Saturday, August 31, 2019

Causes of obesity Essay

Alderman describes the problem with great success that gets the reader’s attention. She introduces the problem by explaining common causes of obesity, which are addressed in Michelle Obama’s campaign recently. Referring to the nation’s first lady to address her issue, Alderman intensifies the problem so the reader can â€Å"see† it better. She then quotes the Center for Disease Control and Prevention statistic that â€Å"one of three children in this country is overweight or obese.† The author also uses statistics and facts to dramatize the problem making the reader actually â€Å"feel† the problem, thus appealing to their pathos. She evokes a sense of anxiousness for the parents because they may feel surprised and worried if their children have the same problem with obesity. To inspire such pathos and to further convince the reader that the problem must be solved, she applies logos. She explains that if action is not taken, many kids are at risk for Type 2 diabetes and heart disease. In addition, by referring to Michelle Obama and giving credit to a study and relevant sources, she also establishes her ethos. By creating pathos, logos, and ethos while describing the problem, Alderman is very effective in giving the problem presence. Alderman is also very successful in describing her solution; she does a terrific job of enhancing the power of her proposal through striking visual texts. Each element in her solution is emphasized with capitalized, bold headings such as â€Å"FACE THE FACTS.† Within these categories are her recommendations to all parents. She speaks directly to them and her goal is to inform them of new information about what they can do to keep their family healthy and avoid childhood obesity. Using the visual technique, Alderman creates a sense of trustworthiness, which appeals to her audience to do what is recommended.

Friday, August 30, 2019

How to Adapt Melville’s “Bartleby the Scrivener” for Film

The two existing adaptations of Herman Melville’s short story â€Å"Bartleby the Scrivener,† released in 1970 and 2001, show two legitimate interpretations of this dense, strange story. The 1970 version, starring John McEnrey as Bartleby, elects to prioritize the drabness of Bartleby’s laconic take on life in its color palette and generally dreary atmosphere. The more recent adaptation, starring Crispin Glover in the titular role, is more comic and, in the parlance of our times, â€Å"screwball† in its portrayal of office life.Such an interpretation seems closer to the text for me: while Melville’s story is profoundly sad, this sadness is not a uniform, blanketing affect, falling like Joyce’s snow over the living and the dead, but the failure of even comedy to overcome the characters’ alienation from themselves and each other. Melville’s tale is strange, and as such it calls for a strange adaptation to make it fit on the silver screen. What continues to be amiss in these adaptations is that Melville’s story is about misunderstanding Bartleby, yet both adaptations aim to understand Bartleby.The pathos of the tale, which in its literary form instantiates itself in the relationship between the reader and the text, is lost when a film version purports to offer mimetic verity. The reader of â€Å"Bartleby† is made to feel that she has missed something, that there is some clue to the secret of Bartleby and â€Å"Bartleby† that has been overlooked and which would resolve the pervading feeling of dislocation. In a crude sense, Bartleby represents the very incapacity of language to say what it means to say–that it always says too much and too little, and that even a simple mantra like â€Å"I prefer not to† can become opaque if we look too closely.Any interpretation of â€Å"Bartleby† will fall into this trap to some extent, of offering a definition of what is essentially n ebulous. To circumvent this problem, I propose the same tactic that Melville employs in his framing of â€Å"Bartleby. † Rather than focusing on the titular character, the film should focus on the story’s narrator, the lawyer who will become Bartleby’s boss. After all, what we learn from reading this story is that a name does not tell us who someone is, but misdirects us into the illusion of knowledge.The word â€Å"Bartleby† remains an enigma, and the attached epithet–†the Scrivener†Ã¢â‚¬â€œfurther obscures the â€Å"real† Bartleby that this story invites us to seek. Bartleby’s job as a scrivener is seemingly the least interesting, unique, or existentially relevant fact to know about him, and yet this is what we are misled by the title into defining him by. The narrator, on the other hand, is unnamed throughout. While Bartleby is anomic in the existential sense, he does at least have a name.The narrator, who generally fit s in well with the boring injustice of his socio-economic position, is anomic in that he does not have a name. If â€Å"Bartleby† is in some way a cultural critique, and it is hard not to think so, then this is the man who we should focus on to make him claim a name for himself. Bartleby’s name gives the reader and and people around him a false sense of knowledge of him, as does his identification as â€Å"scrivener†Ã¢â‚¬â€œas if a rote task could actually define him. The weapon of naming should be turned back on the class who is entitled to wield it.Giving a name to the narrator is not the solution to this problem, as that would repress the whole issue of the name. Instead, the film should be framed as an implicit challenge to the narrator to find his name and reveal it, to pick a fixed location in the world of words where he can be found and confronted. (This is similar to the protocol of protesters who ask for police badge numbers so that there is accountabil ity for police actions. ) This need not be an overtly or clumsily militant film.The demand that the narrator name himself cannot be proclaimed literally by the film without adding an additional interlocutor, perhaps the filmmaker as documentarian, and this would only redouble the economy of the shield of namelessness. This would almost be worse, since it would decenter the mechanism of namelessness from the dominant class–where it can at least be located to some extent in the sole nameless character of the narrator–and make it into a roving weapon for all parties vying for power. Rather, we should remember that film can function without gimmickry as a demand for characters to name themselves.The characters in Little Miss Sunshine are all suffering from disparate types of personal flux and the film comes to a conclusion when they are able to define themselves through their relationship as a family. What we have here are actually two forms of social policing that need to be clearly articulated for the purposes of effective translation between literature and film. Literature operates in the domain of words, and so its dominant procedure is naming; film operates in the domain of image (as well as sound, but the eye is the vastly dominant organ for human perception) and its dominant procedure is the gaze.So while Melville’s text puts pressure on the narrator to reveal his name if he truly wants to be Bartleby’s comrade, rather than his patron, we need to switch methods for film adaptation and focus the gaze on the narrator. Simply by looking at him we pose the film question analogous to revealing his name. Appropriately enough, an excellent example of this technique can be found in the television show The Office. The character Michael Scott, a low level manager played by Steve Carell, is shown to be a buffoon just by showing him.With different editing–removing his gaffes, inappropriate pauses and laughter, and the apathetic and un inspired responses of the employees he manages–he could appear to be confident and in control. The persistence of looking determines the difference in social perception. I would support using a camera technique similar to that of The Office in which camera movement between characters often supplants cuts so as to give the effect of the camera belonging to a person in the room.This technique would not be used quite as aggressively as on The Office–characters in my version of â€Å"Bartleby† would not look or speak directly into the camera, nor would there be out of sequence cuts to characters’ interviews or commentary. A mobile camera, both moving between characters during dialogue, and following characters when they are walking, would help to prevent this from becoming a visually boring adaptation (a dangerous temptation for a movie about people stuck inside doing repetitive labor).At the same time, this camera technique would also reveal that this place and this job are boring. Cuts to close-ups obscure the alienation of the figure in his office landscape and falsely re-face persons who professional context de-faces. Coupling this camera technique with the above mentioned preference for showing the narrator and ignoring Bartleby would add an extra layer of visual intrigue, even suspense, as Bartleby would only appear sporadically, incidentally, contingent on his relevance to other characters.Although I would not want to entirely mimic the cinematography of The Office, one thematic element that informs both the style of the television show and my production of â€Å"Bartleby† is the camera as confessional. The demand for a name as the opening for confession creates a stylistic tension: on the one hand, to depict a figure against its ground asks for a wide angle shot that minimizes the proportion of character to environment; on the other hand, the visual poetics of the confession work best when the face of the individual is hi ghly legible.This legibility is one of the oldest criteria of the confession. Without being able to read the face, the veracity of the confession is uncertain; it might be a feint. So when the narrator is interacting with other characters, we would use a wide shot that would pan between them as they took turns speaking, catching Bartleby almost by accident in the marginal, in-between-space, that happens to exist within the zone of the camera’s movement. When the narrator is agonizing over his problematic relationship with Bartleby, the job of the camera is to listen closely and to watch him closely.The internal monologue, the narration as heard/read by the reader, would be performed as spoken monologues that provide dramatic action during the actionless life of the narrator–as he walks the streets of New York or sits at his desk. To reinforce Bartleby’s marginalization, these internal monologues (in Melville’s text) could be performed in Bartleby’s presence to emphasize his non- or quasi-existence. As far as color palette, a unified scheme would help to portray â€Å"Bartleby† as a story about analyzing a single form of consciousness, and hence not guided by the mimetics of realism.Heavy monochromaticism through tinting the film stock is a bit too heavy handed. I think a very light use of a gray-scale filter would be beneficial, but to really capture the horror of â€Å"Bartleby† the muted light and gray-scale lifestyle should be immanent in the mise en scene and costuming. By dressing all the characters and their surroundings in similar colors their alienation is made apparent by the absurdity of them all appearing like chameleons in a colorless environment.Turkey, Ginger Nut, and Nippers, Bartleby’s co-workers, have powerful distinguishing traits that Melville comically exaggerates, and these caricatured personalities appear best against an equally caricatured ground. With everything draped in unending gray, small colorful details could easily mark the personality of these character–as well as marking how ludicrous it is to think that personhood can be signified by the single note characteristics that Melville uses to mark these apart.The soundscape of this film would take after the blurred, mechanically processed effects of Jacques Tati’s Playtime. This would help to take the magic out of Bartleby’s somewhat famous mantra, â€Å"I would prefer not to. † Nothing would be worse than for a fetishist of Melville to be waiting breathlessly for the story’s catch phrase, to construe this refusal of everything (including refusal) as a catchphrase. The narrator does not truly pay attention to Bartleby when he first begins to defer activity because this deferral is virtually unthinkable.In the manner of the Whorf-Sapir hypothesis, refusal to participate in capitalism almost conceptually impossible for the narrator to process. Bartleby’s proclamatio n originates almost entirely out of mind, sight, and hearing. But as the narrator is forced to notice that work is not being done, he and the directionality of the microphones close in on the source of the trouble. Bartleby is saying something very strange: he would prefer not to.In giving attention to Bartleby’s speech it is important to register his words as they occur to/within the consciousness of the narrator. The audio is not supposed to suddenly begin listening to Bartleby as if he is a messianic figure (as he has been construed in the past) but to take note that his deferral has become a (troubling) object of thought for the narrator. The narrator’s responses would always be louder than Bartleby’s words, except when he is repeating them to himself later, fitfully.

