Monday, December 30, 2019

Human Resources - 10735 Words

Introduction Human resources are the most important resources in any organisation. To succeed a business needs committed staff to meet its aims and objectives. Staff must be trained and motivated by the management to achieve their potential. In small businesses with one or two employees the responsibility for the human resources usually lies with the owner. Other small businesses with a slightly larger workforce may have a designated person whose job is to look after issues relating to staff. Large organisations with many employees have a whole section called the personnel or human resources department. It is the responsibility of the human resources department to ensure that the organisation recruits the correct staff, and that†¦show more content†¦The IT Development Manager will take on the majority of the management and organisational work in the department, which has been carried out in the past by the lecturers. The College placed an advertisement on the staff noticeboard, but none of the non-teaching staff at the College had the combination of management and IT skills necessary for the job, and the lecturers did not want a non-teaching job. The College therefore has to look outside to find a suitable person. Using external labour market information is a good way for a business to look at the kinds of people they should recruit and it can then target its advertisements at the right people for the job. Businesses can look at lots of different employment trends to see where the potentially suitable people might come from. Hull College would need to look at the information for South London, which they can get form SOLOTEC, the South London Training and Enterprise Council. SOLOTEC provide information and statistics on a wide range of employment trends. Training and education A business who is interested in employing a school or college leaver may want to look at how many young people leave school to work or go on to higher education. The overall staying-on rate in South London is fairly similar to the whole of London, but since last year there has been a decline inShow MoreRelatedHuman Resource And Human Resources2538 Words   |  11 Pages Human resources departments, has fueled the need for exceptional talent, Human resources is a departments, in some companies it has become a global workforce. Human resource offered Challenges, however, on the positive side, people can be hired for all kind of opportunities† human resources can consist of a group of people or one person. Human resources is over hiring, firing, training, and managing, also supplying a good benefit package, many companies has a human resource department whichRead MoreHuman Resources : Human Resource Professionals1709 Words   |  7 PagesHuman resource professionals use several different methods to make sure that they have the best employees they can possibly have, as well as attain new ones. Human resources is a job all about the people that one works with. It is a job that keeps people safe, makes sure one’s rights are protected, helps generate a profit through the type of employees one hires, and a job that strives to give employees every opportunity to succeed. The hospitality industry is one which people are the main ingredientRead MoreHuman Resources And The Human Resource Department2150 Words   |  9 PagesIntroduction Human Resources are concerned with the management of people within an organization, not only to minimize internal issues but to also ensure a highly functional workforce. The department is responsible for recruiting suitable candidates, identifying and meeting the training needs of existing staff, ensuring employees welfare and safety, and raising awareness of current workplace legislation (BBC, 2014). In addition to the above responsibilities, the Human Resources Department alsoRead MoreHuman Resources And Human Resource Management10880 Words   |  44 PagesHuman Resources Defined As a Salon Owner you may have heard the term Human Resources as these departments started showing up in small to large companies in the late 1960’s. The purpose of these departments was to have specialists that advised their Corporate Management staff on everything from hiring to performance management. Normally the department would be headed up by a person who was qualified, experienced and had formal education in Human Resource Management from an accredited college or universityRead MoreHuman Resource Management And Human Resources1243 Words   |  5 Pages Human resource management Introduction As storey (2001) explains that human resource management concept is typical approach to business which quest to achieve competitive advantage through the strategic disposition of dedicated and committed human work force using array of values, culture, personnel and structural techniques. In simple word Human resource denotes to employees that help to run and drives an organisation which is also the main workforce of any organisationRead MoreHuman Resources And The Human Resource Department1618 Words   |  7 PagesThe Human Resource department is considered to be the most important department for the development and progress of the work processes of the concerned organization. The HR department plays the most crucial role in managing the desired activities of the employees of an organization as well as it recruits the skilled employees to the firm. This research paper will help in explaining the process by which the Human Resource adds desired values to an organization. For any of t he particular firm, theRead MoreHuman Resource Management And Human Resources938 Words   |  4 PagesHuman resource management is becoming higher in demand everyday. Employment for human resource manager is projected to grow 9 percent from 2014 to 2024 (Bureau of Labor and Statistics, 2016). On average this occupation is growing faster than most occupations. Over the 5 years to November 2019 jobs that will open for Human resource management is expected to be above average employing between 25,001 and 50,000 more (Bureau of Labor and Statistics, 2016; Human Resource Manager, 2015). Whenever newRead MoreHuman Resource Department : The Human Resources Department816 Words   |  4 Pagestalented employees. The human resources department has had an important role and underappreciated role in employee hiring and retention. Through the use of strategic human resource planning, human resources departments are able to benefit a company both directly and indirectly. A direct benefit of the human resources department is the support the department provides to line managers. Human resource department staff are available to provide support to line managers, but human resource staff should notRead MoreHuman Resource Management : Human Resources925 Words   |  4 Pagesyou were to ask any human resources professional what their responsible functions were you would receive many different responses based on their department. â€Å"No two human resources departments have precisely the same roles because of differences in organization sizes and characteristics of the workf orce, the industry, and management values.† (Noe, Hollenbeck, Gerhard, Wright, 2016). Even though the roles in the departments are different, the functions that human resources are supportive of remainRead MoreHuman Resources And Human Resource Management1286 Words   |  6 PagesAs I have written this essay I have come to the conclusion that the organisational structure is defined by its human resources processes. Human Resources (HR) or Human Resource Management (HRM) depending on your view point, has ultimately defined employees as a commodity. Where once there was security and familiarity within our employment; â€Å"security, permanent flux and change without beginning or end have become the established norm and this has had a consequential impact on the attitudes of employees

Saturday, December 21, 2019

Henrik Ibsen’s A Doll’s House Essay - 657 Words

What comes to mind when the word morals is said? Whose morals should be followed, individual or group? In A Doll House, Ibsen portrays the protagonist, Nora, to follow the morals of her husband, Torvald. Four key aspects that help Nora decide to change her mind and make a decision to leave Torvald. These include the constant change of nicknames, the questioning of her own independence, the questioning of Torvalds love, and the realization that Torvald loves his reputation more then herself. As a result, Nora sets out to find her own individuality and moral beliefs. When it comes to the use of nicknames, the tone of voice is an indication of how a person feels about another. As the story begins, we find Nora and Torvald in†¦show more content†¦As their conversation grows deeper, a smaller argument begins to form. They begin talking about burdens that each one has dealt with and Mrs. Linde states, ... you know so little of lifes burdens yourself (1192). Nora, taking offense, replies, Youre just like the others. You all think Im incapable of anything serious (1193). This is the second piece of evidence because Mrs. Linde helps Nora to begin realizing that she has not been as independent as she thought. Nora starts to apprehend that she has been sheltered her whole life and does not know what it means to be independent or to have her own set of morals. She begins to question what she believes in and what others have her believing in. As Mrs. Linde and Nora continue with their conversation, Nora begins to question whether Torvald does love her. Nora begins to tell her story of how she was the one to raise the money for the trip to Italy and not Torvald. She reveals how she went to Krogstad and asked for a loan to help pay for the trip. When Mrs. Linde asked if Torvald knew any of this information Nora replied, Hes so strict on that subject ... with all his masculine pride how painfully humiliating for him if he ever found out he was in debt to me (1194). Nora did not feel comfortable telling Torvald about the predicament because she did not want to offend him. Torvald is set on complying by his morals and the fact that Nora disobeyed them would dishonor herShow MoreRelatedHenrik Ibsens A Dolls House1489 Words   |  6 Pagesmany other types of literature, drama relies on several separate components all working together to tell a story. These components serve to draw an audience in, create a believable situat ion, and illicit a particular response. The play â€Å"A Doll’s House† by Henrik Ibsen provides an excellent example for analysis, with each component strongly supported. Often the first, and most obvious, component that can be observed when reading drama is the point of view that it is written from. Point of viewRead MoreHenrik Ibsen’s A Doll’s House1433 Words   |  6 Pagesindividual morals go against the social appearance, but in value, individuals perceive a need for an appearance to convey a sense of belonging. Within two diverse yet similarly realist dramas, A Doll’s House and Death of a Salesman societal appearance’s stands above all else. Henrick Ibsens A Dolls House embarks on the gender fitting and domesticity of the Victorian Era at its worse as Nora Helmers unrealistic marriage falls within her grasps, leading to rebellion. Arthur Miller, on the other handRead More Henrik Ibsens A Dolls House Essay1050 Words   |  5 PagesHenrik Ibsens A Dolls House Ibsenss play is a modern tragedy which functions on two levels, questioning the established social order of the day and presenting the death of a marriage. Both these events create a great deal of tension, and combined with the language and actions used by the characters, make the play very intense. The main cause of dramatic tension throughout the play is the way that the difference between the real nature of the characters and the roles they are assignedRead MoreHenrik Ibsen’s A Doll’s House Essay example1182 Words   |  5 Pages Phylogeny versus misogyny, arguable one of the greatest binary oppositions in a work of literature, is present in Henrik Ibsen’s 1879 Norwegian play A Doll’s House. The title itself suggests a misogynist view, while the work mainly consists of feminist ideology, as Ibsen was a supporter of the female as an independent, rather than a dependent on a male. Nora knew herself that her husband did not fully respect her, and this became a major conflict in the play as Nora progressively became more self-reliantRead MoreThe Masquerade in Henrik Ibsen’s A Doll’s House Essay1015 Words   |  5 Pages   Ã‚   In A Doll House, Ibsen presents us with Torvald and Nora Helmer, a husband and wife who have lived together for eight years and still dont know each other. This rift in their relationship, caused in part by Torvalds and Noras societally-induced gender roles and also by the naivete of both parties to the fact that they dont truly love one another, expands to a chasm by the end of the play, ultimately causing Nora to leave Helmer. Throughout most of the play, Ibsen continually has his charactersRead More Henrik Ibsens A Dolls House Essay1067 Words   |  5 Pages Marriage is a forever commitment between two individuals to love one another but marriages dont always have the fairytale happy ending. In Henrik Ibsens play A Doll House, Nora and Torvald Helmer learn some things about their marriage that they had not realized before. Nora Helmer discovers Torvald, herself, her marriage, as well as her own identity as a woman. Nora Helmer, the wife of Torvald Helmer, throughout the whole play has been keeping a secret from her husband. A few yearsRead MoreEssay on Themes and Symbols in Henrik Ibsen’s A Doll’s House1296 Words   |  6 Pagesdoll-child† (Ibsen 1491). Henrik Ibsen’s A Doll House tells a story of scandal and deceit set in the Victorian era. Nora Helmer is married to Torvald Helmer and she feels more like his toy than his wife. Nora had to have Torvald to be able to do anything, because of when she lived. Nora borrows money behind her husband’s back (which is illegal at this time) and tries to cover up everything she has done. Ibsen employs the use of many themes and symbols in his A Doll House to show the reader just howRead More Noras Symbolism in Henrik Ibsens A Dolls House Essay973 Words   |  4 PagesNoras Symbolism in Henrik Ibsens A Dolls House      Ã‚  Ã‚   In every society power is the bringer of fortune and influence. In his play A Dolls House, Henrik Ibsen portrays, through the character of Nora, the power women are gaining in patriarchal societies. Nora, who symbolizes all women, exercises her power throughout the entire play. She cleverly manipulates the men around her while, to them, she seems to be staying in her subordinate role. In all three acts of the play Nora controls manyRead MoreThe Theme of Feminism in Henrik Ibsen’s A Doll’s House Essay2521 Words   |  11 Pagesand social dependence, and her dependence through her children. In A Doll’s House, Ibsen argues that a dependent woman will be passive and unwilling to speak her mind. She will not try to understand the abstract reality of life, unless it contain to her lifestyle at home. Instead she will let the title of her marriage suppress her. She will lose sight of finding her own independence and instead become a doll living in a house. Nora, the protagonist of the play has all of these qualities Nora’sRead MorePet Names and Belittlement: Henrik Ibsens A Dolls House1329 Words   |  6 PagesIn a dolls house, Ibsen has combined several characters with diverse personal qualities and used them to develop the story line as well as bring to life the major themes and issues that the plot is meant to address. Primarily there are two types of characters who can be categorized as static and dynamic, the static characters remain the same form the start to the end of a story and despite the events taking place around them, and they do not change their perception or altitudes. These types of characters

