Sunday, May 24, 2020
Merchant of Venice - Modern Humanitarianism - 1274 Words
centerbModern Humanitarianism has run riot on Shylock. Discuss./b/center br brThe Merchant of Venice is concerned with two issues that were of importance in the Elizabethan Age: Jewry and Usury. It is generally assumed that the Elizabethan attitude to Jewry was hostile and that the execution of Roderigo Lopez in 1594 was characteristic of the Christian rejection of all ÃâJews, Turks, Infidels and Heretics, who were considered to be misbelievers. But this could also be a false assumption, for although the Jews were forced to convert to Christianity to live in England, once they did they were generally left alone. Marlowe in The Jew of Malta portrays a Machiavellian Jew, but one who is Ãârarely mean in his villainy. Usuryâ⬠¦show more contentâ⬠¦These modern attitudes then in the words of Edwin Booth, tend to lift (Shylock) out of the darkness of his native element of revengeful selfishness into the light of the venerable Hebrew, the Martyr, the Avenger. br brShylock can be seen as a product of centuries of racial persecution. Thus Shylock Ãâs character has oscillated between the malignant caricature and the dignified tragic hero. br brIs Shylock a representation of the Jewish hatred for Christians or is he motivated due to his personal hatred for Antonio? When Shylock says, br brI hate him for he is a Christian: brBut more forÃâ¦He lends out money gratisÃ⦠one realises that his hatred is based on money and he is not the religious martyr that he portrays himself to be. He takes a gamble when he lends the money and makes Antonio sign the merry bond. He has no way of knowing that all of Antonios fortune will sink and that he will be able to take the forfeit. His hatred for Antonio and the rest is apparent throughout. br brShylock is the representative of the money code, the greed and the hoarding that is contrasted to the Christian code of honour. But does he embody the evil side of the power of money? Or is he just a scapegoat who embodies the qualities embedded in the Venetians? As mentioned earlier, Shylocks character raises a lot of questions. He may have been victimized due to the Christian hypocrisy. br brIt could be that he is a villain who is
Wednesday, May 13, 2020
Explore a Career as a Marine Biologist
Marine biology is the scientific study of organisms that live in salt water. A marine biologist, by definition, is a person that studies, or works with a salt water organism or organisms. That is a fairly brief definition for a very general term, as marine biology encompasses many things. Marine biologists may work for private businesses, in non-profit organizations, or at universities and colleges. They may spend most of their time outdoors, such as on a boat, underwater, or in tide pools, or they may spend much of their time indoors in a laboratory or aquarium. Marine Biology Jobs Some career paths that a marine biologist would take include any of the following: Working with whales, dolphins or pinnipeds in an aquarium or zooWorking in a rescue/rehabilitation facilityStudying smaller organisms like sponges, nudibranchs or microbes and using them to learn about neuroscience and medicineStudying shellfish and the best way to raise animals like oysters and mussels in an aquaculture environment.Researching a particular marine species, behavior or notion; and teaching at a university or college. Depending on the type of work theyd like to do, there may be extensive education and training required to be a marine biologist. Marine biologists usually need many years of education -- at least a bachelors degree, but sometimes a masters degree, Ph.D. or post-doctorate degree. Because jobs in marine biology are competitive, outside experience with volunteer positions, internships, and outside study are helpful to land a rewarding job in this field. In the end, a marine biologists salary may not reflect their years of schooling as well as, say, a doctors salary. This site indicates an average salary of $45,000 to $110,000 per year for a marine biologist working in an academic world. That may be the highest-paying job path for marine biologists. Marine Biology Schooling Some marine biologists major in topics other than marine biology; according to the National Oceanic and Atmosphericà Administrations Southwest Fisheries Science Center, most of the biologists are fishery biologists. Of those who went on to do graduate work, 45 percent got a B.S. in biology and 28 percent got their degree in zoology. Others studied oceanography, fisheries, conservation, chemistry, mathematics, biological oceanography, and animal scientists. Most got their masters degrees in zoology or fisheries, in addition to oceanography, biology, marine biology, and biological oceanography. A small percentage got their masters degree in ecology, physical oceanography, animal sciences, or statistics. Ph.D. students studied similar topics including operations research, economics, political science, and statistics. Click here to learn more about what marine biologists do, where they work, how to become a marine biologist, and what marine biologists get paid.
Wednesday, May 6, 2020
Ebscohost Free Essays
NORTHCENTRAL UNIVERSITY FOUNDATIONS FEEDBACK SHEET Activity 4 Dear Student, Please use this document to submit Activity 4. You can simply start typing in the first blank page (recommended) or paste in text from another document into the first blank page. Please save this file as: Your last name, first initial, e. We will write a custom essay sample on Ebscohost or any similar topic only for you Order Now g. , PSY5101-4 (DoeJPSY5101-4). Please save a copy of this file for yourself. Academic Integrity: Please see and follow the Academic Integrity Policy in the Learner portal. Your instructor may select this or any activity to review and submit to Turnitin to assess for an Academic Integrity violation Main Task: Evaluate Library Databases and Resources for use in Research For this activity you will do a library search for resources in your area of professional or research interest. Locate two peer-reviewed journal articles, one book chapter, and one scholarly resource (website or other resource). Then, prepare a brief paper on your library search and your results. First, fill out this chart and for each resource include the following: [pic] â⬠¢ Appropriate citation (APA form) for the resource you discovered. â⬠¢ Name of the database you used. â⬠¢ Keywords you used. â⬠¢ Any search limiters such as full text, date, peer-reviewed that you used. â⬠¢ A note about your skills at this point in using the database from which you accessed the resource; what do you still need to practice? Then, conclude your activity with some general remarks that comment on: â⬠¢ How useful was each database for you? What important journals, key scholars, or new ideas did you discover from your search. â⬠¢ How might a library search spark new ideas? As you searched did you find new ideas or new directions for your search? Did the direction your search take you surprise you? Length:à Completed chart and 1 page reflection paper Your paper should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course an d provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards. Be sure to adhere to Northcentral Universityââ¬â¢s Academic Integrity Policy. Submit your document in the Course Work area below the Activity screen. Learning Outcome: 6 â⬠¢ Develop skills in online library database searches. Your instructor