Wednesday, October 30, 2019

J. M. Synges Riders to the Sea Essay Example | Topics and Well Written Essays - 750 words

J. M. Synges Riders to the Sea - Essay Example In fact, Synge’s one act drama has all the essential traits of a drama such as plot, character, conflict, action, dialogue, etc. But a tragic drama or a tragedy, Synge’s work does not fulfill Aristotle’s definition of tragedy. Synge’s one-act tragedy is essentially the tragedy of common man. Therefore though it does not deal with the downfall of a character of noble status, its story holds a serious and tragic theme. Synge’s work imitates the lives of the people of Aran Islands, more universally speaking, the tragedy of the life of seafaring people, through the life of an elderly domestic woman, Maurya. Through Maurya’s actions and dialogue with her daughters, Cathleen and Nora, her son, Bartley, and the Priest, Synge’s audience learns that the heroine is, both directly and indirectly, in conflict with her destiny and the sea. The descriptions of the characters’ actions are simple mimicries of daily activities, such as â€Å"Ma urya drops Michael's clothes across Bartley's feet, and sprinkles the Holy Water over him†, â€Å"Cathleen and Nora kneel at the other end of the table†, etc. Maurya’s helplessness in front of the cruel smile of fate or destiny becomes evident in the following line, in which the audience can see a destitute and lonely woman who, having lost all of her sons except Bartley and male relatives, is failingly attempting to prevent Bartley from going to Connemara because of some unknown fear of losing him in the sea: â€Å"He won't go this day with the wind rising from the south and west†¦for the young priest will stop him surely† (Synge). In this speech of Maurya, the audience is informed for the first time that this lonely and elderly lady is hardly heard off by her youngest son, Bartley. Also the mild conflict between Maurya and her son is revealed indirectly. Later the audience can view Bartley to act in conflict his old mother. When Maurya warns Bartley not to touch the rope, saying, â€Å"You'd do right to leave that rope, Bartley, hanging by the boards†, he does not pay heed to her and takes the rope. Later on, Maurya’s conflict with the sea as well as with her destiny is revealed in the drama, as the audience watches her saying: â€Å"They're all gone now, and there isn't anything more the sea can do to me† (Riders to the Sea). Also in its remote sense, Aristotle’s concept of music can be applied to Synge’s works. â€Å"Riders to the Sea† is fraught with expressions that are all musical, rhythmic and poetic. One from a number of such expressions is as following: â€Å"If it wasn't found itself, that wind is raising the sea, and there was a star up against the moon, and it rising in the night†¦what is the price of a thousand horses against a son where there is one son only?† (Riders to the Sea) This expression is symbolic in the sense that the position of the moon and the sta r has been used symbolically to refer to something arcane and ominous. Also in this passage, â€Å"wind† has been personified as a monstrous living being. Such symbolisms, personifications and style of expression have endowed the drama with some musical qualities. Indeed the plot of Synge’s drama has been developed through the conflicts, (character-character conflict and character-fate) expressed through dialogue and actions-interactions among the characters. But the

Monday, October 28, 2019

The Walt Disney Company and Pixar Inc. Essay Example for Free

The Walt Disney Company and Pixar Inc. Essay To Acquire or Not to Acquire? In November 2005, Robert Iger, the newly appointed CEO of the Walt Disney Company, eagerly awaited the box office results of Chicken Little, the company’s second computer-generated (CG) feature film. He knew that, for Disney as a whole to be successful, he had to get the animation business right, particularly the new CG technology that was rapidly supplanting hand-drawn animation.1 Yet the company had been reliant on a contract with animation studio Pixar, which had produced hits such as Toy Story and Finding Nemo, for most of its recent animated film revenue. And the co-production agreement, brokered during the tenure of his predecessor, Michael Eisner, was set to expire in 2006 after the release of Cars, the fifth movie in the five-picture deal. Unfortunately, contract renewal negotiations between Steve Jobs, CEO of Pixar, and Eisner had broken down in 2004 amid reports of personal conflict. When he assumed his new role, Iger reopened the lines of communication between the companies. In fact, he had just struck a deal with Jobs to sell Disneyowned, ABC-produced television shows—such as â€Å"Desperate Housewives†Ã¢â‚¬â€through Apple’s iTunes Music Store.2 Iger knew that a deal with Pixar was possible; it was just a question of what that deal would look like. Did it make the most sense for Disney to simply buy Pixar? Walt Disney Feature Animation Walt Disney Feature Animation began with the production of Snow White and the Seven Dwarfs in 1934. Toys and memorabilia based on the movie’s characters were stocked in stores such as Woolworth’s around the film’s release, a move that became a trademark of Disney’s strategy. After many early successes, the animation division struggled for decades after Walt Disney’s death but  was rejuvenated with the arrival of Michael Eisner, as well as Jeffrey Katzenberg as chairman of Walt Disney Studios, in 1984. Under them, the studio produced a string of hit films that included The Little Mermaid and Beauty and the Beast, up to the enormous success of 1994’s The Lion King, which alone generated over $1 billion in net income for the company. The Walt Disney Company and Pixar Inc.: To Acquire or Not to Acquire? Eisner believed in making clear who was good at their job, and who was not so good, and wanted to give control to leaders who had a sense of judgment about creativity and business. Seventy-five percent of the time, he was able to find a director who had these skills and wanted to work on a particular movie; the rest of the time directors would be told to â€Å"just do it.†6 Katzenberg, who was known for his grueling work ethic and passion for animation, made it his personal mission to bring the studio back to its former glory. He supervised every aspect of the studio’s films. According to one former Disney executive, â€Å"Jeffrey is the sheep dog and the wolf. He’s the sheep dog guarding us, and the wolf hunting us.†7 Katzenberg was credited with hammering out the storytelling of each film and ensuring that each film had a moral resonance. He also brought on external talent to each movie, such as Elton John, who contributed songs for The Lion King. Recent Box Office Performance After The Lion King in 1994, every Disney-produced animated film fell below expectations (see Exhibit 1). When asked in 1997 about the division’s disappointing performance, Eisner replied, â€Å"I don’t think people quite understand our company. We have many avenues to make money from one of our animated films. The video revenues from one of our films are large, the consumer products huge.† Some of the same features that observers credited for Disney Animations’ success—large staff, large budgets, and lots of time—were also blamed for its demise. Disney Animation had just 275 employees in 1988; about 950 in 1994 for the release of The Lion King; and 2,200 at its peak in 1999.9 Competition for animators in the 1990s also caused salaries, which accounted for 80% of each film’s cost, to balloon, with top animators’ pay rising from $125,000 in 1994 to $550,000 in 1999.10 And these pay increases affected employees across the board. In 1994, Eisner refused to promote Katzenberg to president of the company, prompting his swift departure. The absence of Katzenberg, who was generally considered to be the studio’s creative force, struck many as the cause of the decline. As one commentator noted, â€Å"the company’s once-invincible animation studio has fallen on hard times since studio chief Jeffrey Katzenberg left.†11 In 1997, Katzenberg, along with Steven Spielberg and David Geffen, started rival animation studio DreamWorks. According to reports, in the years that followed, DreamWorks attempted to lure away some of Disney’s best animators. Joe Roth, former chairman of 20th Century Fox, became chairman of Walt Disney Studios after Katzenberg’s departure. In charge for six years, he focused the studio’s energy on live action films.13 Peter Schneider, former head of Disney Animation, took over in 2000 after Roth left. Schneider’s goal was to deliver â€Å"emotional, thematic stories.†14 He worked solely with established Disney directors and producers and relied on his younger development staff to broker deals with up-and-coming filmmakers, in contrast to the hands-on deal-making style of his predecessors, Katzenberg and Roth.15 The product development group assigned directors for each animated movie. In the late 1990s, Disney set up a â€Å"Secret Lab† in an old Lockheed plant near Burbank Airport as a response to the growing popularity of three-dimensional (3D) CG films. The group’s first CG project was the costly Dinosaur, which was released in 2000 to a strong opening weekend, but which ultimately disappointed at the box office. The Lab was shuttered in 2001 after Roy Disney viewed and rejected the second project underway, Wildlife, which he thought was packed with adult themes and strayed too far from Disney’s family-friendly brand offering. Disney then focused its animation efforts on traditional two-dimensional (2D) projects  such as 2001’s Atlantis: The Lost Empire.16 In 2002, under new feature-animation chief Thomas Schumacher, Disney embarked on an aggressive cost-cutting mission. Lilo Stitch, the first movie made in the new environment, cost about $80 million to make, versus $150 million for the 1999 Tarzan. Instead of 573 animators crafting 170,000 individual drawings, a crew of 208 rendered 130,000 drawings.17 Cost-cutting efforts took Disney’s animation department from its high to around 1,100 in 2003. At that point, as rival studios, such as News Corp.’s 20th Century Fox, exited the market, salaries slid precipitously. The market rate for the animator who brought home $550,000 in 1994 was half as much by the early 2000s.18 Apart from omitting redundancies, Disney Animation kept costs down by cutting corners where it could, in ways that were imperceptible to audiences. For example, the group eliminated things such as the number of characters seen in each frame or the amount of motion in the background.19 The televisionanimation unit also produced very low-cost films, like The Tigger Movie, which could make money with only $45 million in box office receipts, since the production cost was kept down to $15 million.20 In 2003, Disney Studios finally set up its own CG animation department. However, many staff members needed to be retrained in the new technology, which cost Disney money, heightened tension, and depressed morale within the studio. Disney decided to slow production on its animated films to give the staff more time to work on them and hammer out the story lines. American Dog and Rapunzel Unbraided, the second and third releases after Chicken Little, were both pushed back.21 Throughout this period, Disney came to rely on revenue and characters produced by its partner, Pixar. Between 1998 and 2004, Pixar CG movies contributed a total of more than $3.5 billion to Disney Studio revenues, and more than $1.2 billion to Disney’s operating income (Exhibits 2 and 2a). Pixar’s contribution represented 10% of revenue and over 60% of total operating income over the period. In 2005, Disney even set up a group known as Circle 7 to produce sequels to Pixar movies. The 40-person staff working on Toy Story 3 in March 2005 grew to 160 people during the followi ng year. Movie Economics While box office revenues from the theatrical release were the typical  measure of a movie’s success, financial success actually came from other revenue streams generated by the movie. By 2005, such sources included home video sales (originally on cassette tapes, but increasingly on DVD); payper-view and video-on-demand on cable channels; television showings, whether on free channels, such as NBC and CBS, or on cable channels; merchandise sales including toys, apparel, books, etc.; and video games and other electronic uses of the characters (see Exhibit 3). By 2005, the largest of these revenue sources was not theatrical box office but home video. Because character-related sales had such a long tail, revenue for a hit animated movie would come in over many years—up to decades for classic movies that were re-released theatrically and in home video form. Given the longevity of a great movie, film libraries were valuable assets. DreamWorks’ film library, for example, was about to be sold to Paramount for $900 million.23 Sequels to successful movies were another important source of revenue. The sequels to Toy Story, Shrek, and Ice Age, for example, generated between 30% and 90% more box office revenue than the originals. Once a character had been established, the existence of a built-in audience for subsequent  movies reduced marketing costs. Successful sequels would also extend the life of the original movie, particularly for animated features that appealed to successive generations of young children. Pixar Inc. Pixar was unusual among movie studios in generating a succession of box office hits. Its first five full-length films each grossed over $350 million.24 Steve Jobs said, â€Å"Everybody has tried to break into the animation market since Snow White was released in 1937. So far, only two companies  have ever produced a blockbuster production grossing more than $100 million, Disney and Pixar.†25 Pixar’s animation broke from the traditional model because the company did not use hand drawings but rather 3D computer-generated models. In 2D traditional animation, frames comprised hand-drawn cels, which required the skills of hundreds of people working for two to three years. Traditional animation constricted artists’ flexibility, too—if a change needed to be made to a character or scene, all subsequent frames had to be changed. Three-dimensional CG, on the other hand, used mathematical models to redraw each cel and mimic camera angles in ways that traditional an imation could not. Pixar used its own proprietary computer animation technology to generate incredibly lifelike 3D images and backgrounds, although CG still could not quite make human characters look perfectly realistic. Said Jobs, â€Å"We have 10 years of proprietary software systems that you cannot buy anything close to in the marketplace. You have to build them yourself.†26 Pixar’s technology allowed animators to manipulate hundreds of motion control points within a single character, to reuse animated images, and to edit easily.27 These technologies enabled Pixar to make animated films faster than its competitors and at a fraction of their cost. For example, the company made Toy Story with just 110 staff members, who spent the time saved on animation to focus on story and character development, as well as fine-tuning visual details. History Pixar traced its origins to the University of Utah in the 1970s, where a young Edwin Catmull studied computer science in a program renowned for creating the new field of computer graphics. Around the same time, Alexander Schure, president of New York Institute of Technology (NYIT), hired a team of animators to make a film version of â€Å"Tubby the Tuba,† a children’s record. Frustrated by the limitations of hand-drawn animation, Schure flew to the University of Utah, where he met and recruited Catmull to work at the Institute. Catmull and his hand-picked team spent four years at NYIT, where they made inroads into the field despite never producing the Tubby the Tuba movie. In 1979, George Lucas approached Catmull’s team with an offer to work on special effects for Lucasfilm, producer of the wildly successful Star Wars and Indiana Jones franchises. While working there in the early 1980s, Catmull met John Lasseter at a computer graphics conference and the two became friends. Lasseter, a young animator from Disney, had studied at California Institute of the Arts with the likes of Tim Burton. Skilled in art as a young boy, Lasseter read a book on the art of animation and Disney during his freshman year of high school and realized what he wanted to do with his life. After graduation, he joined the ranks at Disney and worked on Mickey’s Christmas Carol. He commented, â€Å"I felt that Disney was, at the time, doing the same old thing. They had reached a certain plateau technically and artistically with, I think, 101 Dalmatians, and then everything had been kind of the same ever since then, with a glimmer of characters or sequences that were special.†30 In 1984, Lasseter went to Lucasfilm’s computer division under Catmull. In 1986, Steve Jobs—who had left Apple Computer the year before—bought the Lucasfilm computer business, then called Pixar, for $10 million.31 Initially, Jobs intended Pixar to be a computer hardware and software company. He spent the next several years subsidizing the company to the tune of nearly $50 million from his personal funds. When the graphics computers did not sell, Jobs cut a third of Pixar’s staff in 1991 and left only the animation division.32 Jobs said, â€Å"If I knew in 1986 how much it was going to cost to keep Pixar going, I doubt if I would have bought the company. The problem was, for many years the cost of the computers required to make animation we could sell was tremendously high. Only in the past few years has the price come down to the point that it makes business sense† (see Exhibits 4 and 4a).33 Software Pixar initially developed three proprietary technologies: RenderMan, Marionette, and Ringmaster. In 1989, the company released RenderMan, a software system that applied texture and color to 3-D objects and was used for visual effects. Pixar used RenderMan itself and sold it to Disney, Lucasfilm, Sony, and DreamWorks, which used it to create effects like the dinosaurs in Jurassic Park. The program served as Pixar’s main source of revenue during the company’s early years. As of 2005, it had developed special effects for 100 films, and 44 of the last 47 movies that won the Oscar in visual effects had used RenderMan. In 2001, Catmull, along with two other Pixar scientists, won an Oscar for RenderMan and its advancements to the field of motion picture rendering. Marionette, the primary software tool for Pixar animators, was designed specifically for character animation and articulation, compared with other animation software that was designed to address product design and special effects. Ringmaster was a production management system used to track internal projects and served as the overarching system to coordinate and sequence the animation, tracking the vast amount of data employed in a three-dimensional animated film.

