Wednesday, August 26, 2020
Motivating and Leading Borders
Question: Compose a paper onMotivating and driving across fringes: overseeing groups and decent variety. Answer: Inspiration is utilized to portray the procedure that can trigger an individual with the goal that the person in question can at present remain concentrated on the errand ahead. At the end of the day, inspiration can be utilized to characterize the components that keep an individual keen on going on with a specific undertaking or assignment. These elements go broadly from social, natural to enthusiastic and subjective powers which influence how an individual demonstrations. There are various hypotheses that have been suggested that clarifies the different parts of inspiration, for example, Maslows Needs Hierarchy Theory. In a differentiated society, there are a great deal of administration abilities and coordination is required to keep the individuals propelled. An expanded group can comprise of individuals from various nationalities. For this situation, the pioneer ought to have the option to manage every part successfully. The comprehension of a diverse society will assist the pion eer with deciding on the compelling way to deal with use in driving the organization.Managing groups in an association include planning the endeavors of all in people in an association so at to accomplish the set objectives. An all around oversaw group is constantly inspired and such the association will be bound for progress. A propelled group will perform better than a demotivated group. In any case, keeping up a group is additionally of incredible worry since on the off chance that a created group isn't very much overseen, at that point the group may self-destruct and this will greatly affect the group. In this manner, it is the obligation of the group head to get their group and skill well to oversee it. A successful pioneer ought to comprehend the abilities of his group. The pioneer ought to likewise get their authority abilities and accurately execute them for the achievement of the association. The pioneer must have the option to comprehend the assorted variety that exists in their group and arranges it for better performance.Diversity might be characterized as the distinction that exists among people that are, characteristics in a given gathering of person that are absent in another gathering. Assorted variety might be because of various to age, race and so on. Assorted variety greatly affects a people execution, and how she or he will be roused while associating with others. The assorted variety in a group can be of extraordinary assistance to an association and as such a pioneer ought to have the option to misuse it. This report, in this way, will talk about a portion of the administration issues and difficulties in a multifaceted domain that are, an enhanced situation and how well to propel individuals in such a situation in this way, that they may utilize their capacities and contrasts to arrive at their latent capacity. The report will likewise portray the importance of work and depict a portion of the methodologies that can be utilized to rouse p eople in a given association. Furthermore, the report will depict the necessities chain of command; this is one of the speculations that are utilized to portray methods of keeping an individual roused. It will likewise examine initiative in a differentiated society. Additionally, the sorts of authority will be talked about. The fluctuation in the way of life and how pioneers can utilize such contrasts for the improvement of the association are talked about. When all is said in done, the report depicts viable administration in a broadened domain and the difficulties related with dealing with a differentiated society (Mitchell, Boyle, Parker, Giles, Chiang Joyce, 2015) The executives Challenges Dealing with an association or a group may represent a great deal of difficulties particularly if the pioneer is managing a differentiated group. These difficulties may extend generally relying upon characteristics that achieve the decent variety. Coming up next are a portion of the difficulties related with dealing with an expanded association or society;1. Poor communicationEffective correspondence is the main impetus of some random group. For a group to perform well both the pioneer and the colleagues need to have a conventional method of how they trade data among themselves. In a broadened group, this is an extraordinary test particularly if the people in a group have distinctive social foundation and etymological contrasts. Since various societies have various qualities and think about certain perspectives as proper and others unseemly, it might bring about correspondence challenges among the colleagues. What's more, a group may comprise of people who have distinctive conveying styles relying upon the age, sexual orientation, and religion (Kirton, Greene 2015). This may bring about misconception and along these lines error of data which will, thus, influence the presentation of a group. In dealing with a different group pioneers ought to have the option to urge the individuals to receive a typical specialized technique and welcome the every others differences.2. HegemonyThis is where a specific gathering in a group or association is a lot of predominant than others. In an association that comprises of people from various societies, the test of greater part authority may emerge because of the strength of a given gathering over another. In such a case an organization may will in general build up a business culture that favors the larger part bunch over the minority gathering. This can demoralize the minority bunch coming about into underperformance of the group. On the other hand, the less predominant gathering may join the prevailing gathering to feel as a component of the organization. It is, in this manner, significant for the group head to comprehend the distinctions that exist in their group and attempt to have them cooperate without causing a specific gathering or individual to feel as an outsider.3. ResistanceA given group may comprise of people who are not prepared to acknowledge the decent variety that the group has. Such people may not be prepared to adapt to the current decent variety plan in a group and in this way, its usage might be a test. With such perspectives in a group, some individual become discouraged and demotivated prompting a lessening in the presentation of the group. Pioneers ought to have the option to persuade their colleagues to beat this opposition and improve the exhibition of the group (Siegel 2015).4. GroupthinkThis alludes to a choice that has been by and large showed up at by a larger part of individuals. Oblivious conformity is typically utilized by colleagues as a methods for rearranging gatherings and limits contentions in an association. This would in actuality lead to digestion of others points of view and in this way, the groups potential probably won't be completely misused. A pioneer should devise a compelling system that will permit all the colleagues to share their points of view without being compelled to absorb their deduction with that of the groupthink.Meaning of WorkThe progression of innovation has prompted an alternate point of view of work. Work can be characterized dependent on the accompanying three viewpoints; the importance of work, the work esteems, and the work cognizance (Shek Chung 2015).The noteworthiness of work portrays the qualities that an individual appends to their work and how the person speaks to it. It likewise clarifies the significance of work to ones life.Work values depict the responsibility that one has towards life and the angles that control one in their work. There are commonly five significant viewpoints including; self-rule, self-ac complishment, chance taking, social collaborations, and social advancement.Work soundness characterizes the parity that exists between ones work and him. The Needs HierarchyFor a group to perform proficiently, the individuals should be propelled. There are a ton of methods utilized by pioneers to keep their colleagues spurred with the goal that they may work viably to accomplish a companys targets. The necessities hypotheses clarify a portion of the inner elements that may inspire a person to act in a given manner. Requirements might be characterized as deficiencies in specific parts of a people life and these will consistently impact the conduct of that specific individual.One of the most widely recognized necessities hypothesis is, Abraham Maslows chain of command of requirements hypothesis which expresses that ones inspiration is because of an endeavor to fulfill the five essential needs that incorporate; self-completion, physiological, regard, social, and safety.In the worldwide setting, pioneers ought to consider the over five needs with the goal that each representative remains propelled to perform as indicated by their latent capacity. This will include;Physiological needs; this portrays the essential needs fundamental for endurance. Representatives ought to be given acceptable working conditions. The conditions should be ideal for everybody and not only a chose few.Safety needs; the pioneer ought to have the option to ensure the colleagues security for their accounts, wellbeing and so on without demonstrating favoritism.Social needs; dealing with a group comprising of people from various nationalities will include creating successful implies that will energize connection and joint effort among workers (Drucker 2007).Thus, it is fundamental for a pioneer to think about the above needs among others while dealing with an expanded team.Motivation of PeopleMotivation is a word that begins from the thing thought process, a rationale is alluded to as that per spective or thing that prompts a person to act with a specific goal in mind (Wood 1991).Motivation alludes to a people course to conduct or an angle or factor that may cause a person to have the need to rehash some conduct. The inspiration of individuals is anyway connected with certain focal points and detriments. These may include;Advantages Interest and Responsibility When representatives are constantly spurred by their bosses, the intrigue level and the enthusiasm to work for that organization will in general be so much expanded. Resources Employ inspiration has a significant influence on the conduct workers conduct. It is simpler, in this manner, to persuade a representative who is constantly propelled to consistently stay working in your association. Along these lines, an utilize may turn into an advantage of an organization. Proficiency In an association where the workers are ceaselessly persuaded, the association of such organization
Saturday, August 22, 2020
The Role of External Auditing in Public Sector free essay sample
As a matter of first importance I need to stretch out my essential commitment to the Lord Almighty for the quality He offered me to endure with this undertaking as to be sure ââ¬Å"the going got toughâ⬠yet inside Him nothing is outlandish. I might likewise want to recognize each one of the individuals who helped me make this task a triumph, much obliged to my boss Mr. A. Mpofu . much thanks for your significant direction and your difficult work you were exceptionally persistent with me from the origin of this task to its ebb and flow state I wouldnââ¬â¢t have created this artful culmination without your help, Thank You!!!!!Special Appreciation goes to each one of those experts who pushed me with my essential research unique notice to the Deloitte Bulawayo Audit group your help was critical to the achievement of this undertaking. I might likewise want to offer my earnest thanks to my family ,without the your budgetary help and empowering bolster I wouldnââ¬â¢t have gotten this far. We will compose a custom exposition test on The Role of External Auditing in Public Sector or then again any comparative subject explicitly for you Don't WasteYour Time Recruit WRITER Just 13.90/page An extraordinary note of gratefulness likewise goes out to the accompanying people for their relentless help all through the arrangement of this task Mr. P. T . Nyamuvhurudza Mr. T Mukono Takudzwa Nyuke Tapiwa Magunda Mildred PepukaiYou gave me invaluable help folks May the Lord keep on gift you and your families. We are living in a unique world described by unconstrained changes occurring in the twinkle of the eye realized essentially by changes in Information Technology. Data Technology is gradually changing the way of our day by day living and our employments. This exploration was decided to distinguish the progressions that Information Technology has realized explicitly on the inspecting calling. The exploration was provoked mostly by the perceptions that the scientist saw during their mechanical connection experience inside a review firm.The decision to concentrate on the suggestions on the evaluating calling was because of the way that the analyst has enthusiasm for the progressions that are happening in the review calling in the previous decade because of Information Technology. A survey of writing with data relating to changes that have happened to the bookkeeping procedure which influence examining was done widely this helped to recognize the general pattern in the progressions occurring in the calling. The discoveries featured that they was a radical change in the way wherein evaluators execute their obligations because of Information technology.Information was assembled from both essential and auxiliary sources and it was dissected so as to give the scientist a comprehension of what precisely is occurring on the ground I. e. inside the business. The exploration demonstrated that the Information Technology brought such a significant number of focal points to the calling contrasted with the conventional way of completing reviews. Section one of this exploration venture is a concise synopsis featuring the motivation behind the investigation just as the methodology taken by the analyst to address the examination questions, it likewise incorporates the point by point meaning of terms that were utilized in the exploration venture. Section two is the writing survey which features what different writers have composed relating to Information Technology and evaluating. The data accumulated was gathered from a wide scope of creators, the perceptions that these creators made are featured in the subsequent part. Section three shows the exploration technique and how the data utilized was gathered; it likewise features the disadvantages looked by the different strategies for gathering data that were utilized. An examination of the data that was gathered was then done in Chapter 4.
