Friday, November 29, 2019

Being True To Yourself When Selling Your Wares

Being True To Yourself When Selling Your Wares I do not normally sell books at events like Christmas sales at the recreation center or autumn craft festivals. I learned a long time ago that unless you simply enjoy socializing with other vendors, you rarely justify the time invested. But last week I accepted one . . . and realized why I quit doing them. Im a member of several chambers of commerce, which are great networking, advertising, and sales opportunities, Hmmm, I thought. Its twelve miles from me, costs nothing to appear and sell, and the captured audience was educators. Shouldnt they read more than the average person? So, I signed up and hauled eight boxes of books. And I sold three books in four hours. As I packed up, kicking myself for not following my own rule about being selective about appearances, I talked to a few vendors. None of us sold much (there were 25 vendors), which surprised us all (few of us will be back next year). A jewelry vendor spoke about coming to work everyday. Even working for herself out of her home, she toils for eight hours. She complained that newer sales people in her line of work wanted to work part-time to make a full-time wage. She never failed to fall back on her old skills of making eye-contact with potential buyers and working a room. She made a full-time living at her craft. A soap vendor and I spoke about natural products, organic food, and farming. She rued appearing at the event but had pretty much made her decision like I had it was too local to pass up. Shed ignored her own advice like I had. She likewise strategically selected venues, and she defined the sizes, compositions, and types of events where shed appear, because like me, she could make more sales online at her computer than at a table in an auditorium. You dont sell anywhere and everywhere. Your time is precious. You could be selling online, blogging, working social media, or writing your next story. When selecting where to set up shop, analyze the market, the time, the commute, and the work progress you give up. The cost of meals, and the time expended

Monday, November 25, 2019

All the Presidents Men essays

All the President's Men essays The biggest political scandal to ever hit the United States History was Watergate. It led directly to the reelection campaign of Nixon and unmasked a game of political spying, bribery, and the illegal use of campaign funds. Through the help of reporters of the Washington Post Carl Bernstein and Bob Woodward, the end result of the scandal resulted in Nixons resignation from presidency in 1974 and the indictment of nearly forty government officials. The two reporters wrote about the whole scandal, and how they solved the puzzle in All the Presidents Men. The scandal began on June 17, 1972 when a security guard notified the police that a door lock was taped at the Washingtons Watergate. Three officers responded to the call and found five burglars in suits with rubber gloves on and hundred dollar bills in sequence in their pockets. The men were actually there to adjust the bugging equiptment they had installed during a May break-in and to photograph the Democratic documents. At first the burglars seemed like every day people, but later on a 25,000-dollar check marked for Nixons campaign was deposited in a bank account of Bernard L. Barker. Barker was one of the five burglars. A Florida bank made out the check to Kenneth H. Dahlberg. Dahlberg said he turned the check over to Maurice Stans. Dahlberg said he had no idea how the check got into Barkers bank account. According to court testimony by government prosecutors, Barkers bank account in which the $25,000 check was deposited was the same account from which Barker later withdrew a large number of hundred dollar bills. About 53 of these 100-dollar bills were found on the five men after they were arrested at the Watergate. Woodward and Bernstein helped to crack the case by bringing up the mysterious $25,000 check. Soon after the $25,000 check was found, G. Gordon Liddy and James W. McCord were convicted of conspiracy, burglary, and wiretapp...

Thursday, November 21, 2019

Mr Makoloyis Personal Profile and View Assignment

Mr Makoloyis Personal Profile and View - Assignment Example Mr Makoloyi says that the problems emanate from the fact that BA had persisted that the crew accept four-year pay pact. This was to see a freeze in actual pay up to 2014, something to which the crew has countered by giving the company a three-year pay cut pact. Although BA management has already rejected this. In addition, the company refused to commit to making longer the legitimacy of the industrial action ballot to let union staff members to be balloted on any suggestion from BA. Consequently, as Modlock (2010) observed, it resulted in another strike, third to be precise, ballot in five months following the rejection of BA’s proposal by cabin crew. Moreover, BA’s unwillingness to address Unite’s concerns about the impact on existing crew gave that the airline is pushing forward with its new fleet plans and especially on how the routes will be allocated among already functioning and the latest crew in the ages to come. Mr Makoloyi also observed that heightened tensions at the BA is caused by the manner in which the management relates with the employees and the stringent rules it has put forth to curb employee misbehavior like excessive drinking, and this has lowed the motivation of employees. Equally threatening an issue, related to pensions. Mr. Makoloyi explains that the announcement by the company in 2003 that it would close its ultimate remuneration scheme to all recently employed workers due to a major shortfall in the pension’s fund led to BALPA, a trade union that stands for BA pilots, threatened industrial action if the final remuneration scheme was reduced to a less generous package. The threat was approximated to have cost the company roughly eighty million pounds while the union projected that the adjustment would make a number of their members to lose 36% of their final pension. BALPA has roughly 2500 members (Modlick 2010).Mr. Makoloyi said that between 2005 and 2006, BA held mo re than 500 briefings with staff pertaining the same issue. All these negotiations with four unions yielded little given that each of these unions had their own unique issue of concern.

