Monday, September 30, 2019

Nike-High End Shoe Market Survey in Bangladesh.Doc

This report was collected from : [email  protected] com 01. INTRODUCTION 1. 1 Consumer Behavior The term consumer behavior is defined as the behavior that consumers display in searching for purchasing, using, evaluating & disposing of products & services that they expect will satisfy their needs. Consumer behavior focuses on how individuals make decisions to spend their available resources (time, money, effort) on consumption related items. That includes what they buy, why they buy it, when they buy it, where they buy it, how often they buy it, how often they use it, how they evaluate it after the purchase and impact of such evaluation on future purchases & disposal. Nike shoes are sold worldwide at high price. People tend to associate high price positively with good quality & maximum performance. Because of the high price, before buying Nike shoes, people undergo extensive information processing, i. e. – ask friends or search the internet to find information about the product. 1. Origin of Report The report has been prepared for Mr. Junaid Khan, faculty at School of Business in North South University as a requirement of MKT344 course. This report is compulsory for students majoring in marketing. 1. 3 Limitations We had faced many obstacles whilst carrying out the survey. Some of the limitations faced were as (a). The survey sample was 50 persons, which was a negligible amount to obtain accurate answer. (b). Peop le were not eager to disclose their true income. (c). The survey was carried out in a posh area of Dhaka city i. . – in Banani, thus leaving a huge number of respondents outside the survey. (d). Some people didn’t read the questionnaire carefully and they gave results which may not reflect their true opinion. 02. RESEARCH STRUCTURE 2. 1 Methodology In preparing this report we have used both qualitative & quantitative method. (a). Primary Data We collected primary data by carrying out a survey on 50 people. In the survey there were 16 questions, all of them close ended. We carried out the survey in three days. (b). Secondary Data We collected secondary data from the retail outlets. We collected a price list of Nike, Reebok & Adidas shoes from these outlets. 2. 2 Questionnaire Design The target sample was set up first before preparing the survey questionnaire. We choose the middle class & upper class educated people as our respondents. That’s why we distributed our questionnaires among the students, faculties & people in North South University. The survey questionnaire was divided in three major parts i. e. – demography, perception about Nike & perceptual mapping of Nike. In the demographic part we asked questions to determine the social class, age group & profession. In the perception section we developed questions in a way to identify consumer perception about Nike itself, usage of Nike & Nike users. In the last part, perceptual mapping we requested the respondents to rank (i. e. – 1, 2, 3 etc) Nike in terms of price, quality & performance compared with other leading brands. Also we asked the respondents to rank features (in order of importance i. e. – 1, 2, 3, 4 etc) that they would consider in buying Nike. 03. WHAT IS PERCEPTION? 3. 1 Perception Perception is defined as the process by which an individual select, organizes & interprets stimuli into a meaningful & coherent picture of the world. It can be described as ‘how see the world around us’. Indeed the study of perception is largely the study of what we subconsciously add to or subtract from raw sensory input to produce our own private picture of the world. Suppose two people being exposed to the same Nike product may perceive differently. One might perceive Nike shoes to be high in performance if he/she is satisfied using it, while the other person may perceive the same Nike shoe having low performance. This proves that perception varies from person to person. 3. 2 Product Positioning The essence of successful marketing is the image that a product or service has in the minds of consumers – that is, its positioning. Positioning is more important to the ultimate success of a product than are its actual characteristics. The core of effective positioning is a unique position that the product occupies in the minds of the consumer. (a). Positioning of Nike itself (1 = Very High, 2 = High, 3 = Average, 4 = Low, 5 = Poor) |1 |2 |3 |4 |5 | |Price |46% |42% |4% |2% |6% | |Brand Image |54% |42% |4% |0% |0% | |Quality |36% |42% |22% |0% |0% | |Satisfaction |26% |40% |30% |4% |0% | |Smartness |30% |42% |18% |2% |8% | (b). Positioning of Nike in terms of users (1 = Strongly Agree, 2 = Agree, 3 = Neutral, 4 = Disagree, 5 = Strongly Disagree) |1 |2 |3 |4 |5 | |Rich People |50% |42% |8% |0% |0% | |Athletes |44% |40% |16% |0% |0% | |Satisfied Past Users |28% |38% |24% |10% |0% | |Brand Loyal C ustomers |30% |38% |20% |4% |8% | (c). Positioning of Nike in terms of use Nike shoes are suitable for ( + 4 = Strongly agree, + 2 = Agree, 0 = Neither agree nor disagree, – 2 = Disagree, – 4 = Strongly Disagree) |+ 4 |+ 2 |0 |- 2 |- 4 | |Only Sport activities |24% |44% |8% |12% |12% | |Only Work activities |8% |12% |42% |16% |22% | |Sports & work |26% |40% |26% |4% |4% | 3. 3 Perception & Purchase Based on perception the consumers purchase intentions occurs. How consumer perceives a product in terms of price, quality & status has a strong influence on purchase intentions & purchase satisfaction. In this section we have figured out only the future purchase intention of consumer about Nike. (a). Perception & Purchase ( + 4 = Definitely, + 2 = Probably, 0 = Uncertain, – 2 = Probably will not, – 4 = Definitely Will not) |+ 4 |+ 2 |0 |- 2 |- 4 | |I will buy Nike next time I buy a shoe |10% |14% |44% |14% |18% | |I will buy a Nike shoe during next 6 months |10 % |4% |36% |18% |32% | |I will recommend others to buy Nike |12% |24% |48% |6% |10% | |I will buy Nike for sports activities |20% |28% |20% |12% |20% | 04. PERCEPTUAL MAPPING 4. 1 Perceptual Mapping The technique of perceptual mapping helps marketers determine just how their products or service appears to consumers in relation to competitive brands on one or more relevant characteristics. It enables them to see gaps in the positioning of all brands in the product or service class and to identify areas in which consumer needs are not being adequately met. 4. 2 Price vs. Quality How consumers perceive the quality of a product is important factor in determining the purchase intention. If the product is not one of high quality the consumer may not be interested in patronizing the product. Besides the quality of a product is a factor that sets the price that consumers are willing to pay. |Fila |Reebok |Puma |Nike |Adidas |Others | |Price |5 |2 |4 |1 |3 |6 | |Quality |5 |3 |4 |1 |2 |6 | [pic] Figure (price vs. quality) From the diagram it is inferred that people perceive Nike as a high priced shoe with high quality. 4. 3 Price vs. Performance How a product is perceived by consumers in terms of performance (output) is a factor that affects the brand equity of the product and influence repeat purchase intention of consumers. If the consumer is not satisfied with the performance of a product, then it is likely that purchase will not be repeated & the manufacturer will not be able to maintain brand loyal customers. | |Fila |Reebok |Puma |Nike |Adidas |Others | |Price |5 |2 |4 |1 |3 |6 | |Performance |4 |2 |5 |1 |3 |6 | [pic] Figure (price vs. performance) From the diagram it seen that Nike is perceived as a high priced shoe with high performance. 05. FINDINGS (a). Demographic Part 01. Gender Male |Female | |66% |34% | 02. Age Group |19-30 |31-45 |>45 | |80% |16% |4% | 03. Marital Status |Married |Unmarried | |8% |92% | 04. Education Level |HSC |A level |Graduate |Post Graduate |Doctoral | |38% |10% |40% |10% |2% | 05. Gross monthly family income (In Taka) |25,000-39,999 |40,000-54,999 |55,000-69,9999 |>70,000 | |30% |22% |20% |28% | 06. Profession Student |Government Service |Private Service |Business |Self Employed | |76% |0% |18% |0% |6% | 07. I live in a |Rented House |Own Apartment |Rented Apartment |Government |Own House |Hostel | | | | |House | | | |16% |26% |16% |6% |32% |4% | 08. I reside in Motijheel |Purana Paltan |Segunbagicha |Shantinagar |Malibagh | |0% |8% |2% |0% |4% | |Dhanmondi |Mohammadpur |Lalmatia |Mirpur |Gulshan | |8% |8% |0% |10% |8% | |Banani |DOHS |Baridhara |Uttara |Others | |4% |2% |2% |14% |30% | (b). General Part 09. I recognize Nike by Logo |Name |Logo & Name | |30% |6% |64% | 14. I know about Nike from (Rank in order of importance i. e. – 1,2,3 etc) |TV |Newspaper |Billboards |Magazine |Internet |Friends | |1 |6 |5 |2 |3 |4 | 15. If I buy Nike the most important fe ature to me would be (Rank in order of importance i. e. – 1,2,3 ) Self Image |Style |Color |Status | |6 |5 |4 |3 | |Price |Need Fulfillment |Original |Country of Origin | |8 |2 |1 |7 | 16. Please rank the following brands based on price, quality & performance (i. e. – 1, 2, 3 etc) |Fila |Reebok |Puma |Nike |Adidas |Others | |Price |5 |2 |4 |1 |3 |6 | |Quality |5 |3 |4 |1 |2 |6 | |Performance |4 |2 |5 |1 |3 |6 | 06. SURVEY ANALYSIS Most of our respondents said they recognize Nike by logo and name, because Nike symbols along with their name are stamped on shoes worldwide and also on various garments. The advertising emphasis of the use of Nike shoes by prominent sportsmen tends to make consumers feel that wearing Nike shoes is a form of smartness. The brand image is high because people who wear Nike shoes in general, are convinced that Nike keeps up to its standard and also after using Nike shoes, they are satisfied with the quality of the shoes and the purpose for which they bought the shoes. People think that price of Nike is high, because in comparison to other brands like Adidas, Reebok, Puma and Fila, the price is a bit on the high side. The price data collected from the outlets proved people’s perception to be true. Rich people because of their attempt to enhance their status symbol usually buy goods of reputed brands, so more rich people tend to buy Nike shoes. Athletes tend to buy Nike shoes because of the comfort and Nike has always promoted itself as being a sports oriented shoe company. In its advertisement, Nike has used mostly sportsmen like Andre Agassi and Michel Jordan to convey this message. Nike shoes ensure high performance for various sports activities and are smooth when it comes to running or playing sports and are durable, so people tend to think that Nike is suitable mostly for sports activities. Brand loyal customers are used to the comfort in using Nike brand, but when using other brands they don’t feel the same level of comfort or satisfaction that they get from Nike. As a reason they stick to using Nike shoes and for them it is a status symbol. Majority of our respondents were reluctant to buy Nike shoe, although they perceived Nike having a high brand image, maybe of the high pricing of Nike shoes. Since they do not have much disposable income, they cannot afford to buy Nike shoe (yet they wish to buy) and resort to buying cheaper brands like Fila and Puma, although they know that the quality of Nike is much better. In Bangladesh because of the cable television, people are exposed to enormous amount of foreign medium. People are exposed to Nike shoes advertisement on foreign channels, so majority said they came to know about Nike shoes first on television. Also in Bangladesh a lot of foreign magazines including sports magazines are available. From these magazines, in hich Nike ads are depicted, people came to know a great deal about Nike shoes. In the Bangladeshi newspapers, there are hardly any ads of Nike shoes, so only a tiny portion of our respondents came to know about Nike shoes from newspaper The people in Banglades h who intend to buy Nike first see whether the Nike shoe is original. Consumers want original shoes because of their status and self-esteem and it helps them fulfill their ego need. Price comes last for these customers, because most consumers can afford the price. 07. CONCLUSION Nike manufacturers have tried to create a distinct positioning of the Nike shoe in terms of quality and satisfaction in comparison to its other competitors i. e. – Adidas, Reebok etc. People in Bangladesh have found Nike to be of high quality and to be of great satisfaction to them, but due to their income limitations, most of people are uncertain as to whether they will buy a Nike shoe now or in the near future. Manufacturers have tried to create a distinct image of Nike in consumers mind, which proved to be successful according to our survey result. From the survey we found that Nike is perceived as a high priced & high brand image shoe in the consumers mind. Thus it can be said that Nike is a mega brand in Bangladesh, like it is in other parts of the world. 08. BIBLIOGRAPHY (i). www. nike. com (ii). Consumer Behavior, LEON, G. SCHIFFMAN AND LESLIE LAZAR, 8th Ed, Pearson Education, Singapore.