Friday, August 14, 2020
How to Create Compare and Contrast Essay Outline
How to Create Compare and Contrast Essay Outline Do you know how your lovely pets can help you to pass a course assignment? No, there is nothing wrong with this statement. Your fed and pampered cat might be quite useful as well as your faithful dog. Do not consider your familyâs pets as a distraction and creatures making a complete mess around. Let them inspire you for the most insightful compare and contrast essay outline! No more riddles, no more secrets. Without further ado, let us explain the easiest way to elaborate a comprehensive outline for your future masterpiece. Structure: What Do You Need to Write? We know that you are eager to start writing an essay, but not wade in unknown waters, scrutinize your topic first. You need to choose two subjects that vary widely or, on the contrary, are closely related. Think carefully about these objects, people, events, and places to distinguish the similarities or discern the major differences. Donât be too hasty to write an introductory paragraph. Take your time to develop an outline for your essay. What is the reason for creating the plan in the first place? Imagine this: you have started writing but stuck in the middle of your thoughts! Or even worse, you have written the essay when noticed the gaps in a logical framework. To avoid burnout, you should follow a consistent outline that has its own structure. The Introductory paragraph. The Body (consists at least of three parts). The Conclusion paragraph. This holistic approach will enable you to put your ideas in an appropriate format. Make your outline simple for understanding, coherent and logical. Introduction to the Topic Now you are aware of the basic structure so that let us break down major components returning to our lovely four-legged beasts: cats and dogs. The introductory paragraph is the place to describe your topic in general and specific terms. As a rule, it starts with a hook to draw the reader into the writing paper. Your task is to introduce your topic with several sentences. Make clear what you are going to discuss. It consists of three significant elements. Discover the central topic. Usually, the introductory paragraph begins with a particular hook to induce readerâs interest. Rhetorical questions might be useful to lure your audience. After that, put the specifics of the topic. Example. Comparing and contrasting our pets, we might introduce the topic like this: âDo you know why cats are considered to be smarter than dogs?â Identify your objects. Specify what you are going to compare and contrast. Describe your objects to the readers shortly; emphasize the distinctive features as well as commonalities. Example. Returning to our pets, we might write the following lines: âKitten, a charming small creature that likes to play all the time, contrasts sharply with our lazy Chesapeake Bay Retriever Ben that usually sleeps so sweetly near the fireplace. Despite their differences, both of them have the same soft spot for a piece of juicy meatâ. Thesis statement. It is the final part of your introductory paragraph and the place to make your thesis statement. It is time to clarify the fundamental idea. It means you have to make your reader understand where your essay is going. Example. In our case, the thesis statement emphasized three specific features of the pets. âFirstly, Kitty and Ben differ in their nature, behavior, and preferences; yet they have a strong bond to human beings taking us for a mother, father, friend, and goddess, especially Ben.â Brainstorm the last sentence of the section, as it helps you transition smoothly into the next part. The Body of Your Story: Our Guide The amount of the body paragraphs depends on the aspects of your subject. Write two details about each of them separately, explaining how they are related to the facet. Paragraph #1 State the principal idea of the paragraph. We put it in this way: âThe first difference between Kitten and Ben is the way they behave in human society; while both depend on their master, each of the pets has its personal style.â Our detail sentences might look in such way: Subject #1: Kitten 1. âKitten thinks that the only purpose the world exists is to make her absolutely contented and satisfy all her royal whims. I think she considers herself to be an ancient goddess while all the members of our family are her subjects.â 2. âIn the nastiest days, when everything seems going wrong, she possesses an admirably quality to make your shine! Whenever you came at home, Kitten is waiting for you, looking for your love, gentle strokes, and some meat.â Subject #2: Ben 1. âOn the other hand, Ben is both the most faithful friend and the diligent servant that neither complains nor demands, and is always glad to help with your lost slipper or leftover bones.â 2. âDespite his native laziness and passion for the masterâs pillow, whenever you want, Ben will come to make you cheer up: shake his strong and friendly paws.â In the same way, you should organize the next paragraphs: put the aspect first, and then go into details describing every point separately. There are no strict rules on how many elements you should compare. However, our piece of advice is to reflect on three or more key thoughts. Put particular attention to the last body paragraph. It wraps up the final aspect that you have identified in the thesis. More Writing Tips Make your introduction bright. You should capture the readers attention like Alexander the Great conquest the Persian Empire. Answer the questions. In this way, you will piece together the whole picture and clarify specific details. For instance, state something unknown and outline the possible misunderstanding. Reveal a new way of seeing or realizing something. Never forget to argue a point with supported facts. Read it critically. Come back to your essay with fresh eyes. Return to the reading a day after it was completing. Make sure each topic sentence of the body clearly summarizes the key points. Proofread it to recognize weak points and edit for grammar, logic, and flow. Juicy Conclusion: Make it Better! At last, we are ready to wrap all ideas up with the conclusion. It is the final chord comprising the short summary of our essay, which aims to put all things together. Remember three significant points: Summarize. You need to synthesize your ideas with the information set out in the body paragraphs. Focus on evaluation. Describe the greater meaning of the chosen topic or discuss possible progresses in the future. Answer the question of what the purpose of your work is. Significance. Underline revealed differences and explain why you consider them essential. State what was your final goal in showing these differences? By the way, you may refer back to your introductory paragraph and rewrite thesis statement. How to Choose a Topic? If you are free to choose, find something you are crazy about. Maybe you adore cats as we are? Then it will be easier to describe the subject! You may compare personalities, places, objects, animals, facts and so on. For example, you may write about: American and English language differences; Art and science class; Rock and classical music; Tea and coffee or apple and tomato. You see, there are plenty of topics for you to explore! However, consult your instructor first what field you should study. We are sure that you are perfectly able to create a great compare and contrast essay following well-designed outline. Just keep in mind our funny pets and work on your topic!
Sunday, May 24, 2020
Metaphors In Ralph Ellisons Invisible Man - 1235 Words
Metaphors in Invisible Man Ellison uses many examples of metaphors in his novel to convey invisibility, especially with references to music, imagery, and the use of a nameless character. With literature that challenged the accepted ideals surrounding that time period, Ellison expresses his thoughts by comparing an invisible man to various relatable subjects in life. When the narrator firsts starts on his journey and gets constantly bumped, he states that ââ¬Å"You constantly wonder whether you arenââ¬â¢t simply a phantom in other peopleââ¬â¢s mindsâ⬠(4). It draws a connection between the unknown emotions of an invisible man and the empty, invisible image of a phantom. Ellison employs a common idea to convey to the readers of the African Americanâ⬠¦show more contentâ⬠¦He portrays his vulnerability by comparing himself to a bird plucked of his feathers and ridiculed for his devoted admiration of Bledsoe. According to Leon Forrest in The Critical Response to Ralph Ellison edited by Robert J. Butler, ââ¬Å"the song mocks and thereby instructs him that each person must constantly die, or shed the skin of his innocence, in order to growâ⬠(64). The narrator grows by reflecting upon himself and throughout the novel, his character develops to understand his invisibility. He claims ââ¬Å"Perhaps youââ¬â¢ll think it is strange that an invisible man should need light, desire light, love light. But maybe it is exactly because I am invisible. Light confirms my reality, gives birth to my form (6). The light represents his own acknowledgement and self-respect for his own identity, that allows him to discard his desire for approval from society. The narrator represents the many African Americans that learned to find their individual identity and black identity. Most importantly, Ellisonââ¬â¢s use of a nameless character contributed greatly to his literary work. The story is told by the narrator, whoââ¬â¢s name is never revealed throughout the book and represents a me taphoric invisibility. Ellisonââ¬â¢s decision to withhold the main characterââ¬â¢s name maintains the idea of an ever-changingShow MoreRelatedJazz in Invisible Man1464 Words à |à 6 Pagesenjoyed by millions of people each day. It is an art that has continued through decades and can be seen in many different ways. That is why Ellison chooses to illustrate his novel with jazz. Jazz music in Invisible Man gives feelings that Ellison could never explain in words. In Ralph Ellisonââ¬â¢s Invisible Man, the narratorââ¬â¢s search for his identity can be compared to the structure of a jazz composition. In order to see the parallel between the novel and jazz, one must first see how Ellison incorporatesRead MoreThemes and Styles of Ralph Ellison3336 Words à |à 14 PagesEnglish IV 16 November 2005 The Themes and Styles of Ralph Ellison Ralph Ellison has proven himself through his novel The Invisible Man to be the leading black author of the twentieth century. Although he had written many short stories and essays collected in the book Shadow and Act, The Invisible Man is his only novel. With this one novel, Ellison earned himself the 1953 National Book Award and acclaim by the African American community for so accurately portraying the struggles a black AmericanRead MoreImprovisation Of The Invisible Man1392 Words à |à 6 Pagesand Composition III February 15, 2017 Improvisational Music In Invisible Man ââ¬Å"My only sin is in my skin, What did I do to be so black and blue?â⬠The protagonist, the invisible man, is stoned from marijuana as he listened to Armstrong s rendition of What Did I Do to Be So Black and Blue and determined that invisibility gives one a slightly different sense of time, you re never quite on the beat. (Prologue.)â⬠The invisible man respected Armstrong for making something beautiful out of invisibilityRead MoreRalph Ellison Battle Royal Short Story Analysis819 Words à |à 4 Pagescivil war ended slavery but African Americans still suffered from racism. Ralph Ellison touches on this topic in his short story ââ¬Å"Battle Royalâ⬠which portrays the life of a young African American post-civil war. Before the narrator in Ralph Ellisonââ¬â¢s ââ¬Å"Battle Royalâ⬠was an ââ¬Å"invisible manâ⬠he was a young African American who had to deal with oppression in order to survive in his modern time. Ralph Ellison uses symbolism, metaphors, and imagery in ââ¬Å"Battle Royalâ⬠in order to enhance the portrayal of theRead MoreRevelations Of The Fictional Characters Of Ralph Ellison s Invisible Man1402 Words à |à 6 PagesDrew Wiseman Mrs. McElroy AP English 12 September 3, 2012 Revelations of the Protagonist In Ralph Ellisonââ¬â¢s Invisible Man, the main character goes through a spiritual realization just as Meursault does in Albert Camusââ¬â¢ The Stranger. In the Invisible Man, Dr. Bledsoe leads the protagonist astray to the fabled Harlem of New York City. Once the narrator arrives in Harlem, it becomes apparent that he was sent to Harlem as a punishment and has been permanently expelled from black college. The narratorRead MoreInvisible Man By Ralph Ellison1415 Words à |à 6 PagesRalph Ellisonââ¬â¢s Bildungsroman, Invisible Man, was published in 1952 but is a recollection of the narratorââ¬â¢s experiences during the 1930s. The unnamed narrator tells his story retrospectively, speaking in the present tense during the prologue and epilogue but switching to the past when recounting his story. At the present time during the prologue, the narrator is living in a ââ¬Å"basement shut off and forgotten,â⬠as he puts it, draining free power from the Monopolated Electric Com pany, having secludedRead More`` Blackness `` : An Invisible Disposition Explored Through Free Enterprise And Invisible Man1509 Words à |à 7 Pagesââ¬Å"Blacknessâ⬠: An Invisible Disposition Explored Through Free Enterprise and Invisible Man As observed throughout history and various societies, the notion of a ââ¬Å"racial hierarchyâ⬠proves to be a superficial design that ultimately assigns value to a group of people based solely upon their skin color. As a result, certain groups are promptly associated with influence and supremacy, while others are disregarded in their ââ¬Å"inherentâ⬠inferiority. Michelle Cliffââ¬â¢s Free Enterprise (1993) and the prologueRead MoreAnalysis Of The Motif Of Black Invisibility, By Michelle Cliff s Free Enterprise And Invisible Man Essay1492 Words à |à 6 Pagesââ¬Å"Blacknessâ⬠: An Invisible Disposition Explored Through Free Enterprise and Invisible Man As observed throughout history and various societies, the notion of a ââ¬Å"racial hierarchyâ⬠proves to be a superficial design which ultimately assigns value to a group of people based solely upon their skin color. As a result, certain groups are promptly associated with influence and supremacy, while others are disregarded in their ââ¬Å"inherentâ⬠inferiority. Michelle Cliffââ¬â¢s Free Enterprise and Ralph Ellisonââ¬â¢s Invisible ManRead MoreDesiree s Free Enterprise And Ralph Ellison s Invisible Man1493 Words à |à 6 Pagesa group of people based solely upon their skin color. As a result, certain groups are promptly associated with influence and supremacy, while others are disregarded in their ââ¬Å"inherentâ⬠inferiority. Michelle Cliffââ¬â¢s Free Enterprise and Ralph Ellisonââ¬â¢s Invisible Man approach this paradigm by facilitating their readersââ¬â¢ understandings regarding the debilitating ostracism associated with the social construct o f ââ¬Å"blackness,â⬠as well as the metaphorical societal invisibility that is suffered as a resultRead MoreInvisibility in Invisible Man by Ralph Ellison Essay958 Words à |à 4 Pagesunseen by anyone. In popular media, the hero is also often portrayed as being invisible, going behind the enemys back to complete his or her mission. In Ralph Ellisons Invisible Man, this view of invisibility is reversed; rather than being invisible and getting noticed, a man is in plain sight of everyone- however, due to a slew of stereotypes and prejudices, nobody recognizes what he accomplishes. Beginning his journey as a man who stays out of the way by doing what he is told, he is quickly forced