Wednesday, November 20, 2019

Death of a Salesman Essay Example | Topics and Well Written Essays - 750 words

Death of a Salesman - Essay Example After this paper, we will understand the goal of Miller to depict his charges to the country to be true and blatant. Background Death of a Salesman is a powerful drama that prosecutes the fundamental American values, in relation to the American Dream of material success. It may seem a little tame today due to constant individual self-analysis and critiques but it was relatively radical in its setting. America faced irreconcilable and insightful domestic tensions after the World War II. Although the war had apparently created an extraordinary sense of prosperity and security the American people, they became progressively caught in an apprehensive cold war with the Soviets. The spread of myths about a peaceful, regular and repulsively elated American life was strengthened by America’s relentless anxiety of the concept of Communism. America in general was not able afford social conformity and that the philosophical and cultural custom – booming and Last Name 3 prosperous l iving – championed. A Tragic Hero Major part of the play is told from the viewpoint of Willy, the protagonist in the story. The background of the protagonist life is shown in the analepsis – showing scenes in the present time with some characters on the stage and conversations only Willy knows about. His habit of talking to himself, pretending to have a conversation with his older son, Biff, concerns his younger son, Happy. In the opening of Act I, it is shown that Willy contradicts has a tendency of contradicting himself. He states that his son, Biff, is unsteady and very lazy but afterwards declares that Biff is anything but lazy. In these scenes, it gives the viewers a hint that Willy is his own paradox, which could have been caused by his aspirations in life and to his sons, particularly Biff. He is torn between achieving the American Dream of material success and his love for his sons, which is further explained in the story in the succeeding Acts. In so many ways , Willy has tried with his utmost might to achieve the American Dream. He acquires a home and a range of then-luxurious appliances. He raises his family and sails forth to into the business world with ambitions in exuberance. However, he has failed to achieve the fruits of the American Dream and passes the dream to his sons. Apparently, only Happy is the one fulfilling the so-called â€Å"Dream†. Biff tries so hard to buy the concept his father sells but it seems that he can only try so hard. He hops from one job to another, making him not able to steadily keep a 9-5 job. As a result, he ends up toiling lands and ranches, working with his bare hands to make a living, which for his father, is too far from what he has grasped from America’s sales pitch of the â€Å"American Dream.† In the play, this is beautifully portrayed through its structure – stream of consciousness. Willy Last Name 4 moves from one place to another in his house, with flashbacks of his past, and fantasizes conversations with different characters in the story. If the scene is in the present, the characters enter the room through the door in the left, abiding by the rules of the set. However, when the scene is about Willy’s visit of his past or his dreams, all of these rules don’t exist. Characters pass through the walls, making a dreamy atmosphere on the stage. This shows that the mental state of Willy deteriorates and his past and present moves in parallel to each

Monday, November 18, 2019

Teams in Production and Operations Management Research Paper

Teams in Production and Operations Management - Research Paper Example ow has many brands under it developing from the Toyota AA in 1936 to a group of companies that include the Lexus, Scion, Hino Motors and Daihatsu brands today. Toyota has grown steadily throughout the years and it overtook General Motors in 2008 to become the leading global manufacturer of automobiles. In 2006, the company was announced as the most profitable in the automotive industry with its profits rising to $11 billion in that year. During this period, its market share increased with improvement in sales across the board. The most notable increase in the company sales was observed in the US. The company has many subsidiaries and the Toyota Financial Services is the most notable. The company sells finances, as well as dealing with other investment and trading ventures. Apart from the brands that the company wholly owns, it has a 51% stake in the Daihatsu brand, 5.9% in Isuzu Motors Ltd., and 16.7% in Fuji Heavy Industries a company that also manufactures Subaru vehicles. Other products include hybrid vehicles that run on gasoline and electricity, an automated parking system and economy shifting and eight speed automatic transmission ve hicles among many other inventions. Toyota has a large market share in the United States, Africa, Australia and Asia. However, the market share is relatively small in Europe. In 2005, there were 8.54 million vehicles that were produced by Toyota together with its half-owned subsidiary, Daihatsu Motors. This figure represents about 500,000 less in the number that General Motors produced in the same year. The Daihatsu conglomerate can be considered to be the fastest growing branch of the company in Southeast Asia. Considering the competition that is present in the Far East Asia countries, the company can be considered as having a very sound marketing campaign as it has a substantial market share in those countries also. Fortune Global 500 placed Toyota as the fifth largest company in the world. After the recession that was