will give you feedback using the form below and in margin comments on your work. Reading and using your instructorââ¬â¢s feedback is as much a part of your learning as is reading the course materials and doing activities. Your instructor will not only help you understand the quality of your work on this activity, but will also give you guidance on how to improve your skills and increase your knowledge that, if you follow it, will help you do better on future activities! Feedback Introduction to Feedback: 1. Was the activity completed as instructed? Activity ElementsFaculty Feedback |Chart | | |Includes hree peer-reviewed journal articles, one book chapter, and | | |one scholarly resource | | | | | |Includes | | |Name of the database used | | |Keywords used | | |Search limiters | | |Mention of skills at this point in using each database | | |Discussion of skills attained/needed to be acquired | | |Follows APA form and style | | |Reflection Paper discusses: | | |Usefulness of each database | | |Important new sources, scholars, or ideas | | |Value of searches in inspiring new ideas/ surprises | | 2. Are statements about all readings and resources accurate? 3. Is the writing clear and pe rsuasive? 4. Is the writing correct in punctuation, grammar, word usage, and APA style? Grade and rationale. Grade is based on the following that maps onto the Northcentral rubrics as follows: 70% Content 1. Completion of the activity as instructed 2. Understanding of activity resources 3. Clarity and persuasiveness of writing 30% Presentation 4. Grammar, word usage and APA style For this assignment the topic that I chose to use is one that is very close to my heart. Over the years the research has become more specific in terms of different types of eating disorder as well as the impact that it has on multiple areas of life. For the first article I researched a topic which was first coined by the author Margo Maine, that topic is ââ¬Å"Father Hungerâ⬠. This topic addresses the relationship between an adolescent female and the bond with her father and depending on the factors of the relationship the female is either more prone to developing an eating disorder or not. Although there was a large amount of articles available the further down the list I searched the keywords became less relevant however I kept the theme of eating disorders constant throughout my search. I had a few issues while completing this assignment one being that I was unable to find an electronic resource such as a webcast for my topic. I tried to advance my search in different ways while keeping consistent with the topic and was not successful. The other issue that I ran into is that I was not able to type within the chart that was provided which is why the information is listed below. In order to make it easier to read I made the type of resource in bold print to help separate it out. Something that I need to work on is utilizing other search engines besides EBSCO Host and PsychInfo. Peer-Reviewed Journal Article #1 Article Citation: Fitzgerald, J. F. , Lane, R. C. (2000). The role of the father in America. Journal Of Contemporary Psychotherapy, 30(1), 71-84. doi:10. 1023/A:1003653132742 Database: EBSCO Host Keywords: anorexia in girls and their relationship with their father Search Limiters: Boolean/phrase, peer reviewed journal, English. Human Skills in this database: I am fairly comfortable with EBSCO Host Peer-Reviewed Journal Article #2 Article Citation: Luby, E. D. Weiss, M. (1984). Case study: Anorexia nervosa: A girl and her father. Women Therapy, 3(3-4), 87-90. doi:10. 1300/J015V03N03_12 Database: EBSCO Host Keywords: anorexia in girls and their relationship with their father Search Limiters: Boolean/phrase, peer reviewed journal, English. Human Skills in this database: I am comfortable with EBSCO Host Book Chapter: Citation: le Grange, D. , Lock, J. (2008). Teens with anorexia nervosa: A family-based approach to treatment. In C. LeCroy, J. Mann (Eds. ) , Handbook of prevention and intervention programs for adolescent girls (pp. 242-268). Hoboken, NJ US: John Wiley Sons Inc. Database: EBSCO Host Keywords: anorexia in girls and their relationship with their father Search Limiters: Boolean/phrase, peer reviewed journal, English, Human Skills in this database: I am comfortable with EBSCO Host Scholarly Resource: Citation: Johnson, J. G. , Cohen, P. , Kotler, L. , Kasen, S. , Brook, J. S. (2002). Psychiatric disorders associated with risk for the development of eating disorders during adolescence and early adulthood. Journal Of Consulting And Clinical Psychology, 70(5), 1119-1128. doi:10. 1037/0022-006X. 70. 5. 1119 Database: EBSCO Host Keywords: Eating disorders and adolescence Search Limiters: Boolean/phrase, peer reviewed journal, English, Human How to cite Ebscohost, Essay examples
Tuesday, May 5, 2020
Evaluating Selecting and Controlling Projects MyAssignmenthelp.com
Question: Discuss about the Evaluating Selecting and Controlling Projects. Answer: Introduction The report presents a project methodology and techniques used to implement construction of a shared footpath in Quota Park. The implementation will take place after the project team was awarded a contract after successful bidding. The location of the project is between Kippen St and Bridge Road sponsored by Mackay regional council. The implementation of the project will require suitable approaches and techniques to achieve the required deliverables. The methodology to undertake in construction of the shared footpath in Quota Park will be on project methodologies and techniques. That will involve contacting a project team forming part of the contractor work to implement the project (Whitaker, S. 2014, 23). The project contractor expectation is to employ project management techniques and tools, and to ensure certain legislations, standards and authorizations are followed. Some of the guidelines and acts to follow include the local government act, AS214-1992 standards, permits, Queens Land building services authorization act and BCIP act. The project overview will include operations, labour, plant, materials, supervision and survey. The project manager will be the project contractor who will take a lead in project initiation, execution, control and closure. The project will commence for a period of 6 months beginning in May 2017. The main expectation of the project is that it will be delivered on time, within budget, and it maintains cultural heritage. The project contractor agrees that, by submitting this Tender Response Form, it is bound by the terms and conditions of, and gives all representations, warranties and acknowledgements required by, the Invitation to Tender and attached documents. The project contractor also agrees that its submission will remain open for acceptance by the Council and will be valid and irrevocable for the Validity Period. They will acknowledge that unless otherwise expressly stated, all terms used in this Tender Response Form have the meaning assigned to them in the Tender Process Terms or associated documents. Project specifications and requirements The project contractor will be guided by the Mackay regional council (MRC) drawings specifications (AI-30695-AI30706) that showed specific and the extent of work to implement the project. The project budget is approximated to be AUD 249,000 as per specifications and requirements. The project inclusion include supply and reinstalling of pipe culverts, concrete footpaths, turf, signage, fencing and pavings associated