Thursday, August 27, 2020

Biography of Indias Indira Gandhi

History of Indias Indira Gandhi Indira Gandhi, PM of India in the mid 1980s, dreaded the developing intensity of the appealling Sikh minister and activist Jarnail Singh Bhindranwale. All through the late 1970s and mid 1980s, partisan pressure and hardship had been developing among Sikhs and Hindus in northern India. Strains in the area had developed so high that by June of 1984, Indira Gandhi chose to make a move. She settled on a lethal decision - to send in the Indian Army against the Sikh aggressors in the Golden Temple. Indira Gandhis Early Life Indira Gandhi was conceived on November 19, 1917, in Allahabad (in present day Uttar Pradesh), British India. Her dad was Jawaharlal Nehru, who might proceed to turn into the primary executive of India following its autonomy from Britain; her mom, Kamala Nehru, was only 18 years of age when the infant showed up. The kid was named Indira Priyadarshini Nehru. Indira grew up as a lone kid. A child sibling conceived in November of 1924 passed on after only two days. The Nehru family was dynamic in the counter royal legislative issues of the time; Indiras father was a pioneer of the patriot movementâ and a nearby partner of Mohandas Gandhi and Muhammad Ali Jinnah. Visit in Europe In March 1930, Kamala and Indira were walking in fight outside of the Ewing Christian College. Indiras mother experienced warmth stroke, so a youthful understudy named Feroz Gandhi raced to her guide. He would turn into a dear companion of Kamalas, accompanying and going to her during her treatment for tuberculosis, first in Quite a while and later in Switzerland. Indira likewise invested energy in Switzerland, where her mom passed on of TB in February of 1936. Indira went to Britain in 1937, where she selected at Somerville College, Oxford, however never finished her degree. While there, she started to invest more energy with Feroz Gandhi, at that point a London School of Economics understudy. The two wedded in 1942, over the protests of Jawaharlal Nehru, who disdained his child in-law. (Feroz Gandhi was no connection to Mohandas Gandhi.) Nehru in the long run needed to acknowledge the marriage. Feroz and Indira Gandhi had two children, Rajiv, conceived in 1944, and Sanjay, conceived in 1946. Early Political Career During the mid 1950s, Indira filled in as an informal individual right hand to her dad, at that point the head administrator. In 1955, she turned into an individual from the Congress Partys working council; inside four years, she would be leader of that body. Feroz Gandhi had a coronary failure in 1958, while Indira and Nehru were in Bhutan on an official state visit. Indira got back to deal with him. Feroz passed on in Delhi in 1960 in the wake of enduring a subsequent coronary failure. Indiras father additionally kicked the bucket in 1964â and was prevailing as PM by Lal Bahadur Shastri. Shastri named Indira Gandhi his pastor of data and broadcasting; likewise, she was an individual from the upper place of parliament, the Rajya Sabha. In 1966, Prime Minister Shastri kicked the bucket out of the blue. Indira Gandhi was named the new Prime Minister as a trade off applicant. Government officials on the two sides of a developing partition inside the Congress Party would have liked to have the option to control her. They had totally thought little of Nehrus girl. PM Gandhi By 1966, the Congress Party was in a difficult situation. It was isolating into two separate groups; Indira Gandhi drove the left-wing communist group. The 1967 political decision cycle was horrid for the gathering - it lost very nearly 60 seats in the lower place of parliament, the Lok Sabha. Indira had the option to keep the Prime Minister seat through an alliance with the Indian Communist and Socialist gatherings. In 1969, the Indian National Congress Party split fifty-fifty for good. As head administrator, Indira made some famous moves. She approved the improvement of an atomic weapons program in light of Chinas fruitful test at Lop Nur in 1967. (India would test its own bomb in 1974.) In request to offset Pakistans fellowship with the United States, and furthermore maybe because of common individual aversion with US President Richard Nixon, she produced a closer relationship with the Soviet Union. With regards to her communist standards, Indira nullified the maharajas of Indias different states, getting rid of their benefits just as their titles. She additionally nationalized the banks in July of 1969, just as mines and oil organizations. Under her stewardship, generally starvation inclined India turned into a Green Revolution example of overcoming adversity, really sending out an excess of wheat, rice and different yields by the mid 1970s. In 1971, in light of a surge of displaced people from East Pakistan, Indira started a war against Pakistan. The East Pakistani/Indian powers won the war, bringing about the development of the country of Bangladesh from what had been East Pakistan. Re-appointment, Trial, and the State of Emergency In 1972, Indira Gandhis party cleared to triumph in national parliamentary races dependent on the annihilation of Pakistan and the motto of Garibi Hatao, or Eradicate Poverty. Her rival, Raj Narain of the Socialist Party, accused her of debasement and discretionary misbehavior. In June of 1975, the High Court in Allahabad managed for Narain; Indira ought to have been deprived of her seat in Parliament and banned from chose office for a long time. Be that as it may, Indira Gandhi would not step down from the prime ministership, in spite of wide-spread distress following the decision. Rather, she had the president announce a highly sensitive situation in India. During the highly sensitive situation, Indira started a progression of dictator changes. She cleansed the national and state administrations of her political adversaries, capturing and imprisoning political activists. To control populace development, she established an arrangement of constrained sanitization, under which devastated men were exposed to automatic vasectomies (frequently under horrifyingly unsanitary conditions). Indiras more youthful child Sanjay drove a transition to clear the ghettos around Delhi; many individuals were executed and thousands remaining destitute when their homes were demolished. Destruction and Arrests In a key erroneous conclusion, Indira Gandhi called new races in Marchâ 1977. She may have started to trust her own publicity, persuading herself that the individuals of India adored her and endorsed of her activities during the years-long highly sensitive situation. Her gathering was trounced at the surveys by the Janata Party, which give the political race a role as a decision between vote based system or tyranny, and Indira left office. In October of 1977, Indira Gandhi was imprisoned quickly for authentic debasement. She would be captured again in December of 1978 on similar charges. Be that as it may, the Janata Party was battling. A cobbled-together alliance of four past resistance groups, it couldn't concede to a course for the countryâ and achieved practically nothing. Indira Emerges Once More By 1980, the individuals of India had enough of the inadequate Janata Party. They reappointed Indira Gandhis Congress Party under the motto of strength. Indira took power again for her fourth term as PM. In any case, her triumph was hosed by the passing of her child Sanjay, the beneficiary obvious, in a plane accident in June of that year. By 1982, thunderings of discontent and even through and through secessionism were breaking out all over India. In Andhra Pradesh, on the focal east coast, the Telangana area (including the inland 40%) needed to split away from the remainder of the state. Inconvenience additionally flared in the ever-unpredictable Jammu and Kashmir locale in the north. The most genuine danger, however, originated from Sikh secessionists in Punjab, drove by Jarnail Singh Bhindranwale. Activity Bluestar at the Golden Temple In 1983, the Sikh chief Bhindranwale and his equipped devotees involved and invigorated the second-most blessed structure in the holy Golden Temple complex (likewise called the Harmandir Sahib or Darbar Sahib) in Amritsar, the Indian Punjab. From their situation in the Akhal Takt building, Bhindranwale and his supporters called for furnished protection from Hindu mastery. They were disturbed that their country, Punjab, had been isolated among India and Pakistan in the 1947 Partition of India. To exacerbate the situation, the Indian Punjab had been hacked fifty-fifty again in 1966 to shape the Haryana state, which was overwhelmed by Hindi-speakers. The Punjabis lost their first capital at Lahore to Pakistan in 1947; the recently fabricated capital at Chandigarh wound up in Haryana two decades later, and the administration in Delhi announced that Haryana and Punjab would just need to share the city. To right these wrongs, some of Bhindranwales devotees required a totally new, separate Sikh country, to be called Khalistan. During this period, Sikh fanatics were pursuing a battle of fear against Hindus and moderate Sikhs in Punjab. Bhindranwale and his following of vigorously outfitted activists stayed in the Akhal Takt, the second-most heavenly structure after the Golden Temple itself. The pioneer himself was not really requiring the production of Khalistan; rather he requested the usage of the Anandpur Resolution, which required the unification and decontamination of the Sikh people group inside Punjab. Indira Gandhi chose to send the Indian Army on a frontal ambush of the structure to catch or slaughter Bhindranwale. She requested the assault toward the start of Juneâ 1984, despite the fact that June third was the most significant Sikh occasion (regarding the suffering of the Golden Temples author), and the complex was brimming with honest pioneers. Curiously, because of the overwhelming Sikh nearness in the Indian Army, the leader of the assault power, Major General Kuldip Singh Brar, and huge numbers of the soldiers were likewise Sikhs. In anticipation of the assault, all power and lines of correspondence to Punjab were cut off. On June 3, the military encompassed the sanctuary complex with military vehicles a