Saturday, November 16, 2019

Von Neumann Computer Architecture Information Technology Essay

Von Neumann Computer Architecture Information Technology Essay The Von Neumann Computer is a digital pc that storing the data in a single separate way and it use a processing unit. A digital computer keeps its program in instruction with its data as well. The Von Neumann Computer named after name of computer scientist John von Neumann. 5 Internal Components: Description of each components, how they are connected to Mother Board, Diagram. Hard Disk: Hard disk is a magnetic disk that allows you to store your computer data, a hard disk consist of several platters, which every individual platter is able to read and write. The hard disk is connected to the motherboard by ribbon cable (ATA66/100). Random Access Memory (RAM: It is type of computer memory but it can be accessed randomly, RAM is very fast to read than any storage device in a PC. As long as your computer is running the data store in a RAM but when the computer turns off, Ram will lose its data. The Ram connected to the motherboard by small circuit, in the motherboard there is two circuit places which is one for inline memory and the second is duel inline memory. Processor: Processor or Central Processing Unit (CPU) it is part of computer system and in easy way it is a brain of computer the job of CPU in a computer is to give a instruction for any computer program the processor is connected to the motherboard directly. Graphic Card: It is a bridge between processor and other devices to send command and gets back the signal, the Graphic Card is connected throw the expansion slot which is in the Motherboard. 5 External Components: Description, how are they connected? Eg Ports, USB, etc. Diagram. Key Board: keyboard is primary way to communicate with input; you can use the keyboard to input text and data. When we press a key, it presses a button, completing the circuit and allowing an amount of current to run through and keyboards are connected by USB cable or PS2. Mouse: mouse is device which lets you work with graphical objects that the computer displays on the screen. Mouse has one button or sometimes three buttons and it have scroll wheel that enable user to scrolling long document or webpage. The Mouse is connected by USB cable or PS2. Printer: It is a device that can print text or graphic that stored in a electronic form, and it connect to the PC by USB Port. Scanner: It is a device that scans data or any text, printed page or photo you scan it to the computer and it connected to the computer by USB Port. Monitor: A Monitor is like a television but the difference is that monitor display the information produced by a computer, basically it is a screen display of a computer and it connect VGA port in a PC or in some PC by the Video card. Task 2 Describe the characteristics of the various types of internal memory of computer: What is internal memory of computer? The internal memory of computer is also part of computer devices that recoding media that keep digital data used for computing for some interval of time. What are the major types of internal memory of computer? For each type of internal memory, explain how it works and what are its major characteristics There are types of computer internal memory which is Random Access Memory (RAM) and Read Only Memory (ROM). Random Access Memory (RAM): It is a temporary computer internal memory and it is a space that allows us to temporarily store data when a program is running. The contents are being lost when the computer is switched off it only holds data while power is on. There are some major types of RAM which are : Rambus DRAM (RDRAM): is a serial memory technology that arrived in three flavours, PC600, PC700, and PC800. PC800 DRAM has doubled the maximum throughput of old, but a higher speed and it use small capacitors to store each bit of memory in an addressable format that consists of rows and columns, DRAM designs with multiple channels. SIMM chips: Single in-line memory modules (SIMMs) it is a type of solid state computer memory which is used particular for the processor cache memory. The 72-pin SIMM has a notch among the contacts in the middle. An important characteristic of RAM is that the entire memory place can be accessed at almost the same speed. Read Only Memory (ROM): Is a kind of memory that store the data permanently and it cannot be removed, eventually every computer is coming with a small amount of ROM which recorded of boot firmware, when we start our computer the ROM chips will running hardware diagnostics that will loading the operating system into RAM. Cache: The cache will make our computer more skilled and better, your computer memory, cache is extremely fast memory that store data and the data is accessible quickly and it gives quickest response to the CPU. Virtual Memory: The virtual memory task was to enable a process to operate or establish the status of pages in its virtual address space. Task 3 Explain the purpose and functions of the system busses of a computer: Explain how the internal subsystems are linked through buses and where these buses could be found inside a computer. The computer internal subsystems are connect to the busses through wire inside the computer and the data transfer throw these from one part to the another part of computer. Busses connect the entire computer component with the main memory and processor. Explain the functions of control, data, and address busses. What is bus width and what is the effect of the bus width on the bus performance? The architecture of buses is a wire inside a computer which data is transfer from one part to another part inside the computer, the purpose of buses is to connect the entire computer component to the processor and to the central memory. Busses are dividing into two parts the Data busses and Address busses. The function of data busses is to transfer the data and the function of address busses is to give direction to data where to go. Bus width is a canal that information is flowing; when the bus width is wider it is beneficial for busses because more information can flow in more speedy time. What is a motherboard chip set? With use of a diagram, explain what is the role and characteristics of the North and South Bridge of a motherboard. It is a specific chip in a computer that calls motherboard chipset. The Northbridge is core logical in a computer motherboard and its role is to hold communication with RAM, BIOS ROM, PCI and CPU. The South Bridge job is to manage the basic of input/output These include all hard drive and expansion slots, USB, FireWire, RAID, audio codes, real-time system clock, system power management, interrupt controller, direct memory access (DMA) controller, and non-volatile BIOS memory. Task 4 Describe, with the aid of diagrams, what are the components and the structure of CPU and how CPU works: What is the CPU of a modern computer and what are the CPU components? The Central Processing Unit (CPU) is the brain of a computer that gives function to a computer programme. Every time when CPU doing a job there is a stored code in the computers memory that instructs the CPU what to do. CPU needs to decode the instruction code to find what it needs to do finish the task. After the CPU solve the code, the CPU will start to perform calculation and the result whether it store the result back in memory, to hard drive, or the computer display. The way that we can understand how powerful a process is by the number of instruction that a CPU can execute per second. The CPU components are: Logic or Arithmetic unit (ALU) it performs calculations, there are four types of function that ALU do and it depends on these to perform and they are addition, subtraction, multiplication and division even registering and instruction. Register or the memory which stores the data, it tell CPU where the information is located, also its a temporary storage areas for instructions or data and they are not part of the memory. Register hold and transfer instructions. Register operate faster than a Ram, normally register assess by bit like 32 bits. Control unit which give direction to the data around the CPU by sending control signals and its job is to control the data that executed by the ALU, also the Control Unit keeping communicate with ALU and system memory. Use a diagram to explain the components of CPU CPU Components Diagram Arithmetic Logic Unit (ALU) Registers Control Unit Input Device Secondary Storage Output Device Explain shortly the Fetch Execute Cycle of CPU referring to its components and RAM. Fetch Execute Cycle of CPU it is an order of actions that the central processing unit (CPU) perform to execute each machine code instruction in a program. There are five register in the Fetch Execute Cycle which are: The Instruction Register that hold the solved and executed last instruction. The memory buffer register that use to get data from memory. The memory address registers that to be use when a word is transferred between memory and MBR. The accumulator job is to hold the result of ALU for the time being and the programme counter that hold the address of the next instruction to be fetched from memory.

