Wednesday, August 26, 2020

The effectiveness of ( Career Development Plan) in an organization Essay

The viability of ( Career Development Plan) in an association - Essay Example In particular, this examination will investigate whether the vocation advancement plan is a viable preparing technique to use in an association and whether it will influence the presentation of the organization. There are an assortment of speculations that include vocation advancement and many have been applied to business and initiative. To comprehend these speculations, it is essential to see some broad issues about vocation. At the point when an individual starts a situation inside an organization, they have been selected here and there. From the outset, they are carrying out the responsibility they were employed to do and on the off chance that they are eager, they might need to move to different situations inside the organization. Ordinarily, there are new abilities that the individual must obtain over the span of moving to different positions. So as to do this, numerous scholars have made a thought of what happens when individuals go into vocation advancement. Maslows Hierarchy of Needs is one of the speculations that individuals talk about when they are examining profession matters. As indicated by Maslow, each individual has needs that must be met so as to in the long run carry on with a completely realized life. The essential needs of food, safe house and wellbeing (security) must be met before the individual can move onto requirements of having a place and in the long run self-completion. It is significant for pioneers, as per this hypothesis; to comprehend their necessities in an association and what persuades them (Maslow, 2009). Normally individuals working in associations will be propelled inside and remotely. Profession arranging can help comprehend which things are generally spurring, which makes an individual progressively engaged and profitable in their activity. Maslows progression is significant in seeing how individuals are propelled to function. Conduct hypotheses are another region to concentrate in profession advancement since they talk about how individuals act inside their work environment. These hypotheses place the significance of a vocation on the components

Saturday, August 22, 2020

Hostel Implementation Free Essays

string(48) this number in certain lodgings of Andhra Pradesh. Assessment Study on Construction of Hostels For SC Boys Girls ALL INDIA (REPORT) Program Evaluation Organization Planning Commission, New Delhi, April, 2009 CONTENTS Chapters Topic Preface Executive Summary Chapter †1 Introduction †Background of the Scheme †Objective of the Scheme †Guidelines for Initiating Hostel Proposal †Procedure for getting Central Assistance †Evaluation Study †The Scheme in Selected States Page No. I-II I-xiii 1â€2 Chapter †2 The Evaluation Study †Objectives Methodology †Objective of the Study †Sample Design †Reference time of the Study and Starting of field study †Methodology/Instruments utilized for Data Collection †Data Analysis and Report Writing 3â€6 Part †3 Planning, Implementation Monitoring Method of Scheme †Role of Nodal Ministry †Role of State Nodal Department †The Level at which Proposals Initiated †The Approval Procedures of the Scheme †The Process of Implementation of the Schemes in the State opposite General Guidelines †Achievements of Physical Targets †Role of PRIs/Local Bodies under the Scheme in Construction Maintenance of the Hostels †Local Political/Bureaucratic Interference in Selection of Hostel Sites †Objective Criteria for Selecting the Location of Hostel †Inspection by State/District Administrative Authorities †Involvement/Role of NGOs †The Monitoring and Reporting System Prevailing under this Scheme, Including the Construction Stage 7 †19 Chapter †4 Allocation of Grants and Expenditure on Hostel 20 †27 †Funding Pattern under the Scheme †Modality of Release of Fund †Release of State Share †Release of Central Shar e †Utilization of reserve Part †5 Functioning and Suitability of Hostels including Facilities 28 gave to Inmates 49 †The Suitability of Locations †Layout of Construction in Case of New Hostels †Use of Hostels Constructed under the Scheme †Availability, Quality Maintenance of Facilities Provided in the Hostel †¢ Dining Hall cum Kitchen in the Hostel †¢ Food Provided to the Inmates and its Quality †¢ Annual Charges Paid in the Hostel †¢ Maintenance of Hostel Toilets †¢ Water Supply to the Hostels †¢ Supply of Food grains at Concessional Rates to SC Hostels †Facilities Provided to the Inmates †The Role of Nodal Department in Management and Maintenance of the Hostels Chapter †6 Observations on the Impact of the Scheme †The Outcomes of the Scheme in Terms of Availability and employments of the Hostel by the Target Group †Impact of Scheme on Educational Development of SC Boys and Girls 2001 Census 50 †55 Chapter †7 Recommendat ions Project Team 56-57 58 PREFACE The Centrally Sponsored Scheme (CSS) of development of new inns just as extension of existing inns for SC young ladies was started in 963-64 in order to give a catalyst to instruction of young ladies having a place with the SC people group. During 1989-90, in light of the proposals of the Working Group on the Development and Welfare of SCs and STs, this plan was reached out to SC young men too. We will compose a custom paper test on Lodging Implementation or on the other hand any comparative point just for you Request Now The extent of the plan was augmented further to cover foundations of advanced education/learning, for example, schools and colleges. The fundamental goal of the CSS is to give free boarding and housing offices in the inns for SC young men and young ladies learning at Schools and Colleges/University levels. So as to incorporate the SC understudies with the standard, 10 percent of all out settlement in such lodgings was left for non-SC understudies. At the occasion of the Ministry of Social Justice and Empowerment, the Program Evaluation Organization, Planning Commission, led an assessment investigation of the plan in 8 chose states. The examination was propelled in November, 2004 with the accompanying targets: (I) (ii) (iii) (iv) (v) (vi) To consider the endorsement techniques of the recommendations for development of inns. To consider the procedure of usage of the plan in different States opposite the rules. To evaluate money related physical execution of the plan. To evaluate the degree of usage of lodging offices by the objective gathering. To consider the checking announcing framework winning under this plan, including that at development stage. To survey the result of the plan as far as the utilization of the inns by the objective gatherings. So as to produce the necessary information base the examination secured 185 inns from CSS, 65 lodgings from 100 percent state supported and 15 inns developed by NGOs which were tested from Eight chose states, in particular, Andhra Pradesh, Bihar, Haryana, Karnataka, Madhya Pradesh, Orissa, Rajasthan and Uttar Pradesh. Moreover, two Central Universities (JNU-Delhi and Central University, Hyderabad) were likewise shrouded in the investigation. The primary discoveries of the examination are as per the following: The development organization much of the time was the state PWD which took up development work through endorsed contractual workers. The inns, after fruition, were given over to the concerned District Social Welfare Officer in a large portion of the states. The Panchayati Raj Institutions/neighborhood bodies assumed next to no job in many states. The visit of the locale authorities to the inns either during the development time frame or later was easygoing in many states. The time taken in arrival of the state offer to development organizations fluctuated impressively from state to state from two months to a half year or significantly progressively after the arrival of focal offer. Around 80 percent of the lodgings were discovered useful at the hour of visit of PEO’s study group. The vast majority of the non-useful lodgings were in Uttar Pradesh. Though Bihar had three such lodgings followed by Karnatka and Orissa which had two each. This was because of nonappearance I of fundamental necessity/pleasantries, wrong determination of site and without evaluating the requirement for SC understudies around there. Around 6 percent of the lodgings were found being utilized for different purposes, for example, office, library, study halls and so forth. Every one of these inns were in Bihar, Orissa and Uttar Pradesh. Fifteen lodgings in five states to be specific Haryana, Karnataka, Madhya Pradesh, Orissa and Uttar Pradesh were under development at the hour of visit of the investigation group to these inns. Out of these 15, in six cases, the development had been halted because of land questions on account of Uttar Pradesh and because of imperative of assets in Karnataka. Lodgings were packed in Andhra Pradesh, Karnataka, Orissa and Rajasthan where normal inhabitance per room surpassed 10 and upto 30 or even past this number in certain inns of Andhra Pradesh. You read Inn Implementation in class Papers On the other hand, inns in Bihar, Haryana, Madhya Pradesh and Uttar Pradesh, were underutilized. In the inns under 8 areas of Uttar Pradesh and 8 regions of Bihar, detainees themselves prepared food in their rooms as the worker cum cook named for the object were accounted for to be sent somewhere else by the specialists. In practically all the inns, upkeep of lodging building and toilets was unacceptable. 90 percent lodging Wardens revealed that the arrival of reserve for pay of inn staff was gotten in time. Be that as it may, award for meeting everyday support consumption was in time just in56 percent cases. The plan had critical result as far as foundation of inns in three states just to be specific Andhra Pradesh, Madhya Pradesh and Karnataka. Different states I. e. Orissa and Rajasthan didn't exploit the plan while the plan completely floundered in Bihar with immaterial impact. All in all, the lodgings profited the objective gathering of exceptionally poor SC/ST understudies seeking concentrates from significant distances. Be that as it may, the result in Bihar has been poor. The exhibition of the program could extensively be improved if the proposals made in the report could be appropriately actualized. The examination got nonstop help and consolation from Hon’ble Deputy Chairman, Planning Commission and Member (Evaluation), Planning Commission. The examination was planned and led under the course of Shri K. N. Pathak, the then Deputy Adviser in PEO. The administrations of Institute for Resource Management and Economic Development, Delhi were benefited for classification, understanding and examination of information and planning of report. Shri L. N. Meena, Economic Officer, PEO helped the examination establishment in Data handling, Chapter Plan, Tabulation report drafting under the direction of Project Director Sh. K. N. Pathak. Dr. R. C. Dey, Director, PEO gave a last shape to the current report and Mrs. Godhuli Mukharjee, Director, REO, Kolkata altered the equivalent under direction of Dr. Davendra Verma, Adviser (PEO) and my oversight. The rundown of the Officers engaged with the examination is given toward the finish of the report. The assistance and participation got from every one of them is appreciatively recognized. S. Bhavani Sr. Adviser(PEO) New Delhi Dated: April, 2009 II Executive Summary I. †¢ Background Objectives of the Scheme Development of inns inside or close to the grounds of instructive organizations was pictured by organizers as one of the way to empower and energize young men and young ladies having a place with Scheduled Castes(SC) people group to improve access to training. Legislature of India, hence, began the Centrally Sponsored Scheme (CSS) of development of new inns just as extension of existing lodgings for SC young ladies in 1963-64 in order to give a driving force to instruction of young ladies having a place with the SC people group. During 1989-90, in view of the proposals of the Working Group on the Development and Welfar