Sunday, September 29, 2019

Inherit the Wind Essay

Inherit the Wind â€Å"Here in Hillsboro we are fighting the fight of the Faithful through-out the world! † (53) Inherit the Wind is the epic legal drama, written by Jerome Lawrence and Robert E. Lee, of a controversial subject: creationism versus Darwinism. Hillsboro is extremely determined to defend creationism. Though fictional, Inherit the Wind is based on the Scopes Trial, which occurred in July of 1925 in Dayton, Tennessee.The play was published in 1957, a period of time where people, especially those of Hillsboro, the small town in which the play is set, were only allowed to teach the theory of creationism; teaching evolution was against the law. The people of the town were extremely religious. To not believe in the bible or attend church would result in being shunned by Hillsboro. In Inherit the Wind, the attitude of Hillsboro subtly changes throughout the course of the trial of the young schoolteacher who purposely broke the law.The town reflects the fiercely religiou s and biased views collectively shared by its people, such that it becomes an important character in itself. The changes in the town’s attitude are small, evident by certain individuals within the town learning to open their minds and accept the theory of evolution. Before the trial of Bert Cates, the attitude of the town is reflected by its behavior towards Bert Cates, Henry Drummond, and Matthew Harrison Brady. Bert Cates is a schoolteacher who was imprisoned for teaching evolution to his class, something Hillsboro considers to be very wrong.Rachel Brown is the daughter of the Reverend, and though she tries to defy her father and his views, even she sides with Hillsboro and does not understand â€Å"why [he] can’t be on the right side of things† (8). The â€Å"right side† is Hillsboro’s side; the only â€Å"right† answer is in the bible. Because Hillsboro is so close-minded, it refuses to accept any other theories or opinions. It wants Cat es to be found guilty. It considers him a criminal for what he did; therefore, the bias against him is clear before the trial even begins.In turn, Hillsboro is equally unhappy with the defense attorney, Henry Drummond. Drummond is a renowned lawyer who is described as â€Å"the most agile legal mind of the Twentieth Century† (22). He has the ability to win the case, something Hillsboro assumed would not to be done. Reverend Brown calls him the â€Å"Devil† (25) because â€Å"[one] looks into his face, and [wonders] why God made such a man† (25). Given this description, Hillsboro assumes it to be true and treats him as though he is evil. Hillsboro thinks Drummond does not believe in God because he has won cases where the defendants were clearly guilty.Hillsboro knows that Drummond is an excellent lawyer, and with him defending Cates, the trial could have a remarkably different result from what Hillsboro was expecting. By calling him the â€Å"Devil†, Hills boro is able to turn its people against Drummond. However, the attitude Hillsboro displays towards Matthew Harrison Brady is completely opposite. The famous lawyer is the lead prosecutor for the trial of Bert Cates. Hillsboro worships Brady; he is devoted to the bible, believing â€Å"all the answers to those questions are in the Bible† (34) and that evolution is nonsense.Hillsboro is overjoyed, and rather star struck to have him in town. All of Hillsboro gathers to welcome Brady with a feast and frequently sings, â€Å"It is good enough for Brady† (17). The difference with which Hillsboro treats Brady compared to Cates and Drummond is colossal. Everyone is completely taken in by his charm and presentation; each hang on every word he says. Before the trial begins, Brady already has Hillsboro on his side. With the negative attitude Hillsboro displays before the trial, how could Bert Cates stand a chance against their bias and closed minds?Throughout the trial of Bert Ca tes, the behavior and bias Hillsboro had previously displayed, remains, and escalates, to the point where even Brady feels uncomfortable. The meaning of religion to Hillsboro is reflected by its people, shown by the answers and opinions given by the potential jurors. The members of the jury were selected by Drummond and Brady, both of whom had to agree upon the individual in order for them to serve as a juror. Brady does not care whether it is a fair trial; he only wants to win.This could be almost guaranteed as the jurors are all members of Hillsboro and many seem to â€Å"believe in the Holy Word of God †¦ and Matthew Harrison Brady† (36). It is impossible to have a fair trial for Bert Cates when the jury members are all chosen from Hillsboro, thus it is clear they do not want Cates to stand a chance. A message from Reverend Brown to Hillsboro further illustrates this. At the end of the first day of the trial, the Judge announces â€Å"there will be a prayer-meeting t onight on the courthouse lawn, to pray for justice and guidance†(42), a message Reverend Brown asks him to relay.The judge seems to see nothing wrong with doing so, demonstrated by his reaction to Drummond’s objections. Clearly the judge does not care about the fairness of Cates’ trial, as he openly announced a meeting to pray for a guilty verdict. There were no evolutionist meetings being held, as Drummond pointed out. The only option Hillsboro gives is to believe in the bible. The degree of the importance of religion to Hillsboro is revealed during the prayer meeting. Reverend Brown becomes very passionate and eventually deranged when telling Hillsboro how God supposedly created the world in seven days.Hillsboro, in turn, reacts fervently, screaming and roaring â€Å"Hosannah! Bless the Lord who created us! † (57) And â€Å"Amen, amen! † (57). The Reverend goes on further to directly talk about Cates, asking Hillsboro â€Å"Do we call down hellfi re on the man who has sinned against the Word† (59), which Hillsboro agrees with, encouraging the Reverend to continue in his rant, and ask God to have Cates’ soul â€Å"writhe in anguish and damnation† (59). It is at this point in time that Brady realizes the extent Hillsboro is willing to take religion.Hillsboro would have Cates sent to Hell and eternally damned because he chose to teach evolution. As much as Brady is a religious man, even he believes Hillsboro has gone too far. The trial of Bert Cates has illuminated how religious Hillsboro truly is and how the opinion of a few people can impact an entire town. After the trial of Bert Cates, there is a small, but nevertheless definite, shift in attitude of Hillsboro, demonstrated by the outcome of the trial and individual character changes.Bert Cates is the first person in Hillsboro to dare oppose the law against evolution; this is the first step in bringing about the change. Although his actions are technical ly wrong, Cates believes he did the right thing and refuses to stand down. Even the woman he loves, Rachel Brown, begs him to â€Å"tell ‘em it was all a joke† (7), and though he wavers, he sees the trial through to the end. Cates opens the door to a different side, one which most of Hillsboro has never even considered, at least not openly.Though Hillsboro may not accept or like evolution, the town was forced to contemplate the idea of it because of the trial. Rachel Brown is the Reverend’s daughter, and throughout the play, struggles to stand up to her father; the conclusion of Cates’s trial allows her to find the courage to finally do so. Rachel is terrified to show her support of Cates for fear of her father. Reverend Brown answers Brady’s question â€Å"My daughter will be pleased to answer any questions about Bert Cates† (22).Before the trial begins, Rachel refuses to stand up for herself or answer for herself. She begins to oppose her f ather, when she jumps on stage and implores her father â€Å"[not to] pray to destroy Bert! † (59), during the prayer meeting, something she could not have done at the beginning of the play. She has had creationism enforced upon her for her whole life, yet Cates’s trial opens her mind to evolution, when Drummond questions Brady on how the World could possibly have been created in Seven days. The trial also gives her the strength to stand up to her father.A change in the attitude of one person can have a significant impact on the people around him, especially in a town as small as Hillsboro. Rachel cannot have been the only person in Hillsboro to doubt creationism after the trial; however, if she were, her new outlook would surely inspire those surrounding her. The result of the trial plays a key role in the change of Hillsboro’s attitude. Although the jury finds Cates guilty, his punishment is only a five hundred dollar fine. This case turned into something much bigger than just a small town case; the entire state was waiting with baited breath to hear the results.Yet after all the fuss and trouble that was made about this case, to fine Cates only five hundred dollars is astounding, especially considering Hillsboro wanted to have Cates’s soul â€Å"writhe in anguish and damnation† (59). The jury is made up of biased people who were completely close-minded to begin with, but Drummond is able to convince Hillsboro to slightly open its mind, which is an incredible accomplishment. Although Cates technically lost the trial, it should be considered a victory. In Inherit the Wind, the attitude of Hillsboro subtly changes throughout the course of the trial of the young schoolteacher who purposely broke the law.The town reflects the fiercely religious and biased views collectively shared by its people, such that it becomes an important character in itself. The changes in the town’s attitude are small, evident by certain individ uals within the town. The people of Hillsboro are extraordinarily similar. They all think, feel, and act the same way. There are few individuals who stand out in the town, as most are from the same cookie-cutter mold. Because the people are so alike, they are able to blend into one character that represents all of them.As a result, the town becomes a vital character to the story. Hillsboro is willing to send a schoolteacher to jail for voicing his opinions, because he goes against what the town collectively believes to be â€Å"right†. Through the course of the play, we are given insight into how much religion can mean not only to one person, but an entire town, and the lengths a town is willing to go to prevent change. Setting this play in a different town, one without the same religious beliefs, would alter the story immensely; in fact, the entire trial may not have occurred.

Saturday, September 28, 2019

Behavior & Teams

The reading made me realize that group and teams alike have their own purposes. However, I could not help but notice that teams have more advantages as compared to a group. I believe that every teams starts out as a group and after some time they would then on develop into a team. Being a team is necessary if one needs to truly develop and flourish.I realized that people or organizations would have better use of a team than a group especially since in a team there could be no room for someone who does not wish to participate (in contrast to a group wherein a person could just sit around doing nothing at all).The reading also made me realize that in an organization there is both a team and a group. The group should do everything in their power to develop themselves into a team. In a group the individual importance of a person is minimized since Person A could still do Person B’s job even if Person B does not appear in a meeting. In contrast, a team could not operate without one of their members since a team was developed based on their own personal expertise which in turn could better ensure their success.The presence of dependence and independence makes a team something far better and more useful in an organization especially since in a team everyone could meet in the middle and discuss their own ideas which one could not do in a group since only one person has the power to decide (the leader). The reading also made me realize the importance of sensing the needs of others. In professional situations, sensing is very important so that one would be able to gauge the needs of the teams and resolve the conflicts in the process.After sensing what the problems or the issues may be I should then move on to diagnose what is to be done to resolve the issue and I could better do that by opening the issues in the team. By doing a constructive criticism or the like each member of the team could then move on to contribute what is to be done to better the team’ s position. We could also tell each other where one went wrong in order to ascertain that such things would never happen again.This is one of the most successful plans there could be in ensuring the harmony in a team which could address everyone’s need. References: Mackin, D. (2007). The Difference Between A Team And A Group [Electronic Version] from http://www. sideroad. com/Team_Building/difference-between-team-and-group. html. Williams, N. (2000). The Top 10 Key Differences Between a Team of Individuals and a Group of Individuals [Electronic Version] from http://topten. org/public/AE/AE244. html.

Friday, September 27, 2019

Friedman's statement (published by The New York Times Magazine in Essay

Friedman's statement (published by The New York Times Magazine in 1970) suggests that economic and social objectives are separ - Essay Example CSR has however remained a debatable topic, as regards actual role played by corporation within societies, as firms have attempted to minimise their CSR roles or devised ways to use social responsibility as another method (a branding tool) for increasing their profits. Milton Friedman has been a major proponent of anti CSR movement, and has written articles, which are considered as seminal pieces of work against CSR and corporations that promote CSR. This is evident in his 1970 article, â€Å"The Social Responsibility of Business is to Increase its Profits,† published by The New York Times Magazine in 1970, where he claimed â€Å"businessmen who talk this way are unwitting puppets of the intellectual forces that have been undermining the basis of a free society these past decades† (Friedman, 1970: 1). He further suggested that social and economic goals are distinctly different entities for any corporation and the two cannot work hand in hand. In this context, the articl e will explore Friedman’s ideas in the light of different views about the nature of the corporation, as discussed by Klonoski’s (1991) in his article, â€Å"Foundational Considerations in the Corporate Social Responsibility Debate.† The researcher’s stand that CSR is an important part of modern business strategy will be illustrated with examples from scholarly articles and real life instances. Discussion There is a great deal of significance associated with the concept of CSR, as conducting business is a process selected by society for manufacture and dissemination of products and services. Initially, it was felt that any business firm could ful?l its social obligations by merely sustaining in the competitive market and optimizing their pro?ts. The business firms could use all social and natural resources for making profits simply by adhering to the basic governmental rules imposed for controlling malpractices. The existing market system created a framewo rk essential for monitoring and controlling the system, while pro?ts guaranteed efficiency and incentives. Under this system, self-interest and ethics (workplace and individual) formed to be main guiding principles for a corporation’s operations. Therefore, by generating pro?ts, firms helped in growth and development of a country’s economic system that in turn created a scope for increased employment and income generation for more people (Beck, 1992). Therefore, CSR was limited to improving the bottom line, and it was generally acknowledged that a business firm would fail to survive without making pro?ts; hence, the question of assuming a social role was never raised. It was only recently experts opined that besides having profit-making goals (or economic objectives), corporations must work towards addressing certain public expectations, that is, aim at social welfare. Owing to this, the very concept of social responsibility associated with pro?t optimization underwent changes, and social and economic goals both received equal attention. Buchholz (1991), while defining CSR, distinguished ?ve main elements that delineate the term. These are: Business firms have obligations that go beyond manufacturing products and providing services at a financial gain; These obligations help to resolve significant social issues, especially ones created by the firms themselves; The impact from the operational