Wednesday, November 13, 2019

Essay --

The play The Good Woman of Setzuan was written by Bertolt Brecht. He started writing it in 1938 but it wasn’t completed until 1943. The play begins with a water seller named Wong who is out trying to sell his product. While working, he meets three gods. The gods have been searching the earth for a good person who lives by their guidelines. However, they find only vagrants and sinners. Wong tells them about a prostitute who â€Å"can’t† say no, and is likely to do any good deed asked. Wong introduces the gods to the prositut, Shen Te, and find that she is good. By the fact that Shen Te gave them a play to stay for the night even though it lost her some money. Given that they find Shen Te to be good the gods reward her with money that she uses to buy a tobacco shop.She also allows homeless families to live in the shop. Her kindness is impressive to the gods and others, but her shop quickly becomes overcrowded, messy, and low on money. Then one day Shen Te’s mysterious cousin, Shui Ta shows up. Shui Ta kicks out the people living in the shop and returns it back into a profit-earning business. However, the audience is aware that Shui Ta is really Shen Te in a mask. Eventually Shen Te returns and continues her her good deeds. As time progresses, word of the â€Å"good woman of setzuan† spreads and more people come to the tobacco shop looking for help. As more people demand Shen Te’s charity, Shui Ta shows up more and more often. Shui Ta starts coming around so frequently that he is able to grow the business into a large tobacco shop with many employees. Shui Ta is not the only man trying to help Shen Te. Shen Te meets a pilot named Yang Sun. Shen Te like him but her friends do not. They would rather she date the local baker who... ...nkrupt and Shen Te would be unable to help anyone. At the same time, if Shui Ta grows the business larger, Shen Te would be able to help even more people. This is evident as the story progresses. As more people come to Shen Te for help, Shui Ta appears more often to create a larger shop. This is because a larger shop means helping more people. During one of the meetings between Wong and the gods, they discuss the rules put into place. The gods almost admit that they’re system isn’t perfect, but they do admit that it is difficult to manage. At the end of the trial, the gods finally sympathize with the bad moralities needed in this world by allowing Shui Ta to exist part time. This brings out the deeper questions in life like â€Å"why are we here?† and â€Å"who are we?†. At first glance, this story seems a little silly and farfetched, but upon deeper analysis we see the moral

