Tuesday, August 25, 2020

Why Get Married

Sub-atomic Nanotechnology and Literature Envision a reality where you could have anything you needed. Gold? Here it is. Another vehicle? Voila. Precious stones? Gracious, here, if it's not too much trouble have a portion of mine, there's additional in the back. Obviously, this isn't our reality at the present, yet it may be the universe of things to come. Sub-atomic nanotechnology will have the option to give whatever one needs or needs, for nothing or for a little measure of installment. In any case, it won't just influence business and material merchandise. It will influence medication, war and weaponry, law authorization, undercover work, amusement, removal of waste and trash, and even writing. Writing will maybe be influenced in a more prominent manner than one may might suspect. Be that as it may, before I get to that, let me clarify what, precisely, atomic nanotechnology is. In l 959, Nobel Prize-winning physicist Richard Feynman set forth a thought. His thought was that anything could be produced using the ground up, out of individual particles or atoms. This is nanotechnology: the working or control of individual iotas or atoms, each in turn, and situating and arranging them decisively and over and again, until enough aggregated to shape a huge scope, usable substance. Feynman didn't name it and blueprint the science, be that as it may. This was finished by K. Eric Drexler. In the 1970's, the point at which he was an understudy at MIT, Drexler concocted a thought of nanotechnology, and illustrated its potential employments. He believed that on the off chance that one had the capacity or innovation to work with singular iotas and atoms, at that point one could make a crate that would change basic materials into hamburger. It sounds peculiar, however that was the real trick. The thought was that you could open the entryway, hurl in some stuff, work the c ontrols, and two hours or so later: out moves some new hamburger. It sounds odd on the grounds that we are encouraged that meat originates from cows, not from a case of grass clippings and old tennis shoe insoles. Be that as it may, it truly bodes well. Steers utilize just a couple of materials when making meat: grass, air, water, daylight. At the point when they are processing that garbage, they are only revising the particles to frame trademark examples of hamburger. The main genuine distinction between the techniques for meat creation of dairy animals and Drexler's container is that bovines make hamburger utilizing proteins and fluids, where responsive operators haphazardly impact, and Drexler's crate makes meat precisely. Drexler states that the particles and molecules would need to be controlled by small, little robots, generally alluded to as constructing agents.

Saturday, August 22, 2020

Letter of Intent Personal Statement Example | Topics and Well Written Essays - 250 words

Letter of Intent - Personal Statement Example One of the most significant encounters to me was entry level position in Cairo Microsoft Innovation Center (CMIC). I have additionally taken an interest in Imagine Cup 09 in Cairo facilitated by Microsoft. This experience can fill in as a proof of my expert aptitudes and capacities. In my nation of origin, I have chipped away at self-governing frameworks advancement ventures, explicitly, on Unmanned Aerial Vehicles (UAV) for 15 months. Additionally, I have enough involvement with gathering necessities, planning, executing, and testing distinctive programming applications. I likewise have a decent information on some key programming dialects, for example, c++, java, and JSP. As an exceptionally energetic individual that appreciates trying sincerely and accomplishing planned outcomes I truly need to be the piece of this program since it will open another open doors towards worldwide work understanding. I am appreciative ahead of time for exhaustive thought and trust in the call for

Sunday, August 9, 2020

Why Would Opiate Medications Cause Fainting

Why Would Opiate Medications Cause Fainting Addiction Drug Use Opioids Print Why Would Opioid Medications Cause Fainting? By Rod Brouhard, EMT-P facebook twitter linkedin Rod Brouhard is an emergency medical technician paramedic (EMT-P), journalist, educator, and advocate for emergency medical service providers and patients. Learn about our editorial policy Rod Brouhard, EMT-P Medically reviewed by Medically reviewed by Steven Gans, MD on January 23, 2020 Steven Gans, MD is board-certified in psychiatry and is an active supervisor, teacher, and mentor at Massachusetts General Hospital. Learn about our Medical Review Board Steven Gans, MD Updated on February 10, 2020 There is no real difference between heroin and prescription opiates. Snap Decision / Getty Images More in Addiction Drug Use Opioids Cocaine Heroin Marijuana Meth Ecstasy/MDMA Hallucinogens Prescription Medications Alcohol Use Addictive Behaviors Nicotine Use Coping and Recovery Opioid medications are often prescribed to help control pain, but they can sometimes have unpleasant side effects. In addition to the risk of addiction and abuse, narcotic pain medications can sometimes cause people taking them to pass out. This can be a frightening experience for the patient taking the medications as well as any family, friends, or passersby who happen to be there to witness the loss of consciousness. In order to understand why opioids sometimes cause people to faint, it is important to know about how these drugs work. Note: The following is to help understand opioids better and is not intended as advice for medical treatment. Opioids and Fainting Opioidsâ€"medications made directly from opium extract or a synthetic version of opiumâ€"can cause loss of consciousness and possibly death. These medications are also known as narcotics. A drop in blood pressure is fairly common. Paramedics administer opioid medications to relieve pain as well as to reduce the workload of the heart during certain types of heart-related emergencies (usually for chest pain during heart attacks or congestive heart failure). The action that leads to lower blood pressure in opioids is the same action that reduces the hearts workload. To better understand how opioids do what they do, lets start by looking at symptoms of opioid overdoses. How Opiates Impact the Brain and Body Opioid Background These medications are often used for pain control, but they have a long history of abuse. The opioids most people recognize are morphine, Vicodin, codeine, Oxycontin, and heroin. There are several more drugs in this class available and many have different names in different countries (Rapifen and Transtec are common names in the UK). Heroin, developed by the Bayer Company (yes, same as aspirinâ€"and released commercially only a year apart), hasnt been legal in the United States since 1924 and is no longer commercially produced worldwide, unless you count illegal production. Its worth noting that unlike legal medications, illegal opioids are not regulated and their purity can be unpredictable, which can contribute to overdoses. Besides administering opioids therapeutically (usually morphine, but paramedics in some areas may carry different versions) paramedics are often called upon to treat opioid overdoses. There are three classic signs of an opioid overdose: Unconsciousness. The patient is almost always completely unresponsive.Constricted pupils (sometimes referred to as pinpoint pupils)The patient is breathing slowly or not breathing at all. This is called apnea or respiratory arrest. The most common opioid overdoses seen by paramedics involve heroin, but any opioid medication can cause the signs and symptoms above. The problems with opioid medications dont only happen with overdose. Some opioids, such as morphine, cause decreases in heart output and blood pressure. How it happens is still being studied and it seems that not all opioid medications are created equal. Individual reactions to opioids vary from one person to the next, meaning that one persons reactions and side effects to a drug like morphine or fentanyl might be very different than someone elses. Besides whatever direct effect an opioid medication might have on blood pressure, there are other opioid-related reactions that can affect blood pressure and possibly contribute to fainting, among other things. It is impossible to predict the degree to which an opioid medication will change an individuals blood pressure. However, knowing that blood pressure could be affected helps us be prepared for possible adverse reactions. Histamine and Heroin Stereotypically, heroin addicts are depicted as itching constantly and scratching a lot. There might be a reason for that; opioids cause a release of histamine. Histamine is the same thing thats released during an allergic reaction. Allergic reactions cause itching, among other things. Histamine also plays a part in anaphylaxis, which is a severe allergic reaction that can be life-threatening. The symptoms of anaphylaxis often include low blood pressures. Combined with the typical decrease in blood pressure of some opioids, this can lead to a precipitous drop in blood pressure and fainting. Understanding Opioid Overdoses Opioid-Induced Constipation Opioids are also well-documented causes of constipation. Chronic users can develop severe constipation that can lead to cramping in the gastrointestinal tract. Gastrointestinal cramping stimulates the vagus nerve, which leads to lower heart rates and drops in blood pressure. Cramping is another potential trigger for fainting due to sudden losses of blood pressure. Important Considerations Even though these are some of the oldest pain relievers available, there is still a lot we dont know or understand about opioid medications. With all the possible reactions and effects of opioids, a loss of blood pressure bad enough to cause a loss of consciousness (fainting) is not out of the question. Adding the sedative effects of opioids and their propensity to decrease breathing just makes things more complicated. Read the Labels Always follow directions on all medications (prescription and over the counter). Doing so may help you avoid situations that can lead to fainting. For instance, the precautions for oxycodone warns that the medications may result in lightheadedness, dizziness, and fainting when standing too quickly. Ultimately, for some people, opioid medications simply may not be the answer. But given the important role that these pain control agents can play, its worth exploring the options with a doctor in cases involving severe pain. With expert supervision and safe and careful titration, pain control and improved quality of life can be achieved. How to Spot the Signs of a Pain Killer Addiction