Thursday, September 26, 2019

Importance of Being a Learned Person in a 21st Century Socioeconomic Essay

Importance of Being a Learned Person in a 21st Century Socioeconomic Society - Essay Example an society today, it has become the culture to work for a salary to pay for the expenses of living and the increasing unemployment rates in the country, however means that there is going to be a lot of hardship for the unemployed individuals, and their families. Most of the people who end up being unemployed are those who have not gone to college and therefore cannot be considered to be learned. This has created a situation where whenever there are any economic problems, then these people do not have the necessary skills either to move to another sector of the economy, or move into another country where there are more opportunities for their own advancement. Being a learned person is a fact which ensures that an individual has the best options in life since they can be able to have flexibility not only within their societies, but also at the international level (Boardman and Sandomir 36). There have developed quite a number of reasons why there is a high unemployment rate in the coun try and most of these are related to the low number of individuals who can be considered to be learned. In many instances, this comes as a surprise and people are hardly ever prepared for them and when these newly unemployed individuals attempt to get other jobs, their potential employers are often exceedingly wary because of the fact that they do not meet the necessary academic qualifications to take on new jobs when their previous ones come to an end (Dash 10). Another cause of the high rates of unemployment in the United States are instances where individuals get laid off their work because their positions are no longer needed by their employers and this is largely because of the introduction of new technology and without the necessary skills that can only be acquired from a good... This essay specifies numerous advantages, that obtainment of quality education brings to a person`s life. In the modern world, one of the most important aspects that define individuals is based on the level of education that an individual has achieved and because of this, many individuals often strive to achieve academic excellence. Education is a basic human right that nobody in the whole world should be denied and it is necessary for it to be made universal. Education is necessary when dealing with almost all aspects of life, because individuals have to make the most educated decisions about all that they do. It is a well known fact that people have to study to a certain level in order to get the kind of job that is equivalent to that level of education. Quite a number of individuals all over the world, however, tend to start businesses without having to study. Most of the people who end up being unemployed are those who have not gone to college and therefore cannot be considered to be learned. In fact, an individuals who is learned can be able to work anywhere in the entire world as their knowledge and skills are universal and can be used by many different countries. The importance of individuals being learned has to be taken seriously because this is the only way through which they can be able to survive in an increasingly globalised world. Individuals, who acquire an education, are the best suited to succeed in the current world, because being learned ensure the breaking of all the possible constraints

Description of Temple Run Game Essay Example | Topics and Well Written Essays - 750 words

Description of Temple Run Game - Essay Example From this discussion it is clear that  the player is required to collect coins on the way in form of diamond coins primarily yellow but depending on coin value, they can change to red and blue. The collected coins are eventually used in the games store where the player can buy power ups that are beneficial to unlock characters. Mega coins retail at 150coins which is the coin value three times. Boosts helps up to 1000meters as the invisibility lasts 30seconds. Two point coins starts at 1000meters while three point coin starts at 2000meters. As the player continues to survive the higher score, he accumulates points which are five times the value of collected coins.  This study stresses that the target of Temple Run Brave is virtually everyone. Its’ design ensures it can be used by almost everyone who owns a smartphone, tablet or computer and loves speed and racing. The extensive market research that the Temple Run app did is the cause of their success in the flooded market. It is important to note that in the over one billion smartphone and tablets users, games command more than 40% of the time spent on apps. Temple Run has been designed in such a way that it is easy to learn starting from simple to complex tasks. This allows a wide range of users depend on their capabilities and age. The predictable playing pattern allows for all genders to play it hence a wide market range.  Temple Run can be played by children, young adults and adults with a smartphone, tablets, laptops and computers. It is easy to download and can also be played offline.

Wednesday, September 25, 2019

Describe the economic background of British Airways. Identify three Essay

Describe the economic background of British Airways. Identify three probelms and propose three solutions - Essay Example it would be to exhibit the proclamations of this corporation, we must first understand British Airways’ true economic past and current situation that we may assess any apparent failures and successes. British Airways has, in its years of operation, has continued its vocation with responsible and efficient provided services. In the suspect economy the international aviation market now possesses, it is almost ridiculous to specifically relate past economic standings to those of today, for today’s market differs even from yesterdays, ad infinitum. However, in keep this notion, we may view British Airways’ past economic conditions in comparison to the company’s internal and separate record. To be most efficient, we view the status of the company from the year 96 to present; keeping in mind, of course, how absolute the success of this business has been. With it’s highly regarded standing as one, if not the only, leading carrier in the UK, British Airways has carried millions of passengers out of 550 airports including its main station which is the largest international airport in the world; Heathrow. The company has multiple industry partners including franchise partner GB Airways, British Mediterranean, Sun Air and Comair, and â€Å"oneworld† partners Iberia, Qantas, Finnair, American Airlines, Aer Lingus and Cathay Pacific Airways. UNICEF, British Airways’ United Nations Children’s Fund, commenced in April 1994 and has raised funds to support many a good cause; the most recent development in the effort being the launch of the â€Å"Change for Good† programme which offers funds raised to aid needy children across the world. In 2005 alone, British Airways received 34 Awards in various months for its services and overall business standards. Among them: â€Å"Global 100 Most Sustainable Corporation s,† given by Corporate Knights Inc at the World Economic Forum in February; Best International Airline and Best Domestic Airline, given by the Association of

Tuesday, September 24, 2019

National Security Strategy Essay Example | Topics and Well Written Essays - 1250 words

National Security Strategy - Essay Example The NSS 2010 U.S strategy seeks to build coalitions with strong international support and participation to address these issues. The NSS focuses on the security of the United States, its citizens and the US allies and partners. In addition to detecting threats posed by weapons of mass destruction specially deployed by fundamental extremists operating from within and outside the borders mentored by state or non state actors 1. The Quadrennial Defense Report (QDR) identifies the changing environment in which America will confront the challenges and threats of future. CSDFG identifies itself with National Military Strategy (NMS) with regards to the aims of the National Security Strategy (NSS) as it describes a strategic plan for the military force. 1. National Security Strategy. The white House, Washington May 2010 The strategies set forth in the DSG and CSDJF recognize the changes required for success in the new environment to meet the challenges and threats. Accomplishing both objecti ves will require stronger cooperation from our partners to deal with global challenges. Complementing the objectives in the NSS, the Defense Strategic Guidance (DSG) highlights the importance of transitioning forces to address the challenges of the future. The guidance explains the need for rebalancing the US military to meet the ends. The assessment broadly echoes the president’s strategic direction of transitioning defense forces from present war to get organized for the future challenges that would broadly address the national security concerns of the United States. Thus, the current transition, states the Chairman’s strategic direction for the joint force, is a selective and non-negotiable assimilation of capabilities to reconstitute the forces after the long period of war. Whereas the ways of achieving this fully equipped joint force are described precisely in the CSDJF. For example, the force will have a command over the cutting edge information technologies in n etworked special operations, including cyber, intelligence and reconnaissance to ensure much controlled and collaborative operations 2. On achieving the ends, CSDJF further explains that, â€Å"the implementation of these strategies will be a regionally-postured, but globally networked and flexible force. It can close on its objective at a time and place of its choosing and produce irreversible and stable outcomes. Finally, it is a joint force that provides a degree of security in balance with what the nation demands and is willing to pay† 3. Hence, the DSG and CSDJF, to a great extant, are elaborative on the same issues that the NSS points out as areas related to our national security. 2. Dempsey, E. Martin. Chairman’s Strategic Direction to the Joint Force Joint Chiefs of Staffs 3. Ibid While CSDFJ is guidance in tandem with the NSS and the QDR, it is very vague in advising military objectives. Thus, many issues are left for interpretation, whereas, National Military Strategy (NMS) specifically recognizes the ends to achieve with appropriate allocation and use of resources. Both documents, NSS and QDR, are intentionally vague to allow for planning. The NSS specifies the policy of United States towards security threats caused by cross

Monday, September 23, 2019

Alternative Dispute Resolution - Arbitration & Mediation Essay

Alternative Dispute Resolution - Arbitration & Mediation - Essay Example Independence is the lack of any level of association involving the party or parties and the arbitrator or association involving the object of misunderstanding and the arbitrator that would make it unsuitable or the arbitrator to arbitrate among the parties to the dispute. This definition of independence, therefore, is two fold: the lack of a set approach in respect-involved issue by the arbitrator and the lack of any individual association with the parties to the dispute. The impartiality and independence of arbitrators needs safeguarding since the process maybe used to delay justice. Justice McCarthy in R v Sussex stated that justice should be done and seen as done. There exist test to determine the existence or non-existence of bias in an arbitration process. The first test is whether, in the initial point, there was the risk bias and second if, a reasonable individual would have suspected bias in the situation. The enactment of the Human Rights Act of 1998 done in the United Kingd om and it came into operation on October 2000. The intention of the Act was to give an effect to the containment of rights in the European Convention of Human Rights. The sixth article of the act provides that everybody be entitled to a just hearing by an impartial and independent body recognized by law. Accordingly, The court in its decision in Medicaments and Related Classes of Goods, Re, decided one month afterward, took into consideration the Strasbourg jurisprudence in the determination of independence and impartiality of a body. It came into the conclusion that the test in Gough was no longer suitable because it laid emphasis on the view of the court in relation to the facts. The Court of Appeal made a suggestion of a modest modification to the test established in Gough. The applicable test was if the ascertained circumstances by the court would result in a knowledgeable and fair-minded observer to reach a conclusion concerning the real possibility of a biased tribunal. The En glish Arbitration Act inquires if the conditions in the situation may give lead to reasonable doubt concerning the independence or impartiality of the arbitrator. The IBA guidelines on conflicts of interest in international arbitration meant to make a clear assessment of impartiality and independence by the provision of a meticulous guidance on application of the same in practice. In this regard, there are three lists devised to achieve the purpose, which are the, orange, the green and the red lists. The lists try to try to mark general circumstances where bias suspected in harmony with their relative potentiality to give rise to reasonable doubts concerning the arbitrator’s independence and impartiality. In that, view the red list comprises of adverse occasions of challenges faced. The red list has two sections the situations that can be waived and those that cannot be waived. If the situation of a case falls within the situation that cannot be waived on the red list, the pa rties involved do not posses the independence to relinquish their opposition to the impartiality. The situation is so since in some circumstances, the interest of the public necessitate that proceedings of the arbitration halted notwithstanding non-objection of the parties. The position is like the circumstances, which give rise to automatic prohibition under the prevailing English law. The part that has the

Sunday, September 22, 2019

High School Essay Example for Free

High School Essay I like to believe that everyone has their own goals and dreams they would like to accomplish. Every person’s dreams and goal differ from one another. My name is Gwendolyn Pavon, and I too, have goals and dreams that I hope to accomplish. Having a future and a good career is something I have always dreamed about. My current academic goals are to stay in school. Being in school is my main priority, and focusing on my schoolwork is important to me. I have the opportunity to be in school and receive financial help and I won’t let this opportunity pass by. I realize how hard things are getting in the real word. Careers are becoming harder to find and to keep, therefore I’m willing to get an education to get a good career. I never really had people to motivate me to stay in school until my senior year in high school. I opened up to my English teacher about a couple things, and she made me realize a lot. I remember being younger and my father telling me to say in school, but after he left I didn’t have much motivation. My English teacher always pushed me into doing my work and staying in school. It felt nice knowing she cared about me getting an education. She helped me with scholarship applications, with getting everything done to get into college and helped me out with anything I needed. College isn’t as easy as high school, but I’m honestly willing to do anything to get a degree and hopefully become a nurse one day. All the work, and waking up early will be worth it in the future. Soon I will have to get a job and save money for my own car. I’m not so sure if having a job and being in school will be so easy, but if it gets tough I will not give up. I have understood that there will be complicated times in life, but the one thing I will never do is give up. I don’t have much people to push me into doing what I want, but I push and motivate myself. I want the best things in the world, and having the best things means working hard to get them. I’m not the smartest person out there, but I know that I’m a pretty bright person. Although being in school isn’t something I like so much, I have decided to continue going. My weaknesses as a learner outweigh my strengths. I can get very distracted easily and I have trouble staying focused on a topic. I have to constantly remind myself to get back on topic. Getting  distracted interferes with my learning, but I work at it every day to try to focus on my work. The good thing is that if something really interests me, I give it my full attention. Being in school and sitting through fifty minute classes isn’t something I always enjoy but I do have days where I enjoy the classes. Focusing on my school work will be a little complicated for me, but I’m willing to put in all my effort to continue my education. Getting an education, being successful, and accomplishing my goals and dreams are really important to me. I will prove to people that I will be successful and continue getting an education.