Saturday, August 22, 2020

DECISION MAKING Assignment Example | Topics and Well Written Essays - 1750 words

Dynamic - Assignment Example The primary test looked by Apple in its dynamic procedure is in regards to presentation of new items and administrations in the market. The top notch cost charged by the concerned organization may make issue for its business activity over the long haul. Apple Inc is notable for offering new and creative items to its clients. The concerned organization is continually occupied with presenting remarkable items in the market. Be that as it may, the issue looked by the concerned organization in conveying its new item is in deciding if the item presented in the business sectors satisfies the desires for its potential clients. The organization charges significant expense when contrasted with its rivals. Consequently Apple stays in situation whether the shopper will consider the remarkable detail or highlight remembered for the item or will look at the cost while buying a specific item. The concerned organization increased upper hands over its rivals in the market. In this manner so as to keep up its image worth and brand value in the market Apple Inc is required to think about the mental and social parts of the clients. The organization is concentrating just on the very good quality items, which may make an issue of maintainability of its business activity in long course of time. Apple is required to underscore on presenting items both for its top of the line just as low end buyers in the market. The choices considered for defeating the dynamic issue related with the presentation of new item in the market is to make its premium and top of the line items increasingly appealing to its clients. The concerned organization is concentrating on separation technique for its superior items and minimal effort maker which will offer a sufficient item with low cost. The low final result gave by the concerned organization to its clients in the market ought to be charged beneath its competitor’s cost. The rundown of assets used in the