Saturday, October 26, 2019

Drugs in United States Essay -- Drug Trafficking Drugs Essays

Drugs in United States Drugs are a complex problem with widespread political, economic and social implications for producing, transit, and consumer nations. In the area of foreign policy, political and economic instability in drug producing areas around the world-and particularly in Latin America is an epidemic that cannot be ignored. The objective of this paper is to asses the past issues, current status, and future prospects of the US war on drugs in Latin America - specifically Panama. It begins with a brief overview of the basic problems of drug use in America, and examines how the United States has handled the specific situation of General Noriega and the Panamanians. Finally, I will examine an array of policy options presently available to the United States in its campaign against drug trafficking in Panama and other Latin American countries. During the late 1980's, the presence of narcotics trafficking in the world grew rapidly. Many claimed that the United States was facing a national security crisis as far as drugs were concerned. In 1988, as may as 75 percent of more criminals arrested in major American cities tested positive for drugs[1]. A Justice Department study backs up this allegation finding that one-half to three-quarters of the men arrested for serious crimes in 12 major cities tested positive for the recent use of illegal drugs whereas a similar study done four years prior showed that only 56 percent of those arrested for serious crimes were abusing drugs prior to their arrest[2]. In addition, out of 1.2 million intravenous drug users in America, 250,000 of them are infected with AIDS. It was estimated that the cost of drugs to American society measured in terms of death, illness, crime, lost ... ...ngton, D.D. (30 September) [11] Sciolino, E. & Endelberg (1988) ?Narcotics Effort Failed by US Security Goals.? New York Times (April 10th): Y [12] Sciolino, E. & Endelberg (1988) ?Narcotics Effort Failed by US Security Goals.? New York Times (April 10th): Y [13] ?Columbia and the War on Drugs.? Foreign Affairs, 67, 1 (Fall) 70-92. (1988) [14]? Drugs, Law Enforcement, and Foreign Policy: Panama? Hearings before the Subcommittee on Terrorism, Narcotics and International Communications of the Committee on Foreign Relations United States [15] Sciolino, E. & Endelberg (1988) ?Narcotics Effort Failed by US Security Goals.? New York Times (April 10th): Y [16] Moss, A. (1988) ?Drugs and Politics in Panama.? Paper prepared for the ?Drug Trafficking in the Americas? Conference. The Wilson Center, Smithsonian Institute, Washington, D.D. (30 September)

Thursday, October 24, 2019

Feinberg

Feinberg’s Theory of Freedom and Rights The exact meaning of â€Å"freedom† is often misunderstood due to the many meanings the word has taken on. When a man was labeled â€Å"free† decades ago, it was to distinguish if you were simply talking about his legal rights or the characteristics his status. If someone tells you now-a-days that they are â€Å"free† it now poses the problem of not knowing exactly what they are free from. Is the man free from debt, from his country’s government or from his sins? We will not know until more information is given to us.We just know he is free from something that was constraining. Feinberg draws a tie between constraints and desires which lead him to the conclusion that freedom is unsatisfied when constrains stand in the way of our desires. When this happens, our reaction is frustration, which is considered unhappiness. With that idea, having freedom would conclude that the person was considered happy. This may s eem far- fetched but drawn up thoroughly by Feinberg. The idea of being happy when having freedom is board.We need to figure out what kind of freedom is being awarded. There is positive and negative freedom. But watch out, the names are misleading. Positive doesn’t always mean â€Å"great† or â€Å"pleasant† in this case and negative freedom doesn’t necessarily meaning â€Å"awful† or â€Å"appalling. † On top of â€Å"positive† and â€Å"negative† constraints being factors in the definition of a person’s freedom, we also have to look at the source of the constraint. It can either be external or internal meaning the source is coming from an outside source or within you.A great definition was stated in Feinberg’s article â€Å"If the distinction between internal and external is to be put to political use, perhaps the simplest way of making it is by means of merely spatial criterion: external constraints are those that come from outside a person’s body-cum-mind, and all other constraints. † (p. 13) With the idea of external and internal constraints brought into the picture, we now have a pool of constraints to choose from. Positive external, negative internal are just a few examples.Positive now means â€Å"addition or adding something on,† whereas negative means â€Å"taking away or lack of. † An example of an internal positive constraint would be a headache whereas an external positive constraint would be a lock door. An example of an internal negative constraint would be ignorance whereas an external negative constraint would be a lack of money. Once we can see that there are different types of constraints, there is no real reason to speak of the two different types of freedom.The reason there is no longer a need to discriminate is that if nothing prevents me from doing something, I am free to do something conversely, I am free to do something then nothing preven ts me from doing something. Feinberg’s idea of â€Å"human rights† was they were sometimes understood to be ideal rights, sometimes conscientious rights and sometimes both. They are considered moral rights due to the fact that each person held them equally, unconditionally. He doesn’t suggest the rights are moral by definition and leaves that up for argument but does admit that there is a possibility that human rights don’t even exists.