with traffic. Other specified work is by providing a disposal of existing concrete path into MRC landfill facility and restoration of all disturbed areas. Other requirements that the project will execute will include: site establishment, environment management, drainage development, protection treatments, Earth works, road furniture, segmental paving, landscape, and rehabilitation works. A detailed plan indicating project components approaches, tools and techniques needed to be provided by the contractor. In addition they will need to give plan provided for political uncer tainty, rampant inflations, local contractor politics, and government bureaucracy. The deliverables should cover road furniture by having regulatory, warning and hazard signs, and direction and information signs. The project will employ the PRINCE2 approach during execution of the project. The approach will comprise of seven processes: starting up a project, directing a project, initiating a project, controlling stage, managing a stage boundary, managing product delivery, and closing the project. The PRINCE 2 methodology provides a basis in which the project will be planned, monitored and controlled on various phases by phases. It provides a set of activities required to provide direction, management and delivery of a project. Figure 1 provides a diagrammatic illustration of the methodology to be used to implement the project. Starting up a project This stage involves planning for project viability by carrying out feasibility work ( Martinelli, R. Milosevic, D., 2016, 56). Before the commencement of Quota Park shared footpath feasibility studies and stakeholder analysis will take place. Feasibility will include analysis of several factors including: political, economic, legislations, socio-cultural, technology and environment. Table 1 (appendix i) shows a summary of feasibility study for the project. For example geothermal investigations will be carried out. Stakeholder analysis will be used to establish internal and external parties in the project. The parties will be presented in a communication plan (attached in appendix ii). The plan is suitable in ensuring that information is shared with various stakeholders. According to AS standards clause 331 the project contractor is required to keep records of all parties involved with the project. The Respondent offers to provide the relevant Goods and/or Service to the Council in a ccordance with the information, standards, warranties and representations in the Respondents submission (including this Tender Response Form) and the terms of the Contract. This stage involves defining the work to be performed, provision of decisions, ensuring approvals are done, and seeking the required authorization. Project integration is perhaps one of the most critical aspects of project organizational structure and should be planned at the earliest stages of project development (Heagney, J. 2016, 23). The importance of integrated processes, especially on long-term projects, has become a key requirement of all project management methodologies. A fully integrated project requires integration of the internal and external stakeholders, integration of all contracts, integration among multiple designers and contractors, integration of the projects controls, and integration of the projects financial and governance structures (Kerzner, H., 2013, 34). Building a relationship of shared values requires a commitment that begins at project conception and lasts throughout the life of the project. Shared values are those principles or beliefs that the project pa rticipants agree are the most important and will be given priority over all other principles that may arise as the project evolves. The Quota park shared foot path will require certain, permits and authorization. For example the project will need to comply with National code of practice for the construction industry. It will follow clauses 7.3, 8 of Australian standards guiding insurance for persons, works and property. In addition they need to comply with the local Queen land building services authority act of 1991.In guidance of BCIP act and work, health and safety acts the sub-contract informations needs and employees assurance will follow the MRC drawings as per AS 30695-30706 that specifies works and performance according to required standards. Initiating a project The project methodology stage will involve coming up with a detailed plan for the work, strategies, techniques for various functions and activities (Scholes T, 2013, 23). The project manager will have to set up a project site sign that summarizes project informations like project title, name of contractor, project manager, project objective, other sub-contractors and site supervisors. Example of plans required is provided by project management body and MRC drawings. The project will provide plans for quality, communication, conflict management, monitoring and evaluation, procurement, budget estimates, environmental management, and scheduling plans (Mitchell L Springer, 2016, 45). Table 3 (appendix iii) shows overall project management plan for the project. AS clause 33.1 requires the contractor to provide for communication needs, while AS clause 29 requires a conflict management plan is developed to indicate how disputes will be mitigated. Environmental management plan will be formul ated to cover pollutions, stressors, and afflatus to the environment. In applicability table 4 (appendix iv) show several templates and plans for the project. Project manager will provide project charter signpost showing summary details of the project (Kendrik. T, 2014, 23). Financial structure is the manner in which the project is funded, whether through public or private financing, equity, debt, or revenue streams. It also addresses the sequencing and core principles of project finance. The important aspect of project financial structure is not just the source of funding but also the transparency with which the funding is budgeted, allocated, and disbursed (Mitchell L Springer, 2016, 23). The project management stage involves following the various standards and controls to ensure that activities are implemented as per required specifications and client satisfaction (Meredith, J 2014, 23). MRC in its drawings provided the required standards to be followed by the contractors. The project contractor will be highly responsible for ensuring all controls are followed and executed (Nutt, P. 2014, 23). Protection of the site will be done by having fence erected on the project site. The project will implement the following controls: a site control that will not allow fires in the sites. A quality management control plan will be submitted to cover document controls, sub-contractors controls, inspection testings, and non-conformance reports. Council is dedicated to promoting and improving standards of Health and Safety to ensure a safe and healthy working environment for all of its workers, contractors, visitors, customers/clients and the public in general. The project team will provide guidelines in which heritage culture, safety, health and environment will be maintained. Managing a stage boundary The stage will cover the work to be done and project plan to ensure execution and delivery of a project (Rapp, R. 2014, 35). The project manager will be the main accounting person. The project manager who is the principal contractor will carry out the following functions: will remain on the site, facilitate invoicing and payments, carrying