship between diversification and performance. Explain why you think this is true or untrue. d. Regardless of how you answered part c, identify 4 or 5 ways that Tycoââ¬â¢s diversification strategy is different from typical corporationsââ¬â¢ corporate strategy. 10. Hybrid Engine Technology & Industry Evolution a. Concisely explain what type of industry disruption best describes Toyotaââ¬â¢sà introduction of the first hybrid engine car targeted for the United States mass market. c. Give a specific historical example (from any industry) of the other major type industry disruption. d. Using a technological S-curve graph (Walker Figure 4.5), illustrate the evolution of the automobile engine. In your illustration, make sure you capture the development of 1) hybrid, 2) hydrogen fuel cell, and 3) standard gas-powered combustion engine technologies. Also include in the illustration indicators of todayââ¬â¢s date in addition to the dates at which each technology was (will be) introduced to the U.S. mass market. e. Concisely explain Utterbackââ¬â¢s model of innovation (Walker Figure 4.4). f. Use Utterbackââ¬â¢s model to specifically and concisely explain why hydrogen fuel cell engines might not be commercially viable for a very, very lo ng time. How Cisco Makes Takeovers Work With Rules, Focus On Client Needs By Mike Angell, Investorââ¬â¢s Business Daily Investorââ¬â¢s Business Daily Investing in technology is risky. Just ask Cisco Systems. In 1997, the networking leader bought Dagaz, a company that made gear for digital subscriber lines. Dagaz wasnââ¬â¢t solid, and Cisco had to buy another company to get the right product. ââ¬Å"You have to be ready to take those risks,â⬠said Ammar Hanafi, Ciscoââ¬â¢s business development manager. Heââ¬â¢s been involved in almost every Cisco takeover since 1998. But Dagaz was an exception among the 70 companies Cisco has bought in the last seven years. That makes Cisco an exception, too. According to a study by consultant A.T. Kearney, more than half of mergers donââ¬â¢t work out. Here are some of Ciscoââ¬â¢s rules: Stay close to home ââ¬â 73% of Ciscoââ¬â¢s targets make network gear. Deals make geographic sense, too. Theyââ¬â¢re close to a Cisco unit or a key talent capital. Get early wins ââ¬â targets have products customers want right now. Familiarity ââ¬â Cisco has stakes in 15% of its targets. Think small ââ¬â Cisco buys start-ups mostly Management stays ââ¬â and quickly learns the Cisco way. Beyond those factors, Cisco looks at what the target firm wants to accomplish, the needs of Ciscoââ¬â¢s customers and how targets fit. ââ¬Å"Cisco is the best example of a company with a well-established acquisition and post merger strategy,â⬠Kearneyââ¬â¢s Max Schroeck said. Many failed mergers stem from companies trying to enter new markets or just cutà costs. Successful mergers are between companies in related lines, the stud y says. That means joining people who share knowledge and experience. Cisco stays close to network gear. It strays, but not far. Smaller forays have been in Net-based phone gear (3%), software for content delivery (15%) and wireless gear (8%). Customer Focus ââ¬Å"Weââ¬â¢re always focused on our customersââ¬â¢ wants and needs,â⬠Hanafi said. ââ¬Å"Weââ¬â¢re always expanding the range of products we have as our customersââ¬â¢ own networks expand.â⬠The best example may be Ciscoââ¬â¢s first acquisition in 1993. CEO John Chambers, then Ciscoââ¬â¢s top salesman, was negotiating an order. But the client leaned toward a rival. So Cisco bought the rival, Crescendo Communications, for $ 89 million. Crescendoââ¬â¢s product was no ââ¬Å"killer,â⬠Hanafi said. But by the third generation, it brought in almost half of Ciscoââ¬â¢s sales. ââ¬Å"The first generation should be good enough for a customer,â⬠Hanafi said. ââ¬Å"The second generation is usually a great product. By the third, it should be a market leader.â⠬ Buy Vs. Invest But how does Cisco know this will be the case? Homework. Thirty people screen companies, probe market potential and talk to likely targets. Its engineers study products, and it queries customers. In some cases, this leads to an investment ââ¬â one that helps Cisco learn about new technologies. If itââ¬â¢s a new market and product line, Cisco will invest. If the technology isnââ¬â¢t ready but looks right, Cisco will invest as well. ââ¬Å"Weââ¬â¢re always looking to enter new parts of the network,â⬠Hanafi said. ââ¬Å"Sometimes there are companies that are not as strategic, but weââ¬â¢d like to know what they do.