Friday, December 13, 2019

The Laws of Cyberspace †Lawrence Lessig Free Essays

The Laws of Cyberspace Lawrence Lessig †  Draft 3  ©Lessig 1998: This essay was presented at the Taiwan Net ’98 conference, in Taipei, March, 1998. †  Jack N. and Lillian R. We will write a custom essay sample on The Laws of Cyberspace – Lawrence Lessig or any similar topic only for you Order Now Berkman Professor for Entrepreneurial Legal Stud- ies, Harvard Law School. Thanks to Tim Wu for extremely helpful comments on an earlier draft. Lessig: The Laws of Cyberspace Draft: April 3, 1998 Before the revolution, the Tsar in Russia had a system of internal passports. The people hated this system. These passports marked the estate from which you came, and this marking determined the places you could go, with whom you could associate, what you could be. The passports were badges that granted access, or barred access. They controlled what in the Russian state Russians could come to know. The Bolsheviks promised to change all this. They promised to abolish the internal passports. And soon upon their rise to power, they did just that. Russians were again free to travel where they wished. Where they could go was not determined by some document that they were required to carry with them. The abolition of the internal passport symbolized freedom for the Russian people — a democratization of citizenship in Russia. This freedom, however, was not to last. A decade and a half later, faced with the prospect of starving peasants flooding the cities looking for food, Stalin brought back the system of internal passports. Peasants were again tied to their rural land (a restriction that remained throughout the 1970s). Russians were once again restricted by what their passport permitted. Once again, to gain access to Russia, Russians had to show something about who they were. *** Behavior in the real world — this world, the world in which I am now speaking — is regulated by four sorts of constraints. Law is just one of those four constraints. Law regulates by sanctions imposed ex post — fail to pay your taxes, and you are likely to go to jail; steal my car, and you are also likely to go to jail. Law is the prominent of regulators. But it is just one of four. Social norms are a second. They also regulate. Social norms — understandings or expectations about how I ought to behave, enforced not through some centralized norm enforcer, but rather through the understandings and expectations of just about everyone within a particular community — direct and constrain my behavior in a far wider array of contexts than any law. Norms say what clothes I will wear — a suit, not a dress; they tell you to sit quietly, and politely, for at least 40 minutes while I speak; they or- 2 Lessig: The Laws of Cyberspace Draft: April 3, 1998 ganize how we will interact after this talk is over. Norms guide behavior; in this sense, they function as a second regulatory constraint. The market is a third constraint. It regulates by price. The market limits the amount that I can spend on clothes; or the amount I can make from public speeches; it says I can command less for my writing than Madonna, or less from my singing than Pavarotti. Through the device of price, the market sets my opportunities, and through this range of opportunities, it regulates. And finally, there is the constraint of what some might call nature, but which I want to call â€Å"architecture. † This is the constraint of the world as I find it, even if this world as I find it is a world that others have made. That I cannot see through that wall is a constraint on my ability to know what is happening on the other side of the room. That there is no access-ramp to a library constrains the access of one bound to a wheelchair. These constraints, in the sense I mean here, regulate. To understand a regulation then we must understand the sum of these four constraints operating together. Any one alone cannot represent the effect of the four together. *** This is the age of the cyber-libertarian. It is a time when a certain hype about cyberspace has caught on. The hype goes like this: Cyberspace is unavoidable, and yet cyberspace is unregulable. No nation can live without it, yet no nation will be able to control behavior in it. Cyberspace is that place where individuals are, inherently, free from the control of real space sovereigns. It is, in the words of James Boyle, the great techno-â€Å"gotcha† — nations of the world, you can’t live with out it, but nations of the world, when you’ve got it, you won’t live long with it. My aim today is a different view about cyberspace. My aim is to attack this hype. For in my view, the world we are entering is not a world of perpetual freedom; or more precisely, the world we are entering is not a world where freedom is assured. Cyberspace has the potential to be the most fully, and extensively, regulated space that we have ever known — anywhere, at any time in our history. It has the potential to be the antithesis of a space of freedom. And unless we understand this potential, unless we see how this might be, we are likely to sleep through this transition from freedom into 3 Lessig: The Laws of Cyberspace Draft: April 3, 1998 control. For that, in my view, is the transition we are seeing just now. Now I want to make this argument by using the two introductions that I began with today — the story about Bolshevik Russia, and the idea about regulation. For they together will suggest where cyberspace is going, and more importantly, just how we can expect cyberspace to get there. First the idea: Just as in real space, behavior in cyberspace is regulated by four sorts of constraints. Law is just one of those constraints. For the hype notwithstanding, there is law just now in cyberspace — copyright law, or defamation law, or sexual harassment law, all of which constrain behavior in cyberspace in the same way that they constrain behavior in real space. There are also, perhaps quite surprisingly, norms in cyberspace — rules that govern behavior, and expose individuals to sanction from others. They too function in cyberspace as norms function in real space, threatening punishments ex post by a community. And so too with the market. The market constrains in cyberspace, just as in real space. Change the price of access, the constraints on access differ. Change the structure of pricing access, and the regulation of marginal access shifts dramatically as well. But for our purposes, the most significant of these four constraints on behavior in cyberspace is the analog to what I called architecture in real space: This I will call code. By code, I simply mean the software and hardware that constitutes cyberspace as it is—the set of protocols, the set of rules, implemented, or codified, in the software of cyberspace itself, that determine how people interact, or exist, in this space. This code, like architecture in real space, sets the terms upon which I enter, or exist in cyberspace. It, like architecture, is not optional. I don’t choose whether to obey the structures that it establishes — hackers might choose, but hackers are special. For the rest of us, life in cyberspace is subject to the code, just as life in real space is subject to the architectures of real space. The substance of the constraints of code in cyberspace vary. But how they are experienced does not vary. In some places, one must enter a password before one gains access; in other places, one can enter whether identified or not. In some places, the transactions that one engages produce traces that link the transactions 4 Lessig: The Laws of Cyberspace Draft: April 3, 1998 back to the individual; in other places, this link is achieved only if the individual chooses. In some places, one can select to speak a language that only the recipient can hear (through encryption); in other places, encryption is not an option. The differences are constituted by the code of these different places. The code or software or architecture or protocols of these spaces set these features; they are features selected by code writers; they constrain some behavior by making other behavior possible. And in this sense, they, like architecture in real space, regulate behavior in cyberspace. Code and market and norms and law together regulate in cyberspace then as architecture and market and norms and law regulate in real space. And my claim is that as with real space regulation, we should consider how these four constraints operate together. An example — a contrast between a regulation in real space, and the same regulation in cyberspace — will make the point more clearly. Think about the concern in my country (some might call it obsession) with the regulation of indecency on the net. This concern took off in the United State early in 1995. Its source was an extraordinary rise in ordinary users of the net, and therefore a rise in use by kids, and an even more extraordinary rise in the availability of what many call â€Å"porn† on the net. An extremely controversial (and fundamentally flawed) study published in the Georgetown University Law Review reported the net awash in porn. Time and Newsweek both ran cover stories articles about its availability. And senators and congressmen were bombarded with demands to do something to regulate â€Å"cybersmut. † No doubt the fury at the time was great. But one might ask, why this fury was so great about porn in cyberspace. Certainly, more porn exists in real space than in cyberspace. So why the fury about access to porn in a place to which most kids don’t have access? To understand the why, think for a second about the same problem as it exists in real space. What regulates the distribution of porn in real space? First: In America, laws in real space regulate the distribution of porn to kids— laws requiring sellers of porn to check the age of 5 Lessig: The Laws of Cyberspace Draft: April 3, 1998 buyers, or laws requiring that sellers locate in a section of the city likely to be far from kids. But laws are not the most significant of the constraints on the distribution of porn to kids. More important than laws are norms. Norms constrain adults not to sell porn to kids. Even among porn distributors this restriction is relatively effective. And not just social norms. The market too, for porn costs money, and as kids have no money. But the most important real space constraint is what I’ve called architecture. For all of these other regulations in real space depend on this constraint of architecture. Laws and norms and market can discriminate against kinds in real space, since it is hard in real space to hide that you are a kid. Of course, a kid can don a mustache, and put on stilts, and try to enter a porn shop to buy porn. But for the most part, disguises will fail. For the most part, it will be too hard to hide that he is a kid. Thus, for the most part, constraints based on being a kid are constraints that can be effective. Cyberspace is different. For even if we assume that the same laws apply to cyberspace as to real space, and even if we assume that the constraints of norms and the market carried over as well, even so, there remains a critical difference between the two spaces. For while in real space it is hard to hide that you are a kid, in cyberspace, hiding who you are, or more precisely, hiding features about who you are is the simplest thing in the world. The default in cyberspace is anonymity. And because it is so easy to hide who one is, it is practically impossible for the laws, and norms, to apply in cyberspace. For for these laws to apply, one has to know that it is a kid one is dealing with. But the architecture of the space simply doesn’t provide this information. Now the important point is to see the difference, and to identify its source. The difference is a difference in what I want to call the regulability of cyberspace — the ability of governments to regulate behavior there. As it is just now, cyberspace is a less regulable space than real space. There is less that government can do. The source of this difference in regulability is a difference in the architecture of the space — a difference in the code that constitutes cyberspace as it is. Its architecture, my claim is, renders it essentially unregulable. 