Friday, August 21, 2020

The Art of Managing Complex Projects with the Right Team

The Art of Managing Complex Projects with the Right Team Today’s world is a complex web of connections and interdependencies. This complexity has an impact on projects and management has to respond to these new challenges by developing new approaches to project management and team leadership. © Shutterstock.com | alphaspiritIn this guide, we’ll look at 1)  what complex projects are about and 2)  why they are becoming increasingly common in today’s world. We’ll explore the 3) importance of different team management approaches and their impact on project management.  In detail, we’ll discuss 4)  the qualities of a great team and look at the differences between the conventional and the adaptive management approach.WHAT ARE COMPLEX PROJECTS?First, it’s important to understand the definition of complex projects. This can be done by examining the terms separately.A project is defined by the Business Dictionary as a “planned set of interrelated tasks to be executed over a fixed period and within certain cost and other limitations”. Projects are targeting defined objectives and they can include different deliverables.But what makes a project complex? First, it is important to understand the distinction between “complex” and “difficult” or “complicated”. A complex project isn’t necessarily a difficult project. Projects can be difficult due to reasons such as cost or performance, but this doesn’t automatically mean the project is complex.Complexity in this context refers to projects that include ambiguity or uncertainty. The network of people and the organizations are not aligned, for example due to economical, political, cultural or technological reasons. The behavior of the stakeholders can also be ambiguous, causing further complexity.As mentioned, there are a variety of factors causing project complexity, for example:Technology â€" The technical content of a project can cause complexity. This could be down to the technology used, the software development in place and issues such as multiple integrated interfaces.Cost â€" Money can also cause complexity. Projects might face issues such as not attracting enough capital in order to achieve the objectives or having problems of directing the funds to the right aspects of the proje ct.Schedule â€" Complexity can also come from the timing of the project. Especially projects that include technological complexity are often unpredictable, as timing different aspects of the project with achievable objectives can become an issue.Politicsâ€" Projects can bring different stakeholders together, which can be a problem if there is politics involved. Different political interests can increase the complexity, as the project has to manage different requirements and expectations.Legal â€" Legal issues surrounding a project can also increase complexity. Legal complexity can sometimes be related to politics as well.Social â€" The social context of the project can also increase complexity. This can be due to the group members coming from different social backgrounds, or even from the project working within a specific social context.Complex projects are essentially surrounded with unpredictability, often due to the above reasons. The team’s different stakeholders can’t make predictions easily because the processes are complicated, uncertain and heavily time-constrained. The final outcome will be hard to understand because the project’s causes and outcomes don’t relate or the links are ambiguous.Overall, the complexity of a project often increases as the number of stakeholders within the project goes up.[slideshare id=27298310doc=complexprojects-climbert-131017094859-phpapp02w=640h=330]WHY ARE PROJECTS BECOMING MORE COMPLEX?Project complexity is on the rise. This is mainly due to the way business and research is currently conducted. Let’s analyze the change through three different developments: the differences in team structures, the improvement in technology, and business connectedness.The way teams are structured has changed over the past years. Before,  management used to rely more heavily on hierarchical structures, but today’s teams are much more fluid and flexible. Furthermore, the technological advances have resulted in companies and orga nizations being less location-bound. You can be in charge of the teams that have members from Mumbai to Tokyo. This naturally adds more complexity to managing a team. Finally, there have been changes to contractual agreements. Companies can hire freelancers or have sponsors for specific projects, which is different to the usual employer-employee model.In addition, modern projects tend to have increased the complexity because of technological advances. Not only are there more tools available for conducting and managing projects, but technology itself is also becoming more complex to manage. Projects that are aiming for specific objectives are often linked to other projects, as interconnectedness is increasing. Management of technology is also difficult because the amount of data is rapidly growing. Technologies have allowed the collection of data on large-scale, but the ways to use the data are becoming increasingly complex.Finally, businesses are not stand-alone organizations anymor e. Most businesses need to work in co-operation with others and compete in increasingly saturated markets.Learn about what can go wrong in complex projects.[slideshare id=36900300doc=whatgoeswrongoncomplexprojects-140712035121-phpapp01type=dw=640h=330]THE BEST WAY TO MANAGE COMPLEX PROJECTS IS TO BUILD A GREAT TEAMIf you want to ensure success with a complex project, you need to build a team including the right people. Managing complexity becomes easier the better the team is. But how do you build a great team?To succeed with this objective, you need to understand what successful teams are built on. The signs of a successful team are:Adaptive team leadership. An exceptional team needs to have an exceptional leader. In a complex project, the management must not be focused on leading in a hierarchical structure, but rather keep hierarchies as flat as possible, in order to be more adaptive.If every decision has to go through several hierarchical levels, the decision-making process will take a long time.Optimal team structure. Teams can be built in different ways and the structure can have a huge impact on the success of the project. Jim Highsmith and Jim Collins are among the experts who have studied optimal team structures. According to their findings, contemporary team structures can be:A core team structure â€" reflects a hierarchical and network structure. There are several teams working within a specific project, taking on different types of configurations.Self-organization structures â€" if the number of teams within a project goes up, the organizational structure starts looking more like a self-organization extension. This increases complexity and requires appropriate management of inter-team dependencies.A culture of empowerment and discipline structures â€" this structure requires high accountability, collaborative engagement and a proper balance between project goals and team goals.The right team composition. A successful team needs to have the right pe ople in place. Conventional wisdom is to build teams with the project’s strategy in mind, but you might benefit from a different approach.Rather than finding people to support your approach, find people who are “right” in their own right and then collaborate to set the tone for the project.A disciplined culture. Good teams are built around a disciplined work effort. You don’t want to burden a team with standards or specific practices, but there must be an overall culture of discipline. You want to enforce standard collaboration procedures, but ensure they are based on realistic assumptions.Effective collaboration. Successful