Saturday, September 21, 2019

Different Types Of Network Devices

Different Types Of Network Devices Infrastructure security depends on the correct use of the network components. Network components are an essential aspect of the computing environment to improve the performance and security. The network components such as routers, switches and cables connect to the firewalls and gateways that manage communication from the network design to the protocols employed. If security fails then the availability of the system fails. Security failures can occur in two ways as follows: 1. Sometimes unauthorised users access the resources and data, which they are not authorised to use. 2. Security failure prevents the user from accessing the resources and data, the user is authorised to use. Both these security failures are serious. Hence, primary goal of network infrastructure security is to allow all authorised usage and deny all unauthorised usage of resources. 8.2 Devices Todays business environment consists of not only clients and servers but also network devices that are required to connect them. These network devices are called communication devices. These devices are hubs, switches, routers, LAN cards, gateway, modem, hardware firewall and so on. This also includes wireless access points, special-purpose devices such as Virtual Private Network (VPN) devices. Each of these devices has a specific network functions and plays an important role in maintaining network infrastructure security. 8.2.1 Workstations The workstations are client computers in the client-server architecture. This device is used to send and receive e-mail, to create spreadsheets, to write report in a word processing program and to play game. Many threats to information security can start at a workstation when it is connected to a network. Workstation security can be maintained by following basic steps as follows: Remove all share point that is not required. Rename the administrator account and secured it with a strong password. Remove unnecessary user accounts. Install an antivirus program and keep it updated. Disable USB ports in CMOS settings to restrict data transfer through USB devices. Install firewall between the machine and the Internet. Install latest patch for the operating system (OS) and keep the OS up to date. 8.2.2 Servers Servers are the computers in a network that host applications and data for users to share. Servers are available in many sizes, from small single CPU systems to multiple CPU systems such as mainframe computers. Servers use operating system such as Windows Server, Linux, UNIX and other mainframe operating systems. Server OS is more robust than the workstation OS and is designed to service multiple users over a network at the same time. Workstation security basic steps are applicable to server as well. 8.2.3 Network Interface Cards Network Interface Card (NIC) is a hardware device used to connect a server or workstation to a network. A NIC is used for particular type of network connection, either ethernet or token ring. In local area networks, ethernet protocol is the most common network type in use and RJ-45 is most common connector. A NIC is the physical connection between a computer and the network. NICs are available as single-port and multiport NIC. Workstation use single-port NIC, as only a single network connection is required. Whereas, server use multiport NIC to increase the number of network connections that increases the data throughput to and from the network. Every NIC has a 48-bit unique number, referred to as a Media Access Control (MAC) address which is stored in Read Only Memory (ROM). MAC address is used in the addressing and delivery of network packets to the correct system. 8.2.4 Hubs Hub is a central connecting device in a computer network. It connects multiple machines together in a star configuration with the hub as the centre. Hub broadcasts all data packets that are received, to all LAN cards in a network. The intended recipient picks the data and all other computers discard the data packets. Hub has five, eight, sixteen and more ports. One of the ports is called uplink port and this port is used to connect with the next hub. 8.2.5 Bridges Bridges operate at the data link layer of the OSI model. Bridges check the incoming traffic and decide whether to forward or discard it. 8.2.6 Switches Switches are a type of networking device similar to hubs, which connect network equipment together. In todays high-performance network environment switches have replaced both hubs and bridges. Switches operate at the data link layer of the OSI model. It uses MAC address of network cards to route packets to the correct port. Switches are intelligent network devices and are therefore can get hijacked by hackers. Switches are administered using the Simple Network Management Protocol (SNMP) and telnet protocol. Both the protocols have a serious weakness. These two protocols send passwords across the networks in clear text. In such instances hacker can capture the administrative password. The major problem with the switch is that it ship with default passwords. If user does not change this password during setup, hacker can easily access it. Caution: To secure a switch, disable all access protocols other than a secure protocol such as Secure Shell (SSH). Use only secure methods to access switch will limit the exposure to hackers and malicious users. 8.2.7 Routers Router connects two or more computer networks and then exchanges packets of data between them. Each data packet contains address information that a router can use to determine if the source and destination are on the same network, or if the data packet must be transferred from one network to another. Routers operate at the network layer of the OSI model. It has two or more network interfaces through which network traffic is forwarded or blocked. They are used to segment networks into smaller subnets or to link multiple networks together. The router decides how and when to forward packets between the networks based on an internal routing table. Routing table tells the router which packets to forward. Routers allow technicians to explicitly deny some packets the ability to be forwarded between segments. For example, internal security features of some routers can prevent users on the internal network from using telnet to access external system. Telnet is always a security risk as the passwords and all communications are transmitted in clear text. Hence, do not create telnet sessions between the internal network and an external network. Router has the ability to block spoofed packets. Spoofed packets are packets that contain an IP address in the header which is not the actual IP address of the source computer. Hackers used this technique to fool the systems showing that the packet came from an authorised system whereas, it actually came from the hackers system. Router has the ability to drop such packets. Routers are available in various sizes, small and big and from different vendors. Small router is used with cable modem and DSL service. (Figure). Larger routers handle traffic of up to tens of gigabytes per second per channel, using fibre optic cables and moving tens of thousands of concurrent Internet connections across the network. 8.2.8 Firewalls A firewall is hardware or a software program that is used to protect an internal network from outside intruders. It is much like a wall with a window. The wall keeps things out, except those permitted through the window. (Figure.). Network security policies act like a glass in the window. Security policies define what traffic is permissible and what traffic is to be blocked or denied. For example, Web server connected to the Internet may be configured to allow traffic only on port 80 for HTTP and have all other ports blocked. Firewall allows only the necessary access for a function, and block or denies all unnecessary functions. 8.2.9 Wireless In wireless device, radio waves or infrared carry data, that allows anyone within range access to the data. Placing a wireless device behind the firewall does not serve, as firewall stops only physically connected traffic from reaching the device. The devices associated with wireless networking are wireless access points. The wireless network cards are used to communicate with the access points. (Figure). Wireless access points have a limited range within which they can communicate with the client systems. When planning a wireless implementation within a new construction, make sure that the external walls contain metal studs that are grounded. Create wireless shield by using thin layers of aluminium under the drywall. This will block radio transmission into and out of the building. This will also interfere with pager and cellular phone usage. Note: Applying secure transmission protocols and configuring the wireless access point to only accept authorised connections will help in securing a network. 8.2.10 Modems Modulator and Demodulator (Modem) converts analogue signals to digital and vice versa. Modems are slow method of remote connection that is used to connect client computers to remote services over standard telephone lines. Modems are becoming less necessary, but many corporate systems still have modems installed for remote access. In corporate network, modems are located in Remote Access Service (RAS) servers and fax servers. Corporate users remotely access their system configuring modem in their PC. This is done when no other remote access solution is available or the existing remote access solution is inconvenient. These types of situations can provide an intruder the entry point to a network. The best solution to avoid this is to implement a security policy to control the installation of modems on corporate systems. Also verify that systems which need modems are properly secure. 8.2.11 Telecom/PBX In the IT security field Telecommunication (Telecom) is often overlooked. Most small companies use a small number of dedicated telephone lines for both incoming and outgoing calls. However, in larger companies having dedicated lines for thousands of employees is both inefficient and expensive. Hence, to overcome these problems install a Private Branch eXchange (PBX). A PBX is a device that handles routing of internal and external telephone lines. This allows a company to have limited number of external lines and an unlimited number of internal lines. PBX systems are cost beneficial to large companies but they also have their own vulnerabilities. PBX s is designed to be maintained by an offsite vendor and therefore have remote access available. The remote access can be through a modem or through a LAN. Hence, disable these remote access methods to limit the susceptibility to direct remote access attacks until the vendor is notified that they need to perform maintenance or prepare an update. 8.2.12 RAS Remote Access Service (RAS) connects the client and server through a dial-up telephone connection. It is slower than cable and Digital subscriber line (DSL) connection. When a user dials into the computer system, authentication and authorisation are performed through a remote access protocols. RAS servers offer security feature such as mandatory callback. This allows server to call back to the client at a set of telephone number for the data exchange. For more information on remote access protocols refer chapter 9, Authentication and Remote Access 8.2.13 VPN VPN allows users to create a secure tunnel through an unsecured network to connect to their corporate network. In large environments, VPNs are less expensive to implement and maintain than RAS servers, because there is no incoming telephone line or modem. In addition, a higher level of security can be implemented as communications are encrypted to create a secure tunnel. 8.2.14 Intrusion Detection Systems Intrusion Detection Systems (IDS) is a device designed to monitor network or system activities for malicious activities or policy violations. They are an essential part of network security. There are two main types of IDS that are used: network-based IDS and host-based IDS. For more information on intrusion detection systems refer chapter 11, Intrusion Detection Systems 8.2.15 Network Access Control Network Access Control is a method of network security that restricts the availability of network resources to endpoint devices as defined in the security policy. There are two main competing methodologies exist: Network Access Protection (NAP) and Network Admission Control (NAC). NAP is a Microsoft technology that controls network access of a computer host whereas, NAC is Ciscos technology that controls network admission. 8.2.16 Network Monitoring or Diagnostic The computer network needs continuous monitoring or diagnostic routine to keep administrators aware of the status of the network and allow them to take corrective actions to potential problems. This can be done through monitoring software or dedicated devices located on the network. Network monitoring or diagnostic equipment that is remotely accessible uses strong password and encrypted sessions to handle security vulnerabilities. 8.2.17 Mobile Devices Mobile phones and Personal Digital Assistants (PDAs) are the latest devices used to send and receive e-mail, connect to remote network applications, browsing the Web and so on. Many of the devices have word processor and spreadsheet applications and the ability to store limited amounts of data. Since these devices can be connected to the Internet, they are remotely accessible to potential attackers. Hence, use data encryption which is available in newer mobile devices built into their OS or use third-party software. 8.3 Media Media is used for transmitting data to and from network devices. The media can be either in the form of wire, fibre or radio frequency waves. There are four common methods used to connect devices at the physical layer as follows: Coaxial Cable Twisted-pair Cable Fibre Optics Wireless Coaxial Cable Coaxial cables are used for cabling televisions, radio sets and computer networks. The cable is referred to as coaxial because both the centre wire and the braided metal shield share a common axis. It is less susceptible to interference. Today, coaxial cable is replaced by faster and cheaper twisted-pair cable. UTP/STP Twisted pair cables replaced coaxial cables in ethernet networks. Single pairs of twisted cables reduce electrical crosstalk and electromagnetic interference. Multiple groups of twisted pairs are then bundled together and easily wired between devices. Twisted pairs are of two types: Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP). STP has a foil shield around the pairs to provide extra shielding from electromagnetic interference. Whereas, in UTP twist itself eliminates interference. Depending upon the data transmission, twisted pair cables are classified into three different categories as follows: Category 3 (Cat 3) It is used for data and voice transmission and for 10Mbps Ethernet. Category 5 (Cat 5/ Cat 5e) It is used for 100 Mbps fast ethernet. Cat 5e is an enhanced version of the Cat 5 specification to address far end crosstalk. Category 6 (Cat 6) It is used for gigabit ethernet. Fibre Fibre is a very thin piece of glass or plastic that has been stretched out and enclosed in a sheath. Fibre optic cable uses beams of laser light to connect devices. It transfers data over long distances and at higher speeds. Since it does not contain any metal part to conduct current, it is not vulnerable to electromagnetic interference. This also protects it from lightening strikes. Two major drawbacks using these cables are their high cost. Other drawback is the connection has to be optically perfect or performance will be downgraded or the cable may not work. Figure: Unguided Media Unguided media does not use any physical connector between the two devices for communication. The data transmission and reception is through the air or antenna and is referred to as wireless. The three types of wireless media are as follows: Radio waves Microwaves Infrared waves 8.4 Transmission Media Security 8.5 Removable Media Removable media is a type of storage device that can be removed from a computer while the system is running. These media introduces virus when they are attached back to the network. Theft or loss of organisation secret information stored on a media can be severe financial problem or it will effect on organisations reputation. These issues can be rectified by using security policies and software. The removable media are of three types: magnetic, optical and flash memory. Magnetic Media Magnetic media devices are hard drives, floppy disks, zip disks and magnetic tape. Each device is sensitive to external magnetic field. These devices are also affected by the high temperatures and by exposure to water. For the security concern about the critical and important organisational data, do not allow users to bring floppy disk inside the organisation, as they could contain viruses or other malicious programs. Another security policy can be applied by removing floppy disk drive from users computers. Encrypting the contents of a hard drive and tape ensures the security of data. Optical Media Optical media such as CD, DVD, blu-ray and optical jukebox hold the data in digital form. The data on the physical media is read and write by laser. Optical disks are not vulnerable to magnets hence, they are more reliable and durable than the magnetic tape. CDs are very vulnerable to being scratched. If the plastic disk from the media is scratched too much, the laser will be unable to reflect through the plastic and the data will not be readable. For security of data, do not allow personal CDs inside office premises. Only authorised users should have the access to these devices and for other users these devices should be disabled or physically removed from the computers. Electronic Media The electronic media uses integrated circuit technology to store the data hence they are more stable. Since these devices are small and portable, they can be used to store limited amounts of data when portability or reliability are key necessities. Smart cards, flash cards, memory sticks and CompactFlash devices are examples of electronic media. These devices are commonly used in digital cameras, mobile phones, MP3 player, video game consoles and so on. These devices are also used to transfer data between computers. Hence, they can easily carry the virus and worms with data. For security purpose run the antivirus software before transferring any data. 8.6 Security Topologies Multiple hardware devices are connected within a network and a key characteristics of a network is its layout or topology. Security topology is implemented in such a way that it provides the internal security and public access. For example, to place an online order the organisation will require Web servers which can be accessed by the users. Then the Web servers will require access to internal database servers and internal users will require access to different servers and Internet. 8.6.1 Security Zones Modern secure network have different layers of protection with outermost layer provides basic protection and the innermost layer provides the highest level of protection. Trade-offs between access and security are handled through zones with successive zones guarded by firewalls. The outmost zone is the Internet is guarded by the firewall. The internal secure corporate network and the Internet is an area where computers are considered at risk. This zone is called as Demilitarised Zone (DMZ). DMZ DMZ acts as a buffer zone between the Internet and organisations internal secure network. To differentiate the zones, a firewall is placed at both sides of the DMZ. The firewalls are placed in such a way that the Internet users cannot directly access the organisations secure data (Refer to Figure ). Web servers, remote access server and external e-mail servers are fall in DMZ area. Domain name servers and database servers which has organisation important data should not be accessible to the Internet users. As well as application servers, file servers and print servers of trusted network zone should be placed behind both the firewalls. The main idea behind using the DMZ topology is to force an outside user to get across DMZ before user can access information inside the trusted network zone. Internet The Internet is a worldwide connection of networks. It is used to transfer e-mail, Web pages, files, financial records between networks. It is an untrusted network as it is not possible to apply security policies. Hence a firewall should be present between organisations trusted network and the Internet. Intranet Intranet resides inside the trusted area of a network and network administrators can manage its security. Intranet Web servers contents are not available to the Internet users. The organisation data can be published to outside users with two methods as follows: 1. Information can be duplicated onto computers in the DMZ so that untrusted users can access it 2. Extranets can be used to publish data to trusted users. Extranet Extranet allows outside users such as companys partners, vendors, customers and resellers to share some of the business information with authentication and authorization. Extranet allows to access data available on the intranet mainly in the DMZ. To provide security and privacy of the information, extranet requires firewall server management or digital certificates or user authentication, encryption of messages. To protect it from unauthorised access use the VPN. VLAN Virtual LAN (VLAN) is network of computers and these computers are connected to the same broadcast domain, even though they are physically located on different location. VLAN s are configured through software hence they are more flexible. When system is physically moved to different location, without any hardware reconfiguration the system stay on the same VLAN. Increased network performance, easy manageability, less configurations and higher security is the advantages of VLAN.   Note: A broadcast domain is a network (or portion of a network) that will receive a broadcast packet from any node located within that network. NAT Network Address Translation (NAT) is developed by Cisco. It is commonly used in TCP/IP network. It works at OSI layer 3 which is network layer. It uses two sets of IP addresses, one set for internal use and other for external use.   NAT is a feature of firewalls, proxies and routing capable systems. It has ability to hide the IP address and the internal network from the Internet users. This feature of NAT reduces the risk of strangers to collect important information about the network such as structure of a network, the network layout, the names and IP address of systems, and so on. Hence, they cannot gain access of the network. NAT enables internal users within an organisation to use nonroutable IP addresses which means that these IP addresses will not be routed across the Internet. These IP address is called private IP address. The private address ranges are as follows: Class A 10.0.0.0 10.255.255.255 Class B 172.16.0.0-172.31.255.255 Class C 192.168.0.0- 192.168.255.255 After NAT configuration, external malicious users can access only the IP address of the NAT host that is directly connected to the Internet. The users are not able to access any of the internal systems that go through the NAT host to access the Internet. When NAT is used to hide internal IP addresses (Refer to Figure), it is called a NAT firewall. Internal users communicate with outside networks through the NAT device such as NAT router (Refer to Figure). This NAT router has a routing table. This table keeps track of all connection requests that have come from internal network. Each outgoing request proceeds through NAT and replaces the internal users IP address with its own IP address. This IP address then forwards to the final destination. Returned packets look up in the routing table and forward the information to the correct internal user.   8.7 Chapter Review Questions 1. Which layer of the OSI model switches operate? (A) Physical layer (C) Network layer (B) Data link layer (D) Transport layer Ans: B 2. Which layer of the OSI model router operates? (A) Physical layer (C) Network layer (B) Data link layer (D) Transport layer Ans: C 3. DSL stands for ________. (A) Domain Subscriber Line (C) Digital Specific Line (B) Domain Specific Line (D) Digital Subscriber Line Ans: D 4. What should you do to secure data on the hard drive if the drive is removed from the site? (A) Encrypt the data (C) Archive the data (B) Compress the data (D) Keep strong password to log into all computers at the site Ans: A 5. Which is the most secure cable for implementing a secure network infrastructure? (A) Coaxial cable (C) Fibre cable (B) Twisted-pair cable (D) None of these Ans: C 6. What network topology area will contain public Web servers? (A) VPN (C) Firewall (B) VLAN (D) DMZ Ans: D 7. What network topology area will contain critical servers such as private Web servers, domain controllers or SQL servers? (A) Intranet (C) Internet (B) Extranet (D) DMZ Ans: A 8. What network topology area will allow business partners, customers to access the owners intranet? (A) Intranet (C) Internet (B) Extranet (D) DMZ Ans: B 9. Network access control is associated with which of the following? (A) NAT (C) IPv6 (B) IPsec (D) NAP Ans: D 10. The purpose of twisting the cables in twisted-pair circuits is to _____. (A) reduce crosstalk (C) increase bandwidth (B) increase speed (D) None of these Ans: A 8.7.1 Answers 1. B 2. C 3. D 4. A 5. C 6. D 7. A 8. B 9. D 10. A Summary In the chapter, Infrastructure Security, you learnt about Different types network devices such as Workstations, Servers, NIC, Hubs, Bridges, Switches, Routers, Firewalls, Wireless, Modems, Telecom/PBX, RAS, VPN, IDS, Network Access Control, Network Monitoring and Diagnostic and Mobile Devices. Different types of communication media between the devices such as Coaxial Cable, UTP/STP Cable, Fibre Cable and Unguided Media. Different types of removable media such as Magnetic Media, Optical Media and Electronic Media. Different types of security topologies such as DMZ, Internet, Intranet, Extranet, VLAN and NAT.