Monday, November 11, 2019

Dissertation Methodology †Impact of Technology on Recruitment

Dissertation examples – Dissertation Methodology – FREE our site ESSAYS The following article is a sample dissertation methodology on the following dissertation topic: Impact of Technology on Recruitment in UK Retail Banks.A case study of Lloyds Banking Group:The methodology depicts a mixed method research, using quantitative surveys and semi structured interviews. Based on Saunder’s Research Onion.a. Research Philosophy – Dissertation ExamplesThe social world of banks and graduates upon which this study is based exists externally and are not related to the researcher; therefore they would be measured through objective methods rather than being inferred subjectively through reflection, sensation or intuition (Easterby-Smith, 2002). This study would therefore adopt a positivist approach as credible data could only be derived through quantitative analysis of phenomena observed (Saunders et al, 2007). The social interpretivism philosophy, which aims to study and reflect on the inner feelings of participants, is not being utilized in this study, due to the study’s research objective, which is to ascertain the effectiveness of online recruitment in an organization. Details regarding effectiveness are measured using objective means (such as increase in candidate application and reduction in costs), thereby warranting a positivis t approach.b. Research approachDue to the positivist nature of the research, this study would adopt a deductive approach (Saunders et al, 2007). This approach represents the most common view of the relationship between theory and research and results gotten from this approach are developed through logical reasoning (Bryman and Bell, 2007). The data findings would be compared against existing literature to ascertain if they concur with what has already been published in the field of online recruitment.c. AccessThe ability to gather primary data during this study was dependent on gaining access to an appropriate source within the organization. The level to which this source is appropriate relies on the research question, related objectives and research designs (Saunders et al, 2007). Therefore, the researcher, as a friend of an employee within the organization, was in a favorable position to get access within the organization. I contacted a friend of mine who currently works within graduate recruitment at Lloyds TSB, and discussed the prospects of my dissertation. She spoke to several of her colleagues on my behalf and they agreed for me to conduct telephone interviews with 4 members of the graduate recruitment team, some of which had been there for an average of 5 – 10 years (reasons expatiated further in this chapter). Due to the non-intrusive nature of my research, there were no objections or limitations raised by the participants with regards to the questions asked or the purpose of the study.d. Research StrategyThis study would adopt a case study strategy in answering the research question. Robson (2002) asserts that the case study strategy would be useful if the aim of the study is to gain a rich understanding of the research perspective and the process being endorsed. Therefore as this study aims to understand the recruitment process within Lloyds TSB and also any benefits associated with onl ine recruitment, a case study would be most effective. Two separate yet parallel approaches would be utilized in this study, and are outlined in the table 1 below. Table 1: Research Strategy STRATEGYAIMSAMPLETYPE OF QUESTIONSMETHOD OF ANALYSIS 1. Quantitative questionnaireQuantify graduates’ perception of what constitutes an effective recruitment platform10 graduates who have applied to one or more organizations through their online system.Closed rating scale questions, and nominal data.Descriptive analysis (bar chart, pie chart and line charts). 2. Qualitative semi-structured interviewsThis was done in order to ascertain the benefits associated with online recruitment.4 members of the recruitment staff within Lloyds TSB, who have been in the organization for more than 5 yearsStructured questionnaires. Open questionsContent analysisi. Quantitative QuestionnaireQuantitative methods are mainly used in the data collection process of research. It involves data that is either in the form of, or expressed as numbers (Easterby-Smith et al, 2008). The quantitative questionnaires were handed out to 10 graduates and undergraduates. The questionnaire was mainly designed wi th rating scale questions, where respondents were asked to state their opinion or preference for a particular question on a scale of 1 – 5. Secondary nominal data was also included in order to ascertain the respondent’s status, application activity and preference. The quantitative questionnaire distributed to respondents is outlined in appendix. Quantitative questionnaires are useful as the results derived are quantifiable and measurable against other variables in an objective manner (Saunders et al, 2007). ii. Qualitative Semi Structured InterviewsFollowing the access grant to four members of the recruitment team within the organization, 15 – 20 minute qualitative telephone interviews were carried out. A semi-structured interview is a qualitative interview that is defined by a pre-set question guide. It aims to provide in-depth findings through informal discussions with participants (Collis and Hussey, 2003). This interview method was chosen over unstructured or structured interviews, because this study intends to answer the research questions by asking specific questions, but not so much (unstructured) that it generates useless data, and not so less (structured) so as not to miss out on any unanticipated information. The interview questions in the semi-structured interview are in appendix. The themes utilized in this study were derived mainly from the literature review and were crucial in developing the questions that were raised during the study. The semi-structured approach also provided the researcher with the ability to probe answers. Answer probing was particularly useful in responses whereby more explanation was needed in order to fully understand the answers. Due to the recent adaptation of online recruitment, the semi structured interviews was targeted at members of the team who had witnessed or orchestrated the shift towards online recruitment, that way these respondents would be better able to answer questions that relate to the comparison of both methods. Also, members of the online recruitment team being interviewed had different positions within recruitment and handled separate tasks. The questionnaires were given to them beforehand, when the approval was first sought, and each respondent chose the questions that they were more qualified to respond to. Therefore the research was such that all respondents answered some questions, while some others were answered by a particular individual because of their knowledge of that process. Table 2 outlines the respondent details and their interview theme. Table 2: Interview Respondents and Questions asked RespondentFictionalNameRoleYears in LloydsSubjects Covered R1AliceGraduate Events Manager2Effectiveness, Disadvantages R2MarthaApplication Review7Background, Adoption, Effectiveness, Disadvantages R3NickFinance and Budgeting9Adoption, Effectiveness, Efficiency R4ChloeMedia Advertisement3Effectiveness, Advertisement Each respondent were asked for their consent to interview, prior to the interview sessions, and also requested not to have their names mentioned so as to prevent any form of organizational backlash if the contents of the study were interpreted in any other non-academic form, and distributed. They have therefore been given fictional names, so as to make the research more readable.e. Data Collectioni. Sampling MethodBased on the research objectives and the issues to be investigated, it would have been most appropriate if all recruitment staffs within the organization were interviewed. However, due to the time constraints and resource limitations inherent in this study, a non-probability sample of the population was selected. Saunders et al (2007) asserts that a non-probability sample is most often used when adopting a case study strategy. A non-probability sample, as described by (Oppenheim, 2000), is a sample in which the probability of each case being selected from the total populat ion is not known. The samples of graduates that were chosen to