6 Lessig: The Laws of Cyberspace Draft: April 3, 1998 Or so it did in 1995, and in 1996, when the U. S. Congress eventually got around to passing its attempt to deal with this problem—the Communications Decency Act. I’m going to talk a bit about what happened to that statute, but I first want to mark this period, and set it off from where we are today. It was the architecture of cyberspace in 1995, and 1996 that made it essentially unregulable. Let’s call that architecture Net 95 — as in 1995 — and here are its features: So long as one had access to Net95, one could roam without identifying who one was. Net95 was Bolshevik Russia. One’s identity, or features, were invisible to the net then, so one could enter, and explore, without credentials—without an internal passport. Access was open and universal, not conditioned upon credentials. It was, in a narrow sense of the term, an extraordinary democratic moment. Users were fundamentally equal. Essentially free. It was against this background — against the background of the net as it was — Net95 — that the Supreme Court then considered the Communications Decency Act. Two lower courts had struck the statute as a violation of the right to freedom of speech. And as millions watched as the court considered arguments on the case — watched in cyberspace, as the arguments were reported, and debated, and critiqued. And in June, last year, the Court affirmed the decision of the lower courts, holding the statute unconstitutional. Just why it was unconstitutional isn’t so important for our purposes here. What is important is the rhetoric that lead the court to its conclusion. For the decision hung crucially on claims about the architecture of the net as it was — on the architecture, that is, of Net95. Given that architecture, the court concluded, any regulation that attempted to zone kids from porn would be a regulation that was too burdensome on speakers and listeners. As the net was, regulation would be too burdensome. But what was significant was that the court spoke as if this architecture of the net as it was — Net 95 — was the only architecture that the net could have. It spoke as if it had discovered the nature of the net, and was therefore deciding the nature of any possible regulation of the net. 7 Lessig: The Laws of Cyberspace Draft: April 3, 1998 But the problem with all this, of course, is that the net has no nature. There is no single architecture that is essential to the net’s design. Net95 is a set of features, or protocols, that constituted the net at one period of time. But nothing requires that these features, or protocols, always constitute the net as it always will be. And indeed, nothing in what we’ve seen in the last 2 years should lead us to think that it will. An example may make the point more simply. Before I was a professor at Harvard, I taught at the University of Chicago. If one wanted to gain access to the net at the university of Chicago, one simply connected one’s machine to jacks located throughout the university. Any machine could be connected to those jacks, and once connected, any machine would then have full access to the internet. Access was anonymous, and complete, and free. The reason for this freedom was a decision by the administration. For the Provost of the University of Chicago is Geof Stone, a former dean of the University of Chicago Law School, and a prominent free speech scholar. When the University was designing its net, the technicians asked the provost whether anonymous communication should be permitted. The provost, citing a principle that the rules regulating speech at the university would be as protective of free speech as the first amendment, said yes: One would have the right to communicate at the university anonymously, because the first amendment to the constitution would guarantee the same right vis-a-vis the government. From that policy decision flowed the architectural design of the University of Chicago’s net. At Harvard, the rules are different. One cannot connect one’s machine to the net at Harvard unless one’s machine is registered — licensed, approved, verified. Only members of the university community can register their machine. Once registered, all interactions with the network are potentially monitored, and identified to a particular machine. Indeed, anonymous speech on this net is not permitted — against the rule. Access can be controlled based on who someone is; and interaction can be traced, based on what someone did. The reason for this design is also due to the decision of an administrator — though this time an administrator less focused on the protections of the first amendment. Controlling access is the ideal at Harvard; facilitating access was the ideal at Chicago; tech- 8 Lessig: The Laws of Cyberspace Draft: April 3, 1998 nologies that make control possible were therefore chosen at Harvard; technologies that facilitate access chosen at Chicago. Now this difference between the two networks is quite common today. The network at the University of Chicago is the architecture of the internet in 1995. It is, again, Net95. But the architecture at Harvard is not an internet architecture. It is rather an intranet architecture. The difference is simply this — that within an intranet, identity is sufficiently established such that access can be controlled, and usage monitored. The underlying protocols are still TCP/IP — meaning the fundamental or underlying protocols of the internet. But layered on top of this fundamental protocol is a set of protocols facilitating control. The Harvard network is the internet plus, where the plus mean the power to control. These two architectures reflect two philosophies about access. They reflect two sets of principles, or values, about how speech should be controlled. They parallel, I want to argue, the difference between political regimes of freedom, and political regimes of control. They track the difference in ideology between West and East Germany; between the United States and the former Soviet Republic; between the Republic of China, and Mainland China. They stand for a difference between control and freedom — and they manifest this difference through the architecture or design of code. These architectures enable political values. They are in this sense political. Now I don’t offer this example to criticize Harvard. Harvard is a private institution; it is free, in a free society, to allocate its resources however it wishes. My point instead is simply to get you to see how architectures are many, and therefore how the choice of one is political. And how, at the level of a nation, architecture is inherently political. In the world of cyberspace, the selection of an architecture is as important as the choice of a constitution. For in a fundamental sense, the code of cyberspace is its constitution. It sets the terms upon which people get access; it sets the rules; it controls their behavior. In this sense, it is its own sovereignty. An alternative sovereignty, competing with real space sovereigns, in the regulation of behavior by real space citizens. But the United States Supreme Court treated the question of architecture as if the architecture of this space were given. It spoke as if there were only one design for cyberspace — the design it had. 9 Lessig: The Laws of Cyberspace Draft: April 3, 1998 In this, the Supreme Court is not alone. For in my view, the single greatest error of theorists of cyberspace — of pundits, and especially lawyers thinking about regulation in this space — is this error of the Supreme Court. It is the error of naturalism as applied to cyberspace. It is the error of thinking that the architecture as we have it is an architecture that we will always have; that the space will guarantee us liberty, or freedom; that it will of necessity disable governments that want control. This view is profoundly mistaken. Profoundly mistaken because while we celebrate the â€Å"inherent† freedom of the net, the architecture of the net is changing from under us. The architecture is shifting from an architecture of freedom to an architecture of control. It is shifting already without government’s intervention, though government is quickly coming to see just how it might intervene to speed it. And where government is now intervening, it is intervening in a way designed to change this very same architecture — to change it into an architecture of control, to make it, as I’ve said, more regulable. While pundits promise perpetual freedom built into the very architecture of the net itself, technicians and politicians are working together to change that architecture, to move it away from this architecture of freedom. As theorists of this space, we must come to understand this change. We must recognize the political consequences of this change. And we must take responsibility for these consequences. For the trajectory of the change is unmistakable, and the fruit of this trajectory, poison. As constitutionalists, we must then confront a fundamentally constitutional uestion: if there is a choice between architectures of control and architectures of freedom, then how do we decide these constitutional questions? If architectures are many, then does the constitution itself guide us in the selection of such architectures? In my view, constitutional values do implicate the architecture of this space. In my view, constitutional values should guide us in our design of this space. And in my view, constitutional values should limit the types of regulability that this architecture permits. But my view is absent in thinking about government’s role in cyberspace. Indeed, my nation — for many years the symbol of freedom in world where such freedom was rare — has become a leader in pushing the architecture of the internet from an archi- 10 Lessig: The Laws of Cyberspace Draft: April 3, 1998 tecture of freedom to an architecture of control. From an architecture, that is, that embraced the traditions of freedom expressed in our constitutional past, to an architecture that is fundamentally anathema to those traditions. But how? How can the government make these changes? How could the government effect this control? Many can’t see how government could effect this control. So in the few minutes remaining in my talk today, I want show you how. I want to sketch for you a path from where we are to where I fear we are going. I want you to see how these changes are possible and how government can help make them permanent. Return then with me to the idea that began this essay — the point about the different modalities of constraint — and notice something important about that idea that we have not so far remarked. I said at the start that we should think of law as just one of four modalities of constraint; that we should think of it as just one part of the structure of constraint that might be said to regulate. One might take that to be an argument about law’s insignificance. If so many forces other than law regulate, this might suggest that law itself can do relatively little. But notice what should be obvious. In the model I have described law is regulating by direct regulation — regulating an individual through the threat of punishment. But law regulates in other ways as well. It regulates, that is, indirectly as well as directly. And it regulates indirectly when it regulates these other modalities of constraint, so that they regulate differently. It can, that is, regulate norms, so norms regulate differently; it can regulate the market, so that the market regulates differently; and it can regulate architecture, so that architecture regulates differently. In each case, the government can coopt the other structures, so that they constrain to the government’s end. The