out participation consultations, solving construction issues, carrying out meetings, delivery of construction program, and ensuring project deliverables are achieved (De Roo, G. Hillier, J., 2016, 23). The following information is disclosed for the purposes of this Tender. The Respondent must provide details of any actual, perceived or potential Conflicts of Interest that exist or may arise in connection with the making and/or formation of any Contract. The construction management plan and various milestones as per MRC drawings is provided in summary in tables (appendix iv). The stage will involve formulation of review progress scheme and a plan used to plan for each of the stages (Kathy S., 2015, 56). To ensure accountability and ownership the contractor will ensure that members of the public are accessible to Quota park facilities at all times. The project manager will be providing durations that will allow inspection and review testing. In addition non-conformance reports will be provided on a periodic basis to various interested stakeholders. Appendix v provides checklists for various items that will ensure the product is delivered, status reported and performance received. This is the last stage in project delivery. Project closure stage is important in ensuring that the project is terminated or closed. It will occur when project deliverables have been achieved and MRC are satisfied with the output. A certificate of practical completion will be issued within 14 after completion of the project. The certificate will indicate the date of completing the project. Final payment will then take place and handing over ceremony. Table 6 (appendix vi) shows checklists of items and events taking place during project closure. Conclusion The use of PRINCE2 is a simplified procedure that shows two critical processes (planning execution) that project management have used to implement the Quota park shared foot path. The methodology simplifies the complexity expected of the project. It has ensured that documentations, legislations, strategies, techniques and tools for projects have been taken in consideration. The report indicated the description of the methodology to be employed. PRINCE2 was the methodology that was used which explained the project implementation based on the methodology processes. Justification was based on the various documentations and plans for conflict management, monitoring and evaluation, quality management, controls and project scheduling plans. It summary it has provide stages in which Quota Park shared footpath has been planned, managed, monitored and controlled. References lists De Roo, G. and Hillier, J., 2016. Complexity and planning: Systems, assemblages and simulations. Routledge. Heagney, J., 2016. Fundamentals of project management. AMACOM Div. American Mgmt. Assn. Kathy S., 2015. Information technology project management, Boston: United States, pages 89-64 Retrieved from: https://books.google.co.ke/books?id=mPeoBAAAQBAJpg=PA89dq=project+management+methodologieshl=ensa=Xredir_esc=y#v=onepageq=project%20management%20methodologiesf=false. (26/5/2016). Kendrik. T, 2014. The project management tool kit, New Delhi: India, Prentice Hall. Kerzner, H., 2013. Project management: a systems approach to planning, scheduling, and controlling. John Wiley Sons. Koehler, C. 2015. Project planning and management Technique. Public Administration Review, 43(5), 459-466.:1. Retrieved from https://www.jstor.org/stable/975854 (29/5/2016) Martinelli, R.J. and Milosevic, D.Z., 2016. Project management toolbox: tools and techniques for the practicing project manager. John Wiley Sons. Meredith, J 2014. Project management: managerial approach, London: UK, Wiley publishers Mitchell L Springer, 2016. Program management competencies; in Project and Program Management: A Competency-Based Approach, (Third Edition). Purdue University Press. Retrieved from: https://www.jstor.org/stable/j.ctt163t7nr.6. (27/5/2016). Mitchell L Springer 2016. The Importance of program/project Management. In Project and Program Management: A Competency-Based Approach, Third Edition. Purdue University Press. Nutt, P. 2014. Implementation approaches for project planning. The Academy of Management Review, 8(4), 600-611. Retrieved from https://www.jstor.org/stable/258261 (28/5/16) Petronila, A., 2014. Project Management Plan. Docs. School Publications. PMBOK. 2014. project management tool kit, Project management institute, pp. 2-123. Rapp, R. 2014. The project environment and manager. In Disaster Recovery Project Management: Bringing Order from Chaos (pp. 23-42). Purdue University Press. Retrieved from https://www.jstor.org/stable/j.ctt6wq556.6 (28/5/2016). Scholes T, 2013, Evaluating, selecting and controlling projects, New York, US. American Association. Whitaker, S. 2014. the benefits of tailoring: making a project management methodology, New Town Square: USA, PMI Retrieved from: https://www.pmi.org/~/media/PDF/learning/benefits-of-tailoring.ashx. (28/5/2016).
Thursday, April 2, 2020
A Survey of Information Technologies in Logistics Management Essays
A Survey of Information Technologies in Logistics Management Essays A Survey of Information Technologies in Logistics Management Essay A Survey of Information Technologies in Logistics Management Essay A Survey of Information Technologies in Logistics Management Anil Gurung University of Texas at Arlington Department of Information Systems and Operations Management, College of Business Administration Office: Room 630 Business Building Box 19437 701 S West St. Arlington, Texas 76019-0437 Voice: 817. 272. 3528 Email: [emailprotected] edu ABSTRACT This paper analyzes the impact of information technologies (IT) on logistics by conducting a survey of literatures on academic logistics journals and practitioner journals. The literature survey and practice find that third party logistic providers have better opportunity to leverage IT since they need to have interoperable IT systems with their customers. The business philosophy of Just-In-Time (JIT) has also contributed to the impact of IT in logistics. Further, information technologies are identified that has benefited the logistics. Future directions of logistics are discussed. INTRODUCTION The proliferation of information technologies (IT) and the internet technologies have provided impetus and challenges to the logistics. New technologies present new means to manage the flow of information. IT as a productivity tool can be utilized to both increase the capability and decrease the cost at the same time (Closs et al. , 1997). It has been widely accepted that firms can achieve competitive advantage by cost reduction or differentiation with the proper implementation of IT (Porter Millar, 1985). Enabled by IT the logistics has become a source of competitive advantage for many firms. Two streams of research are identified that highlights the role of IT in logistics. First stream relates to just-in-time logistics information system (Anderson Quinn, 1986; Bookbinder Dilts, 1989; Das Handfield, 1997; Gomes Mentzer, 1988; Perry, 1988; Schwarz Weng, 2000; Spencer, M. S. et al. , 1994; Spencer, M. S. et al. , 1996; Takahashi Nakamura, 2000; Titone, 1996; Wafa Yasin, 1996). The other stream is the third party logistics (Lewis Talalayevsky, 2000; Peters et al. , 1998; Sauvage, 2003; Sink Langley, 1997; Vaidyanathan, 2005). Importance of IT in logistics has grown to some extent by business philosophy of Just-InTime (JIT) by firms. With the emphasis