Wednesday, October 23, 2019

How Do People Fall into Debt? Essay

Debt in society is an overwhelming stress factor for many individuals and families. I know that I am one of those individuals and have been for years now. I made a lot of stupid mistakes when I was younger and now that I have a family, it unfortunately is effecting me still today. So how do people fall into debt? There are several contributors like job loss, family, illnesses, poor judgment and management. I will go over effects and consequences, solutions, and prevention people go through and what steps to take to avoid and take control of your debt. Effects and consequences of being in debt can be a long term and severe issue for an individual or family. This can cause an individual to become very depressed and pick up on drinking or may possibly start using drugs because they feel they have no other way to cope with it. You find yourself living paycheck to paycheck because your weekly budget no longer exists and your credit is maxed where no other funds become available. As things get tighter, the ability to keep paying decreases and more debt increases. It could become so severe that it may affect your personal relationships with family, friends and significant other where your family no longer wants to associate with you. This could be because you are always begging for money or your problems are too much for your family to handle. Your significant other may not be able to handle the issue either because it is just as a heavy burden on him or her as it is on yourself. Effects and consequences of not being able to pay your debt is you start losing things. Your house can be foreclosed on, cars repossessed and extracurricular things like boats and recreational vehicles can be taken away. You can get your wages garnished if you have defaulted on certain loans, or even go into tax collection for not paying your property taxes. When and if you can start getting out of the red and into the black, your credit score could be highly effected and will prevent you from getting any new credit loans. Certain employers run credit checks and if you do not clear their standards, you can lose your job or it can affect any future  employment. Solutions can be created to help you get back on your feet and become debt free. It certainly is not an overnight fix and will take some time possibly. One suggestion is to attend a consumer credit counseling class. This is where a counselor can sit down with you and review all of your debt. They will help you set up a budget and work on decreasing your debt over time. They also suggest seminars and workshops that can better educate you on managing your money and debt. You can find a local counselor through the yellow pages or online. Another approach is bankruptcy which is more severe but necessary to clearing your plate and getting a new start. It takes a total of 7 to 10 years to fully have this removed off your credit but if you are willing to wait and can mentally handle what this entails, you should consider this option. Any local attorney with specialty in bankruptcy can review your debt and help finalize. If you have retirement accounts, savings accounts, bonds, life insurance you can close these out and apply the money to your debt. If you have family that is willing to help, you may be able to obtain a small loan from them and pay them back after the debt is gone if they can wait that long. Obtaining more loans through an actually financial institution is not a solution I find to be a smart one. This will cause more debt and more issues down the road. If you have to, sell off items that are paid off in full to help. It is something no one wants to do but sometimes you have to give a little to get a little. Once you have eliminate some of your debt by the suggestions above and preventing yourself from falling back into debt, is to start a savings account and put so much in it a week. Over time this will add up that you have a significant amount set aside in case there is a job loss, family, illnesses, poor judgment and management. Instead of buying the most expensive items, look for bargains or off brands. Biggest suggestion is set a monthly budget so you have a clear outlook of what will be spent and what is left over. I certainly can say when I was younger my greediness of getting things I wanted and not thinking of the outcome overtook my clear decision making. At an early age you don’t really think of what it will do to you in the future and to your family. I have done credit counseling and I can say it has been an effective and positive experience for me. In order to stay out of debt you really have to want to try and stick to it. It will require a lot of willpower and change in your spending habits. I am still today trying to get myself out of this hole I dug myself into and I take it one day at a time. It is a known fact that our society is in debt from all the news we hear every day on television, radio or read in the newspapers. There are some people that will try, won’t try and some that just can’t do it. Everyone needs to think about the future of your children and what you want to leave them when you are gone. Considering the consequences and ask yourself is it worth the long term repayment? Do I really need to take that much? Can I buy that somewhere else at a better price? Taking the time and researching things you are potentially buying will help you in the long run. If you or a family member are subject to a job loss, family issues, illnesses, poor judgment and management; contact your debtors and explain the situation. Find out your options instead of ignoring the issue. A lot of companies have deferment payments for 6 months or so. There is help out there it’s just a matter how people want to stay out of debt or fall into it.

Tuesday, October 22, 2019

How to Use Material Safety Data Sheets (MSDS)

How to Use Material Safety Data Sheets (MSDS) A Material Safety Data Sheet (MSDS) is a written document that provides product users and emergency personnel with information and procedures needed for handling and working with chemicals. MSDSs have been around, in one form or another, since the time of the ancient Egyptians. Although MSDS formats vary somewhat between countries and authors (an international MSDS format is documented in ANSI Standard Z400.1-1993), they generally outline the physical and chemical properties of the product, describe potential hazards associated with the substance (health, storage cautions, flammability, radioactivity, reactivity, etc.), prescribe emergency actions, and often include manufacturer identification, address, MSDS date, and emergency phone numbers. Key Takeaways: Material Safety Data Sheet (MSDS) A Material Safety Data Sheet or is a summary of the key properties of a substance and the hazards associated with its use.Material Safety Data sheets are not standardized, so its important to consult one provided by a respected source.Two chemicals that have the same name may have very different MSDS sheets because the particle size of the product and its purity may significantly affect its properties.MSDS sheets should be kept in an easy-to-find location and made accessible to all persons dealing with chemicals. Why Should I Care About a MSDS? Although MSDSs are targeted at workplaces and emergency personnel, any consumer can benefit from having important product information available. An MSDS provides information about proper storage of a substance, first aid, spill response, safe disposal, toxicity, flammability, and additional useful material. MSDSs are not limited to reagents used for chemistry, but are provided for most substances, including common household products such as cleaners, gasoline, pesticides, certain foods, drugs, and office and school supplies. Familiarity with MSDSs allows for precautions to be taken for potentially dangerous products; seemingly safe products may be found to contain unforeseen hazards. Where Do I Find Material Safety Data Sheets? In many countries, employers are required to maintain MSDSs for their workers, so a good place to locate MSDSs is on the job. Also, some products intended for consumer use are sold with MSDSs enclosed. College and university chemistry departments will maintain MSDSs on many chemicals. However, if you are reading this article online then you have easy access to thousands of MSDSs via the internet. There are links to MSDS databases from this site. Many companies have MSDSs for their products available online via their websites. Since the point of an MSDS is to make hazard information available to consumers and since copyrights dont tend to apply to restrict distribution, MSDS are widely available. Certain MSDSs, such as those for drugs, may be more difficult to obtain, but are still available upon request. To locate an MSDS for a product you will need to know its name. Alternate names for chemicals are often provided on the MSDS, but there is no standardized naming of substances. The  chemical name  or  specific name  is used most often to find MSDSs for health effects and protective measures.  IUPAC  (International Union of Pure and Applied Chemistry) conventions are used more often than  common names.  Synonyms  are often listed on MSDSs.The  molecular formula  may be used to locate a chemical of known composition.You can usually search  for substance using  its  CAS (Chemical Abstracts Service)  registry number.  Different chemicals  may have the same name, but each will have its own CAS number.Sometimes the easiest way to locate a product is to search by  manufacturer.Products may be found using their  US Defense Department NSN. A National Supply Number is a four-digit FSC class code number plus a nine-digit National Item Identification Number or NIIN.A  trade name  or  product name  is the brand, commercial, or marketing name the manufacturer gives the product. It does not specify what chemicals are in the pr oduct or whether the product is a mixture of chemicals or a single chemical. A  generic name  or  chemical family name  describes a group of chemicals with related physical and chemical properties. Sometimes an MSDS will list only the generic name of a product, although in most countries laws require that chemical names also be listed. How Do I Use a MSDS? An MSDS might appear to be intimidating and technical, but the information is not intended to be difficult to understand. You might simply scan an MSDS to see if any warnings or hazards are delineated. If the content is difficult to understand there are online MSDS glossaries to help define any unfamiliar words and often contact information for further explanations. Ideally you would read an MSDS before obtaining a product so that you could prepare proper storage and handling. More often, MSDSs are read after a product is purchased. In this case, you can scan the MSDS for any safety precautions, health effects, storage cautions, or disposal instructions. MSDSs often list symptoms that might indicate exposure to the product. An MSDS is an excellent resource to consult when a product has been spilled or a person has been exposed to the product (ingested, inhaled, spilled on skin). The instructions on an MSDS do not replace those of a health care professional, but can be helpful emergen cy situations. When consulting an MSDS, keep in mind that few substances are pure forms of molecules, so the content of an MSDS will depend on the manufacturer. In other words, two MSDSs for the same chemical may contain different information, depending on the impurities of the substance or the method used in its preparation. Important Information Material Safety Data Sheets are not created equal. Theoretically, MSDSs can be written by pretty much anyone (although there is some liability involved), so the information is only as accurate as the authors references and understanding of the data. According to a 1997 study by OSHA one expert panel review established that only 11% of the MSDSs were found to be accurate in all of the following four areas: health effects, first aid, personal protective equipment, and exposure limits. Further, the  health effects  data on the MSDSs frequently are incomplete and the chronic data are often incorrect or less complete than the acute data. This doesnt mean that MSDSs are useless, but it does indicate that information needs to be used with caution and that MSDSs should be obtained from trustworthy and reliable sources. The bottom line: Respect the chemicals you use. Know their hazards and plan your response to an emergency before it happens!