Pilgrimage of Grace

DBQ Pilgrimage of Grace The Pilgrimage of Grace was to protest Henry VIII’s actions such as his Act of Supremacy. This lead to the implementation of new polices such as taxes, the expansion of the royal power in the North of England, the dissolution of monasteries, and the confiscation of Catholic Church lands. These actions took their toll on the country, and led to the Pilgrimage of Grace from October 1536 to February 1537. The Pilgrimage consisted of marches and protests and armed demonstrations. The re-creation of a banner of a marcher depicts God suffering, a plow and a cattle horn.This symbolizes the motivation for the Pilgrimage of Grace. It can represent the peasants who are suffering just as Jesus did (3). Peasants, clergy and gentlemen were involved in the Pilgrimage of Grace. Each of these groups of people had a distinct part in the pilgrimage. Those who opposed the movement killed many of the rebels, as they feared the rebellion of authority. The participants of th e Pilgrimage of Grace were concerned for their country and safety from enemies, and therefore, their goals were more representation, and a restoration of the Catholic organizations such as monasteries.The peasants and clergy were the largest group in the Pilgrimage of Grace, and the most affected by Henry VIII’s actions. Due to the closure of the monasteries by the government, the peasants made a declaration that they must now rely on charity, faith, poverty, and that they must be ready to help one another should thieves or Scots try to rob them (2). This reason for protest contradicts other reasons such as the â€Å"Oath of Honorable Men†, which states that one should not enter the Pilgrimage for wordy gain, but for his love of God (1).The Catholic clergy, who now could not practice their faith in England, had their land taken away and were heavily convicted by the government, as shown in the lyrics to a ballad a monk wrote, â€Å"†¦And held in bonds. Robbed, sp oiled and shorn†¦Ã¢â‚¬  (4). The clergy and peasants were concerned for their future in northern England, and protested to get back the land and religion, which the government had taken from them. Gentlemen also were involved in the Pilgrimage of Grace.Some who were members of Parliament did not like Thomas Cromwell’s influence on the King, which took power from the Parliament. In an anonymous pamphlet, Cromwell is called a traitor and that he should be removed from office to restore authority to Parliament (6). Robert Aske gives the goals of all those who participated in the Pilgrimage in his petition to the member of the King’s Council, which includes having the head of the church be the pope in Rome, to have Thomas Crowell punished, and to have the monasteries and church lands restored (5).Throughout the Pilgrimage, there were riots in which both commoners and gentlemen were involved (8). Many of them were arrested and convicted. The closing of the monastery w as a detriment to the country in the eyes of the gentlemen, as can be seen in Robert Aske’s testimony, in which he asks the king to return to the ways of the Catholic Church (11). Although many common people, clergy, and gentlemen supported the Pilgrimage, it was opposed by the creators of these laws, King Henry, and high ranking officials.In Richard Madison’s â€Å"A Remedy for Sedition†, Madison argues that the inferior must be content that the wiser rule them, which is necessary in a commonwealth. If this order isn’t in place, then no one would obey and there would be chaos (7). Nicholas Leche criticizes the gentlemen who did not stand up against the opposition in his testimony (8). Henry VII himself gives a speech pardoning the commoners would have rebelled against him on the grounds of ignorance, so long as they immediately stop protesting and submit to his monarchy (9).In the trials against those involved in the Pilgrimage of Grace, 67 percent of th e gentlemen tried were convicted, and 62 percent of the peasants that were tried were convicted. In comparison, 80 percent of the clergy tried were convicted. This reflects heavy opposition against the clergy, who in the government’s eyes were the cause of the Pilgrimage. In spite of the efforts of the participants of the pilgrimage of Grace, none of their goals were met. England was not reconciled to the Catholic Church, nor did the monasteries reopen. Cromwell’s moves toward Protestantism were final.

Thursday, August 29, 2019

The Family As Seen in White Noise by Don DeLillo Essay

The Family As Seen in White Noise by Don DeLillo - Essay Example This has led to the reversed roles between the parents and children. The once solid core of mother, father and children are replaced by a unit of ex-spouses, siblings and step-siblings, a situation brought about by divorce. Jack Gladney, a professor at a local college in Blacksmith, has four children; Mary Alice (aged 19) and Steffie (9), from his first and second marriages to Dana Breed-love; Bee (12), from his marriage to Tweedy Browner and Heinrich (14), from his marriage to Janet Savory (now known as Mother Devi). Of all his children, only Heinrich and Steffie live with him. His wife Babette’s three children are Denis (age 11), Eugene (8), and Wilder(about 2). Blacksmith has been negatively affected by this condition of the family. Blacksmith holds testimony to failed marriages (DeLillo 59). Things change so rapidly that even the family members seem unclear on the details. Jack even refers to family as the â€Å"cradle of the world’s misinformation† (DeLillo 81).In White Noise, DeLillo shows how technology is changing the inner experience of human beings, through waves and radiation. Television serves as a type of new collective unconscious that creates an inner frame of reference to which the mind unconsciously turns. It has become a member of the family. Stephie murmurs "Toyota Celica" in her sleep. At one point, Jack says, â€Å"His skin was a color that I want to call, flesh-toned.† We are moving toward a postmodern mentality.... As a whole, the family members can not handle their emotions and are unable to think for themselves. Money has gained colossal meaning in our time. This has led to a devaluing of other values such as freedom, customer choice and respect for shoppers. DeLillo illustrates how the current world of commerce impacts our minds by manipulating our decisions. He goes further to illustrate that a human nature demonstrates immense vulnerability to such an attack. Ubiquitous commercials lead us to desire to have things we never tried before, to see things not worth seeing, to buy stuff we do not need. The novelist tries to open our eyes to identify and understand how this commercial destructive mechanism works. For instance, in one of the earlier scenes in the novel there is a picture of the family eating lunch. DeLillo focuses our attention on how the food on the table has been packaged: crumpled tinfoil, open cartons, bowl of past substances covered with plastic wrap, flip-to rings and twist ties and shiny bags of potato chips (DeLillo 7). Babette, Jack’s current wife, is a typical example of someone who gets attracted to shiny packages with bold, visible fonts, promising the good taste of the products. She is a perfect target for offensive commercials from the television, shopping malls and advertisements. She does not read the warning tags and shows a lack of interest in calorie values. In another incident, Jack, in a bid to regain his â€Å"lost† authority, takes his whole family to the Mid-Village Mall. They spent hours there, and it is the only time in the whole novel where the members of the family appear to be having a good time. They seem to be happy and satisfied. Jack later admits, â€Å"My family gloried in the event.† Jack surrenders to true shopping fever

Wednesday, August 28, 2019

Describing Some Special Interest, Significant Experience, or Personal Statement

Describing Some Special Interest, Significant Experience, or Achievement Relevant - Personal Statement Example Also, I convinced business owners to do their part by placing their business name on donation bags as part of their business promotion campaign. This idea was very well received and as a result of it, many ordinary members also decided to contribute in the form of a cash gift. 2. Knowledge or creativity in a field: Describe any of your special interests and how you have developed knowledge in these areas. Give examples of your creativity: the ability to see alternatives; take diverse perspectives; come up with many, varied, or original ideas; or willingness to try new things. I have been interested in economics from a very young age. I was encouraged by my grandparents to open up a cow-house. This was a great experience until Korea struck a new Free Trade Agreements with the United States. This caused livestock prices to fall and the whole sector experienced to slowdown. I was fascinated by the way that this FTA affected the Korean economy in different ways and this made me reflect more on economics, including factors like limited capital and external changes. I learned to recognize market and economic trends and this helped to develop my creativity in terms of economics and its related fields. 3. Dealing with adversity: Describe the most significant challenge you have faced and the steps you have taken to address this challenge. Include whether you turned to anyone in facing that challenge, the role that person played, and what you learned about yourself. Working a part-time job is not easy. I experienced some difficulties with one particular supervisor. He was very critical of my work. The more he tried to hassle me at work, the tougher and stronger I became. I was not going to let him treat me like an idiot. I turned to my senior co-workers and begged them to train me so that our supervisor could never find a reason to pick on me. I was able to prove that I could do the job and much more.  Ã‚  

Tuesday, August 27, 2019

Growth Management vs. Growth Control Research Paper - 1

Growth Management vs. Growth Control - Research Paper Example The community has for years faced poor infrastructure especially in the suburban areas. In its effort to overcome this problem, the mayor invited Dr. Freilich of the London School of Economics to advise him on Growth management policies. This enabled the transport network of the suburban areas to improve. The growth management policy has eased traffic in San Diego. The current and future generations of this community will benefit, and this will foster growth in other sectors (Levy, 2011). In addition, the community uses a tiered system of separating the rural and urban areas. This is as opposed to the old growth boundary line that was in place before implementation of growth management policy. The tiers help the authorities to identify the areas that need more resources in development (Levy, 2011). This ensures that there is balanced growth in the region. Apart from transport sector, growth management has focused on other areas in San Diego. These include housing, sanitation, industrial and commercial sectors. This has made San Diego a conducive environment for its residents and generations to