teams are also good at organizing collaboration in an efficient manner. The project’s objectives shouldn’t be driven from the top down, but be the result of a collaborative effort. Constant feedback across the team can ensure the team’s focus isn’t shifted and that every member of the team is working to improve the performance. Make sure you aren ’t focused solely on achieving certain project-cantered objectives, but that collaborative deadlines are also established and met. Sharing and discussing ideas is great, but at one point you need a decision. Getting there is your job as a project leader.Communication and cooperation. Collaboration shouldn’t be completely moved away from traditional face-to-face meetings. Although teams might be scattered, there should be opportunities where collaboration happens outside of e-mails and text messages. However, its wise to support the traditional face-to-face model with modern technologies that allow instant sharing. For example, professional service automation (PSA) and enterprise project management (EPM) tools can be great tools for a team to make the most of communication and cooperation.Great teams aren’t the result of happy accidents. In order to achieve a team that shares the above qualities, you need to plan carefully and instill continuous and disciplined effort to meet t he requirements.Creating a good and successful team is never an easy task to achieve, but it can be especially difficult when managing complex projects. Therefore, you need to be mindful of the different management approaches that can work.Ensure your team focuses on two key areas during the project. First, you must prioritize the tasks. Not every aspect of the project is equally important to a successful completion  and finding the key priorities should be the first goal of the team. Second, you need to simplify the road towards these priorities. Try to outstrip as many of the tools and tasks as you can, in order to achieve the objectives.In order to understand the importance of simplifying a complex project, watch the below TedTalk by Yves Morieux: COMBINING TWO SEPARATE MANAGEMENT APPROACHESAs well as having the best team for complex projects, you’ll also need to find the right management approach to organize the team’s work.In complex projects, you’ll be dealing with a div erse group of people, who have to deal with the different complexities the project might throw at them.In order to get the best out of the team and receive the best results with complex projects, you should use a combination of two different management approaches: the conventional and the adaptive approach.The conventional approachProject management’s traditional approach tends to focus on achieving tasks in a linear fashion. The idea is to have a set of well-defined goals and achieve these in the right order to reach the results. It’s all logical and linear.A conventional management style puts emphasis on a set of procedures the team must follow. It focuses on finding the right tools for solving the problems at hands. Since it’s focused on a linear approach of solving problems, it emphasizes meetings, especially face-to-face, in order to organize processes.Under the conventional management model, a team would operate under the following procedural approach:The team would meet up to plan the projectThe team would plan the objectives and the timeline for achieving themDecisions would be made with the objectives in mind as a groupThe project would be decomposed into logical pieces and each person assigned the best tasksThe individual pieces and resolutions would eventually be integrated into a final solutionA conventional approach should also focus on creating a strong culture within the team to collaborate and communicate. Whilst people should be focused on solving the individual tasks they were set out to solve, there should be constant communication and discussion to ensure everyone follows the procedures.Many complex projects are managed using Gantt Charts. Learn how to do that by watching this video. The strength of the conventional approach is its focus on finding priorities. Prioritizing objectives is crucial for project success, especially when these objectives can be muddled and difficult to understand in complex projects. Most projects have a cri tical path to success.This means that in order to reach the results, the team must accomplish tasks A, B, C, and D. Furthermore, these tasks often have to be completed in a specific order. For example, it might be that in order to fully finish task B, tasks A and D must be completed.The conventional management approach is useful in analyzing the critical path.But the conventional approach’s emphasis on planning and control doesn’t always sit well with complex projects. This is because complexity can make it harder to identify the tasks in a linear line and slight variations can easily remove the ability to make logical decisions.Therefore, a more adaptive approach is needed.The adaptive approachBecause of the above limitations of the conventional management approach in terms of complex projects, team leadership should also use a more adaptive approach. The adaptive approach has been the direct result of the development of the complexity theory.The adaptive approach takes a more agile and fluid view of projects. It recognizes that projects aren’t always predictable and teams must be able to adapt on the go. The adaptive approach directly addresses the unpredictability of complex projects.An adaptive approach often uses innovative and experimental tools and it takes advantage of different technologies.For example, you should take advantage of different virtual tools that improve cooperation and collaboration within the team.Whilst an adaptive and agile management style doesn’t place as much importance on face-to-face meetings, you shouldn’t overlook them when making important decisions in terms of the project’s future.The key of this approach is to allow agility within the team. You want to divide the group into smaller teams that leverage the experience within the group. Decision-making should be done on a more fluid level, without always requiring the involvement of all hierarchical levels.Whilst a conventional approach is good at analyzing the cri tical path and to prioritize tasks, the adaptive approach helps teams in situations when unpredictability happens.For example, it might be that the results of the task D are not well known. Whilst you might need to accomplish tasks A and D in order to finish task B, you don’t know for sure whether this is possible within the timeline. Task D might end up with different results, which changes how task B will behave.Although you should instill a certain level of procedural oversight over the complex project, you need an adaptive approach to procedures. Complex projects might be difficult to manage if there’s not enough flexibility in terms of leadership and implementation.This means accountability should be shared, but oversight shouldn’t be too strict.THE BOTTOM LINEThe key to managing complex projects is to select the right team. It is important to understand the complexities of the project and build a team with the right talent to overcome these issues. Moreover, the organiza tional structure of the team will play an important role in deciding the success of the project.Furthermore, you should focus on implementing a balance of a conventional and an adaptive management approach.The strength of the conventional approach in creating priorities within the group will help achieve the objectives quicker and more effectively. But this linear model isn’t always enough to respond to the unpredictable aspects of complex projects. Therefore, you want the team’s approach be agile and fluid enough to adapt to situations that were unexpected. A combination of these tactics can help yield the best results.