Friday, September 20, 2019

Protein Requirements and Nutrition

Protein Requirements and Nutrition AYUSH SAXENA Proteins in nutrition For every physical activity, the body requires energy and the amount depends on the duration and type of activity. Energy is measured in Calories and is obtained from the body stores or the food we eat. Glycogen is the main source of fuel used by the muscles to enable you to undertake both aerobic and anaerobic exercise. If you train with low glycogen stores, you will feel constantly tired, training performance will be lower and you will be more prone to injury and illness. Nutrient Balance Carefully planned nutrition must provide an energy balance and a nutrient balance. The nutrients are: Proteins essential to growth and repair of muscle and other body tissues Fats one source of energy and important in relation to fat soluble vitamins Carbohydrates our main source of energy Minerals those inorganic elements occurring in the body and which are critical to its normal functions Vitamins water and fat soluble  vitamins  play important roles in many chemical processes in the body Water essential to normal body function as a vehicle for carrying other nutrients and because 60% of the human body is water Roughage the fibrous indigestible portion of our diet essential to health of the  digestive system One gram of protein or carbohydrate contains 4 calories, while one gram of fat has 9 calories. Protein Quality: Nutritive Value The quality of protein depends on the level at which it provides the nutritional amounts of essential amino acids needed for overall body health, maintenance, and growth. Animal proteins, such as eggs, cheese, milk, meat, and fish, are consideredhigh-quality,orcomplete, proteinsbecause they provide sufficient amounts of the essential amino acids. Plant proteins, such as grain, corn, nuts, vegetables and fruits, arelower-quality,orincomplete, proteinsbecause many plant proteins lack one or more of the essential amino acids, or because they lack a proper balance of amino acids. Incomplete proteins can, however, be combined to provide all the essential amino acids, though combinations of incomplete proteins must be consumed at the same time, or within a short period of time (within four hours), to obtain the maximum nutritive value from the amino acids. Such combination diets generally yield a high-quality protein meal, providing sufficient amounts and proper balance of the essential am ino acids needed by the body to function. The function of proteins In virtually every biological process proteins are playing a role. Some of the main functions of proteins in the human body are to: Build, strengthen and repair/replace things, such as tissue. Examples include keratin (strengthens protective coverings, such as hair), collagen and elastin (both provide support for connective tissue). Make antibodies for our immune system Make hormones, which help cells send messages and coordinate bodily activities Muscle contractions actin and myosin, two types of proteins, are involved in muscle contraction and movement. Make enzymes. An enzyme facilitates a biochemical reaction. Carry things hemoglobin, a protein, transports oxygen through the blood. Mediate cell response rhodopsin is a protein in the eye which is used for vision Store things ferritin is a protein which stores iron in the liver Recent developments on protein function. High protein diets may help promote weight loss.  The International Food Council Foundation found that a high percentage of women who eat more protein do not only avoid weight gain, but also report weight loss. A high protein diet may be good for bone health.  An investigation published in theJournal of Clinical Endocrinology and Metabolism, revealed that a calorie controlled diet lower in carbohydrates and higher in protein along with daily exercise has a significantly positive impact on bone health in overweight individuals as well as obese young women. Energy provision. Protein is not a significant source of energy for the body when there are sufficient amounts of  carbohydrates  and fats available, nor is protein a storable energy, as in the case of fats and carbohydrates. However, if insufficient amounts of carbohydrates and fats are ingested, protein is used for energy needs of the body. The use of protein for energy is not necessarily economical for the body, because tissue maintenance, growth, and repair are compromised to meet energy needs. If taken in excess, protein can be converted into body fat. Protein yields as much usable energy as carbohydrates, which is 4 kcal/gm (kilocalories per gram). Although not the main source of usable energy, protein provides the essential amino acids that are needed for adenine, the nitrogenous base of ATP, as well as other nitrogenous substances, such as creatine phosphate (nitrogen is an essential element for important compounds in the body). Dietary requirements of protein Nobody seems to agree on how much protein we can eat; experts from industry, government agencies, diet companies and nutritional organizations have a varying list of assertions. An individuals daily protein requirement depends on several factors, including: Age a growing childs needs will not be the same as an individual aged 80 years Sex males generally require more protein than (non-pregnant or non-breastfeeding) females Weight an individual who weighs 200lbs will require more protein compared to somebody who weighs 120lbs. In fact, recent studies indicate that weight matters more than age when determining dietary protein requirements. Muscular exertion an individual who earns his living delivering pianos will require more protein than a computer programmer of the same age and height Muscle mass a muscle-bound weight trainer will need more dietary protein than a marathon runner Health a person who is convalescing after an illness or medical procedure may need more dietary protein than other people Protein Requirement and Nutrition The recommended protein intake for an average adult is generally based on body size: 0.8 grams per kilogram of body weight is the generally recommended daily intake. The recommended daily allowances of protein do not vary in times of strenuous activities or exercise, or with progressing age. However, there is a wide range of protein intake which people can consume according to their period of development. For example, the recommended allowance for an infant up to six months of age, who is undergoing a period of rapid tissue growth, is 2.2 grams per kilogram. For children ages seven through ten, the recommended daily allowance is around 36 total grams, depending on body weight. Pregnant women need to consume an additional 30 grams of protein above the average adult intake for the nourishment of the developing fetus. Percentage of energy that should come from protein: Infants (7 12 mo) 11 grams per day Infants (0 6 mo) 9.1 grams per day Teenage boys (14 18 y) 52 grams per day Teenage girls (14 18 y) up to 46 grams per day Adult men approximately 56 grams per day Adult women approximately 46 grams per day Pregnant or lactating (breastfeeding) women about 71 grams per day According to the U.S. Centers for Disease Control and Prevention protein intake should be: Children ages 1 to 3 13 grams per day Children ages 4 to 8 19 grams per day Children ages 9 to 13 34 grams per day Girls ages 14 to 18 46 grams per day Boys ages 14 to 18 52 grams per day Women ages 19 to 70+ 46 grams per day Men ages 19 to 70+ 56 grams per day Protein deficiency In some developing countries protein deficiency is a major cause of illness and premature death. Protein deficiency can lead to mental retardation and reduced IQ, In most parts of the world where protein deficiency is common, total food energy consumption is also too low i.e. people are not getting enough food in general. Protein deficiency can lead to: Growth problems Wasting and shrinkage of muscle tissue Apathy Diarrhea Fatty liver Swollen belly Swollen legs Anemia Weaker immune system, leading to a higher susceptibility to infections and diseases In several countries where protein deficiency is a serious problem, the leaves and other parts of the Moringa tree can help provide dietary protein. In developed countries, especially Western Europe where the dietary requirements of poorer people are very carefully monitored and resolved, protein deficiency is quite rare. In developed nations, protein deficiency is more likely to occur among people on crash diets, or among very elderly individuals who do not eat properly. Sources of dietary protein Poultry Fish and fish eggs Insects Dairy products Seeds and nuts Soya products Eggs Grains, vegetables and legumes also have protein (less per kilo of total weight) Meat Amino acids Proteins are large molecules made up of long chains of amino acids. Amino acids are the building blocks of proteins. The biochemical activity of proteins is characterised by their individual structure, size and shape. These factors are determined by the sequence and characteristics of the constituent amino acids. There are about 20 different amino acids commonly found in plant and animal proteins. For adults, 8 of these, have to be provided in the diet and are therefore defined as ‘essential’ or ‘indispensable’ amino acids. These are: Leucine Isoleucine Valine Threonine Methionine Phenylalanine Tryptophan Lysine. In children, arginine, histidine, cysteine, glycine, tyrosine, glutamine and proline are also considered to be essential (indispensable) amino acids, because children are unable to make enough to meet their needs. These are referred to as ‘conditionally’ essential. There may also be certain disease states during adult life when a particular amino acid becomes conditionally essential. The other amino acids do not have to be provided by the diet. This is because the amino group of these amino acids can be transferred to another amino acid with a different amino group by a process called transamination. In this way the body is able to make some amino acids itself. These are known as ‘non-essential’ or ‘dispensable’ amino acids. How much protein should we eat? The Dietary Reference Values for protein are based on estimates of need. For adults, an average requirement of 0.6g of protein per kilogram bodyweight per day is estimated. The Reference Nutrient Intake (RNI) is set at 0.75g of protein per kilogram bodyweight per day in adults. This equates to approximately 56g/day and 45g/day for men and women aged 19-50 years respectively. There is an extra requirement for growth in infants and children and for pregnant and breast feeding women. Any excess protein can be used to provide energy. 1g of protein provides 17kJ (4 kcal) but carbohydrate, and to a lesser extent fat, should be the main sources of dietary energy. At present, protein provides around 16% of energy on average in the British diet. The nature of protein in the diet Most foods contain either animal or plant cells and will therefore naturally contain protein. But the processing of foods may change the amounts and relative proportions of some amino acids; for example the Maillard reaction and the associated browning that occurs when foods are baked reduces the available lysine. The quality of the protein is also important and depends on the amino acids that are present. Proteins from animal sources have a higher biological value than proteins from plant sources. This is because the pattern of amino acids in animal cells is comparable to the pattern in human cells. Plant foods may have very different patterns of amino acids compared to animal proteins, and, in the past, this difference has lead to a concept of first-class and second-class proteins, for animal and plant foods respectively. However, diets are typically varied in the UK and rarely made up of single foods. A combination of plant proteins tends to have a complementary effect boosting th eir overall biological value. Complementary action of proteins (plant protein) In most diets, different proteins tend to complement each other in their amino acid pattern, so when two foods providing vegetable protein are eaten at a meal, such as a cereal (e.g. bread) andpulses (e.g. baked beans), the amino acids of one protein may compensate for the limitations of the other, resulting in a combination of higher biological value. This is known as the complementary action of proteins. Thus if vegetarians and vegans eat a variety of vegetable proteins in combination, there is no reason why the quality of protein cannot be as good as in a diet comprising meat, milk, fish, eggs or other foods that contain animal protein. Good sources of plant protein include nuts, seeds, pulses, mycoprotein and soya products. There are also small amounts in grains. Animal protein Protein from animal sources contains the full range of essential amino acids required from an adult’s diet. Sources include meat, fish, eggs, milk and cheese. For most of us, low fat options of these foods are preferable as some can be high in saturated fat. Good sources of protein Table 1: Protein content of some common foods found in the diet Adults and children should consume two to three servings of protein every day. If plant sources dominate, it is important to make sure that different types are consumed. One typical portion size equates to: †¢ 100g of lean boneless meat (red and poultry) †¢ 140g of fish †¢ 2 medium eggs †¢ 3 tablespoons of seeds or nuts. It is important to choose lower fat protein-rich foods, such as lean meats or reduced fat dairy productsas some high protein foods can also be high in saturated fat. This will help minimise the risk of developing cardiovascular disease. Summary and recommendations For basic protein synthesis, you don’t need to consume more than 1.4 to 2.0 g/kg (around 0.64-0.9 g/lb) of protein per day. Nevertheless, consuming higher levels of protein (upwards of 1g per pound of body weight) may help you feel satisfied after eating as well as maintain a healthy body composition and good immune function. You should consume some protein before and after training to ensure adequate recovery. Do not eat more than four eggs per week. Although they are a good source of protein and are low in saturated fat, eggs are very high in cholesterol.