Monday, August 17, 2020

OReilly Primes

O’Reilly Primes Before you ask where my blog title (The McGann Factor) came from, Ill just come right out and tell you: Ben made me choose it. But Ive grown to really like it, for a few reasons. Certainly, it is a swiping of the nomenclature of a certain telecasters forum. Now I dont care much for that telecasters politics, but within that nomenclature you can a couple nerdy things that I like. First, the word factor, which is something I like to do to numbers. You could not imagine my joy when earlier this summer I realized that my nine-digit social security number is prime. I dont quite recall how the topic came up, but as we were talking, I was applying various divisibility tests. I wasnt certain, though, until I got to a factoring program, since I didnt know the divisibility tests for larger primes (if you can factor nine-digit composite numbers in your head and Im not talking about easy ones like 10^8 or 2^27 here you should totally list that as a talent on your application). Number theory is fun stuff. If you havent read a biography of mathematician Paul Erdos, Id recommend that as fun end-of-summer reading. Second, the obscured telecasters name is OReilly, which is also the name of the publisher of every good nerds favorite programming books. The other day, I was thinking back fondly to the days when OReillys Programming Perl was one of my best friends. You may or may not know that the OReilly books are noted for their friendly animal mascots; for example, my Perl books mascot was a camel, and Javas mascot is a tiger. This got me thinking that the various OReilly animals would make a great component to a Mystery Hunt puzzle. I brought this up to one of my housemates, Josh, who was on the winning 2003 Mystery Hunt team, and thus got to write Mystery Hunt 2004. His reply was, We did have an OReilly puzzle, dude. I was suddenly reminded that yes, in fact, there was an OReilly puzzle of sorts, and it was one of the coolest aspects of this past years Hunt. Josh, through connections still unknown to me, had been able to slip a cluephrase into the Perl Cookbook, Second Edition before it went t o press. The penultimate step of the puzzle gave you an ISBN (for the Perl Cookbook) and page number, which sent my teammates scouring the libraries for a copy of this new book. We were all in awe of Joshs ability to slip in the clue months beforehand. I feel bad for going off on a large Mystery Hunt tangent without talking in depth about it, but thats a topic for another entry. Until then, my friends, keep factoring those large numbers, and never lose sight of whats truly important (such as the Mystery Hunt). Current music: Alice In Chains, I Stay Away (old school grunge) Post Tagged #Mystery Hunt

Sunday, May 24, 2020

Holocaust, Genocide and Human Rights - Free Essay Example

Sample details Pages: 4 Words: 1300 Downloads: 2 Date added: 2019/04/26 Category History Essay Level High school Tags: Holocaust Essay Did you like this example? To study history means that one must come to terms that it is ridden with evils, most against groups of human beings. Between the late 1930s and mid-1940s, one of the worst examples of a Genocide in history had taken place in Europe. The Holocaust saw Nazis in Germany slaughtering around six million Jews and an overall total of almost eleven million human beings. Don’t waste time! Our writers will create an original "Holocaust, Genocide and Human Rights" essay for you Create order The use of gas chambers and experiments to torture and kill these innocent lives were used to both mentally and physically wipe out a race of people. The Nazi Germans had many reasons, some clear and some complex to understand, in acting in the matter they did towards the Jews. Through different perspectives and testimonies, the culture of anti-Semitism, fear of superiors, and nationalism in Germany were all driving motivations of the perpetrators of the Holocaust. This analysis could thus help in understanding why more genocides and crimes against humanity occur to this day. The study of the Holocaust sees anti-Semitism as one of the greatest motives behind why the Nazi killed so many Jews. The hatred towards Jews stems from Adolph Hitler and his beliefs of what was wrong with Germany. He and many that followed him,associated the Jews with economic hard times and foreign oppressors, although they did not pose an actual threat to anyone (Niewyk 194). They forced the Jewish people to wear yellow stars to not be able to hide their identity, were herded into ghettos, and eventually shipped off to concentration camps with the intention to be killed. The Jews were not seen as humans but rather as outsiders that needed to be done away with in order to have the Germans rise and make society right again. Many Nazi officers were made to believe that, Jews were viewed as enemies of modernity and could never be truly part of what Nazi Germany was becoming (Jones 235). Germany, with the Nazis leading, could only see themselves going in a certain direction and revamping their economic and social climates. It was to be believed that the Jews were going to hinder this progression and a ction needed to be taken before they took over. The Nuremberg Laws of 1935 stripped away the rights of Jews and added more fuel that this race was inferior to the Nazi Germans (Jones 236). No longer was it just a group of people oppressing another group of people, but with laws and a whole country were behind them in progressing along. By taking away of rights and livelihood, the Nazi revealed that anti-Semitism was rooted in every discussion that was made towards the Jews. Anti-Semitism was only the tipping point in the motivations of the perpetrators of the Holocaust. Fear played an important role in the operations of Nazi Germany and in how they carried out their plans. Many of the guards and assistants of concentration camps felt pressured to commit the killings or to construct the places where Jews may be killed. This was due to the fact that some felt that if they did not comply with their superiors, they may be kicked out or meet their own deaths. The chain of command was not only something to be abided in Nazi society, but was used as a tool for getting subordinates to do actions that they may not morally want to do. Karl Schultze, an engineer of crematoriums, expressed that he,was afraid of losing my position and of possible arrest if he did not build these deadly structures (Handout). He was not only afraid of the Nazi superiors, but fearful of going against his country and what he believed and stood for. It could even be said that some guards and workers could have been victims themselves, as they were made to have no choices in what the horrors that were going on. This fear was used in order for Nazis of higher ranks to have tasks completed, even if they were cruel and unimaginably. They made it seem that if you were not with the Nazis, then you would also become an enemy against the German state. Unfortunately, nationalism also played a role in the Nazis perpetrators actions during the Holocaust. Nationalism is having pride in ones country, whether it is through ones ideas and beliefs or through someones actions. It may seem that having pride in one country would be a positive attribute, however, it has been used to manipulate mass amounts of people to think that something may be right when it is not. The Nazis in Germany were able to systematically kill so man y Jews due to using nationalism to motivate others to commit monstrous tasks. Engineer Fritz Sander testified that, I saw it as my duty to apply specialist knowledge in this way to help Germany win the war, when discussing the building of bigger crematoriums (Handout). Similarly, when testifying, SS Wilhelm Bahr explained that I only had orders to pour in the gas and I do not know anything about it (Handout). Engineers like Sander and Nazi officers like Bahr were some of many who followed blindly by whatever Nazi superiors told them. They did so as they believed they were doing what was good for the country and did not see a reason to question anything. This became an excuse to not face the fact that they were killing innocent people in order to appease a dictator, Adolph Hitler. Many knew what harm they were doing, but looked the other way as it wasnt a good enough reason to stop. Many saw that these,ordinary Germans easily became genocidal killers and did so even though they did not have to (Jones 251). Although the Nazi gave very little choice on what certain things they had people doing, some of these men could have morally realized and stopped and hopefully escaped. But the pressure from superiors and the fear of going against the country made men turn the other way and carry on, as if nothing evil was going on. Nationalism could be an extremely manipulative way to get people to do what they want and that is exactly what the Nazis did. The Nazi Doctors were some of the evilest and cruel perpetrators of the Holocaust. These doctors would perform experiments on prisoners in the concentration camps and had no regard as to who they were experimenting with. Many of these doctors did not see the Jews as real humans, but rather as objects to tinker with. Robert Lifton explained that They [the SS doctors] did their work just as someone who goes to an office goes about his work, making what they did seem normal (Handout). These doctors almost seemed to separate themselves, from the people they were in the concentration camps and the people outside of it. By normalizing what they were doing, it made it seem as if they were not bothered by the fact that they were mutilating and killing Jews (Handout). These doctors were also being asked to do these horrific things and if they didnt comply, they might f ace consequences like anyone else who goes against the superiors of the Nazis. Isabella Leitner, a survivor of Nazi Dr. Mengle, stated that you would never suspect the evilhe was the genius of death when describing how Dr. Mengle came off before the torture (Handout). These doctors came off as normal people, yet turned towards cruel and unimaginable actions to experiment and ultimately bring death to the Jewish people. Nationalism played a huge role in the psychology of the Nazi doctors. Many of these doctors were conducting experiments for the betterment of society and hopes to help with the war. Through this reasoning, many were blind to realize what damage they were doing, as they only wanted to complete their tasks and help the country.