same indirection is possible in cyberspace. But here, I suggest, the indirection will be even more significant. For here the government can not only regulate indirectly to advance a particular substantive end of the government. More significantly, the government can regulate to change the very regulability of the space. The government, that is, can regulate the architectures of cyberspace, so that behavior in cyberspace becomes more regulable — 11 Lessig: The Laws of Cyberspace Draft: April 3, 1998 indeed, to an architecture potentially more regulable than anything we have known in the history of modern government. Two examples will make the point — one an example of the government regulating to a particular substantive end, and the second, following from the first, an example of the government regulating to increase regulability. The first is the regulation of encryption. The government’s concern with encryption has been with the technology’s use in protecting privacy — its ability to hide the content of communications from the eyes of an eavesdropping third party, whether that third party is the government, or a nosy neighbor. For much of the history of the technology, the American government has heavily regulated the technology; for a time it threatened to ban its use; it has consistently banned its export (as if only Americans understand higher order mathematics); and for a period it hoped to flood the market with a standard encryption technology that would leave a backdoor open for the government to enter. The most recent proposals are the most significant. Last November, the FBI proposed a law that would require manufacturers to assure that any encryption system have built within it either a key recovery ability, or an equivalent back door, so that government agents could, if they need, get access to the content of such communications. This is government’s regulation of code, indirectly to regulate behavior. It is indirect regulation in the sense that I described before, and from a constitutional perspective — it is brilliant. Not brilliant because its ends are good; brilliant because the American constitution, at least, offers very little control over government regulation like this. The American constitution offers little protections against the government’s regulation of business; and given the interests of business, such regulations are likely to be effective. My second example follows from the first. For a second use of encryption is identification — as well as hiding what someone says, encryption, through digital certificates, can be used to authenticate who some it. With the ability to authenticate who someone is, the government could tell where someone comes from, or how old they are. And with this ability — through certifying IDs — passports on the information superhighway — governments could far more easily regulate behavior on this highway. 12 Lessig: The Laws of Cyberspace Draft: April 3, 1998 It would recreate the power to control behavior — recreate the power to regulate. Note what both regulations would achieve. Since the US is the largest market for internet products, no product could hope to succeed unless it were successful in the United States. Thus standards successfully imposed in the US becomes standards for the world. And these standards in particular would first facilitate regulation, and second, assure that communications on the internet could be broken into by any government that followed the procedures outlined in the bill. But the standards that those government would have to meet are not the standards of the US constitution. They are whatever standard local government happen to have — whether that government be the government of Mainland China, or Switzerland. The effect is that the United States government would be exporting an architecture that facilitates control, and control not just by other democratic governments, but by any government, however repressive. And by this, the US would move itself from a symbol of freedom, to a peddler of control. Having won the cold war, we would be pushing the techniques of our cold war enemies. *** How should we respond? How should you — as sovereigns independent of the influence of any foreign government — and we, as liberal constitutionalists respond? How should we respond to moves by a dominant political and economic power to influence the architecture of the dominant architecture of regulation by code — the internet? Sovereigns must come to see this: That the code of cyberspace is itself a kind of sovereign. It is a competing sovereign. The code is itself a force that imposes its own rules on people who are there, but the people who are there are also the people who are here — citizens of the Republic of China, citizens of France, citizens of every nation in the world. The code regulates them, yet they are by right subject to the regulation of local sovereigns. The code thus competes with the regulatory power of local sovereigns. It competes with the political choices made by local sovereigns. And in this competition, as the net becomes a dominant place for business and social life, it will displace the regulations of local sovereigns. You as sovereigns were afraid of the competing influence of na- 13 Lessig: The Laws of Cyberspace Draft: April 3, 1998 tions. Yet a new nation is now wired into your telephones, and its influence over your citizens is growing. You, as sovereigns, will come to recognize this competition. And you should come to recognize and question the special ole that the United States is playing in this competition. By virtue of the distribution of resources controlling the architecture of the net, the United States has a unique power over influencing the development of that architecture. It is as the law of nature were being written, with the United States at the authors side. This power creates an important responsibility for the United States — and you must assure that it exercises its power responsibly. The problem for constitutionalists — those concerned to preserve social and political liberties in this new space — is more difficult. For return to the story that began this talk — the world of internal passports. One way to understand the story I’ve told today about cyberspace is in line with this story about the Tsar’s Russia. The birth of the net was the revolution itself; life under Net95 was life in Bolshevik Russia (the good parts at least, where internal passports were eliminated); the Net as it is becoming is Stalin’s Russia, where internal passports will again be required. Now there’s a cheat to that story — a rhetorical cheat that tends to obscure an important fact about real space life. For we all live in the world of internal passports. In the United States, in many places, one cannot live without a car; one can’t drive a car without a license; a license is an internal passport: It says who you are, where you come from, how old you are, whether you’ve recently been convicted of a crime; it links your identity to a database that will reveal whether you’ve been arrested (whether convicted or not) or whether any warrants for your arrest in any jurisdiction in the nation are outstanding. The license is the internal passport of the modern American state. And no doubt its ability to control or identify is far better than the Tsar’s Russia. But in the United States — at least for those who don’t appear to be immigrants, or a disfavored minority — the burden of these passports is slight. The will to regulate, to monitor, to track, is not strong enough in the United States to support any systematic effort to use these passports to control behavior. And the will is not strong enough because the cost of such control is so great. There are not checkpoints at each corner; one isn’t required to register 14 Lessig: The Laws of Cyberspace Draft: April 3, 1998 when moving through a city; one can walk relatively anonymously around most of the time. Technologies of control are possible, but in the main far too costly. And this costliness is, in large part, the source of great freedom. It is inefficiency in real space technologies of control that yield real space liberty. But what if the cost of control drops dramatically. What if an architecture emerges that permits constant monitoring; an architecture that facilitates the constant tracking of behavior and movement. What if an architecture emerged that would costlessly collect data about individuals, about their behavior, about who they wanted to become. And what if the architecture could do that invisibly, without interfering with an individuals daily life at all? This architecture is the world that the net is becoming. This is the picture of control it is growing into. As in real space, we will have passports in cyberspace. As in real space, these passports can be used to track our behavior. But in cyberspace, unlike realspace, this monitoring, this tracking, this control of behavior, will all be much less expensive. This control will occur in the background, effectively and invisibly. Now to describe this change is not to say whether it is for the good or bad. Indeed, I suggest that as constitutionalists, we must acknowledge a fundamental ambiguity in our present political judgments about liberty and control. I our peoples are divided in their reaction to this picture of a system of control at once perfect, and yet invisible. Many would say of this system — wonderful. All the better to trap the guilty, with little burden on the innocent. But there are many as well who would say of this system — awful. That while professing our ideals of liberty and freedom from government, we would have established a system of control far more effective than any in history before. So the response to all this is not necessarily to give up the technologies of control. The response is not to insist that Net95 be the perpetual architecture of the net. The response instead is to find a way to translate what is salient and important about present day liberties and constitutional democracy into this architecture of the net. The point is to be critical of the power of this sovereign—this emerging sovereign—as we are properly critical of the power of any sovereign. What are these limits: As government takes control or influences the architecture of the code of the net, at a minimum, we 15 Lessig: The Laws of Cyberspace Draft: April 3, 1998 must assure that government does not get a monopoly on these technologies of control. We must assure that the sorts of checks that we build into any constitutional democracy get built into regulation by this constitution — the code. We must assure that the constraints of any constitutional democracy — the limits on efficiency constituted by Bills of Rights, and systems of checks and balances — get built into regulation by code. These limits are the â€Å"bugs† in the code of a constitutional democracy — and as John Perry Barlow says, we must build these bugs into the code of cyberspace. We must build them in so that they, by their inefficiency, might recreate some of the protections we have long known. *** Cyberspace is regulated ? by laws, but not just by law. The code of cyberspace is one of these laws. We must come to see how this code is an emerging sovereign — omnipresent, omnipotent, gentle, efficient, growing — and that we must develop against this sovereign the limits that we have developed against real space sovereigns. Sovereigns will always say — real space as well as cyberspace — that limits, and inefficiencies — bugs — are not necessary. But things move too quickly for such confidence. My fear is not just that against this sovereign, we have not yet developed a language of liberty. Nor that we haven’t the time to develop such language. But my fear is that we sustain the will — the will of free societies for the past two centuries, to architect constitutions to protect freedom, efficiencies notwithstanding. 16 How to cite The Laws of Cyberspace – Lawrence Lessig, Essay examples