Saturday, May 23, 2020

Social Influence On Social Psychology - 1870 Words

Social influence is a big matter in social psychology which is referred to the ways in which different people’s thoughts, actions and feelings are subjective by social groups. On a daily basis we are deluged by numerous efforts by others to influence us, and that’s why, the study of social influence has long been a dominant matter of analysis for social psychologists and researchers in many other social sciences (e.g. marketing and political science). Social Psychologists focus on the situation. They study the social influences that describe why the same person will act inversely in different situations. Theorists have typically distinguished between three types of social influence which are compliance, conformity, and obedience. Compliance is often referred to as an active form of social influence in that it is usually intentionally initiated by a person where they may choose to comply or not to comply. Yet, the thoughts of social reward and punishment may lead them to compliance when they really do not want too. During the 1970s, psychologist Philip Zimbardo conducted an experiment in which participants played the roles of guards and prisoners in a mock-prison set up in the basement of the psychology department at Stanford University. Originally slated to last two weeks, the experiment had to be terminated after just six days after the guards began displaying abusive behaviour and the prisoners became anxious and highly stressed. The experiment demonstrated how peopleShow MoreRelatedSocial Psychology And Social Influence1600 Words   |  7 PagesIn social psychology, social influence is a process where someone’s beliefs, thoughts and behaviour change by being exposed to beliefs, thoughts and opinion s of others. It manifests in several forms, such as obedience, compliance and conformity. All these types of social influence have been studied by numerous researchers who investigated the reasons why people conform to social norms and obey to authorities, such as Milgram’s classic studies on obedience. His experiments support the popular ideaRead MoreSocial Psychology: Social Influence768 Words   |  3 PagesIntroduction Social influence is a major topic in social psychology and looks at how individual thoughts, actions, reactions and feelings are influenced by other people or social groups. â€Å"Social influence can be seen in our conformity, our obedience to authority, and our group behavior† (Psychology 579). Social influence may also be represented by peer pressure, persuasion, marketing and sales. Purpose of the Study The purpose of this study is to determine how effective social influence is on a groupRead MoreSocial Psychology: The Study of Influences Essay1420 Words   |  6 Pagesthat has been explored. Psychology, or the study of â€Å"why†, has been attempting to answer such questions for centuries. Although there are many answers (reflected in the number of schools of psychology), Social psychology attempts to explain the environmental factors that lead to a person behavior. By definition, Social Psychology is â€Å"the study of the manner in which the personality, attitudes, motivations, and behavior of the individual influence and are influenced by social groups† (Merriam-WebsterRead MoreFritz Heiders Influence Of Social Psychology884 Words   |  4 PagesAt the beginning of the 1900s, Social Psychology was in its infancy as psychologists studied individuals and how they thought, felt, and behaved in their social environment. Scientific methods were developed to describe, capture, and measure social relationships and their influence. Fritz Heider was such a psychologists and his work still influences social psychology and its research today. Judgement of conduct, a current study by Dr. Wong Yee Cheung, is influenced by the work of Heider. The workRead MoreKurt Lewin s Influence On Social Psychology Essay1209 Words   |  5 Pagespsychologist who had the biggest impact on social psychology would be Kurt Lewin. Commonly known as the father of social psychology, Lewin put in countless hours of hard work and research in the study of the individual behavior among social situations. By working with other renowned psychologists, creating theories of his own, and leaving a mark on the world that still thrives today, Kurt Lewin is greatly responsible for the many of the advancements of psychology throughout history. Born in a smallRead MoreUnderstanding Social Psychology And How Relationships With Others Can Influence An Individual s Thoughts And Behaviors966 Words   |  4 PagesWhen studying social psychology, it is essential for one to understand social groups, how they work, and how relationships with others can influence an individual’s thoughts and behaviors. For this reason, a full understanding of cooperation is necessary for social psychologists. Defining Cooperation Cooperation has several components, and therefore must be broken down when being defined. Most importantly, it involves multiple people in any sort of beneficial relationship; that is, the outcomeRead MoreHow do others influence our behaviour? Discuss with reference to social psychology theory and research.1989 Words   |  8 Pagescount: 1,633 How do others influence our behaviour? Discuss with reference to social psychology theory and research. Social influence has many different definitions in psychology, it is mainly used to summarise the field of social psychology. Mainly looking at â€Å"how thoughts, feelings and behaviour of individuals are influenced by actual, imagined or implied presence of others† (McGrath, 1970.) Our social life is mainly distinguished by our social influences; influences we are both consciously andRead MoreSocial Psychology Definition Paper1122 Words   |  5 PagesSocial Psychology Definition Paper Sinthia Brye PSY/ 400 August 30, 2010 Joyce Willis Social Psychology Introduction Social psychology it observes as the influence of our situations with special attention on how we view and affect one another. Social psychology perceives the way we think, influence people, and relates to others. Social psychology lies at psychology’s boundary with sociology, which sociology is the study of people in groups and societies? Social psychology isRead MoreThe Study of Human Behavior in Given Situations1613 Words   |  7 PagesPsychology is a social science study that covers diverse subject topics and carries out different forms of research in order to understand the development and function of human beings. It is a scientific study that focuses on peoples mind and its functions especially those affecting behavior in a particular context. Psychology is divided into different branches, and each branch addresses its own form of content in relation to mental processes and behavior. Social psychology is one of the psychologyRead More Social Psychology Essay1687 Words   |  7 Pagesorigins of modern social psychology. It is therefore important to consider that social psychology cannot be traced back to one single source of origin (Burr, 2003). Hence, this is the reason why there are debates of what social psychology is. Allport (1985) describe d social psychology as the study an individual’s thoughts, feelings, and behaviours which are influenced by the actual, imagines, or implied presence of others. As seen from this definition there is a direct link between social science and the

Tuesday, May 12, 2020

Psychological And Physical Effects Of Procrastination Essay

The Psychology of Procrastination Marcus W. Middleton Caledonia Mumford Central School Abstract The psychological and physical effects of procrastination can be detrimental to the health of an individual. However this is a fixable habit that can be overcome through learning and treatment. Introduction In 2007, it was found that up to 95% of students in the United States procrastinated on academic tasks. Even worse, 30% to 60% of those students procrastinated regularly and 75% of them considered themselves to be procrastinators (Skowronski and Mirowska, 2013). While procrastination can have negative effects on one’s health both physically and mentally, this lifestyle can and should be changed. Many of those who procrastinate disregard the mal-effects of procrastination. Some of these effects include cardiovascular disease and even an increased susceptibility to illnesses. There are psychological and physical aspects of procrastination that can make it difficult to overcome this habit, but data supports that through learning about procrastination and how to control one’s time, individuals definitely have the power to become well managed workers. Discussion REASONS Procrastination can be expressed in many ways. There are so many different ways to procrastinate because there is a multitude of reasons why people engage in this self-harming lifestyle. Procrastination has been shown to be a universal pattern (Yesil, 2012). People find things to procrastinateShow MoreRelated Procrastination: Habit or Disorder? Essay1395 Words   |  6 PagesProcrastination: Habit or Disorder? Procrastination is the art of keeping up with yesterday and avoiding today. - Wayne Dyer (6) Universally common to college students, procrastination is often addressed as a bad habit. Yet, in most cases, this isnt a nuance, but a perpetual occurrence - no longer qualifying for the term habit. Typically thought of as a behavioral trait, procrastination thrives on a cycle of blame shifting and avoidance. Falling victim to this habit myself, I embarkedRead MoreThe Negative Effect of Procrastination on College Students858 Words   |  4 PagesProcrastination is a tendency to postpone, put off, delay, reschedule, take a rain check on, put on ice, hold off, or to defer what is necessary to reach a particular goal.(Rogets 21st Century Thesaurus, Third Edition. Philip Lief Group 2009.) While attending College some students find it hard to juggle work, family, and friends. Leading most students down a dangerous path to procrastination; that negative impact affect students from their physical health, mental health, and social health. EveryoneRead MoreProcrastination Is The Thief Of Time868 Words   |  4 Pagesâ€Å"Procrastination is the thief of time.† Edward Young The ability to procrastinate can be very easy. Merriam-Webster’s Collegiate Dictionary defines procrastinate as: to put off intentionally and habitually, to put off intentionally the doing of something that should be done. (online) To choose something enjoyable over a task that must be done is sometimes very easy. Why do we procrastinate? Why do we make the choice to put off todays task till tomorrow? What are some of the causes of procrastinationRead MoreInformative Speech On Procrastination1023 Words   |  5 Pagesapproaching and you still haven’t come close to completing your assignment. And we end up somewhere like this. Well, I believe that we can all relate to this and we have all done this to ourselves before. I’m talking about procrastination. B. Social Significance: For many of us, procrastination is a strong and inexplicable force that prevents us from completing our important and urgent tasks. It’s like the same thing when you bring the like poles of magnets together, it repels. And according to a statisticalRead MoreStrategies for Overcoming Procrastination1081 Words   |  5 PagesStrategies for Overcoming Procrastination Keanna Jones Gen 200 March 18, 2010 Instructor: Jenta Young â€Å"You don’t have to see the whole staircase, just take the first step† says Martin Luther King Jr. (Finest Quotes, Lift Your Spirit Up, 2010). Sounds simple enough to some, but for many people taking the first step can be quite difficult. In other words, putting off something intentionally that should be done is called procrastinating (Merriam-Webster, 2010). There are lots of reasonsRead MoreHow Sleep Are Capable Of Predicting Significant Health Outcomes1599 Words   |  7 Pagesits effect on both mental and physical health (Kroese, Evers, Adriaanse, Ridder, 2016). Digdon and Howell (2008) note procrastination to be the inclination to postpone task commencement or conclusion, wavering actions, or the demonstration of insufficient time allotment for the accomplishment of tasks. Therefore, opting to go to bed later than primarily intended with no external influence is termed bedtime procrastination (Kroese., et al. 2016). Reported associations between procrastination andRead MoreStudent Procrastination And An Open Testing Environment958 Words   |  4 PagesAcademic procrastination is an established area of research in higher education and psychology. This phenomenon has been studied with many forms of student assignments, including those in online courses (e.g., Goda, Yamada, Kato, Matsuda, Saito Miyagawa, 2014; McElroy Lubich, 2013; Klingsieck, Fries, Horz, Hofer, 2012; Rabin, Fogel, Nutter-Upham, 2011). Up to 70% of university students consider themselves to be procrastinators (Goda et al., 2014; Schouwenburg, Lay, Pychyl, Ferrari, 2004)Read MoreNegative Effects Of Social Media1297 Words   |  6 Pagesnetworks can cause adverse psychological harm and even lead to physical harm. Although many may argue that social media pertains to be useful, there prove to be more harmful aspects rather than helpful aspects of these media sites. These effects are not only psychological, but they may also be physical. Not only do social networks cause depression, anxiety, and cyberbullying, they also can result in decreased privacy and physical harm. By recognizing these harmful effects, it is possible to combatRead MoreThe Biological Approach : Mental Processes And Behaviors1356 Words   |  6 Pagesforget memories and thought processes. Neurons are the basic building blocks of the brain and nervous system. They control our muscle movements and thought processes. If neurons are damaged people may experience difficulty in various cognitive and physical behaviors. Everything we do depends on neurons communicating with each other. Neurons communicate by sending and receiving electrical signals throughout the brain and body with the use of neurotransmitters. Neurotransmitters are chemicals that areRead MoreSocial Networking Addiction1159 Words   |  5 Pagesadded a new social dimension to the web. While such networks have made people, communities and groups with shared interests stay more â€Å"connected,† Internet addiction and social network addiction in particular also started being recognized as psychological disorders all over the world. While several 90†²s studies focused on Internet addiction, the next decade saw the growth of a new addiction related to all manner of social networking sites, especially the current king of the jungle: Facebook. In