Monday, May 25, 2020

The Oil And Gas Industry - 2910 Words

The oil and gas industry has been largely dependent on the collaboration between oil and gas companies and governments represented by environmental and regulatory agencies. This collaboration has been in place to regulate the practices and to protect the environment around the field operations sites. Some of the environmental agencies roles in the oil and gas industry includes: †¢ The design of safety procedures and drills. †¢ The implementation of these procedures to ensure they’re respected and carried out effectively. †¢ Serving as an overseer to the different operating companies if they encounter conflicting circumstances. †¢ Help with the design of the necessary equipment – like capping stacks – in times of emergency. †¢ Look through the specifications of the different equipment used during field operations. For a number of years since the increase of exploration and development of sites in deep offshore waters, there has been an increasing effort to design appropriate safety procedures necessary to prevent catastrophes and to contain them after they have happened. Companies and regulatory agencies haven’t been able to do this extremely necessary task with ease due to the novelty of the conditions surrounding procedures being completed. Drilling in deep offshore waters for example has been a very recent event which has been carried out by mostly very large multinational operators as usual conventional fields become uneconomical for them. Some of the measures put in placeShow MoreRelatedThe Oil And Gas Industry1293 Words   |  6 PagesThe oil and gas industry is characterized by many processes, including exploration, resource extraction, refining, transport, and the trade of products. These resources are important to a number of other industries, and have become vital to the main tenance of industrial civilization. Not only does energy affect the big businesses on the coasts and across the oceans; but it also affects everyday people in rural America, from pump jacks to coal mines. It’s easy to see that technology affects retailRead MoreThe Oil And Gas Industry1146 Words   |  5 PagesThe oil and gas industry is crucial to the U.S. economy and plays a central role in its environment, society, and economic development . The U.S. consumes more oil than any other country. Products derived from oil include medicine, recreational sports items, cosmetics, plastic, chemicals, transportation liquids, etc... This is to say, crude oil is the most important natural resource of the industrialized nations, as it has assisted in the technical expansion and discovery of new sources and productionRead MoreThe Oil And Gas Industry2146 Words   |  9 Pagesand production one like Cairn Energy, operate in the oil and gas industry. Each of these companies faces some financial, commercial or contractual considerations similar throughout the industry, and some peculiar to the area of operation within the industry. Problems within the oil and gas companies have occurred in the past due to askew interests and these problems are likely to occur in the future. Managers within the oil and gas industries requires essential working knowledge of the concepts involvedRead MoreThe Oil And Gas Industry2308 Words   |  10 PagesWhen thinking about how all this oil and gas gets from the platforms in the gulf to land to be produced, you will run across the phrase, â€Å"flow assurance.† Flow assurance is what makes sure these oils and gases get from point A to point B without any hesitations or problems. Its main purpose is to prevent hydrates, clogged pipes, and wax depositions. So can the oilfield industry survive without flow assurance, especially in deep water operations? By reading this, you will learn how important flowRead MoreThe Oil And Gas I ndustry1285 Words   |  6 Pagesthe largest in the southern U.S. and Texas, has been developing strong economy, especially in oil and gas industry. During the last decades of the twentieth century, Houston focused on developing energy industry—which comprises oil and gas exploration and production, oilfield equipment manufacturing and wholesaling, and pipeline transportation. However, some economists doubt that depending on oil and gas too much could make Houston particularly vulnerable to economic downturns determined by energyRead MoreThe Oil And Gas Industry1662 Words   |  7 PagesOne of the most capital intensive and globalized industries is the energy sector because of its operations that are inherently complex. As such, the oil and gas projects experience overruns of costs that exceeds 100 percent at times, which have created the need for adoption of new contracting strategies (Schramn, Meibner, Weidinger, 2009). The risks in most cases are contractually distribut ed and shared among the energy project stakeholders instead of leaving it to the owner. Some of the risksRead MoreThe Oil And Gas Industry1070 Words   |  5 PagesStarting my petroleum engineering degree, the oil and gas industry was doing very well at the time.The price of oil was around a hundred dollars per barrel, new independent companies were frequently being created, and the employment rate after graduating with a petroleum engineering degree was close to one hundred percent.However, the outlook of the industry has drastically changed while being in school.The price of oil is now hovering around thirty dollars per barrel and many companies are now havingRead MoreThe Oil And Gas Industry2120 Words   |  9 Pages The oil and gas industry happens to be the largest industry in the world as it is the singular point of growth for a civilisation. Its importance lies in the fact that it is a fundamental aspect involving every individual’s lives from petrochemical products to transportation, heating and electricity fuels. Edwin Drake in Titusville, Pennsylvania drilled the very first oil well during 1859 and it paved the way to the beginning of the oil industry in America. While Edwin Drake focused on drillingRead MoreIfrs And Oil And Gas Industry985 Words   |  4 PagesTracy SzeWai Yim Professor. Karen (Jingrong) Lin Advanced Financial Accounting - Sec 061 June 20, 2016 GAAP vs IFRS in Oil and Gas Industry (Exxon Mobil vs Royal Dutch Shell) Oil and Gas industry is not a stranger in the international market since everyone around the world has a certain level of demand on Oil and Gas. Therefore, different oil and gas companies are founded across the world and a lot of them have gone global. Becoming global has enlarged the companies’ revenue but also complicatedRead MoreIndustry Analysis : The Oil And Gas Industry976 Words   |  4 PagesIndustry Analysis: The oil and gas industry is expansive and rather complex industry consisting of oil, fossil fuels, natural gas, oil and green energy sources. Combined the above sources make-up 32% of total energy consumed worldwide. Three sectors define the value chain of the oil industry; Upstream – which is the process of exploration and extracting the natural resource, control storage and entail refinement process. Midstream – consisting of distribution by pipelines and large quantity shipments