Thursday, December 5, 2019

Sex Education In Public Schools Argumentative Pers Essay Example For Students

Sex Education In Public Schools Argumentative Pers Essay uasive Essays Sex Education In Public Schools: To Be Or Not To Be? Sex education in public schools has been a controversial issue in the United States for over a decade. With the HIV and teen pregnancy crises growing, sex education is needed. Some of the American public believe that sex education should be taught at home by the childrens parents. They feel that sex education programs in schools do not put an emphasis on abstinence and encourages children to have sexual intercourse. American culture is very sexually oriented. Sex can be seen all over the media. Charles Krauthammer stated, Sex oozes from every pore of the culture and theres not a kid in the world who can avoid it(Bender). After being faced with sex on an everyday basis, the independent teens of today will make their own decisions on whether or not to have sex. The important thing is to make sure that they know all aspects of it. Reality-based sexuality education gives young people an understanding of positive sexuality. I t also provides sexual health information and skills on decision making(What). Subjects include sexual development, reproduction, relationships, affection, intimacy, body image and gender roles(What ). Successful sex education programs have several high points. The high points include exercises to encourage the appraisals of values, and skills in which students are taught how to negotiate while in sexual situations ( What type ) The majority of this nation favors sexuality education in public schools. Surveys show that eighty-nine percent of the citizens support it(What). Should the other eleven percent of the country be able to decide upon what the children of the United States learn and not learn in public schools? The eleven percents only argument against sex education is that they feel that sex education encourages teens to experiment with sex. This reasoning is based on absolutely nothing. There is no evidence that proves that sex education causes anything negative. This country is a democracy. A study conducted on teens in Sweden and the Netherlands showed that teens in those countries were just as sexually active, but the teen pregnancy and sexually transmitted disease rate was much lower. Researchers say this is due to sex education that begins in elementary school and continues on(Bender p.13). Only ten percent of American school-age youth participate in a comprehensive program lasting at least forty hours(deMauro p. 89). Teens in America also score low on questionnaires based on sexual knowledge(Gordon p.45). With all the knowledge and resources at its fingertips, the U.S. could teach the same kind of classes that are being conducted in Sweden and the Netherlands. Some also feel that sex education should be taught at home by parents. Thats fine, except there is no guarantee that kids will be taught. In a formal survey of 8,000 college students over 12 years, fewer than eighty percent had received a meaningful sex education from their parents(Gordon). An informal survey SEE APPENDIX ONE of one hundred students at Hotchkiss High School showed that only fourteen percent had been spoken to by their parents about abstinence and/or contraception(Teen). Many children feel that parents are the least informative source for information concerning birth control and sexually transmitted diseases(Griffith p.68). With no guarantees and the childrens view of their parents knowledge, Generation X could be put at a higher risk if parents were left to educate their children on sexuality. Since 1981, the year the HIV epidemic began, adolescents have been accounted for twenty percent of new infections(Humm p.142). HIV stands for human immunodificiency virus(Bender p.13). It is a blood borne virus that is transmitted when a person comes into contact with infected body fluid. .u4be34f42cd025a5ee48487a46c1af526 , .u4be34f42cd025a5ee48487a46c1af526 .postImageUrl , .u4be34f42cd025a5ee48487a46c1af526 .centered-text-area { min-height: 80px; position: relative; } .u4be34f42cd025a5ee48487a46c1af526 , .u4be34f42cd025a5ee48487a46c1af526:hover , .u4be34f42cd025a5ee48487a46c1af526:visited , .u4be34f42cd025a5ee48487a46c1af526:active { border:0!important; } .u4be34f42cd025a5ee48487a46c1af526 .clearfix:after { content: ""; display: table; clear: both; } .u4be34f42cd025a5ee48487a46c1af526 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u4be34f42cd025a5ee48487a46c1af526:active , .u4be34f42cd025a5ee48487a46c1af526:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u4be34f42cd025a5ee48487a46c1af526 .centered-text-area { width: 100%; position: relative ; } .u4be34f42cd025a5ee48487a46c1af526 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u4be34f42cd025a5ee48487a46c1af526 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u4be34f42cd025a5ee48487a46c1af526 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u4be34f42cd025a5ee48487a46c1af526:hover .ctaButton { background-color: #34495E!important; } .u4be34f42cd025a5ee48487a46c1af526 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u4be34f42cd025a5ee48487a46c1af526 .u4be34f42cd025a5ee48487a46c1af526-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u4be34f42cd025a5ee48487a46c1af526:after { content: ""; display: block; clear: both; } READ: BindImageEx API Essay This includes unprotected sex. Condoms made of latex is one way to protect against contracting the virus if the person chooses to have sex. Only a small number of teens infected with HIV actually know they have it(Humm p.143). If teens take risks of having unprotected sex with their partner because they are sure their partner doesnt have the virus, they are putting themselves at an even .

Thursday, November 28, 2019

Kevin Badon Essays (715 words) - Health, Obesity, Bariatrics

Kevin Badon English 101 C. Gorvine Fall 2016 Childhood Obesity Childhood obesity is a problem that we have been dealing with for quite some time now, and parents are struggling to get a handle on their children's eating habits. The schools haven't really been much help, it's causing more and more health issues by the day. Families are forced to watch their children be morbidly obese, and instead of taking a stand and cutting down on children's consumption of fatty and high calorie foods, they don't. We as parents and love ones must take out the time and make a difference in our kids' lives, like encourage better eating habits, and physical exercise. To create change on this issue parents, schools, and high influential television networks should work together for the heath of children. As parents, being one of the most influential people in a child's life, we have the biggest role to play in keeping our kids healthy. The most commonly acknowledged influence, of course, is what parents feed their children. Where parents make, the mistake is that they buy products that contribute to obesity. About a third of children and adolescents in the United States weigh too much, thinking that cheaper is better, but that is misunderstood. Keith Ayoob, a registered dietician with the Albert Einstein College of Medicine in New York, says "This new study should come to action by parents to look in their pantry and clean out all the junk food" ( qtd. Hellmich). The way parents can help fix the issue, is to encourage better eating habits, become more active and eat snacks in moderation. Also, parents need to become more educated about the health of children. Just as well as the parents, the schools are an influence on kid's food intake. The schools have these types of foods available to children, by having it in the cafeterias. They are serving items such as pizza, hot dogs; because of that kids will be drawn to eat these types of foods more often. To help make this issue better, they should make healthier food options available to students. There is healthier foods such as fruits and vegetables. Per Kidshealth.org, "Encourage kids to choose cafeteria meals that include fruits, vegetables, lean meats, and whole grains, such as whole wheat bread instead of white bread. They should also avoid fried foods when possible and choose low-fat milk or water as a drink". This issue is a very sad and depressing one, although we have the knowledge and resources to make it better, we choose not to. Mainly the big companies are more concerned about capital gain than the health of the children. Many children have a higher risk of Type 2 diabetes, high cholesterol, and other harmful diseases. Children will also will be face with sleep apnea, making it very difficult for them to breath while asleep. It will make simple task hard for them like walking upstairs, running, and jumping as a normal child would do easily. On the other hand, the future could be a very promising one if an effort was put forth the help children. There would be less obese children in the world, and fewer children with horrible diseases that rob children of a healthy childhood. The reason for this change is simple " give the children a longer life span", and they can look forward to a healthy adult life as well. "A study in 2005 found that children today may live shorter lives by two t o five years than their parents because of obesity"(Hellmich). What could happen if it isn't changed, is that we'll continue to struggle with the obesity issue and it will definitely get worse; The diabetes rate will rise, and more kids will perish at a young age because of it. More parents will have broken hearts because of losing their children, regretting not taking more initiative to educate themselves and their children on eating healthier. According to Bethany Thayer of the American Dietetic Association, " parents may think they can get away with making unhealthy choices, but the kids are watching"( Hellmich). Works Cited BIBLIOGRAPHY Hellmich, Nanci. "parents must be role model to fight obesity." USA TODAY (2010): 3. Kidsheath from Nemours. 29

Sunday, November 24, 2019

Free Essays on Gawain

Sir Gawain and the Green Knight is filled with magic and symbolism. Morgan le Faye and Merlin are responsible for the magic of the Green Knight. There are three literal hunts (deer, boar, and fox), three symbolic hunts (the attempts to seduce Gawain), and three hits of the Green Knight's ax. The deer is timid, the boar is ferocious, and the fox is cunning and sly. The characteristics of the animals are symbolic of Gawain and the challenges set before him. There is great significance in the fact that the events in this poem occur in multiples of three. Three times Gawain is tempted by the lovely lady, and on the third time, he succumbs to her temptations, by accepting the green belt. The hunts take place on three different days. The third day, Gawain withholds a portion of his earnings. The Green Knight swings at Gawain three times. He purposely misses the first two times. On the third time he taps him, leaving a scar. The significance of all these threes is that Christianity teaches the trilogy: the Father, the Son, the Holy Ghost. Almost everything in life falls into groups threes: man, women, child; three trimesters to the birth of a child; the Sun, Moon and the Earth. The fact that the events unfold in counts of threes explains the depth with which the anonymous poet was trying to connect this story and this passage to the bible and biblical events.... Free Essays on Gawain Free Essays on Gawain Sir Gawain and the Green Knight is filled with magic and symbolism. Morgan le Faye and Merlin are responsible for the magic of the Green Knight. There are three literal hunts (deer, boar, and fox), three symbolic hunts (the attempts to seduce Gawain), and three hits of the Green Knight's ax. The deer is timid, the boar is ferocious, and the fox is cunning and sly. The characteristics of the animals are symbolic of Gawain and the challenges set before him. There is great significance in the fact that the events in this poem occur in multiples of three. Three times Gawain is tempted by the lovely lady, and on the third time, he succumbs to her temptations, by accepting the green belt. The hunts take place on three different days. The third day, Gawain withholds a portion of his earnings. The Green Knight swings at Gawain three times. He purposely misses the first two times. On the third time he taps him, leaving a scar. The significance of all these threes is that Christianity teaches the trilogy: the Father, the Son, the Holy Ghost. Almost everything in life falls into groups threes: man, women, child; three trimesters to the birth of a child; the Sun, Moon and the Earth. The fact that the events unfold in counts of threes explains the depth with which the anonymous poet was trying to connect this story and this passage to the bible and biblical events....