of firms on JIT, the impact of logistics has grown as it is increasingly recognized as a source of consistent, low lead time, damage free deliveries (Bardi et al. , 1994). In pursuit of competitive advantages, firms outsource their functions which are noncore competencies so that they can focus on their core competencies. A recent survey found that 83 percent of the surveyed Fortune 500 companies reported having at least one contract with a third-party logistics provider (Lieb Bentz, 2004). Over the years, the use of third-party logistics has been increasing. Similar survey of Fortune 500 companies taken in 1991 had only 38 percent of the respondents reporting the use of third-party logistics provider (Lieb, 1992). The 618 third party logistic operators attempt to harness the capability of information technology to provide superior services to their customers. The objective of this paper is to study how IT has impacted logistics. To this end, literature review of both leading academic and practitioner logistic journals is conducted. The next section will report the framework of logistics. The following section will analyze the IT enablers in logistics. Then, the implications of ecommerce are discussed followed by a section on future directions for logistics. REVIEW OF THE LITERATURE A classification scheme logistics functions provides a meaningful way to study how IT has impacted the various functions of logistics. Previous research in logistics have categorized the use of information systems in logistics in different ways. A system of logistics functions can be divided into following five broad areas (Bowersox, 1974): facility location, transportation, inventory, communication and material movement. Based on the problem areas that application addresses, seven areas of logistics has been identified as facility location, inventory control, order entry, vehicle scheduling, warehouse layout planning, freight rate retrieval, and product and shipment tracing (Ballou, 1976). Another survey identified five categories as facility location, inventory control, transportation, production scheduling, and total physical distribution (House, 1978). These categories treated each category as individual entities rather than a whole system. Noting this shortcoming, Stenger (1986) proposed another classification consisting of transaction systems, short-term scheduling and inventory replenishment systems, flow planning systems, and network planning and design systems. Expanding on the framework developed by Bowersox, Novack et al (1992) divided logistics function into two categories. The first category refers to physical activities that are required various utilities of customer need. These will include inventory, transportation and customer service operations. The second category refers to flow of information or transaction activities that follow or initiate the physical activities. The physical and information flows in logistics function is well-depicted in Figure 1 that shows the categorization of logistics functions as described by Vaidyanathan (2005). As shown in the figure, information flows between logistics function are managed, coordinated and supported by various logistics technologies. 619 Inventory and Logistics Management: Freight Consolidation Freight Distribution Shipment Planning Traffic Management Inventory Management Carrier Selection Order Entry/ Management Information Flow Customer Service: Freight Payments Auditing Order Management Fulfillment Help Desk Carrier Selection Rate Negotiation Information Flow Warehousing: Packaging Product Making Labeling Warehousing Material Flow Transportation: Fleet Management Cross Docking Product Return Figure 1: Categorization of Logistics Functions (adapted from Vaidyanathan 2005) IT enablers in Logistics The literature in logistics is full of instances where information technology has been touted as a means to enhance logistics competitiveness (Bowersox, 1974; Closs et al. , 1997; Rabinovich et al. , 1999; Stenger, 1986). Yet there has been few empirical studies that relates logistics information capabilities to logistics competence (Closs et al. , 1997). A popular framework in information systems discipline put forward by Gorry Morton (1989) place logistics decisions as structured and varying from operational to strategic. The role of logistics information systems as operational and strategic enablers in different areas of the firmââ¬â¢s supply chain has been stated in the literature (Langley et al. , 1988). There has been a shift of IT from being an enabler of operational and material handling functions to being an enabler of decision-making and activityplanning functions within the supply chain (La Londe Auker, 1973). Logistics Information System Logistics Information System (LIS) is the application component of logistics information technology. An effective LIS facilitates the proper information flow between inventory, 20 Information Flow warehousing and transportation to realize the high level of customer service. The ability to optimize the logistics cost and service levels is affected by the LIS of the firm and its partners. Firms that provide better logistics services at a lower cost can have competitive advantage over its competitors (Bardi et al. , 1994). Two classes of LIS has been recogn ized in the literature (Closs et al. , 1997). Logistics operating systems (LOS) refer to transactional applications such as order entry, order processing, warehousing, and transportation. Logistics planning systems (LPS) refer to coordinating applications such as forecasting, inventory management, and distribution requirements planning. EDI Electronic Data Interchange (EDI) has successfully enhanced the communication between firms which is essential for logistics. This technology requires firms to have common data formatting and transmission standards or protocols. Such technologies have been employed by companies to coordinate their value chain activities including logistics. Early applications of EDI has been on transmitting vehicle location information by railways to their customers. Other types of logistics information carried by EDI are purchase orders/releases and changes, advanced shipping notices, bills of lading, and invoices. Timely and accurate information is crucial in decision making about complex logistics problems. Japan Airlines (JAL) adopted EDI to manage their complex value chain logistics required for their operations, including procurement and just-in-time delivery of aircraft fuel, repair and maintenance aircraft parts, food catering and other customer requirements (Chatfield Bjorn-Andersen, 1997). The competitive advantage gained by companies employing EDI is cited in the literature. Firms utilizing EDI were better able to fulfill greater number of services to their customers (Rogers et al. , 1992). Bar coding Bar coding is one of the most IT enablers to date and has made significant impact in the practice. Starting in 1960ââ¬â¢s some of the earliest implementation of bar codes were in rail road cars. Nowadays it is rampant in anything that needs to be identified and tracked. The different type of bar codes are available, known as symbologies, for different purposes. In practice, most firms prefer to use industry standards rather than proprietary standards for most of their bar codes on their products. By following industry standards, bar codes reduce the complications inherent in the use of multiple standards and thus provides a strong foundation for