Saturday, December 28, 2019

Case Study - 1124 Words

Case A-7: Starbucks—Going Global Fast Description of challenges The major challenges facing the decision maker, Schultz, include the following: the challenge of the fast saturating U.S. market (Going Global Fast, n.d, p. 2). According to analysts, in two year time, Starbucks will have saturated the U.S. market. This will lead to stagnation or slow growth in sales and reduce the effect of increased sales per new stores opened. For instance, in Seattle, Starbucks has a cafà © to serve every 9400 people; a number considered to be the upper limit of the coffee shop saturation. The challenge of 30 percent self-cannibalization a year as Schultz admits, where blanketing an area with new stores to dominate market culminates to cutting sales at†¦show more content†¦Even though the use of local operators makes it easy to enter new markets, it lowers profitability from overseas stores. Increasing the number of stores will result to increased profit products from overseas market by virtue of the multiplication effect. That is, 20 to 50 percent mult iplied by a large number of outlets gives a larger figure. Implementation program Key Activities Timing Resources Evaluation 1 Market research on meals preferences 3-4 weeks Finances to fund outsourced research services Identify meals/recipes for specific categories of the market population. Pilot test of meals sales in 3 different outlets 2-3 weeks Recipes/meals Determine level of meals sales per outlet. Official introduction of the meals in Starbuck outlets 2-4 months Recipes/meals and compliments such as utensils. Performance level of the project in terms of sales revenues from meals. 2 Training of employees 1-3 weeks (at intervals regularly) Training materials and finances to fund external trainers Level of performance improvement in terms of productivity after training. Introduce team building sessions 1-7 days Playgrounds, meals and drinks, games, transportation. Level of improvement in communication across the company structure. Increase basic compensation and introduce bonuses 2-6 months Increased finances allocated to compensation. Evaluate the level of motivation Increase number of employees 2-6 months New employees and more finances for recruitment ReducedShow MoreRelatedCase Studies : A Case Study Approach Essay1157 Words   |  5 PagesA case study is a specific instance that is frequently designed to illustrate a more general principle (Nisbet and Watt, 1984). Hitchock and Hughes (1995) further suggest that the case study approach is particularly valuable when the researcher has little control over evens. Case studies strives to portray ‘what it like’ to be a particular situation, to catch up reality and ‘thick description’ (Geertz, 1973) of participants’ lives experiences of, thoughts about and feelings for a situation. TheyRead MoreCase Study887 Words   |  4 PagesCHAPTER I INTRODUCTION 1.1 Reasons choose the case 1.2 The Problems The problems of this case are: 1. How would you characterize Lincoln Electric’s strategy? In this context, what is the nature of Lincoln’s business and upon what bases does this company compete? 2. What are the most important elements of Lincoln’s overall approach to organization and control that help explain why this company is so successful? How well do Lincoln’s organization and control mechanismsRead MoreBusiness Case Study : Business Case Studies997 Words   |  4 PagesWriting Business Case Studies How to Write Business Case Studies The objective of this part of the course is to use your case study to help you solve real company problems and to make the learning more relevant to your experience. The Business Case Study you are being asked to start today will provide information for yourself and the class to permit constructive feedback. You will have to use all of your research, writing and analytical skills to write your Company Case Study. You must give enoughRead MoreCase Study148348 Words   |  594 Pages978-0-273-73552-6 (web) All rights reserved. Permission is hereby given for the material in this publication to be reproduced for OHP transparencies and student handouts, without express permission of the Publishers, for educational purposes only. In all other cases, no part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without either the prior written permission of the Publishers orRead MoreCase Studies13817 Words   |  56 PagesCASE STUDY #1 A Job Search Dilemma Eric, a second-semester senior, is looking for a job. Anxious about finding work in the worst economy in decades, he sends out scores of resumes for a wide variety of positions. The first call he gets is for a position that doesnt really interest him, but he figures he should be open to every opportunity. He schedules an interview, which he aces. In fact, the recruiter offers Eric the job on the spot. He would like Eric to start as soon as possible. Should EricRead MoreCase Study 8985 Words   |  4 PagesCase Study 8 Based on the January through June 2010 cash budget, what is the maximum monthly loss during the six-month planning period? What is the maximum cumulative borrowing balance? (For purposes of this question, disregard any interest payments on short-term bank loans or interest received from investing surplus funds.) Maximum monthly loss is in June: -$60,750. The maximum cumulative borrowing balance is $99,000 in February. What does the monthly cash budget reveal that indicatesRead MoreCase Study : The Angel 1089 Words   |  5 Pages Case Study #1 The Angel, 1997 Susan Meeks, an alias, woke to what she thought was the middle of the afternoon. A bright yellowish light was shining through the west window of her travel trailer. An other world being was in the room and was as tall as the ceiling of the trailer. She went to the bathroom where she washed her face with cold water and stayed in there long enough to smoke a cigarette. When she went back to the bedroom the being was still there. The being showed her futureRead MoreThe Case Study Of The Company1468 Words   |  6 PagesOverview of Case Study In the case study by Spector titled, Transferring Innovation Across National Boundaries, (Spector, 2012) company named Minnesota Biolabs (MB) provided laboratories with a quality test for contamination of injectable medications. This test required the use of live rabbits that led to the rabbit’s death after the test. The company was headquartered in Minneapolis, however they were organized with four, somewhat independent, national units in Europe and Japan, each run by aRead MoreLaw of Case Studies1514 Words   |  7 PagesZulfatah Arif SCM-019741 Work Psychology in Communication, Writing and Reporting COM 2153 Mr Haji Adenan Case Studies An Unmotivated Building Inspector Case Study By: Zulfatah Arif 1) Review the motivation theories discussed in this chapter. How would each one describe and explain the problems with Simon Lucas’s motivation? The theories that would be relevant to the problems with Simon Lucas’ motivation would be the McClelland’s Need Theory and Herzberg’s Two-Factor Theory.Read MoreCase Study Essay1116 Words   |  5 PagesCase Study Objective The Case will focus on issues related to the cultural aspect of international business; sustainable business practices including CSR issues; foreign investment; and the benefits of regional integration for the countries within, and companies doing business in, that region.   The case study analysis will be completed on an individual basis. Instructions THE CASE: Kaizer Consulting Kaizer Consulting is an international management consulting firm that specializes in business strategy