partake in the quantitative study are too small to constitute a probability sample of graduates within London or UK. Also, the number of employees within Lloyds who took part in the qualitative study was not high enough to constitute a significant portion of the recruitment department within Lloyds TSB. Therefore the study focused more on the quantitative facts of the perception of recruitment within the organization, as opposed to theories expressed in the literature review, and what graduates on the outside thought of online recruitment. ii. Primary Data CollectionIn collecting data that could be analysed using quantitative means, Easterby-Smith et al (2008) claims that researchers could collect either primary or secondary data. He further claims that though each of these means have their merits and demerits, the collection of one’s own data gives control over the structure of the sample and the data obtained from each respondent . It also gives greater confidence that the data collected would match the research objectives. The researcher therefore chose to collect primary data from 20 graduates using questionnaires distributed-in-person to each respondent. This was done amongst friends and colleagues within the university who have utilized online recruitment systems. Data from the semi-structured interviews would be collected using a tape recorder, and the conversations with all four employees would be transcribed word for word, and expression for expression. The advantages inherent in this approach is that it allows the researcher to document and see patterns in words and emotions that would not be available if other forms of interviews were conducted.f. Analysis of Research Findingsi. Quantitative DataThe quantitative data collected during the course of this study, whilst still in its raw form, is described by Saunders et al (2007) as being useless and conveying little information to most people. Univariates, which are total sample distributions of one variable at a time (Oppenheim, 2005) was utili sed in analysing the frequency and percentage occurrence of each variable; including both ordinal and nominal, category and rating scale questions. However an indepth correlation or bivariate analysis was not conducted due to the low number of graduate respondents, and also due to the fact that the study was mainly concerned with the viewpoint of the organization, and not necessarily that of the graduates. Results would be analysed using Excel and graphs would be drawn out to analyse all data with the aim of comparing them to the qualitative study. ii. Qualitative DataYin (2002) suggests that in studies whereby the research question has been formulated based on the literature review; these theories that have been used in the postulation of the research question could also be used in analyzing the findings. Thereby suggesting that a deductive approach to data analysis would be essential for theoretical driven studies. Based on these arguments, this study analyzed the qualitative findings using deductive methods. The findings from each respondent and questionnaire theme were analyzed according to the literature review topics discussed. In the instance whereby different respondents had something to say about a particular issue, all their opinions were recorded and taking into consideration in the analysis of findings. A fact sheet of all findings according to the theory is illustrated in chapter 4. Full transcripts of the interview are in the appendix. The pattern matching procedure, as postulated by Saunders et al, (2007), would be utilized in this deductive analysis. It involves predicting a pattern of outcomes based on theoretical propositions. These propositions are thereby analyzed in the data analysis process. This procedure involves the development of an analytical framework, utilizing existing theory, and then testing the adequacies of the framework as a means of explaining the findings (Saunders et al, 2007). In the instance where a pattern is found as initially predicted, it would be evidence that suggests that there is indeed an explanation for findings.g. EthicsBlumberg, et al (2005) describes ethics as referring to the appropriateness of one’s behaviour in relation to the rights of those who become the subject of a research project. A number of ethical issues have been identified and raised with respect to this study. The issues, and steps taken to alleviate such issues are discussed below: The company may be secretive about some aspects of its online recruitment, such as the quantity of graduates and marketing techniques to attract graduates, which it may not like its competitors to know about. Employees responding to semi structured interviews may not be so willing to discuss their personal opinion of the bank’s recruitment system, or the quality of graduates received through their channels, in case their response does not really conform to the brand and reputation that the organization is trying to build (for instance, the bank may pose as an equal opportunity organization that employs from diverse backgrounds, whereas they mostly only recruit students from top Oxbridge universities with a certain background). Information such as this could pose difficulties if the bank eventually decides to broaden its pool of candidates and employ people from varying backgrounds. Apart from these ethical considerations, no other ethical dilemmas have been found with relation to this essay. Therefore, in order to alleviate these issues, the questionnaire and interviews would be designed in such a way that it does not offend, harm, provoke or stress any of the participants in any way. Questions asked would be non-instrusive as no personal information about names; age or post would be requested. Information about specific applicant quality and demographics of applicants’ recruitment would not be sought. Also, in terms of graduate questionnaires that have been distributed, some candidates may think that answering these questions and including personal details may impede or even benefit them when applying to said organizations. Therefore the questionnaires would fully state that it is an academic research and in no way constitutes a study conducted by the organization.h. LimitationsThe major limitation of this research would be gaining access to graduates who have gone through online recruitment systems and applied specifically to Lloyds TSB. Graduates that have applied to the bank are diverse both in culture and geography. Therefore this study would be limited in not being able to survey a probability sample of graduates who have either used online recruitment or specifically applied to Lloyds TSB in the past. The willingness and capacity of staff to answer questions with relation to graduate recruitment is also impeded. Some staff may not be willing to discuss sensitive issues such as their views, some may be unwilling to discuss online recruitment in any capacity to an external researcher such as myself, while some may not have the relevant experience required to answer most of the questions raised in this study. Therefore the list of participants has been limited to 4, which in no way represents a probability sample of the recruitment workforce within the organization. There is also a secondary limitation with regards to the experience of those staff that participate in the interviews. The ideal participants would typically have been working in recruitment for over 10 years, and would have witnessed and participated in the transition from traditional to online recruitment within the organization. However, only two of the participants answering this questionnaire are ‘ideal candidates’, the other 2 have been working within recruitment over the past 2 – 3 years and were in no capacity to discuss the transition between traditional and online recruitment. However, their views were still helpful and contributed significantly to the findings of this study. This study did not incorporate recent events such as the merger between Lloyds TSB and HBOS. It also did not include the recent government bailout and financial crisis affecting most UK financial institutions. This information could have impacted on the quality of graduate applications that the organization received within the past 3 years, and could pose a shortfall in the information gathered. However, including this information would have extended the limits of the study, beyond the word count and capacity currently accepted.