integrating the corporate logistics and the supply chain (Closs Kefeng, 2000). Real-time communications capability The logistics IT capability of real-time communications is essential for maintaining the flow of information. As noted by Dudley Lasserre (1989), one of the important roles of logistics IT is to substitute information for inventory. To make real-time tracking of goods, logistic information systems of business partners should have real-time communications capability. The business partners require an integrated messaging architecture which exchanges business data while customizing business flows and format transformation. Real-time communications also allows for schedule plans to change in dynamic routing and scheduling system when the vehicles are 621 already out on the road. Any last minute changes in routing and scheduling system or constant tracking has been possible only with real-time communications ability of the respective systems. RFID RFID helps to identify, track and locate items automatically. The use of Radio Frequency Identification (RFID) is expected to increase rapidly in coming years. Often referred to as the next step in the evolution of bar-coding, RFID is growing rapidly in the automatic data capture and identification market (Srivastava, 2004). RFID is not a new technology, in fact, its use dates back to 1940ââ¬â¢s but only now it is starting to make a significant impact within the supply chain. The growth in use of RFID will be enhanced to some extent by mandates from large retailers such as Wal-Mart and Target, and the US Department of Defense, who require their suppliers to adopt this technology within the next few years (Asif Mandviwalla, 2005). Among the companies that are piloting RFID in their supply chain management prominent ones are WalMart, Procter Gamble, Coca-cola and Gillette. Although the biggest driver in the popularity of RFID has been supply chain, companies are experimenting in other applications as well. Other applications are theft detection, asset tracking, mobile payments, in-process inventory tracking and luggage tracking. Dell, Seagate, Boeing and Ford are among other companies that are using RFID to track their in-process inventory in manufacturing. An RFID system includes transponders or tags that can identify items ; antennas that allows tags to be interrogated and to respond; and software that controls the RFID equipment, manages the data and interfaces with enterprise applications. RFID has lots of potential to improve the efficiency in the supply chain and reduce waste. For example, efficiency would result from automatic update of inventory system when products with RFID tags are unloaded from trucks into stores. The advantages of RFID over bar coding are as follows: RFID tags can provide longer read distances; store more data; require no direct line of sight between tag and reader; and can collect data from multiple sources simultaneously (Asif Mandviwalla, 2005). There are some technical and business challenges to overcome before RFID can be ubiquitous. Technical issues include problems of interference, security and accuracy while business issues relate to costs and lack of standards. Another significant business challenge in adopting RFID faced by managers is to work out a business case for the executive board. Early adopters of these technologies are marred by problems such as possible adverse consumer outbursts to perceived invasion of privacy, reliability of the RFID system, and issues related to health, safety and IT integration. IMPLICATION OF ECOMMERCE ON LOGISTICS The growth of ecommerce pose opportunities and challenges for logistics. As internet retailing increases the companies are accepting orders from their clientele across the borders. In many instances the location of clients are not covered by any existing distribution system of the companies. On such occasions the companies have no resort but to turn towards third party logistics operators for physical flow of goods. As for the information flow, the companies need to have capabilities for ecommerce applications. The group of technologies and processes for coordinating logistics information flow has been named e-logistics. An important web 622 technology that facilitates the exchange of business data among logistics business partners across different platforms is extra markup language (XML). For example, UPS is exploiting the power of the web services to streamline its information flows for logistics activities such as RFQ, shipping and tracking. Changing Trends in Logistics Consultants are beginning to take an active part in helping out the shippers select third party logistics operators. Shippers hire consultants to help them align business processes with supply chain strategies. The newly coined term ââ¬Å"4PLâ⬠for consultants stands for dominant role that consultants will be taking in managing the resources, the technology and the processes in the supply chain. It is yet to be seen whether the shippers will let the consultants manage all the logistics processes. Instead of handing over the authority to manage the logistics processes to the consulting firms, shippers may choose to develop alliance with the third party logistics operators and maintain the supply chain themselves. The key thing that will allow coordination between shipper firms and the third party logistics will be information technology and management skills to run the supply chain effectively. This implies that firms should also have proper logistic technologies in place to enjoy the full benefits of use of third party logistics. FUTURE RESEARCH DIRECTIONS The research directions that are available for researchers in logistics are numerous. Before companies implement new logistic information technologies such as RFID it is important to assess the viability of adopting the technology. What would be the expected benefits? What is the ROI? Researchers can come up with various econometric models to predict the outcomes of adopting logistics technologies. Modeling techniques can be used to assess the scenarios that would be beneficial for adopting new technologies. As companies are entering into ecommerce, better coordinating techniques are required to streamline logistics activities for transactions taking place on the internet. Collaborative technologies for supporting e-logistics would greatly enhance the future logistics. Multi-agent systems (MAS) provide an interesting avenue of research that is applicable for supporting logistics technologies on the internet. Intelligent software agents can be used to assess the bids offered by multiple third-party logistics operators. To support global ecommerce the companies need to have different options for global logistics. The best way to traverse the geographical distribution is through technology. What are the communication channels and technologies that would benefit the company in terms of monitoring and coordination logistics functions? More empirical evidence will be preferred to establish the direct link between organizational performance and logistics information systems. Researchers can seek to examine the complex relationships between logistics technologies and performance from different paradigms and theories. The perspective of organizational learning can be used to evaluate the performance gained by employing logistics information systems. 