â⬠Of the 20 companies Cisco bought this year, it had stakes in eight. Overall, it has stakes in about 15% of its possible targets. Sometimes investments prompt Cisco to go with a rival. Two years ago, Cisco bought a stake in a company called Tellium that made an optical switch. Following some changes at Tellium, and after learning about that market, Cisco bought Monterey Networks instead for $ 500 million. Cisco still has a ââ¬Å"passiveâ⬠investment in Tellium but may sell its stake when it can, Hanafi says. For the most part, Cisco targets start-ups. Chambers doesnââ¬â¢t believe mergers of equals can work. The Kearney study agrees. Ità said nearly one-third of mergers of equals destroy shareholder value. Ciscoââ¬â¢s 1996 buy of StrataCom makes the point. At $ 4 billion, StrataCom was Ciscoââ¬â¢s largest takeover to date. StrataComââ¬â¢s sales force tou ted one data standard, Ciscoââ¬â¢s another. Users were confused. ââ¬Å"Integrating the two sales forces was more difficult,â⬠Hanafi said. Geographyââ¬â¢s Role Cisco also has a rule that targets must be physically near one another. This year, Cisco added a fourth company to its Israeli portfolio. And it added its second Canadian company, a software firm called PixStream. These areas are promising new high-tech hubs, and Cisco needs to ââ¬Å"go where the talent is.â⬠ââ¬Å"People asked us why buy PixStream? Itââ¬â¢s in Waterloo, Canada,â⬠Hanafi said. ââ¬Å"Itââ¬â¢s right next to the University of Waterloo, a good school for engineers.â⬠Though it may take up to two years to identify a potential acquisition, Cisco doesnââ¬â¢t waste time closing the deal. Hanafi has seen some sealed in as few as 10 days. Ultimately, Cisco buys talent. It woos people by telling them Cisco will help make their product No. 1. Integration Teams ââ¬Å"Weââ¬â¢re saying to them, ââ¬ËUse our sales force, our manufacturing size,ââ¬â¢ â⬠Hanafi said. ââ¬Å"Come in and weââ¬â¢ll help make you a leader.â⬠Thatââ¬â¢s kept 75% of acquired companiesââ¬â¢ CEOs at Cisco. Cisco sets up a chain of command, and the CEO of the acquired company stays in charge. Integration is easier. Cisco has made integrating companies a discipline. Hanafi has a team of 10 people who run this process. They send up to 65 others from sales, human resources, manufacturing and finance to meet with every worker to discuss salaries, benefits and roles. â⬠The first question people ask after being acquired by Cisco is, ââ¬ËWhatââ¬â¢s going to happen to my dentist?ââ¬â¢ â⬠Hanafi said. Cisco Shopped till It Nearly Dropped By John A. Byrne and Ben Elgin in San Jose, Calif., BusinessWeek It was an all-too-typical deal for Cisco Systems Inc. Monterey Networks Inc., an opticalrouting startup in which Cisco held a minority stake, was a quarry with no revenue, no products, and no customersà ââ¬â just millions in losses it had racked up since its founding in 1997. Despite those deficits, Cisco plunked down a half-billion dollars in stock to buy the rest of the company in 1999. But within days of closing the deal, all three of Montereyââ¬â¢s founders, including its engineering guru and chief systems architect, walked out the door, taking with them millions of dollars in gains from the sale. â⬠I came to the realization I wasnââ¬â¢t going to have any meaningful impact on the product by staying,â⬠says H. Michael Zadikian, a Monterey founder. Eighteen months later, Cisco shut down the business altogether, sacking the rest of the management team and taking a $ 108 million write-off. That dismal tale hardly jibes with Ciscoââ¬â¢s widespread reputation as an acquisitions whiz. Not since the conglomerate era has a company relied so heavily on its ability to identify, acquire, and integrate other companies for growth. CEO John T. Chambers believed that if Cisco lacked the internal resources to develop new products in six months, it had to buy its way into the market or miss the window of opportunity. Some put a new name on it: acquisitions and development, a way for the company to shortcut the usual research cycle. Its belief in the strategy has led Cisco to gobble up more than 70 companies in the past eight years. Analysts and academics heaped praise on Ciscoââ¬â¢s acquisitions prowess in articles, books, and business-school case studies. In the early days, some of this praise was deserved, as Cisco morphed from a router company to a networking powerhouse. Its first acquisition, Crescendo Communications Inc., guided Cisco into the switching business, which generated $ 10 billion in sales last year. All told, acquisitions have laid the foundation for about 50% of Ciscoââ¬â¢s business. But in early 1999, with exuberant investors enticing a growing number of unproven companies to go public, Cisco suddenly had to acquire companies at a much earlier stage. Cisco had long claimed an unprecedented success rate of 80% with its acquisitions. Chambers now says it fell to something like 50% during the Internet craze ââ¬â still above the industry average. â⬠We bet on products 12 to 18 months out,â⬠concedes Chambers. â⬠We took dramatically higher risks.