Friday, December 20, 2019

Authors or Horror, Edgar Allen Poe for The Raven and...

The two poems are eerie in aspect to modern day horror. Our terrifying horror movies and books derive from these two men; Edgar Allen Poe and Samuel Taylor Coleridge. Although these two authors are different in their techniques of writing, there are two poems that are similar. â€Å"The Rime of the Ancient Mariner† and â€Å"The Raven† consists of a bird bringing a bad omen. The situations are different; however, the meanings of the birds are similar. In these two poems, the differences are more apparent; the significance of one being a sea bird and the other a land dweller, the situations of appearance, and the meanings and curses they place upon the cursed. First, Coleridge and Poe create their birds different in the aspect of their dwelling and manner. The sea bird is called the Albatross, in the beginning it is seen as a wonderful and beautiful bird. When the Mariner and his men were out to sea this bird, with a slight body but adorned large wings, flew across the o cean and the ice broke from the ocean. It almost appears as if the bird is innocent, with the description of the bird. Having a frail breast yet the stretching wingspan is strong; for leading those in need, the color of the bird even hints at innocence. It is innocent and blind from the death it is soon to experience. The Raven is a majestic and cruel land bird. The body is large but the wings are smaller. The color described as the Raven shows power and ferocity. The shoddy eyes of this endearing bird pierce into