23 CONCLUSION The objective of this paper was to observe the impact of information technology on the logistics functions. A literature review of the academic and practitioners journals was conducted. The information technologies that have been used to support logistics functions were discussed. It is evident that academic researchers are aware of new tec hnologies in practice such as RFID. Development in technologies offer sources of competitive advantage for companies. Adoption of new technologies provide challenge and opportunities for the companies. Proper business case and calculation of ROI needs to be done to assess the expected benefits from new technologies. Changing trends in business in terms of ecommerce open new markets for firms for all sizes to expand their market share. Strategic use of information resource would bear results of competitive advantage and thus leading to success stories. The best practices in logistic information technologies need to be adopted by firms in alignment of their strategic goals. Future trends in logistics may prompt companies to rethink their logistics strategies. Firms may choose to use third party logistics in order to focus on their core competencies. However, firms need to have logistics information systems in place that is compatible with the third party operators in order to fully benefit from their services. REFERENCES Anderson, D. L. Quinn, R. J. 1986, The Role of Transportation in Long Supply Line Just-InTime Logistics Channels , Journal of Business Logistics, vol. 7, no. 1, pp. 68-88. Asif, Z. Mandviwalla, M. 2005, Integrating the Supply Chain with RFID: a Technical and Business Analysis, Communications of the AIS, vol. 15, pp. 393-427. Ballou, R. H. 976, Computer Methods in Transportation-Distribution, Transportation Journal, vol. 16, no. 2, pp. 72-85. Bardi, E. J. , Raghunathan, T. S. Bagchi, P. K. 1994, Logistics information systems: The strategic role of top management, Journal of Business Logistics, vol. 15, no. 1, pp. 7185. Bookbinder, J. H. Dilts, D. M. 1989, Logistics Information Systems in a Just-In-Time Environment , Jo urnal of Business Logistics, vol. 10, no. 1, pp. 50-67. Bowersox, D. J. 1974, Logistics Management: A Systems Integration of Physical Distribution Management and Materials Management, Macmillan Publishing, New York, NY. Chatfield, A. T. Bjorn-Andersen, N. 1997, The impact of IOS-enabled business process change on business outcomes: Transformation of the Value Chain of Japan Airlines, Journal of Management Information Systems, vol. 14, no. 1, pp. 13-40. Closs, D. J. Kefeng, X. 2000, Logistics information technology practice in manufacturing and merchandising firms An international benchmarking study versus world class logistics firms, International Journal of Physical Distribution Logistics Management, vol. 30, no. 10, pp. 869-86. 624 Closs, D. J. , Goldsby, T. J. Clinton, S. R. 1997, Information technology influences on world class logistics capability, International Journal of Physical Distribution Logistics Management, vol. 27, no. 1, pp. 4-17. Das, A. Handfield, R. B. 1997, Just-in-time and logistics in global sourcing: An empirical study, International Journal of Physical Distribution Logistics Management, vol. 27, no. 3/4, pp. 244-59. Dudley, L. Lasserre, P. 1989, Information as a Substitute for Inventories , European Economic Review, vol. 33, no. 1, pp. 67-88. Gomes, R. Mentzer, J. T. 988, A Systems Approach to the Investigation of Just-In-Time , Journal of Business Logistics, vol. 9, no. 2, pp. 71-88. Gorry, G. A. Morton, M. S. S. 1989, A Framework for Management Information Systems, Sloan Management Review, vol. 30, no. 3, pp. 49-61. House, R. G. 1978, Computer Models in Distribution Management, Journal of Business Logistics, vol. 1, no. 1, pp. 129-52. La Londe, B. J. Auker, K. 1973, A Survey of Computer Applications and Pr actices in Transportation and Distribution, International Journal of Physical Distribution, vol. 3, no. 5, pp. 92-301. Langley, C. J. , Carlisle, D. P. , Probst, S. B. , Biggs, D. F. Cail, R. E. 1988, Microcomputers as a Logistics Information Strategy, International Journal of Physical Distribution and Materials Management, vol. 18, no. 6, pp. 11-7. Lewis, I. Talalayevsky, A. 2000, Third-Party Logistics: Leveraging Information Technology , Journal of Business Logistics, vol. 21, no. 2, pp. 173-85. Lieb, R. C. 1992, The use of third-party logistics services by large American manufacturers, Journal of Business Logistics, vol. 13, no. 2, pp. 29-42. Lieb, R. C. Bentz, B. A. 004, The Use of Third-Party Logistics Services by Large American Manufacturers: The 2003 Survey, Transportation Journal, vol. 43, no. 3, pp. 24-33. Novack, R. A. , Rinehart, L. M. Wells, M. V. 1992, Rethinking concept foundations in logistics management, Journal of Business Logistics, vol. 13, no. 2, pp. 233-67. Perry, J. H. 1988, Firm Behavior and Operating Performance in Just-In-Time Logistics Channels , Journal of Business Logistics, vol. 9, no. 1, pp. 19-33. Peters, M. J. , Lieb, R. C. Randall, H. L. 1998, The use of third-party logistics services by European industry, Transport Logistics, vol. , no. 3, pp. 167-79. Porter, M. E. Millar, V. E. 1985, How information gives you competitive advantage, Harvard Business Review, vol. 63, no. 4, pp. 149-60. Rabinovich, E. , Windle, R. , Dresner, M. Corsi, T. 1999, Outsourcing of integrated logistics functions, International Journal of Physical Distribution Logistics Management, vol. 29, no. 6, pp. 353-73. Rogers, D. S. , Daugherty, P. J. Stank, T. P. 1992, Enhancing service responsiveness: the strategic potential of EDI, International Journal of Physical Distribution Logistics Management, vol. 22, no. 8, pp. 15-20. Sauvage, T. 2003, The relationship between technology and logistics third-party providers, International Journal of Physical Distribution Logistics Management, vol. 33, no. 3, pp. 236-53. Schwarz, L. B. Weng, Z. K. 2000, The Design of a JIT Supply Chain: The Effect of Leadtime Uncertainty on Safety Stock , Journal of Business Logistics, vol. 21, no. 2, pp. 231-52. 625 Sink, H. L. Langley, J. C. J. 1997, A managerial framework for the acquisition of third-party logistics services, Journal of Business Logistics, vol. 18, p. 163. Spencer, M. S. , Dale, S. R. Patricia, J. D. 1994, JIT Systems and External Logistics Suppliers, International Journal of Operations Production Management, vol. 14, no. 6, pp. 6074. Spencer, M. S. , Daugherty, P. J. Rogers, D. S. 1996, Logistics support for JIF implementation, International Journal of Production Research, vol. 34, no. 3, pp. 701-14. Srivastava, B. 2004, Radio frequency ID technology: The next revolution in SCM, Business Horizons, vol. 47, no. 6, pp. 60-8. Stenger, A. J. 1986, Information Systems in Logistics Management: Past, Present, and Future, Transportation Journal, vol. 26, no. 1, pp. 5-82. Takahashi, K. Nakamura, N. 2000, Reactive logistics in a JIT environment, Production Planning Control, vol. 11, no. 1, pp. 20-31. Titone, R. 1996, Moving Beyond JIT to Logistics Planning, IIE Solutions, vol. 28, no. 2, pp. 22-4. Vaidyanathan, G. 2005, A Framework for Evaluating Third-Party Logistics, Communications of the ACM, vol. 48, no. 1, pp. 89-94. Wafa, M. A. Yasin, M. M. 1996, The impact of supplier proxi mity on JIT success: an informational perspective, International Journal of Physical Distribution Logistics Management, vol. 26, no. 4, pp. 23-34. 626
Sunday, March 8, 2020
Analysis of Character in ââ¬ÅYoung Goodman Brownââ¬Â Research Paper Example