Thursday, September 19, 2019

Frankenstein Versus Frankenscience Essay -- Mary Shelley Frankenstein

Frankenstein Versus Frankenscience The story of Frankenstein. A story that I, myself, have been familiar with for a good part of my life. It is most popular among horror film fanatics and becomes one of the most desired stories to be told around Halloween. Some see it as a well-told story of a man and his monstrous creation. But is there something deeper? Mary Shelley, the author of Frankenstein, gives light to many truths about the era of modern science. She is using Victor Frankenstein and the monster to play out the roles in a drama that can become all too real. In this paper I would like to focus specifically on the story of Frankenstein and the three integral parts; knowledge, power and the notion of a god-complex; that can be related to the modern era of science. As the story begins (in the excerpt that is to be focused on in this paper) Victor Frankenstein is telling his story. Victor is a young man who, with great determination, spends two years of his life working to create a being in the likeness of man. He decides that the nature of the being should be tall and large in stature and then, in the pursuit of ultimate success, collects the necessary items to begin his project. With these "fibers muscles and veins," he begins his work (Shelley 231). Victor is determined to create "animation upon lifelessness."(Shelley 232) And yet, he doubts. He doubts himself as being capable enough to take on such a gargantuan task. Yet, he presses on. As the years pass, Victor becomes confined to his work space. Seasons pass and family and friends are left by the wayside. His determination keeps him from giving up in a multitude of failures. It is not until one November night that Victor to life. The thought of renewing l... ...l and scary thing. It has the potential to save lives, cure diseases and, now, create new lives through the act of cloning. Humans are the ones who make these advances possible. They are the creators of science. Therefore, it is relevant to take a closer look the qualities that force humans to act a certain way. Knowledge, power and the notion of a god-complex are three qualities that can posses humans to a capacity that can be both healthy and deadly. Victor Frankenstein provided us with a scenario that can only serve to make us think about our own knowledge about science, the power we hold, and the way in which we let those qualities rule our lives. Works Cited Shelley, Mary. "Frankenstein." The Presence of Others: Voices and Images That Call for Response. Eds. Andrea A. Lunsford and John J. Ruszkiewicz. Boston, MA: Bedford/St. Martin's, 2000. 231-235.

Wednesday, September 18, 2019

Storm & Calm in Emily Brontes Wuthering Heights :: Wuthering Heights Essays

Wuthering Heights:  Ã‚   Storm & Calm  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚      The theme of Wuthering Heights, by Emily Bronte, is a universe of opposing forces-storm and calm.   Wuthering Heights, the land of storm, is a sturdy house that is set up high on the windy moors, belonging to the Earnshaw family.   The house is highly charged with emotion of hatred, cruelty, violence, and savage love.   In comparison, Thrushcross Grange, the land of calm, is settled in the valley and is the residence of the genteel Lintons.   The same differences exists between Wuthering Heights and Thrushcross Grange, as they do in Heathcliff and Edgar.   As Catherine points out, the contrast between the two â€Å"resembled what you see in exchanging a bleak, hilly,   coal country, for a beautiful fertile valley.†Ã‚   (Bronte 72)   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The Lintons, and the social and material advantages they stand for become Heathcliff’s rivals for Catherine’s love, which leads directly   to the central conflict of the novel.   Heathcliff despises them at first sight for their weakness, but Catherine, being an extremely proud girl, is tempted.   A lovers’ triangle begins   to take definite shape   when the aristocratic Edgar Linton falls in love with Catherine, upsetting the balance between the relationship of Catherine and Heathcliff.   Edgar’s love for Catherine is sincere, but the element of great passion which is strongly characterized does not compare to Heathcliff’s love.   The difference between Catherine’s feeling for Heathcliff and the one she feels for Linton is that Heathcliff is a part of her nature, while Edgar is only a part of   her superficial love.   â€Å"For he (Heathcliff),   like her, is a child of storm; and this makes a bond between them, which interweaves itself with the very nature of their existence.†Ã‚   (Cecil 26)   Emily Bronte makes a point in the novel to mention the fact that Catherine’s affection for Heathcliff remains unchanged in spite of the Lintons’ influence over her. As Catherine confesses to Nelly that Heathcliff and her share the same soul, and also declares â€Å"I am   Heathcliff.† (Bronte 84)   Her pride, yearning for the world of the Lintons, has gotten the better of her natural inclination, and she knows she   has made the wrong decision by   marrying Edgar.     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Catherine, naturally a child of storm, is unable to develop at Thrushcross Grange, while she is married to Edgar.   Her mind becomes disturbed, which is the first sign of her degeneration.   The pragmatic reality at the Grange cannot fill the void that she has made for herself in leaving her furious childhood environment.

Tuesday, September 17, 2019

Calyx flower case

Managing Profitable Growth Recommendation : Increase Internet advertising. There are several reasons to support It. 1 . Less Cost, more tailored communication with customers In case of the catalog, the acquisition cost of new customer Is too expensive. This makes new customers unprofitable. (see table 1) Instead of the catalog, the company can send email directly to their target customer with less expense. The company already have a web page, so the firm can use the system without huge investment.Also, if the company makes use of the internet more, the firm can gather customer data more efficiently. So the company can increase the ability to track the behavior of individual customer. This enable the firm not only to tailor communication with the customers, but also to build a long-term relationship with the customers compared to mass-media marketing and catalog. Eventually, it will lower the acquisition cost of the current and new customers and increase retention rate and response ra te, the taxation which makes the customer more profitable In terms of the life time value. . Concentrate on the growth of the potential customer. As the Infrastructure of the Internet Improves, the customer who purchase the product through internet will increase. This change of business environment would be a good opportunity for the company. While the competitors focus on mass-media marketing, the company can concentrate their budget on the target customers who have a high potential growth. With low advertising cost per customer and high customers' satisfaction with tailored communication, the company can differentiate itself from the other competitors. . Make the customers more inelastic to price. The products of Calyx are fresher than that of the competitors. This Is the one of the differentiated factor of the company. And also, using online could be one of the differentiated factor of the company. As mentioned above, with fluent data of the customers and tailored communication, the company can raise the customers' satisfaction. From these, Calyx can create customer loyalty.The loyalty is not from the lower price, but from the differentiation from the other competitors. This makes the customers more inelastic to price. 4. Enlarge the customer base by cross selling of the other business units' products By integrating the web pages with other business units or making bundle packages, the flower business can enlarge the customer base, which consists of professional women mostly. From this, the company can alma at market share expansion.

Monday, September 16, 2019

Fast Company Analysis

Fastenal Company was founded in 1967 in Winona, Minnesota by Bob Kierlin. During the first month of business, Mr. Kierlin only managed to make $157 in sales. Despite the slow start, Mr. Kierlin knew what he wanted to do to make Fastenal successful, and that was to provide the kind of service that keeps customers coming back. This is when â€Å"Growth Through Customer Service† was invented. Since then, â€Å"Growth Through Customer Service† has been the mission of Fastenal. Fastenal is an industrial supply company and since 1967, 2,500 stores have opened across 50 states, Canada, Mexico, the Dominican Republic, Puerto Rico, Netherlands, Europe, China, and Singapore. Each store utilizes local inventory, outside sales staff, and on-site delivery vehicles to help save the customers’ time and money. Fastenal also owns and operates 16 Distribution Centers with a fleet of over 180 semi-trucks and trailers. Fastenal’s organization structure allows a customer to receive a fully-customized part hand delivered by an employee within three days. Fastenal’s main inventory is fasteners like screw, nuts, washers, and threaded rod. Fastenal has over 700,000 individual inventory items that range from power tools to tape to janitorial supplies. Fastenal’s target market is mainly focused on companies that consistently need to buy parts for the jobs they need to complete regularly. Fastenal even has vending machines stocked with custom inventory to provide companies in need of access to certain parts without having to come into the store each time. Vending machines are critical to the business strategy of Fastenal; the machines provide excellent customer service and convenience without an employee having to be present. It ensures that the companies with the vending machine will continuously and consistently purchase products. Fastenal’s marketing plan relies on monthly product deals that are distributed to every account owner each month. Outside sales staff and managers will deliver the catalogs each month. Fastenal also has an online presence, companies have the ability to go online and design an order template for quick and easy purchasing. Fastenal currently sponsors Carl Edwards from NASCAR, America’s most viewed sport, as an additional source of marketing. In May 2011, Fastenal made over 200,000 sales, 29% more than 2010. Fastenal opened nine new stores this month and 57 this year-to-date. Fastenal has also hired 2,000 more employees compared to 2010. Performance of the company varies from month to month because the winter months of the year typically have less construction occurring which results in a smaller demand of what Fastenal offers.