â⬠Chambers often maintained that his acquisition strategy was aimed at acquiring brainpower more than products. But an analysis of the 18 acquisitions Cisco made in 1999 shows that Monterey was no fluke. Many of the most valuable employees, the highly driven founders and chief executives of these acquired companies, have sinceà bolted, taking with them a good deal of the expertise and experience for which Cisco paid top dollar. The two founders of StratumOne Communications Inc., a maker of opticalà semiconductors purchased for $ 435 million, left Cisco. The chief exec of GeoTel Communications Corp., a call-routing outfit acquired for $ 2 billion, walked out after nine months. So did the CEOs or founders of Sentient Networks, MaxComm Technologies, WebLine Communications, Tasmania Network Systems, Aironet Wireless Communications, V-Bits, and Worldwide Data System s ââ¬â all high-priced acquisitions in 1999. Some simply felt Cisco had become too big and too slow. â⬠People who crave risk donââ¬â¢t do so well at Cisco,â⬠says Narad Networks CEO Dev Gupta, who sold Dagaz and MaxComm Technologies Inc. to Cisco in 1997 and 1999, respectively. â⬠Cisco focuses much more on immediate customer needs, less on high-wire technology development that customers may want two to three years out.â⬠Chambers maintains that Ciscoââ¬â¢s turnover rates are the best in high technology. â⬠In our industry, 40% to 80% of the top management team and top engineers are gone within two years,â⬠he says. â⬠Our voluntary attrition rate is about 12% over two years.â⬠Difficulty holding on to top talent was not the only flaw in the Cisco acquisition machine. Cisco often paid outrageous sums for these unprofitable startups ââ¬â a total of $ 15 billion in 1999 alone. Even some of the deals that Cisco considers successful look pretty dreadful using simple math. Its 1999 acquisition of Cerent Corp., a maker of opticalnetworking gear, is a good example. Cisco paid $ 6.9 billion for the company, or $ 24 million for each of Cerentââ¬â¢s 285 employees, even though the company had never earned a penny of profit and had an accumulated deficit of $ 60 million. Even if earnings bounce back to 2000 levels of roughly $ 335 million, it would take Cisco about 20 years to recoup the purchase price. Of course, deals such as Cerent found their rationale in Wall Street math. If investors were willing to pay 100 times earnings for Ciscoââ¬â¢s stock in 1999, then a Cerent profit of, say, $ 300 million could effectively increase the market cap of Cisco by some $ 30 billion. Call it bubble economics. Besides, many of these deals were done for highly inflated Cisco stock instead ofà cash. Even so, that wampum could have been used to buy other assets that could have delivered greater returns. Only in the months since the bubble burst has it become evident just how muddled Ciscoââ¬â¢s mergers-and-acquisitions strategy became. In its haste to do deals, Cisco often purchased companies it didnââ¬â¢t need or couldnââ¬â¢t use. In some cases, the buying spree led to overlapping, duplicative technologies, political infighting, and just plain wasted resources, as Monterey shows. â⬠M&A works to some extent, but at Cisco, it got out of hand,â⬠says Iqbal Husain, a former engineering executive at Cisco. After losing many of the leaders of these businesses, product delays and other mishaps were not uncommon. When Cisco closed down Monterey, for example, the company still hadnââ¬â¢t put a product out for testing, which alone would take as long as a full year. â⬠By the time the product was there to test, the market wasnââ¬â¢t,â⬠says Joseph Bass, former CEO of Monterey. Chambers says he has moved to correct the flaws. Its acquisition binge has slowed ââ¬âà from 41 companies from 1999 through 2000 to just two purchases in 2001. While Chambers expects to do 8 to 12 acquisitions this year, he insists that market conditions will let Cisco wait at least until a target company has a proven product, customers, and management team before cutting a deal. â⬠Weââ¬â¢re making the decisions to acquire a company based on a later point in time, which dramatically lowers the risk,â⬠Chambers says. Anything more ambitious, Cisco now knows, may be foolhardy. A Costly Acquisition Strategy Often lauded for its