Wednesday, May 13, 2020
Benefits Of A Online Business - 943 Words
Persistence is a prerequisite to success in online business. There is no way you can make money online if you are not persistent. Training yourself to become persistent, despite all eventualities, is one important factor that you need to learn right from the day you venture into online business. It should be understood right from the start that making money online takes time. Do not be fooled by those scams who promise you heaven and who make you think that you can make thousands of dollars overnight. To benefit from online business, it s really dependant upon several factors among which include skill, knowledge, effort, time, will-power and persistence. I have observed that most people are longing to earn money online. This is evident in the number of people that sign up in some of the affiliate programs I promote. However, when you consider those who persist and become serious online marketers, you get tightlipped. I believe it s not only with me. Even other marketers have a similar problem. Do you know why? It s partly because many people join hoping to make quick money without necessarily knowing what it takes to succeed in online business. Persistence is an unknown secret to most would-be successful people in online business. But it s what has turned many online marketers into millionaires. Of course there are other contributing factors, but persistence plays a pivotal role and is a key ingredient to success in your business. Hard work and persistence canShow MoreRelatedBenefits Of Online Advertising On Local Business Essay1363 Words à |à 6 Pages Marketing locally is important for any small business with the desire to grow. Local online marketing has set the standard in small business marketing with a cost effective method that yields targeted clients. Many companies focus on search engine optimization (SEO) to be found locally on the top of Google and other search engines. Being found locally helps many companies flourish but receiving high search engine rankings relies on many other factors. Word of mouth has always been one of the mostRead More e-Business Essay example1536 Words à |à 7 Pages E-Business E-business is the largest emerging trend in business today. The movement into e-business is dramatically changing the way people buy and sell. Business is no longer a one for all concept, that concept is being replaced by a consumer economy that is driven by choice. These choices are not only in product and price but in shopping environment as well, where their transactions can take place face to face or in an online environment. Not only are traditional businesses completing their transactionsRead MoreOnline And Email Customer Service Essay916 Words à |à 4 Pagestechnology, online and email customer service has become one of the most important aspects of a business. Consumers are relying more on technology to solve problems and face-to-face customer service is becoming less relevant. But what is online and email customer service all about and how can it benefit your business? This guide will answer these questions and look at the key steps you need to take in order to create a viable online and email customer service strategy. What is online and email customerRead MoreOnline Accounting Essay733 Words à |à 3 PagesWhy Online Accounting Services Useful for Startups and SMEs When a business had a need to have the best business status, it requires making appropriate catalogs of about the taxation. When the business hasnt kept up literature right from the main day, it might have made loads of issues in future. In laymen conditions, accounting is the design and the exploration of recording each of the exchanges of business in per suggested position. This is why it is especially imperative for the SME business proprietorsRead MoreMarketing and E-business1592 Words à |à 7 PagesE-Business E-business is the largest emerging trend in business today. The movement into e-business is dramatically changing the way people buy and sell. Business is no longer a one for all concept, that concept is being replaced by a consumer economy that is driven by choice. These choices are not only in product and price but in shopping environment as well, where their transactions can take place face to face or in an online environment. Not only are traditional businesses completing theirRead MoreMarketing Opportunities For Business Opportunities Essay1634 Words à |à 7 PagesExporting will also create the connection with oversea company and that will be benefits for future business activity. Marketing opportunity 2: online business opportunities Online marketing will target the group of people who is normally purchasing products online. This group of customer is relying on technology and age around 15-40 years old. This group prefers to pay by debit or credit card but not cash. Also business will access to new group of customer who has never seen your products before.Read MoreSuggestions for Building a Strong Brand1148 Words à |à 5 Pagesthe center at your business, then secondly another suggestion to aid with the actual product, then secondly the augmented product, this is known as the three product levels. The three product levels is a theory Philip Kotler talks about in his book ââ¬Å"Principle of Marketingâ⬠. The first level is the core product, the second level is the actual product and the third being the augmented product. The three levels of a product is a model Kotler talks about that allows a business to build its productsRead MoreP5 Unit 331032 Words à |à 5 PagesP5: Explain the competitive pressures on selected, contrasting business organisations to develop their use of e-business à Introduction In this PowerPoint I will prepare a set of presentation slides for Next that explains the competitive pressures they have faced to develop their use of E-Business. I will then compare this to another organisation which will be Currys. Next PLC was founded byà Joseph Hepworthà inà Leedsà in 1864 as a tailor under the name ofà Joseph Hepworth Son. The retail chain wasRead MoreIntroduction to Ict1509 Words à |à 7 PagesExecutive Summary In this report I will look into the benefits and risk of e-commerce, the types of legislation that have been introduced to protect the consumer and business alike. At the end of this report I plan to give my recommendation as whether I believe you should venture into e-business and set up your own online business. I will try and remain un-bias and give my opinion whilst give a fair account of the risks and benefits of e-business. Introduction For this report I have to assume theRead MoreBlockbuster Business Analysis1092 Words à |à 5 Pagesfor several years by Blockbuster, with its pioneer business model of delivering convenience to the costumers looking for home entertainment. The company was a model for the industry during the 80ââ¬â¢s, 90ââ¬â¢s, but with the new age of online movies, the consumer behavior changed drastically, and other companies, as Netflix and Redbox, providing online content and innovative services, started to dominate this new market. Nowadays, Blockbusterââ¬â¢s business model seems to be obsolete, since the company could
Wednesday, May 6, 2020
Amtrak Train Derailment Free Essays
Who are the stakeholders in this case? The stakeholders in this case are the passengers, crew and their families, aboard the Amtrak train that derailed. They are also the corporate investors who hold stock in Amtrak and all Amtrak employees who have invested their time in employment with the organization. They could easily lose their jobs if a major layoff occurred or the organization filed for bankruptcy due to the millions they would be required to pay in damages. We will write a custom essay sample on Amtrak Train Derailment or any similar topic only for you Order Now Stakeholders are the members of the Mobile, Alabama community who either witnessed or heard about the disaster and who may have lost trust in this railway system. The crew and captain of the tug boat which ran its barges into the framework of the bridge are also stakeholders, along with the owners and investors of the transport company in which they were employed. The emergency workers, the agencies such as NTSB, the Alabama Emergency Response Network and the U. S. Coast Guard are stakeholders as well. What are the interests of the stakeholders? Investors in the transport company, CSX and Amtrak stand to lose money as such disasters can lead to public distrust and subsequent falling stock prices. They must answer to the public as to why emergency signals were not designed on the bridge. Families have lost loved ones as passengers or crew members that they cannot bring back. Crew members that lived must deal with feelings of guilt for not being able to do more and not being aware of exactly what had happened. They will also have to face many questions from agencies investigating the disaster and will face stressful situations, possibly for years to come. Their careers and way of earning a living may also be in jeopardy due to the effects of this disaster. Crew and families of the tug boat crews must face feelings of guilt and shame. What is this corporationââ¬â¢s social corporate responsibility in this case for the four areas of corporate social responsibility? â⬠¢Legal Social Responsibility With respect to the legal responsibility, both CSX who failed to provide a signal on the bridge and WGN, whose crew ran into and damaged the bridge, while displacing the track have a financial responsibility toward families whose loved ones made a living, whether crew or passengers. Amtrak also shares in this responsibility for not taking greater precautions, such as reduced speed, knowing that some bridges are not installed with emergency signals. There is also a financial burden to repair the damages to the bridge and CSX track by WGN, who initially caused the event that led to the derailment. According to Mallen Baker (2009), ââ¬Å"CSR is about building relationships with customers, about attracting and retaining talented staff, about managing risk, and about assuring reputation. â⬠In this instance, both CSX and WGN did a poor job of managing risk. WGN is responsible for not having staff with better training and navigation skills and CSX for ignoring recommendations to install emergency signals on the bridge. â⬠¢Economic Social Responsibility CSX, Amtrak and NTSB have economic social responsibility in reducing the risk of injury or loss of life due to such incidents, which has a huge financial impact on the families of passengers and crew. WGN shares in this responsibility as well. Though CSX did not install emergency signals, the NTSB should provide greater oversight to ensure such precautions are taken. WGN should be aware of the problems that can occur when a large vessel runs into various structures and should help in repairing the emotional and financial lives of the victims of the accident. Both CSX/Amtrak and WGN have an economic responsibility to the shareholders of their respective corporations, to ensure that business processed provide the smoothest possible operations, for best possible returns on investments. When disasters such as this one occur, investors stand to lose substantial financial gains. â⬠¢Ethical Social Responsibility All agencies and companies involved have an ethical responsibility to make sure that various forms of travel or transport they oversee or are involved in are as safe as possible for their crews and passengers. Ignoring recommendations such as CSX did, in not installing the emergency signal due to cost is an example of social irresponsibility (Eisenbeis, et al, nd). Amtrak could have better communications and emergency systems aboard the trains and passenger cars, to alert the entire crew of emergencies. Though this may not be an issue of irresponsibility, it has implications for future rail travel. WGN has an ethical responsibility to ensure that vessel crews are trained and updated on navigation techniques, so that injury to innocent bystanders does not occur. They also have an ethical responsibility to have proper navigation systems on board the vessels. â⬠¢Philanthropic Social Responsibility Travel and transport organizations do not have a specific responsibility to become involved in philanthropic activities, though they should at least insure that the communities in which they travel through are not adversely affected either economically or environmentally, as a result of their travels. They could take measures to provide incentives for jobs and training for jobs of those in the communities in which they travel through, as taxpayers of those communities share the burden of building bridges and roads. Because the organizations also contribute to introducing carbon emissions into the environment, they should work with and offer some financial support to organizations that help monitor and provide solutions for carbon emissions. Conclusion and Recommendation I believe better communication by all parties involved would have reduced injuries. Amtrak should have had regulations in place for speed during weather conditions and safety devices for the rail in front of them could have avoided a lot of the accident. Having markers in place for emergency response units, would have allowed them to give a more specific place of the wreck. When peopleââ¬â¢s lives are at stake all ethical issues and laws should be put in full swing. Common sense would have prevented all of this. Large corporations such as Amtrak should have trained employees and safety standards in place. How to cite Amtrak Train Derailment, Papers
Sunday, May 3, 2020
Marketing Principles Targeting Strategy