Wednesday, May 6, 2020

Preventive Measures for Teenage Pregnancy Free Essays

There are a lot of teen mothers growing up in this world wondering, what if I would have stayed in school? What could I have become? Would it have made my life easier if I had thought first? Teens don†t think of the consequences of their actions. They don†t think that the aftermath of their irresponsibility can lead to pregnancy. Having a child comes with a lot of responsibility. We will write a custom essay sample on Preventive Measures for Teenage Pregnancy or any similar topic only for you Order Now The teen doesn†t fully understand that all free time is lost, that she will have to find some may to support herself and the child, and that any of her aspirations for future plans are now drastically changed. Children take up a lot of time, which also means, no more school. If we can some how get through to them that this is what happens when you get irresponsible, it will eliminate a big portion of the problem. One of the best ways of getting the point across is to have a guest speaker that has been through a teen pregnancy before. Whether it be, the person that it actually happened to or that teens mother, which is some times even better. It all comes down to the education of the teen being the best form of prevention. The more they know about sex and it†s consequences at a young age the less likely they are to are to go out and be irresponsible about it. Teaching teens about different types of protection and how they work is some times one of the best ways of keeping the number of teen pregnancies down. Not to mention a fall in the number of teen sexually transmitted diseases. The reason why teaching about protection is good is obvious. The reason the words â€Å"some times† are underlined is because teaching them about sex some times drives a teen that normally wouldn†t have had sex till later on in there lives to think, ‘well, it seems like everyone is doing it. If it†s important enough that we must learn about it in school then I guess it†s normal.† So the argument that education is the best prevention goes both ways. On another plane, parents can help and/or hurt the situation. Every once in awhile at the dinner table or in some public place it seems that parents or even relatives are always wanting to know if you have a girlfriend yet or not. This is definitely not an extreme case but there is always that subconscious thought in the back of there heads that†s saying, I guess I should get on the ball and start looking for a mate. On the other hand, though not every parent thinks so, but their children do listen to them. Any words of advice or even telling them about your own experiences as a teen will help. Even if the parent doesn†t know much about the subject they should try to tell the teen that and a little of what they do know. That will make the child think you care and maybe think twice about their actions. Teens are not dumb and if it seems to them that you are making and honest effort and you really believe in what you are saying they will respect that and listen. There is no real solution to the teen pregnancy problem but education and teen to parent communication are good steps in the right direction. We need to let our children know that we are there for them and that we care. After all no one wants to think of what they ‘could have† become. How to cite Preventive Measures for Teenage Pregnancy, Papers