Thursday, May 14, 2020

The Career Fields Of Accounting - 1572 Words

Many students eventually come to a point in their collegiate career that they must decide what path to pursue in their professional careers. For the majority of accounting students, this could not be more challenging since there are such a large variety of career paths to choose from. To further complicate this decision making process, many of the career fields in accounting mandate the individual to obtain certain field related certifications that are essential to that particular field of study. Examples of these certifications are as follows: Certified Financial Manager (CFM), Certificated Public Accountant (CPA), and Certified Management Accountant (CMA). These accounting certifications can sometime prove to be incredibly difficult to obtain. The majority of the available certifications required exam preparation, fees to be paid, background checks, character references, and the exam itself. Once an individual passes the exam and obtains the other required credentials, he or she must be able to maintain their certification. In most instances accountants usually must seek continuing professional education (CPE) classes and pay membership dues annually in order to maintain these certifications. We will examine some of these previously mentioned certifications and others in the follow text. In addition, we will compare the similarities and differences of these certifications in order to assist UHD graduates in this complicated decision. Certified Internal Auditor (CIA) vs.Show MoreRelatedCareer Management For The Accounting Field1327 Words   |  6 PagesCareer Management for Accountants is designed to prepare students in the accounting field. As part of this class every student is assigned to a mentor. In my case, Jim Ahlborn was selected as my mentor. In the following narrative I hope to underline Ahlborn’s career path including his education and professional experiences, his views on ethics, and finally the commitment that his employer has to corporate social responsibility. Ahlborn’s Career Path. When Ahlborn was about to graduate from high schoolRead MorePsychology or Accounting?775 Words   |  4 PagesPsychology or Accounting Choosing a career is one of the most important decisions a person has to make in their life. It is so important because that is what people will have to do to support their selves throughout life. For the past ten years psychology and accounting were two of the top ten potential career choices. According to the U.S. Department of Education, National Center for Education Statistics up to 70,000 bachelors degrees in psychology were awarded, and up to 30,000 in accounting all aroundRead MoreThe Career Field Of A Forensic Accountant Essay900 Words   |  4 Pagesclass about the career field I plan to go into after college. The following information informs you about what must be done in order to become a Forensic Accountant and how life is as a Forensic Accountant in today’s society. Introduction I was asked to research a job in the career field I plan to work in after graduating, then write an informal report on the information I gathered. The job I chose for my report is a Forensic Accountant. A Forensic Accountant is when one uses accounting skills to investigateRead MoreCareer in Accounting1577 Words   |  7 PagesCareers in Accounting One of the major careers being practiced today is accountancy. Thousands of people are completing their degrees in accounting because there seems to be a bright future for accountants with the appropriate qualifications. Accountants, in their career, help ensure that the organizations are running more efficiently, public records are kept more accurately, and taxes are paid properly and on time. They perform important functions by offering a wide volume of business and accountingRead MoreAccounting Is The Language Of Business1286 Words   |  6 PagesAccounting is a major that teaches the language of business, it opens doors to the business world all over the globe, the possibilities with a accounting major is endless in the business field. Whether you want to run your own business or become a certified public accountant majoring in accounting gives you the establishment. A major plus in having a career in business is the flexibility it offers. Many businessmen can make their own hours and handle their business at the comfort of their own homeRead MoreWhy I Chose Business Accounting to Secure My Future1132 Words   |  5 PagesI Chose Business Accounting to Secure My Future While I have never had a career in my life I have had many jobs throughout the years. Throughout my life I have learned there is a great difference between having a job and having a career. Business accounting is my opportunity to follow a dream and work toward having a career. Business accounting can be a very lucrative and fulfilling career. Through business accounting you can learn constantly and find a job in various fields because almost everyRead MoreAn Interview With Professor Clarissa Wilkerson, Jd, Cpa857 Words   |  4 PagesOn Wednesday, February 24, 2016, I conducted an interview with Professor Clarissa Wilkerson, JD, CPA. As an accounting major, I am extremely interested in pursuing a career in accounting and am a student in Professor Wilkerson’s class. Her enthusiastic personality continues to inspire me to pursue a career in this field. After explaining my career goals and the details of this assignment, she gladly accepted when I asked if she would be willi ng to conduct an interview to help me complete thisRead MoreAssignment 1 Acc 100 Careers in Accounting1553 Words   |  7 PagesASSIGNMENT 1 ACC 100 CAREERS IN ACCOUNTING To purchase this tutorial visit here: http://mindsblow.us/question_des/ASSIGNMENT1ACC100CAREERSINACCOUNTING/17 contact us at: help@mindblows.us ACC 100 ASSIGNMENT 1 CAREERS IN ACCOUNTING Assignment 1: Careers in Accounting Due Week 8 and worth 240 points Accounting is the study of how businesses track their income and assets over time. Accountants engage in a wide variety of activities besides preparing financial statements and recording businessRead MoreIt Took Me Three Semesters1646 Words   |  7 Pagesmajor. I decided I wanted to go for Accounting. Ever since I was in elementary school I really enjoyed my math classes, but at that age I didn t quite have a clear idea of where I wanted to go with that. Math has aways been my favorite subject. I always thought about going into a field that required a lot of math or numbers in general . My two top choices were either being a Math Teacher or somewhere in the Medical Field. I first grew interest in the Business Field when I was in high school and workingRead MoreWriting Of The Discipline Of Accounting1627 Words   |  7 Pages Writing in the Discipline of Accounting Eduardo Salabert Durham Technical Community College Abstract This research focuses on the career of accountants in order to find some of the types of writing done in their field. It is also to help me better understand what accountants do and what types of writing are required as this is a career in which I am pursuing a degree. The methods used to gather information for this research were from primary resources: one email interview, also