Question: Discuss about theMarketing Principlesfor Targeting Strategy. Answer: Introduction: This assignment deals with the marketing approach of a product. Marketing approach involves segmentation of the product, targeting strategy to reach the maximum number of people and positioning of the products to get a stable market for the product as well as for the brands. In this study, menswear of the brand Jack London has been chosen to understand the marketing strategy to promote the products of the company. Jack London was founded in 2008 and only sells the product of mens clothing (Jack London. 2016). Segmentation of the Products: The main motto of the product segmentation is to make the variation of the products according to the changes in market and demand of the consumers. Product segmentation results in the increasing share price of the company. However, for the positive response to the market survey and analysis of the market and customers demand is necessary. Wedel and Kamakura (2012), mentioned that segmentation of the products help the companies to understand the product value among the consumers Segmentation of the products include five main bases as stated below: Geographic: This type of segmentation is done based on the location. Preference and requirement differ with the different region; thus, products segmentation is required according to the geographic variation. Jack London has stores in Melbourne, Perth, Adelaide and Sydney; thus, geographic segmentation of their products is required. For an instance, it can be said that Melbourne has winter for most of the times in year thus whereas, Sydney enjoys seaside warm weather; thus, the company can focus on the woolen products for the men in Melbourne and can promote cotton products for the Sydney. Demographics: According to, Sharma and Lambert (2013), the main purpose of the demographic segmentation is to get an idea about the demand of the products as per the age, income, gender and race of the population. In this case, Jack London can give priority to the colors such as gray, white and black for the elder people while bright and dark colors are for the young people. Moreover, Australians have a distinct fashion style than that of the European style; hence, all clothing for the men must incorporate the casualness in their style. Moreover, Australian people prefers greater freedom in their clothing; thus, the company can develop a new range of shirts and pants, made of materials like silk and linen as both of these materials are lightweight. Psychographic: Psychographic segmentation involves analysis of the lifestyle, interests and activities of the particular population and diversification of the products as per the criteria (Kim and Ko 2012). Hence, segmentation of the clothing for men can be done by their daily activities such as, they can promote classic fitted pants for the daily wear of the men as it will be more comfortable for them, whereas Jack London can advertise skinny-fit products for the young generation and college goers rather than office goer men. Benefit: Cui and Choudhury (2015), mentioned that pricing and benefit is a significant concern for any organization during the segmentation of their products, as all the strategy can only be fruitful when the company can cover up the costing of the promotion and segmentation by gaining profit over the segmented products. A company can provide the discount on clothing at the time of launching to draw more people and leave a positive impression about the products as well as the enterprise. Apart from that, products can be made by mixing different material such as shirts made from polyester and cotton. This strategy can help to balance the customer satisfaction and market value of the company. Usage-rate: This step requires periodic survey and analysis of the findings to understand current trend of the fashion industry (Liao et al. 2014). During the winter, woolen products and warm clothing are needed to be more advertised whereas, cotton products are more preferred for in summer. Targeting Strategies: As mentioned by, Brooksbank (2013), targeting requires consideration of survey and targeting a particular audience to sell the products. Targeting involves the size of the market, accessibility, potentiality of buying the products. Jack London requires going through the market analysis so that, they can get an idea of whether the market is appropriate or not. Moreover, accessibility is one of the prior concern as if people cannot reach the products easily they will lose their interest. Thus, segmented products must get the promotion based on the particular criteria, such as the company deals with only menswear, activities of men from different age and class can be prcised during the campaign and advertisement of the products. Approaches for the Positioning of the Products: The positioning of the goods is the last step for the STP model of marketing strategy. It expresses the evaluative image of any product in front of the consumers (Zeriti et al. 2014). Furthermore, Jack London can also position their products in such a way that clearly depicts the comparison of their products from the products of the other companies. Conclusion: Therefore, from this analytical study, it can be said that this study has covered all the aspects of the requirements. It has included the Segmentation-Targeting-Positioning model of the marketing and has put a descriptive review on this three approaches. Segmentation requires different attributes such as demographic, geographic and psychographic; targeting requires approaching specific mass for particular products and positioning for the products involves placing products in an aspect of market making the products more acceptable to the consumers by allowing competition with other companies. Here, few recommendations have been provided for the products of the Jack London to help the company in stable business and endorse their products in a way that is more viable. This company has stores across different places in Australia, thus marketing for their products require different strategies, as described in this study. As all the information, provided here, is relevant to the current approach of marketing strategy, this study can be revised for further extensive research. Reference List: Brooksbank, R.W., 2013. Successful marketing practice: a literature review and checklist for marketing practitioners.International Journal of Wine Marketing. Cui, G. and Choudhury, P., 2015. Effective strategies for ethnic segmentation and marketing. InProceedings of the 1998 Multicultural Marketing Conference(pp. 354-358). Springer International Publishing. Jack London. 2016. Jack London Store. [online] Available at: https://shop.jacklondon.com.au/ Kim, A.J. and Ko, E., 2012. Do social media marketing activities enhance customer equity? An empirical study of luxury fashion brand.Journal of Business Research,65(10), pp.1480-1486. Liao, C.N., Hung, J.Y., Kao, H. and Wu, C.J., 2014. Marketing strategy model: A conceptual framework for micro-enterprises.Human Systems Management,33(4), pp.199-206. Sharma, A. and Lambert, D.M., 2013. Segmentation of markets based on customer service.International Journal of Physical Distribution Logistics Management. Wedel, M. and Kamakura, W.A., 2012.Market segmentation: Conceptual and methodological foundations(Vol. 8). Springer Science Business Media. Zeriti, A., Robson, M.J., Spyropoulou, S. and Leonidou, C.N., 2014. Sustainable export marketing strategy fit and performance.Journal of International Marketing,22(4), pp.44-66.
Friday, March 27, 2020
Friday, March 6, 2020
Barley (Hordeum vulgare) - The History of Domestication
Barley (Hordeum vulgare) - The History of Domestication Barley (Hordeum vulgare ssp. vulgare) was one of the first and earliest crops domesticated by humans. Currently, archaeological and genetic evidence indicates barley is a mosaic crop, developed from several populations in at least five regions: Mesopotamia, the northern and southern Levant, the Syrian desert and, 1,500-3,000 kilometers (900-1,800 miles) to the east, in the vast Tibetan Plateau. The first was long though to be that of southwest Asia during the Pre-Pottery Neolithic A about 10,500 calendar years ago: but the mosaic status of barley has thrown a wrench into our understanding of this process. In the Fertile Crescent, barley is considered one of the classic eight founder crops. A Single Wild Progenitor Species The wild progenitor of all of the barleys is thought to be Hordeum spontaneum (L.), a winter-germinating species which is native to a very wide region of Eurasia, from the Tigris and Euphrates river system in Iraq to the western reaches of the Yangtze River in China. Based on evidence from Upper Paleolithic sites such as Ohalo II in Israel, wild barley was harvested for at least 10,000 years before it was domesticated. Today, barley is the fourth most important crop in the world after wheat, rice and maize. Barley as a whole is well-adapted to marginal and stress-prone environments, and a more reliable plant than wheat or rice in regions which are colder or higher in altitude. The Hulled and the Naked Wild barley has several characteristics useful to a wild plant that arent so useful to humans. There is a brittle rachis (the part that holds the seed to the plant) that breaks when the seeds are ripe, scattering them to the winds; and the seeds are arranged on the spike in a sparsely seeded two rows. The wild barley always has a tough hull protecting its seed; the hull-less form (called naked barley) is only found on domestic varieties. The domestic form has a non-brittle rachis and more seeds, arranged inà a six-rowed spike. Both hulled and naked seed forms are found in domesticated barley: during the Neolithic period, both forms were grown, but in the Near East, naked barley cultivation declined beginning in the Chalcolithic/Bronze Ages about 5000 years ago. Naked barleys, while easier to harvest and process, are more susceptible to insect attack and parasitic disease. Hulled barleys have higher yields; so within the Near East anyway, keeping the hull was a selected-for trait. Today hulled barleys dominate in the west, and naked barleys in the east. Because of the ease of processing, the naked form is used primarily as a whole-grain human food source. The hulled variety is used mainly for animal feed and the production of malt for brewing. In Europe, the production of barley beer dates at least as long ago as 600 B.C. Barley and DNA A recent (Jones and colleagues 2012) phylogeographic analysis of barley in the northern fringes of Europe and in the Alpine region found that cold adaptive gene mutations were identifiable in modern barley landraces. The adaptations included one type that was non-responsive to day length (that is, the flowering was not delayed until the plant got a certain number of hours of sunlight during the day): and that form is found in northeast Europe and high altitude locations. Alternatively, landraces in the Mediterranean region were predominantly responsive to day length. In central Europe, however, day length is not a trait which (apparently) had been selected for. Jones and colleagues were unwilling to rule out the actions of possible bottlenecks, but suggested that temporary climate changes might have affected the selection of traits for various regions, delaying the spread of barley or speeding it, depending on the adaptability of the crop to the region. How Many Domestication Events!? Evidence exists for at least five different loci of domestication: at least three locations in the Fertile Crescent, one in the Syrian desert and one in the Tibetan Plateau. Jones et al. 2013 report additional evidence that in the region of the Fertile Crescent, there may have been up to four different domestication events of Asian wild barley. The differences within groups A-D are based on the presence of alleles which are differently adapted to day length; and the adaptive ability of barley to grow in a wide variety of locations. It could be that the combination of barley types from different regions created increased drought resistance and other beneficial attributes. The DNA analysis reported in 2015 (Poets et al.) identified a genome segment from the Syrian desert variety in Asian and Fertile Crescent barleys; and a segment in northern Mesopotamia in Western and Asian barleys. We do not know, says Allaby in an accompanying essay, how our ancestors produced such genetically diverse crops: but the study should kick off an interesting period towards a better understanding domestication processes in general. Evidence for barley beer making as early as Yangshao Neolithic (ca 5000 years ago) in China was reported in 2016; it seems most likely to have been from the Tibetan Plateau, but that has yet to be determined.à Sites Greece: Dikili TashIsrael: Ohalo IIIran: Ali Kosh, Chogha GolanIraq: JarmoJordan: Ain GhazalCyprus: Klimonas, Kissonerga-MylouthkiaPakistan: MehrgarhPalestine: JerichoSwitzerland: Arbon Bleiche 3Syria: Abu HureyraTurkey: Ãâ¡atalhà ¶yà ¼kTurkmenistan: Jeitun Sources This article is a part of the About.com guide to the Plant Domestication, and the Dictionary of Archaeology.Allaby RG. 2015. Barley domestication: the end of a central dogma? Genome Biology 16(1):176.Badr A, Muller K, Schafer-Pregl R, El Rabey H, Effgen S, Ibrahim HH, Pozzi C, Rohde W, and Salamini F. 2000. On the origin and domestication history of Barley (Hordeum vulgare). Molecular Biology and Evolution 17(4):499-510.Dai F, Chen Z-H, Wang X, Li Z, Jin G, Wu D, Cai S, Wang N, Wu F, Nevo E et al. 2014. Transcriptome profiling reveals mosaic genomic origins of modern cultivated barley. Proceedings of the National Academy of Sciences 111(37):13403-13408.Jones G, Charles MP, Jones MK, Colledge S, Leigh FJ, Lister DA, Smith LMJ, Powell W, Brown TA, and Jones HL. 2013. DNA evidence for multiple introductions of barley into Europe following dispersed domestications in Western Asia. Antiquity 87(337):701-713.Jones G, Jones H, Charles MP, Jones MK, Colledge S, Leigh FJ, Lister DA, Smith LMJ , Powell W, and Brown TA. 2012. Phylogeographic analysis of barley DNA as evidence for the spread of Neolithic agriculture through Europe. Journal of Archaeological Science 39(10):3230-3238. Komatsuda T, Pourkheirandish M, He C, Azhaguvel P, Kanamori H, Perovic D, Stein N, Graner A, Wicker T, Tagiri A et al. 2007. Six-rowed barley originated from a mutation in a homeodomain-leucine zipper I-class homeobox gene. Proceedings of the National Academy of Sciences 104(4):1424-1429. doi:10.1073/pnas.0608580104Lister DL, and Jones MK. 2013. Is naked barley an eastern or a western crop? The combined evidence of archaeobotany and genetics. Vegetation History and Archaeobotany 22(5):439-446. doi: 10.1007/s00334-012-0376-9Morrell PL, and Clegg MT. 2007. Genetic evidence for a second domestication of barley (Hordeum vulgare) east of the Fertile Crescent. Proceedings of the National Academy of Sciences 104:3289-3294.Poets AM, Fang Z, Clegg MT, and Morrell PL. 2015. Barley landraces are characterized by geographically heterogeneous genomic origins. Genome Biology 16(1):1-11.Riehl S, Zeidi M, and Conard NJ. 2013. Emergence of agriculture in the foothills of the Zagros mountains of Iran. Science 341:65-67. Riehl S, Pustovoytov K, Weippert H, Klett S, and Hole F. 2014. Drought stress variability in ancient Near Eastern agricultural systems evidenced by delta13C in barley grain. Proceedings of the National Academy of Sciences 111(34):12348-12353.Wang J, Liu L, Ball T, Yu L, Li Y, and Xing F. 2016. Revealing a 4,000-y-old beer recipe in China. Proceedings of the National Academy of Sciences Early Edition.Zhao Z. 2011. New Archaeobotanic Data for the Study of the Origins of Agriculture in China. Current Anthropology 52(S4):S295-S306.