Saturday, May 2, 2020

ELECTRONSRUS Management

Questions: ELECTRONSRUS is a company that designs, manufactures and sells electronic network equipment based in Wrexham. Business is so good for this HI-TEC company that they have decided to take over the old hospital which is on the other side of Wrexham about 5 miles away from their existing building. The buildings require some modification to fit in with the new plans of the company and as part of this you have been asked to provide a design to install the network infrastructureTo ensure that they do not interfere with the support of their customers during the move they have decided to install a new IT system and Computer Network in the new building before they move in. For this reason, and for the immediate future, a link to the old office will be essential.The attached sheet shows a plan of the premises. A list of the proposed use of the buildings is provided below. Further information is available from your lecturer. 1. Brief but concise description of the available technological solution s2. Compare and contrast these options3. Make a judgement as to the preferred solution for ELECTRONSRUS, justifying your choice. Answers: Requirement Analysis Introduction ELECTRONSRUS are manufacturers of electronic network equipments. They design sale their products in Wrexham,United Kingdom since long years. Because of increased business, they have expanded to include new office buildings in their company. ELECTRONSRUS hire us, for the effective and vital communication between old and new offices and within the premises of each building.We are providing Virtual local area network (VLAN) for the whole ELECTRONSRUS Company. VLAN VLAN is a virtual LAN.Say , you have connected multiple PCs to a single switch providing a private subset of LAN where computers are interacting with each other.A single switch will behave like multiple switches .Each VLAN has its own boradcast domain and IP subnet.[1] The VLAN is used to create multiple broadcast domains in a switch. For example a single CISCO catalyst switch 2970 series of 48 ports can be divided in two VLANs . VLAN 1 is craeted using 1 to 24 and VLAN 2 is created using 25to 48 .One of the special feature of VLAN technology is less hardware usage like two VLANs are created on a single switch .VLANs help in minimising traffic.To connect VLANs in network that have multiple interconnected switches, we use VLAN trunking. Cisco catalyst 2970 supports two different trunking protocols: Inter Switch Link (ISL) and IEEE 802.1q.VLAN provides physical topology independence by grouping users regardless of their physical location. For instance,a two storey building with 20 users on each floor is connected via CISCO catalyst 2970 switch with 48 ports. VLAN is bounded in logical subnet so to reach other subnet layer 3 routers are needed. All devices in same VLAN share same IP subnet and PCs connected in different VLANs are in different subnets . It helps in reducing latency by using Layer 2 devices and therefore, minimizing usage of layer 3 routers.VLAN technology is beneficial in existing practical networks.There can be port based VLAN , Mac address based VLAN and Layer -3 based VLAN.IEEE 802.1Q is a standard for VLAN and provides details of VLAN interoperions.IEEE 802.1 Q has provided standard method for implementation in Ethernet frames. Benefits Of Vlan Effective easy management of workstations Load Balancing Bandwidth Allocation Effective Securitymanagement and more security options Increased performance Simplified software configurations Reduced latency VLANs provide an easy and cheap costs infrastructure for networks. They allow easy management of large networks by enabling centralized configuration of devices. They give high performance over shared devices by reducing collisions and limiting broadcast traffic. It simplifies configuration by grouping of department resources into a single subnet. IP addresses and subnet masks configured on PCs will be in same subnet for same VLAN. Figure 1:Network diagram for VLAN configuration Customer Requirements Installation of IT system and computer network in new building. All admin,design, manufacturing plant and store should be connectedto reliable network. A network link must be provided to connect old and new offices of ELECTRONSUS. Site Map And Details Figure 2 :New site for ELECTRONSRUS Site Description: Administration office: The administration office is a threestorey building and is going to be used for various departments. Top Floor = Management and directors sittings. Total member at floor = 60 members Middle Floor = Human resource purchasing department personnels Total member at floor = 60 members Ground Floor = IT Staff Total member at floor = 60 members Design office: This is a 2storey building and is going to be usedin various departments. Top Floor = Engineering design staff Total member at floor = 150members Ground Floor = Sales Marketing Total member at floor = 75 members Stores office: The Stores is where all the components for the manufacturing are kept along with the completed equipment ready for dispatching. It is a fourstorey building with approximately five members of staff on each floor. Top Floor = Store Staff Total member at floor = 5 members Second Floor = Store Staff Total member at floor = 5 members First Floor = Store Staff Total member at floor = 5 members Ground Floor = Store Staff Total member at floor = 5 members Manufacturing Plant: This is where the equipment is manufactured. It is a single storey building where about 120 production operatives will work. They are many different areas in this building since there are lots of different tasks that need to be performed. It includes a Machine shop where there are heavy electrical cutting machines and Arc welders. There is also a test bay where all the equipment is thoroughly tested before being shipped. The offices are for the Area managers. External Access It must be possible to have the following External access:- General Internet access Access to Suppliers Network Access to Suppliers to restricted part of ELECTRONSRUS Intranet Access for Sales Marketing staff to the ELECTRONSRUS Intranet when they are remote from the site Network Topology The most mainstream designs, or topologies, incorporate the token ring, bus, point to point, star topologies. Basic Topologies BUS With a bus design, every node/hub is joined consecutively along the system backbone. A node/hub is any equipment associated with the system, for example, a printer, scanner or PC. Backbone is the term used to portray the primary links to which the system fragments are joined. At the point when one node/hub sends data to another node/hub through the system, the data goes along the backbone until it achieves the wanted accepting node/hub. Token Ring With a ring arrangement, every node/hub is joined successively along the system backbone. Be that as it may, not at all like the bus arrangement, the end of the network associate with the first node/hub, resulting in a circuit. Node/hubs on a token ring alternate sending and getting data. In the token ring topology, a token goes along the backbone with the data being sent. The node/hub with the token sends data to the following node/hub along the backbone. The getting node/hub peruses the data tended to it and afterward passes the token and any extra data to the following node/hub. This proceeds until the token and information make it back to the first node/hub in the system. Star With a star design, every node/hub is joined with a focal center point by means of system sections. At the point when one node/hub sends data to another node/hub, the data goes through the hub. The hub does not channel or course the data in any capacity; it just serves as a connector between system sections. Point-To-Point Point-to-point topology is the least complex of all the system topologies. The system comprises of an immediate connection between two PCs. This is quicker and more solid than different sorts of associations since there is an immediate association. The impediment is that it must be utilized for little zones where PCs are in close vicinity. VLAN Segmentation A VLAN is a switched network that is segmented logically by departments of an organization or applications. A VLAN creates broadcast domain defined set of switches. VLAN consists of end systems, switches, and routers. VLANs are created to provide the segmentation services.It address scalability, security and network management. Routers in VLAN topologies provide broadcast filtering, security, address summarization traffic flow management. [4] VLANs technology divides broadcast domains in different VLANs. So that packets are switched between ports designated to the VLAN range. Communication Between VLANS CiscoIOS software (switches and router OS) provides full-feature routing at Layer 3 and translation at Layer 2 between VLAN.Five protocol are mainly used: [4] IEEE 802.10 Protocol IEEE 802.1Q protocol Inter Switch LinkProtocol ATM LANE Protocol ATM LANE Fast Simple Server Replication Protocol Electronsrus Detailed Networktopology Admin office, manufacturing, store and design office routers are connected. Admin office is connected via the internet cloud, and its fixed line will be leased theline by the service provider. To connect old building/office ip sec tunnel is used. Design building router is used for back up lease line by service provider. Multiple switches are used in topology with 48, 24 0r 8 ports. There will be free ports in every vlan , so that in the future there can be enhancements. Ip Addresses And Subnet Mask For Each VLAN New Buildings premises Floor Members IP address Subnet IP address range Name of the Vlan First 60 192.168.0.0/26 192.168.0.0- 192.168.0.62 Vlan_admin_First Second 60 192.168.1.0/26 192.168.1.0- 192.168.1.62 Vlan_admin_Second Third 60 192.168.2.0/26 192.168.2.0- 192.168.2.62 Vlan_admin_Third Design Building Engineering design Top 150 192.168.5.0/25 192.168.5.1-192.168.5.126 Vlan_design_Top Sales and Marketing Ground 75 192.168.5.128/25 192.168.5.129- 192.168.5.254 Vlan_design_Ground Stores building First 5 192.168.7.0/28 192.168.7.1-192.168.7.14 Vlan_Stores_First Second 5 192.168.8.0/28 192.168.8.1-192.168.8.14 Vlan_Stores_Second Third 5 192.168.9.0/28 192.168.9.1-192.168.9.14 Vlan_Stores_Third Manufacturing Plant Ground 120 192.168.10.0/25 192.168.10.1-192.168.10.126 Vlan_manf_Ground Hardwar Requirements Hardware Repeaters At the point when Ethernet was initially implemented, a great many people utilized a copper coaxial link. Notwithstanding, the most extreme length of this link was 500 meters, which was not sufficiently long for a few systems. To address this issue, system designers utilized repeaters to join a few Ethernet portions. Bridges Bridges give a Transparent ways to joining LANs. A bridge is a gadget that join physically isolated LAN fragments, (for example, diverse Ethernet links) into one legitimate LAN section. There are four classifications of bridges: source routing, Transparent, translating, and encapsulating. Transparent extensions are utilized for Ethernet, though source routing bridges are utilized for token ring systems. Encapsulating extensions unite two fragments of the same media, (for example, token ring to token ring) more than a medium. The accepting extension takes out the envelope, checks the destination, and sends the casing to the destination gadget. Routers LAN fragments joined by a switch are physically and intelligently separate systems. Rather than a bridge, when different system sections are joined by a switch they keep up their different legitimate identities (system location space), yet constitute an internetwork. Switches determine the destination and course for every bundle, and they can be utilized to direct bundles and interconnect a mixed bag of system architectures. A noteworthy contrast between an extension and a switch is that the bridge recognizes bundles by source and destination address, though a switch can likewise recognize parcels by convention sort. Switches accommodate the interfaces to WANs. Switches Ethernet communicates over the system utilizing the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) process. A convention utilizing CSMA/CD screens, or listens to, the media for system movement, or data going through the system starting with one hub then onto the next. In the event that a hub does not sense any activity, it will send casings or bundles of data onto the media. A system edge is similar to a sent letter. The letter is put in an envelope that has an arrival location and the location of its destination. Information are similar to the letter and the casing is similar to the envelope. The information is put in the edge and the casing has the tending to data and lapse checking code Hardware Requirements In Design There are many vendors of network devices like Allied Telesis, Arista , Avaya , Brocade , Cisco , Dell , D-Link ,Draytek , Enterasys Secure Networks , Extreme Networks ,Fortinet, HP, Juniper Networks ,Net gear , Transition Networks and Zyxel. But, CISCO is one of the leaders in networking solutions and provides a wide variety of switches from SMB to enterprise and ISP provider networks.Cisco peripherals are alittle bit costly, but they are known in themarket for their customer support. We are opting for Cisco peripherals. Designing Guidelines: Ideally thenetwork should be designed hierarchically in 3 layers (Access, Aggregation, and Core) but looking at the requirements I am proposing following guidelines: Each building will have its layer twoswitches where they do would be isolated using VLANS. Vlanbe restricted Broadcast domain. We will call It as Access Layer Private IPv4 Subnets would be assigned based on number of members per floor. We can go for IPv6 addressing, but that would make the migration cumbersome as of now. We can plan for Migration to IPV6 if required once everyone is migrated to anew network Aggregate traffic of these switches will be uplink to Core/Aggregate router that in our case would be one. Each building would be connected to each other using Core router We can have redundancy by having multiple Core routers as well Layer 2 Switch, but this would depend on customer investment and criticality both of which is still unclear. Leased line would be purchased from Service provider and will be connected to any building core router that would act as a gateway. We can have back up leased line as well from other service provider, but that would again depend on customer BCP. Core router would be required to do NATTING in case of IPV4 address to access the internet as private range is not routable on internet Design For Electronsrus Network VLANs are available on the CISCO Catalyst 6000 running CatOS 5.4 or later, on the Catalyst 4000, 2980G, 2980G-A, 2948G, and 4912G running CatOS 6.2 or later. We are opting for CISCO Catalyst 2970 series. CISCO catalyst is layer 2 Series Switch used for Access connectivity in VLANs. I am selecting Cisco hardware as Cisco is known for its customer support as well as they keep bringing latest features on their products as and when required. These series switches have features like QOS, STP, etc. which can be required in the network as anetwork grows. There are vendors Like Alcatel Lucent, Summit, Juniper that offer similar hardware required for the network, but I am going in with Cisco Hardware. Configuration The following two configurations comprise the Cisco Catalyst 2970 Series: Cisco Catalyst 2970G-24TS-24 Ethernet 10/100/1000 ports and four small form-factor pluggable (SFP) ports Cisco Catalyst2970G-24T-24Ethernet 10/100/1000 ports Cisco catalyst 2970m series comes with Cisco Enhanced Image (EI) IOSSoftware .CISCO catalyst suports IGMP leave timer ,IGMP snooping querier,DSCP transparency , VLAN-based QoS1and hierarchical policy maps on SVIs , Device Manager ,SSL Version 3.0,IEEE 802.1x, Flex Links , SFP module diagnostic management ,Smart ports Macros. [3] Hardware used Cisco catalyst 2970 series switches around 15 or more Router 2900 series around 3 in quantity. Connectors and cables 10BASE-T ports: RJ-45 connectors , 100BASE-TX ports: RJ-45 connectors 1000BASE-T ports: RJ-45 connectors, 1000BASE-T SFP-based ports: RJ-45 connectors[3] 100BASE-TX ports: RJ-45 connectors 2-pair Category 3, 4, or 5 unshielded twisted-pair (UTP) cabling 2-pair Category 5 UTP cabling 1000BASE-SX, -LX/LH, -ZX, and CWDM SFP-based ports: LC fiber connectors (single-mode or multimode fiber)[3] Management console port: RJ-45-to-DB9 cable for PC connections[3] Power connector RPS 675 Internal power supply connector Environmental conditions Operating temperature:32 to 113F (0 to 45C)[3] Storage temperature: -13 to 158F (-25 to 70C)[3] Operating relative humidity: 10 to 85 percent (noncondensing)[3] Operating altitude: Up to 10,000 ft (3049 m)[3] Storage altitude: Up to 15,000 ft (4573 m) [3] Contempora 4(C4) Series Rack cabinet system Linux windows servers For VOIP Connectivity , require IP phones For Security , surveillance cameras(CCTV) Biometrics , card punching system Centralized Air conditioning Software Requirements Lan Software/ Operating System As the name suggest LAN operating system is required to operate on the LAN system, manage the tremendous work load with a number of various types of server attached to it. It has basically two aspects (i) Server Software (ii) Work station Software. As case of other multi user operating system, LAN operating system also facilitate the sharing of expensive resources such as printer, storage space etc. among all LAN users, provides security of data permits connections to other network. There are various types of LAN operating systems for example Novel Netware, LAN server, omni met, PC Net, IBM PC LAN, Etherlik plus etc. Catalyst 2970 G-24T uses Cisco IOS Release 12.2(18)SE Catalyst 2970 G-24TS uses Cisco IOS Release 12.2(18)SE Supported windows 98,NT 4.0 , 2000 XP 7 Supported Microsoft internet explorer 5.5,6.0,7.0. Supported Microsoft Netscape Navigator 7.1 2970 Supports IGMP leave timer ,IGMP snooping querier,DSCP transparency , VLAN-based QoS1and hierarchical policy maps on SVIs , Device Manager ,SSL Version 3.0,IEEE 802.1x, Flex Links , SFP module diagnostic management ,Smartports Macros. Cisco IOS software release 15.0. All the above requirements, can be altered after any discussion with IT Team of ELECTRONSRUS. Internet Connection Internet Connection Internet connection or broadband can be taken from any SERVICE PROVIDER like reliance,airtel, Vodafone etc. I suggest following connections: BroadBand Connections: It is a high speed internet connection. User can dial phone and remain connected on internet at the same time.With broadband , users can watch live news and sports. Fixed Broadband Connections: There is wireless or fixed modem in this connection. Fixed Wireless and satellite connections: In some countries, in remote areas fixed wireless connection or a satellite connections are provided. Remote Access Remote Procedure Call (RPC) is an authoritative method for building applications like client/server based, distributed etc. The Remote Procedure Calls (RPC) method is a model of high-level interactions for various applications in the network. RPC is a dominant method for building applications based on client/server or distributed networks. It is base on enlarging the idea of predictable or local calling procedure, in such a way that the procedure called not required to exist near the similar address space just like the procedure of calling. The two procedures can be on the same system, or rather can have dissimilar systems and are connected using a network. By means of RPC, agenda on platform of networking can interact with resources like remote and local. RPC permits the use of particular kinds of calling procedures that are designed to conceal the underlying mechanisms on which network is working in a network application. The complication concerned in the expansion of distributed doling out is decreased by maintaining the remote call semantics whether the same or different the server and client are using the same system. This feature of transport autonomy of RPC cuts off the elements of physical and logical layer application from the layer of data communications method and gives the flexibility to the application for a diversity of transports applications. Remote procedure call (RPC), exactly, permits you to call up a course of action on both a local and a remote machine evidently. A call of client is interpreted into a remote machine call Client Remote File SystemWrite (hello); Server File SystemWrite (Hello); RPC is executed on above layer of two-way messaging by means of a procedure stubs available on the client as well as server. The procedure stubs just offers the interface of invocation for programmers. The real applications of those actions are described remotely. Basically the client stub has following tasks at hand: Marshalling or Building messages Sending messages Response wait Unpack reply Return result The server stub has following tasks at hand: Do N threading in order to wait for the requests Loop: For some time just look for command Upon receiving command perform decoding and unpacking of request parameters, this is also called as unmarshalling Now next step is procedure call Using results obtained build message for replay Now finally send reply Implementation Issues The stubs are repeatedly produced. A client has no clue about which port is for communication because this is runtime. Consequently, the client requests to have an already known port for moreover a server or a process name server that decides which server to get in touch with. Features RPC acts as a local host but Mask remote function calls The RPC is a Client-server based model message passing is the basic way for Request to reply paradigm in remote procedure call Functions uses methods like message passing and using function parameters it returns value Properties of RPC The Remote procedure call do function call based on the pattern of Language-level The Remote procedure call is quite simple for any programmer to understand There is a Synchronous method for request and reply communication between host and client It has no specific choice for any programming language and hence language neutral Before forwarding a reply to any request, it do matches the corresponding port for that requests There is automatic matching for replies and requests It posses Distribution transparency which put out of sight the complication of a distributed system and gives quality assurance Failure Modes of RPC Sometimes there can be failure in the system due to semantics of Invocation hold up by RPC due to some congestion in network or server, congestion in client network or last due to server failure Disadvantages of RPC One disadvantage is the way of interaction that is it uses Synchronous interaction for the request and replies hence more chance of connection loss etc. Client and server are closely coupled and have direct effect on each other. In some scenarios the client might block the process for a quite long time in case loading of server directs to client with multi-threaded programming Some clients are slow or failed to reply due to network problem or other which delays the reply to the server There must be multi-threading at the server interface because generally it has more than 1 client Distribution Transparency is not probable to mask all troubles RPC model is not object-oriented and hence duplication cannot be avoided The above factor leads to invocation of servers functions rather than using objects to call methods, which just store references and hence avoid all loading at invocation. Remote Access In Network Application Through IP sec tunnel old and new office buildings are connected. IP SEC TUNNEL MODE IPSec tunnel mode is thedefault mode. With tunnel mode, the entire original IP packet is protected by IPSec. This means IPSec wraps the original packet, encrypts it, adds a new IP header and sends it to the other side of the VPN tunnel (IPSec peer).[5] Tunnel modeis most commonly used between gateways (Cisco routers or ASA firewalls), or at an end-station to a gateway, the gateway acting as a proxy for the hosts behind it.[5] Security And Network Management Security Information and computer security is a task of software team. We concern here for physical security. Physical security faces different threats of environment, political, natural as compared to computer and information security. The threats are classified as: Natural Calamity threats: Catastrophe, Floods, earthquakes, storms and tornadoes, fires, extreme temperature conditions and so forth. System threats:Power supply issues, voltage issues, temperature issues so forth. Man interference threats: Unauthorized access, hijack attack, spoof attack so on. Politically motivated threats:Strikes and riots in the city, civil disobedienceand so forth. security and network management measures Develop security team. Develop proper plan. Do risk analysis management. Entries in critical data center rooms should be limited Proper pathways around building to guide to main entrance Back door entries should be limited to suppliers and equipment deliveries. Pathways should have proper lighting to guide people in night. Do natural surveillance sometimes Deploy electronic motion sensors There should be continuous video surveillance Biometric access and exit sensors for critical areas like data center UPS backup generators ,gas based fire suppression system Server monitoring Redundant HVAC controlled environments Proper fencing IP support for devices such as switches and routers Effective Fencing near building Proper web access management Proper password management on devices Back up of data every day. References : Difference between VLAN and LAN.[online]. Available:https://www.differencebetween.net/technology/internet/difference-between-vlan-and-lan/.[Accessed: July 19, 2011]. Vlan configuration examples[online]. Available:https://www.h3c.com/portal/Technical_Support___Documents/Technical_Documents/Switches/H3C_S3100_Series_Switches/Configuration/Typical_Configuration_Example/Low-end_E_S_Configuration_Examples(V1.04)/200809/616200_1285_0.htm. Cisco catalyst 2970 series switches[online]. Available: https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-2970-series-switches/product_data_sheet09186a0080197384.html. Routing between VLANs overview[online]. Available:https://www.cisco.com/en/US/docs/ios/lanswitch/configuration/guide/lsw_rtng_vlan_ovw_ps6350_TSD_Products_Configuration_Guide_Chapter.html Understanding VPN IPSEC TUNNEL mode and IPSEC TRANSPORT MODE[online]. Available: https://www.firewall.cx/networking-topics/protocols/870-ipsec-modes.html