Monday, August 26, 2019

The Novel Kate Chopin The Awakening and the Short Story by Kate Chopin Essay

The Novel Kate Chopin The Awakening and the Short Story by Kate Chopin The Story of an Hour - Essay Example Sometimes cultural expectation or social conditions make people behave in a typical manner. Kate Chopin’s short story ‘The Story of An Hour’ and his novel ‘The awakening’ are two works in which the social conditions or the cultural expectations compel people to escape to the world of freedom (Petry, 1996) (Koloski, 1996). The protagonist of the novel ‘The awakening’ longed to take herself away from the expectations of her society (Telgen and Hile, 1998). While reading between the lines of ‘The awakening’, readers can find that the most crucial incident, the suicide of Edna (at the end of the book) is a consequence of her attempt to escape from everything and to tear herself away the social expectations to which she was strongly bounded to (Ewell, 1986). Her mentality was one of despair in which she does not wanted to live in the way she was supposed to be. Reading thorough the mind and sole of Edna, we can see that the decisi on that she has taken at the end was the one and only solution for her to escape from the internal struggles she suffered. She had violated the line that marks the norm of the society (and its conventions) of the late 1800s (Telgen and Hile, 1998). Edna’s despair that she will not be able to live in the ‘expected’ manner, leads to her take her own life. ... Edna was actually becoming free (recognizing her selfhood) attaining freedom and victory that was denied to her by Robert. Edna is a woman who should have born couple of centuries later; she would never fit in the life of the 1800s. Robert’s demand for Edna to be his wife, a ‘mother-woman’, following all the social conventions and followings, were unacceptable to Edna. As far as she was concerned, such a submission to his desires is a denial of her identity. Edna was unable to face this reality and she opted not to live rather than being submissive to the followings. She does not want herself to be locked inside the societal cage in which men others wanted her to reside. Her outlook and personality made her unfit for the life of her times. Edna’s life became quite unsuitable for the role her lover, husband and what the society demanded for her. Edna’s personal desire of freedom was denied in all her relationships, her father, her husband and even Rob ert (Ewell, 1986). Everybody denied her wish to live in her freedom and wanted her to submit her ‘sense of self’ in the role she was expected to play. Edna refuse to play these roles and her sense of self was too strong and very precious for her. "Edna's sense of self makes impossible her role of wife and mother as defined by her society; yet she comes to the discovery that her role of wife and mother also makes impossible her continuing sense of independent selfhood" (Chopin, 1982). She was found to be moving into the water and swimming away from the shore where she would remember "Leonce and the children. They were a part of her life. But they need not have thought that they could possess her, body and soul" (Chopin,

Sunday, August 25, 2019

Defining The Self Essay Example | Topics and Well Written Essays - 500 words

Defining The Self - Essay Example Modernity has, however proved that the human mind is capable of so much more. While I am a full time student, I have managed to take up two jobs as well. While in today’s world that is not a wonder, in the 17th and 18th century, it was unfathomable that one could take up two or more mentally and physically engaging tasks at once. This illustrates that the mind has so many capabilities; most of which humanity is not even aware of at this time. The abilities and endeavors that human beings will pursue in the distant future have not been comprehended in the current time. Kant is also in support of Hume’s assertion that they are not â€Å"unshakeable truths.† The beliefs that human beings live by in actuality do not have an explanation. Once someone asked me why I believe that stealing is wrong. I found myself fumbling with the answer. In actual sense, I have acknowledged that the only reasons I believe this is because firstly, my religion states it and secondly, those before me instilled it in me. However, none of the reasons laid out above are logically strong or supported. Therefore, Kant was right in stating that there is no evidence of the existence of â€Å"certain truths†; we have created them within our minds. John Locke shared Kant’s line of thought (the latter) but modified it. His focus was not more on the lack of existence of unshakeable truths, but rather on lack in existence of innate facts (Caruth, 31). The existence of God is one that has caused controversy in the literary world. If there were such a thing as innate facts, the existence of a supreme being ought to be one of them. This is because it is a belief that a larger majority of the world shares. If indeed there is a supreme being, it ought to be an innate (inborn) fact, as he is the creator of everything, including human beings. However, as a child, I had to attend Bible studies and learning sessions to completely understand the concept of God as well as what

Saturday, August 24, 2019

Comparison & Contrast Essay Example | Topics and Well Written Essays - 500 words - 1

Comparison & Contrast - Essay Example The Play Intense cologne, on the other hand, is created using fragrances from patchouli, mandarin, bergamot, vetyver, coffee flower, Tonka bean, Caribbean Amyris wood, and pink pepper. This creates a strong, dynamic, and a little offbeat essence that can be worn to momentous events. Both of these brands of cologne contain mandarin orange and bergamot, which gives them a citrus scent. However, Play Intense has a milder citrus scent as compared to Play. The stronger citrus scent in the latter may be attributed to the added presence of grapefruit and bitter orange aside from the mandarin orange contained within it. The smell of Amyris wood is much stronger in Play Intense that in Play. Moreover, the Tonka bean, which is not a fragrance present in Play, can be noticed in Play Intense. Both of these brands of cologne contain vetyver and patchouli, which gives them a woody, earthy, and herbal scent. The patchouli also contributes an exotic and musky scent for both Play and Play Intense. The Play brand has an aroma of black pepper while Play Intense has the pink pepper aroma. In Play intense, the pink pepper provides a mild, pleasantly, sweet fruity, scent with a bit of spicy whiff in it. One would say that Play Intense strengthens the woodsy side of the cologne while toning down the citrus essence. Play, on the other hand, tones down the woodsy side and instead intensifies the citrus aroma. Play Intense is categorized as oriental-spicy while Play is categorized as citrus-fruity. These two colognes are similar in scent strength because both of them are considered to have a moderate fragrance. The target market of Play is college students or those males who are between the ages of 17 and 30. In contrast, Play Intense is targeted towards those males who are more mature, their age ranging from 30 onwards. Therefore, it can be

Friday, August 23, 2019

To What Extent is the Employment Relationship Based on the Expression Essay

To What Extent is the Employment Relationship Based on the Expression of Conflicting Interests - Essay Example The overt manifestations of employment relationship conflict such as low productivity, high turnover and high absenteeism are common. The covert manifestations of employment relationship conflict by their analysis of informal work groups, decision-making networks can be highlighted as well. The employment relationship conflicts are largely provided by poor management, poorly designed jobs and the presence of differences over the distribution of economic benefits and returns. In the following parts of this paper, different manifestations of conflicting interests between employer and employee are accounted for including the ways to reduce the level of conflict between them. Subsequent to that, personal viewpoint is included with a recent example of interest conflict between employee and employer before adding the conclusion part. Employment relationship: Manifestations and resolutions of conflicting interests The employment relationship comprises of both cooperation and conflict betwee n employer and employee. ... put their attention on numerous overt manifestations of employment relationship conflict such as job satisfaction and low productivity, high turnover and high absenteeism. Moreover, HR specialists have also highlighted the covert employment relationship conflict through their analysis of informal work groups (among management personnel and employees), decision-making networks and organizational culture. The HR specialists believe that the employment relationship conflict stems from poor management and can be diminished by the improved management (Lewin 2001). In this regard, Taylor (1911) contended that management-worker conflict was largely contributed by poorly designed jobs and the presence of differences over the distribution of economic returns from a relatively low level of productive outcome. Taylor (1911) further argued that by applying industrial engineering principles to the work re-design (including managerial work); the level of productivity would be enhanced considerably and would lead to much bigger economic returns to the management capital and labour. But, it was also the case that workers were increasingly chaffed under the framework of work system required them staunchly to follow the commands and orders of the supervisors (foremen) and that emboldened management to tighten (or threaten to tighten) standard work times at its own will. Furthermore, this work system considered workers as un-dimensional. In order to overcome this narrow concept of the worker and to deal with growing worker dissatisfaction with the framework of scientific management, the pioneers of the human relations movement directed employers’ attention towards workers’ social needs and to the significance of the informal work group (Roethlisberger & Dickson 1939). The notion

Thursday, August 22, 2019

Policy Process Paper Essay Example | Topics and Well Written Essays - 750 words

Policy Process Paper - Essay Example pts are presently being made to counteract the serious problems associated discrimination with youth justice and the following will explore how ending discrimination within the youth justice system can improve the overall operation of the criminal justice system. Discrimination is often described as the prejudicial treatment of others based upon certain real or perceived characteristics. It is generally done on the basis of race, colour, sex, age, language, sexual orientation, religion and disability. Negative terminology within the Youth Service System can lead to discrimination and ensuing levels of oppression towards youth. Labeling is a negative term which means defining someone based upon their appearance or behaviour (real or perceived). A young man with a Mohawk haircut could be labeled as a punk or skinhead solely based on the style of his hair. From a youth justice perspective, a young black man may be subject to more stops and searches by police, and be labeled as more likely to engage in crime, due to the colour of his skin (the UK’s Home Office reports that black and Asian men were more likely to be stopped and searched by police than their white counterparts, see Statistics on Race and the Criminal Justice System, 2006). Discrimination within the Youth Justice System can take a variety of forms. Visible minority youth (black, Asian or other) may be subject to more random police stop and searches, may be less likely to be cautioned by a magistrate and may face higher rates of incarceration. In a study commissioned to look at race and the criminal justice system – not solely the youth system – it was determined that although black residents account for 2% of the population aged 10 and over in England and Wales, their rates of incarceration stand at 12% of the total prison population. This is a whopping and disproportionate 600% increase relative to their total population size! Accordingly, black and Asians are more likely than whites to be

Comparison and Contrast of The Hobbit Novel and The Hobbit Films Essay Example for Free

Comparison and Contrast of The Hobbit Novel and The Hobbit Films Essay The Hobbit: An unexpected journey and The Hobbit: The desolation of Smaug had a great director; Peter Jackson to keep every original concept that J. R. R. Tolkien would have in mind if he was the one to direct these movies. They kept that its not only about getting Dwarves their homeland back, but the development of a quiet, stay at home and stay safe Hobbit. Most of the characters were well interpreted into the movie like Thorins greed for the Arkenstone, how that is his childhood and the kingdom was balanced on the Arkenstones power. The films kept the same feeling that one would get from reading the novel. A Hobbit on his adventure, there and back again. Though they kept the same feeling, scenes and characters occurred even though they were never included in the novel. Tauriel was a she-elf that created a love triangle between Kili and Legolas. In the book, Kili goes with the other dwarves, entering Smaugs lair. In the film, he gets a injured in the leg by an arrow that becomes infected and hes forced to stay in Laketown with Bard and the others, and Tauriel and Fili his brother. Their deaths will become different from the original story. Also the size of Smaug became enormous compared to the book and J. R. R. Tolkien had his own artwork of the rough size of this dragon and the amount of gold he settled in. The treasure and how much dragon remained under the mountain was blown off the scale. These differences hardly impact the plot, but those are some differences between The Hobbit novel and The Hobbit movies.