Thursday, November 21, 2019

Business Plan Research Paper Example | Topics and Well Written Essays - 5000 words

Business Plan - Research Paper Example It is one of the beautiful shopping malls in gulf region. Dalal Complex is a seventeen floored building consisting of several retail shops, brands, cinema complex and restaurants. Skinfood will be situated in the first floor of the building. The entire shopping mall has abundant places for parking with a capacity of about 500 vehicles and has also astounding view. Furthermore, the shopping complex is also equipped with modern technologies, music systems and strong security facilities (Dalal Complex, â€Å"About Dalal Complex†). Products. The business will provide several skincare and cosmetic products such as makeup, cleanser, mask and healthcare products among others. These products are made from natural food ingredients and developed in its real form as product elements which comprise fruits, vegetables and other food components (Skinfood, â€Å"Products†). MARKET PROSPECT The international skincare industry has increased considerably in recent years, recording about 4% growth in the year 2009. In United Arab Emirates (UAE), the market of skincare and cosmetics products has continued to demonstrate strong dynamism, having robust growth in sales. The most important product categories in the skincare and cosmetics market are colour products, hair care products, fragrances and skincare products (AME Info, â€Å"UAE Market For Skincare Products Expected To Be Worth Dhs540.3m In 2015†). Globally, customers had spent about US$2 billion in a week on skincare products in 2011. This market is characterised by invention, personalisation and segmentation. From 2005 to 2010, the market value of skincare industry in Middle East and Africa increased from US$1.4 billion to US$2.4 billion, indicating a Compound Annual Growth Rate (CAGR) of about 12% (AME Info, â€Å"UAE Market For Skincare Products Expected To Be Worth Dhs540.3m In 2015†). In Gulf Co-operation Council (GCC), skincare industry had been demarcated to become doubled from 2005 to 2010 . According to the research of Euromonitor, the market of skincare products will demonstrate steady growth, where facial care products will hold the biggest market segment. The findings suggest that skincare market is expected to increase at CAGR of 5%. This growth is determined by sustained progress of UAE in monetary front. Besides, a growing number of populations are also found to pay more concentration on taking care of health. The UAE market of skincare is based on retail setting. Combined with considerable product innovation with respect to discerning customer base, the prospect of skincare products in near future continues to be positive (AME Info, â€Å"UAE Market For Skincare Products Expected To Be Worth Dhs540.3m In 2015†). Accordingly, global skincare organisations are progressively targeting the growth oriented market of Middle East and Asian region. People nowadays are providing considerable emphasis on taking care of skin and it has become one of the regular ro utine activities. Furthermore, the global skincare manufacturers are increasingly targeting customers with new product lines which can serve the requirements of this particular market segment. In the UAE, facial care products are the fastest growing market segment in the skincare industry. Facial care products are estimated to grow at CAGR 6% (AME Info, â€Å"UAE Market For Skincare Products Expected To Be Worth Dhs540.3m In 2015†). The other important market segment in skincare and cosm

Wednesday, November 20, 2019

Coursework on Employment Essay Example | Topics and Well Written Essays - 2500 words

Coursework on Employment - Essay Example An employment agreement can also confirm the status of employment. 3 This may at will or at a specified term, length of term of employment. The employer can clearly define the minimum commitments and obligations for both the employer and employee and , if the agreement is well drafted, this can minimize disputes based upon the termination of the employment relationship by clearly setting forth the terms under which the employer and employee may separate. Under the law employers are required to give their employees a written statement with regards to the details relating to the contract of employment. 4 However, the law does not prescribe the actual substantive content of the terms of employment as long as it does not divert from the objective of the law. It is stipulated that what is actually required is that the particulars can be set out in a formal contract or written statement. It must indicate the particulars in a single document but cross-reference can be made to other documents in respect to sickness and pensions entitlements and disciplinary and grievance procedures. These documents should be easily accessible such as in a employee handbook and pension rulebook. The data that must be indicated in the written contract of employment must include the name of the employer and employee, the date when the employment is to commence, the rate of renumeration, the schedule at which the renumeration is to be paid, terms and conditions relating _____________________ 3 Black's Law Dictionary 75 (8th Ed. 2004) 4 Employment Rights Act 1996 (c. 18), part 1, Employment Particulars, Right to Statements of Employment Particulars Serapio 3 to hours of work, holidays, holiday pay, sick pay, pension schemes, notice entitlements, job title, term of employment, place of work, details of disciplinary and grievance procedures and details of any collective agreements which affect the terms and conditions of the employment. Subsequently, the written agreement contract must be given not later than two months after the beginning of the employee's employment and any changes thereat must be relevant to the matters which must be confirmed to the employee by way of a written notice to be given at the

Monday, November 18, 2019

Nick DB 2 His Assignment Example | Topics and Well Written Essays - 250 words

Nick DB 2 His - Assignment Example One of the schools is Pythagoreanism which offered a solution to overcoming basic problems in mathematics, Sophism relates to a form of philosophy that was devoted to the teaching of the nobility and the key statesmen. The Platonism school of thought came up with the theory of forms that offered explanations transcendent and archetypes. The Stoicism school of thought which was developed by Zeno of Citium offered an explanation on the goal of life as being in line with nature. This school of thought has been applied in a number of circumstances as it advocates for the development of self-control as a means of overcoming destructive emotions that arises due to life challenges. The earlier Greeks majored on the philosophy as it offered a means through which people could steady themselves during the Hellenistic period. The period saw the emergence new group of philosophers who had different approaches from Plato and Aristotle. The philosophies that were developed at the time were easily learned and portable so that they could assist people with the fortunes and misfortunes that marked their everyday