Wednesday, May 6, 2020

Conviction Offense and Prison Violence Free Essays

Conviction offense and prison violence The study of the above statement by John Sorensen and mark D. Cunningham reveals that the disciplinary data done in 2003, involving 51,527 inmates who were serving sentences in the department of corrections of Florida and of the 51,527 involved to generate that data, 9,586 were homicide convicts charged on different degrees of homicide. The homicide convicts were amongst those researched on in respect to their involvement in prison violence and misconducts. We will write a custom essay sample on Conviction Offense and Prison Violence or any similar topic only for you Order Now Previous misconducts related to discipline and other forms of violence reported by the numbers of inmates present at the time of the evaluation which was 14,088 and a class of inmates who are kept under strict and direct supervision, of which they were 4,113 in total, were also considered. The preference and prevalence of violence in prisons reduced as the seriousness of the crime under which the inmate was sentenced increases. The study revealed that close custody inmates were not involved in or have had anything to do with the violence that erupts in the facilities in which they are located. Moreover, some negative regression models used to evaluate this observation shows that â€Å"serious† convicted offenders are less involved in prison violence than their colleagues who have been convicted of way less charges. The â€Å"three strike laws† provides the law courts with the power to impose harsher judgments and more severe punishments if a person is convicted more than three times with the degrees of the charges increasing. The laws however, limit the punishment to life imprisonment. In another study related to this, it was found that correctional facilities experienced more cases of institutional misbehaviors than those facilities that are meant for confinement with no correctional intentions. Actual figures from the study shows that inmates in confinement facilities are less likely to be involved in any form of institutional misconducts than their counterparts in correctional facilities where most cases of these misconducts are reported and on a regular basis. This study can see an increase of officers in this correctional facilities and more tough rules on prison discipline inside correctional facilities. Violent girls or relabeled status offenders? Feld Barry C in his work about whether convicted girls should be addressed as violent girls or should be relabeled as status offenders who in most cases usually refers the offences that minors commit reveals that the government who are the policy makers and the juvenile justice system has expressed their worries about the rising number of young girls being arrester over â€Å"petty† issues. Other interested parties in this issues have seen that the cause of the arrests to be the following; ? Due to the fact that the public is â€Å"tired† of the bad behaviors exhibited by these girls leading to their regular arrests. ? Increased monitoring of home related violence in which the girls are the most adversely affected group and which can result in behavior change on the part of the girl. Policy change in the juvenile justice system and also the changes in the way parents go about with their parenting of the girl child. The author is for the idea that there should not be institutionalization of these status offenders which is reflected in the policy changing of the juvenile justice and delinquencies prevention act -deinstitutionalization encourages that minor offenders be referred to as delinquents so as to make those institutions where these â€Å"proving difficult to deal with† are confined. The author goes ahead to analyze data on the pattern of arrest and the confinement records for both and girls who are termed to be violent and have been charged following simple and aggravated acts, questioning that the fluctuating figures in number of victims and the rate differences, and the confinement of these violent girls and boys agrees to a different manner of the increase in girls violence that moves together with the thesis that explains social construction. In a different study but on the same issue of the girl rehabilitation programs, one program named multi-systemic therapy has been a success because it provides a holistic manner where a team from the state or government work together with the parents of the affected girls and in the process tries to change the parent’s behavior. This is usually done where parental activities have been found to be a cause for the girl’s behavior change and therefore influences negatively on the child’s growth and development. The team working with the parents also goes to the extent of going to the schools and evaluating if the child is responding positively to the whole program. The only real problem and hence a constraint of this very effective program is the cost, it’s too expensive and many parents cannot afford it. The study also reveals that non-specific gender programs works more effectively than gender specific programs. However, the study also shows that programs that are gender specific have positive effects in certain areas that include; improved relationship with family members, employment, education and other psychological social outcomes. How to cite Conviction Offense and Prison Violence, Essay examples