Wednesday, August 21, 2019

The Benefits of Compulsory Education

The Benefits of Compulsory Education In Ireland all children of the state are obliged to attend school and receive an education. Compulsory education in Ireland is enforced by the school attendance act 1926 and the education welfare act 2000. The acts insure all children are provided with an equal opportunity to education. There are three levels of education available. Each student is required by law to attend up to the age of 16 or to Junior Certificate level. Prior to the existence of compulsory education many children had no access to basic education because their parents may have not been able to afford tuition. That problem has been eradicated due to the introduction of free public schooling. Basic education prepares a child intellegualy for mature adult life. Education shall prepare the child for an active adult life in a free society and foster respect for the childs parents his or her cultural identity, language and values and for the cultural back round and values for others (Article 29 of unconventional of the rights of a child) As a result of compulsory education, Ireland has one of the highest education rates in the world. 81% of Irish students complete second level and approximately 60% of these students proceed to higher education. Compulsory education follows a holistic approach. Although it is important to focus on the academic aspect of education it is also vital to point out the social aim of education. The main purpose of a holistic approach to education is to prepare individuals for a competent adult life emotionally, physically and spiritually. It aims to provide each child with the ability to seek out their own uniqness. Few schools are committed to holistic principles but many teachers try to use the ideas behind holistic education. By teachers using real life experience and events and not just delivering facts and notes, helps engage a student into a subject making learning fun and enjoyable. Self direction and resilience are major components of holistic principles. With the guidance and support for teachers, children can learn from their own experience and in turn can build on them. The highest function of education is to bring about an integrated individual who is capable of dealing with life as a whole (Jiddu Krishnaminti) Education provides a daily routine, responsibility and activities, which contributes to a healthy well rounded development. Compulsory education discourages child labour. Child labour is the exploitive employment of a child under the minimum legal age limit. The minimum age limit to work differs in each country. Irelands minimum age limit is age 15. Child labour occurs when there is limited access to education, no child labour laws and no employee rights. Working children are under paid. This in turn sees the high demand for low paid employees and leaves less employment available to adults. The cycle then continues. In 1919 the International Labour Organisation began to address the major issue of child labour. This contributed to the introduction of the School Attendance Act in Ireland in 1926. The act obliged children between the age of 5 and 16 to attend school. Previous to compulsory education the majority of families may have relied on children to leave education to help obtain basic necessities for the family. This undoubtedly denied children their right to education. The more education available to individuals can only benefit Irelands economic growth. Our progress of a nation can be no swifter than our progress in education. The human mind is our fundamental resource.(John F Kennedy) Presently in Ireland child labour is near to non existence. Child labour has decreased from 25% in 1960 to 10% in 2003 mainly due to the introduction of compulsory education Illiteracy levels continue to decline since the introduction of compulsory education. Illiteracy is the inability to read or write in any language. Prior to the existence of the compulsory education acts, reading and writing were seen as a skilled profession and only the rich and important had access to gain these skills. Illiterate people were unemployable even in the most basic working environment as many could not even fill out simple information details. Currently in Ireland illiteracy may not be attributed to poor attendance in school. Many individuals who experience literacy difficulties have physical or psychological issues. Illiterate people were often seen as carless, immature and unintelligent individuals. . Since physical and psychological issues are now often detected early on in school and addressed, ilitricy and discrimination are uncommon. There are five levels which literacy is assed at. Level one is classified as having very poor or no literacy skills. Level three is classed on having an adequate amount of skills to cope with life. Level five is seen as highest level of literacy which individuals can process difficult information. In Ireland 17% of 16 to 25 year olds are at level one compared to 44% of 55 to 65 year olds. This percentage is mainly due to enforced attendance in school. Although literacy levels are declining people who dont readily use there literacy skills daily can easily get out of practice. Compulsory education provides a skilful and qualified workforce. A qualified and skilful workforce is necessary for economic growth within a country. Education helps individuals become self sufficient therefore able to earn a living. Educated individuals create wealth for the country and these attract foreign investment. Foreign investment was up 10% since 2008. Even with Irelands economic down turn Ireland is still capable of attracting investment due to Irelands competent and highly skilful workforce. Presently in Ireland 81% of Irish students complete second level education. Approximately 60% of these students continue on to further or higher education. Compulsory education gives the individual the incentive to further their education. Being obliged to attend school to Junior certificate level gives the student a chance to make mature and sensible choices regarding their future. Education is the main component in the structure of adult life. Ethnic minorities in Ireland are socially accepted due to compulsory education. An ethnic minority are a group of people who have their own cultural values. These minorities hold different views on culture, religion and language. The travelling community are one of Irelands oddest ethnic minorities, accounting for 0.5% of the population. Approximately 7,769 traveller individuals are in education in Ireland toady. Prior to the compulsory education act the majority of travellers did not attend school. Traveller parents may have felt education was not necessary as they were traditional self employed. Traveller individuals were also less likely to obtain employment due to their life style and were often socially excluded and discriminated. Traveller children who attended school prior to the education act were thought in the same class room regardless of age. Presently in Ireland 100% of traveller children are in age appropriate classes. The traveller community have become integrated with society. People from a wider community have begun to understand their cultural differences and needs. Today the department of education and science employee 503 resource teachers for travellers (RTT). The resource teachers address their ethnic and cultural needs and help promote cultural awareness to other students. Education shall be directed to the full development of the human personality and to the strengthening of respect for human rights and fundamental freedoms. It shall promote understanding, tolerance and friendship among all nations, racial or religious groups Universal Declaration of Human Rights, Article 26 (2) Compulsory education leads to equal opportunity for every individual regardless of back round. The traveller community are now employed in all sectors of the workforce. A number of travels now attend third level education.