Thursday, December 12, 2019

Comparison of the Italian Prison System to Ours free essay sample

university of phoenix| A World Apart| A Comparison of the Italian Prison System to Ours| | Matthew Kramer| 4/23/2011| | The Italian correctional system although much older than the American system are very comparable to each other. Both have come from fledgling institutions in the past that have both evolved because of officials in higher positions as well as concerned citizens that have voiced their opinions on how inmates are treated and how they are housed during their sentences. They have both experimented with the Pennsylvania and Auburn style types of correctional institutions.While America has primarily gone with just one of the models Italian prisons have taken a mix of both throughout their country. Their types of institutions are also pretty much the same as we have here with problems with overcrowding and underfunding. Italy has designated three separate penal housing authorities that are divided into three preventative detention institutions these are as follows: The preventive detention centers, the institutions for the execution of sentences and the institution of security measures. However the building of these institutions has been a problem due to funding and has also placed many inmates in cells that are built for one inmate. America also has the same problem with overcrowding and underfunding causing our country to place more inmates in spaces that were not designed for that many people. We will not place more than two inmates to a cell as where in Italy you may see more than two in a cell for a period of time because there is nowhere else to put them.The institutions for the execution of sentencing are divided into sub groups of arrest centers and detention centers. The institutions of security measures are also broken up into prison farms, work homes, treatment and custody centres and judicial psychiatric hospitals. American correctional institutions also have something similar to this although most of these are accompanied under the same umbrella. Inmates that enter the American system initially go to prison and from there unless sentenced differently they will be placed in a half way house or probation and parole house.Mental health inmates tend to stay at the prison while some will be moved to state mental hospitals for further treatment. The population of the two different correctional systems is very different here in America our inmate population is at almost 2. 5 million as of a survey done in 2008 while in Italy their total inmate population as of 1997 forward was at 55,136 and counting but the comparison of numbers to each other is very different. Many argue that this is due largely to our freedom and laws that govern our land and the allowance for the right to bear arms in the United States.Italy is a country of great reform and is always changing their laws this might also have an effect of how many inmates also make it in to prison. While American prisons are overrun much more then Italy’s are this forces us to privatize our correctional institutions to save space and maybe some money but mainly space. Since Italy’s inmate population is relatively low compared to ours but they do face overcrowding due to the limit of prisons they have built they do not tend to privatize the inmates out.Italy’s security levels are also similar to ours in they will segregate inmates that are more violent and volatile than others. The first level which is their high security is designed to hold inmates that have been convicted of a crime involving the Mafia, kidnapping, extortion or drug trafficking. First level prisoners will be assigned to prisons out of their areas that they live they are also not allowed out of their living areas which means anything that they do as far as programming, school, talking, walking etc.The second level which is their medium security and makes up most of their inmate population have all the schooling and programming that is available. The third level or minimum security is the lowest level and are allowed to have little supervision and placed in the least restrictive areas there are. American prisons are generally the same as we have the same levels our inmates are categorized with other levels within these levels that will determine what type of perks they are allowed while locked up. Prison life in both countries probably only differs little due to the prison that you are locked up in to the people that make the laws. For everything else how you have to watch your back and the groups that inmates will place themselves with for protection this does not change just from country to country you will see remains the same. Italy has three types of release that is comparable to America’s parole they are conditional release, amnesty and pardon. Conditional release is the most widely used in the country and is more like American parole then the other two.Inmates can be granted this if they have served at least 30 months or at least half of their sentence. They must have been good inmates while they were incarcerated and also they must believe that the inmate will be successful if released. They still must report to someone and get a job and have a place to live which is the same for American inmates on parole. Amnesty can be granted before or after the sentence and it basically commutes the sentence this was very unpopular and not used very much and since 1992 no amnesties have been granted.Pardons are the same in Italy as they are in America and can be granted by a governor or president. Article 111 of the Italian Constitution which was amended in 1999 will allow the defendant the right to question the accused and all parties to be cross examined. As where before a person could be convicted based on statements made during the preliminary phase of a trial. This allows inmates before sentenced or found guilty of a crime the right to face their accuser and question them as to why they are accusing them of committing a crime.The comparison of the two correctional systems you can see a lot of similarities and then there are vague differences. In my opinion I would take the American correctional system over the Italian one. This is due to the reading I have done and the way the Italian courts and correctional system are set up.