Monday, May 4, 2020

Honeypot For Arbitrary Malware Usb Storage â€Myassignmenthelp.Com

Question: Discuss About The Honeypot For Arbitrary Malware USB Storage? Answer: Introduction Malicious software can be defined as a kind of deliberate security risk or threat. The developer of such software has malicious intention. If a system is infected with a malicious code then the system will get damaged and lose all its data (Uscilowski, 2013). Malware has several capabilities that include but is not limited to denial of operations, exploitation of vulnerabilities as well as gaining access to other system in an unauthorized manner. This report gives a clear overview of the recent and advanced trends in malware. It discuses about different kinds of malware that are existing in the market at present. It also gives a clear idea about all the technologies that are relevant in this context. It also discusses about the problems and challenging factor in malware attacks. This report figures out the important issues and its impact on the society. It gives a clear explanation of the lessons that have been learnt from the entire discussion about recent malware trends. Malware and its Types Malware or malicious codes can be considered to be one of the most harmful and dangerous security threats in this era of ICT (Wang, Streff Raman, 2012). In malware attacks the malicious program is entered into a system for the purpose of gaining unauthorized or illegal access to valuable and sensitive information. The main motto of the malware developers is to earn money or harm the users intentionally. There are several types of malware as follows: Virus: Virus is an executable program that has the capability to run or execute on any system without any permission. The execution process is carried on secretly so that the system does not come to know about it (Zhou Jiang, 2012). Viruses are incapable of duplicating itself or creating its own copies. Worms: Worms are capable of creating their own copies or replicating unlike viruses (Gandotra, Bansal Sofat, 2014). The network plays a significant role in sending the copies of the worms to different systems or nodes present in the network. Worms are said to consume high network bandwidth and have a malignant nature. Trojan horse: An application that appears to be useful and legitimate but actually contains malicious programs hidden within it is called a Trojan horse. These kinds of applications pretend to scan systems for a spyware but in reality it has been seen that they are stealing sensitive data from the systems. Spyware: This kind of malware is known for spying on the system and the activities of the system. It is capable of collecting valuable data from system in a hidden way (Erturk, 2012). It has the capability to monitor the activities of the user. Adware: This software is responsible for playing and displaying various advertisements automatically. This kind of software is developed for producing revenue for the developer of the advertisement. Ransomware: This kind of malware is known for blocking the user from accessing valuable and necessary data. It encrypts the data of the user and makes the data available to the user in exchange for a ransom amount generally paid in Bitcoins (O'Gorman McDonald, 2012). Recent Trends in Malware The recent or current malware trends tell that malware threats and attacks are increasing with the growing use of ICT. Malware can be considered to be evasive in nature as it has the capability to harm any system in an aggressive manner. Vulnerabilities existing in the two factor authentication technique in mobile phones are being exploited by the malware. These kinds of attacks are becoming a major concern for the society. Malware has the capacity to leak data from cloud storage. It has been predicted that Monero ransomware will appear in the near future. Malware developers are showing interest in an approach called code signing approach. The aim of malware developers is to get valid certificate for entering the systems. The WannaCry ransomware attack is one of the most dangerous attacks that took place in the month of May, 2017 (Mohurle Patil, 2017). It had hit 100 countries across the world. Spain, Egypt, India, China and UK were also affected badly. 1000 systems in Russia had be en infected. WanaCryptor 2.0 or WannaCry is the name of the ransomware. The users were asked to pay 300 dollars Bitcoins in exchange for their data. This is the most recent malware attack that hit the world. Recent trends in malware include browser settings modification. In these types of malware attacks the browser settings of the user are changed. It has modified the browser settings of Safari, Opera, Internet Explorer and Google Chrome. They are also capable of changing proxy settings of users. Recently such malware is developed that has the capability to crack medium to weak passwords of a system. The family of malware has shown a great increase between 2012 and the year 2013. 69 per cent increase in the malware families have been observed within 2012-2013 (Uscilowski, 2013). The number of malware families that belonged to the android group was 121 in 2012 and it grew to 204 in 2013. Figure 1: Android Malware Trend (Source: Uscilowski, 2013, p. 10) The above figure clearly shows that the sample count has increased. Recent trends in malware have shown that they are generally entering the systems through several applications. Entertainment and games are considered to be the main entrance for malware. Malware attacks can harm the system by misusing and deleting the valuable data. The figure given below gives a clear idea of this fact. Figure 2: Top Ten Applications Category with highest percentage of Malware (Source: Uscilowski, 2013, p. 10) Challenges and Problems The user or human factor that is present in IT chain is known to be the weakest link. Human factor is considered to be one of the most challenging factors or issues in mobile security. As mentioned by Arabo and Pranggono (2013), a smart home is generally more prone to all types of malware attacks. Malware can attack and infect mobile phones, electronic devices and car navigation systems. There can be virus attacks in the home environment. Protection of healthcare devices like pacemaker has become one of the challenging issues in the present generation. Malware attacks in unprotected healthcare devices can transmit data and the settings of the devices can change that can lead to dangerous consequences. Malware attacks can reconfigure the device. During the online payment method an attacker can access financial data and use it for own advantage. Few malware attacks charges premium by sending messages. Another major challenge is Botnet. Several online resources can be changed into Botne ts by the attackers. Botnets send spam emails and host phishing sites. They are also responsible for DDoS attacks. Mobile devices are the main targets of Botnets. The malware attack rates are increasing because of the poor security features and vulnerabilities of the mobile devices. Relevant Technologies and its Applications in Malware USB or universal serial bus sticks are considered to play a significant role in the spread of malware across various devices (Poeplau Gassen, 2012). USB is capable of harming systems that do not form part of an unsecured network. USBs can be used by the user to transfer files from one device to another without being aware of the fact that the USB is affected with virus. Trusted devices should not be allowed to use USB for exchanging files and documents because an infected USB can modify and even delete the valuable data of the system. ICT and internet technology play a major role in the spread of malware attacks (Chen et al., 2012). Users can download malicious files from the internet and harm the system. Malware attacks can also take place via email over the internet. The growth of information and communication technologies has increased the chance of malware attacks in this present generation. Issues Discussed Most of the issues are regarding the mobile malware attacks that are taking place in the smart electronic devices. When a file downloaded from the internet then the cyber criminals can convert it into Botnet. Botnets have the capability to carry out DDoS attacks. They can even send spam mails to spread the malware (Arabo Pranggono, 2013). Phishing sites can also be hosted by Botnets. The malicious programs can execute in devices for misusing the sensitive as well as valuable information (Chandramohan Tan, 2012). There are several reasons why a mobile phone is attacked like its ubiquity and computational powers. It is easy to attack a mobile device as it operated on an open platform. ZeuS botnet is a well known banking malware that targets various types of mobile platforms namely iPhones, Blackberry and Symbian devices (Etaher, Weir Alazab, 2015). The financial sector considers this botnet to be the most malicious banking malware that can steal financial details as well as money of the users. Important Issues that are not addressed and its impact The literature reviews have not paid much attention to the ransomware attacks and it effects. These are a type of malware attacks where the malicious code blocks the user from accessing the data of the system. The attacker uses the malicious codes to encrypt the data of the system and agrees to decrypt the data in exchange for a ransom amount of Bitcoins. The attacker provides the decryption key after receiving the Bitcoins. Malicious websites can also be responsible for a ransomware attack. The impact of this attack is disruption of daily operations and damage of sensitive data. It has the ability to harm the organizations reputation as well. The victims of the attack will face monetary or financial loss because they will have to pay huge amount for recovering the system. Important Lessons Incorporation of advanced and strong security architecture in the system is required for preventing it from malware attacks. The operating system should be updated on a regular basis and users should only download reliable applications from official sites for protecting the system against malware attacks. Latest versions of Anti-Virus software must be installed in the system from preventing and detecting any virus attack (Hsu et al., 2012). Personal firewalls can be implemented that can prevent any illegal external intrusion. Trusted applications must only be used. Security solution can be high level only by following and using multi level technique or approach. Conclusion This report concluded malware threats or risks are becoming a major concern in this world of technology. Malware developers are bypassing detection by inventing advanced techniques. Malware attack incidents are growing by huge margin. This report explained about worms, viruses, ransomware and Trojan horses. It said that viruses do not have the capability to replicate on its own while worms have the capability to replicate. It said that the relevant technologies that are needed to spread malware attacks are USB and internet technology. This report showed that recent trends in malware are to change the browser settings and crack weak passwords. This report also gave an overview about the WannaCry ransomware attack that hit the world in May, 2017. The main issues related to malware attacks are found to be the vulnerabilities in the mobile electronic devices. This report also said that certain techniques can be applied to prevent malware attacks like implementing firewall, installing Ant i-Virus software and downloading trusted applications from official sites. This report concluded that incorporation of advanced and strong security architecture in the system is required for preventing it from malware attacks. References Arabo, A., Pranggono, B. (2013, May). Mobile malware and smart device security: Trends, challenges and solutions. InControl Systems and Computer Science (CSCS), 2013 19th International Conference on(pp. 526-531). IEEE. Chandramohan, M., Tan, H. B. K. (2012). Detection of mobile malware in the wild.Computer,45(9), 65-71. Chen, Z., Roussopoulos, M., Liang, Z., Zhang, Y., Chen, Z., Delis, A. (2012). Malware characteristics and threats on the internet ecosystem.Journal of Systems and Software,85(7), 1650-1672. Erturk, E. (2012, June). A case study in open source software security and privacy: Android adware. InInternet Security (WorldCIS), 2012 World Congress on(pp. 189-191). IEEE. Etaher, N., Weir, G. R., Alazab, M. (2015, August). From zeus to zitmo: Trends in banking malware. InTrustcom/BigDataSE/ISPA, 2015 IEEE(Vol. 1, pp. 1386-1391). IEEE. Gandotra, E., Bansal, D., Sofat, S. (2014). Malware analysis and classification: A survey.Journal of Information Security,5(02), 56. Hsu, F. H., Wu, M. H., Tso, C. K., Hsu, C. H., Chen, C. W. (2012). Antivirus software shield against antivirus terminators.IEEE Transactions on Information Forensics and Security,7(5), 1439-1447. Mercaldo, F., Nardone, V., Santone, A., Visaggio, C. A. (2016, June). Ransomware steals your phone. formal methods rescue it. InInternational Conference on Formal Techniques for Distributed Objects, Components, and Systems(pp. 212-221). Springer, Cham. Mohurle, S., Patil, M. (2017). A brief study of Wannacry Threat: Ransomware Attack 2017.International Journal,8(5). O'Gorman, G., McDonald, G. (2012).Ransomware: A growing menace. Symantec Corporation. Poeplau, S., Gassen, J. (2012, October). A honeypot for arbitrary malware on USB storage devices. InRisk and Security of Internet and Systems (CRiSIS), 2012 7th International Conference on(pp. 1-8). IEEE. Uscilowski, B. (2013). Mobile adware and malware analysis.Symantec Corp,1. Wang, Y., Streff, K., Raman, S. (2012). Smartphone security challenges.Computer,45(12), 52-58. Zhou, Y., Jiang, X. (2012, May). Dissecting android malware: Characterization and evolution. InSecurity and Privacy (SP), 2012 IEEE Symposium on(pp. 95-109). IEEE.

Sunday, March 29, 2020

Difference between descriptive ethics and normative ethics Essay Example

Difference between descriptive ethics and normative ethics Paper What is the difference between descriptive ethics and normative ethics? What role do values play in each of these two approaches to ethics? Provide examples to illustrate your points. Descriptive ethics is founded on the belief that humans are ‘hard-wired’ to be selfish. That is, they are for the most part absorbed in fulfilling their own desires and goals. The capitalist economy is a good example of this instinct in humans, whereby, ‘greed is good’ is an accepted mantra for business corporations and individuals alike. Descriptive ethics promotes a ego-centric decision making model, whereby, an individual is morally entitled to pursue his own happiness through independent action. Cultural relativism is another term coupled to descriptive ethics. This school of thought contends that what is right or wrong is specific to the particular cultural milieu. Normative ethics, on the other hand, takes a more didactic approach to human action in that it prescribes ‘what’ is morally right through rational deliberation. While descriptive ethics merely documents what people believe to be morally right, normative ethics tries to ‘fin d out’ if there is merit in such beliefs. In this light, it is fair to claim that the normative ethical framework is more rigorous and rationalistic than the descriptive ethical framework. Normative ethics thus offers a better model for decision making. We will write a custom essay sample on Difference between descriptive ethics and normative ethics specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Difference between descriptive ethics and normative ethics specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Difference between descriptive ethics and normative ethics specifically for you FOR ONLY $16.38 $13.9/page Hire Writer In practice, what can be said for and against utilitarianism, or a results-based approach to ethics? The utilitarian totem is ‘greatest happiness for the greatest number of people’. This objective for the evaluation of ethics is very appealing intuitively. It is also politically consistent with principles of democracy. But the issues with Utilitarianism crop up due to qualitative factors. For example, what exactly does ‘happiness’ mean? Moreover, are the values and conditions that create happiness universally the same? Even further, why should happiness or pleasure or utility be the arbiter of morality? Indeed, the purpose of moral inquiry is not so much happiness but justice. Under utilitarian ethics, the ends always justify the means. But to the extent that the means involve human action and assent, normative ethical evaluation comes into play. So, practical issues such as this have given Utilitarianism the tag of being an idealistic or utopian ethical system. In practice, what can be said for and against deontology, or ethical theories of the right? Deontology is a sharp contrast to Utilitarianism, in that actions are deemed right or wrong not through their consequences. In the contrary, those actions that are considered to be duties, including obligations, responsibilities and commitments are valued as moral. Deontological ethics aligns very well with the mandates of major religions of the world, including Christianity. For this reason, the theory has drawn criticism. It is easy to see how the concept of ‘good will’ can be equated to divine grace and hence co-opted as a justification of religious dogma. But Deontology has certain clear merits, especially the logic behind the Categorical Imperative that Kant theorized. The main appeal of Categorical Imperative is their emphasis on universal laws. What is a virtue? How can virtue-based moral reasoning help you resolve an ethical issue in business? Illustrate your points with one or two examples. The basis of virtue ethics is the understanding that virtues promote human flourishing. Though all virtues have their merits and utility only some of them are relevant for moral-based reasoning. These moral virtues include justice, mercy, generosity, humility, tolerance, compassion, love, etc. Since moderation is a core principle of virtue ethics, it especially helps give moral direction for business leaders. For example, the Triple Bottom Line (TBL) code of conduct asks businesses to focus on people, the environment and only then profits. Many of the virtues such as compassion, generosity and justice are as applicable to businesses as they are to individuals. It is fair to claim that our society would improve significantly if only all businesses would incorporate virtue ethics into their code of conduct. Since character building is central to virtue ethics, it fills the lacuna left by Deontological and Utilitarian ethical models.