Monday, October 21, 2019

Essay Sample on the American Revolution and the Independence form Great Britain

Essay Sample on the American Revolution and the Independence form Great Britain America’s decision to declare independence form Great Britain was both due the change of economic policies and to the development of refining life and liberty. After driving the French out, with help from the Indians and British troops, colonist began to quarrel with Parliament’s insistence of testing the limits of their power in North America. Their control was made difficult when residents decided to smuggle and boycott goods. Eventually, the colonies resistance and loss of patience would lead them directly to independence. The Proclamation of 1763 was the first to anger the colonist. In order to assure the Indians that settlers would not invade tribal lands, Britain emphasized colonist not to expand to the westward region. Shortly after, the use of writs of assistance, which allowed customs to search anywhere without the used of a warrant, placed a major infringement upon colonial natural rights. The Sugar Act (established at the same time) was an attempt to discourage smuggling by lowering the price of molasses below smugglers cost. It also stated that exports could only go through British ports before being sold to foreign countries. When merchants were accused of smuggling, they faced a jury-less trial and were often convicted. Violators of the Stamp Act of 1765 also faced the same when they did not buy special watermarked paper for newspapers and all legal documents. Because the Stamp Act was an internal tax on the colonies, it motivated the first actual structured response to British impositions. Violence eventually broke throughout the colonies, forming such colonial groups as the Loyal Nine and the Sons of Liberty to organize the resistance and assemble the citizens in attempts to stress Parliament to revoke the act. Because of the overwhelming protest of businessmen (and the forced evacuation of stamp distributors), Britain’s economy was severely damaged and they were forced to cancel the act. However it was not long before Parliament tugged on the strings of the colonist again. The Quartering Act of 1765 demanded colonial assemblies to pay for supplies for troops residing within their colonies. The act did not affect much of the colonies except New York. New York at the time had a significant amount of troops stationed and refused to comply with the law. Parliament in returned threatened to nullify all laws passed by the New York colonial legislature, taking away what self-government they had. To avoid more hardships, New York decided to obey Parliament. Finally, the colonies bit their last lip when a man named Charles Townshend assumed the duties of Britain’s treasurer. Britain’s House of Commons decided to cut their taxes by one-fourth and proposed to make up for the loss by passing the Revenue Act of 1767. Townshend drew a plan that put taxes on glass, lead, paint, paper, and tea entering the colonies. Though it only raised 37,000 pounds, compare to the 500,000 pound pay cut in the treasury department, Townshend duties was very effective in arousing political dispute that had laid inactive since the withdraw of the Stamp Act. The revolution was growing strong and would finally be established after an incident in Boston in 1770. Because of continued violence in Massachusetts, British troops were brought in towards the end of 1768 to relieve tension. Ironically, situations grew worse and the troops were very unwelcomed by the colonist. The colonist felt as if rights were under the watchful eye of the king. In 1770 and irritated customs officer shot an eleven year-old boy for throwing rocks at his house. Though the troops were not responsible for the shooting, they were usually under fire for hostility toward British power. After the boy’s funeral, violence erupted outside Boston’s custom office, and after the conflict, five colonists were dead. The news spread through the colonies as the Boson Massacre. To cool down the hostility of the colonist, the Townshend duties were soon erased. Despite the fact that the British were deciding to pursue less controversial policies, colonist could no longer bare the abuse of their rights that Britain trampled on. They were soon to be democratic nation and were tired of supporting an empire center around monarchy. Every colony united and rebelled against is abusive mother country, creating the American Revolution. You can order a custom essay, term paper, research paper, thesis or dissertation on American Revolution from our professional custom essay writing service which provides students with high-quality custom written papers.

Sunday, October 20, 2019

The History of 7UP and Charles Leiper Grigg

The History of 7UP and Charles Leiper Grigg Charles Leiper Grigg was born in 1868 in Prices Branch, Missouri. As an adult, Grigg moved to St. Louis and started working in advertising and sales, where he was introduced to the carbonated beverage business. How Charles Leiper Grigg Developed 7UP By 1919, Grigg was working for a manufacturing company owned by Vess Jones. It was there that Grigg invented and marketed his first soft drink, an orange-flavored drink called Whistle for a firm owned by Vess Jones. After a dispute with management, Charles Leiper Grigg quit his job (giving away Whistle) and started working for the ​Warner Jenkinson Company, developing flavoring agents for soft drinks. Grigg then invented his second soft drink called Howdy. When he eventually moved on from ​Warner Jenkinson Co., he took his soft drink Howdy with him. Together with financier Edmund G. Ridgway, Grigg went on to form the Howdy Company. So far, Grigg had invented two orange-flavored soft drinks. But his soft drinks struggled against the king of all orange pop drinks, Orange Crush. But he couldnt compete  as Orange Crush grew to dominate the market for orange sodas. Charles Leiper Grigg decided to focus on lemon-lime flavors. By October of 1929, he had invented a new drink called, Bib-Label Lithiated Lemon-Lime Sodas.  The name was quickly changed to 7Up Lithiated Lemon Soda and then again changed to just plain 7Up in 1936. Grigg died in 1940 at the age of 71 in St. Louis, Missouri, survived by his wife, Lucy E. Alexander Grigg. Lithium in 7UP The original formulation contained lithium citrate, which was used in various patent medicines at the times for improving moods. It has been used for many decades to treat manic-depression. It was popular to go to lithium-containing springs such as Lithia Springs, Georgia or Ashland, Oregon for this effect. Lithium is one of the elements with an atomic number of seven, which some have proposed as a theory for why 7UP has its name.  Grigg never explained the name, but he did promote 7UP as having effects on mood. Because it debuted at the time of the stock market crash of 1929 and the onset of the Great Depression, this was a selling point. The reference to lithia remained in the name until 1936.  Lithium citrate was removed from 7UP in 1948 when the government banned its use in soft drinks. Other problematic ingredients included calcium disodium EDTA which was removed in 2006, and at that time potassium citrate replaced sodium citrate to lower the sodium content. The company website notes that it contains no fruit juice. 7UP Goes on Westinghouse took over 7UP in 1969. It then was sold to Philip Morris in 1978, a marriage of soft drinks and tobacco. The investment firm Hicks Haas bought it in 1986. 7UP merged with Dr. Pepper  in 1988. Now a combined company, it was bought by Cadbury Schweppes in 1995, a more likely marriage of chocolates and soft drinks. That company spun off the Dr. Pepper Snapple Group in 2008.

Saturday, October 19, 2019

Salem Witch Trials Research Paper Example | Topics and Well Written Essays - 1500 words

Salem Witch Trials - Research Paper Example The outcome was sure but not short. The female convict often with her baby, were put to hellish inferno till their last breath. The following paper highlights those torments that the women had endured in the background of Salem Witch Trials. Witchcraft and black magic had always cast deep horror and doubt among human beings, belonging to different strata and countries of the world. Anything that apparently unexplainable through common sense or substantial investigation had either been termed as divine or evil. In this battle of two extremities the later often gained much weight out of the fear of the common people. Like other countries of the world United States of America (USA) was no exception regarding its attitude towards witchcraft and subsequent steps and trials that had been taken against the same. Among them Salem Witch Trial might be considered as the most significant that had paved a new angle to that atrocity. Marilynne K. Roach describes Salem witch trials as â€Å"one o f the American history’s favorite stereotypes of intolerance and superstition, a tragedy with popular associations of magical evil and Halloween jokes† (Roach, 2004, p.xv). ... 59). As time passed by, the colony admitted to the fact that the results of the trials were mistakenly interpreted and the convicted families were compensated accordingly. The shadow casting of the trials brings with it the essence of paranoia and injustice within the quintessence of the populace of the later times. Boiling down to a pinpoint inspection it can be inferred that the victims were women and they faced the evil consequences. Varied ideas are associated with the Salem witch trials like the outgrowth of conflicts among the merchant and trading class alone with the disposition of the Puritanical doctrine. Again this paper will drive its omnipotent focus on the role of the women and their perils in the society of that at the background the periphery of Salem Witch Trials. The Salem Witch trials highlighted the fact that the colonial New England was subject to subordination along with immense oppression towards women of any age and that often came behind the veil of superstiti on as a justification of those heinous offenses. Disintegrated into a prosperous town and a farming village the inhabitants of the Salem village were basically in a dilemma to seek either ecclesiastical or political independence from the town. In 1689, after winning the rights of establishing their own church, the villagers had chosen the monk Samuel Parris as their minister who was a merchant before adopting priestly hood. Parris’s perturbed exploitative mechanism of appropriation led to the generation of rigorous friction amongst the inhabitants and that eventually resulted in termination of salary contribution in October 1691. In 1685, King James II's