Wednesday, May 6, 2020

Religion - The Opiate of the People Essay - 1352 Words

I’m not often fond of Marx, the poor fool never recognized the inherent problems of his rather incoherent and unrealistic philosophy, but, I do think that an intelligent man, no matter how deluded can occasionally hit on the right idea. What idea? Simple, â€Å"Die Religion ... ist das Opium des Volkes,† that is, Religion is the opiate of the (common) people. On this, there can be no question he is absolutely right, opiates and religion are one in the same. A man addicted to opiates finds his world more cheerful under the influence of the latex of poppies, sees value in life through the dreamy gaze of opium induced euphoria, and acts in a neurotic and delusional manner with his mind impaired in the opiate induced stupor he brings upon himself.†¦show more content†¦The Christian tries to force secular law to conform to the grotesque morality of the Old Testament and its vindictive and childish god, while praising the nihilistic slave morality of the New Testamen t, laboring endlessly so that rational man must live in a society governed by the most irrational and stupid of laws and customs drawn from the most irrational and contradictory mythological volume compiled by man. To the Christian, those who sin must be treated as criminals, and those who do not accept the morality of Christian neurosis should be forced to by the will of the majority. Otherwise perfectly rational positions, being pro-choice, for instance, are attacked not through logic, but through arguments formulated from a tome which to any rational person should appear no more valid than the Iliad. The Christian forces his Ten Commandments and Creation Science onto a secular nation through the majority of people (which means little when the majority of this country is immensely stupid and ignorant), in contravention of the Constitution. The Christian demands the criminalization of gambling, of drugs, of prostitution, it demands that crimes with no victim except their variant of Odin or Zeus be punished with mandatory minimum sentences. They cannot allow sin to exist in this world, for fear their deity will bring down his wrath upon those who permit it. This of course isShow MoreRelatedReligion Is The Opiate Of The People1566 Words   |  7 Pageswhile we question our existence and the deeper meaning of life. We have discovered that religion answers these disconcerting questions. From worldly tradition, we have learned that religion fills those empty gaps in places that we cannot answer our own questions. It creates hope and gives people a meaning and feeling of belonging. Carl Marx describes, â€Å"Religion is the opiate of the people.† It makes people forget about inequality and oppression. It is more than a practice or a belief. It isRead More Pass The Opium, Please Essay1016 Words   |  5 Pages Religion is said to be the opiate of the masses, and it is definitely a point of interest in George Orwells famous novel Animal Farm. In it, Orwell pointedly attacks religion in general and Christianity in particular through the use of a well placed symbolic bird by the name of Moses. Orwells stance is rather apparent as Moses darts about the farm scene conveying the duality of Christianity quite superbly. At the first mention of the raven Moses, one immediately gets the impression that he standsRead MoreMarx And Durkheim On Religion839 Words   |  4 PagesMarx and Durkheim on Religion SOC201 998036931 Kirsten Kelleher Both Karl Marx and Emile Durkheim formulate similar sociological theories regarding the epistemology and origin of religion and religious beliefs. Both thinkers acknowledge a necessary connection between community and religion. As antagonistic, functionalist thinkers, both Marx and Durkheim maintain that â€Å"God† or the â€Å"divine†, is merely a projection of human beings highest ideals and greatest characteristics creating a â€Å"God† like illusionRead MoreHow the Social Importance of Religion Has Receded with Modernity1617 Words   |  7 PagesReligion has always been of high social importance and influence within civilization and their society. This essay will argue that as modernity has progressed the social importance of religion has receded, but the gradient of this recession and by how much varies upon the society. Modernity typically refers to a â€Å"post-medieval historical period, one marked by the move from feudalism toward capitalism, indust rialization, secularization, rationalization, the nation-state and its constituent institutions†Read MoreKarl Marx And Max Weber1332 Words   |  6 Pagesfascinated by religion science as they talked about different religion in depth that exist on earth and various perspectives of well known people on the study of religion. I chose Karl Marx and Max Weber for my paper assignment. Two sociologists and philosophers have discussed their views on religion and its impact on society. Most of the Sociologist of that time wrote about the role of religion in society, Karl Marx and Max Weber observations are particularly relevant for our course. Religion is one ofRead MoreMarx Weber and Durkheim on Religion Essays1378 Words   |  6 PagesA religion can be seen as a unified system of beliefs and practices which are relative to sacred things and beliefs (Giddens 1972, p.224). It can shape ones thoughts and feelings and gives people a sense of hope and something to believe in. All three main sociologist writers Karl Marx, Max Weber and Emile Durkheim offer different perspectives on religion and how important it is to society. Some of the theorists chose to have a positive view whilst others argue the unimportance of religion. This essayRead More Marx’s Views on Religion vs. My Own Essay514 Words   |  3 PagesMarx’s Views on Religion vs. My Own Karl Marx wrote that religion was, â€Å"an opiate of the people.† Although those words were not published in The German Ideology, they best describe his various views on religion. Marx wrote that there was a social relationship between the upper class or bourgeoisie and religion. The upper class that owned the means of production used religion as a tool to keep the working class or proletariat, oppressed and poor. Marx criticized that religion had so many ulteriorRead MoreImmanuel Kant And Karl Marx1690 Words   |  7 Pages The works of German philosopher’s Immanuel Kant and Karl Marx have played significant roles in the development of different sects of philosophy and religion. Immanuel Kant was born in 1724 in Konigsberg, East Prussia, now presently Kaliningrad, to a devout, poverty-stricken family of eleven children. Through his works, it is evident that Kant was raised in the religious teachings and values of pietism as his theories show a heavy influence of his religious upbringing. Kant as a young boy was accustomedRead MoreThe Video Opiate Addiction : Understanding Replacement Therapy Essay952 Words   |  4 PagesIn the video Opiate Addiction: Understanding Replacement Therapy, Scott Farnum talks about methadone replacement therapy. There were many topics covered in this video and the topics were introduced in a psychoeducational format. The topics covered included a brief history opioids, brain chemistry, post acute withdrawal syndrome, abstinence based treatment programs verses harm reduction, and how an individual asses the damages of opioids on the brain. As a counselor in training, I found all the informationRead More Functionalist View on the Role and Functions of Religion in Society716 Words   |  3 PagesFunctionalist View on the Role and Functions of Religion in Society Assess the view that sociological arguments and evidence support the Functionalist view of the role and functions of religion in contemporary society. Functionalists believe that religion is a conservative force, and an institution which adds to the requirements of society. They say it ultimately operates as an agency of socialisation. Durkheim (1912) said that all societies are separated into