Wednesday, February 19, 2020
Literary criticism Essay Example | Topics and Well Written Essays - 750 words
Literary criticism - Essay Example Although this seems to complicate the issue unnecessarily, it seems necessary that he explain first why the play is such an international favorite if it has the kind of deep flaws that he criticizes it for. According to Cardullo, what carries the play through its flaws is the strength of its ideas. Its focus on the concept of the quintessential American salesman who does not sell products but instead sells himself, who does not own things but yet purchases them and who does not battle against an enemy but struggles against an impartial system lacking in understanding and compassion is a strong idea that appeals to many within a capitalistic system. After acknowledging the playââ¬â¢s strength, the author then moves on to his criticism, starting with the nuts and bolts of the play. The first element he criticizes is the diction Miller places in the mouths of his characters. Although they are lower middle class and should speak with a well-known diction, they frequently break out of expected vocabulary for this class in unexpected, and often too flowery, ways. This had never particularly struck me as an issue in the play, but as Cardullo quoted some of the statements that are made, it does sound false coming from these characters. Their vocabulary is too fancy and their grammar is too correct for their level of education, their class of life, their living environment and their professional position. Another area in which Cardullo takes offense with the play is in the thematic development. A great deal of the play rests on the idea that Willyââ¬â¢s life is ending in an overall lack of success as a result of a failed business system and a slipping mind. However, as Cardullo points out, there are numerous inconsistencies shown throughout the flashbacks that Willyââ¬â¢s mind has been slipping for a long time, perhaps never having been fully capable. This point is proved as Cardullo traces
Tuesday, February 4, 2020
Answering the three uestions Essay Example | Topics and Well Written Essays - 500 words
Answering the three uestions - Essay Example Fourth, it fails to accommodate the changing needs of the company, the employees, and its customers. In addition, the employees are left to do much of their learning on an individual basis, and are left to find their own way of doing things. Employees feel less a part of the organization, and have less of a sense of value. In the case of Apex, it cost the company thousands of dollars in wasted steel. In a medical setting, an employee may not be updated on the most current laws and could place the company at risk for a lawsuit. In all cases, it results in inefficiency and a lowered standard of quality. Job descriptions are a critical part of a job training program, as they are the foundation that the job is built upon. A comprehensive job description tells the employee what is expected of them and what the position entails. It may elaborate on job requirements and special skills that may be needed. According to Erven, a good job description can, "help to sell jobs to recruits, develop training programs, motivate employees, make evaluation simpler, reduce turnover and reduce chances of litigation" (1). Training is more than just informing an employee how to do the job, or operate the machine.
Monday, January 27, 2020
Business and market analysis of Costco
Business and market analysis of Costco Costco wholesale corporation, is carry a membership of warehouses and sell high quality and national brands to resale and individual who have a membership in low prices, their first operated was on 1983 in Seattle, Washington. Now they have more than 570 warehouse around the world and 22 in United Kingdom. Of course every supermarket has to face a competitive environment but each one have their own strategy to deal with it by looking to their SWOT analysis and PESTEL analysis, also they should focus on their internal, micro macro environments. In this essay I will evaluate how Costco deal with these things. There is no companies can improve and get over if they do not focused on their internal strength and weakness and eternal opportunities and threats which is called SWOT analysis. Strength is looking to their internal capability of recourses and improves it to reach their objectives. According to Chatterjee Costco Annual revenue climbed 9.1 percent to $77.95 billion from $71.42 billion. In 2010 Costco were the 3th largest retailer in the USA and the 8th in the world. They offer a high quality of products with a big name, for example Sony, Microsoft, nestle and Kelloggs and numbers of co-brands such as Starbucks and Disney instead of their own brand which is called Kirkland in a low prices. They have over 60 million of cardholders also they are Goodwill with excellent employees. There were some advantages for Costco to their own brand; they can control their prices, packaging and the quality. Weakness is limitation that may prevent company to achieve their objectives, Costco weakness t hat you can find store in certain area and you cannot buy from the store if you are not a member in Costco club. Opportunity is an external positive factor that may bring advantages to the company, in UK Costco aims to open 40 warehouses around the country this will be good opportunity to them because they can reach large numbers of new loyal customers. Also they offer a Varity numbers of goods holding their own brand name, Costco noticed that most of their customer buys Toilet paper with annual sales of 375 millions. Every year to every two years, we try to upgrade the quality of this product, Rose explained. Make it softer, make it stronger, everything that we can do to just make it a better quality product and our members, you know, obviously the reward is with the sales on this item. (DONVAN and HERMAN, 2008). Threats is an external negative situation can face the company and break their performance and they should minimize it, when Costco decide to open their store in the UK an d get their approval to open their two stores and pay millions to develop their sits. The big three supermarkets Sainsbury, Tesco and Safeway tried to stop opening programs of Costco by going to the High Court and then to the Appeal Court to contest the councils decision. (KILBURN, 1992), they argued that Costco is retailers not wholesalers and the customer should pay fees to be members in Costco, so they should treat as retailers treated in UK. They were worried because Costco had succeeded in 17 years in USA and they sell everything from grocery to computers and pharmacy, also they sell up to 50% cheaper than other outlets in USA. Companies also will face an external environment that they cannot stop it or control it such as macroenvironment. There is also a microenvironment and both of them bring opportunities and threats to the company. Ecological/physical environmental forces is one of macroenvironment analysis is to protect the environment by producing products that not heart the natural. In Costco they produced their packaging from recycled polyester. The social forces give the company good image and predict the size and growth rates of marketing throughout charities and helping people go over in live by finding work and protect them from poverty. The plan of Costco to open 40 stores in UK which each store will employs 150 workers this will help to reduce unemployment also Costco and Highland Spring work together to support BBC children in need by selling a great pack for kid to keep them hydrated throughout the day, every 24 pack they sell 20p of it going to charity. Now technology become as lifeblood we cannot live without it, we can see the technology anywhere and everywhere, in the house, work, roadà ¢Ã¢â ¬Ã ¦etc. Costco start using internet shopping from few years ago operated and updated by Microsoft windows sever system, their revenue through website was under $100 million within three years and now their revenue through website is $640 million. The microenvironment consists of the actors in the firms immediate environment or business system that affect its capabilities to operate effectively in its chosen markets. (Jobber and Fahy, 2009) Its include four key actors are customer which company should satisfy their needs and wants by understanding their behavior, 90 percent of Costco customer are loyal and renew their membership year after year also the thing that keep the customer loyal that Costco offer them high quality products and low price with return policy with full refund if they are not happy with what they buy, looking to the important of customer satisfaction. Competition is study of customer behavior not enough to success, company should know their competitors because they affect the company plans, and for example if they offering a lower price or making promotion, this may lead your customers turn to their side. The company should study and know their competitors strength, weakness, opportunities and threats. Cos tco biggest competitors in UK Tesco, Asda, Sainsbury, and Safeway. Costco deal with competitors by offering high quality products in bulk with a low price, good treat from customer service these lead to build their brand name in UK and get customer loyalty. Distributors are to offer the products in right price, place and time to meet customer needs and wants, distributor lead to reduce supplier profitability. Costco introduce 4000 unique products in each store from groceries to the televisions and computers. Costco buy direct from the manufactures that allows warehouses not delay in receiving the products and give the customers the opportunity to purchase as quickly as possible. Suppliers who provide supply and material to the company to produce goods and services, suppliers can bring problems to the companies if they have shortage or delay of producing on time because this will damage the customer satisfaction, usually companies treat their suppliers as a partner, if the supplies w ere powerful and increasing the cost of supply this will lead to push the price up. Companies should monitor supply availability, such as shortages due to labour strikes or political factors, as these can cause customer dissatisfaction and lost sales. (Jobber, 2010). Costco and their suppliers gain maximum administrative efficiency, reduce shared expenses and improve system accountability. (Peters, 2003). Companies should focused on all of the four actors of microenvironment analysis because this will help them to explode their opportunities and reduce threats. Internal environment is performance and activities of a business to be assessed in the light of environmental developments.(Jobber and Fahy, 2009). It based on finance and accounting which is depending on budget that helps the marketing to achieve its objectives. Costco financial records of the fourth quarters of 2010 was net Property and Equipment $11,314(MMs).Research and development (RD) looking for products that bring customers attention and develop safe design. Costco every one or two years developed their products specially products on demand. Purchasing, companies looking for suppliers and good materials. As we mention above that Costco offers 4000 high quality items in each stores with a low price, up to 50% lower than their competitors. Production is producing products with good quality and materials. In conclusion, Costco became a worldwide wholesales in few years. They were focusing on their performance to reach their objectives, by improving their internal environment and strength, explode their opportunities and minimize threats by focusing on the macroenvironment and microenvironment.