Sunday, March 22, 2020

Northern Rock Risk Management Essay Example

Northern Rock: Risk Management Essay Northern Rock plc Risk Management Home Assignment Northern Rock plc Risk Management Home Assignment Authors: Serghei Leahu Alexandru Mangir Mihail Mavrin Seminar leader: Herbert Windsor Authors: Serghei Leahu Alexandru Mangir Mihail Mavrin Seminar leader: Herbert Windsor Table of Contents Executive summary2 Economic and financial environment description3 Causes and circumstances of incurred losses5 Errors by the organisation8 Errors by internal and external supervising authorities10 The internal authorities10 The external authorities10 Effects on other commercial organisations12 Conclusions14 References15 Executive summary According to the House of Common’s Treasury Committee’s Fifth Report of Session 2007-08 â€Å"The run on the Rock†, on the evening of Thursday 13 September 2007 at 8. 30 PM the BBC announced that Northern Rock plc had asked for and received emergency financial support from the Bank of England. The terms of the funding facility were finalised in the early hours of Friday 14 September and announced at 7. 00 AM that day. That day, long queues began to form outside some of Northern Rock’s branches; later, its website collapsed and its phone lines were reported to be jammed. The first bank run in the United Kingdom since Victorian times was underway. The purpose of this home assignment is to critically discuss the Northern Rock plc bank run from a faulty risk management perspective. We seek to examine what were the causes of the collapse of Britain’s fifth largest mortgage lender, associated consequences for both the bank and other financial institutions (both domestic and international), the way authorities coped with this event and possible lessons to be drawn about proper and improper risk management. Economic and financial environment description We will write a custom essay sample on Northern Rock: Risk Management specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Northern Rock: Risk Management specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Northern Rock: Risk Management specifically for you FOR ONLY $16.38 $13.9/page Hire Writer For a better understanding of the details of risk management problems that engulfed Northern Rock plc, it is of vital importance to first and foremost take a look at the financial environment during the period of the loss. Real GDP growth projections as of 4 April 2007 Country/Region| 2006| 2007| 2008| United States| 3,25| 2,25| 2,5| Western Europe| 2,75| 2,5| 2,25| United Kingdom| 2,75| 2,75| 2,5| Other West Europe| 3,75| 3| 2,75| Euro area| 2,75| 2,5| 2| Emerging markets| 7,25| 6,5| 6,25| World(WEO weights)| 5,25| 4,25| 4,25| In August of 2007, the UK found itself affected by global financial chaos. Citing bank Credit Europe (2007), the liquidity crisis originated from the US subprime mortgage market. In mainland Europe, the crisis is believed to have been triggered when French based bank BNP Paribas suspended three of its investment funds that were exposed to the US markets that traded toxic assets, as reported by BBC News on 9 August 2007. As a result, share prices plummeted and banks would not continue lending to each other. So, all major central banks around the world started injecting liquidity into their domestic markets in similar attempts. The European Central Bank sought to calm the tide by reportedly pumping $130 billion in the European banking system. It sought to satisfy Eurozone liquidity demands as fast as possible, unlike the Bank of England who left UK banks claims for liquidity unsettled. The Bank of England did not follow suit and took no contingency measures in order to protect against moral hazard. Their rationalisation was that an injection would induce banks to take on more liquidity risk, resting sound knowing that the Bank of England would find a way to save them. Injecting money into economy to prevent crisis have two major risks, first one is slowing growth too much in case of trying to avoid issuing new money, and second one is that inflation pressures will rise in case of issuing too much , at the end even with a greater slowdown. Due to these risks, the bank of England did not inject money into the UK financial system. Also, behind the economic environment a large effect on any business has the political environment. Its effects are even greater during a period of critical time in financial systems where trust and confidence is very significant. In the UK for example, the financial system is regulated by the Tripartite system: the Bank of England, the Financial Services Authority and the Treasury. According to Aldrick (2007), although their roles are clear, there was no overarching authority when the crisis struck, which meant that everyone was pointing fingers around, but nobody was able to take the large chunk of responsibility for reactionary measures. In retrospect, how come Northern Rock, out of all of the UK’s financial institutions, proved to be the weakest link? Why had the credit crunch affected it in such drastic fashion? Was it a victim of its own doing or were other external forces involved in the bank run? We aim to answer these questions under following headings. Causes and circumstances of incurred losses According to ex-Unilever, British Gas and KPMG manager Mike Barnato, risk is the antagonist of opportunity. No ships would ever leave port if captains wanted to avoid risks associated with sea travel. Therefore, risk must be managed in order to achieve objectives at all levels: private, corporate, state. However, the old-fashioned approach to risk management such as detect risk, measure probability, gauge effect, and identify reactions, habitually disregards broader people and strategic matters. As stated by the Financial Services Authority, liquidity risk is defined as â€Å"the risk that a firm, although balance-sheet solvent, cannot maintain or generate sufficient cash resources to meet its payment obligations in full as they fall due, or can only do so at materially disadvantageous terms. † Originally established as a building society, Northern Rock demutualised in October of 1997 and became a plc. The banks consolidated balance sheet grew no less than sixfold, as a result of a complete overhaul in its corporate strategy. According to the Treasury Committee Report (2008), CEO Mr Adam Applegarth claimed that Northern Rocks assets increase by 20% plus or minus 5% for the last 17 years. Sustainability for the high growth of assets was to come from a restructuring of its liabilities. The year 1999 marked the beginning of the so-called originate and distribute model, which involved originating or purchasing loans and transferring them to SPVs (Special Purpose Vehicle), which in turn package these loans into collateralised debt obligations (CDOs) to sell to third party investors. Approximately 50% of Northern Rocks funding (coming from securitised notes) was provided by SPV Granite, registered in Jersey. The constantly growing funding need was due to be met by means of securitising bonds using a LLP (Limited Liability Partnership), which allowed the bank to continue holding its assets and issue asset-backed securities on their basis. This was a lucrative and quite secure deal for investors. As wholesale funding dramatically increased, the proportion of retail deposits as means of funding gradually decreased, by 2006 totalling 22. 4% of total equity and liabilities as opposed to no less than 62% in 1997. It is a widely acclaimed fact that the Northern Rock crisis was caused by an verly aggressive business model, which relied mainly on wholesale market funding, rather than its own deposits. Rapid growth was understandable, because funding from deposits would nowhere near be as potentially high as wholesale funding. Nevertheless, this reliance exposed the bank to an imminent liquidity risk. UK money markets were bound to be hit by a liquidity crisis, following tension in the US as the F eds interest rate was all over the place. The first half of 2007 saw mortgage lending go up by 31% compared to the same period of 2006. Northern Rocks loan book quality was a clear sight for sore eyes, as lending quality drastically decreased. The bank was giving away mortgages left and right to customers whose credit worthiness was shady to say the least. It is no surprise that many similarities can be drawn between Northern Rocks business model and the business model of US mortgage lenders. However, surprising is the fact that Northern Rocks management apparently did not attempt to manage the obvious liquidity and operational risks having examples of mortgage lenders over the Atlantic that were clearly pushing the envelope. According to the Treasury Committee Report (2008), on 9 August 2007 it became crystal clear that Northern Rock would face severe problems if the money markets continued to be frozen as they were. It was on that day that the banks traders noted a dislocation in the market for its funding. This was the effect of a global financial system shock triggered by the US subprime mortgage market. While this shock was originally credit based and it did not directly expose Northern Rock to the dreaded liquidity risk, its effects questioned the value of asset-backed securities and related products held by large financial institutions around the world. Overall market liquidity was very shaky due to the fact that holders of asset-backed securities did not have information regarding loan quality and default rates, to which originators of these securities did have access, so the funding of these financial instruments became problematic. As Northern Rock was running low on cash since its last securitisation in May and another one was due in September at the earliest, the liquidity freeze hit the bank with disastrously poor timing. Even so, better timing would not have saved it from trouble, due to the prolonged duration of this drying up of money markets. Northern Rocks business model was unique in the sense that the central part of its business strategy was securitisation. The bank relied heavily on short-term funds, while as most banks opt for marginal securitisation of assets. In addition, a property of this aggressive model is that it exposes a bank to the so-called LPHI risk (low probability-high impact). In essence, the low probability is derived from the fact that the drying up of money and capital markets on a large scale is improbable. The high impact relates to the almost exclusive reliance on high liquidity for the bank to be able to fund its operations. According to David Llewellyn, citing his work The Northern Rock Crisis: A Multi-dimensional Problem, in the context of Northern Rock, the LPHI risk is composed of three micro risks: a) the risk of the bank being unable to re-receive funds that reached maturity, (b) the risk of being unable to securitise the planned mortgages, (c) the cost of funding would rise relative to the mortgage loans it kept on its balance sheet. A pivotal role in the subsequent events linked to Northern Rocks failure was the run on deposits which equalled about ? billion, dubbed The run on the Rock by the media, which took place from Friday 14 September to Monday 17 September. Once the run had begun, two factors kept its momentum: a) depositors were becoming more and more aware of the fact that Northern Rock would cease to be a going concern, were the run to continue; (b) deposits above ? 2,000 were not guaranteed in full to customers, which dramatically increased the awareness of a large amount of depositors that previously were not in touch with the shocking scale of their potential losses. As a result, the Bank of England had to implement an immediate emergency facility programme for the bank, which was previously considered as a backstop, rather than a reactionary safety net. Naturally, customers acted completely rationally and logically seeking to save their deposits by joining in on the run having heard about the distress of their bank on the news. This psychological factor shifted the issue from being one of the Northern Rock customers to a rather large scale crisis that affected any persons belief in the banking system. As a result, the following months saw the Government discussing takeover offers from various companies, notably Virgin Group, Olivant, JC Flowers, Lloyds TSB. However, according to an announcement by Northern Rock, all the bids were rejected, because they were materially below the previous trading value. As such, according to Elliot, Seager and Inman (2007), the Government arranged an emergency legislation to nationalise the bank, in the event that takeover bids fail. On 17 February 2008, following unsuccessful bids to take over Northern Rock, Mr Alistair Darling, the Chancellor of the Exchequer, announced that the bank was to be nationalised, as mentioned by BBC (2008). Errors by the organisation â€Å"Northern Rocks risk management framework is designed to maintain and continually improve the established processes and tools for the identification, assessment, control and monitoring of existing and future risks. Northern Rocks approach provides a mechanism for the active identification, assessment and communication of risks throughout the business†. Northern Rock Community Report (2006) We will soon come to prove that the above statement is completely false. First and foremost, it must be noted that the Board and management team of Northern Rock rightfully took a large chunk of blame for their irresponsible and incompetent actions. In the chase for rapid growth and profits through securitisation, they clearly missed out on a basic principle of risk management which is the diversification (spreading) of risk. While Northern Rocks management and Board clearly placed all of their eggs in one basket, it was obvious that should an improbable (although completely unavoidable) liquidity shock hit the UK markets, theyd be in head spinning trouble. The bank had a proper approach to risk management. It covered liquidity, credit, operational and market risk, which were described in detail in its filing for the US Securities and Exchange Commission. Northern Rocks assets were looking strong, therefore credit risk was insignificant. In terms of market risk, FOREX and interest rate fluctuation exposures were managed properly Nonetheless, its management clearly did not take into consideration the fact that if the access to short-term funding was impeded, it would end up facing a huge liquidity crisis. Therefore, as the US sub-prime mortgage crisis (mortgage backed securities were the meat of Northern Rocks funding) unravelled, the bank became exposed to liquidity risk. In addition, the management apparently did not have a plan B to funds its activities in case the money markets dried up – an operational risk. The Tripartite authorities might be frowned up as being short-sighted in respect to the Northern Rock case. However, the banks CEO, Mr Applegarth, and his Board are the ones