Friday, November 15, 2019

Supply chains and distribution in India

Supply chains and distribution in India Abstract Indias FMCG industry has emerged as a distinct sector over the last few decades. Multinationals are seeking to pursue growth opportunities in emerging markets due to increased globalization and competition. India is one such emerging market that not only provides multinational companies with a large customer base but also welcomes western products. Having a presence in India means sourcing, moving and processing up to one billion or more units. In addition, the cost expectations and the larger size of the consumer market will have implications on supply chains. Excellent supply chain strategies for India will involve adopting efficient processes enabling products to smoothly change hands from the supplier to the consumer while adapting to the constraints of cost, infrastructure availability and market size of the economy. Other constraints associated with political, religious or cultural barriers may also need to be considered. The report is divided into two major parts. One deals with the distribution chains prevalent in the urban market while the second part delves into the intricacies of the rural distribution market. We follow the same format for both the parts starting with an introduction into the current trends found in the urban or rural market, then clearing our point with a case study and finally presenting what are the challenges faced by the companies. Supply Chain Management in Urban region- Introduction The FMCG sector is the fourth largest sector in the country and has been growing in folds in the past few decades. The sector has both organized and unorganized players and the number of players in both the segments are on increase, in addition to this there is also an increase in the number of products introduced every year. Since the sector is characterized by the fast movement of goods and services its dependence on effective supply chain is higher than that of any other sector so supply chain management is become one of the most vital functions. Supply chain management in urban sector typically refers to procurement of raw materials, processing them into finished products and distributing them in the urban region till its reaches the end consumer. Every company/ firm in the FMCG sector has its own supply chain models which are similar yet different from one another. Below are two examples of the supply chain models. The supply chain management in urban regions is more to do with choices for instance in logistic a firm can choose to transport the product via railways, roadways, airways or in some case even waterways. An effective supply chain will enable the firm to minimize the cost, maximize returns, match the supply to the demand and ultimately satisfy the customers. An urban supply chain in most cases has clear cut distinction between the inbound supply chain (pertaining to providing raw materials and components), in house supply chain (conversion process), outbound supply chain (distribution of good and services. The profile of the urban consumers plays a crucial role in determining the supply chain because at the end without the consumer there is no point in building up the supply chain model. Strategic decisions like number of outlet the firm would have to distribute its product, the kind of outlet, method to transport the product, places from were the raw material is procured, manufacturi ng method (automated, semi automated or manual) etc are taken keeping the consumer and the utility of the product to the consumer in mind. This is on account that the urban consumers are well informed and there are many competitors fighting for that consumer. The Supply Chain of Dominos Pizza (India) Dominos Pizza in India Dominos Pizza opened its first store in India in 1996. Jubilant FoodWorks Limited, a Jubilant Bhartia Group Company holds the Master Franchisee Rights for Dominos Pizza for India, Nepal, Sri Lanka and Bangladesh. Prior to Sep 24, 2009, the company was known as Dominos Pizza India Limited and underwent a name change, rest of the terms remaining the same. The promoters of the company are Mr. Shyam S Bhartia, Mr. Hari S Bhartia and Jubilant Enpro Private Ltd. Today Dominos has more than 300 stores in India with more than 9000 employees. According to the India Retail Report 2009, we were the largest Pizza chain in India and the fastest growing multinational fast food chain between 2006-2007 and 2008-2009 in terms of number of stores. Over the years Dominos Pizza has focused on:- Delivering great tasting pizzas Superior Quality Exceptional Customer service Think global and act local Value for money offerings Being a home delivery specialist capable of delivering pizzas within 30 minutes or else FREE Revenue in India 70% of the revenue comes from home deliveries 30% of the revenue comes from OTC sales 30 minute Guarantee Dominos has its unique proposition that they deliver pizza at a customers doorstep within 30 mins of placing the order or they would receive the pizza free. They have positioned themselves as a brand that delivers happiness home (Khushiyon ki Home Delivery) has an emotional benefit which they offer to their customers Dominos Supply Chain Integration Shown below is a high level flow of the supply chain followed by Dominos Pizza, India:- Raw Material Procurement Distribution Logistics Inventory Management Operational Strategy Production Process Quality Initiatives Customer Service R Raw Material Procurement Dominos has 4 commissaries or production kitchens-cum-warehouses (Regional Centralized Facilities) in India Delhi Caters to 54 outlets in NCR region including 33 outlets in Delhi City itself Bangalore Caters to 90+ outlets across south zone Kolkata Caters to 15+ outlets in Kolkata Mumbai Caters to 80+ outlets in Maharashtra including 51 in Mumbai and 15 in Pune Raw materials like Wheat is brought in from Jalandhar and sent to commissaries in refrigerated trucks. Pizza dough is prepared using a proprietary recipe in the commissaries. They are then made into dough balls and sent to retail outlets in refrigerated trucks. Vegetables like tomato, capsicum, baby corn, onion and spices are purchased locally. Cheese is brought in from Karnal, Haryana. Food which is frozen is sent in these trucks at -18 deg Celsius. It uses a hub and spoke model with commissaries as Hub and retail outlets as spokes. Logistics Wheat (Jalandar) Dough Vegetables (Local) Cheese (Karnal) Commissary Refrigerated Trucks Retail Outlets Inventory Management Major inventory consists of perishable items with a very small shelf life. Some of the items are tabulated below:- ITEM SHELF LIFE Dough Ball 3-4 days Seasoning and Toppings 4-5 days Onion, Capsicum , Tomato 5 days Cheese Blend 4-5 days Chicken Meat 2-3 days Cheese Dip 4-5 days Mexican Wrap Base 3-4 days Each store maintains approximately 4 days of inventory since most of the items have a shelf life of around 3-4 days. Inventory is refilled by trucks from the commissary every 4 days. There is a mini cold storage in every outlet. Inventory levels are monitored centrally by POS (point of sales) data using Intura Vision (POS management system) installed in every outlet. Intura Vision is the simplest and most reliable point-of-sale management system available for delivery and quick service restaurant operations. Intura Vision streamlines every aspect of your operation, including order taking, credit card processing, kitchen management, deliveries, inventory, and customer marketing, to make your business more efficient and profitable. There are two POS per outlet. Orders are received in telephonic form also there are in-store orders. Production Process The entire production process is streamlined into three stages:- Dough Table Here the pizza base is prepared. It is rolled out of the dough ball. There are three standard sizes Personal (8 inches), Medium (10 inches) and Large (14 inches). Personal, medium and large serves one, two and four persons respectively. Then cheese blend is applied on the base. The entire process of making a pizza base takes 1-2 minutes. Bake line In this stage toppings and seasonings are applied on the top of the prepared base. The choice of toppings depends upon the pizza ordered. Customers also have the facility to customise their own pizza by choosing their toppings from a variety of toppings available. Toppings can be veg, non-veg or both. Customer can also choose the seasoning they prefer depending upon the spices they would like to have in their pizza. The entire process of make line is 1 minute. Ven The pizza is then ready to be baked in oven. The temperature maintained is 470 Fahrenheit. Oven has a capacity to bake 6-7 pizzas in one slot. The pizza needs to be baked for about 5-6 minutes. The ovens used now-a-days are fully automatic along with a conveyer belt, so that the flow is continuous. In case of production in India, Dominos has a turnout of 1 pizza per minute. This meets the current demand requirement. The constraint here is the oven. They have overcome this by withdrawing the 30 min guarantee during festivals like New Year, Christmas, Diwali and rush-hours. Operations Strategy Dominos follows a hub and spoke distribution network wherein the 4 commissaries are the hubs and the retail outlets are the spokes. The raw material is replenished in the outlets from the hubs every 4 days or when it gets over, whichever is earlier. Vegetables are purchased locally (delayed differentiation). They have incorporated IST (interstore transfer) to cater to sudden spikes in the orders during special occasions wherein inventory falls short. In such cases material from nearby store is transferred to the critical store so that there is no halt in operations. They also have performance based costing for their employees where employees are given incentives depending upon the volume of sales which they achieve. Higher the sales better the incentives. Present status due to mismanaged Supply Chain in India: In India, about 60% of food value is mislaid in the supply chain from the farm to the final consumer. Consumers end up paying approximately 35 percent more than what they could be paying if the supply chain was refined, because of wastage as well as multiple margins in the present supply structure. Comparing with what returns farmers in India get (30%), in the USA the farmers can receive up to 70 percent of the final retail price and wastage levels are as low as 4 to 6 percent. Therefore we can appreciate the benefits that could be generated from implementing those practices and tapping those skills for the supply chain in India. The significance can be understood by the fact that the logistics  cost component in our country is as high as 7 10 percent against the global average of 4 5 percent of the total retail price. Therefore, the margins in the retail sector can be improved by 3 5 percent by just improving the supply chain management. Supply Chain Challenges Urban India Some key reasons of underperformance of supply chain management in urban India 1. Supply chain risk mitigation in an economic downturn: supplier financial risk, volatility in energy, commodity, labor rates and currency exchange, unpredictable economic recoveries. 2. Searching for working capital: FMCG companies will look to reduce inventory and lower operating or carrying costs. Buyers will look to extend payment terms Suppliers will drive to collect receivables more quickly, creating the need for a liquidity buffer such as supply chain financing 3. Shortening the supply chain by making proper use of transportation facility: Companies will need to plan a distribution system that takes care of the realities of domestic transportation infrastructure. Indias supply chains must contend with slow transit networks and inadequate infrastructure. For example, 70 % of Indias seaborne trade is handled by just 2 of the 12 major ports. The Railways is also constrained when it comes to freight movements. Historically, the countrys rail capacity was limited to passenger traffic, and people protested the use of rail for freight movement. Only of late has the government initiated efforts to promote rail shipments. Most commercial shipments in India make their journey aboard a truck. Hiring a carrier meant working with a small trucking company, as the country has no large, national transportation companies. A recent study of the transportation industry found that the majority of carriers had less than five trucks in their fleets. Scheduling deliveries and pickups also can be tricky. At present, most warehouses are located in the heart of Indian cities, and many municipalities prohibit large truck movements during daytime hours. It is possible to negotiate special exemptions in some places, but generally shippers must plan on nighttime movements. Another alternative is to unload large shipments at a cross dock outside the city and move orders to smaller vehicles for delivery. 4). More free-trade agreements and more scrutiny: The entry of foreign players in the retail segment will increase competition even further. More importantly multi-national companies might be having more money at their disposal. Thirdly they will also have access to latest technology and a ready highly efficient model to implement from.   5). Push-pull boundary: Increased competition, and fluctuating demand will make it difficult to identify the points at which the flow of goods switches from being pulled by consumers to being pushed by extractors.. 6). Maintenance of safety stock: Instead of having huge safety stocks at different places, centralized place will have to be used to have even more cash liquidity and lesser availability of godowns. 7) Judicious use of newer technologies and decision making tools: Use of newer technologies such as RFID (Radio Frequency Identification) continue to change the way SCM systems are designed and managed. Until recently, barcodes were the primary means of tracking packages. The advent of cheap, reliable RFID technologies have eliminated the need to physically scan packages in shipment, storage, etc, since packages with the embedded chips can be remotely scanned. 8) Creating a demand-driven supply chain To support a demand-driven supply chain, FMCG companies must deploy performance-oriented supply chain practices, such as continuous monitoring and alert notification. This will give them a clear idea of their total supply network to adapt to changes in demand and adjust based on real-time insight into global operations. A reliable demand plan provides the foundation for sales and ops planning (SOP) which helps FMCG companies better arrange daily operational; more effectively balance supply and demand; and make better decisions that impact both the top and bottom lines. 