Friday, November 8, 2019

George Washinton essays

George Washinton essays The Success Of George Washingtons Administration George Washington was the first President of the United States, tackling a difficult job in putting the countrys government together. Washington was very successful in running the country, setting a precedent for the future presidents of the United States. He helped to organize the country into a nation with a powerful and organized government that supplied the laws and enforcements that the country needed to survive. He also remained neutral in foreign affairs that may have led to the demise of the young and weak United States if a side had been chosen. The people of the United States had a generally good picture of Washington as a successful President. After he served two terms, he was urged to run a third time, but he declined. Washington filled in the holes left in the Constitution by passing the Bill of Rights, the Judiciary Act, and the Mint Act. The United States became more unified, developing a national currency, a strong central government, and a judicial branch that prevents corruption by having higher courts to appeal to. Washington kept the trust of the people, touring the Northeast in 1789 and the South in 1791. He appealed to the wants and needs of the citizens, moving the capital of the nation to the District of Columbia in 1793 to please the Southerners. Washington ordered troops to stop the Whiskey Rebellion of 1794, proving to the nation that the government had more power than during the time of the Articles of Confederation. Even following his presidency, he set a standard for what he viewed to be a good go vernment in his Farewell Address. He urged his countrymen to steer clear of political parties and to remain neutral in times of foreign wars and conflicts. Washington succeeded in protecting the country from outside conflicts and dangers during his presidency. Although many disagreed with his foreign policies, he insisted on being ...