Friday, October 18, 2019

Evaluate Legislators in Manassas, Virginia (United States) Essay

Evaluate Legislators in Manassas, Virginia (United States) - Essay Example He stated that he tends to be one of those people who get very passionate about issues, and he is not afraid to stand up and speak. Herring stated that the reason why he had voted against the original transportation package because it shifted most of the responsibility off of the state legislature and onto the local governments. He thought that the original bill is unworkable. He stated further that the local government is really a prerequisite for serving in the General Assembly. Herring ran on a platform of focusing on the three issues: transportation, education and managed growth. Sandy Sullivan, president of the Loudoun Education Association, who endorsed Herring this year, worked on Herring's campaign two years ago. Herring got funding for the projects on his list and delivering results to the citizens.Herring vowed that he will focus not only on finding funding for new projects, but ensuring that the money already allocated for specific roads stays there. Herring said illegal immigration has been a concern of some citizens. Herring said he has worked on two pieces of legislation that would help address the issue of illegal immigration and public safety. ... The first would require courts to check citizenship status of everyone arrested for a felony and withhold bail from those in the country illegally. He reasoned that if a felon is an illegal immigrant, then he is a flight risk. The second measure would make consequences tougher for businesses that are not following the employment laws. Herring believes in a good and quality education for the young people of Virginia. He also wants to make sure that the local schools are retaining quality teachers year after year. Herring worked on legislation that will give grants to Virginians who graduated from a local community college and want to transfer to a Virginia university. Herring's dedication to education is total. The Loudoun Education Association has acknowledged his support. His motivation for becoming a legislator was the same as his motivation for becoming a lawyer. He said that helping people solve their problems motivates him as a legislator. Senator Herring fought hard to repeal the abusive driver fees. Then he therefore, co-sponsored Senate Bill 1. Senate Bill 1 is a bill which would not only repeal the abusive driver fees but it would also refund with interest any fees that drivers have already paid. The hated abusive driver fees were the wrong approach to trying to solve the transportation problems of Virginia. The consequent impact studies on the abusive driver fees have shown they have not been effective at deterring bad driving behavior. Herring aims to continue to work with other members to try to find ways to improve the transportation funding package. To help restore the public trust in the land use process, he introduced a

Industrial Relations Integrated Project (Human resource) Essay

Industrial Relations Integrated Project (Human resource) - Essay Example The report then gives recommendations that could be applied to improve industrial relations especially in the context of employee disciplinary policies and termination of employee services. Danway electrical and mechanical engineering has been in the engineering industry since 1976, the firm provides engineering services in a variety of professional in engineering, industrial and construction sectors. The company offers a variety of engineering services ranging from mechanical, electrical and instrumentation works. The company also offers quality services in infrastructure construction, maintenance and upgrade, and is involved in projects from designing to completion of quality structures (Danway, n.d). Danway guarantees the delivery of high quality services to client, a mission they have achieved enabled by a highly skilled staff, effective project management that ensures timely completion of projects while still ensuring the safety during and after the project. Projects are very la bor intensive; require the coordination of professional engineers, architects, project managers, skilled and semiskilled workers participating in planning and erection of projects. There is need for precision in attending to the projects and constructions since errors in this field would be fatal for users of any faulty facilities put up. To achieve this there are a set of policies and procedures set up to monitor activities within the company. Usually the adherence to these regulations is closely monitored by operations manager and the human resource manager. Importance of discipline procedures Operations in every organization are governed by a set of guidelines and policies to ensure efficient delivery of quality products and services. Jex and Britt (2008), show the need to establish a code of conduct which creates a favorable environment for performance of duties for both the employee and the employer. The employer through the coordination of the human resource manager and the op erations manager has the responsibility of constant and timely communication with their employees. It is essential to keep them updated on their responsibilities, for motivation and correction whenever duties are not well attended. It is the responsibility of every manager to ensure that both the employer and the employee understand the rules on which the organization runs. Ambiguous rules are often subject to misinterpretations and can cause a great difference between the parties involved (Jex and Britt 2008). To achieve this every organization has a set of disciplinary policies which guide operations of human resources in factory operations. These policies are well communicated by the human resource management (Bjorkman and Stahl 2006). It is important for every employer to establish good disciplinary policies for their organization. These are meant to ensure efficiency in operations while still protecting the rights of the employee. With the knowledge of their duties and proper c ode of conduct expected from them, employees are expected to responsibly perform duties and deliver in their positions with precision to ensure the achievement of the organization’s mission and vision. According to Bates (2002), a good disciplinary

Thursday, October 17, 2019

Calligraphy Box with Design of Autumn Flowers and Grasses under the Essay

Calligraphy Box with Design of Autumn Flowers and Grasses under the Sun and the Moon by Igarashi Doho from 17th century Japan - Essay Example Such artwork was unique to the dominant class of the Japanese society, although there was a difference in popularity of different art types. Art from the Edo era, as the writing box by Igarashi, comprised of several themes and styles of art, which resulted in the era being categorized as the revival era of Japanese art. Doho’s calligraphy box, as a piece of art, captures three traits of the Japanese society in the periods leading to the 17th century; religion, wealth and power, and education. The calligraphy box is popular for a number of reasons. Considering the age in which the box was crafted, the level of detail and its intricacy is indicative of developed art in the Japanese culture. The detailing on the wood and incorporation of gold and metal facilitates the development of a unique art form that appears modern as well as complex. There is awe in the artisanship employed in the decorations on the box, which suggest considerable time spent on the development of the artifact. The art could only be achievable in the presence of history and a structured discipline in where artistic skill used in the art was taught. Furthermore, the degree of preservation, considering the age of the art, is one of a civilization that incorporated science into its daily norms. Religion has a huge impact in the calligraphy box, as well as the techniques used in the artisanship. The Early Heian art, which was introduced by Buddhist priest Kukai, influenced the development of Japanese art. One of the attributes that was derived from the religion was the use of gold in art. The calligraphy box appears as having a golden cover to the wood, which is characteristic of the Heian period (Brinkley 26). The E-maki (last Heian) period further imposes the impact of religion on art, as the development of picture scrolls was introduced, with emphasis on the liveliness of the colors used as well as the narration incorporated in the art. Following the

Interstate Banking Essay Example | Topics and Well Written Essays - 500 words

Interstate Banking - Essay Example Economies of scale are realized since loan activity is increased with the merging of assets brought about by expanded business in different states. Another advantage to interstate banking is the convenience it offers to its clients. With interstate banking, more branches are within the reach of the clients (Berry, 2011). The flow of bank activities are easily facilitated which makes it easier for the clients to do business. A smooth flow in bank activities may result in increased revenues because of the ease in doing business. Interstate banking makes it possible for banks to offer a wider range of banking services to its clients because of the interstate acquisitions and branches (Berry, 2011). Some of these services include more ATMs, electronic banking options and varied loan products. Financial security and stability is one of the major off-shoots of interstate banking. Since banking consolidation is allowed provided that the capital requirements are met, this means that the resources of the banks increase, making it more stable and secure. The liquidity and solvency of the banks improve with interstate banking. Bank clients benefit the most from interstate banking. The increased competition brought about by interstate banking makes banks think of strategies to capture a bigger market; thus, improving their services and developing new products which are attractive to the clients. Aside from bank clients, banks also benefit from interstate banking. Operating costs are greatly reduced as the bank subsidiaries are converted to bank branches. Geographic diversification will help improve the risk-return opportunities of banks (United States General Accounting Office, 1995). The most likely loser in interstate banking is the Federal Reserve (Berger & Humphrey, 1988). Since there will be an improvement in the efficiency of the payment system, multiple bank payments will decrease because most checks will be

Wednesday, October 16, 2019

Calligraphy Box with Design of Autumn Flowers and Grasses under the Essay

Calligraphy Box with Design of Autumn Flowers and Grasses under the Sun and the Moon by Igarashi Doho from 17th century Japan - Essay Example Such artwork was unique to the dominant class of the Japanese society, although there was a difference in popularity of different art types. Art from the Edo era, as the writing box by Igarashi, comprised of several themes and styles of art, which resulted in the era being categorized as the revival era of Japanese art. Doho’s calligraphy box, as a piece of art, captures three traits of the Japanese society in the periods leading to the 17th century; religion, wealth and power, and education. The calligraphy box is popular for a number of reasons. Considering the age in which the box was crafted, the level of detail and its intricacy is indicative of developed art in the Japanese culture. The detailing on the wood and incorporation of gold and metal facilitates the development of a unique art form that appears modern as well as complex. There is awe in the artisanship employed in the decorations on the box, which suggest considerable time spent on the development of the artifact. The art could only be achievable in the presence of history and a structured discipline in where artistic skill used in the art was taught. Furthermore, the degree of preservation, considering the age of the art, is one of a civilization that incorporated science into its daily norms. Religion has a huge impact in the calligraphy box, as well as the techniques used in the artisanship. The Early Heian art, which was introduced by Buddhist priest Kukai, influenced the development of Japanese art. One of the attributes that was derived from the religion was the use of gold in art. The calligraphy box appears as having a golden cover to the wood, which is characteristic of the Heian period (Brinkley 26). The E-maki (last Heian) period further imposes the impact of religion on art, as the development of picture scrolls was introduced, with emphasis on the liveliness of the colors used as well as the narration incorporated in the art. Following the