Sunday, January 19, 2020
Lester B. Pearson Essay
Canada, a nation that stretches from sea to sea with rich natural resources, economic stability, and persisting technological developments, a prosperous nation fabricated by great leaders, one of them being Lester B.Pearson. He was a Canadian professor, historian, civil servant, statesman, diplomat, and politician who won a Nobel Prize for Peace in 1957 for resolving the Suez Canal crisis.1 He served as the 14th Prime Minister of Canada, in which his liberal minority government ââ¬Å"left Canadians with a legacy of peacekeeping, humanitarianism and a strong sense of international responsibility that lives on to this day.â⬠2 His introduction of the Royal Commission on Bilingualism and Biculturalism had brought sweeping changes to the language policy in Canada, making it the bilingual country it is today. The red and white flag in which Canada is recognized by, was introduced by Pearson, that ââ¬Å"represents all the citizens of Canada without distinction of race, language, beli ef or opinion.â⬠3 He is the most influential Canadian of the 20th century because he pursued social welfare programs, promoted peace, and the unity of a diverse ethnic nation. For five years in office, Pearson implemented programs long discussed, but never adopted. Among them included, but is not limited to Medical care, pensions, education, and a generalized ââ¬Å"war on povertyâ⬠. The Medicare act expanded the policy of the Hospital Insurance and Diagnostic Services Act to universal health care. Under the terms of this act, all ââ¬Å"insured personsâ⬠are entitled to receive ââ¬Å"insured servicesâ⬠without copayment in which Ottawa would pay for 50% of provincial health costs.4 Prior to this point, doctors could charge what they wanted and bankruptcy to pay for health care was common. Reference The Nobel Foundation , Nobelprize. Last modified 2013. Accessed February 21, 2014. http:// www.nobelprize.org/nobel_prizes/peace/laureates/1957/pearson-bio.html. 2 Leung , John. Lester B. Pearson, the Greatest Canadian. Gautlet, , sec. Opinions, November 11, 2004. http://www.thegauntlet.ca/story/lester-b-pearson-greatest-canadian (accessed February 22, 2014). 3 Government of Canada, National Flag of Canada. Last modified August 30, 2013.Accessed February 24, 2014. http://www.pch.gc.ca/eng/1363356053583/1363342021822. 4 Government of Canada, Canada Health Care System (Medicare). Last modified December 9, 2012. Accessed February 22, 2014. http://www.hc-sc.gc.ca/hcs-sss/medi-assur/index-eng.php. Chong 3 Towards social welfare in Canada is not limited to Medicare, but he also introduced the Canadian Pension Plan and Student loans during his time as Prime Minister. The Canadian Pension Plan is a social insurance program that provides pensions and benefits when contributors retire, become disabled, or die. When it was first established, contribution rates were set at 1.8% of an employeeââ¬â¢s gross income per year, with a maximum contribution limit.5 Pearson also introduced student loans which allow easily accessible loans for post-secondary students who demonstrates financial need; it is a quick way of obtaining money. Without this type of credit, there would be fewer resources available to students or their families. Access to education for individuals can potentially end their family roots of poverty as education enables a greater opportunity for higher salaries and career opportunities. Lester B. Pearson has ultimately helped to improve the lives of Canadians because he introduc ed Medicare, the Canadian Pension Plan, and Student loans which represent the high point of the Canadian welfare state thatà generations of social thinkers had dreamed about. Lester B. Pearson has established Canadaââ¬â¢s reputation as a nation dedicated in ensuring world peace as demonstrated through his work at the United Nations, dealing with the Suez Crisis. The Suez Crisis is considered to be ââ¬Å"one of the most controversial and convulsive episodes of the 20th century.â⬠7 It was a diplomatic and military confrontation in 1956 that shattered the unity of the Western alliance, divided the Commonwealth, undermined the United Nations and threatened to bring the Middle East in a large-scale war. Although Canada had no direct economic, military or political involvement, Lester B. Pearson became one of the most influential figure in resolving this issue. He proposed the worldââ¬â¢s first ever large-scale peacekeeping force, realizing that ââ¬Å"Peace is far more than ceasing to fire.â⬠8 He managed to The Nobel Foundation Persuade the world assembly through his decades of experience and vast web ofà connections to make this a reality. A year later in 1957, Pearson was awarded with the Nobel Peace Prize, making him the first Canadian recipient of this award. As a result of his role in creating the United Nations first modern peacekeeping force, he pointed the way to the future of the United Nations sponsored peacekeeping missions that would become the proud centerpiece of Canadaââ¬â¢s military and diplomatic activities around the world. From the creation of the national flag of Canada to establishing the Royal Commission on Bilingualism and Biculturalism, Lester B. Pearson has helped to unite people of ethnic diversity in Canada. Pearson introduced the new national flag of Canada, which is truly ââ¬Å"a symbol of the nationââ¬â¢s unity, for it, beyond any doubt, represents all the citizens of Canada without distinction of race, language, belief or opinion,â⬠stated by the Honorable Maurice Bourget, Speaker of the Senate.9 However, the change came at the cost of an ensuing controversy over on the flag design, not whether there should be a new flag. Where some individuals such as John Diefenbaker demanded that the flag should honor the ââ¬Å"founding racesâ⬠with the Union Jack, Pearson insisted on a design symbolizing allegiance to Canada and devoid of colonial association.10 One of the most influential commissions in Canadian history was the Royal Commission on bilingualism and Biculturalism which brought great changes to the federal and provincial language policy. Lester B Pearson superseded it to ââ¬Å"inquire into and report upon the existing state of bilingualism and biculturalism in Canadaâ⬠in response to the growing unrest among French Canadians in Quebec.11 As a result, this commission has made Canada the bilingual nation it is today. Through heated debates over changing the Canadian flag and superficial chaos of the Royal Commission In conclusion, Lester B. Pearson is the most is the most influential Canadian of the 20th century because he pursued social welfare programs, promoted peace, and the unity of a diverse ethnic nation. During his term a Prime Minister, his Liberal minority government implemented programs that was a generalized ââ¬Å"war on povertyâ⬠through his introduction of the Canadian Pensions Plan, Medicare, and student loans. As the president of the United Nations General Assembly, his solution of establishing a peacekeeping force has ultimately resolved the Suez Canal Crisis, in which he was awarded the Nobel Prize for Peace as a result. Pearson has also made Canada the bilingual nation that it is today through the Royal Commission on bilingualism and Biculturalism, in response to disputes in amongst French Canadians in Quebec. The national flag of Canada in which Canadians live under ââ¬Å"represents all the citizens of Canada without distinction of race, language, belief or opinion.â⠬ 13 Lester B. Pearson has left Canadians with a legacy of peacekeeping, humanitarianism and a strong sense of international responsibility that lives on to this day.
Friday, January 10, 2020
Recovery System Dbms
17. Recovery System in DBMS ââ¬â Presentation Transcript 1. Chapter 17: Recovery System * Failure Classification * Storage Structure * Recovery and Atomicity * Log-Based Recovery * Shadow Paging * Recovery With Concurrent Transactions * Buffer Management * Failure with Loss of Nonvolatile Storage * Advanced Recovery Techniques * ARIES Recovery Algorithm * Remote Backup Systems 2. Failure Classification * Transaction failure : * Logical errors : transaction cannot complete due to some internal error condition * System errors : the database system must terminate an active transaction due to an error condition (e. . , deadlock) * System crash : a power failure or other hardware or software failure causes the system to crash. * Fail-stop assumption : non-volatile storage contents are assumed to not be corrupted by system crash * Database systems have numerous integrity checks to prevent corruption of disk data * Disk failure : a head crash or similar disk failure destroys all or part of disk storage * Destruction is assumed to be detectable: disk drives use checksums to detect failures 3. Recovery Algorithms Recovery algorithms are techniques to ensure database consistency and transaction atomicity and durability despite failures * Focus of this chapter * Recovery algorithms have two parts * Actions taken during normal transaction processing to ensure enough information exists to recover from failures * Actions taken after a failure to recover the database contents to a state that ensures atomicity, consistency and durability 4. Storage Structure * Volatile storage : * does not survive system crashes * examples: main memory, cache memory * Nonvolatile storage : survives system crashes * examples: disk, tape, flash memory, non-volatile (battery backed up) RAM * Stable storage : * a mythical form of storage that survives all failures * approximated by maintaining multiple copies on distinct nonvolatile media 5. Stable-Storage Implementation * Maintain multiple co pies of each block on separate disks * copies can be at remote sites to protect against disasters such as fire or flooding. * Failure during data transfer can still result in inconsistent copies: Block transfer can result in * Successful completion Partial failure: destination block has incorrect information * Total failure: destination block was never updated * Protecting storage media from failure during data transfer (one solution): * Execute output operation as follows (assuming two copies of each block): * Write the information onto the first physical block. * When the first write successfully completes, write the same information onto the second physical block. * The output is completed only after the second write successfully completes. 6.Stable-Storage Implementation (Cont. ) * Protecting storage media from failure during data transfer (cont. ): * Copies of a block may differ due to failure during output operation. To recover from failure: * First find inconsistent blocks: * Expensive solution : Compare the two copies of every disk block. * Better solution : * Record in-progress disk writes on non-volatile storage (Non-volatile RAM or special area of disk). * Use this information during recovery to find blocks that may be inconsistent, and only compare copies of these. Used in hardware RAID systems * If either copy of an inconsistent block is detected to have an error (bad checksum), overwrite it by the other copy. If both have no error, but are different, overwrite the second block by the first block. 7. Data Access * Physical blocks are those blocks residing on the disk. * Buffer blocks are the blocks residing temporarily in main memory. * Block movements between disk and main memory are initiated through the following two operations: * input ( B ) transfers the physical block B to main memory. output ( B ) transfers the buffer block B to the disk, and replaces the appropriate physical block there. * Each transaction T i has its private work-area in which local copies of all data items accessed and updated by it are kept. * T i ââ¬Ës local copy of a data item X is called x i . * We assume, for simplicity, that each data item fits in, and is stored inside, a single block. 8. Data Access (Cont. ) * Transaction transfers data items between system buffer blocks and its private work-area using the following operations : * read ( X ) assigns the value of data item X to the local variable x i . write ( X ) assigns the value of local variable x i to data item { X } in the buffer block. * both these commands may necessitate the issue of an input (B X ) instruction before the assignment, if the block B X in which X resides is not already in memory. * Transactions * Perform read ( X ) while accessing X for the first time; * All subsequent accesses are to the local copy. * After last access, transaction executes write ( X ). * output ( B X ) need not immediately follow write ( X ).System can perform the output operation when it deems fi t. 9. Example of Data Access x Y A B x 1 y 1 buffer Buffer Block A Buffer Block B input(A) output(B) read(X) write(Y) disk work area of T 1 work area of T 2 memory x 2 10. Recovery and Atomicity * Modifying the database without ensuring that the transaction will commit may leave the database in an inconsistent state. * Consider transaction T i that transfers $50 from account A to account B ; goal is either to perform all database modifications made by T i or none at all. Several output operations may be required for T i (to output A and B ). A failure may occur after one of these modifications have been made but before all of them are made. 11. Recovery and Atomicity (Cont. ) * To ensure atomicity despite failures, we first output information describing the modifications to stable storage without modifying the database itself. * We study two approaches: * log-based recovery , and * shadow-paging * We assume (initially) that transactions run serially, that is, one after the other. 12 . Log-Based Recovery A log is kept on stable storage. * The log is a sequence of log records , and maintains a record of update activities on the database. * When transaction T i starts, it registers itself by writing a ;T i start ;log record * Before T i executes write ( X ), a log record ;T i , X, V 1 , V 2 ; is written, where V 1 is the value of X before the write, and V 2 is the value to be written to X . * Log record notes that T i has performed a write on data item X j X j had value V 1 before the write, and will have value V 2 after the write. When T i finishes it last statement, the log record ; T i commi t; is written. * We assume for now that log records are written directly to stable storage (that is, they are not buffered) * Two approaches using logs * Deferred database modification * Immediate database modification 13. Deferred Database Modification * The deferred database modification scheme records all modifications to the log, but defers all the write s to after part ial commit. * Assume that transactions execute serially Transaction starts by writing ;T i start ; record to log. * A write ( X ) operation results in a log record ;T i , X, V; being written, where V is the new value for X * Note: old value is not needed for this scheme * The write is not performed on X at this time, but is deferred. * When T i partially commits, ; T i commit ; is written to the log * Finally, the log records are read and used to actually execute the previously deferred writes. 