Wednesday, December 4, 2019

Security Threats In Cloud Computing And Preventive Techniques

Question: Discuss about the Security Threats In Cloud Computing And Preventive Methods. Answer: Introduction The cloud computing has been required to each individual existence. It delivers on the programs as well as storage space spaces as the services on the internet for small or maybe no cost. Many individuals use the cloud computing solutions every day (Armbrust, Fox, Griffith, Joseph, Katz, Konwinski Zaharia, 2010). The cloud computing is not an advancement, but instead, It is an approach for the building of the IT solutions that use the sophisticated computational power in addition to the enhanced storage functionality. The concentrate of the cloud computing is from the providers perspective as the redundant hardware that is linked to the support downtime on any of the devices in the network, without the alternation in the user's point of view. Security challenges and threats of the cloud computing Cloud computing has been an emerging technological know-how that has collective resources in addition to the lower cost which depends on the pay per use depending on the demand of the user ( Krutz Vines, 2010 ). Because of its features, it encounters numerous risks along with issue in the scopes of the security. 1) Abuse in addition to nefarious utilization of the cloud computing: The abuse and dubious usage of the cloud computing are the primary threat which has been recognized by the Cloud security Alliance. An example on this is the utilization of the botnets to stretch the spam in addition to the malware (Bhadauria Sanyal, 2012). The attacker could penetrate a public cloud and plan to upload on the malware to various computers in addition to utilize the power of the cloud infrastructure to attack other machines. 2 ) Insecure application programming interfaces: The software interfaces or the APIs are exactly what the clients utilize for interacting with the cloud services, these really should have extraordinary authentication, access control, encryption as well as activity monitoring mechanisms whenever the third parties begin to develop in it (So, 2011 ). 3) There is the issue of the data leakages along with the consequent problems. The information deletion or even the alteration devoid of any backup could possibly lead to the drastic data related problem, for instance, the security, integrity, segregation as well as the breaches (Zissis Lekkas, 2012). This, therefore, can easily lead to the sensitive data becoming accessed by the unauthorized users (Krutz, Vines, 2010). The cloud computing platforms ought to offer new solutions to have the ability to gather data and well as carrying out evaluation and control on the privacy to support the application, which is seeking for the information. 4) Malicious attacks: The risk that has been related to the malicious attackers is augmented for the customer of the cloud services via utilization of the numerous IT services that absence the lucidity that is between the procedure and process that pertains to the services providers (Krutz Vines, 2010). The malicious users might gain a usage of numerous confidential data and consequently result in the data failures. 5) Service Hijacking: the service hijacking might be regarded as the gain of the illegal control on numerous services that are not authorized by an individual. It accounts for several techniques, for example, phishing, exploitation of the software along with the fraud. This continues to be thought to be among the top most threats and it is often pointed as the extreme threats. The likelihood of the hijacking of a person accounts considerably as no native API could be employed for the registering of the numerous cloud services. Security countermeasures in the cloud-computing environment To be able to implement data security to cloud computing technology, the study community should seize effective along with constructive steps to be able to assure the security (Sabahi, 2011). Depending on Gunnar emphasizes that a group exists to be able to presume the wide-ranging standards, in addition, to ensure inter-operability among the providers of the services (Sabahi, 2011). The endeavor to improve the security standard will certainly guarantee element for example confidentiality, integrity as well as availability. There are several methods in the cloud computing one may expand on the subject of the security. The issue of Architecture security on the cloud computing risks could be dealt with significantly practically via the overall performance of security evaluation. The architecture of the cloud consists of the numerous security parts, which are embossed in the cloud architecture to be able to offer secure cloud computing (Sabahi, 2011). A few of these parts are access management, security API, and the security of the network and the storage. Security protection in the cloud servers, encryption is the better solution in order to secure the data. Before the information is saved in the cloud servers, it might be vital that you encrypt the data (So, 2011). The owners of the data might give consent to a specific group member to allow they access this kind of data easily. Heterogeneous data-centric security could be utilized in the provision of the data access control. When one wish to attain privacy and the data security protection it is applicable when it is used as a service. Application of the encryption on the data makes the data to be totally unusable as well as normal encryption can complicate on the availability. To be able to overcome on the threats of the malicious attack one can use the access control mechanism tools, which are used to control the not authorized end user while using the secured information. According to Peter Mell (2012), he suggested that the infrastructure as the service as well as one of the models