9) Other problems faced:. Inadequacies in infrastructure such as lack of high quality road networks, power shortages and insufficient storage spaces. The current rise in property prices and rentals may render a few retail business models unviable. The retail industry loses to the tune of US$120 to US$130 million every year in frauds, thefts and employee pilferage, shop lifting, vendor frauds or inaccurate supervision despite using standard and modern security features Multiple taxes at the federal and state level Rural Market Introduction The FMCG sector in the urban areas is becoming quite saturated (though it will continue to dominate in the next 8 10 years) while the penetration in the rural areas are only about 1%. The rural areas have and will continue to make up more than 50% of Indias total households and accounting for more than its current 66% contribution to total FMCG consumption. Rural India has a large consuming class with 41 per cent of Indias middle-class and 58 per cent of the total disposable income. Currently, nearly 34% of the off take of FMCG companies come form rural areas. Companies like HUL, ITC and Colgate have already established good distribution networks in these regions. Other companies would start catering to these regions in near future. Figure 1: Urban and Rural growth rates (Personal Care products) A huge segment of this market is currently flooded with obscure brands that are largely manufactured and distributed by small and medium enterprises. However, with the growing competition in the FMCG business, it has become difficult for SMEs to market their products sustainably. This is mainly due to the solidly established brand images of bigger players and the increasingly sophisticated demands of the urban customer. SMEs also lack the capital investment needed to compete with bigger players. However, with the growing economy, substantial business opportunities for FMCG producers have emerged in the Indian rural sector. The rural FMCG market is growing with a CAGR of 3-4%. In the case of products like soaps, talcum powder, cooking oil, tea, cigarettes and hair oil, the share of rural market crosses 50%. The capital expenditure of urban consumers on FMCG products is Rs. 49,500 crore, while that spent by rural population is over Rs.63,500 crore. This is indicates the growth rate and participation of rural FMCG markets in India. Despite the huge scope for FMCG products in the fast-emerging rural markets, some gray areas need to be worked out before SMEs can establish sustainable businesses: à ¢Ã¢â€š ¬Ã‚ ¢ Rural India does not represent a homogeneous market. The tastes and preferences of the consumers vary from district to district in the country. With changes in the language and dialect, advertising has to be tailored specifically for different target consumers. à ¢Ã¢â€š ¬Ã‚ ¢ Networks are not efficient to tackle the distribution demands. Problems exist in reaching the interiors of the country. Initial expenditures to develop distributor networks are immense, because in Roads and communication networks are not efficient to tackle the distribution demands. à ¢Ã¢â€š ¬Ã‚ ¢ As there is little consumer research regarding the rural markets, companies commit the folly of overestimating the awareness of product usage in the rural market. à ¢Ã¢â€š ¬Ã‚ ¢ The Indian consumer is traditionally price sensitive and more so in the rural parts. Multinational companies that modify portions and packaging to create a greater value proposition have succeeded in targeting the rural consumer. à ¢Ã¢â€š ¬Ã‚ ¢ The rural distributor cannot stock a large variety of products because of credit problems. Also as the retailer plays a vital role in the village in convincing the consumer about the usage of the product, it becomes imperative to provide sufficient information and infrastructure support to stock adequate inventory of goods. Major global brands have included villagers in their distribution channels, not only providing employment but also extending the reach in the rural markets. à ¢Ã¢â€š ¬Ã‚ ¢ While increased penetration of telecommunication has resulted in an increased awareness among villagers, it is still important to understand that a major chunk of rural community is not educated enough to comprehend the technicalities of the product/brand usage. Models for Rural distribution chains Approach 1 : Dedicated Rural Entrepreneur: The Individual is preferred to have a two wheeler and act as the spoke between the super stockiest and the villages in a hub and spoke model. He is expected to know the area well and has sufficient education to run a business. He is recruited to cover the nearby areas as well ( upto a 40KM range). He acts as the point of contact to receive and deliver the goods to the respective stores in his area of service. The analysis says this model works well for products that cost more than 75 per Kilo and the important part is that the company need not worry about the administration part of the operation. Approach 2: Distributor consolidation for urban and rural markets: Here we are to consolidate the urban distributor and the super and sub stockiest into a single group to serve the retail outlets. This entity is supposed to cover the town and the villages nearby. Approach 3: Consolidated Distribution with tele-order booking: Rural tele-density in India is expected to go up in the near future. This would help to remove the role of saleman an facilitate direct communication with the rural retail outlets to the super stockiest. However the drawback is that the company might loose on the relationship with the retail store in the absence of a sales person. Approach 4: Distributor choice based on unutilized reverse logistics potential Another non-traditional form of Collaboration for rural distribution could be to partner with other partner low-margin, high-reach players in rural markets. An example could be that of the dairy industry. The vehicles form the Dairy factories goes empty to the rural areas for collection and comes back with the milk. So it could be used for the transportation of goods from the factory site to the rural areas. Pepsico Distribution Chain Pepsico Indias distribution in rural areas thrives on two major factors :- Third party outsourcing Hub and spoke model in the rural areas. This mechanism is followed in the urban areas as well but in the rural regions the local entrepreneurs from the smaller spokes of the distribution channels. In all its operations the transportation is outsourced to the third parties. However there are some cases in which large distribution centres have their own fleet for transportation of finished products. The major two challenges faced by the company in the Indian context are the insufficient distribution in the rural sector and the inherent market risks. Distribution forms a major part of the companys concerns as it not only accounts to the revenues lost but also the potiential market share. The concern is primarily because of the Physical conditions of the Indian market and also the low purchasing power of the rural customer base this results in the setting p of the distribution centre cost being high. Coupled to that we have the insufficient sales offsetting the set up cost. Another concern is the taste of the rural customer who is more attracted to the local juice store or the fruit stall thereby increasing the competition from the unorganized sector. In case of distribution we have the issue of the size of retail store. The retail outlets in rural areas are more or less Kirana stores and there is near complete absence of the retail chains. So the amount of inventory that can be stocked in the small retail stores is very small. Apart from the distribution channel issues we have the risk of the market conditions. The small shops in the rural areas lack the refrigeration or storage capacities. The inventory is kept to meet the demands for the day and most of it is kept out in the open dues to lack of storage facilities. Thus many a time during the rainy season we can see the closure of these shops and sales of the products getting stalled. Pepsico has implemented the following strategies to overcome these concerns Utilizing the collective efforts of the small scale farmers, land holders and regional government Alliances with other multinationals Promoting entrepreneurship It started with a strategy similar to project Shakti used by the Hindustan Lever, but alliances were with local entrepreneurs and other multinationals. Its started by making the entrepreneur the spoke of its regional distributional network in the rural areas and then went along with Hindustan levers to share its distribution network. This helps the entrepreneur having a larger spectrum of products for distribution and hence a better prospect. The distribution chain of Pepsico India has a fragmented design which can be largely attributed to the lack of transportation infrastructure. And this resulted in the creation of collaborative and entrepreneurial partnership that thrives with symbiotic existence. An example could be that of a supplier who Is willing to lease land holding from other farmers Supply Chain Management in Rural Market- Challenges The following are a few of the challenges that a company faces while managing its supply chain in rural markets. Multiple Tier, Higher Cost and Administration Problem In the first place, the rural supply chain requires a larger number of tiers, compared to the urban one. The long distances to be covered from the manufacturing points to the scattered consuming households cause this situation. At the minimum, the rural supply chain need the village-level shopkeeper, the mandi-level distributor and the wholesale/stockiest in the town. And on top of them are the manufacturers own warehouse and branch office operations in selected centres. Such multiple tiers and scattered outfits push up the cost and make supply chain management a major problem. The scope of manufactures direct outlet such as showrooms or depots is quite limited in the rural market unlike in urban areas. It becomes expensive as well as unmanageable. The dependence of the firm on intermediaries is much greater in rural areas as direct outlets are ruled out. But controlling such a vast network of intermediaries is a difficult task. Control is mostly indirect. And because of these factor s the firm has to be more careful while selecting the supply chain members in rural areas. Non-availability of dealers Another problem is the availability of dealers. Many firms find that there are limited numbers of suitable dealers. Even if the firm is willing to start from scratch and try out rank newcomers, the choice of candidate is really limited. Poor Viability of Retail Outlet Retail sales outlets in the rural market suffer from poor viability. A familiar paradox in rural distribution is that the manufacturer incurs additional expenses on distribution, still the retail outlets find that the business in unremunerative. The scattered nature of market and the multiplicity of tiers in the supply chain use up the additional funds the manufacturer is prepared to part with. And no additional money comes to any of the groups. Moreover, the business volume is not enough to sustain the profitability of all the groups and the retail outlet suffers the most. Inadequate Bank Facilities Supply chain in rural markets is also handicapped due to lack of adequate banking and credit facilities. Rural outlets need banking support for three important purposes. To facilitate remittances to principals and to get fast replenishment of stocks To receive supplies through bank (retiring documents with the bank) To facilitate credit from bank As banking facilities are inadequate in rural areas, rural dealers are handicapped in all these aspects. It is as estimate that there is only one bank branch for every fifth village. Inadequate Credit Facilities Inadequacy of other institutional credit is another constraint. Rural outlets are unable to carry adequate stocks due to lack of credit facilities. They are unable to extend credit to their customers. Thus there is a vicious circle of lack of credit facilities leading to inadequate stocking and loss of business, finally resulting in poor viability of outlets. Lack of Transportation Facilities Many rural areas are not connected by proper transportation facilities. There are a very few villages with railways lines. Atleast 50 percent of the rural roads are poorly surfaced, and many totally destroyed or severely damaged by the monsoons and remain unserviceable. Also the use of bullock carts looks inevitable for many years into the future. In such a scenario distribution of goods via any supply chain is a huge challenge in itself. Lack of Proper Communication Facilities Communication with these villages is difficult and highly expensive. Moreover, 300,000 villages in the country have no access to telephone. This acts as a hindrance to proper supply chain management. Other Challenges Apart from the above there are various other challenges that firms face on day on day basis like. Low literacy rate Difference in languages and Dialects Prevalence of Seasonal Demand Rural policy Caliber of the rural community- they have great acumen but they need intensive training Supply Chain Management in Rural Market- How to tackle the Challenges In order to tackle the problem of supply chain management the following strategies can be implemented. Satellite Supply Chain In this system stockists are appointed in the major towns and feeder towns. They by and large discharge the following functions; (a) Financing (b) warehousing and (c) sub-distribution. Retailers in and around feeder towns get attached to these stockists. The manufacturer supply goods to the stockists either on consignment or on cash/credit basis. Further these stockists deliver the good to the retail market points or satellite markets. Over a period of time some retailers grow in stature and importance. If such retail points also coincide with centres of demand and transportation within the feeder town area, they are elevated to stockists points. If 15-20 retailers were operating as part of the original stockists network, 5 or 6 get elevated over a period of time to stockists. Fresh retail points get established simultaneously out of which some get attached to the original stockists while others to the new one. This process continues as long as the market and consumption level keep expanding and the supply also catches up via such a supply chain. Just like second-generation stockists, set of third generation stockists get established with the passage of time. At any point of time, a certain number or retail points hover round a particular stockist. Hence the system is called Satellite Supply chain distribution. The satellites have their own satellites too. The advantages of this system are Market penetration takes place without manufacturer having to expand his direct stock points. This system can bring in ample rewards in terms of increased sales and lesser distribution costs. Syndicate Supply Chain This solution is essentially for small companies: tie up with leading companies that already has a presence in rural market and distribute products through there supply chains. Relying on Private Village Shops Tie ups with the village private shops are the cheapest and most convenient channels in the rural markets. Supply Chain Management in Rural Market- Opportunities In the present scenario, companies operating in India will have only two options: either