Tuesday, October 15, 2019

Living Together Before Marriage. A Good Idea Research Paper

Living Together Before Marriage. A Good Idea - Research Paper Example The paper explains why staying together before marriage is a good compatibility test. It   goes a bit further to explain it’s importance of testing the commitment level of couples before marriage. Short explanations are also stated in regards clarify beliefs of couples who during ttheir younger years their parents went through horrific divorce and left a negative dent pertaining to marriage. the paper will also explain the importance of staying together before marriage as a means of helping couples whose former relationships have been horrible and try and baby step them to overcome this past experience by staying together first. As the discussion highlights staying together before marriage is beneficial to love birds because it will help them   know if they are compatible. Compatibility saves couples from messy and brutal divorce that they have to go through if their marriage is not working. Staying together acts as a litmus test to deduce if the two lovers can stay together. Their commitment will be evident if they manage to solve   problems within a period of time, if not then its best for them to call it quits since this will save them litigation money, embarrassment and despair   that divorcing couples usually go through. Bill Maier, PH.D states â€Å" Living together is a good way to find out if couples are compatible-a sort of test drive that will determine your chances of marital success.†

Monday, October 14, 2019

Characteristics of Good Test Questions Essay Example for Free

Characteristics of Good Test Questions Essay Here is the list of characteristics that you should follow when either writing or selecting interpretive exercise questions for use in Stage 2 of any curriculum planning. Examples of these characteristics and why they are important will be discussed in class. Interpretive exercise questions consist of a series of selective response items based on a common set of introductory material. The introductory material may be in the form of written materials, tables, charts, graphs, maps or pictures. These questions are the hardest to write, because you have to find novel introductory material related to your unit of instruction that works and is important. The reason for including this type of question in a unit test is that it gives students practice answering this type of question which is often used on standardized tests in science. Advantages: 1. Measure the ability to interpret the introductory material encountered in everyday situations. 2. Measure more complex learning outcomes than is possible with other forms of selected response items. 3. Minimizes the influence of a students’ lack of needed factual information on measurement of complex learning outcomes. 4. Greater structure than essay test. 5. A question type used in standardized tests. Students need to be familiar with this question type. Limitations: 1. Hard to construct: find materials that are new (novel) but relevant. Usually needs some editing. 2. Heavier demand on students’ reading skill. Keep reading level low, passage brief. In primary grades use more pictorial materials. 3. Cannot measure students’ overall approach to problem solving (doesn’t show work steps). 4. Only test problem-solving ability at the recognition level. Interpretive Exercise Guidelines: 1. Select introductory material that is in harmony with course outcomes. 2. Select introductory material that is appropriate to the curricular experience and reading level of the student. 3. Select introductory material that is new (novel) to the student. 4. Use introductory material that is brief, but meaningful. 5. Revise introductory material for clarity and conciseness for greater value. 6. Construct test items that require analysis and interpretation of the introductory material. 7. Make the number of test items roughly proportional to the length of the introductory material. 8. When constructing the test items use the guidelines given in the writing of selective response items.