responsible of failure to identify the risks associated with their aggressive and reckless business model, or for being foolish enough to indeed identify the risks, but deciding to ignore them, in hopes that bad luck would strike elsewhere. The need to balance risk appetite and return is a basic business principle, however risk must be managed consciously, continuously and actively. Steve Boyle, in his article Avoiding the next Northern Rock goes so say that it is important to note that although the contemporary business model (coupled with legal frameworks and regulators) encourages companies to ignore inconvenient truths, ultimately the companies themselves are to blame for their failure to handle their risk appetite. It is surprising to find out that CEO Mr Applegarth did not respond to the Bank of Englands interest rate increase in any reasonable way. Liquidity conditions were tightening up on a global scale for a fair amount of time and although these were not drastic enough to raise a panic, the bare minimum questions How are we prepared for this? Are we at all prepared? should have been raised. Despite obvious indicators of an unstable interest rate environment, Northern Rock continued giving out mortgages for 125% of house valuation, paying little to no respect to risk management. Did Mr Adam Applegarth even want to see the impending funding shrinkage? Probably, by sitting down and giving it an objective though he would spot the effect of rising interest rates on the UK financial markets. As stated in the Treasury Committee Report (2008), Northern Rock’s continued expansionary lending policy required the continued success of its funding strategy at a time when there were indications of potential problems on the funding side. Although the Bank of England was keen to identify the potential risk of wholesale funding for banks should the money markets lose its liquidity, the managers at Northern Rock did not heed this warning. The reliance on short and medium term funding was not met with any kind of standby facility, leaving liquidity risk completely uninsured. This high risk, reckless strategy was formulated by the Board and overseen by long serving directors. Yet, it was not met with any kind of restraining from the Chairman of the Board, Chairman of the Risk Committee, internal audit staff, which is at the very least surprising. In reality, the Board and management kept ploughing at their reckless business model, believing that standby facilities are a waste of money. Errors by internal and external supervising authorities The internal authorities One cannot detach internal control from corporate governance, because it is the Boards responsibility to monitor significant risks and to ensure that internal controls are effectively involved in their proper evaluation and handling, but most importantly the Board must always induce internal controls to be cautious while dealing with risk because of their ever elusive nature. It is quite a possibility that Northern Rocks internal controls were not up to par and were giving out the rest of the company completely the wrong message. As stated in an article on cimaglobal. com, Northern Rocks filings to the SEC give the impression that its main concern was regulatory conformance, rather than its overall control environment. According to the Treasury Committee Report (2008), part of the oversight of the liquidity strategy of Northern Rock was conducted by its Risk Committee, chaired at the time by Sir Derek Wanless, a non-executive member of the Board of Northern Rock. Sir Derek Wanless is reported to have said that the Risk Committee looked at the issues of [their] funding strategy and what the risks were†. He went on to defend the role of the Board and the Risk Committee, telling the Treasury Committee that â€Å"The Risk Committee and the Board did [their] job, in my view, properly through this period. The external authorities The external regulation of Northern Rock plc was conducted by the Financial Services Authority spanning from 2005 to 2007. Its handling of the events of August-September 2007 received wide criticism. In the following paragraphs we aim to describe the poor regulation of Northern Rock that went hand in hand with mismanagement that ultimately led to its collapse. Citing the Treasury Committee Report (2008) on Northern Rocks failure entitled The run on the Rock, London School of Economics Professor Willem H. Buiter was found stating that â€Å"The FSA did not properly supervise Northern Rock. It failed to recognise the risk attached to Northern Rock’s funding model. Stress testing was inadequate. † According to an IMF working paper, a stress test is termed as the revaluation of a portfolio using different sets of assumptions, the goal of which is to assess the sensitivity of the portfolio to changes in various risk factors. It is curious to find out that while the FSA had been highly unsatisfied with Northern Rocks stress testing procedures; it did not notify the banks management team to immediately adjust these procedures. In addition, while the Board did continue to conduct stress testing, their methods were inadequate and the Financial Services Authority failed in its duty to guide the Board towards ensuring that the bank was ready to handle a market shock. A prime indicator of running a big risk financial plan is rapid expansion. The FSA had acknowledged obvious red flags concerning the banks rapid market share expansion, as well as decreases in share price from February 2007 which translated into Northern Rocks extremely risky business model. Yet, the regulator merely underwent into a greater regulatory engagement, which pretty much failed to target the root weakness – the funding model. As mentioned by the Chancellor of the Exchequer quoted in the Treasury Committee Report (2008), the FSA did not deem liquidity regulation as important as solvency regulation. It brings up the question whether the FSA is actually competent of handling liquidity related shocks at all. We believe that this was a substantial failure in regulation, which eventually no less than fuelled the forthcoming chain of events. An increase of 30. 3% of Northern Rocks interim dividend was made public on 25 July 2007. This was the result of, as CEO Mr Adam Applegarth put it when you get your Basel II approval, the relative risk weighting of certain assets in your balance sheet changes [†¦] our risk weighting for residential mortgages came down from 50% to 15%, which clearly requires less capital behind it, which explains the increased dividend. Unfortunately, we are of the same opinion as the Treasury Committee Report (2008), which notes that this approval came at the most untimely moments. In doing so, the FSA allowed Northern Rock to singlehandedly weaken their own balance sheet at a time when the FSA was itself battling liquidity problems in the financial sector. The support operation announcement by the Tripartite authorities was apparently to be treated with great delicacy, because they were aware that it might have the complete opposite effect than calming the depositors. We, the authors, believe that the authorities acted extremely rashly in the whole process of stating the Government guarantee of supporting Northern Rock through its crisis. They failed to plan the announcement prior to 16 September 2007. It is also worrisome that the announcement was not made before the markets opened the following day. This led to a delay in the guarantee until the evening of the fourth day after the run started, which made the bank run even more prolonged and severely damaged the already whimpering health of the bank. Yet another area of concern is that the Financial Services Authority completely overlooked the fact that Northern Rocks CEO was not a qualified banker, albeit he possessed significant work experience. Mr Adam Applegarth did not have any training qualification and as such, this absence ought to raise major question marks. To sum up, Northern Rocks failure was not entirely the fault of its management; it was also the fault of its regulator, the Financial Services Authority. Evidently, sufficient resources were not assigned to the watching of a banks business model that was so obviously screaming Look at me! Moreover, the FSA did not seem to give the air of confidence of a supervising authority that knew how to handle a particular financial institution rather than targeting an aggregate group. Effects on other commercial organisations It was on the 9th of August when the world changed. Adam Applegarth, Northern Rock plc CEO The effect of Northern Rock crisis spread shockwaves all around the financial markets and most importantly to the UK, adding an unexpected swing to an already unstable financial situation that could go from bad to worse in an instant. As said before, on 9 August 2007 money markets froze and the short-term funding that Northern Rock so heavily relied upon (it made up roughly 60% of the right side of its balance sheet) squeezed considerably. The Northern Rock crisis was a signal which raised awareness of other banks with a similarly risky business model on upcoming problems and showed the need to concentrate on actively managing liquidity and operational risk. In the midst of the crisis, it was evident that banks became reluctant to ask the Bank of England for liquidity facilities, because it might have been treated as Northern Rock clones. Furthermore, such facilities were obviously not going to be offered in a confidential manner. Even if the Bank of England did keep things hushed, word would spread anyway and a simple case of extra liquidity claim would cause devastating panic. The Newcastle-upon-Tyne based bank was the first of its kind, the first in a notable list of banks that were nationalised during the crisis that took the United Kingdom by storm. Next on the list came Bradford and Bingley, Heritable Bank and Kaupthing Edge which were all also nationalised. The nationalisation of Northern Rock increased national debt by an additional ? 00 billion, which was due to be settled by no later than June-July of 2010. In addition, The Bank of England pledged to pay off Northern Rocks debts consisting of the following: * loans (approximately ? 25 billion ) * guarantees (approximately ? 30  billion) * value of company (approximately ? 1 billion) Another consequence of this failure was that Northern Rock was responsible for about one fifth of all mortgage business. With its collapse and also in close cooperation with the overall mortgage crisis, it struck individuals at the heart of their fears – uncertainty. At least 2,000 employees were dismissed as a result of the collapse, even if Alan Clarke, Chief Executive of the Development Agency stated that there was a demand in qualified Northern Rock bank workers and that there was a big chance of a slight increase in unemployment level. Also, hedge funds and investment banks were also affected, workers seeing their spending power reduced by lower bonuses, or even curtailed by job losses. Finally, the cuts are a blow for job prospects in north-east England where Northern Rock was one of the biggest employers. Lloyds TSB was keen on helping Northern Rock reduce the size of its balance sheet, in a deal that would allow some Northern Rock customers to receive new mortgages at the end of their fixed-rates. A Forbes article (2008) mentions that customers would be exempt from the standard lenders application fee and Lloyds would pay a commission fee to Northern Rock for every successful mortgage deal (the maximum loan-to-value ratio being 80%). As such, Lloyds took advantage of the Newcastle based banks troubles in a lucrative deal for more or less both parties. The case of Northern Rock revealed a problem with the FSAs handling of liquidity based crises. A new assembly of supervisors to review supervision of high impact firms such as Northern Rock was employed. In addition, staffing and training increased to not allow such incidents to affect public opinion so drastically, because a portion of it was clearly unsatisfied with the FSAs role in the debacle. As suggested by internal auditors, high-impact firms would be reviewed annually and their performance checked every six months. Furthermore, the Financial Services Authority would concentrate a larger part of its time and effort to be prepared to react to future liquidity shocks. On 24 May 2008 Legal amp; General, SRM Global, RAB Capital and the Shareholders Action Group (150,000 of the banks small investors) joined forces in the legal action against the Government after the nationalisation announcement. As written by Sean Farrell for the Independent (2008), shareholders believe that the Bank of England rigged the process for compensating Northern Rocks investors, because a sovereign valuator must accept that the bank was not a going concern. Lamp;G wished to see to that share valuation would be conducted on an impartial basis, without the dogmatic conventions enforced by the Treasury. According to Simon Evans (2008), at the end of July 2008 the valuation of Northern Rock would be delegated to 2 of 10 firms that applied, in spite of threats of legal repercussions. Monaco based hedge fund SRM Global stated that a negligence case of high stature would be opened on anyone that would partake in the role of valuing the poisoned chalice, considering that the hedge fund owned shares in value of 11% at Northern Rock before its nationalisation. Unsurprisingly, few forms expressed their interest in the valuation process, because the Treasury had imposed a number of restrictions for potential valuators. Northern Rock was a just a drop in the ocean of the financial peril that followed. The difficulty for the financial markets and ordinary people was that at that point nobody knew where thunder would strike next and who would be its next victim. Conclusions At present, business at Northern Rock plc is looking quite optimistic. It is known that the restructuring of the bank and the overhaul of the boardroom paved the road for a future re-entry into the commercial banking sector with a new formula for success. Also, a new debt reduction strategy was adopted, with the bank repaying its loans well ahead of maturity, with a little under ? 9 billion remaining to be paid as at 9 March 2009. Based on the above discussion, several key lessons can be learned such as that companies ought to move beyond box ticking by sacrificing performance for conformance. Also, risk management is absolutely essential to undertake in todays constantly changing financial environment where anything can happen at any time. As for the institutions delegated to supervise, we would like to stress a few recommendations: * liquidity assistance arrangements must be timely and inspire confidence * external supervisors such as the FSA must have a solid plan of corrective action * legal framework must exist in order to prevent the collapse of a bank that is enduring troubles with departments or functions of systemic importance