Tuesday, May 5, 2020

Information Security Data Breach

Question: Discuss about the Information Securityfor Data Breach. Answer: Background Data breach is referred to as the incident in which the confidential and sensitive information might get stolen from the data server by unauthorized person unethically without permission. As the technology is growing up the concept of hacking is also becoming devastating. Nowadays data theft has become one of the most challenging phases in technology. Among the recent data breaches roundup, in September 2015, security and data breaches occurred in Apple centre, which become a headline (Data-breaches, 2015). After detail analysis, it has been found that for creating free application Utopia, iOS malware named as Key-raider, stole around 225,000 apple accounts. The suspicious Apple iOS tweak was analyzed by Weip Tech and it has been reported that, more than 225,000 valid apple accounts along with their password are stored on the apple server. The aim of the attack is to develop two iOS jailbreaks tweaks for downloading different applications from the official application store of Apple (Wang et al., 2013). Without proper payment, the attackers wanted to utilize the applications efficiently. The jailbreak tweak software packages are used by the attackers because it allows them to perform the required actions that are not generally possible in iOS. In the command and control serer of the malware attackers the stolen information were used to stored and utilized on required time phase. About the Problem Scenario The incident of malware attack in the iOS app store took place in the year of 2015, September. All Apple users have apple accounts and their registered id and passwords are stored in the app server (Sun, Akiyama Mori, 2016). The keyrider software package rather malware, attacked on the apple server and hacked all confidential information including thousands of certificates, private keys, purchase receipt etc. The stolen data were stored in C2 server that contains threat itself to expose the information of the users. In order to unlock the functionalities and operations of the iphones and ipads, the Key-raider malware stole apple push notification service (Shahriar, Klintic Clincy, 2015). The two tweaks were capable to hack the app purchase requests and to steal the purchase receipt from the C2 server. The Reason Behind its Occurrence The main reason behind this attack is to theft the sensitive information of the users without informing them and to utilize those data for different unethical purposes. Initially apple store was found to be one of the most secured servers where, the external users were not able to attack easily (Jang et al., 214). Thus, the official information of the users were enough secured from the external attackers. In order to hijack the official information from the data server the key-raider malware was used by the attackers. In addition to this, the attackers actually used this malware to assault directly the app store and without paying accurate payment they wanted to use the application of Apple. After this the attackers will be able to perform those tasks also which are not actually possible to be performed on the OS platform. The tweaks had downloaded over 20,000 times, which stated, that more than 20,000 users are abusing 225,000 stolen data from the app store (Stankovic, 2014). Initia lly it was very difficult for the owners to identify the actual reason and process of attack but gradually, after conducting vast investigation, i_82 discovered the key-raider malware attack appropriately. Possible Solution to Mitigate the Occurred Issue Different strategies are there, used by the software and hardware analysts to protect their data server from the external attacks. If proper strategies are used, then only the owners will be able to keep their server data secured. Based on the type of information and vulnerabilities, appropriate mitigation strategies are needed to be adapted (Xing et al., 215). The possible solutions against the malware attacks are as follows: Data encryption: In order to keep the data secured from the key-raiders malware, proper encryption algorithm is required to be adapted by the data server. In this process the sender and receiver both are bound to use symmetric and asymmetric keys according to the background of the situation. After the application of proper encryption algorithm none of the external users will be able to get the details of the public and private keys. Due to the disruptive services the nature of malicious code as been actively shifted. Antivirus adaptation: Another important technique that can be used to keep the information secured from the attackers is adaptation of antivirus. Depending on the nature of the data the anti viruses should be installed. Authentication: Authentication is referred to as another important component that is strictly required to be considered to maintain the data security. With the help of authentication only the authorized users will be able to visit the app stores whenever required. The non-registered users or the unauthorized users are not competent to hijack the information from the app server. Firewall implementation: In order to keep the data secured and to reduce the number of attackers, application firewall is also required to be configured. Introduction In the year of 2015, icloud hacking is found to be as one of the biggest controversial hacking cases. Though, the incident took place in the summer 2014, but officially it was exploited in the year of 2015 (Hacking Cases, 2015). The victim of the attack was number of celebrities. It has been found that, in 2014, dozens of icloud of the celebrities were mainly attacked by the external attackers. In order to hijack, the photos of the celebrities mainly the attackers attacked the cloud server. This is referred to as one of the popular hacking cases that occurred between 2012 and 2016. The report depicts the background scenario of this incident including the victim and the attackers of the incident. It also elaborates the way through which the attack incident carried out (Choo, 2014). In addition Ito this, lastly it will illustrate different prevention technologies that are needed to be adapted by the owners to protect the photos of the celebrities from the attackers. Overall Problem Scenario This scenario took place in the year of 2014 summer but is officially reported in 2015. After investigating incident, it has been determined that, more than 500 private images of the celebrities from different domain are hijacked by the attackers. Most of the victims of the incident are women though many men are also found to be victim of the attack. After hijacking the images the attackers posted those in different social networks and other websites. From the security investigation it has been determined that the images are retrieved from the apple cloud named as icloud (Braunstein, 2016). The attack become easier for the attackers because the cloud server allows the users to make multiple attempts for guessing the password. Due to the allowance for unlimited times password guessing options on the Application Programming Interfaces (API), the icloud access became easier. The attackers need not to take any permission from the users rather the chance of redundancy also enhances rapidl y. The Problem scenario The images hijacked from the cloud storage were obtained by the attackers from the online storage that has been offered by the Apple Icloud (Hacking Cases, 2015). The cloud storage automatically stores the images of the celebrities and also keeps the backup of the images in the storage. The attackers targeted on the icloud account in terms of account identity and passwords directly. The attacks are phishing and brute force attacks (Elhai et al., 2017). Due to lack of security in the cloud storage the photos are hacked by the attackers. The apple privacy security was questioned due to lack of security. Even before public release the photos were getting revealed in front of everyone. The main activity center of the phishing attack was the link sharing website Reddit. Moreover, the critics realized that distribution of the images publically is one of the major privacy invasions. Not only images but also the private information was also hijacked by the external attackers. The Affected Person or Victim After analyzing the incident it has been found that the victims of the attack are the celebrities Most of the celebrities including men and women are the victims of this incident. The icloud data storage leaked the pictures of the celebrities and publically released those. The image content and the confidential information both get hijacked by the external attackers. Though some of the photographs are referred to as fake but most of the photos are stated as authenticated rather original. The external attackers attacked on the icloud service provider were the confidential data and the images both get stored. In this phishing attack the attackers get opportunity to make multiple attempts to identify the account id and password at the same time. As there was no prominent limitation of the attempt thus, the attackers too several attempts and hijacked the images. The Way through the Attack Carried Out After matching the id and password of the apple accounts it become easier for the attackers to search for the desired products (Hacking Cases, 2015). After hijacking the photos, they promoted those to the public platform where all the users will be able to look for the photographs. The Possible Attack Prevention Strategies In order to mitigate the problems, different possible strategies could be undertaken. These are as follows: Data encryption: The fundamental concept of encryption is required to be undertaken by the owners to overcome the issues. Server authentication: The server is required to be authorized, so that the unauthorized users cannot attack and hijack images from the server. Limited attempts: There should be limit for making attempts on the password verification. If it is found that user are making more than 3 attempts then, for that particular person the access should be blocked. Conclusion From the overall discussion it can be concluded that, information security is one of the major concerns of operating system and data server. If the owner fails to adapt accurate security measures, then the attackers will easily hack information from the server even without permission. By developing vast investigation on malicious activities, the computer activities can be controlled and monitored accurately. The report elaborated the incident appropriately and after analysis, the victims of the incident are also identified. In addition to this, the background of the problem scenario, the victim of the incident and the way through which the attack had carried out are also elaborated in this report. After identifying the problems, possible mitigation strategies are also elaborated in this report. Accurate mitigation approaches will help to overcome the issues. References Ahmed, M., Litchfield, A. T., Ahmed, S. (2014). A Generalized Threat Taxonomy for Cloud Computing. ACIS. Braunstein, A. (2016). Standing Up For Their Data: Recognizing the True Nature of Injuries in Data Breach Claims to Afford Plaintiffs Article III Standing.Journal of Law and Policy,24(1), 3. Choo, K. K. R. (2014). Mobile cloud storage users.IEEE Cloud Computing,1(3), 20-23. Data-breaches,.(2015).recent-data-breaches-september-2015.www.identityforce.com. Retrieved 19 September 2015, from [online] https://www.identityforce.com/blog/recent-data-breaches-september-2015 Elhai, J. D., Chai, S., Amialchuk, A., Hall, B. J. (2017). Cross-Cultural and Gender Associations with Anxiety About Electronic Data Hacking.Computers in Human Behavior. Hacking Cases,. (2015).The Most Controversial Hacking Cases of 2015.Blog.tcitechs.com. Retrieved 29 September 2015, from [online] https://blog.tcitechs.com/blog/the-most-controversial-hacking-cases-of-2015 Jang, Y., Song, C., Chung, S. P., Wang, T., Lee, W. (2014, November). A11y attacks: Exploiting accessibility in operating systems. InProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security(pp. 103-115). ACM. Shahriar, H., Klintic, T., Clincy, V. (2015). Mobile Phishing Attacks and Mitigation Techniques.Journal of Information Security,6(03), 206. Stankovic, J. A. (2014). Research directions for the internet of things.IEEE Internet of Things Journal,1(1), 3-9. Sun, B., Akiyama, M., Mori, T. (2016). Towards Automatically Detecting Promotional Attacks in Mobile App Store. Ur, B., Bees, J., Segreti, S. M., Bauer, L., Christin, N., Cranor, L. F. (2016, May). Do Users' Perceptions of Password Security Match Reality?. InProceedings of the 2016 CHI Conference on Human Factors in Computing Systems(pp. 3748-3760). ACM. Wang, T., Lu, K., Lu, L., Chung, S. P., Lee, W. (2013, August). Jekyll on iOS: When Benign Apps Become Evil. InUsenix Security(Vol. 13). Wei, T., Zheng, M., Xue, H., SongFireEye, D. (2014). Apple Without A Shell Ios Under Targeted Attack. InVirus Bulletin Conference. Xing, L., Bai, X., Li, T., Wang, X., Chen, K., Liao, X., ... Han, X. (2015, October). Cracking app isolation on apple: Unauthorized cross-app resource access on mac os. InProceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security(pp. 31-43). ACM.