Sunday, October 13, 2019

Integration of WLANS, PAN, LAN and GSM in Hmanets

Integration of WLANS, PAN, LAN and GSM in Hmanets INTERWORKING ISSUES IN INTEGRATION OF WLANS, PAN, LAN AND GSM IN HMANETS KEY TO SYMBOLS OR ABBREVIATIONS AP Access Points AMASS Architecture for Mobile Ad-hoc Systems and Services AODV Ad Hoc on Demand Distance Vector Routing BS Base Station BNEP Bluetooth Network Encapsulation Protocol CDMA Code-Division Multiple Access CGSR Cluster-head Gateway Switch Routing CSMA/CA Carrier Sense Multiple Access with Collision Avoidance CTS Clear to Send DBTMA Dual Tone Multiple Access DSDV Destination Sequenced Distance Vector Routing DSR Dynamic Source Routing GEO-TORA Geographical Temporally Ordered Routing Algorithm GPRS General Packet Radio Service GPS Global Positioning System GRDL Grid Resource Description Language GSM Global System for Mobile Communication HF High Frequency HMANET Heterogeneous Mobile Ad Hoc Network HOLSR Hierarchical Optimized Link State Routing IP Internet Protocol LBR Location Based Routing LLC Logical Link Control MAC Medium Access Control MACA Multi Hop Collision Avoidance MACAW Medium Access Protocol for Wireless LAN MAN Metropolitan Area Network MANET Mobile Ad Hoc Network MPR Multipoint Relays NAT Network Address Translation NFS Network File System OLSR Optimized Link State Routing OSI Open Systems Interconnection PDA Personal Digital Assistant QoS Quality of Service RREP Route Reply RREQ Route Request RERR Route Error SCTP Stream Control Transmission Protocol SDR Software-Defined Radio TBRPF Topology Broadcast Based on Reverse Path Forwarding TC Topology Control TCP Transmission Control Protocol TDMA Time Division Multiple Access TORA Temporally Ordered Routing Algorithm VHF Very High Frequency WAN Wide Area Network WLAN Wireless Local Area Networks WPAN Wireless Personal Area Network WSDL Web Services Description Language WSN Wireless Sensor Network ZRP Zone Routing Protocol Chapter 1 1 INTRODUCTION Recent developments in wireless communications have taken possible applications from simple voice services in early cellular networks to newer integrated data applications. IEEE 802.11 family i.e. Wireless Local Area Networks (WLANs) have become popular for allowing low cost data transmissions [1]. The most common and approachable places, such as airports, hotels, shopping places, university campuses and homes have been provided with WLAN Access Points (AP) which provide hotspot connectivity . The future advances in modern radios like Software-Defined Radio (SDR) and cognitive radio technologies will surely facilitate the need of multi-mode, multi-interface and multi-band communication devices. This heterogeneous networking paradigm will certainly enable a user to enjoy better service quality, ease of use and mobility, while keeping in view the application needs and types of available access networks e.g. cellular network, WLAN, wireless personal area network (WPAN) etc. 1.1 Mobile Ad hoc Networks The Mobile Ad hoc Network (MANET) is a network formed by mobile wireless hosts without (necessarily) using a pre-existing infrastructure and the routes between these hosts may potentially contain multiple communication hops [2]. The autonomous nature of participating mobile nodes enables MANETs to have dynamic and frequently changing network topology. The nodes are self-organizing and behave as routers. The ease and speed of deployment and decreased dependence on infrastructure have made ad hoc networks popular within very short span of time. MANET variations include Personal area networking (e.g. cell phone, laptop, ear phone), Military environments (e.g. soldiers, tanks, aircraft), Civilian environments (e.g. cab network, meeting rooms, sports stadiums), and foremost Emergency operations (e.g. search-and-rescue, policing and fire fighting). MANETs rapid deployment, ease of use and subsequent properties make them a hot choice for many important applications. 1.1.1 Resource Sharing One of the intended aspects of MANETs is that it will facilitate the sharing of resources. These include both technical and information resources. Technical resources like bandwidth, Quality of Service (QoS), computational power, storage capacity and information resources include any kind of data from databases. Resource sharing among mobile devices require the devices to agree on communication protocols without the existence of any dedicated servers. 1.1.2 Coordination System Mechanisms that enable the sharing of resources between different mobile devices, i.e. different coordination system is necessary for sharing dissimilar resources. Examples of such mechanisms are Samba, Network File System (NFS) for sharing disk space and the distributed dot net client for sharing processor cycles. 1.1.3 Trust Establishment Before nodes start sharing any resource, they demand a certain amount of trust between them or systems with which they share resources. The level of trust depends on the kind of information or resources that is to be shared. For instance, sharing processor cycles require less trust than the sharing of personal information. Similarly, sharing of profit-making or highly sensitive information can require another level of trust establishment. There are systems currently in operation that can provide a certain amount of trust like the public key infrastructure that makes use of certificates. 1.1.4 Node Discovery Before any node starts communicating with other node, that node must be discovered. When a node enters the network, it has to be capable of communicating to the other nodes about its capabilities e.g. it is a Personal Digital Assistant (PDA) and it has a camera, Global Positioning System (GPS) capabilities and Global System for Mobile Communication (GSM) capabilities etc. When a node is detected, other users can send a query to the new device to find out what it has to offer. Commercial service providers can advertise the resources they have to offer through Internet Protocol (IP) multicasts. There is a myriad of standards that include resource description protocols like Standards Grid Resource Description Language (GRDL), the Web Services Description Language (WSDL) for telling all offer devices a way to describe and publish their specific resources and needs. There are also various different systems currently available that can gather these resource descriptions and structure them for other devices to use. 1.1.5 Resource description For any device to be able to use any resource, a way to identify and describe the resource has to be agreed upon by all available devices. If, for instance, storage capacity is to be shared, it first has to be clear what the capacity of each device is, and, what the storage need is. Although there are techniques to describe certain resources but not one technique that is able to provide this service for all resources. The available techniques combined, however, cover most of what is needed. 1.2 MANET Classifications Mobile Ad hoc Networks are usually categorized as Homogeneous MANETs and Heterogeneous MANETs. 1.2.1 Homogeneous MANETs When MANETs operate in fully Symmetric Environment whereby all nodes posses identical capabilities in terms of battery, processing powers, responsibilities and hardware and software capabilities, thus having no diversity, the network is Homogenous MANET. 1.2.2 Heterogeneous MANETs In certain environments, mobile nodes may have asymmetric capabilities in terms of transmission ranges, Medium Access Control (MAC), battery life, processing powers, speed of movement and software variations etc. Mobility rate may also differ in ad hoc networks due to varying traffic characteristics, transmission ranges, reliability requirements and communication needs. Similarly, addressing and traffic flows like host-based addressing, content-based addressing or capability-based addressing patterns may be defined in certain scenarios; for example, people sitting at an airport lounge, metro taxi cabs, sportsmen playing and military movements etc Homogenous MANETs do not allow for the heterogeneity in the network, which is seriously required in many scenarios, for instance, in a military battlefield network, where soldiers usually carry light portable wireless devices and more powerful equipment like High Frequency (HF) or Very High Frequency (VHF) is installed on vehicles. So, heterogeneous mobile nodes may co-exist in a single ad hoc network making it a Heterogeneous MANET. 1.3 Criterion for Heterogeneous MANETs The integration of different communication networks like cellular networks, WLANs, and MANETs is not straightforward due to various communication scenarios, different interface capabilities and dynamic mobility patterns of mobile nodes. This exhibits many possible application scenarios where devices may unexpectedly interact, create and receive random data streams (video and music etc), or request different network services. The drawback is that each network type typically uses its own protocol stack especially in the case of medium access. In fact, frequency allocation becomes more complicated since different wireless technologies like IEEE 802.11 a and IEEE 802.15.4 may possibly operate in the same frequency band, which makes coexistence mechanisms increasingly important. A heterogeneous MANET paradigm needs to be capable of providing subsequent characteristics. 1.3.1 Transparency The network should be capable of providing seamless end-to-end communication among mobile nodes i.e. the MANET user must not be informed about the route followed or network interfaces traversed by a communication session [3]. 1.3.2 Mobility Integration among dissimilar communication networks must facilitate mobile nodes via some mobility management framework that can manage flow of information through different medium access techniques [4]. 1.3.3 Addressing Most of the IP based networks consider each communication interface as an independent network device running under its own protocol stack [5]. However, this mechanism makes it difficult to remember destinations by IP addresses. So, there must be some mechanism similar to domain name service to recognize mobile nodes with more logical and easy to remember names. 1.3.4 Configuration Various configuration options like network ID, willingness for cooperative communications, desired mobility level and intended services shall be provided to mobile users for their convenience [6]. 1.3.5 End to End security Integration between various networks and data transfer over multiple wireless hops can even expose data to malicious nodes. Security mechanisms must take care of end-to-end data security as well as route security [7]. 1.3.6 Transmission Power and interference of Nodes MANET routing protocols must take care of issues arising due to various communication ranges like communication gray zones [4] and issues arising because of various communication technologies like Bluetooth and WLAN working in same frequency band [1]. 1.3.7 Utilization of Resources In heterogeneous networking paradigm, there may arise situations where some or most of the mobile nodes are installed with different kind of resources. For example, there may be some nodes installed with location monitoring devices like GPS. Now it is the responsibility of routing protocol to benefit from such capabilities in order to facilitate location aided routing and similar services [8]. 1.4 Problem Statement Current research efforts in mobile ad hoc networks are mainly converging towards inclusion of dissimilar communication technologies like IEEE 802.11 [9] and IEEE 802.15.4 [10] to a single mobile ad hoc network. Integrations of different networks like Wide Area Networks WANs (1G, 2G, 2.5G, 3G) and Metropolitan Area Networks MANs (IEEE 802.16) wherein users can access the system through a fixed base station (BS) or AP connected to a wired infrastructure in single hop fashion are also extending towards multihop communication environment using the new and revolutionary paradigm of a mobile ad hoc networks (MANETs), in which nodes constituting MANET serve as routers. Comprehensive research efforts have been done to address the issues related to infrastructure-less multihop communications among nodes installed with dissimilar communication capabilities [3, 11, 12, 13]. However, an investigation needs to be made in order to analyze and address the issues arising from such integrations. Such problems relate to both end users convenience (For example, remembering each destination with its IP address is a cumbersome job specially when every destination may carry multiple IP addresses and any communication interface may optionally be connected or disconnected) as well as networks performance; for example, routing to the best possible interface when there are multiple interfaces installed at destination. Likewise, optimized neighborhood sensing and position based routing can help to improve heterogeneous ad hoc networks performance and scalability. 1.5 Objectives The objective of this thesis is to study the integration of different technologies like WPAN, WLAN and GSM having different capabilities and protocol stacks to mobile ad hoc networks. Performance improvement issues relating to network configuration, human understandable naming mechanism and sophisticated location aided routing mechanisms will also be discussed and evaluated on an actual ad hoc network testbed. 1.6 Thesis Organization Chapter 2 describes the different design and technological challenges arising from integration of multiple communication interfaces. Chapter 3 includes an overview of famous heterogeneous routing protocols architectures, interworking issues encountered, the limitation and solution suggested. Chapter 4 specifically discusses the adopted solution. Chapter 5 presents the details about solution implementation, protocol evaluation testbed, proposed test cases for evaluation of the proposed mechanisms and results obtained, whereas; chapter 6 concludes the research work. Chapter 2 2 LITERATURE REVIEW 2.1 Introduction The literature available on heterogeneous MANETs has suggested different combination of access technologies but no comprehensive solution comprising of maximum access technologies has been suggested yet. Some of the suggested techniques will be discussed in succeeding paragraphs. 2.2 Service Architecture for Heterogeneous IP Networks It was presented by Joe C. Chan and Doan B. [14]. This proposal is presented to resolve two main issues i.e. universal connectivity and MANET location management in heterogeneous networks. The new architecture suggested for Mobile Ad-hoc Systems and Services (AMASS) introduces a new abstraction layer called Mobile P2P overlay in order to cater for the problems such as transparency, dynamic routing, unique addressing, association, and application independence. Mobile users can associate local resources from neighboring devices, build wireless on-demand systems which is independent of location, hardware devices, networking technology and infrastructure availability. Five key design considerations considered were Mobile Peer-to-Peer Overlay, Internet Interworking, Intelligent Overlay Routing, Infrastructure-free Positioning and Application Layer Mobility. Three enhanced mobility models offered in this approach are Personal Mobility (using different IP devices while keeping the same addr ess), Session Mobility (keeping the same session while changing IP devices) and Service Mobility (keeping personal services while moving between networks). The architecture is built on a peer-to-peer communication model to integrate MANETs seamlessly into heterogeneous IP networks. Mobile Peer-to-Peer System(P2P) is a distributed Middleware addresses the demand of direct communication needs by creating spontaneous community. Whenever the Mobile P2P system has global connectivity, it works with its peer system and other applications systems by generic P2P signaling. It consists of Ad-hoc Network layer and Mobile P2P Overlay. The former layer includes wireless hardware and MANET routing software offering homogeneous connectivity among nodes with same wireless interfaces. These nodes act as a router forwarding traffic toward its destination. The later layer includes the following core services: (i) Membership Services offers single sign-on, naming, profile and identity features; (ii) Discovery Services for peer/resource discovery and caching; (iii) Communication Services for Internet interworking, intelligent routing, session control, pres ence and service delivery; (iv) Location Services for infrastructure-free positioning, and user mobility management functions; (v) Adaptation Services for application and network services adaptation. Members of the Mobile P2P system should first sign-in a â€Å"common group† with their exclusive name and password. Some stationary nodes may also join to offer its resources such as Internet connection, printer, video conferencing. Whenever these client devices are within range of each other, they would work together as a team leading to a wireless adhoc service community where local resources could be shared by individual at its will. These members will then be available by intimating their capabilities and location information to the central location server. Information regarding physical location is also essential to offer spatial locality relationships and enable mobile content customization. The results which were achieved through this process can be summarized as first, it maximizes the synergies of MANETs and P2P for building wireless on-demand systems and services. MANETs provide dynamic physical connectivity while P2P offers dynamic associations of entities (users, devices, and services) for direct resources sharing. Second, its Mobile P2P overlay unites mobility, user-centric connectivity, and services for universal communications. This allow dynamic service adaptations pertinent to user location, application requirements, and network environments. Third, it presents a flexible network structure stimulating fixed and wireless networks convergence. The result is an â€Å"Integrated Mobile Internet† which makes our future environment lot better. 2.3 Transparent Heterogeneous Mobile Ad hoc Networks The idea was suggested by Patrick Stuedi and Gustavo Alonso[3]. The paper discussed that performance issues in a personal area network (PAN) or wireless sensor network (WSN) may have less priority than an office network. In contrast, battery life and low cost is vital to PANs and WSN while most probably it is not an issue in an office network. Consider a scenario where in a certain university campus the students carry variety of personal devices like mobile phones, PDA or laptops equipped with different communication technologies tailored to their capabilities. The mobile phones or PDA will be using Bluetooth whereas laptops have 802.11 as well as a Bluetooth interface built in technology. Ubiquitously combining all these devices into one mobile ad hoc network could invite new applications and services such as location based services or VoIP. So there may be an occasion where a personal device of one particular PAN might communicate with a personal device of another PAN in a multi-ho p fashion with the underlying MAC scheme changing per hop. In this scenario two issues needs to be solved i.e. broadcast emulation and handover. Broadcast emulation is not directly supported in Bluetooth (nor on nodes comprising both Bluetooth and 802.11). Handover is an issue because, in the case of heterogeneous MANETs, a handover might include a change in how the medium is accessed. A handover can be caused by node mobility, a change in user preferences (where due to energy constraints the user chooses to use Bluetooth instead of 802.11), or performance reasons. [15] Any device or node supporting multi interface though having different protocol stack will be specific to the interface at lower level. This characteristic will deteriorate the ability of a device to switch from one network to the other. The objective of such network is to provide an end-to-end communication abstraction that hides heterogeneity. The different possible design differs from each other with regard to application transparency, performance and mobility. There is another issue of handover which includes route changes as well as MAC switching. In principle, there are three possible scenarios 2.3.1 Horizontal Handover The horizontal handover between the participating nodes take place when the route changes and underlying MAC technology remains the same. 2.3.2 Vertical Handover The route does not change but the given neighbor is now reached through a new physical interface. 2.3.3 Diagonal Handover The diagonal handover takes when the MAC technology and route between the participating nodes change simultaneously. To address all these issues an IP based heterogeneous mobile ad hoc test bed using Bluetooth and IEEE 802.11 that implements a virtual interface approach as the end-to-end abstraction is presented. 2.4 Stream Control Transmission Protocol Another approach presented by R. Stewart, Q. Xie, and K. Morneault is [16] Stream Control Transmission Protocol, a transport protocol defined by the IETF providing similar services to TCP. It ensures reliable, in-sequence delivery of messages. While TCP is byte-oriented, SCTP deals with framed messages. A major involvement of SCTP is its multi-homing support. One (or both) endpoints of a connection can consist of more than one IP addresses, enabling transparent fail-over between hosts or network cards. Each interface could be separately cond and maintained (AODV-UU [17] e.g., supports multiple interfaces). This solution seems to be quite valuable in terms of performance since SCTP optimizes the transmission over multiple links. In fact, if one particular node can be reached through several interfaces, SCTP switches transmission from one interface to another after a predefined number of missing acknowledgements. Unfortunately, the solution lacks transparency. Applications running traditional unix sockets would have to be changed to use SCTP sockets instead. Another problem arises with the connection oriented nature of Bluetooth. In Bluetooth, interfaces appear and disappear dynamically depending on whether the connection to the specific node is currently up or down. Therefore, this is something that both the ad hoc routing protocol as well as SCTP would have to cope with. 2.5 Global connectivity for IPv6 Mobile Ad Hoc Networks R. Wakikawa, J. T. Malinen, C. E. Perkins, A. Nilsson, and A. J. Tuominen, in 2003 through IETF Internet Draft, 2003 presented Global connectivity for IPv6 Mobile Ad Hoc Networks, suggested one of the solutions for connecting heterogeneous MANETs. Before this work, the issue was solved by the traditional Internet model. But by adopting the approach presented by them the non structured MANETs were made to operate in structured environment, and inevitably limit the extent of flexibility and freedom that an evolving Mobile Internet can offer. Current mobile positioning and network mobility solutions are mainly infrastructure-driven which is contradictory to infrastructure-less MANETs. Without a flexible and user-centric network structure, existing solutions are generally insufficient to handle the dynamic and on-demand requirements of MANETs. 2.6 Conclusion Heterogeneous MANET service architectures and routing protocols have been talked about and it is established that lots of enhancements need to be introduced to the heterogeneous ad hoc networks. First of all, different issues like IP addresses to hostname mapping and seamless communication need to be addressed. Secondly, ad hoc networks must seamlessly utilize all underlying interfaces. Finally, research efforts need to converge towards real-world network deployment as very few MANET service architectures have been evaluated on actual network testbeds. Chapter 3 3 INTEGRATION CHALLENGES 3.1 Introduction The invention of mobile devices like laptops, personal digital assistant (PDA), smart phones and other handheld gadgets having dissimilar communication interfaces smooth the progress of data transmissions without any predetermined infrastructure and centralized administration. [18]. Such data transmissions can only be made on top of infrastructure-less networks composed of fully autonomous mobile nodes. But, these infrastructure-less networks do possess many complexities like dynamic and ever changing topology, heterogeneity in nodes, energy constraints, bandwidth constraints, limited security and scalability. However, there user-friendliness and rapid deployment make them an imperative part of 4th Generation (4G) architecture allowing the mobile users to communicate anytime, anywhere and with the help of any device. 3.2 Technological Challenges The specialized nature of MANETs enforces many challenges for protocol design by incorporating changes in all layers of protocol stack [2]. For instance, all the changes in link characteristics must be dealt with physical layer. MAC Layer should ensure fair channel access and avoidance of packet collision. Calculation of best possible routes among mobile autonomous nodes must be done by the network layer. Transport layer must modify its flow control mechanism to tolerate Packet loss and transmission delays arising because of wireless channel. The continuous making or breaking of connection due to nodes mobility be handled by application layer. These issues at each layer need to be handled effectively in order to smooth the transition from traditional network to advanced MANETs. 3.2.1 The Physical Layer In heterogeneous MANETs there can be a node which may be able to access multiple networks simultaneously. If a node on one hand, is connected to a cellular network, and on the other hand it exists within the coverage area of an 802.11b AP, the network or the node should be able to switch between them. Moreover, in heterogeneous environment, different wireless technologies may operate in the same frequency band and it is significant that they coexist without degrading each others performance. Therefore, techniques to reduce interference between nodes are important. For example, a node communicating with other nodes via multihop path may have lesser interference than a node communicating directly with AP. This is due to the attachment of increased number of nodes to the AP. Another way of reducing interference is Power control techniques applied in code-division multiple access (CDMA)-based cellular networks and MANET [15]. The research issues range from designing considerations to power control techniques include efficient design of nodes that can efficiently switch between different technologies and ensure higher data rates, development of Interference attenuation techniques between various wireless access technologies, modulation techniques and coding schemes that improve the performance of a given technology and frequency planning schemes for increasing the utilization of frequency spectrum 3.2.2 Link Layer The data link layer can be divided into Logical Link Control (LLC) and Medium Access Control (MAC) layers. When a node needs to communicate to another node having cellular interface, it uses a centralized MAC access like Time Division Multiple Access (TDMA) or CDMA with a data rate upto 2.4 Mb/s. On the other hand, when a node communicates in 802.11 environments, it uses distributed random access scheme like Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) upto a data rate of 11 Mb/s. So, this difference of data rate is going to be one of the interworking considerations. Due to dissimilar access technologies at intermediate hops, the performance of ad hoc networks deteriorates. The problems such as hidden and exposed terminals also limit the capacity of MANETs. The need of evolving mechanisms such as power control and power aware MAC protocols is mandatory to improve the performance of ad hoc networks. In a heterogeneous network, the cross-layer design may play a significant role in providing useful information to upper layers. Another important issue to be considered at the link/MAC level is Security. Although, end-to-end security is the responsibility in the application layer, some wireless access technologies provide a certain level of security at the lower layers. Although the link and MAC layers in a multi-interface node can operate autonomously, but their operations have to be optimized to provide definite service to the upper layers. Some of the open issues include design of efficient link and MAC layer protocols to support QoS in Heterogonous MANET, channel administration schemes that consider different categories of traffic, and allow call blocking and handoff failure probabilities and security at Link / MAC layer. 3.2.3 Network Layer The network layer needs to integrate all underlying communication interfaces; therefore, it is the most challenging task. The presence of nodes with multiple communication interfaces allow to have different physical and MAC layer technologies which need to be taken into account while dealing with an integrated routing process. But, the problem of MANETs such as frequent route changes due to mobility, higher communication overhead to learn and uphold valid routes, higher end-to-end delay and limited end-to-end capacity due to problems at the lower layers are main contributing factors in designing of routing process [19]. In order to reduce network control traffic, improve throughput and increase the range, the idea of integrating MANETs with infrastructure networks is evolved. Hence, mechanism to find gateways and correctly con IP addresses is required by such nodes in a MANET. The network layer has to find the best route between any source and destination pair. To define the best route, including number of hops, delay, throughput, signal strength, and so on several metrics can be used. Moreover, the network layer has to handle horizontal handoffs between the same technology and vertical handoffs between different technologies in a seamless manner. Several routing protocols have been presented for heterogeneous MANETs but the design of integrated and intelligent routing protocols is largely open for research with issues like development of routing capability in a heterogeneous environment that supports all communication possibilities between nodes forming MANET, scalability in multihop routing withou t significantly escalating the overhead and study of the impact of additional routing constraints (like co-channel interference, load balance, bandwidth), and requirements (services, speed, packet delay) needed by nodes and networks. 3.2.4 Transport Layer In connection oriented transport session, as in case of Transmission Control Protocol (TCP), packet loss is assumed to occur due to congestion in the network. This assumptions leads to the performance degradation of TCP and factors such as channel errors, jitter and handoffs are overlooked. Moreover, in heterogeneous environments, the transport protocol has to handle the high delays involved in vertical hands off (while switching from one interface to another), server migration, and bandwidth aggregation [16]. Sometimes, a node changes its IP address when it needs