Saturday, March 7, 2020

the holocaust and national soc essays

the holocaust and national soc essays Upon examining the excerpts from the works of Christopher Brownings Ordinary Men: Reserve Police Battalion 101 and the final solution in Poland; and Omer Bartovs Murder in our Midst: the Holocaust, Industrial killing, and Modernity; one develops an understanding of the responsibilities the average German soldier had on the Holocaust. Christopher Browning argues that that the average German soldier did not willingly participate in killing of Jews. Browning believes that Nazi propaganda was the machine that drove Nazism and coerced German civilians into killing the Jews. Bartovs arguments on the Holocaust are more of a theoretical depiction of both the culmination of science and law. He believes the Holocaust and National Socialism were ever-present in the organized states of the industrialized western society. We have developed ambivalence towards war and violence. All that is needed in the modernity of war is two crucial elements: a scientific stamp and legalistic sanction. Christopher Browning states in his book, Ordinary Men: Reserve Police Battalion 101 and the Final Solution in Poland, that the majority of the German military did not willingly participate in the mass genocide of the Jews. As pointed out by Browning, Even twenty or twenty-five years later those who did quit shooting along the way overwhelmingly cited sheer physical revulsion against what they were doing as the prime motive but did not express any ethical or political principles behind this revulsion. Browning continues to follow course in that the Germans were blindly following orders. Most of the blame should come at those who gave the orders, and not the German military and civilians who executed these heinous crimes. Bartov elects to explain the governing body behind Nazism and its social uprising into the Hitler State. The emergence and implementation of industrial killing was a crucial component in the...

Thursday, February 20, 2020

Constitutional Issues Term Paper Example | Topics and Well Written Essays - 750 words

Constitutional Issues - Term Paper Example Her participation in this peaceful demonstration was more than moral—it was admirable and spirited and patriotic. There is an infringement of constitutional privileges of Lisa thus she stands a chance of getting legal remedy from courts. The court is one organ that must ensure the constitution is adhered to and respected by all. To extent, NRP events do not warranty constitutional uproar. This is because according to the NPR spokeswoman Anna Christopher; Simeone actions were against NPR's morals code. The code provides that "NPR journalists may not partake in marches and rallies" concerning issues NPR covers. The code notes that some requirements may not concern to outside providers. It uses an outworker who principally contributes arts reporting as an example. In the precedent year, NPR has come under inquiry for its dismissal of news forecaster Juan Williams after he supposed on Fox News that he was challenging on a plane with somebody wearing clothing that spots them as Mus lim. At the moment, NPR said William’s remarks violated its code of ethics by engaging in media "that support punditry and rumor rather than fact-based investigation." The system has been sensitive to allegations that it carries an open-minded bias. An NPR chief administrative was forced to quit; after a conventional activist posted a film online of NPR's chief charity performance, complaining about the tea party's pressure on the Republican Party. The case is a code of ethics verses constitution freedom. What is in the text of the Constitution that gives the Supreme Court authority under the Constitution to review an act of Congress? Section 2 of the constitution grants the Supreme Court unique jurisdiction in cases involving ambassadors, congress and consuls. It is true that the constitution grants that we have the right of free speech, however, that right is not unrestricted. It has frequently been curtailed in situations which generate a danger to others and when the comm unication defames others; as declared in libel and slander laws. This law, however, does not advocate infringing free speech; it advocates that our voted officials utilize their free speech rights in a responsible manner. What constitutional doctrine gives the Court the power to interpret whether the act is a valid exercise of Congressional power? In some cases, the Supreme Court has merely appellate jurisdiction that may be checked by the Congress. The legislative body may not, however, alter the Court's original jurisdiction, as was established in Marbury v. Madison, 5 United States Cranch 1803; the same verdict which established the code of judicial review. Marbury apprehended that Congress can neither increase nor restrict the inventive jurisdiction of the Supreme courtyard (Epstein, Walker & Thomas, 2007, pp 451). However, the appellate authority of the Court is diverse. The Court's appellate authority is given "with such exemptions, and under such system as the Congress shall constitute. What is in the text of the Constitution that may be argued to give Congress the power to enact the health care law? A provision of the foundation recognized as the â€Å"commerce clause† offers Congress power to â€Å"control commerce among the numerous states.† There is a long stripe of Supreme Court decisions making that Congress has wide power to enact laws that considerably affect prices, market locations,

Tuesday, February 4, 2020

Case For or Against the War on Drugs Essay Example | Topics and Well Written Essays - 2000 words

Case For or Against the War on Drugs - Essay Example This article will assess the gains and losses that this war has made with an aim of determining the relevance of this war. Case for the War on Drugs Despite many apparent setbacks, the war on drugs has made tremendous gains in its efforts geared towards making the world a safer place. There have been concerted efforts aimed at ending the rampant trade in drugs. These efforts have been made by all stake holders in the United States over the past 40 years since then serving President Richard Nixon launched the U.S Government’s war on drugs.1 Several progressive steps have been made targeted at countering the flourishing use and sale of drugs in the U.S. One such stride has been the advocacy for a paradigm shift in the war against drugs. As was expressed by President Obama in a digital town hall meeting, in 2011, there is a need to move from the old approach of the war on drugs to a new one. One way of accomplishing this has been looking at possible ways of shrinking the demand f or drugs among the users.2 This represents a shift from looking at this war as a primarily, criminal justice problem3. When looking at the war on drugs as a criminal justice problem, the emphasis of tackling it involves arrest, incarceration and interdiction4. While this has had good results, it has had the unfortunate disadvantage of unintentionally giving some of the offenders an opportunity to slip through the cracks. Currently there is a move towards looking at the war on drugs as a public health problem.5 This means that the government has acted as a guardian of the public’s interests6. This thus means that the government has managed to win the hearts of the people who advocate for social justice in the country. Another gain in the war on drugs was the Reagan’s administration’s efforts to take away the drugs from the consumers through efforts made to cut down the crop abroad. This effort can be seen in countries like Bolivia. In this country, the efforts to reduce the drug production saw the seizure of twenty seven tones of cocaine in 1986. This was an improvement from just one tone netted in 1981.7 On the whole, the war on drugs has gained a number of notable wins over the trade and production of drugs. There has been a decline in the production, trafficking, distribution and consumption of drugs all over the world. This has been driven largely by an increasingly tight global prohibition on drugs. This is a sign that nations have seen the need to unite together in order to fight this menace.8 There are other gains in the pursuit of the war on drugs. One of these gains has been among the youth. Institution of education and awareness campaigns has been initiated for the benefit of these youth. These awareness campaigns are meant to ensure that the youth are well aware of the risks of drugs, as well as driving them towards alternative methods of recreation thus keeping them out of harm’s way.9 At learning institutions and even in society, the youth are kept away from drugs through the imposition of very stiff penalties if found to be in possession of drugs. This is aimed at ensuring that the youth keep away from drugs. Any involvement on their pair, in the using of even the smallest quantities of drugs, can easily push them into the use of drugs. In the prisons, there are treatment centres for the prisoners who are recovering from both drug use and abuse10. As seen above, there have been efforts to deal with the drug trade’