Tuesday, August 20, 2019

Analysis of Company Network Models

Analysis of Company Network Models CHAPTER 1 ABSTRACT The purpose of this exercise is to provide a detailed design document as per the requirements given in various formats by the Client NoBo Inc. The scope of this document includes at first explaining the requirements provided by the client, explaining the solution both from a top level view and detailed, also explained are the configuration steps, technologies used and scope of the future work and recommendations. We have used modular design approach for designing the network .The final outcome is a detailed document which will extensively assist in deploying and configuration stages of network for NoBo Designs. CHAPTER 2 INTRODUCTION 2.1 AIM: This project aims to analyse the various network models and design a network according to the clients requirements. 2.2 OBJECTIVES: All the Cisco network models: Campus network, Hierarchical network, Enterprise edge model have been reviewed. According to the client requirements the suitable network model has been identified and designed. Proper selection of the devices (Routers, Switches, Computers, cables) has been made to meet the service requirements. The cost for all the devices and equipments that are required has been estimated. Centralised internet connection has been provided for the branch sites from their respective headquarters. This provides high control on the data between the sites. IPsec is cond for data security while using the backup line when the main link goes down. Cisco IOS Firewall is also cond on the perimeter devices. The designed network has been cond on the simulator and all its functioning has been tested. 2.3 DISSERTATION STRUCTURE: CHAPTER 1: This chapter briefly discusses about the abstract of our project. CHAPTER 2: This chapter briefly explains the introduction of our project topic, reviewing all the objectives and ends with the conclusions of each and individual chapter in our dissertation. CHAPTER 3: This chapter explains the background of various network topologies, reviewing of all the concepts like routing, switching, IP addressing and ends with the discussion of the QOS, security issues. CHAPTER 4: This chapter introduces the requirements of network design, implementation, testing and ends with the explanation of all configurations. CHAPTER 5: This chapter briefly discusses about all the experimental results and ends with the analysis of the obtained results. CHAPTER 6: This chapter discusses the entire evaluation of our project and ends with the introduction of conclusions. CHAPTER 7: This chapter briefly discusses about the overall conclusions. CHAPTER 8: This chapter provides the recommendations and future work in our present topic. CHAPTER 3 LITERATURE REVIEW 3.1 Cisco Network Models: Network models may change due to the implementation of different technologies which are applicable to us. But the goal of each model is finally same which is convergence and achieving service integration. There are 6 different geographies available in an end-end network architecture which is briefly discussed below: ( Inc., C. S. (Mar2009, Roberts, E. (8/28/95). 3.2 Cisco Hierarchical model: It is an older model which is good for network scalability. The entire network is divided into 3 layers which are given below: Access layer: These devices are generally developed entirely in a network for the purpose of providing clients access to the network. In general it has been done by the switch port access. Distribution layer: In general, these devices are developed as aggregation points for access layer devices. These devices can be used for the dividing of workgroups or some other departments in the network environment. They can also provide WAN aggregation connectivity at various Cisco Network Models. Core layer: These devices are designed for the purpose of fast switching of packets and they should provide the redundant otherwise it results in loss of degradation of service at the time of network congestion or link failures. Finally these devices help in carrying the entire network traffic from one end to the other end. Finally this model provides good scalability and it supports the combination of SONA, other interactive services and these are applicable to any topology (LAN, WAN, MAN, VPN..) or other connectivity options which are applicable to us. The following diagram (3.1) shows us the Cisco Hierarchical model. 3.3 Campus Network Architecture: In last 10 years it has been developed rapidly and the no of services supported in this model are more. The basic structure of this model is just an extension of the previous model. It supports the implementation of various technologies in this model like QOS, MPLS VPN, IPSEC VPN, and HSRP and so on. It provides the network access to campus wide resources and provides layer 2 switching; layer 3 switching at the Access and Distribution respectively. Services in this model are switched from stateless to stateful and provide redundant devices to monitor all the events, connections in a network. Meeting of these requirements requires some changes in its basic model. The following (3.2) shows us the campus network architecture model.( Gilmer, B. (Nov2004) It provides the combination, multi- service environment which gives the sharing and connectivity of all the users who are working at the remote, branch sites. It requires the combination of both hardware and software devices for providing the services and applications to all the clients in a network architecture. SONA architecture helps an enterprise model to extend its services to the remote site under the consideration of good service levels. Cisco Unified Communications, security and so on can be offered at all the branch sites to overcome the problems of inadequate connectivity. The following diagram (3.3) shows the branch network architecture. It plays a major role in the deployment of any network. Now days, it is growing rapidly to implement more SONA functions. These additions of new functions like virtual servers, instant applications, dynamic change of network configurations and so on. Some resources will be added online to get the support of upcoming needs. This network architecture provides the info about on- demand services which provides dynamic network environment to all the users, consolidation of services while growing of various business applications provided by an adaptive network. Finally this network model reports more usage of our capital without any changes in its infrastructure. In general it has been developed for the purpose of higher level security features in network architecture. It has been done by the support of several server farms having different functionality from DMZ (demilitarized zone) functions like DNS, FTP, HTTP, Telnet and so on for all the users (internal/ external) to share various applications and services among partners and to get the access of internet applications. This network architecture is entirely different and it can make a new or it can break the all discussed Cisco versions. Based on the discussion of all the services like SONA, QOS, and transport services and so on which would mandatory in an end- end system? Based on the bandwidth requirements, their functions and providing QOS the WAN/ MAN has been designed. The functioning and geography plays a major role in deciding the method and speed connectivitys among various sites. The cost of total deployment of a network may vary and it is different from each other. If the connection exists between the sites is a traditional frame relay or if it is provided by a service provider. For example, by using MPLS this provides layer three connectivity between two ends. And it also varies by considering the distance between two sites. The convergence of various types of application over an IP network requires good connectivity, high security levels and providing of good services over the large WAN. The following fig (3.6) shows the WAN/ MAN architecture. (Israelsohn, J. (7/22/2004.) In this approach the overall network design and implementation is discussed with the adequate background. Modular Design Approach: The recipe for an efficient and robust network is to design the network taking into Consideration the various functionalities/requirement required by the network and placing that functionality into a module. Various modules might end up acting in independent physical devices or one physical device may contain all the modules, the idea is to visualize the various functionalities acting as independent unit. The part of the network which consists of hardware and configurations for the wide area networks is termed as the WAN module of the network. It should contain of the all routers, interfaces, cabling and configurations that belong to the Wide Area Networks. The module should be designed separate from the other modules. Similarly all the devices, interfaces and configurations that are involved in the virtual private network would be designed as one module. Some aspects of the design for which there are no pointers in the design documents are also discussed in the detail design section with details of the relevant choices. 1) Performance: A network to its end user is as good as how his/her applications perform. Following are few metrics to for measuring network performance. Responsiveness: The design should be such that it is par with the acceptable responsive time of all the business applications. Throughput: The rate of traffic passing through a given point in the network, it can be calculated in multiples of bits per second or packets per second. Utilization: utilization of resources is the most effective metric to calculate the congestion points in the network, aiding the network design to a great extent. 2) Availability: Network Availability is the key factor to a proper network design. Planning for continuous uptime is important for the business to carry out their activities without any interruptions. Following are a few points for availability: Device Fault tolerance: All the devices installed in the network should be of quality and reliable. Where ever possible redundant ports, modules and devices should be installed. Capacity Planning: A network design should consider adequate capacity planning, for example how many connections can a link handle in worst case scenarios. Link Redundancy: As per the business requirement at least all the important links and internet connectivity should be redundant. 3) Scalability: All the network modules should be designed as such that they should cater for future requirements as well as todays needs. Topology: The topology should be designed as such that it would require minimal configuration whenever any major or minor changes are required. Addressing: The network addressing should allow routing with minimum resources. For example by using route summarization and proper ip addressing scheme which would have minimal impact or no impact on the existing networks or subnets and routing mechanisms. Local Area Network Module: The local area network design primarily consists of dividing the various departmental requirements into logical network separations. At all the sites will create individual virtual area networks for all the departments. All the virtual area networks will use a class c /24 subnet mask, reason behind that is the IP addressing used for the internal networks is all private and hence no sub netting is required. All the Vlans at all the sites are local Vlans which means that they do not extend across the wan pipes. The departments at different sites might have similar names and functionality but its always recommended that the Vlans are kept to be local. The Virtual are network will divide the whole LAN into virtual boundaries allowing for broadcast control and provide for access-control using access-lists. A VLAN has been provisioned for the Server Network and wireless network at each site as well. The VLANS are local to the respective sites only and are class C /24 networks.DOT1q trunks have been placed between the layer 2 switches and the routers at each site. DHCP: The DHCP is Dynamic Host Configuration Protocol provides automatic IP addresses To the hosts on the TCP/Ip network [RFC 1531].It uses BOOTP known as bootstrap protocol. The DHCP server can be on the same or on a different network away from the host pcs. This is possible with the dhcp relay agent. When a client Pc boots, it searches for the server by sending broadcast packets on the network. When server gets theses broadcast packet it responds and sends a packet with an IP address to the client from the DHCP pool. The client can use the IP or can request for another IP instead. The client can hold this IP as according to the configuration in the DHCP server. The minimum duration for the client to hold the IP address is 8 days. After this period the clients has to make a new request for an IP address. This how , the DHCP usage in the network will reduce the intervention of the administrator from giving the IP addresses manually. NAT: For a Pc to connect to the internet and communicate with the other Pcs on the internet, it needs a public Ip address. One has to pay to have a public IP. It will be very expensive to have all Public IP addresses in a network. So, NAT provides a facility to convert the private IP address to the Public Ip which is on the interface of the device (router) that is directly connected to the internet via ISP. This saves money. Moreover it provides the additional security to the internal network By using the one public address. Following are the benefits that NAT provides: Preservation of IP address IP address and application privacy Easy management Routing Module: The routing module consists of the routing architecture at each site; it is the responsibility of the routers to forward packets to the correct destination. Routers by querying the routing table make the forwarding decision. 1) Static routes: At each site static routes have been placed at each head quarter sites. Static routes are the manual routes that are placed by the network administrator manually in the router and have to be taken out manually as well. At the headquarter site the static routes point to far end headquarter site or to the vpn subnet. 2) Default routes have been placed at all sites, Default routes are treated by the routers as a catch all. If there are no specific routes towards a given destination, the default route will be picked up and the packet would be forwarded out of that interface to which the default route belongs. Since the Internet has more than 100,000 routes , it would be infeasible to place all those routes into our routing table , so instead a default route has been placed at each headquarter to forward all the internet traffic towards the interface belonging to the ISP end. Since we are using the far end headquarter as back up to our internet connections at each site. A special type of default route has been added in each headquarter, if the internet link goes down, the floating route will come into the routing table and the original route will disappear. The floating route is nothing but a default route with a higher administrative distance. This is a feature of Cisco IOS, it originally takes the route with the lower AD and places that into the routing table, if that route is lost it would place the second default route with the higher administrative distance. 