14. Deferred Database Modification (Cont. ) During recovery after a crash, a transaction needs to be redone if and only if both ;T i start ; and; T i commit ; are there in the log. * Redoing a transaction T i ( redo T i ) sets the value of all data items updated by the transaction to the new values. * Crashes can occur while * the transaction is executing the original updates, or * while recovery action is being taken * example transactions T 0 and T 1 ( T 0 executes before T 1 ): * T 0 : rea d ( A ) T 1 : read ( C ) * A: ââ¬â A ââ¬â 50 C:- C- 100 Write ( A ) write ( C ) * read ( B ) * B:- B + 50 * write ( B ) 15. Deferred Database Modification (Cont. ) * Below we show the log as it appears at three instances of time. * If log on stable storage at time of crash is as in case: * (a) No redo actions need to be taken * (b) redo( T 0 ) must be performed since ; T 0 commi t; is present * (c) redo ( T 0 ) must be performed followed by redo( T 1 ) since * ; T 0 commit ; and ; T i commit; are present 16. Immediate Database Modification The immediate database modification scheme allows database updates of an uncommitted transaction to be made as the writes are issued * since undoing may be needed, update logs must have both old value and new value * Update log record must be written before database item is written * We assume that the log record is output directly to stable storage * Can be extended to postpone log record output, so long as prior to execution of an output ( B ) operation for a data block B, all log records corresponding to items B must be flushed to stable storage * Output of updated blocks can take place at any time before or after transaction commit * Order in which blocks are output can be different from the order in which they are written. 17. Immediate Database Modification Example * Log Write Output * ; T 0 start ; ; T 0 , A, 1000, 950; * T o , B, 2000, 2050 * A = 950 * B = 2050 * ; T 0 commit ; * ; T 1 start ; * ; T 1 , C, 700, 600; * C = 600 * B B , B C * ; T 1 commit ; * B A * Note: B X denotes block containing X . x 1 18. Immediate Database Modification (Cont. ) * Recovery procedure has two operations instead of one: * undo ( T i ) restores the value of all data items updated by T i to their old values, going backwards from the last log record for T i * redo ( T i ) sets the value of all data items updated by T i to the new values, going forward from the first log record for T i * Both operations must be idempotent That is , even if the operation is executed multiple times the effect is the same as if it is executed once * Needed since operations may get re-executed during recovery * When recovering after failure: * Transaction T i needs to be undone if the log contains the record ;T i start ; , but does not contain the record ;T i commit ; . * Transaction T i needs to be redone if the log contains both the record ;T i start ; and the record ;T i commit ; . * Undo operations are performed first, then redo operations. 19. Immediate DB Modification Recovery Example * Below we show the log as it appears at three instances of time. * Recovery actions in each case above are: * (a) undo ( T 0 ): B is restored to 2000 and A to 1000. (b) undo ( T 1 ) and redo ( T 0 ): C is restored to 700, and then A and B are * set to 950 and 2050 respectively. * (c) redo ( T 0 ) and redo ( T 1 ): A and B are set to 950 and 2050 * respectively. Then C is set to 600 20. Checkpoints * Problems in recovery procedure as discusse d earlier : * searching the entire log is time-consuming * we might unnecessarily redo transactions which have already * output their updates to the database. * Streamline recovery procedure by periodically performing checkpointing * Output all log records currently residing in main memory onto stable storage. * Output all modified buffer blocks to the disk. * Write a log record ; checkpoint ; onto stable storage. 1. Checkpoints (Cont. ) * During recovery we need to consider only the most recent transaction T i that started before the checkpoint, and transactions that started after T i . * Scan backwards from end of log to find the most recent ; checkpoint ; record * Continue scanning backwards till a record ;T i start ; is found. * Need only consider the part of log following above star t record. Earlier part of log can be ignored during recovery, and can be erased whenever desired. * For all transactions (starting from T i or later) with no ;T i commit ; , execute undo ( T i ). (D one only in case of immediate modification. * Scanning forward in the log, for all transactions starting from T i or later with a ;T i commit ; , execute redo ( T i ). 22. Example of Checkpoints * T 1 can be ignored (updates already output to disk due to checkpoint) * T 2 and T 3 redone. * T 4 undone T c T f T 1 T 2 T 3 T 4 checkpoint system failure 23. Shadow Paging * Shadow paging is an alternative to log-based recovery; this scheme is useful if transactions execute serially * Idea: maintain two page tables during the lifetime of a transaction ââ¬âthe current page table , and the shadow page table * Store the shadow page table in nonvolatile storage, such that state of the database prior to transaction execution may be recovered. Shadow page table is never modified during execution * To start with, both the page tables are identical. Only current page table is used for data item accesses during execution of the transaction. * Whenever any page is about to be written for the fi rst time * A copy of this page is made onto an unused page. * The current page table is then made to point to the copy * The update is performed on the copy 24. Sample Page Table 25. Example of Shadow Paging Shadow and current page tables after write to page 4 26. Shadow Paging (Cont. ) * To commit a transaction : * 1. Flush all modified pages in main memory to disk * 2. Output current page table to disk * 3.Make the current page table the new shadow page table, as follows: * keep a pointer to the shadow page table at a fixed (known) location on disk. * to make the current page table the new shadow page table, simply update the pointer to point to current page table on disk * Once pointer to shadow page table has been written, transaction is committed. * No recovery is needed after a crash ââ¬â new transactions can start right away, using the shadow page table. * Pages not pointed to from current/shadow page table should be freed (garbage collected). 27. Show Paging (Cont. ) * A dvantages of shadow-paging over log-based schemes * no overhead of writing log records * recovery is trivial * Disadvantages : * Copying the entire page table is very expensive Can be reduced by using a page table structured like a B + -tree * No need to copy entire tree, only need to copy paths in the tree that lead to updated leaf nodes * Commit overhead is high even with above extension * Need to flush every updated page, and page table * Data gets fragmented (related pages get separated on disk) * After every transaction completion, the database pages containing old versions of modified data need to be garbage collected * Hard to extend algorithm to allow transactions to run concurrently * Easier to extend log based schemes 28. Recovery With Concurrent Transactions * We modify the log-based recovery schemes to allow multiple transactions to execute concurrently. * All transactions share a single disk buffer and a single log * A buffer block can have data items updated by one or more transactions * We assume concurrency control using strict two-phase locking; * i. e. the updates of uncommitted transactions should not be visible to other transactions * Otherwise how to perform undo if T1 updates A, then T2 updates A and commits, and finally T1 has to abort? * Logging is done as described earlier. Log records of different transactions may be interspersed in the log. * The checkpointing technique and actions taken on recovery have to be changed * since several transactions may be active when a checkpoint is performed. 29. Recovery With Concurrent Transactions (Cont. ) * Checkpoints are performed as before, except that the checkpoint log record is now of the form ; checkpoint L ; where L is the list of transactions active at the time of the checkpoint * We assume no updates are in progress while the checkpoint is carried out (will relax this later) * When the system recovers from a crash, it first does the following: * Initialize undo-list and redo-list to empt y Scan the log backwards from the end, stopping when the first ; checkpoint L ; record is found. For each record found during the backward scan: * if the record is ; T i commit ;, add T i to redo-list * if the record is ; T i start ;, then if T i is not in redo-list , add T i to undo-list * For every T i in L , if T i is not in redo-list , add T i to undo-list 30. Recovery With Concurrent Transactions (Cont. ) * At this point undo-list consists of incomplete transactions which must be undone, and redo-list consists of finished transactions that must be redone. * Recovery now continues as follows: Scan log backwards from most recent record, stopping when ; T i start ; records have been encountered for every T i in undo-list . * During the scan, perform undo for each log record that belongs to a transaction in undo-list . * Locate the most recent ; checkpoint L ; record. * Scan log forwards from the ; checkpoint L ; record till the end of the log. * During the scan, perform redo for e ach log record that belongs to a transaction on redo-list 31. Example of Recovery * Go over the steps of the recovery algorithm on the following log: * ; T 0 star t; * ; T 0 , A , 0, 10; * ; T 0 commit ; * ; T 1 start ; * ; T 1 , B , 0, 10; ; T 2 start ; /* Scan in Step 4 stops here */ * ; T 2 , C , 0, 10; * ; T 2 , C , 10, 20; * ;checkpoint { T 1 , T 2 }; * ; T 3 start ; * ; T 3 , A , 10, 20; * ; T 3 , D , 0, 10; * ; T 3 commit ; 32. Log Record Buffering * Log record buffering : log records are buffered in main memory, instead of of being output directly to stable storage. * Log records are output to stable storage when a block of log records in the buffer is full, or a log force operation is executed. * Log force is performed to commit a transaction by forcing all its log records (including the commit record) to stable storage. Several log records can thus be output using a single output operation, reducing the I/O cost. 33. Log Record Buffering (Cont. ) * The rules below must be followed if log records are buffered: * Log records are output to stable storage in the order in which they are created. * Transaction T i enters the commit state only when the log record ; T i commit ; has been output to stable storage. * Before a block of data in main memory is output to the database, all log records pertaining to data in that block must have been output to stable storage. * This rule is called the write-ahead logging or WAL rule * Strictly speaking WAL only requires undo information to be output 34. Database Buffering Database maintains an in-memory buffer of data blocks * When a new block is needed, if buffer is full an existing block needs to be removed from buffer * If the block chosen for removal has been updated, it must be output to disk * As a result of the write-ahead logging rule, if a block with uncommitted updates is output to disk, log records with undo information for the updates are output to the log on stable storage first. * No updates should be i n progress on a block when it is output to disk. Can be ensured as follows. * Before writing a data item, transaction acquires exclusive lock on block containing the data item * Lock can be released once the write is completed. * Such locks held for short duration are called latches . Before a block is output to disk, the system acquires an exclusive latch on the block * Ensures no update can be in progress on the block 35. Buffer Management (Cont. ) * Database buffer can be implemented either * in an area of real main-memory reserved for the database, or * in virtual memory * Implementing buffer in reserved main-memory has drawbacks: * Memory is partitioned before-hand between database buffer and applications, limiting flexibility. * Needs may change, and although operating system knows best how memory should be divided up at any time, it cannot change the partitioning of memory. 36. Buffer Management (Cont. ) Database buffers are generally implemented in virtual memory in spite of some drawbacks: * When operating system needs to evict a page that has been modified, to make space for another page, the page is written to swap space on disk. * When database decides to write buffer page to disk, buffer page may be in swap space, and may have to be read from swap space on disk and output to the database on disk, resulting in extra I/O! * Known as dual paging problem. * Ideally when swapping out a database buffer page, operating system should pass control to database, which in turn outputs page to database instead of to swap space (making sure to output log records first) * Dual paging can thus be avoided, but common operating systems do not support such functionality. 37. Failure with Loss of Nonvolatile Storage So far we assumed no loss of non-volatile storage * Technique similar to checkpointing used to deal with loss of non-volatile storage * Periodically dump the entire content of the database to stable storage * No transaction may be active during the dump p rocedure; a procedure similar to checkpointing must take place * Output all log records currently residing in main memory onto stable storage. * Output all buffer blocks onto the disk. * Copy the contents of the database to stable storage. * Output a record ; dump ; to log on stable storage. * To recover from disk failure * restore database from most recent dump. Consult the log and redo all transactions that committed after the dump * Can be extended to allow transactions to be active during dump; known as fuzzy dump or online dump * Will study fuzzy checkpointing later 38. Advanced Recovery Algorithm 39. Advanced Recovery Techniques * Support high-concurrency locking techniques, such as those used for B + -tree concurrency control * Operations like B + -tree insertions and deletions release locks early. * They cannot be undone by restoring old values ( physical undo ), since once a lock is released, other transactions may have updated the B + -tree. * Instead, insertions (resp. el etions) are undone by executing a deletion (resp. insertion) operation (known as logical undo ). * For such operations, undo log records should contain the undo operation to be executed * called logical undo logging , in contrast to physical undo logging . * Redo information is logged physically (that is, new value for each write) even for such operations * Logical redo is very complicated since database state on disk may not be ââ¬Å"operation consistentâ⬠40. Advanced Recovery Techniques (Cont. ) * Operation logging is done as follows: * When operation starts, log ; T i , O j , operation-begin ;. Here O j is a unique identifier of the operation instance. While operation is executing, normal log records with physical redo and physical undo information are logged. * When operation completes, ; T i , O j , operation-end , U; is logged, where U contains information needed to perform a logical undo information. * If crash/rollback occurs before operation completes: * the operatio n-end log record is not found, and * the physical undo information is used to undo operation. * If crash/rollback occurs after the operation completes: * the operation-end log record is found, and in this case * logical undo is performed using U ; the physical undo information for the operation is ignored. Redo of operation (after crash) still uses physical redo information . 