Wednesday, November 6, 2019

Freedom of Information Act Essays

Freedom of Information Act Essays Freedom of Information Act Essay Freedom of Information Act Essay Freedom of Information Act Name: Course: Institution: : Instructor: Date: Freedom of Information Act The Freedom of Information Act was initiated by President Lyndon Johnson in 1966. He saw the need of transparency and implemented the Act in 1967 (Moore, 2005). This Act ensures the public has access to information it deserves to know. The government has the responsibility of disclosing its records to the public if they request to access them. In cases where the government withholds information, the intention of withholding the information should be justified to the public (Moore, 2005). The article discusses some of the secrets that the public needs to know about the Bush administration. The secret documents that people want to be publicized include documents containing information about what treasury did with money that was allocated for people who had lost their assets. The public also wants to know why the government allowed the torture of innocent Americans during interrogations claiming that it was in the best interests of the country. This kind of information is very important so that the public understands how the government operates to avoid friction with public offices. Information about hurricane Katrina should also be made public. People want to know what plans the government is making to avoid similar situations. When Katrina struck, the whole country was caught oblivious and measures to save lives and property were hurried. Since people do not want the same to happen again, they want the government to keep them in the loop about its preparations and procedures about handling disasters of any kind. Since president Obama got into office, there have been numerous letters requesting that he releases to the public documents from the bush administration. These documents are believed to contain information that is considered highly enigmatic. Those who worked for the bush administration claim that the documents could not be released then because they were â€Å"internal memos and also contained information about trade secrets† (Nation, 2009). Members of the public found this hard to believe since even Congress had not seen those documents. There is mounting pressure on the Obama administration to order for the release of these documents by various humanitarian groups. These groups believe that the profanity of these documents warrants their instantaneous release to the public because the public deserves to know. Obama is said to be defending the bush administration and all their discretions. This, even after white house lawyers admitted to discovering emails that had been accounted for as destroyed. As president, Obama could order the release of those emails. However, the justice system continues to protect the bush administration making it harder to gain access to these documents. One of the activist groups wants to know why names of the visitors to the white house are kept secret. This group believes that the public has every right to know the names of those who visited the white house during the bush era regardless of the purposes of their visits. The group’s efforts to get that list o names has proved futile as the vice president ordered the secret service not to release the list under any circumstances. Obama can make this list public; all he needs to do is give the order. The justice department also needs to disclose how cases used to be handled and how they are being handled presently. Its policies also need to be made known to the public. The Obama memoranda advocates for absolute transparency between government and the people. In his efforts to demonstrate this transparency, he should release emails from the bush administration and emails and documentation from his administration. These measures are of the essence if president Obama wants to be re-elected back into office. Reference March Issue. The Nation. (2009) Retrieved from: thenation.com/doc/20090316/wiener Moore, A. D. (2005). Information ethics: Privacy, property, and power. Seattle: University of Washington Press.

Monday, November 4, 2019

Safety Program Management Essay Example | Topics and Well Written Essays - 2500 words

Safety Program Management - Essay Example This program is set out to direct improvements about specific regulatory policies on accident prevention, accident mitigation and aviation monitoring and modeling to make, as Rugg (2010) has emphasized, â€Å"an already safe air transportation system even safer.† Other agencies such as the National Transportation Safety Board (NTSB) are a program initiated by the government for the same purpose as well. In connection, this paper will focus on the aspect of accident prevention and its importance to the implementation of the aviation safety program created by the agencies mentioned above; and to employ certain development in which consideration of the past, present and future changes is needed. To do so, a portion will be spared for the review of the history of aviation travels, and the accidents connected to it, and also point out the desired aviation safety policies needed to assist in reaching the visions as stated. One of the earliest concepts of air travelling was designed by the Montgolfier brothers in the late 18th century as they saw the possibility of navigating the air (Turner, 1931, p. 170). A few experimentation and months later, a huge balloon was flown using hot air. The balloon, called the Montgolfier balloon, later had carried a maximum of seven passengers into the sky; and gathered both positive and negative feedback from the public (â€Å"World Aviation in 1783,† n.d.). After more than two decades, Sir George Cayley, known as the â€Å"Father of Aerial Navigation,† discussed the basic yet very significant principles used in flying things in an article titled â€Å"On Aerial Navigation† (Berliner, 1997, pp. 54-55); and also started to use his own ideas in the experimentations about flying he did in the years later. By the early 20th century, according to Andrews (2009), aviation travel experimenters

Saturday, November 2, 2019

Engineering Ethics Henrys Daughters Essay Example | Topics and Well Written Essays - 1000 words

Engineering Ethics Henrys Daughters - Essay Example This also forms part of the engineering ethics. This paper will seek to explore the meaning of proprietary information and issue an example which it will elaborate. It will also explore and thereby give reason as to whether it was appropriate for Henry and his daughters to work on the same project for different parties. It will then elaborate whether there are ethical limits to what the sisters can share with each other about their work. Finally, it will seek to answer whether Senator Bob should have rescued himself from the investigative committee and whatever else he could have done differently as a member of the committee. Proprietary information is sensitive information which a corporation possesses and often uses it to gain advantage in the competitive market. It entails highly classified information which it limits accessibility from its contents. Proprietary information can as well be called trade secret. Property information is vital for the success of most business entities, especially in the current competitive worldwide markets where many business administrators identify that the intellectual resources of business are vastly sought- after items. Policies of business entities may prohibit their managers, workers and agents from revealing or exercising classified or proprietary information beyond the precincts of the business entity or for individual benefit, during or after service, without the appropriate written business approval to do so. Generally, a business entity has to categorize information as proprietary for it to be regarded as classified. Proprietary information may comprise confidential formulas, procedure and techniques used in manufacturing. It can as well comprise a companys trade and marketing strategies, remuneration structure, client directories, contracts and particulars of its computer structures. In some instances, the exceptional information