3) Routing Information Protocol: Routing information protocol version 2 has been used to propagate the Subnet routing between the sites. RIP is a distance vector routing protocol which advertises its routing tables to its neighbours and has a hop count of 15 , since our network has only five sites at the moment, RIP has been used for routing between the networks , the RIP version2 is the recent version of the rip ipv4 and it can carry variable length subnet masks . The RIP is adequate for our requirement. (http://www.ciscosystems.org/en/US/docs/internetworking/technology/handbook/Routing-Basics.html accessed on Dec 12 ,2009) RIP: As said earlier Routing Information Protocol is the only widely used distance vector protocol. It propagates the full routing table out to all participating interface in every 30 seconds. RIP works very well in smaller networks, but it is not scalable for large networks having slow WAN links or on networks with more than 15 routers installed. RIP version only supports class full routing, which essentially means that all devices in the network must have the same subnet mask. The reason: RIP version 1 does not propagate with subnet mask information. RIP version 2 supports classless routing, which is also called prefix routing and does send subnet mask in the route updates. (Chin-Fu Kuo; Ai-Chun Pang; Sheng-Kun Chan (Jan2009,) RIP Timers RIP has 3 different timers which regulate the performance: Route update timer: This timer sets the delay between the propagation of the full Routing table to all the neighbours: this would be normally 30 seconds. Route invalid timer If the router doesnt hear any updates for a particular router for 90 seconds it will declare that route invalid and will update all the neighbours to that the route has become invalid. Route flush timer : After the route has become invalid , another timer starts which is normally 240 seconds ,if the router doesnt hear anything about the said route , it will flush the route out of its routing table and will update the neighbour that I am going to remove this route from my routing . RIP Updates RIP being a distance-vector algorithm propagates full routing tables to neighbouring routers. The neighbouring routers then add the received routing updates with their respective local routing tables entries to accomplish the topology map. This is called routing by rumor, In routing by rumour the peer believes the routing table of its neighbour blindly without doing any calculations itself. Rip uses hop count as its metric and if it finds that multiple path share the same cost to a particular destination it will start load-balancing between those links, however there is no unequal cost path load balancing as there is possible in case of EIGRP. Rip can be troublesome in many ways: Rip actually only sees the hop count as a true metric, it doesnt take care into consideration any other factors So if a network has two paths, the first only 1 hop away with 64 Kbps of bandwidth but a second path exists with 2 hops but each link having a bandwidth of 2 mbps , RIP will always prefer path no 1 because the hop count is less. Rip has a very crude metric and hence not a protocol of choice in many networks. Since RIP by default is classless and is a true distance vector protocol, it also carries with itself same issues as presented by the distance vector routing protocols, fixes have been added to RIP to counterattack such problems. Snort is an open source network based intrusion detection system, it can do traffic logging and intrusion detection analysis on the live traffic, snort is installed on a host and the interesting traffic is copied to it via the port mirroring or port spanning techniques, Snort can be also used inline on an Ethernet tap, it can work in conjunction with Ip tables to drop unwanted traffic. Inter-site Routing: The routing protocol RIP version 2 will propagate routes among all the sites, each Vlan will be advertised as a network in the routing protocol. Switching: The switches at each site carry all the virtual local area networks. 1) A DOT1q trunk has been placed between the switches and the routers at each site. The dot1q trunks carries all the Vlans from the switches to the routers, the routers act as the layer 3 gateway for all the Vlans present in the site, the layer 2 switches alone cannot act as the layer 3 gateways and hence they require some kind of layer 3 device. 2) All the other ports in the switches are either access ports or are trunks to other switches in the same sites. The access ports are the user ports, each access ports would belong to one or the other Vlans. The no of access ports in the building would decide the number and the model of the switches to be placed inside the access layer. Vlan: By Default all the ports on a layer 2 switch belong to the same broadcast domain. The broadcast domains are segregated at the router level, however there are requirements to segregate the broadcast domains in campus switching environments, hence the virtual local area networks are used. The numbers of Vlans in a switch are equal to the number of broadcast domains, the ports on the switch which belongs to a particular Vlan belongs to a certain broadcast domain of that Vlan. Devices in one Vlan cannot connect to other Vlans if there is no layer 3 connectivity provided. Trunking: Speaking of IEEE 802.1Q. There are two different trunking protocols in use on todays Cisco switches, ISL and IEEE 802.1Q, generally referred to as dot1q. There are three main differences between the two. First, ISL is a Cisco-proprietary trunking protocol, where dot1q is the industry standard. (Those of you new to Cisco testing should get used to the phrases Cisco-proprietary and industry standard.) If youre working in a multivendor environment, ISL may not be a good choice. And even though ISL is Ciscos own trunking protocol, some Cisco switches run only dot1q.ISL also encapsulates the entire frame, increasing the network overhead. A Dot1q only place a header on the frame, and in some circumstances, doesnt even do that. There is much less overhead with dot1q as compared to ISL. That leads to the third major difference, the way the protocols work with the native Vlan. The native Vlan is simply the default Vlan that switch ports are placed into if they are not expressly placed into another Vlan. On Cisco switches, the native Vlan is Vlan 1. (This can be changed.) If dot1q is running, frames that are going to be sent across the trunk line dont even have a header placed on them; the remote switch will assume that any frame that has no header is destined for the native Vlan. The problem with ISL is that doesnt understand what a native Vlan is. Every single frame will be encapsulated, regardless of the Vlan its destined for. Access ports: An access port is a port which does not carry any Vlan information, the port which is cond as a an access port, on that port the switch takes off the Vlan information and passes the frame on to the end device, end device be it a pc or a printer or something else has no information passed about the Vlan. A).routing: The routing table in a router is populated mainly in 3 ways. a) Connected routes: router places the networks belonging to all types of its live interfaces in the routing table such routes carry an administrative distance of 0 as they are most trusted routers, these routes are taken out of the routing table if the interface goes down. b) Static routes are routes place manually by the router administrator and carry an administrative distance of 1, these routes are the second most trusted by the router after the connected routes, since these are being added by the administrator themselves c) Third type of routes are installed by the routing protocols and carry administrative distances according to the type of the routing protocol. Wireless local area network Module: A Vlan has been provided at each site which acts as a wireless network, the wireless Vlan connects to wireless access points which provides wireless connectivity to the users. Wireless access points are placed at each floor at all the sites, all the wireless access points will be of Cisco Linksys brands. The wireless access points at each site will be WIFI carrying all a, b or g standard. (O. Elkeelany , M. M. M., J. Qaddour (5 Aug 2004) The wireless networks will use WPA2 key security mechanisms to protect the network from unauthorised access and attacks. Proper placements of the wireless access points can be done after a physical inspection of the sites. If a barrier wall or something else obstructs the coverage of the wifi access points at a floor another wifi access point will be required at the same floor. IP Addressing Module: WAN Ip addressing, all wan connections are point to point and use a /30 subnet mask A /30 subnet only allows for two actual hosts which fits for the wan connections. VLAN Ip addressing, all the Vlans including the wireless and the server Vlans are /24 networks All the future Vlans should be /24 as well, this would help to limit the layer3 broadcasts to only 254 hosts, /24 is being used because our Vlans are all based on class c private addressing and there are adequate addresses in the same class for our future needs as well so there is no actual requirement to subnet any further, sub netting further would actually make the design complex without any real benefits. The routers also have a trunk which comes from their respective site switches. The 1st valid address of the each Vlan belongs to the router acting as a gateway to the Vlans. These .1 addresses are required to be hardcoded inside the routers themselves. The host addressing is taken care by the dhcp protocol, each router as its site will act as a dhcp server for all the Vlans present in the same site. The router acting as a dhcp server would provide gateway information to the hosts in each Vlan as well as the dns servers to be used and the domain information as well. A separate list has been maintained for the hosts outside the dhcp scope, should there be a requirement that a host be provided a static Ip address, and the same Ip address should be added to the list of non dhcp addresses for each Vlan at each site. Server Farm Module: A special virtual area network is in place at every site for a special purpose, this vlan only has servers placed in it, this Vlan acts as a DMZ at all sites. The servers at various sites are placed in separate Vlans to protect them from the broadcasts created by the users in the site as well as blocking unauthorised access. If the requirement arises that a server should also be placed in another Vlan at same time, either 2 network cards should be attached to the same server and each placed in the respective Vlan, if the server is required to be attached to more than 2 Vlans, then the server should carry a special network card which could build trunks with the 2960 switches. The speed and duplex modes on all the server ports should be manually cond by the network engineers as there are chances of duplex mismatch in the auto mode. Unauthorised access can be blocked into the server farm via using IP access-lists feature of the Cisco IOS.( Zhuo L , W. C., Lau FCM . (OCT 2003 ) Security Module: This is the most important module of the network design, as its name suggests it would cater for the network security, following are the security measures in place for the network designs. An integrated Cisco IOS firewall protects the perimeter interface (internet connection) from attacks from the outside world at both the headquarter sites; IOS firewall uses stateful inspection for the protocols listed in the firewall itself. As advised earlier the access to the server Vlan at each site is also controlled by the use of IP access-lists, only authorized IPs/networks and that too only on specific ports are allowed to traverse the DMZ(DEMILITARIZED ZONE). There are perimeter access-lists in place at the headquarter sites blocking most common and known attacks from the internet. The internet modules have been centrally designed to keep a tighter control and strict security. An additional measure of security can be placed at each site by adding an intrusion prevention system to each headquarter. A very effective intrusion detection engine is SNORT, being open source it can be installed in a very short period of time and is free. Further management Vlan can be secured by using port security and sticky Mac mechanisms. http://www.cisco.com/en/US/prod/collateral/vpndevc/ps5708/ps5710/ps1018/prod_qas09186a008010a40e.html The Cisco IOS firewall is an EAL4 certified solution and is a stateful firewall, it is integrated into Cisco router IOS, IOS is the best available routing, security and VoIP software around, and integrating a stateful firewall produces an economical yet flexible solution. It is the ideal solution for small offices, branch offices and wherever the need arises for an embedded firewall solution. The Cisco IOS firewall can be turned on and off in the desired manner on the desired interface in the Cisco router Cisco IOS firewall can be cond in basically two modes, Classic firewall also known as CBAC control based access control or the new configuration technique which is called Zone based policy firewall. The later one is used wherever the network is required to be divided into various zones for example a DMZ zone. The later configuration methodology will be carried on in the future as it caters for the changing needs of networks. WAN MODULE: The Wan connectivity for the NoBo designs has been designed taking in consideration of the following characteristics WAN connectivity: Head -quarters: All the head Quarters have been has been connected via an International leased line from service provider. All the branch-offices are connected to their headquarters via leased lines as well via service provider. Wide Area Network Back up The internet connectivity at both the remote and client sites can be used as a backup in case the primary WAN link is down; a separate site-to-site vpn link will be required to be cond between the two sites. The site to site vpn will use the IPSEC framework which would be only used if the floating routes that are present in the Cisco routers start pointing towards the vpn links in case of the wan link outage. This IPSec vpn back up link should be strictly used as a back up as the internet bandwidth is limited and the latency is high. Network Management mechanisms would notify everyone, if the primary wan link is down. If the requirement for the backup link for a branch site comes up, same methodology can be used, the branch can acquire its own internet connection and use it as a backup link to its respective head office. In that case changes in routing will also occur. IPSec: IPSec is a protocol contains set of features that protect the data which traverses from one location point to another. The location itself defines the type of VPN. The location could be anything such as pc on the internet, a small regional office, a home office or any corp. headquarters. A user on the go would always connect to a user to site vpn and all the others would be called a site to site vpn. The IPSec protocol works on layer 3 and above, like tcp/udp header and data and does not protect any layer 2 frames, a different kind of protection mechanism has to be deployed for the same and also is possible only in the controlled network. The encryption and IPSec are many times thought to be one and the same thing but they are different, IPSec is basically a suite of protocols and one of them does encryption. Following are the features of the IPSEC protocol suite. Data confidentiality Data integrity Data origin authentication<