41. Advanced Recovery Techniques (Cont. ) * Rollback of transaction T i is done as follows: * Scan the log backwards * If a log record ; T i , X, V 1 , V 2 ; is found, perform the undo and log a special redo-only log record ; T i , X, V 1 ;. * If a ; T i , O j , operation-end , U ; record is found * Rollback the operation logically using the undo information U . * Updates performed during roll back are logged just like during normal operation execution. * At the end of the operation rollback, instead of logging an operation-end record, generate a record * ; T i , O j , operation-abort ;. Skip all preceding log records for T i until the record ; T i , O j operation-begin ; is found 42. Advanced Recovery Techniques (Cont. ) * Scan the log backwards (cont. ): * If a redo-only record is found ignore it * If a ; T i , O j , operation-abort ; record is found: * skip all preceding log records for T i until the record ; T i , O j , operation-begi n; is found. * Stop the scan when the record ; T i , start; is found * Add a ; T i , abort ; record to the log * Some points to note: * Cases 3 and 4 above can occur only if the database crashes while a transaction is being rolled back. Skipping of log records as in case 4 is important to prevent multiple rollback of the same operation. 43. Advanced Recovery Techniques(Cont,) * The following actions are taken when recovering from system crash * Scan log forward from last ; checkpoint L ; record * Repeat history by physically redoing all updates of all transactions, * Create an undo-list during the scan as follows * undo-list is set to L initially * Whene ver ; T i start ; is found T i is added to undo-list * Whenever ; T i commit ; or ; T i abort ; is found, T i is deleted from undo-list * This brings database to state as of crash, with committed as well as uncommitted transactions having been redone. Now undo-list contains transactions that are incomplete , that is, have neither committed nor been fully rolled back. 44. Advanced Recovery Techniques (Cont. ) * Recovery from system crash (cont. ) * Scan log backwards, performing undo on log records of transactions found in undo-list . * Transactions are rolled back as described earlier. * When ; T i start ; is found for a transaction T i in undo-list , write a ; T i abort ; log record. * Stop scan when ; T i start ; records have been found for all T i in undo-list * This undoes the effects of incomplete transactions (those with neither commit nor abort log records). Recovery is now complete. 45. Advanced Recovery Techniques (Cont. ) * Checkpointing is done as follows: Output all log records in memory to stable storage * Output to disk all modified buffer blocks * Output to log on stable storage a ; checkpoint L ; record. * Transactions are not allowed to perform any actions while checkpointing is in progress. * Fuzzy checkpointing allows transactions to progress while the most time consuming parts of checkpointing are in progress * Performed as described on next slide 46. Advanced Recovery Techniques (Cont. ) * Fuzzy checkpointing is done as follows: * Temporarily stop all updates by transactions * Write a ; checkpoint L ; log record and force log to stable storage * Note list M of modified buffer blocks Now permit transactions to proceed with their actions * Output to disk all modified buffer blocks in list M * blocks should not be updated while being output * Follow WAL: all log records pertaining to a block must be output before the block is output * Store a pointer to the checkpoint record in a fixed position last _ checkpoint on disk * When recovering usin g a fuzzy checkpoint, start scan from the checkpoint record pointed to by last _ checkpoint * Log records before last _ checkpoint have their updates reflected in database on disk, and need not be redone. * Incomplete checkpoints, where system had crashed while performing checkpoint, are handled safely 47. ARIES Recovery Algorithm 48. ARIES * ARIES is a state of the art recovery method * Incorporates numerous optimizations to reduce overheads during normal processing and to speed up recovery * The ââ¬Å"advanced recovery algorithmâ⬠we studied earlier is modeled after ARIES, but greatly simplified by removing optimizations * Unlike the advanced recovery lgorithm, ARIES * Uses log sequence number (LSN) to identify log records * Stores LSNs in pages to identify what updates have already been applied to a database page * Physiological redo * Dirty page table to avoid unnecessary redos during recovery * Fuzzy checkpointing that only records information about dirty pages, and does not require dirty pages to be written out at checkpoint time * More coming up on each of the above â⬠¦ 49. ARIES Optimizations * Physiological redo * Affected page is physically identified, action within page can be logical * Used to reduce logging overheads * e. g. hen a record is deleted and all other records have to be moved to fill hole * Physiological redo can log just the record deletion * Physical redo would require logging of old and new values for much of the page * Requires page to be output to disk atomically * Easy to achieve with hardware RAID, also supported by some disk systems * Incomplete page output can be detected by checksum techniques, * But extra actions are required for recovery * Treated as a media failure 50. ARIES Data Structures * Log sequence number (LSN) identifies each log record * Must be sequentially increasing * Typically an offset from beginning of log file to allow fast access * Easily extended to handle multiple log files Each page contains a PageLSN which is the LSN of the last log record whose effects are reflected on the page * To update a page: * X-latch the pag, and write the log record * Update the page * Record the LSN of the log record in PageLSN * Unlock page * Page flush to disk S-latches page * Thus page state on disk is operation consistent * Required to support physiological redo * PageLSN is used during recovery to prevent repeated redo * Thus ensuring idempotence 51. ARIES Data Structures (Cont. ) * Each log record contains LSN of previous log record of the same transaction * LSN in log record may be implicit Special redo-only log record called compensation log record (CLR) used to log actions taken during recovery that never need to be undone * Also serve the role of operation-abort log records used in advanced recovery algorithm * Have a field UndoNextLSN to note next (earlier) record to be undone * Records in between would have already been undone * Required to avoid repeated undo of already undone acti ons LSN TransId PrevLSN RedoInfo UndoInfo LSN TransID UndoNextLSN RedoInfo 52. ARIES Data Structures (Cont. ) * DirtyPageTable * List of pages in the buffer that have been updated * Contains, for each such page * PageLSN of the page RecLSN is an LSN such that log records before this LSN have already been applied to the page version on disk * Set to current end of log when a page is inserted into dirty page table (just before being updated) * Recorded in checkpoints, helps to minimize redo work * Checkpoint log record * Contains: * DirtyPageTable and list of active transactions * For each active transaction, LastLSN, the LSN of the last log record written by the transaction * Fixed position on disk notes LSN of last completed checkpoint log record 53. ARIES Recovery Algorithm * ARIES recovery involves three passes * Analysis pass : Determines Which transactions to undo * Which pages were dirty (disk version not up to date) at time of crash * RedoLSN : LSN from which redo should start * Redo pass : * Repeats history, redoing all actions from RedoLSN * RecLSN and PageLSNs are used to avoid redoing actions already reflected on page * Undo pass : * Rolls back all incomplete transactions * Transactions whose abort was complete earlier are not undone * Key idea: no need to undo these transactions: earlier undo actions were logged, and are redone as required 54. ARIES Recovery: Analysis * Analysis pass * Starts from last complete checkpoint log record Reads in DirtyPageTable from log record * Sets RedoLSN = min of RecLSNs of all pages in DirtyPageTable * In case no pages are dirty, RedoLSN = checkpoint recordââ¬â¢s LSN * Sets undo-list = list of transactions in checkpoint log record * Reads LSN of last log record for each transaction in undo-list from checkpoint log record * Scans forward from checkpoint * .. On next page â⬠¦ 55. ARIES Recovery: Analysis (Cont. ) * Analysis pass (cont. ) * Scans forward from checkpoint * If any log record found for transaction not in undo-list, adds transaction to undo-list * Whenever an update log record is found If page is not in DirtyPageTable, it is added with RecLSN set to LSN of the update log record * If transaction end log record found, delete transaction from undo-list * Keeps track of last log record for each transaction in undo-list * May be needed for later undo * At end of analysis pass: * RedoLSN determines where to start redo pass * RecLSN for each page in DirtyPageTable used to minimize redo work * All transactions in undo-list need to be rolled back 56. ARIES Redo Pass * Redo Pass: Repeats history by replaying every action not already reflected in the page on disk, as follows: * Scans forward from RedoLSN. Whenever an update log record is found: * If the page is not in DirtyPageTable or the LSN of the log record is less than the RecLSN of the page in DirtyPageTable, then skip the log record * Otherwise fetch the page from disk.If the PageLSN of the page fetched from disk is less than the LSN of the log record, redo the log record * NOTE: if either test is negative the effects of the log record have already appeared on the page. First test avoids even fetching the page from disk! 57. ARIES Undo Actions * When an undo is performed for an update log record * Generate a CLR containing the undo action performed (actions performed during undo are logged physicaly or physiologically). * CLR for record n noted as n ââ¬â¢ in figure below * Set UndoNextLSN of the CLR to the PrevLSN value of the update log record * Arrows indicate UndoNextLSN value * ARIES supports partial rollback * Used e. g. o handle deadlocks by rolling back just enough to release reqd. locks * Figure indicates forward actions after partial rollbacks * records 3 and 4 initially, later 5 and 6, then full rollback 1 2 3 4 4â⬠² 3â⬠² 5 6 5â⬠² 2â⬠² 1â⬠² 6â⬠² 58. ARIES: Undo Pass * Undo pass * Performs backward scan on log undoing all transaction in undo-list * Backward scan optimized by skipping unneeded log records as follows: * Next LSN to be undone for each transaction set to LSN of last log record for transaction found by analysis pass. * At each step pick largest of these LSNs to undo, skip back to it and undo it * After undoing a log record For ordinary log records, set next LSN to be undone for transaction to PrevLSN noted in the log record * For compensation log records (CLRs) set next LSN to be undo to UndoNextLSN noted in the log record * All intervening records are skipped since they would have been undo already * Undos performed as described earlier 59. Other ARIES Features * Recovery Independence * Pages can be recovered independently of others * E. g. if some disk pages fail they can be recovered from a backup while other pages are being used * Savepoints: * Transactions can record savepoints and roll back to a savepoint * Useful for complex transactions Also used to rollback just enough to release locks on deadlock 60. Other ARIES Features (Cont. ) * Fine-grained locking: * Index concurrency algorithms that permit tuple level locking on indices can be used * These require logical undo, rather than physical undo, as in advanced recovery algorithm * Recovery optimizations: For example: * Dirty page table can be used to prefetch pages during redo * Out of order redo is possible: * redo can be postponed on a page being fetched from disk, and performed when page is fetched. * Meanwhile other log records can continue to be processed 61. Remote Backup Systems 62. Remote Backup Systems Remote backup systems provide high availability by allowing transaction processing to continue even if the primary site is destroyed. 63. Remote Backup Systems (Cont. ) * Detection of failure : Backup site must detect when primary site has failed * to distinguish primary site failure from link failure maintain several communication links between the primary and the remote backup. * Transfer of control : * To take over control backup site first perform recovery using its copy of the database and all the long records it has received from the primary. * Thus, completed transactions are redone and incomplete transactions are rolled back. When the backup site takes over processing it becomes the new primary * To transfer control back to old primary when it recovers, old primary must receive redo logs from the old backup and apply all updates locally. 64. Remote Backup Systems (Cont. ) * Time to recover : To reduce delay in takeover, backup site periodically proceses the redo log records (in effect, performing recovery from previous database state), performs a checkpoint, and can then delete earlier parts of the log. * Hot-Spare configuration permits very fast takeover: * Backup continually processes redo log record as they arrive, applying the updates locally. When failure of the primary is detected the backup rolls back incomplete transactions, and is ready to process new transactions. * Alternative to remote backup: distributed dat abase with replicated data * Remote backup is faster and cheaper, but less tolerant to failure * more on this in Chapter 19 65. Remote Backup Systems (Cont. ) * Ensure durability of updates by delaying transaction commit until update is logged at backup; avoid this delay by permitting lower degrees of durability. * One-safe: commit as soon as transactionââ¬â¢s commit log record is written at primary * Problem: updates may not arrive at backup before it takes over. Two-very-safe: commit when transactionââ¬â¢s commit log record is written at primary and backup * Reduces availability since transactions cannot commit if either site fails. * Two-safe: proceed as in two-very-safe if both primary and backup are active. If only the primary is active, the transaction commits as soon as is commit log record is written at the primary. * Better availability than two-very-safe; avoids problem of lost transactions in one-safe. 66. End of Chapter 67. Block Storage Operations 68. Portion of t he Database Log Corresponding to T 0 and T 1 69. State of the Log and Database Corresponding to T 0 and T 1 70. Portion of the System Log Corresponding to T 0 and T 1 71. State of System Log and Database Corresponding to T 0 and T 1
Subscribe to:
Comments (Atom)