Monday, January 27, 2020

Relationship Between Music and Architecture

Relationship Between Music and Architecture CHAPTER 1: INTRODUCTION Research Overview There have been some efforts that were made by a number of researcher vis-ÃÆ'  -vis looking at the parallels of architecture and music in terms of rhythm, harmony and the inherent ability to provoke emotional responses of each discipline; however, those researches have not covered all genres of music. One of the types of music that have not attracted a lot of architectural critics, cabaret music, has captured my interest. Given the limited research in the area, this study intends to achieve a better understanding of the relationship between cabaret music and architecture. Statement of the problem Towards the end of the 19th century, Romanticism reached its limits of expression. Consequently, diverse and experimental music forms began to emerge, which broke away from the mainstream of Romanticism. These included the impressionism of Debussy and Ravel, and the surrealism of Erik Satie. The emphasis on irregular rhythms within Stravinskis The Riot of Spring caused its first audience to riot in 1913. These followed the experimentation in scales and rhythms of BartÃÆ' ³k. In the performing arts, cabaret songs were intentionally naturalistic in language, theme while certain of its devices, such as the shadow play, were both decadent and symbolist in their use of light, colour and evocative suggestion. Simultaneously, in this period, architects like Frank Lloyd Wright and Le Corbusier experimented with new approaches in composing architecture. Purpose and importance of the research This study is valuable in that it might contribute and add to the existing body of knowledge that has drawn out the parallels between architecture and music. Structure of the report The remaining of the report is organised into four chapters that will start from the known intersections between music and architecture to more specifically, the parallels between cabaret music and architecture. The report will then move to discuss the relationship between architecture and other related music disciplines like dance and Non-western musical. CHAPTER 2: INTERSECTIONS OF MUSIC AND ARCHITECTURE The Chapter focuses on analysing selected architectural work that has used music as design inspirations as a way of introducing the topic. Alberti, Palladio and the application of music in architectural design Historically music was thought of as a mathematical science. The idea of harmonies sprung from the process of division. A string that produced a certain tone could be divided along exact proportions to create a note that would resonate in harmony with the first note, creating an overlapping of tones that could be considered beautiful both aesthetically and mathematically. These ideas were developed by the ancient Greeks, but brought into importance during the Renaissance. It was during this time that architecture was thought of as an art that needed a mathematical and therefore scientific basis to be considered objectively. Palladio often looked to musical proportions as a means to achieve ideal proportions in his designs. Basic harmonies such as octaves and fifths were applied to room sizing in all three dimensions, and were also often overlooked to as ornamental guides. The Palladian practice of applying basic harmonic ideas to basic room proportions is a starting point with what can be achieved by translating tonal ideas into the practice of architecture. Renaissance thinkers placed importance on the translation of audible proportions to the visual arts partly because they viewed musical composition as a mathematical science whereas architecture was thought of as a liberal art. In an attempt to give architecture a system of design method, it had to be referenced to a mathematical framework. Leonardo Da Vinci once said that music and painting are sisters, and both are used to convey harmonies. According to him, music achieved this through the use of chords and painting through the use of proportions. Palladio noted within his illustration ideal proportions for room dimensions and other architectural devices. The numbers within the ratios are carefully chosen and are the result of his attempt to fulfill Vitruvian principles. The principle in question has to do with achieving an ideal design. The artists of the Renaissance believed that it was possible to obtain an absolute beauty by following the proportional principles found in nature. In the practice of architecture, this was achieved by allowing specific geometries to define certain forms. These forms then would act as modules that would define and govern the development of the entire structure. Palladio even stated that it was possible to achieve a harmonic building through the use of proportional principles and that it would be possible to explain and evaluate the success of the building using the terms of musical theory. Leone Battista Alberti had taken the music scale and noted that musical theory is important to the practice of architecture because the numbers that are responsible for pleasing harmonies also evoke delight from mans eyes and mind. Palladio took this idea and used this harmonic scale as a proportioning system in his buildings. He focused on the relationship found between four strings with lengths in a ratio of 6:8:9:12. When these strings were placed under equal amounts of tension and then vibrated they produced wavelengths of consonant tones, most importantly an octave, fourth and fifth. These proportions are noted in his plans published in the Quattro Libri. Le Corbusier and the Phillipss Pavilion The growth of subjective judgment slowly did away with the Renaissance search for an absolute beauty, but this did not stop the intersection of musical and architectural ideas. It did change them, leading to new investigations and ideas. Of particular importance is the work of Le Corbusier on the Phillipss Pavilion. He investigated both the translation of musical proportions to built form, but also the use of acoustics and sound to generate and convey a sense of space. In 1958, Phillips Company, a producer of electronic speakers, hired Le Corbusier to design and build a pavilion for the Brussels World Fair. The Phillips Companys goal was to show off the capabilities of their latest speakers and filled the pavilion with three hundreds of them. Le Corbusier proposed to give the Phillips Company an electronic poem with which to showcase their work. He worked with a team of Phillips engineers and two modern composers: Iannis Xenakis and Edgard Varase. Xenakiss role in the Phillips Pavilion was focused on the exterior shell of the building. His task focused on translating the sketches and abstract ideas of Le Corbusier (mainly dealing with geometry and proportions) into a buildable, architectural form. The end result, a curved, hyperbolic not only fulfills the mathematical ideals of Le Corbusier, but also evokes the glissandi of Xenakiss 1953-1954 composition Metastasis. Steven Holl and the Stretto House Steven Holl took the investigation of a more complex musical idea that of stretto, as a departure point for a house built in Texas. This project focused on using both the compositional and experiential qualities of a particular piece of music as a means to solve the architectural problems presented by the site and the client. The Stretto House, a project by Steven Holl located in Dallas, Texas exemplifies a modern approach to marrying the ideas of architecture and music. While there is more to the project than just this aspect the ideas of music played an important part in the development and implementation of the design. The name of the house comes from the musical term stretto. Stretto is most commonly used in the fugue and in this context it refers to the theme of the piece being repeated and overlapped by different voices. The decision to explore this musical idea as a mode of design occurs during the initial sketching phase. This phase explored some of the vernacular materials of Texan architecture, specifically metal roofs and concrete blocks. This combined with the need to create shade and producing this via overlapping led to the exploration of the overlapping that occurs in stretto. Holl narrowed the study of stretto to one particular piece of music, Bela Bartoks Music for strings, percussions and Celeste. The feature of this work is the distinct separation between heavy and light by carefully dividing the percussion and string sections. Holl literally took the basic composition of the music and composed his building in the same way. Bartoks work is divided into four movements and its most compelling feature is the aforementioned division of instruments into two models. Holl designed his structure to have four distinct spatial sections and focused the work on two distinct elements: masonry, which mimicked the heavy role of the percussion and curved metal, which played the light nature of the spring section. The result is an overlapping and intersection of several elements. The curved metal roofs overlap with the heavy masonry structure, referred to as spatial dams. The different planes of the building, roof, floor and wall, pull space from each other to continue the overlapping effect. The materials of the building follow suit, as do the actual design drawings. The orthogonal plan of the main house drawing stands in contrast to the curvilinear section while the drawings of the guest house reverse this pattern, mimicking the inversion found in Bartoks composition. This project was designed around a cohesive idea that can organize and guide the experiential qualities of the space. Holl notes that the concept that drives a design like the Stretto House disappears completely in the phenomena of the physical reality and yet intuitively the abundance of the idea may be felt. By combining the ideas of music and architecture Holl was able to create an analogue between the two practices. By treating music as something that has a materiality, one gained from its instrumentation, he was able to synthesize it with architecture through his use of light and space. The equation that Holl himself writes to explain this is material multiplied by sound and divided by time equals material multiplied by light and divided by space. The key to success of this lies in the distinction that both architecture and music have a material aspect, and this common factor allows parallels to be drawn. To summarize, the practice of architecture and the practice of music have intersected and impacted each other in a variety of ways throughout their histories. These instances can be divided into two distinct categories. The first category involves architecture taking proportional and compositional principles directly from musical theory. Palladios villas ?t into this category as many of the proportions that guided the design were taken from their eras understanding of music and the nature of sound. The second category involves architecture learning from the experiential qualities of music and trying to replicate them in built form. CHAPTER 3: LITERATURE REVIEW Writer Johann Wolfgang Von Goethe is famous for describing architecture as frozen music in the 19th century. Music and architecture also share similar experiential aspirations. Architectural historian Sir John Summerson notes in his essay The vision of J.M.Gandy that architecture is an art that is constantly attempting to realize in solid, stable form those effects which music is able to conjure up in an instant. He goes on to point out that music and architecture even use a similar vocabulary, specifically the use of mass, rhythm, texture and outline to achieve similar effects such as the colossal. It was Pythagoras who discovered that a vibrating string, stopped at its centre, produced the octave; at two thirds of its length the fifth, and at three quarters, the fourth. From this he developed the series of ratios that result in the twelve tone scale used in western music today. The ratio between the full length of the string and the length stopped, or the ratios between the lengths making different notes have their direct equivalents in the ratios between the sides of the rectangles that have made up much of western architecture in the intervening centuries. Numerous aspects of this relationship between the underlying ratios of music and architecture have been developed and discussed and in this chapter we shall consider the aspects of rhythm, improvisation and emotional response in the light of some of these discussions, and the architecture of Palladio, Le Corbusier, Schindler and Holl. Rhythm Many architects have developed theories of proportion with which to govern and explain their work. These have generated in their turn a significant body of critical analysis and comment. Palladio, like Alberti a century earlier, expounded theories which took up and developed those first proposed by Vitruvius in the 7th Century BC. These were particularly attractive to the spirit of the Renaissance. To the minds of the men of the Renaissance musical consonances were the audible tests of a universal harmony which had a binding force for all the arts. In the 1930s R M Schindler, developed the ideas of module used by Frank Lloyd Wright in his Usonian houses. Here not only the architectural plans, but also the concrete floor slabs were inscribed with grids derived from the sizes of the materials to be used. Schindler took this pragmatic idea and incorporated it into a system of proportion which he described as Reference Frames in Space. The appreciation of this relationship between the mathematics of the ratios and proportions that underlie both music and architecture is of course a purely intellectual exercise. The analogy with music simply amounts to the transference of an established convention in one art to the purposes of another It does not help explain or evaluate the emotional responses that these media can evoke, which is a factor of how the underlying principles are used and manipulated to create the final work. Stretto, the musical term for the overlapping of subjects, and the only strict rule in the formation of fugues, provided Steven Holl with the basis to explore the relationship beyond this intellectual analogy in his Stretto House. The house is directly inspired by Music for Percussion, Strings and Celesta by BÃÆ' ©la BartÃÆ' ³k, in which stretto is used extensively. It is a choice which is particularly apposite as the chief feature of his [BartÃÆ' ³ks] chromatic technique is obedience to the Golden Section in every element. Improvisation In music improvisation is the impromptu or in the moment creation and performance of music as well as spontaneous response to other musicians. It is distinct from untutored or casual composition, in that it requires discipline and a rigorous understanding of the forms and rules in order to be sufficiently coherent to evoke an emotional response. improvisation is a performative (sic) act and depends on instrumental technique, improvisation is a skill. Because the creation of a work of architecture requires rigorous planning and control of all its elements, improvisation is not usually associated with it. The usual view is that architecture cannot be impromptu, it must be planned, detailed and explained thoroughly if all those involved in its production are to collaborate effectively. In his BBC Proms lecture in 2002 Daniel Libeskind confirmed that it is difficult to have improvisation in architecture â€Å" to have rotating players, to have players interpret. He suggested, however, that if the spatiality and materiality is open, then the public can form its own operation on the building. This being, perhaps, the closest that architecture can come