Monday, August 19, 2019

In Response To Those Winter Sundays Essay -- essays research papers

In Response to "Those Winter Sundays" Being a child, is one of the hardest stages of ones life. They go through doing all the wrongs in order to do the right, and they socially develop into a mature and sensible human being. During this stage of a young child's life, the roles of parenting are absolutely crucial. In the poem "Those Winter Sundays" by Robert Hayden, I get a sense that the narrator does not have a special bond with his father, and that there is a sense of fear. I feel that in order to grow up and be a morally strong and stable person, you need a well-built relationship with at least one of you parents, if not both. Growing up in a very suburban town taught me many things about being a boy and even further into my life as a young man. I spent most of my childhood days running through the woods, fishing in our pond, or helping my father with some project that he had around the house. I used to always come back to him with everything for help. He would be doing something in the garage, and I would catch a fish that had swallowed the hook. I would run up to the house, break his concentration, and he would come help me. He always did that, and never seemed to mind it was like it was his job to love me and teach me how to be a good person. In the poem, I get a sense that there is no bond, like my father and I have which leads to confusion in the narrator's life. For instance, in line eight when he says "I would slowly rise and dress, feari...

Sunday, August 18, 2019

La Rotonda Essay -- Architecture Construction Essays

La Rotonda One of the great architects in time was Andrea Palladio, who was made famous for his magnificent Villas built in Italy in the fifteen hundreds. To do so he drew from the Greek and Roman’s architecture, studying many of their finest works, to create his masterful villas. This process would develop into a style of architecture, which became known as Palladianism. This style has inspired buildings which have dominated the landscape for the last four hundred years. These buildings include: English castles, American public buildings, Swiss railroad stations, Spanish libraries, Tuscan villas and Canadian hotels. Many of these buildings are considered to be the great buildings of the world. Andrea Palladio was born in 1508A.D. in Italy. At a very young age he became a stone mason, however his journey into architecture began when he met Gian Giorgio Trissino who immediately saw ability in him and decided to mentor Palladio. Trissino combined a study of classical architecture with architecture of the time, all the while allowing Palladio room to develop a style of his own. In time Palladio was constructing villas through out the country side of Italy, in all he constructed 30 villas, 18 of which are still standing today. Perhaps Palladio’s most famous work was the Villa Rotondra or La Rotondra which was started around 1565 and took approximately 4 years to build and was greatly inspired by the Pantheon in Rome. It is interesting to note that la Rotondra is different from Palladio’s other villas in a number of ways, and it is evident that these differences help distinguish it from the rest. The main differences between Palladio’s Rotondra and his othe r work are, The Rotonda is set on a hilltop, it is located near a... ...to see why many regard Andrea Palladio as one of the most influential architects of all time, he was able to create some of the most stunning, graceful, and awe-inspiring villas in the world. Unfortunately, Palladio died before his masterpiece, La Rotonda, was complete. The project was completed by his protà ©gà © Vincenzo Scamozzi. Work Cited 1.) http://boglewood.com/palladio/life.html, Wednesday September, 28 2.) Mathew McCann Feton, â€Å"Time: Great Buildings of the World†  © 2004, New York, NY. 3.) http://kuleuven.ac.be/bwk/materials/Research/KVB/EDAMM_intro.html, Wednesday September, 28 4.) http://studentwebs.coloradocollege.edu/~A_LIVESAY/palladio.html, Wednesday September, 30 5.) http://www.infoplease.com/ce6/people/A0837370.html, Wednesday September, 28 6.) http://architecture.about.com/b/a/2003_11.htm, Wednesday September, 28