buyout successes, Cisco has purchased more than 70 companies in the past eight years. In 1999 alone, it paid $15 billion for 18 startups, many of which never delivered on their early promise. Here are the most noteworthy: COMPANY PRICE STATUS SKINNY CERENT $6.9 Alive and Although Cerent has generated $1 billion well billion in estimated sales for Cisco, two decades could be needed to recoup the steep price. PIRELLI $2.2 Alive but A disappointing attempt to bolster OPTICAL billion struggling Ciscoââ¬â¢s long-haul optical networking. SYSTEMS But Pirelliââ¬â¢s technology still trails that of rivals. MONTEREY $500 Dumped Thisà upstart optical company never NETWORKS million in April produced a viable product, and Cisco cut its losses with a $108 million write-off in April. AMTEVA $170 Sold at a Lackluster revenue forced Cisco to million loss in July sell this unified-messaging business. MAXCOMM $143 Part of their Founders and key technologists walked TECHNOLOGIES million DSL strategy out soon after the deal closed. Data: BusinessWeek The Toronto Star April 28, 2006 Friday SECTION: BUSINESS; Pg. F01 LENGTH: 631 words HEADLINE: Starbucks develops taste for independent films BYLINE: Sharda Prashad, Toronto Star BODY: First it was coffee, then CDs, now itââ¬â¢s movies. Today, the independent flick Akeelah and the Bee will make its debut in theatres, with a marketing boost from Starbucks. The java giant is advertising the Lionsgate Entertainment Corp. film about spelling bees, starring Laurence Fishburne and Angela Bassett, by using promotional coffee sleeves, coasters and displays in stores. Neither party has disclosed the amount of cash thatââ¬â¢s changing hands in this deal, other than divulging Starbucks will be receiving a cut of the filmââ¬â¢s profits for its marketing efforts. And when the DVD goes on sale, it will get a share of those profits ââ¬â the DVD, by the way, will be available at Starbucks. Akeelahââ¬â¢s soundtrack will also be flogged at the coffee house. ââ¬Å"Our customer is the demographic that Hollywood needs as it is facing a double-digit decline in the box office and slowing DVD sales,â⬠Howard Schultz, Starbucksââ¬â¢ chairman, told Business Week earlier this year. ââ¬Å"We have a unique cross-section of assets ââ¬â a foundation of trust and confidence in Starbucks ââ¬â that can promote a move that our customers know is relevant.â⬠But is the purveyor of java risking its strong brand appeal by moving away from its coffee core with this latest venture? Starbucks, named for a character in the literary classic Moby Dick, currently has 11,000 outlets in 37 countries and is planning to open 1,800 this year. Its long-term plan is to have 30,000 outlets around the world. ââ¬Å"Starbucks doesnââ¬â¢t sell coffee, it sells a retail environment thatââ¬â¢s chic, urban andà authentic,â⬠says Jay Handelman, marketing professor at Queenà ¢â¬â¢s University School of Business. ââ¬Å"If they were just selling coffee, why would they (customers) pay $4?â⬠Since Starbucks is in the business of selling an urban experience, the professor says, the foray into a movie such as Akeelah and the Bee is consistent with that brand since the film is an urban, intellectual tale. If the movies and coffee were selling different experiences, the brand strategy wouldnââ¬â¢t work since customers would be confused about what Starbucks stood for, adds Andrea Wojnicki, marketing professor at University of Torontoââ¬â¢s Rotman School of Management. Should the movie do poor box office sales, it wonââ¬â¢t necessarily affect the Starbucks brand, she says. Starbucks is about connoisseurship, she argues. It introduced people to the subtleties of coffee and itââ¬â¢s attempting to do the same with its CDs, which it started selling in 1995. The CD venture has also involved an urban experience. In 2004, for example, it coproduced Ray Charlesââ¬â¢ Genius Loves Company and last year it held exclusive distribution for Alanis Morissetteââ¬â¢s Jagged Little Pill Acoustic. Should the movie become a box office flop, Starbucks isnââ¬â¢t necessarily in trouble, says Wojnicki. It could hold up its connoisseur flag and say its campaign is about appreciating art and not about flogging blockbusters. It could also be argued that Starbucks took a growth opportunity that has stretched its brand too far, argues Mary Crossan, business policy professor at the University of Western Ontario. ââ¬Å"When they start to move into movies, theyââ¬â¢re not leveraging their resources or capabilities (in coffee).