Sunday, September 15, 2019

Design And Construction Of The Luis I Bridge Engineering Essay

Opened in October 1886, the Luis I Bridge is a shaped Fe trussed arch span which spans the Douro River between Porto and Vila Nova de Gaia in Portugal. Designed by the Belgian applied scientist Th ophile Seyrig, in coaction with L opold Valentin ; it was, at the clip of its building, the longest arch span in the World, at 172m [ 1 ] , and remains the longest spanning Fe arch to this twenty-four hours. It represents the swan vocal of wrought Fe Bridgess as at the start of the twentieth century stronger steel of more consistent quality would about wholly replace the usage of wrought Fe in span building. The new span was commissioned in 1881 to replace an ailing suspension span at the same location ; Seyrig designed a double-deck arch span with one deck at the top of the arch resting on wharfs and the 2nd deck at the degree of the abutments, hanging from sinews ( Fig. 1 ) . The two decks have seen a assortment of lading over their life ; originally both decks were designed to transport route traffic, the lower deck briefly carried trolley coachs but is now a individual carriageway route, the upper deck was converted in 1905 to transport ropewaies and widened in 1931 to add a 2nd path. 2 Aestheticss The aesthetic analysis of a span is mostly subjective, Fritz Leonhardt attempted to rationalize the aesthetic design of Bridgess in 1982 with the publication of his book, Br cken, which sets out ten cardinal points that should be considered during design. 2.1 Fulfilment of Function This relates to how good the span divulges the manner it works ; in the Luis I bridge the arch is the chief structural component through which forces are carried. This is evident from looking at the span as the arch is the most significant member. Truss structures in general are peculiarly indicative about the manner they carry tonss, and the Luis I bridge is no exclusion. The structural honestness of the span is called into inquiry where the arch meets the masonry abutments ; it appears as though the top member of the arch passes directly into the abutments but the abutments are non able to defy the high minute this would bring forth, so the top member of the arch must be lightly stressed at its utmost terminals. On closer review it can be seen that the concluding diagonal members on both sides of the arch are of more significant cross-section ( Fig. 2 ) in order that they are able to transport all of the force in the top rim of the arch down to the pinned connexion at the terminal of the bottom rim. Figure 2: Forces transferred to bottom rim Sometimes, one facet of a span s aesthetics must be sacrificed in favor of another ; in the Luis I bridge the truss which forms the upper deck is of uninterrupted deepness along its length, but the attack spans are notably longer than the subdivisions which make up the chief span. Functionally, the applied scientist could hold designed the attack spans to be deeper than the chief span but this break to the horizontal line of the deck would hold been to the hurt of the aesthetics of the construction as a whole. 2.2 Proportion As discussed above, the upper deck is deeper than it needs to be ; proportionately this contrasts aggressively with the lower deck which is significantly more slight despite crossing an equal distance. This difference is non adequately explained by the grounds already discussed. The upper deck may good hold been designed to get by with a higher burden than the lower deck ; surveies have shown that, prior to the transition of the upper deck to light rail, the upper deck carried about double the traffic of the lower deck [ 2 ] . Furthermore, at the clip that Seyrig was planing the Luis I bridge he had merely finished the building of the Maria Pia Bridge ( 1877 ) , designed in concurrence with Gustave Eiffel, which was to transport a train line over the same river. It is possible that the upper deck of the Luis I bridge was designed to transport develop tonss should it be converted to that intent in the hereafter, as so it was. The structural systems for the upper and lower decks differ greatly which may lend to the disparity in their deepness ; the lower deck is a lattice through truss with traffic running within the truss itself whilst the upper deck is a brown deck truss where the deck is placed on top of the truss girder. The province of emphasis within the two decks besides differs as the bottom deck is used to bind the arch and therefore is capable to a high initial tensile burden ; the advantage of shaped Fe as a building stuff was its affinity for tensile tonss and it may be that this excessively contributes to the reduced deck deepness. The rise to cross ratio of the arch is 1:4 ; this is chiefly dictated by the dimensions of the gorge in which the span sits, but the consequence is an arch of typical masonry proportions [ 3 ] which offers the feeling of stableness. 2.3 Order within the Structure A sense of order is given to the span by the repeat of the truss elements throughout the lift. Although the lower deck uses a somewhat different type of truss, the crossed elements are still present to keep the order within the span. When viewed closer up, the members are seen to be composed themselves of multiple elements, and from oblique angles the criss-crossing of these members can look disordered ( Fig. 3 ) . The wharfs and tenseness roads which support the two decks line up to cut down the figure of perpendicular lines and divide the span into equal parts. They are sufficiently near together so as non to do the arch appear otiose, but no so near as to herd the span with perpendicular lines. 2.4 Polishs of Design Polishs refer to the subtle inside informations within the span which can hold a momentous consequence on the overall entreaty of the construction. In the Luis I bridge the wharfs taper towards the top ( Fig. 4 ) which adds position by doing the towers appear less compact and prevents the optical fast one of the wharfs looking to be wider at the top than they are at the underside. In the attack spans where the perpendicular infinite beneath the upper deck is greatest, the deck spans a greater distance in order to keep the aspect ratio of the infinites under the deck. The aspect ratio of the crossed brace in the arch is besides maintained ; where the divergent parabolic curves, which make up the top and bottom rims of the arch, dispersed apart the distance between verticals is increased to maintain the crosses make fulling a approximately square form. Equally good as being aesthetically delighting, this serves the structural intent of maintaining the members inclined at an angle where they can execute at maximal efficiency. As antecedently mentioned, the single members which make up the trusses are themselves tied box subdivisions ( see Fig. 2 ) , this gives the construction elation, both in footings of its overall weight and besides aesthetically by cut downing the ratio of solid to nothingnesss and doing the members seem more slender. However, this elation comes at the disbursal of order. Figure 3: Disorder Figure 4: Tapering wharfs 2.5 Integration into the Environment Pivotal to the aesthetic success of a span is how good is tantrums into its environment ; the arch signifier used for the Luis I bridge is peculiarly good suited to utilize in the deep gorge, and fills the infinite good. Despite the size of the construction, it looks comfy in its environment. The girder which forms the upper deck has no obvious terminal but alternatively gives the feeling of unifying into the hillside ; this makes the span seem like an built-in portion of the gorge. 2.6 Colour of Components Though originally unpainted ( Fig. 5 ) the span now has as gray-blue coating which allows the span to intermix good into the sky, this has the consequence of doing the muss of the truss less obvious and contributes to the members looking more slender. The broadening of the upper deck in 1931has led to the creative activity of a dark line of shadow which serves to pull the oculus off from the deep truss underneath. Figure 5: Original design without pigment 2.7 Aesthetic Decisions The Luis I bridge is a construction of great beauty and much consideration has obviously been given to aesthetics in its design. Despite this, as no point has structural efficiency been forfeited for strictly aesthetic grounds. The structural public presentation of the span will organize the following subdivision of this paper. 3 Structural Behaviour In 1881 the Lusitanian authorities invited the stamp for a new span over the Douro River ; the chief challenge of the strategy was that there could be no intermediate wharfs placed in the river. This was due to high H2O deepnesss of more than 12m, insecure land conditions and a high tidal scope in the river [ 4 ] which would hold made building exceptionally hard. A figure of strategies were proposed and the winning strategy, designed by Th ophile Seyrig, consisted of a tied parabolic arch of shaped Fe building, 172m in span, back uping two truss girder decks ( Fig. 6 ) . Seyrig was familiar with the usage of wrought Fe holding worked closely with Gustave Eiffel in the design of other shaped Fe Bridgess such as the Maria Pia span ( 1877 ) . In this new venture he sought to bring forth a design which would take full advantage of the mechanical belongingss provided by shaped Fe. Figure 6: Elevation The arch is connected to the upper and lower decks, by wharfs and sinews severally, in merely four topographic points ; as a consequence of this the arch is capable to flexing minutes even when the decks are uniformly loaded. Wrought Fe is a stuff which performs good in tenseness and it is apparent the interior decorator expected the stuff in the lower rim of the arch to be in tenseness at all times. A polish of the Maria Pia design was the usage of the lower deck to bind the arch and so cut down horizontal burden of the hapless quality land at the abutments. A farther going from case in point was the usage of divergent parabolic curves to make an arch more slender at the vertex, where it is 7m in deepness, than at the supports ( 17m ) . The alteration was made because of jobs encountered during the building of the Maria Pia span, which has a semilunar arch ; whilst the first subdivisions of the arch were being built out from the abutments it had proved troublesome to supply equal support for them utilizing overseas telegrams and presenting had had to be employed [ 4 ] . In the Luis I bridge the arch is much deeper at the supports hence leting the first subdivisions to be erected more firmly and at less cost, it was a technique which would be used about 40 old ages subsequently during the building of the Sydney Harbour Bridge ( 1923 ) . The long deep gorge through which the Douro flows is characterised by high air currents ; the unfastened truss system used for the Luis I bridge reduces the lading consequence of the air current by restricting the country on which the air current can move. Eiffel frequently used cannular subdivisions where possible in his Bridgess to increase the aerodynamic public presentation of his designs [ 5 ] , but Seyrig chose non to make so in the design of the Luis I bridge, presumptively to do the connexions more straightforward. The connexions are riveted together, in pattern this mean that the articulations have some minute capacity but as the elements will still move preponderantly axially, the connexions in the truss can be modelled as pins without presenting excessively much mistake into the analysis. At the clip of the span s building, there was much argument over the comparative virtues of pinned or riveted connexions in span building [ 6 ] ; whilst the riveted truss was of superior efficiency, pinned trusses could be assembled faster and cheaper utilizing simple tools and techniques. The connexion to the abutments is by manner of a rotational articulation at the utmost terminals of the lower rim of the arch ( Fig. 7 ) . This means that the arch can be considered a two-pin arch and will be analysed consequently. Figure 7: Foundation connexion In 2004 a survey was undertaken to measure the current province of the span [ 1 ] and some samples were removed and tested. It is usual to use measured stuff belongingss, where available, in span appraisal instead than conservative characteristic values ; tensile trials on removed subdivisions of shaped Fe from the span yielded a tensile strength of 397Mpa. Testing to happen compressive strength was non performed so a value of 270MPa will be assumed. 4 Construction Seyrig was a innovator in the hard-on of Fe Bridgess, to the point that he wrote a paper on the topic which was presented at the Institution of Civil Engineers ( ICE ) in 1881 [ 6 ] . In it, Seyrig inside informations his strong belief that the building methods employed in the hard-on of Fe Bridgess has the largest impact on their overall economic system, safety and lastingness. For the Luis I bridge, as with the Maria Pia span, Seyrig chose to use a method of building which least required the usage of immaterial contraptions, viz. hard-on by overhang. In this technique the lasting construction of the span itself is used to back up the building of more distant subdivisions. The paradigm for this method of span building was the Requejo Bridge designed by Jos Ribera ( Fig. 8 ) . Figure 8: Requejo Bridge, Spain In the Luis I bridge the attack spans were foremost constructed on both sides of the river until the upper deck girder protruded about 30m beyond the chief wharfs which mark the start of the arch. The girders were pushed out on a set of four rollers which sat on top of each wharf ( Fig. 9 ) . Figure 9: Peal setup The arch was so built out as a series of premade subdivisions which were tied back with steel-wire ropes to a point on the upper deck girder. The whole arch was constructed utilizing merely two ropes on each side of the arch, so it was necessary to be able to rapidly travel a overseas telegram once it has been superseded by a overseas telegram farther along the arch ; for this intent the overseas telegrams were connected merely to the top rim of the arch utilizing a rounded shoe ( Fig. 10 ) under which the uninterrupted rope was fed. Whilst most of the subdivisions were erected with all of their constituents in topographic point, the last few panels were put up with the top rim and some of the diagonal brace removed in order that they should be every bit light as possible. Once the two halves of the arch had met and the cardinal linking piece inserted, the losing constituents were so added to the lightened subdivisions. Figure 10: Cable to curve connexion The work was performed to such truth that in program the two halves of the arch met precisely, but in lift both sides were about 350mm excessively high. This was done intentionally as it was decided that there was possible for the two halves to be excessively low in which instance it would hold been really hard to raise them. Provision was made for take downing the arches to their right place by the remotion of a certain figure of dramatis personae Fe cuneuss which had been placed beneath the overseas telegram connexions. Once