Saturday, August 17, 2019

Compensation Management Essay

Compensation does not refer, however, to other kinds of eployee rewards such as recognition ceremonies and achievement parties. The ultimate objectives of compensation administration are: efficient maintenance of a productive  workforce,  equitable pay, and compliance with federal, state, and local regulations based on what companies can afford. The basic concept of compensation administration—compensation management—is rather simple: employees perform tasks for employers and so companies pay employees wages for the jobs they do. Consequently, compensation is an exchange or a transaction, from which both parties—employers and employees—benefit: both parties receive something for giving something. Compensation, however, involves much more than this simple transaction. From the employer’s perspective, compensation is an issue of both affordability and  employee motivation. Companies must consider what they can reasonably afford to pay their employees and the ramifications of their decisions: will they affect  employee turnover  and productivity? In addition, some employers and managers believe pay can influence employee work ethic and behaviour and hence link compensation to performance. Moreover social, economic, legal, and political forces also exert influence on compensation management, making it a complicated yet important part of managing a business. Compensation and Reward system plays vital role in a business organization. Since, among four Ms, i. e Men, Material, Machine and Money, Men has been most important factor, it is impossible to imagine a business process without Men. Advantages of Fair Compensation System: Therefore a fair compensation system is a must for every business organization. The fair compensation system will help in the following: 1. If an ideal compensation system is designed, it will have positive impact on the efficiency and results produced by workmen. 2. Such system will encourage the normal worker to perform better and achieve the standards fixed. 3. This system will encourage the process of job evaluation. It will also help in setting up an ideal job evaluation, which will have transparency, and the standards fixing would be more realistic and achievable. . Such a system would be well defined and uniform. It will be apply to all the levels of the organization as a general system. 5. The system would be simple and flexible so that every worker/recipient would be able to compute his own compensation receivable. 6. Such system would be easy to implement, so that it would not penalize the workers for the reasons beyond their control and would not result in exploitation of workers. 7. It will raise the morale, efficiency and cooperation among the workers. It, being just and fair would provide satisfaction to the workers. 8. Such system would help management in complying with the various labor acts. 9. Such system would also bring about amicable settlement of disputes between the workmen union and management. 10. The system would embody itself the principle of equal work equal wages. Encouragement for those who perform better and opportunities for those who wish to excel. Need for designing of compensation Policy: After going through the role and essentials of a sound compensation system, it becomes imperative that every business organization should be set up for itself a proper Compensation Policy. The Management of the organization must have well-designed Compensation Policy. The policy calls for deciding the criteria for promotions, up-gradations etc. It would also be necessary to fix up the standard expectations from each and every workmen/employee. The policy should determine the norms to be followed for Performance Appraisal or Job Evaluation. It should also chalk out the need for training, provisions for fringe benefits, welfare schemes etc. It must prescribe the manner in which such benefits would be extended and levels within the organization to which such benefits are extendable. The incentive schemes and its details, Pay package structure, Tax implications etc. are matters of concern while designing the compensation Policy. Importance of Compensation System: Money makes the mare go is the proverb. It holds good for all the factors participating in the business process expects its fair share of prosperity of the business. Compensation/ Reward System play a vital role in the business organization. And its importance can be very well ascertained as follows: 1. Sound Compensation/Reward System brings amicability and peace in the relationship of employer and employees. . The system brings out the best out of every employee in the organization. It aims at creating a healthy competition among them. And as such, encourages them to work hard and efficiently. 3. The system provides adequate opportunities to those who wish to perform better. The system provides growth and advancement opportunities to the deserving employees. 4. The system upholds the principle of equal wages. It provides transparency and parity too. 5. The perfect Compensation system provides platform for happy and satisfied workforce, this minimizes the labour turnover. The organization enjoys the stability. 6. The organization is able to retain the best talent by providing them adequate compensation thereby stopping them from switching over to another job. 7. The business organization can think of expansion and growth if it has the support of skillful, talented and happy workforce. 8. The sound Compensation system is hallmark of Organization’s success and prosperity. The success and stability of organization is measured with pay-package it provides to its employees. 9. Both employer and employees get benefited because of the sound Compensation System. 0. A sound Compensation System helps the organization keep pace with changing environment. It helps the organization to cope up with the wage levels in neighboring industries. 11. Sound Compensation System minimizes the complaints from the employees, provides them the congenial work environment to perform better and sets up for them the targets to be achieved. Definite targets help employees kn ow their role in the organization, which minimize wastage, and enhance overall efficiency. It also helps organization to reduce the cost of production and maximize profits The Compensation System Time RatePiece rate BonusProfit sharingIndirect Monetary Incentive Time Rate System: This system is divided into three categories. Time Rates Ordinary level High Wage LevelGraduated Time Rates Ordinary Level: It is calculated on time (daily, monthly, weekly etc. )The formula for calculation of salary is Rate per hour X Hours worked = Earnings (RPH X HW=E). High Wage Level: It is calculated on hourly basis put over time is not paid. The formula for calculation of salary is RPH X HW = E Graduate System: Payment: the basic is linked with dearness cost of living. The index of cost of living is varying and that is considered for calculating the remuneration. Formula: Basic Salary is Rs. 2,000/- and Cost of living Index (D. A) is 100% then, Rs 2000+100% of Rs 2000 as cost of living is added, thus total remuneration is Rs. 4000/-. It is after 6 months, cost of living index change 150%. Then basic salary + 150 % of basic salary si. e Rs 3,000/- will make it Rs, 5000. Piece Rate/ Payment Rate (Payment by Results) System of Piece Rate (Payment by Results) Straight Piece RatePiece ;amp; Time Combination Differential Piece Rate Taylor System Merrick System Gantt Task System Straight Piece Rate: Payment: Flat rate is applicable per unit, which is predetermined. The time spent is not considered. Formula: PPR X O = Earnings. Piece Rate and Time Rate Combinations: Payment: It is a dual rate system, designed to perfect inefficient workers. The worker is ensured to get the minimum payment. If the payment is calculated on the basis of piece rate guarantees and number of pieces fall below the minimum wages guaranteed, he is paid by time Rate. Differential Piece rate: Payment: In favour of piece rate system, minimum wages were assured. However, under this system, instead of combining time-rate and piece-rate, there are dual rates for different efficiency level. The purpose behind keeping high piece rate for higher efficiency is as the level of production increases, the cost per unit falls. Bonus: Bonus is given by the company to their employees as a reward. It is been fixed by the government i. e 8. 33%. Bonus encourages the employees to work hard. It is a motivating factor for the employees to improve their efficiency. Profit Sharing: Profit Sharing is the most motivating factor. When the company makes profit it gives some kind of share to their employees as an Annual increment. This helps to motive employees to work hard and get more increment. Indirect Monetary Incentive: Indirect Monetary Incentives like traveling allowance, HRA, Dearness allowance, medical facility etc. are very motivating for the employees. Elements or ingredients of a good wage plan: Before we discuss these two plans, it would be fruitful to know the ingredients of a good wage plan. These are:- 1. It should be easily understandable i. e all the employees should easily understand what they are to get for their work. They should be instructed in how the wage plan works. 2. It should be capable of easy computation i. e. it should be sufficiently simple to permit quick calculation. Mathematical tables may be supplied, by reference to which calculations can be quickly made. 3. It should be capable of effectively motivating the employees, i. e it should provide an incentive for work. If both the quality and quantity of work are to be stressed at the same time, a plan should be selected that will not unduly influence the worker to work too fast or to become careless about quality. . It should provide for remuneration to employees as soon as possible after the effort has been made. Daily or weekly payment of wage would be preferable to induce employees to work. 5. It should be relatively stable rather than frequently varying so that employees are assured of a stable amount of money. Reasons or factors affecting wage differentials: Wages differ in different employments or occupations, industries and loc alities, and also between persons in the same employment or grade. One therefore comes across such terms as occupational wage differentials. Wage differentials have been classified into three categories: First, the differentials that can be attributed to imperfections in the employment markets, such as the limited knowledge of workers in regard to alternative job opportunities available elsewhere, obstacles to geographical, occupational or inter-firm mobility of workers, or time lags in the adjustments of resource distribution and changes in the scope and structure of economic activities. Examples of such wage differentials are inter-industry; inter firm and geographical or inter-area wage differentials. Second, the wage differentials which originate in social values and prejudices and which are deeper and more persistent than economic factors. Wage differentials by sex, age, status or ethnic origin belong to this category. Third, occupational wage differentials, which would exist even if employment markets were perfect and social prejudices, were absent. Wage differential arises because of the following factors:- a. Difference in the efficiency of the labour, which may be due to inborn quality, education and conditions under which work may be done. . The existence of non-competing group due to difficulties in the way of the mobility of labour from low paid to high paid employments. c. Difference in the agreeableness or social esteem of employment. d. Differences in the nature of employment and occupations. Norms for Fixation of Wages in Industry: 1. While computing the minimum wages, the standard working class family should be considered as consisting of four consumption units and t he earnings of women, children and adolescents should be excluded. . The minimum food requirements should be determined on the grounds of a net intake of 2700 calories as laid down by Akroyd for a normal adult in India. 3. Clothing needs should be established on the basis of a per capita consumption of 16. 62 meters per year. 4. As regards housing, the minimum wages should be determined from the standpoint of the rent corresponding to the minimum area specified under the government Industrial Housing Scheme. 5. Miscellaneous expenditure on items such fuel, lighting etc. hould from 20 per cent of the total minimum wage. The resolution further prescribes that the authorities involved in the issue should justify any deviation from these norms. Retirement benefits related enactments in India: Employees’ Provident Fund Act The Act was passed with a view to making some provision for the future of the industrial worker after his retirement or for his dependents in case of his early death and inculcating the habit of saving among the workers. The object of the Act is to provide substantial security and timely monetary assistance to industrial employees and their families when they are in distress and or unable to meet family and social obligations and to protect them in old age, disablement, early death of the bread winner and in some other contingencies. The act provides for a scheme for the institution of Provident Fund for specified classes of employees. Accordingly, the Employees’ Provident Funds Scheme was framed under Section 5 of the Act, which came into force on 1st November, 1952. Main features of the Act The Act is applicable to factorize and other establishments engaged in specified industries classes of establishment, which have completed three years of their existence and employing 20 or more persons. The Act, however, does not apply to co-operative societies employing less than 50 persons and working without the aid of power. An establishment, which is not otherwise coverable under the Act, can be covered voluntarily with the mutual consent of the employer and the majority of the employees. Employees drawing a pay not exceeding Rs. 5000 per month (And now it is amended to Rs. 6500/- ecently) are eligible for membership of the fund. Every employee employed in or in connection with the fund from the date of joining the factory or establishment. The normal rate of contribution to the provident fund by the employees and the employers as prescribed in the Act is 10 percent of the pay of the employees. The term â€Å"wages† includes basic wage. Dearness allowance including cash value of food concession and retaining allowance, if any. Employees’ State Insurance Scheme The Employees’ State Insurance Scheme Act, 1948 is a pioneering measure in the field of social insurance in our country. This act came into force from 19th April, 1948. The Scheme under the Act aims at providing for certain cash benefits to employees in the case of sickness, maternity, employment injury and medical facilities in kind, and to make provisions for certain other matters in relations thereto. The term â€Å"employee† has wide connotation and would include within its scope functions of clerical, manual, technical and supervisory. Persons whose remuneration (excluding remuneration for overtime work) does not exceed Rs. 6500 a month are covered under the Act. The Act does not make any distinction between causal or temporary employees or between technical or non-technical employees. Employees employed directly by the principal employer and those employed by or through contractor. However, the definition of â€Å"employee† does not include any member of the Indian naval, military or air force. Compensation Structure and its components: One of the most vital factors the motivation, retention and the morale amongst the employees is the compensation system, policies and review philosophies of any organization. While the bargain able employees generally have their unions to negotiate or review terms with the Management-which are governed by the Long Term Settlements- the terms of the managerial employees are mostly seen to be at the mercy or the goodwill of the organization, reviews of which may or may not be regular or timely, or often do not seem to meet the expectations or logic of such employees. Management Compensation therefore, now plays a very significant part along with the working style and environment, empowerment etc. in the organization’s success strategy. While individual organizations may have differences in their methodologies based on factors best suited their perceived needs, some general directions are evident, and are discussed below. 1. Salary, Basic Salary or Consolidated Salary continues to remain as the major component of compensation, though Salary Scales are often discarded these days, or used only as guides. Individual Salary is generally decided initially using the Scale, but thereafter performance, contribution to targets or results generated determine the revisions periodically, which may vary widely from individual to individual. Salary broad handling is therefore, getting recognition and acceptance. 2. Grade wise flat Allowance is being considered generally, except where tax exemption benefits are still available, when they continue as separate components. Allowances may be linked to the Salary as a percentage or by slabs, but preference is for flat amounts, which do not increase automatically, and therefore increase could be discretionary, and therefore controllable. 3. Reimbursements of expenses incurred on Company work has become limited, and in line to conform to the tax laws. Being actual in most cases, they are not considered as a part of the compensation, unless it is provided towards personal benefits. 4. Annual payments: Bonus or Commission, and Leave travel are common features some tax reliefs apply for the latter. 5. Benefits generally comprise of mostly unfurnished company owned or leased accommodation, use of company or leased vehicles, medical coverage, retrial benefits covering Provident Fund, Pension or Superannuation and Gratuity, post-retrial medical assistance, easy loan schemes at low or zero interest rates for house building, cars or vehicles, furniture or utility items etc. enting employees owned housing, club entrance free reimbursement etc. Minor benefits could be provision of security, driver or gardening assistance, else of products or assets at a concessional rate, relocation and transfer expenses including admission etc. fees for children, credit card fees, phones etc. 6. Employee stock option schemes which has been popular in IT in dustry-,is not extensively used yet, not being tax advantageous to other industries, nor seen as being very attractive with lesser growth trends for their share values especially in the well-established older companies. 7. Most companies, as against earlier visible costs, use the â€Å"Total cost to the Company† concept as basis. Cost of the most benefits are averaged or computed on actual basis, and within the system of the overall cost, but with greater compliance to tax laws, this basket concept is on the wane. 8. Retiral benefits: Some in recognition of the past contribution of pensioners, and to partly offset the inflation post retirement practices periodic improvement in pensions, or a guaranteed grade minimum pension. 9. Performance Bonus that does not increase future liability is being given more as recognition of results generated. It requires transparent, balanced and fair systems and benchmarks, and also agrees targets by the managers in advance during planning and review discussions. 10. From the earlier grade oriented compensation system within reasonable boundaries, compensation often has to be somewhat tailor made for specialist or key contributors to retain them in the very volatile job market. 11. Compensation review periods have become annual generally and sometimes oftener, as compared to every three to five years earlier, in the fast changing market situation. Conclusion To summarize, the need to regularly carry out detailed compensation reviews both within and out of the organisation with full support and commitment from the top is essential. Openness and transparency are important to the managers in the very sensitive and personal issues of management i. e. remuneration, and therefore policies and practices should match. The remuneration and the system have to be fair and dynamic Dealing with human feelings still remains a competitively attractive feature.