which reveals the problems with the aid of the virtualization as the frontier security protection to have the ability to protect against any one of the malicious attacks in the cloud users. Data leakages as regarded as a security threat to get over this kind of is through deduplication with enabling of the limitation on the variety of the user uploads per window time (Saripalli Walters, 2010). Deduplication of as the means of storing an only single copy of the redundant data and providing just the connect to the providers rather than storing the precise and essential copies of the information. The user might confront on the threat of service hijacking by prohibiting the sharing of the account credentials between the users and the services. Furthermore, an alternative way would be to Leverage a solid two-factor authentication method in which it is possible and employment of a proactive monitoring to have the ability to identify any not permitted activity ( Subashini Kavitha, 2011 ). A user should be capable of recognizing the cloud provider security policies. In the real word, the providers of the cloud services makes use of the requirements much more often in order to provide the security. Applications of the cloud computing technologies and use The cloud computing has been credited with the increase to the competiveness through the cost reduction, a greater flexibility, and the optimal utilization of the resources (Kandukuri Rakshit, 2009). Some of the application of the cloud computing aimed at achieving business goals for the organization are as follows: one is the use of the cloud has been used for the testing and the development. There are many cloud-computing environments, which are tailored to the needs of the organization (Ko, Jagadpramana, Mowbray, Pearson, Kirchberg, Liang, Lee, 2011). The cloud computing has been used in the big data analytic application. This has been possible through leveraging of the in order to tap to quantities of the structured and the unstructured data to harness the benefit of extracting the business data. The cloud could offer file storage facilities. An individual can be able to store and retrieve the files in any of the web-enabled interfaces. Organizations are running a much cloud-ba sed application such as the customer relationship management, the accounting, and the human resource. Impact on the discussed issues and their application in real life The cloud computing has changed lives in many ways. On the social impact, it has seen the likes of the YouTube and the Google, to be testimony to the shift on how the individuals are interacting with other individuals (Takabi, Joshi Ahn, 2010). Taking on the advantages associated with the development of the cloud technology as well as the social media space has allowed individuals to access analytical abilities. The cloud computing technology has offered other benefits such as the development of the education and improvement of the healthcare industry. Information can now be available instantly through the proliferation of the websites. Lesson learned in the research The cloud computing in its current form has been around for a decade now. With the activities going on each year, I have come to understand some key lessons on what cloud computing is all about. I have understood it is relatively safe as well as secure. Putting the data in the cloud could have potential risk proposition, but nonetheless, many organization is embracing the cloud services. The cloud computing models can be regarded as working well. This has been publicized among the cloud provides. Conclusion The cloud computing is in continual development to able to make a difference in various levels of the demand services, which is to be available to the customers. Many individuals are enjoying the benefits of the cloud computing, nonetheless, there is security concern in the cloud, which has become a key challenge. To be able to provide a better quality of the services to the cloud users, the security flaws should be identified as well as be addressed. In this research, it has examined on the security threats in the cloud computing along with the precautionary techniques. In the near future, I believe we are going to continue to contribute to the initiatives in the researching of the cloud security threats along with the countermeasures to the cloud negligence. References Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., ... Zaharia, M.(2010). A view of cloud computing. Communications of the ACM, 53(4), 50-58. Bhadauria, R., Sanyal, S. (2012). Survey on security issues in cloud computing and associated mitigation techniques. arXiv preprint arXiv:1204.0764. Kandukuri, B. R., Rakshit, A. (2009, September). Cloud security issues. In Services Computing, 2009. SCC'09. IEEE International Conference on (pp. 517-520). IEEE. Krutz, R. L., Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing. Ko, R. K., Jagadpramana, P., Mowbray, M., Pearson, S., Kirchberg, M., Liang, Q., Lee, B. S. (2011, July). TrustCloud: A framework for accountability and trust in cloud computing. In Services (SERVICES), 2011 IEEE World Congress on (pp. 584-588). IEEE. Sabahi, F. (2011, May). Cloud computing security threats and responses. In Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on (pp. 245- 249). IEEE. Saripalli, P., Walters, B. (2010, July). Quirc: A quantitative impact and risk assessment framework for cloud security. In Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on (pp. 280-288). Ieee. So, K. (2011). Cloud computing security issues and challenges. International Journal of Computer Networks, 3(5), 247-55. Subashini, S., Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), 1-11. Takabi, H., Joshi, J. B., Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security Privacy, 8(6), 24-31. Zissis, D., Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583-592.