Thursday, March 5, 2020

Analysis of a Public Firm GoPro Essays

Analysis of a Public Firm GoPro Essays Analysis of a Public Firm GoPro Paper Analysis of a Public Firm GoPro Paper Capitalizing on traditional advertising, content marketing and social media, GOP built a ritualistic fan base in sports enthusiasts, professional athletes, and media production professionals. Goops professional line of wearable and mountable cameras are now becoming the most used camera in the market today, making it one of the most innovative and successful cameras in the world. An evaluation of the companys internal strengths, weaknesses, opportunities and threats paints a nice picture of where GOP is and where GOP could be at as a company. Some of the greatest design features of the GOP are the size, durability, and recitalist of the camera and the outer protective casing enabling it to be worn and carried virtually anywhere. GOP focuses on outperforming its competition while at the same time capitalizing on the quality of their product. Goops advertising and brand promotion has successfully targeted and acquired professional attention from a multitude of industry leaders. However, these past marketing strategies left a large portion of the average consumer Feb. ND. With timing being the essence of success, GOP recently filed for and initial public offering set in the second quarter of 2014. The timing of this PIP creates a crucial opportunity to transition the average consumer into a GOP user and acquire more market share. New advertising messages and integrated brand promotions will be utilized to target the travel, leisure and recreation sectors. External Environment A. Market Analysis Goops past marketing efforts have identified two solid markets. The primary market is active adults ages be;en 21 and 45 and a secondary market of teens and young adults between ages 12 and 18. Along with this age segmentation GOP has also focused its marketing towards consumers who re into extreme sport lifestyle. Additionally GOP targets consumers who tend to take two or three vacations a year. These active consumers tend to love travel, willing to document their goals, aspirations, travels and hobbies over social media. GOP loves this demographic because they seem to be easy decision-makers, brand loyal and favor quality over price. The third group which is young adults between ages 18 and 21 tend to travel with their friends on short social outings and trips that fit their hobbies and interests. This group is the highest group of social media users. This group spends on average of 29 or more hours per week online distributing and consuming media. B. Competitive Analysis Goops main competitors are Sony, Contour, and Camembert. GOP make! Up 84% of the action camera market share, following next is Sony with 7%, then Contour with 8 and Camembert with 1%. Sony is a viable competitor because its unmatched image quality. Other competitors closely match Goops design, mounting and protection of the camera. Other competitors such as the Contour feature laser alignment and GAPS tracking. These feature: are key in developing professional quality videos. The GAPS feature lets users rack and remember where videos were taken. Still GOP dominates the market because they are the most well know brand and are leading the edge of portable action cameras. GOP has a global industry scope. More than half Of all GOP sales are outside of the US. The outlook for action sports cameras in my opinion will not go out of style anytime soon and is an attractive fad for young adults. Internal Environment A. Company Profile I. History In 2002, Nicholas Woodman created the idea of the wearable camera. The evolution occurred when the camera was moved from the writs to an apparatus that can be attached to any device. GOP became the first company that solved the issue of how do you captured images and video when people are in their moments Of excitement where it is just too inconvenient to hold the camera. The key feature of GOP systems would be the outer protective shell which- has the ability to rotate upon itself, creating a durable camera that is water and shock proof and can be mounted to anything. The evolution enabled people around the world to state document their everyday lives. From sports to scientific research these innovative cameras captured it all. Ii. Employment GOP employs hundreds of people. GOP looks for independent, creative thinkers to join their team. GOP employs people in many different sectors. From firmware and hardware development to finance, legal and marketing. Go pro has a job for you. Locations of employment include San Mateo and San Francisco California, New York City, Munich Germany, Sheehan China, Hong Kong and Amsterdam Netherlands. Ii. Product Lines The first GOP was introduced to the market in 2004. The GOP camera has evolved from HAD Hero to HAD Hero 4. The new HAD Hero 4 includes key features such as ultra-high definition resolution, shooting PM photos at 30 frames per second. Goops feature super wide angle lenses that operate at extreme low lighting conditions. All Goops are light weight and are versatile and customizable. The editing software included is a powerful enough to handle your toughest footage. Iv. Quality GOP Quality is second to none.