â⬠Starbucks has stated that it is not interested in producing movies, just promoting them, but Crossan warns that companies need be careful about taking focus away from the core business. And Starbucks has made some poor business choices. It has failed in previous ventures, including an attempt to get into the Internet business in the 1990s and an in-house magazine called Joe that folded after three issues. But Akeelah star Angela Bassett thinks the movie business is a good move for Starbucks. ââ¬Å"Everybodyââ¬â¢s got something to sell,â⬠she told Newsweek. ââ¬Å"You just have to be sure of what youââ¬â¢re trying to sell.â⬠Copyright New York Times Company May 19, 2006 I was on my way from downtown Budapest to the airport the other day when my driver, Jozsef Bako, mentioned that if I had any friends who were planning to come to Hungary, they should just contact him through his Web site: www.fclimo.hu. He explained that he could show people online all the different cars he has to offer and they could choose what they wanted. â⬠How much business do you get online?â⬠I asked him. â⬠About 20 to 25 percent,â⬠the Communist-eraengineer-turned-limo-proprietor said. The former secretary of state James Baker III used to say that you know youââ¬â¢re out of office â⬠when your limousine is yellow and your driver speaks Farsi.â⬠I would say, â⬠You know that the global economy is spinning off all kinds of new business models when your Hungarian driver has his own Web site in English, Magyar and German ââ¬â with background music.â⬠Jozsefââ¬â¢s online Hungarian limo company is one of many new business models Iââ¬â¢ve come across lately that are clearly expanding the global economy in ways that are not visible to the naked eye. I was recently interviewing Ramalinga Raju, chairman of Indiaââ¬â¢s Satyam Computer Services. Satyam is one of Indiaââ¬â¢s top firms doing outsourced work from America, and Mr. Raju told me how Satyam had just started outsourcing some of its American work to Indian villages. The outsourcee has become the outsourcer. Mr. Raju said: â⬠We told ourselves: if business process outsourcing can be done from cities in India to support cities in the developed world, why canââ¬â¢t it be done by villages in India to support cities in India. Things like processing employee records can be done from anywhere, so there is no reason it canââ¬â¢t be done from a village.â⬠Satyam began with two villages a year ago and plans to scale up to 150. There is enough bandwidth now, even reaching big Indian villages, to parcel out this work, and the villagers are very eager. â⬠The attrition level is low, and the commitment levels high,â⬠Mr. Raju said. â⬠It is a way of breathing economic life into villages.â⬠It gives educated villagers a chance to stay on the land, he said, and not have to migrate to the cities. A short time later I was interviewing Katie Jacobs Stanton, a senior productà manager at Google, and Krishna Bharat, founder of Googleââ¬â¢s India lab. They told me that Google had just launched Google Finance, but what was interesting was that Google Finance was entirely conceived by the Google team in India and then Google engineers from around the world fed into that team ââ¬â rather than the projectââ¬â¢s being driven by Google headquarters in Silicon Valley. Itââ¬â¢s called â⬠around sourcingâ⬠instead of outsourcing, because there is no more â⬠outâ⬠anymore. Out is over. â⬠We donââ¬â¢t have the idea of two kinds of engineers ââ¬â ones who think of things and others who implement them,â⬠Ms. Stanton said. â⬠We just told the team in India to think big, and what they came back with was Google Finance.â⬠Mr. Bharat added: â⬠We have entered the generation of the virtual office. Product development happens across the global campus now.â⬠Last story. Iââ¬â¢m in gray Newark speaking to local businessmen. I meet Andy Astor, chief executive of EnterpriseDB, which provides special features for the open-source database called PostgreSQL. His primary development team, he tells me, consists of 60 Pakistani engineers in Islamabad, who interact with the New Jersey headquarters via Internet-based videoconferencing. â⬠The New Jersey team ââ¬â software architects, product managers and executives ââ¬â comes to work a couple of hours early, while the Islamabad team comes in late, and we have at least five to six hours per day of overlap,â⬠Mr. Astor said. â⬠We therefore have multiple face-to-face meetings every day, which makes a huge difference for communication quality. We treat videoconference meetings as if we were all in the same room.