Thursday, November 28, 2019

The Flea Vs To His Coy Mistress Essays - The Flea,

The Flea Vs To His Coy Mistress Seduction has been the game most played through out the centuries, as males attempt to convince and invite females into their beds. In Marvell's To His Coy Mistress and Donne's The Flea, the speakers, propose a peccadilloes offer, which is so cunningly backed up by a liberalistic argument and is presented to each female when the generous request has been declined. These arguments are designed to induce thoughts of a carnal nature. The persuasions used by each are completely different but are structured entirely for one purpose. To corner or trick the maiden into saying Yes. Though both arguements are supurb, Marvell's has a nicer, refined style to it. In To His Coy Mistress and The Flea, there is an exemplification of just how crafty men can be during the hunt. The speakers, in both poems, makes a modest but declinable offer for sex to their maiden of choice. And, upon rejection, each male begins a fluent yet rhetoric arguments on why the maiden should accept his simple offer of passion. For Marvell, the argument was that there wasn't enough time left in the world, and that the maiden should partake in indulgence before it is too late. But at my back I always hear/ Times winged Charriot hurrying near(lines 21-22). He also states the unpleasuarble thought of the worms enjoying her verginity instead of him. Suggesting that if she continues to waste time she will die a virgin. then Worms shall try/ that long preserv'd Virginity:(lines 27-28). Whereas Donne's argument revolves around a metaphorical flea. Which as claimed by the speaker, represents his union with the maiden in matrimony, since the flea has taken blood from them both.It suck'd me first and now sucks thee/And in this flea our two bloods mingled be(lines 3-4). And, since their bloods have already mingled together, intercourse with him wouldn't be a sin and no honor would be lost if she yields to him.Though know'st that this cannot be said/A sin nor shame nor loss of maidenhood: (lines 5-6) Though however similar the gist of the poems might be, the art of seduction used by each speaker is quite different. The speaker in To His Coy Mistress seems to change his tone of persuasion rapidly from stanza to stanza. At first he is sweet, comming across as a gentleman and overstating how many ages he would spent on a single part of her anatomy A hundred years should go to praise/Thine Eyes..Two hundred to adore each breast (lines14-15). Then he dramatically changes to say that the worms will take her in her grave and that she will loose her beauty and die. In The Flea, the speaker tries to convince the maiden that they are one, since the flea has sucked both their blood and if she were to kill the flea, she would commit three sins by taking three lives, refering to his, hers, and the flea.And sacrilege three sins in killing three(line18). This speaker is however quick on his feet and very slick. The maiden kills the flea, proving his convivtions to be false. He responds however, by telling her that she suffers from false fears, because if she looses her virginity to him, she still has her honor. Just so much honor when thou yield'st to me/Will waste as this fleas death took life from thee(lines 26-27). These two unique poems containing their differences but over all more similarities are entertaining pieces for any reader to view and listen to the cunning speaker attempting to get his maiden.