Saturday, October 12, 2019

Essay --

Growing Your Business Joseph Leoni Bus. Communication Research Paper For a company to reach international status the firm’s foundation must be rock solid. Once you have successfully started your business and continue to maintain the business the next step is to grow the business. Growing the business is essential to going global with the business for a couple reasons. One reason is that the costs alone for going international are substantial. Your business needs to go from being profitable to very lucrative in order to fit the bill for overseas costs. The second reason growing your business is important before going global has to do with the companies success formula. What happens if your business starts booming overseas at an unexpected? With an understanding of how to grow your business here in the U.S. you will be able to reproduce the successful formula overseas as well. Before steps are taken to start growing the company it’s important that the company be as efficient as possible. This means that a very analytical view of the companies operations need to be addressed. Where can the company cut back on costs without hurting the company? Are there any redundancies? Cut back any unnecessary costs that seem fit, but keep in mind your employees morale can be affected by these changes which will in effect hurt the company. Also ask what, if any, technologies you can implement to improve your profit margin. New technology is constantly coming out and it’s usually the companies that best implement it that get ahead and maintain efficiency. Once all the excess spending and redundancies are fixed it’s time to look at the different possibilities as there is always more than one way of doing something. With a successfully maintaine... ... rising another assessment similar to the first one is suggested. With growth of the business comes new variables and changes to the company thus effectively changing the company. Go back again to cut unnecessary spending, keeping in mind employee morale. Franchising your business can be a very rewarding venture especially if your business success formula has been tried and tried again. Franchising can also be your way into the international market although it depends on each businesses needs. Food and consumer businesses usually do very well as the formula can be duplicated easily. Service companies are still possible to franchise but more difficult as they usually require people with special skills or training to get the job done. In general, franchising your business will lead to increased revenues because the customers for the product or service already exist.