to improvisation. Certainly the villas of Palladio, with the proportions of their components controlled by a strict series of ratios, and their spaces assembled according to harmonic sequences, must be considered as careful exercises in composition rather than improvisations. Le Corbusiers villas too are compositions which follow a set of rules governing their proportions; Le Modulor. Within these cool, intellectual compositions, however, there are elements which are freer in form and which play off against, and highlight, the orthogonal correctness of the remainder. Coming finally to Schindler, Sarnitz observes that as his work evolved the great importance attached to proportion in his early work gradually receded; he never repeats the complexity of the Lovell Beach House. This move away from strict adherence to the system of proportion that he himself developed, to more lyrical or spiritual values, is directly analogous to that of a musician who has learnt the disciplines of his instrument and the rules of music to the highest level but feels able to express himself more fully and coherently through improvisation. Schindler, having developed and established his competence in his early work, chose to follow this route after recognising the limitations that a purely intellectual approach can bring to a potentially lyrical art. Most of the buildings which Corbusier and his followers offer us as machines to live in are crude contraptions to serve a purpose. Mere instruments of production can never serve as a frame for life. Emotional response The emotional impact of both music and architecture is generated not by the intellectual understanding and appreciation of the ratios and proportions that govern the relationships of their parts and overall composition. It is a response produced by the composer or architect or improviser by manipulating the material multiplied by sound divided by time and the material multiplied by light and divided by space which Holl proposes as the equivalent formulae for the creation of music and architecture respectively. The power of the piece to move the listener or viewer is in direct ratio to the skill of the creator. Both music and architecture are immediate rather than mediate forms of communication. That is they do not require the intermediation of language. They affect the listener and viewer respectively, of all backgrounds and languages, directly with no need for translation or interpretation. They also both have a physical element to their means of communication. Music can recall the serenity and grandeur of a seascape; so also, says Viollet, [le Duc] can architecture when it has occasion to give us long, unbroken, horizontal lines. Then he compares the emotional effect of a low broad crypt with that of a soaring knave; he notes the physical reactions of a man in these two settings, And both directly affect the emotions and understanding. The very same numbers that cause sounds to have that concinnitas [a certain harmony] pleasing to the ears, can also fill the eyes and mind with wondrous delight. The cool but powerful emotional response generated by the composed serenity and authority of Palladios villas is not simply the result of the principles of proportion that govern the elements of the elevations, but also the extension of these principles to the way that the spaces and volumes are arranged. the systematic linking of one room to the other by harmonic proportions was the fundamental novelty of Palladios architecture, At the other end of the architectural scale, Holls fugue in the Stretto House generates a similar response in the viewer to that, which stretto in music evokes in the listener, namely excitement, acceleration, fuller realization, a certain indescribable ecstasy with the sensation of heightened simultaneity. Another aspect of emotional impact, which may be more mundane but is nevertheless worthy of consideration, is the cumulative effect of the music and architecture that surrounds us as distinct from the impact of a particular work. Emily Thompson posits the importance that advances in sound engineering made to the aural perception of life in the early years of the century, giving rise to the phenomenon that is sometimes referred to as the soundtrack of our life. The idea of a parallel stage set of our lives has been hinted at by author Will Self, if Brutalism is heavy metal, then what was Modernism, Schoenbergs dodecaphony? Clearly the Little Englander Palladian nostalgia of the Prince of Wales, the Quinlan Terry partnership, and even Barratt Homes, is of a piece with light classical music: Viennese waltzes, frozen in red brick, Chapter 4: Improvisation after the Renaissance and after Modernism In the earlier chapter I have established that improvisation in architecture can be considered as the departure of a skilled practitioner from the rules he has mastered in order to express himself more fully or to give coherent expression to new or developing ideas. Albertis De Re Aedificatoria (written about 1450) may be seen as the theoretical foundation for the re-establishment of classical order and proportion in the Renaissance. A century or so later Palladios Quattro Libri (published in 1570), re stated these classical rules, and his buildings followed them strictly. At the same time, however, other architects were interpreting these established rules with varying degrees of freedom. In his two villas on the Capitoline Hill in Rome Michaelangelo took the conventional Corinthian order, enlarged it and ran it through two stories; something that the Romans had never done. Vignola, in his Castello Farnese at Caprarola, designed an entablature that, [I]s a departure from the strict grammar of the antique â€Å" a departure in the direction of inventive modelling, of designing a faÃÆ' §ade as a pattern in light and shade, a pattern through which runs a play of meaning rather than any precise series of statements. Giulio Romano was even freer in his interpretation of the rules of antiquity. His Palazzo del Te, with its affected dilapidation and dropped stones in the entablature and his Cortile della Cavallerizza with its extravagant rustication and twisted Doric finds its equivalent in the developing mannerism of the music of the time. In the late 16th century, as the Renaissance era closes, an extremely manneristic style develops. In secular music, especially in the madrigal, there was a trend towards complexity and even extreme chromaticism (as exemplified in madrigals of Luzzaschi, Marenzio, and Gesualdo). Chromaticism in particular is an essential characteristic of the mannerist style at this time. It demonstrates a departure from the rules regulating the fundamental ratios underlying musical theory which is directly equivalent to that executed by Romano upon the rules of classical architecture as restated by Alberti and Palladio. The Pythagorean tone, with a ratio of 9:8, consists of a minor and a major semi-tone; But only the minor semitone can be used in actual music. For this reason, progressions between Bb â€Å" B natural or F â€Å" F#, or any other equivalent intervals, are forbidden. When the chromatic madrigal begins to abound in such progressions, it raises a flurry of controversy. The relationship between mannerism in architecture and in music may be illustrated by comparing the use of chromaticism by Guesaldo with Romanos use of rustication in the Palazzo del TÃÆ' ¨. On the one hand, Guesaldos madrigals are, full of unresolved dissonances, illogical modulations, and chromatic progressions. These are used to powerful effect to create, disruptive and restless changes of mood, so that the end result is rather like eavesdropping on some unresolvable, private agony. On the other, Romanos use of rustication gives the impression that, Everything is a bit uneasy, a bit wrong. It also [R]ecalls ruins [and] ancient buildings left half-finished. But it has great power and this is very largely because of the dramatic use of rustication. Just as Schindler developed a more improvisational style in his later works as he became disillusioned or cynical about the ethos of the Machine Age,[38] so Le Corbusier may also be considered to have undergone a major shift following the Second World War. This is exemplified by the chapel at Ronchamp, the monastery at La Tourette and the Courts of Justice at Chandigarh, all of which may be considered to be improvisational, with regard to the strict principles of Le Modulor. Charles Jencks observes that this perceived change in direction was seen to condone a new turn for modern architecture. He lists a range of diverse range of architectural movements that drew inspiration from Le Corbusiers later works. CHAPTER 5: CABARET MUSIC and MODERNIST ARCHITECTURE Architecture and cabaret music are closely affiliated, not least because both focus on creating unique atmospheres for a variety of purposes. During the early to mid twentieth century American architecture and cabaret were born out of and represented similar cultural concerns. This chapter considers some of the ways in which architecture and cabaret interact and how cabaret uses principles of architecture, such as the utilisation of space, the division of stage space, the distinction between public and private space, and the use of synthesis in design. Examples of Modern architectural designs, including those of Frank Lloyd Wright and Le Corbusier, built during the thirties and forties will be considered with the aim of identifying shared cultural affiliation between cabaret music and architecture during the mid twentieth century. Cabaret â€Å" the trend of combining music, dance, comedy, and theatre in a public place â€Å" was first established in France in 1881. Throughout both world wars and the Great Depression in America, Cabaret afforded a means of relaxation and the opportunity to celebrate, through shared performance, a variety of cultures, talents and tastes. Monmartre, in France, is recognised as the place where buildings were first constructed specifically for cabaret performance. The Moulin Rouge was built in Pigalle in 1889. At the time, the traditional Monmartre windmills were being pulled down at an alarming rate, which accounts for the construction of the large red windmill on the roof of the Moulin Rouge. The turn-of-the-century interior of Moulin rouge expresses the late Victorian Romantic sensibility, just before the introduction of the Modernist Art Nouveau movement. Elegantly and richly decorated, the cabaret setting was described in 1952 as possessing an atmosphere of tawdry luxury [. .] much like that of a bordello. At the time this would have befitted the styles of music which it was built to stage. Artists such as Henri de Toulouse-Lautrec recorded in paint various scenes from this early era of cabaret, such as music-hall singers, women dancers, and women preparing themselves to take to the stage. The flamboyance of early cabaret and the suggestiveness of dances, such as the can-can, paved the way for a relationship between the architectural setting and the music. In the late Victorian era, when more sensual forms of entertainment tended only to be considered as an underground activity, cabaret legitimised more diverse forms of theatre, music and dance, allowing men and women to mingle freely in a public space specifically designed for that purpose. At the time of the popularisation of Cabaret, the pursuit of pleasure had become a popular activity. During the twentieth century new dance halls were erected throughout Europe and in America in order to accommodate the rising popularity of the sociable and edgy form of cabaret entertainment. Cabaret music traditionally involves singing and orchestra, and American cabaret stars included artists such as Eartha Kitt, Nina Simone, and Bette Midler. However, as an art form cabaret declined in popularity during the sixties due to the rising popularity of alternative forms of music, such as rock. Due to the glamour of its beginnings the architectural setting of cabaret traditionally retained elements of luxury, wealth, and flamboyance. On the relationship between Romanticism â€Å" which the late-Victorian introduction of cabaret was celebrating â€Å" and the poetic sensibility, Geoffrey Scott observes that Romanticism may be said to consist in a high development of poetic sensibility t owards the remote, in that it idealises the distant, both of time and place and identifies beauty with strangeness. The elaborate dÃÆ' ©cor of cabaret stages, often including plush red or plum coloured velvet, idealise the sensual and were designed to encourage maximum comfort, pleasure and enjoyment of the entertainment. The designs of traditional cabaret stages were such that the audience area was only minimally lit, with the main focus being on the stage. In Modernist architecture there is suggestion that the culture of cabaret at least crossed over into and was in part incorporated into design. With the introduction of jazz and Broadway style music, cabaret became recognised as being seedier than during the years of its Victorian beginnings. We can explore the parallels between the responses of the two arts to the exigencies of the time by looking at three of the distinguishing qualities of cabaret music and architecture. The popular appeal of cabaret Cabaret deals with emotional or sentimental themes that easily evoke strong responses, rather than intellectual concepts that require esoteric knowledge to be fully appreciated. Frank Lloyd Wrights Usonian homes, built during the 1930s and 1940s, embody the cultural concerns and ideals of the Modern era, and reflect the complexities associated with the Great Depression of the thirties. During this time, many American families looked to cabaret and its music as the solution, albeit temporary, to the stresses of the quotidian drudge associated with the same economic, social and political forces. Usonian houses were intended to deal with the day to day living requirements of the average American family. A large living room for family life, with a big fireplace in It, a triplicate bathroom with sections for the man, the wife and the children and enough space for dressing rooms, closets and perhaps a couch in each, and airy bedrooms, all with easy access to a garden. A significant aspect of popular appeal is the recognition afforded to the performer; the phenomenon of stars. In this regard Wright, at this time, was actively marketing himself as the possessor of a unique, truly American architectural vision, and promoting his reputation as one of the great architects of the century. Variations in cabaret Cabaret offers variety. The subjects of its songs and dances range from tragedy to comedy and its forms from ballad to blues to jazz. It was popular for certain shows to be given to a select audience â€Å" part of the growing consumer culture in which greater emphasis was to be placed on the needs of the patron. In a similar way that cabaret performances were customised, Wright designed buildings with specific elements for patrons. Scholars have already drawn parallels between the designs of Lloyd Wright and music. For example, as expressed by Brooks Pfeiffer and Nordland, Wrights unit system was as an intrinsic part of the organic process of design and construction: just as the warp is discipline for a woven textile, and as the scale and notes are disciplines for the composer of music, so Wright used the unit system as a discipline for design. The modular unit system, based on rectangular and square units, unified and simplified the construction process, and involved the repetition of components such as doors and windows, with an emphasis on geometric pattern and symmetry. Wrights designs were remarkable for their unification of different component parts and ideas, whi