Tuesday, February 18, 2020

Research methods Essay Example | Topics and Well Written Essays - 2500 words

Research methods - Essay Example Contextually, enhancing and preserving customer loyalty is considered to be the key objective of CRM initiatives performed by modern day organisations, which is deeply rooted to the concept of relationship marketing. The objective of relationship marketing is to convert new customers into regular one through providing greater service quality that would generate greater sales and profits. Such an initiative can be observed apparently in the service industry, such as in the hospitality industry (Schneider & White, 2004). One of the major reasons for customer loyalty is delivering services of qualitative standards that could increase the proportion of loyal customers of the organization to a considerable extent (Arvato AG, 2013; Brink & Berndt, 2008). Another major factor identified in the modern day context of CRM initiatives adopted by hospitality organisations is service quality. Service quality, as a conceptual term, relates with the notion to provide services with due consideration to customer satisfaction by meeting their expectations with increased performances of employees (Khosrow-Pour, 2003). Emphasising on the relation between the concepts of customer loyalty, CRM and service quality, the research problem has been framed for this study. To be precise, the research problem to be considered in this study will focus on the impact of customer loyalty and service quality in 5 Star hotels in Thailand with relation to CRM initiatives taken by the hospitality organisations. 2.0. Literature and Secondary Data Many research studies have been conducted emphasising on the concepts of service quality and customer loyalty and their relationship. As stated by Rousan & et. al. (2010), customer loyalty occurs when repeated purchase in performed by the same customers. Furthermore, the willingness for loyal customers to render product/service recommendations irrespective of outright benefits and repeated usages play a vital role in generating positive and quantifiable res ults for the marketers over the long run. The economic benefits of customer loyalty can be identified as improvement in the retention of employees as well as in terms of the increasing market shares of the particular brand. It can be thus stated that customer loyalty is not simply swayed by inducing the prices from competitors but also by offering better quality services to the targeted customers in comparison to the major contemporaries of the business. It is worth mentioning in this context that a positive relationship is apparently witnessed between the two aspects of service quality and service loyalty (Rousan & et. al., 2010). As can be observed from Rousan & et. al. (2010), service quality deliverance capability of an organisation can be effectively identified with due significance to the behavioural results particularly in form of complaints registered by the customers, probability of effective word of mouth promotion spontaneously by the targeted customers, switching costs a nd frequency depicted in customers purchasing behaviour as well as the intention of the customers to recommend further alterations for the enhancement of the services delivered. Contextually, it can also be stated that methods of service quality assists practitioners in managing the delivery of quality services effectively

Monday, February 3, 2020

Tucson Community Profile Assignment Example | Topics and Well Written Essays - 1000 words

Tucson Community Profile - Assignment Example Investigation, development, along with production within A & D forms the key economic facets for Tucson. Also, Tucson community is positioned amongst the best five within the country in this sector. Also, Tucson economy comprises of aerospace-related companies, manufacturing ultra-modern fields, production, distribution, along with warehousing and business aviation repairs. Davis-Monahan Military Base as well is a noteworthy component of Tucson society and the primary driver of growth of Tucson since 1950. It generates over one billion US dollars in the financial system per annum (Luckingham, 2015). Furthermore, Raytheon Missile facilities are the leading NGO industries within Tucson, having in excess of 10,800 workers. Likewise, historically, Tucson has been a junction for traders within Southwest area as well as the main center for shipping as well as logistics till presently. Additionally, Tucson’s closeness towards Mexico State, its position at crossroads of Pacific Railwa y Major Line, 2-11 as well as 2-20, along with Tucson Global Airdrome offer ease plus swiftness for delivery of products. Numerous companies, comprising of Target as well as HomeGoods, have decided to position center of distribution in Tucson (Luckingham, 2015). Fascinating Attractions Tucson provides a fascinating array of sceneries in addition to attractions. Local attractions comprise of the National Parks of Saguaro (both Eastern as well as a Western side), the planets celebrated Desert of Arizona-Sonora Museum and Sabina Gorge.

Sunday, January 26, 2020

Climate Change Impact On Sub Saharan Africa Environmental Sciences Essay

Climate Change Impact On Sub Saharan Africa Environmental Sciences Essay The vulnerability to climate change is considered to be high in developing countries due to social, economic and environmental conditions that amplify susceptibility to negative impacts and contribute to low capacity to cope with and adapt to climate hazards. In addition, projected impacts of climate change generally are more adverse for low latitudes, where most developing countries are located, than for higher latitudes. The developing countries face many challenges poverty, a high disease burden, rapid population growth, food insecurity, and limited water access. Climate change is likely to drive the majority of the population into destitution, as assets are lost and resources are diverted to deal with emergencies, instead of being used for development. Historically, the earth has experienced periods of cooling and warming, with mean temperatures remaining relatively stable. These changes were due to the energy balance between land, sea and atmosphere. However, human activities s uch as burning fossil fuels and deforestation have contributed to the increase in greenhouse gases (GHG) in the atmosphere. These trap much of the heat that would otherwise escape from the earth, leading to a generally warmer world. An agricultural expansion seems unlikely and increases in agricultural productivity are needed in order to avoid additional people being forced into poverty and hunger (Cline 2007). Current climate hazards and the impacts of projected climate change threaten human development (African Development Bank et al, 2003). Climate is linked to all the Millennium Development Goals, but is most directly relevant to the goals to eradicate extreme poverty and hunger, reduce child mortality, combat disease, and ensure environmental sustainability (Martin-Hurtado et al, 2002). Agriculture, which is highly sensitive to climate and which is projected to be negatively impacted by climate change in much of the tropics and sub-tropics, is the direct or indirect source of livelihood for about two-thirds of the population of developing countries and is a substantial contributor to their national incomes. About 70% of the worlds poor live in rural areas. Management of climate hazards and climate change impacts in the agriculture sector and rural communities will be critical for success. Climate change threatens the basic elements of life for people around the world access to water, food, health, and use of land and the environment. The vulnerability of people to food insecurity, which accompanies poverty, is increased due to the degradation of the natural environment and the products (e.g. fruits, fish, water and range-fed livestock) and services (e.g. regulating climate) that it provides (Biggs et. al., 2004). Degradation is due to a number of trends including climate change, soil erosion, the conversion of ecosystems into croplands, overgrazing and urban expansion, among other factors (Biggs et. al., 2004). Climate change poses a serious threat to ecosystems in the developing countries in both the medium and long term. Increases in temperature will lead, not only to an increase in the frequency of extreme events, but also to severe degradation of biodiversity and the loss of water resources that are already scarce (Biggs et. al., 2004). Sub-Saharan Africa is the region most vulnerable to the impacts of change because of widespread poverty and low levels of technical development which limits adaptation capabilities. There is considerable evidence that climate change is already affecting Africas people and its environment to the greater extend than any other region of the world in terms of their livelihoods (Lindsay, et al 2009). The impacts of climate change are predicted to affect the livelihoods of most people in developing countries and most especially in Africa in many ways. By 2020, between 75 and 250 million people are predicted to be exposed to increased water stress due to climate change. By 2020, yields from rain-fed agriculture in some countries could be reduced by up to 50 percent, increasing food insecurity and hunger. By 2080, an increase of 5 to 8 percent of arid and semi-arid land in Africa is projected. Climate change is likely to affect the distribution patterns of infectious diseases; for example, there is likely to be an increase in mosquitoes which spread dengue and yellow fever. Sea levels are projected to rise by around 25cm by 2050; Africas coastal areas are already experiencing environmental problems including coastal erosion, flooding and subsidence. (Said Kolawole et al 2009). Alessandra Giannini, et al, 2008, reviews the evidence that connects drought and desertification in the Sahel with climate change past, present and future in the sub-region. Their study concludes that there is a correlation between the desertification and climate change in the Sahel region of Africa. The African Sahel provides the most dramatic example of multi-decadal climate variability that has been quantitatively and directly measured. Annual rainfall across this region fell by between 20 and 30 per cent between the decades leading up to political independence for the Sahelian nations (1930s to 1950s) and the decades since (1970s to 1990s). Lindsay, et al 2009, further throws more light on the impacts of climate change, drought and desertification and how they are closely interlinked, and most acutely experienced by populations whose livelihoods depend principally on natural resources. Their paper examines three interlinked drivers of adaptation; climate change, desertification and drought, assessing the extent to which international and national policy supports local adaptive strategies. 2. Problem Statement The unimpeded growth of greenhouse gas emissions is raising the earths temperature. The consequences include melting glaciers, more precipitation, more and more extreme weather events, and shifting seasons. The accelerating pace of climate change, combined with global population and income growth, threatens food security everywhere. Agriculture is extremely vulnerable to climate change. Higher temperatures eventually reduce yields of desirable crops while encouraging weed and pest proliferation. Changes in precipitation patterns increase the likelihood of short-run crop failures and long-run production declines. Although there will be gains in some crops in some regions of the world, the overall impacts of climate change on agriculture are expected to be negative, threatening global food security. Populations in the developing world, which are already vulnerable and food insecure, are likely to be the most seriously affected. In 2005, nearly half of the economically active population in developing countries-2.5 billion people-relied on agriculture for its livelihood. Today, 75 percent of the worlds poor live in rural areas. (Gerald C. et al 2009). Climate change issues require multiple stakeholders, global challenges and social sustainability issues. This is because there are varying debates on the causes, impacts of climate, adaptation and mitigation issues when identifying sustainable solutions on the topic. The presence of significant uncertainties has led researchers to emphasize the analysis of regional and national effects (Mendelsohn Dinar, 2004). The issue of climate change is without doubt important for developing countries with an agrarian economy and very difficult to apprehend easily as it is multi- faceted in approach. The topic is very complex, transnational in nature and integrated in perspective and approach. The linkage of social impact of climate change in the developing countries have not been well researched and most especially in connection with Sub Saharan Africa and non-Sub-Sahara Africa (NSSA) countries. Climate Change has several livelihood impacts in developing countries as it reduces yields, household incomes, health issues, environmental problems and the vulnerability of the disadvantages in rural communities. 3. Hypothesis The socio-economic impact of climate change is much more likely to affect Sub-Saharan Africa (SSA) than non-Sub-Sahara Africa (NSSA) countries and socio-economic dimension of adaptation respectively. 4. Overall Objective To undertake a comparative studies on the socio-economic impact of climate change and their socio- economic dimensions of adaptation in Sub-Saharan Africa (SSA) and non-Sub-Sahara Africa (NSSA) countries. 5. Empirical Research Questions 1. To review literature on the socio-economic impacts of climate change in the developing countries. 2. To identify the linkages between Sub-Saharan Africa (SSA) and non-Sub-Sahara Africa (NSSA) countries in terms of climate change socio-economic impacts. 3. To analyse the socio-economic dimensions of adaptation in these countries, taking into account, pro-poor adaptation, microfinance, safety net, new technologies, index insurance and livelihoods. 6. Theoretical and Conceptual Issues A substantial amount of research has been conducted on the potential effects of climate on agricultural productivity (Parry, 1990; Leemans Solomon, 1993). Some studies have used climate induced changes in crop yield to estimate potential global economic impacts (Kane et al., 1992), while others have examined the indirect impact on economic variables such as farm revenue and income (Lang, 2001; Molua, 2003). Schimmelpfennig et al. (1996) present a simple taxonomy that classifies the method of analysis as either structural (Adams et al., 1990, 1995, 1998) or spatial analogue (Darwin et al., 1999; Kurukulasuriya Ajwad, 2007). This study would employ some institutional economics theories and the sustainable livelihoods framework analysis in doing the comparative studies. 7. Methodology The study would make use of quantitative and qualitative reviews of literature from secondary sources and data already collected from the various regions and undertake the comparative review and analysis. The study would as well make use of participatory rural appraisal methods when visiting the field for data collection to get first hand information on the impacts of climate change and adaptation in the various regions. Quantitative analysis and econometrics methods would be applied in this study as well. Data analysis would as well be made with reference to the research problems and objectives. Data collected would be classified after the collection process and Statistical Package for the Social Science (SPSS) would be used to analyse all the data collected in the field.