â⬠What all these stories tell me is that we are seeing the emergence of collaborative business models that were simply unimaginable a decade ago. Today, there are so many more tools, so many more ideas, so many more people able to put these ideas and tools together to discover new things, and so much better communications to disseminate these new ideas across the globe. If more countries can get just a few basic things right ââ¬â enough telecom and bandwidth so their people can get connected; steadily improving education; decent, corruption-free economic governance; and the rule of law ââ¬â and we can find more sources of clean energy, there is every reason forà optimism that we could see even faster global growth in this century, with many more people lifted out of poverty. GMââ¬â¢s Landmark in IT Outsourcing By Steve Hamm ââ¬â BusinessWeek ââ¬â 2/2/2006 A huge package of outsourcing contracts announced Feb. 2 by General Motors seems to signal shifting fortunes in the $600 billion-a-year information-technology services industry. EDS, GMââ¬â¢s longtime primary supplier, lost ground, while Hewlett-Packardââ¬â¢s sometimes-overlooked services unit got a big lift. The profile of Indiaââ¬â¢s tech industry rose when GM named one of the countryââ¬â¢s leading companies, Wipro, as a tier-one supplier. All told, about $7.5 billion in five-year contracts were awarded. Another $7.5 billion in contracts are expected to be parceled out as new projects come up over the next couple of years. EDS, which formerly had about two-thirds of GMââ¬â¢s outsourcing business, still has the biggest share. It got contracts worth $3.8 billion ââ¬â or about half of the business. HPââ¬â¢s contracts totaled $700 million, and GM called it out as one of t he major gainers. IBM got $500 million in contracts. FINANCIAL SHADOW. The package is significant beyond its sheer size because itââ¬â¢s an indication of how GM Chief Information Officer Ralph Szygenda is reshaping the way the company handles tech outsourcing. He handed contracts in large chunks to companies that will handle them on a global basis rather than country by country. Also, GM and the tech suppliers worked together to create new standards for managing technology, which means all suppliers will do things in a uniform way. Szygenda says the new strategy will allow GM to improve global collaboration while assuring reliability of its computing systems and cutting costs. ââ¬Å"It lets GM focus on innovation rather than spending a lot of time on managing its suppliers,â⬠he said at a press conference. GMââ¬â¢s financial woes cast a shadow over the announcement, however. The carmaker reported a $4.8 billion quarterly loss on Jan. 26. While Szygenda said low prices were only a secondary impetus behind the way he structured the outsourcing contracts, some suppliers didnââ¬â¢t even participate in the bidding, most notably, Accenture. Others said they didnââ¬â¢t bid on all of the pieces because they were concerned they wouldnââ¬â¢t make enough money on them. ââ¬Å"A BIG KICK.â⬠Yetà those who did win contracts were jubilant. ââ¬Å"HP selectively bid on areas where we know we can do a great job and where focus was on core areas of importance to HP and GM,â⬠says Steve Smith, senior vice-president of HP Services. His business is often overshadowed by IBM and Accenture, but it has been gaining momentum lately. Its revenues grew 6% in HPââ¬â¢s fourth quarter, to $3.9 billion. Last quarter, IBMââ¬â¢s services revenues were in the doldrums, declining 5%, to $12 billion. Wipro had already been doing some work for GM, but the new package gives it a credibility lift. Its contracts were worth $300 million over five years. Wipro Executive Vice-President Girish Paranjpe says the company is delighted to be picked. ââ¬Å"Itââ¬â¢s a huge morale booster for us to be able to play with the big boys,â⬠he says. ââ¬Å"Also, because weââ¬â¢re the only tier-one player GM picked from India, itââ¬â¢s a big kick for us.â⬠If GMââ¬â¢s new strategy for managing outsourcing works well, it could become a model for other large corporations. The package has five-year contracts instead of the more traditional 10-year pacts and splits the work up among several suppliers instead of relying predominantly on one. ââ¬Å"This is a tipping point for IT,â⬠says Robert McNeill, principal analyst at Forrester Research. ââ¬Å"Organizations will have to add skills to their vendor management function and make transition management a key for success when moving to a more flexible services model.â⬠Another lesson from the contract: Even financially troubled companies are spending big on IT. Thatââ¬â¢s great news for the tech titans that got a bigger piece of the GM pie. It should even provide solace to EDS, however diminished its share.
Subscribe to:
Posts (Atom)