the two halves of the arch had been connected it was of import to slow off the steel overseas telegrams instantly as a bead in temperature could hold caused the overseas telegrams to shorten and bring on emphasiss into the arch. With the arch in topographic point the midget wharfs could so be erected and the upper deck girder placed on top. Precisely the same procedure was used for the building of the Maria Pia span and is shown schematically in Fig. 11. The lower deck would hold been added last, merely by crossing between the wrought Fe sinews, impermanent intermediate overseas telegrams may hold been added to cut down the hogging minutes caused by cantilevering out. Figure 11: Erection by overhanging 5 Loading The Luis I span was built before design standardization had to the full emerged ; accordingly it was likely designed to whatever lading the applied scientist deemed to be sensible. It was besides built at a clip when the Equus caballus drawn passenger car was the prevailing agencies of conveyance ; Karl Benz built the first true car in 1885. For the intents of this study the span will be analysed under its current loading conditions in conformity with BS-5400 [ 7 ] . Partial burden factors, as detailed in Table 1, will be applied to nominal tonss so combined to give the worst possible burden conditions. Table 1: Partial burden factors [ 8 ] Load Type Partial Load Factor ( ? Florida ) Stressing Relieving Dead 1.05 1.0 Super-imposed Dead 1.75 0 Live Traffic 1.5 0 Wind 1.1 0 5.1 Dead Tonss The structural elements of the span are of shaped Fe building with a denseness of? = 7700kg/m2. The entire weight of the span is equal to 29841kN [ 9 ] which is about distributed as shown in Table 2. Table 2: Unfactored dead tonss Arch 76kN/m Upper Deck 31kN/m Lower Deck 23kN/m 5.2 Super-Imposed Dead Loads ( SID ) Super-imposed dead tonss are the non-structural inactive tonss on the span such as route coatings, illuming and street furniture. They have a high burden factor ( 1.75 ) to reflect the strong likeliness of them altering over the life-time of the span ; they may besides be removed wholly should the span be capable to major plants, though were this the instance, traffic tonss would about surely be reduced. Suggested tonss given in Table 3 correspond to a 200mm bed of asphalt route surface. Table 3: Unfactored SID Upper Deck 38kN/m Lower Deck 28kN/m The values are different because the two decks are of different breadth ; the upper deck is 8m broad and the lower deck is 6m. 5.3 Live Traffic Loads The lower deck carries route traffic ; at 6m broad it can be considered to hold two fanciful lanes. Eq. ( 1 ) gives the unrecorded traffic lading per metre per lane ( HA ) : w=151 ( 1/L ) ^0.475 ( 1 ) L is the laden length which in this instance is 172m so the end point unfactored burden over two lanes is 26.2kN/m. A knife border burden ( KEL ) of 120kN should besides be added, placed to bring forth maximal extra emphasis. In this case HB burden has non been considered as the entree routes to the lower deck would be unpassable by really big vehicles and the newer, high-ranking span near by, which is crossed by a double carriageway, would be the more suited path. The upper deck carries light rail traffic, each train has an unfactored weight of 2000kN [ 2 ] and a length of 70m. The trains move really easy on the span such that dynamic effects can be discounted. 5.6 Worst Case Loads For the arch, worst instance flexing minutes occur when the arch is non-uniformly loaded ; this corresponds to to the full factored dead, SID, and unrecorded tonss on one half and unfactored dead loads merely on the other side ( Fig. 12 ) . For the upper deck, two trains go throughing at one-fourth span have been considered. Worst instance shear tonss would be caused by to the full factored dead, SID and unrecorded tonss at all points on the span. Figure 12: Worst instance lading agreement 6 Analysis In this subdivision, the worst instance burdens calculated antecedently will be applied to the construction to determine whether the end point emphasiss are within the tolerances of the stuffs. 6.1 Arch The chief structural constituent of the span is the tied arch. For the intents of this study it will be modelled as a two pin arch, with the lading agreement in Fig. 12 simplified to four point tonss ( Fig. 13 ) . Figure 13: Simplified arch tonss By taking minutes about the point A, the perpendicular reactions are found to be: VA = 21691.2kN and VB = 14644.8kN. 6.1.1 Flexibility Analysis To happen the horizontal push produced by the arch a flexibleness analysis was performed by let go ofing the horizontal reaction at B and using the unit burden method to happen the attendant supplanting at B ( ? B, H ) and the flexibleness coefficient ( a11 ) . Eq. ( 2 ) can so be used to happen the value of horizontal push: _ ( B, H ) +a_11 H=0 ( 2 ) B, H and a11 are found by incorporating the minute in the arch with regard to the discharge length which is rather complex, but the job can be simplified by presuming that the I value of the arch changes around its profile such that I = I0sec ( ? ) , where I0 is the 2nd minute of country at the vertex of the arch [ 10 ] . Ultimately it can be shown that the value of horizontal push is given by Eq. ( 3 ) , where a is the horizontal distance from A to the point at which the force is moving, H is the tallness of the arch, L is the span and W is the magnitude of the force. Multiple forces can be superposed together to acquire a concluding value of push of 21946.9kN. H_1= ( 5W_1 a ) / ( 8hL^3 ) ( L^3+a^3-2La^2 ) ( 3 ) 6.1.2 Line of Thrust The deliberate information for tonss and reactions were used to plot a thrust line for the arch under worst instance lading conditions ( Fig. 14 ) . Figure 14: Thrust line From this secret plan, the minute at any point in the arch can be calculated as the eccentricity of the thrust line multiplied by the horizontal force. The minutes in the arch are shown in Fig. 16 ; maximal drooping minute is 148.8MNm and occurs at 36m from A, maximal hogging minute is 125.9MNm and occurs at 131m from A. For the intents of this study, it will be assumed that flexing forces in the arch are resisted by the top and bottom rims, whilst the diagonal brace resists shear forces ; any axial forces are shared amongst all the members. The force in the rim required to defy the maximal minute detailed in Fig. 15 is equal to the minute divided by the deepness of the truss which yields a force of 14.2MN. Figure 15: Moment in arch This burden consequences in emphasiss of 133.2Mpa in each of the four arch girders ; tenseness in the lower girders and compaction in the upper girders, which is good under the stuff capacity. Axial compaction due to the arch form must besides be considered ; by declaration of the reactant forces in the supports, it can be shown that an axial compaction of 30MN is carried in the arch. Split amongst the entire country of wrought Fe available in the subdivision, this consequences in an extra compressive emphasis of 74.7Mpa. In the tenseness rim this acts as a relieving emphasis which reduces the overall emphasis to 58.5Mpa ( tenseness ) . In the compaction flange the emphasiss sum up to give a entire emphasis of 207.9Mpa, which is nearing but still below the stuff compressive strength of 270Mpa. Metallic members are frequently susceptible to clasping under high compressive tonss. Eq. ( 4 ) was used to happen the burden required for the arch members to clasp. F_e= ( p^2 EI ) / ? L_eff? ^2 ( 4 ) The effectual length was taken to be the span between diagonal brace elements as it was assumed that the cross brace would supply sufficient parturiency to forestall buckling over a longer length. The burden at which clasping would happen was found to be 136MN which corresponds to a emphasis good above the compressive strength of the stuff, so failure would ne'er happen through buckling. f3 values were non considered in the burden computations for the arch as the analysis methods used will ensue in rather high mistake, the excess capacity within the stuff, as shown above, histories for the deficiency of truth in the analysis techniques. 6.1.3 Shear in Arch Equally good as flexing minutes, the tonss on the arch besides induce shear forces which are carried in the diagonal brace members. Worst instance shear theoretically occurs under maximal burden possible which would be 13488kN applied at the four point burden locations on the arch. Moments under this burden scenario were calculated utilizing the thrust line method and so shear forces were found by distinction of the minutes. The consequence, shown in Fig. 16, predicts a maximal shear force of 7242.8kN located at 35m from point A. The shear force is resisted by the diagonal brace elements which act together, one in tenseness and one in compaction. The force in each brace member must be 5121.4kN which corresponds to tensile or compressive emphasiss of 194.7MPa. Figure 16: Maximal shear in arch 6.2 Temperature Effectss Particularly in excess constructions like two pin arches, little strains caused by temperature alterations can bring on important emphasiss into the construction as the constructions tend to be less flexible. As the Luis I bridge is a tied construction there should non be a high temperature difference between its elements, but overall temperature alterations should be considered. In the arch, a rise in temperature would ensue in the arch seeking to spread out ; confined by the wharfs, this would do minute in the arch which would be carried as tenseness in the top rim and compaction in the bottom rim. This would move as a alleviating action from the dead and unrecorded burden so should non do a job. A bead in temperature, on the other manus, would ensue in extra compressive emphasiss in the top rim which is already extremely compressed. The upper deck is exposed to the most direct sunshine, and the solid route surface puts the underside into shadiness so there may be a high temperature gradient which would ensue in emphasiss. The fluctuation in temperature throughout the subdivision in the forenoon period is shown in Fig. 17 where 0 C corresponds to ambient temperature. Figure 17: Temperature difference in upper deck The thermic enlargement coefficient ( a ) for wrought Fe is 12 strain/ C, utilizing e=a? T the strain due to the temperature gradient is shown in Fig. 18. Generation of these values by the Young s modulus of 185GPa gives the emphasiss besides detailed in Fig. 19. Figure 18: Strains ( left ) and emphasiss ( right ) The rollers on top of the chief wharfs, as discussed in subdivision 4, now act as roller bearings which allow the deck girder to lengthen and so relive some of these emphasiss. The emphasiss cut down by the mean emphasis value which in this instance is 6.6MPa ; this now produces the emphasis profile shown in Fig. 19. Figure 19: Extra temperature emphasiss The emphasiss in Fig. 19 correspond to a changeless minute over the length of the upper deck. As the deck is uninterrupted over the wharfs there is no demand to see an extra minute to guarantee the minute at the supports remains equal to zero. 6.3 Wind Effectss Porto lies on the Atlantic seashore of Portugal and so it can be assumed that it is capable to rather high air currents, the span itself besides sits in a gorge which will hold a funnelling consequence on the air current. The arch itself is trussed so as to catch small air current, but the decks, when high sided vehicles base on balls over them, will hold a big jutting country and so may be capable to high air current burden. This is peculiarly true of the lower deck because it is a through truss so the unfastened construction offers no advantage. Suspended as it is by tenseness rods, the lower deck may be extremely susceptible to weave induced effects. Assuming a average hourly air current velocity of 34m/s, akin to the velocities found on the Atlantic seashore of the UK, the maximal air current blast ( vC ) on the span can be found from Eq. ( 5 ) to be 52m/s, where K1 and S2 are factors harmonizing to BS-5400 and S1 is a funnelling factor taken to be 1.1. v_C=vK_1 S_1 S_2 ( 5 ) Horizontal air current burden can now be found utilizing Eq. ( 6 ) , A1 is taken as the jutting country presuming high-sided trucks are traversing the span. When the deck is to the full loaded the truss is obscured so the retarding force coefficient can merely be calculated utilizing the b/d ratio. The consequence is a sidelong force of 1.6MN which must be resisted by the deck. P_t=0.613? v_C? ^2 A_1 C_D ( 6 ) Without cognizing the under-structure of the lower deck it is hard to measure how this burden is carried, but it is assumed that a cross braced truss tallies underneath the deck and prevents the deck from flexing laterally. The air current can besides ensue in dynamic effects such as galloping and waver ; these effects tend to most affect suspension Bridgess because of their built-in flexibleness. The lower deck of the Luis I bridge, which is suspended by sinews, would be the most likely to endure from these effects but some facets of its design provide stiffness against them. The sinews are able to transport compaction every bit good as tenseness, and are cross braced to supply torsional stiffness ; coupled with the truss moving longitudinally this gives the span stiffness in all of the planes in which the effects of aerodynamic instability might move. There are besides huge sums of riveted connexions within the span to supply muffling against quivers. 7 Fatigue The Luis I bridge is over 100 old ages old and has hence been capable to a high sum of lading rhythms, it seems prudent hence to give some consideration to its fatigue public presentation. The span is located near to the sea and so is considered to be in a marine environment ; wrought Fe is regarded as holding a lower opposition to corrosion than other common building stuffs of the clip like dramatis personae Fe [ 11 ] , corrosion is worst around possible wet traps like connexions where hapless care can take to interfacial corrosion ( Fig. 20 ) . The riveted connexions are besides prone to tire failure because clefts can organize during fiction and the pluging action can ensue in local work indurating around the studs. Figure 20: Interfacial corrosion In a survey performed by Fernandes et Al, samples of stuff, including a riveted connexion, were removed from the span and analysed to happen their mechanical belongingss [ 2 ] , besides performed were ace growing surveies, notch stamina proving and an analysis of metallurgical content. This information was used to happen the figure of lading rhythms the assorted constituents of the span would be able to defy. By presuming that merely trucks cause fatigue burden and that one truck represents one rhythm of lading it was calculated that the span had exhausted merely 10 % of its fatigue life and that staying fatigue life was greater than 100 old ages. The survey besides considered the usage of the upper deck for light rail and concluded that one train was the equivalent of four burden rhythms and that residuary life was less than 10 old ages. Consequently the span was retrofitted and reinforced before the new tube line was allowed to go through over it.