Analysis of Character in ââ¬Å"Young Goodman Brownâ⬠Research Paper Example Analysis of Character in ââ¬Å"Young Goodman Brownâ⬠Paper Analysis of Character in ââ¬Å"Young Goodman Brownâ⬠Paper In Nathaniel Hawthornes short story, ââ¬Å"Young Goodman Brown,â⬠the title character is a man who sets out on a mysterious journey into the woods and unknowingly ends up discovering a truth about himself that he cannot reconcile. At the beginning of the story, a newly-married Goodman Brown bids his young wife, Faith, goodbye and sets out on his journey to meet ââ¬Å"a grave and decently attiredâ⬠elderly man. While at first reluctant to keep on his journey, Goodman Brown allows himself to be persuaded by the elderly man to continue deeper into the forest. Once they reach their destination, Young Goodman Brown is shaken by the discovery that he is at a Black Mass, that most of the townspeople, including his wife are there and that his elderly companion is actually the Devil. Realizing that Faith is about to pledge herself to the Devil, Goodman Brown cries out in dismay. Suddenly, he finds himself standing alone in the forest, unsure if what he ââ¬Å"witnessedâ⬠was real or a dream. Unable to cope with the discovery from his journey that all men, including himself, have the capacity for evil, Young Goodman Brown changes from a confident, religious and trusting man to one ruled by disillusionment, suspicion and fear. In the beginning of the story, Goodman Brown is confident and trusting in what he sets out on his journey, reassuring Faith that he must go and that everything will be okay. As he walks through town, his confidence and intent falters when he spies Faith watching worriedly from a distance. He shakes off his doubts, making the excuse that even though she would not approve of his reason for his journey, it will be just this one time and after that her goodness will rescue him from evil. He starts down the dark road into the forest and he meets an older man, who looks somewhat like himself. As they converse, the man makes Goodman Brown feel uneasy about what he is doing. Goodman Brown travels down the path accompanied by the man and is told that his father and his grandfather before him have both walked this same path. This makes him feel extremely uneasy about the journey. His doubts grow as he meets an old woman, who he has seen before in town, and she converses with the older man about witchcraft and the devil for a short moment. Later on, he becomes distraught after he sees his wifes ribbon flutter to him, indicating that she was taken. When he reaches the Black Mass, he sees the people from town there including his wife who is to be inducted with him, and it is this that changes him to become suspicious and paranoid. When Goodman Brown finds himself standing alone in the forest, he cannot figure out if what heââ¬â¢d just witnessed was real or a dream. When he returns to town the next morning, he cannot see the town or the people in it the same way he did before his journey. After seeing what he saw of others during his journey, he is a sad and distrustful man always wondering about other peopleââ¬â¢s true motives. Now, he looks at Faith, not with joy and love, but with suspicion and condemnation. His determination to avoid evil, doesnââ¬â¢t allow him to appreciate the good he has in his life. When Goodman Brown dies years later, a bitter old man with numerous family members and friends in attendance at his funeral, no one can think of one good thing about him to put on his tombstone. In this story, Goodman Brown starts out trusting and confident, but ends up fearful and suspicious when he discovers that all men, including himself, have the capacity for evil. His loss of faith in himself to overcome this evil, turns him bitter unable to truly love his wife and to see the good in life. In the end, his attempts to keep away from evil by silently condemning everyone around him, he ends up seen by everyone else as a sad man without hope.
Thursday, February 20, 2020
Description of an advert Essay Example | Topics and Well Written Essays - 2500 words
Description of an advert - Essay Example The consumer marketers for the company emphasizeà on push strategiesà where their sales force convinces the retailers and dealers to carry, promote as well as sell the products of the company to the end users (Ryan & Jones, 2012). In contrast, the consumer marketers emphasizing pull strategiesà haveheavy reliance on advertising as well as consumer promotions in drawing customers into the stores. The aspect of tools in terms of choice is influenced through company size. The market leaders afford more advertising while using sales promotion sparingly. In contrast, smaller competitors aggressively use sales promotion (Viardot, 2004). The brand of perfume in the advertisement is Dior perfume for ladies. The product is sleek, executive and fancy targeting the segment that keeps trying new products. There are various scents denoting warmth and comfort including vanilla or sandalwood. Subsequent fragrances, like clary sage or grapefruit could awaken the senses while making the person feel rather energetic (Copper &Hiebing, 2000). The emphasis on the notes in the fragrance alongside promotes the positive feelings across all people while combining such components with original scent combinations which will ensure that curious consumers about the product try it out (Jain & Griffith, 2012). For example, adding black pepper oil to the cologne for women gives it richer and earthier scent. For this reason, the ingredient remains to be an exotic aspect that draws more customers in irrespective of the inclusion of the traditional notes such as musk within the fragrance. The advertiser is rather informative to the audience. The advertisement starts with the identification of the product or service through what it is, who buys it, at how much they pay and how much it costs for to produce it, why consumer demand for the product exists, and where the product sits as compared to similar products and services available currently. The advertisement also describes the marketplac e rationale across various differences between the product and that of competitors (Kumar, 2011). Looking at price, quality, new ideas and approaches, and how the product appeals to specific customer base, the advertisement is responsive to the existing customers as well as new customers attracted into the market. The advertisement is rather specific about the manner in which the product and subsequent service improves on the already existing, the quality control use, the post-purchase evaluation (obtaining feedback) as well as the scope of service to be provide in terms of responsibilities, expectations and liabilities. The colours used in the advertisement relate to the feminine gender. The text is soft and appetizing to the feminine gender as well. The models used in the ad are young, beautiful and aggressive to trigger a sensation brought about by the use of the product in question. In my opinion, they have been used correctly. The marketers in this case prove to be well experie nced sales executives (Mercer, 1996).à Marketing in this case forms the first strength to the companyââ¬â¢s success as well as huge competitive edge. Professionalism is also depicted in the ad and includes everything from the maintenance of confidentiality all the way to the hiring of the very best staff to deliver organisational objectives. Individual attention is based on each client's experience towards tailoring the same into a state of preference. For repeat business and
Subscribe to:
Comments (Atom)