Sunday, November 24, 2019

Failures of the Road Map essays

Failures of the Road Map essays The Quest for Peace in the Middle East Another Peace Process has failed in the endless conquest to find a way to bring peace to the Palestinians and Israelis. It is not surprising. Anyone who read the Road Map proposed by the Bush administration understood that it was not forthcoming, nor was unbiased, and inclusive enough to bring peace to the region. The Road Map, as any other past ventures into peace, has failed to bring all parties involved in the conflict to negotiating table. They have been one sided and uncompromising. Apparently, the Bush administration and the Israeli government thought that removing Arafat, declaring him irrelevant, would somehow produce a prime minister ready to crack down on Palestinians guerrillas and practically become the security force for the Israelis without any concessions that directly and promptly improved the daily lives of Palestinians. As expected, Abbas has not been what the Administration and the Israeli hoped for. The truth is that no prime minister or authority will risk as civil war trying to demilitarize Hamas or any other military faction conducting violent operations against the Israeli. This is the only leverage they have and even with this leverage, Abbas nor Arafat have been able to bring about significant changes to assure Palestinians that they are on the right track and that they should stop supporting Hamas. The lack of forthcoming positive changes to improve Palestinian daily lives was the first mistake outlined by the Road Map. After the declaration of cease-fire from Hamas and other military factions last month, the Israeli continued to carry out extra judicial assassinations of suspected Hamas members and innocent bystanders. Certainly, from whatever point of view the issues are contemplated, this is not a cease-fire. The Bush administration, as any other past American administrations, has failed to reign on Israel as much as Abbas and Arafat has failed to reig...

Thursday, November 21, 2019

The Life and Work of Mahatma Gandhi Essay Example | Topics and Well Written Essays - 1500 words

The Life and Work of Mahatma Gandhi - Essay Example These three aspects are his contribution to the social justice against apartheid in South Africa, the leadership of the non-violent freedom struggle in India and his principled life that finally led to his assassination in 1948. Mohandas Karamchand Gandhi, who was to go on and become Mahatma Gandhi, was born in at Porbandar, in the state of Gujarat in India on October 2, 1869. He reached the shores of Africa in 1893 after completing his education to become a lawyer. South Africa in those days was steeped in racial discrimination of the Europeans consisting of the white population. The discriminated population consisted of the native Africans, the coloured people of mixed race and the Asians, which were mostly Indians. Any non-white person in South Africa faced prejudice in every aspect of social activity because of the colour of his skin and it was into this environment that Mohandas Karamchand Gandhi stepped into. Gandhiji was to spend nearly twenty-one years of his life in South Africa as an attorney and a public worker. He considered himself as much as a South African as he did that he was an Indian. It was in this foster motherland that Gandhiji realized his vocation in life, in the service of his countrymen and mankind. It was during his stay and work in South Africa that his philosophy of life was to take shape and so too with his attitude to the social problems being witnessed in India. South Africa was where he introduced the unique and non-violent protest form of Satyagraha. Gandhiji was to bring about unity in the Indian community in South Africa and then use this united strength to oppose the policy of racial segregation in all spheres of social activity that was practised in those times in South Africa. The road to unity was not easy, but Gandhi persisted with his efforts and his perseverance bore fruit. His attempts to win concessions from the ruling white community met with very limited success.Â