Sunday, January 19, 2020

Volkswagen of America: Managing It Priorities

Matulovic who is the chief information officer of Volkswagen of America (VWoA) has a tough decision to make. Volkswagen’s subsidiary launched a new process for allocating budgets across the business. With the new process, they have derived at a list of approved projects that no one is happy about. Calls came flooding through to Matulovic with an informal request to insert an unfunded project into the IT department’s work plans. VWoA had projects requiring $210 millions and the parent company of VWoA (Volkswagen Group, VWAG) budgeted only $60 million. In choosing the right projects to fund was a process that consisted of three phases: Phase 1-Calling for projects, communicating process, and identifying dependencies, Phase 2-Formal project requests for business unit, and Phase 3-Transforming business unit request into enterprise goal portfolios. Phase I was able to reduce and re-categorize projects because business units realized that many of their initiatives were very similar to other initiatives throughout the company which lead projects to become grouped together into common enterprise projects. This phase identified dependencies among projects. Therefore, without completed projects, the other projects could not be started. This phase also involved members becoming exposed to information about proposed initiatives across the company which gave them a greater understanding and appreciation of different business units. This helps migrate away from the current silo thinking and start focusing on initiatives in an enterprise-wide level. At the end of this phase, the proposed $210 million was simplified to a list of projects that required $170 million. Phase 1 was a critical starting point in aligning all business initiatives and trimming down projects. With the list in hand, we now step into Phase 2. During Phase 2 each business unit was required to classify each proposal into the type of investment (stay in business, return on investment, and option-creating investment) and technological application type (base-enterprise IT platform, enterprise applications, and customized point solutions). These classifications would influence how particular investments would be treated in the selection and prioritization process. Business units had to rank projects by priority and associate projects with enterprise goals. There was criticism that projects were reclassified as enterprise, but they really weren’t enterprise projects. The is because business units had to think of ways to associate their project with enterprise goals to improve chances of funding since the stay in business projects were given high priority, then the enterprise projects and finally individual business units. So if your project wasn’t a stay in business or enterprise project then the business units were tempted to reclassify their project to an enterprise project instead of a business unit. This built frustration as managers are looking for their own funding but don’t have the overall view to properly prioritize which lead other projects get the funding. Finally, Phase 3 consisted of ranking business unit goals based upon enterprise goals/needs. The key concept of governance is to align organizational activity with corporate goals and strategy. The assessment of the new process is to align business goals with enterprise goals and fund the top priority projects that would support the next round of growth goal areas. The NRG program is the readiness program called â€Å"Next Round of Growth† it was aimed to define the goals, functions, and organizational changes required to support and enable the new global product diversification strategy. The Next Round of Growth Enterprise Goal Areas is to support expanded product portfolio which is customer loyalty, new vehicle value, pre-owned vehicle business, stable infrastructure, and optimize supply flow. In order to reach a final project list, VWoA had to simplify and categorize projects, assess their business impact, and distinguish their alignment with goals all while making trade-off decisions. The process is an improvement over the old process since the business units were required to prioritize based on the enterprise-wide goals instead of their own business unit. It also avoided the less organized and less centralized method in prioritizing projects. The new process led business units to work together and make decisions that would affect their unit using the overall company strategy. They would also recognize other business unit’s priorities and provide a greater appreciation of their business unit and the work that they do. This helps alleviate other business units ranking their initiatives as more important than another. As this being a new process at VWoA, this process failed to capture and fund the supply flow project. The unfunded supply flow project revealed a flaw in the new process system. The supply flow project did not get funding because it was recognized at the global level and not at the VWoA importer level. The loss of funding would constitute a major setback for globalization initiatives based in Germany so this particular project must be funded somehow and Matulovic had to think of options on how to make this happen. The recommendation at this point is to remain focus on the most important strategic goals of VWoA and proceed funding all projects in the final project list in the top-ranked portfolio. He should not take funding from other funded projects to try and help fund the supply flow project. That would lead to intense push back and affect working relationships since projects which are important to VWoA’s strategic goals will be neglected. He should also not leave it to the supply flow area to work out what to do about this project because that decision would lead to a project waiting to fail. Dumping a project on them to figure out, without the proper resources is nearly impossible to successfully complete. Re-opening the new prioritization process that took nearly 3 months to complete is unnecessary and wasted time. The process will not have to be reopened, rather to find alternative sources for funding to proceed with the supply flow project. Due to the global reach of the project, it is unreasonable for the project to be funded solely by VWoA, but rather allocating the funds under the parent company or among all companies under the umbrella of the parent company, Volkswagen Group. Volkswagen Group sets the budget at VWoA and several organizational entities at VWoA would play a role in controlling which projects are funded. There are four specific teams involved in this process: the ELT (Executive Leadership Team), the ITSC (IT Steering Committee), the PMO (Project Management Office), and the DBC (Digital Business Council). If they are unable to find alternative funding then they should consider this project as an exception or special condition to figure out a way to fund the project. This is common where successful businesses continuously create new opportunities which cannot be covered by existing IT decisions. Matulovic should reach out to the supply flow group in Germany to present and communicate the different options for alternative funding and the importance of funding the top-ranked portfolio and the supply flow project and get them involved in the solution process. In managing IT priorities in the future, there needs to be a change in the new process to include support and recognize the global level projects and not just at the VWoA level. This ensures other vital projects don’t fall through the cracks like the supply flow project in this case study. The Volkswagen Group should reevaluate that proper funding is allocated for both the VWoA and global level initiatives. Matulovic’s fellow executives that communicated the concern of unfunded projects were involved in the decision making process and if they thought these goals didn’t align with the company’s goals, then they should have voiced their concerns to the process teams, ELT,ITSC, PMO, and/or the DBC, not to Matulovic. The expectation of all VWoA’s employees should be in support of the company’s overall strategic goals, not just their own business units. Volkswagen of America: Managing It Priorities Matulovic who is the chief information officer of Volkswagen of America (VWoA) has a tough decision to make. Volkswagen’s subsidiary launched a new process for allocating budgets across the business. With the new process, they have derived at a list of approved projects that no one is happy about. Calls came flooding through to Matulovic with an informal request to insert an unfunded project into the IT department’s work plans. VWoA had projects requiring $210 millions and the parent company of VWoA (Volkswagen Group, VWAG) budgeted only $60 million. In choosing the right projects to fund was a process that consisted of three phases: Phase 1-Calling for projects, communicating process, and identifying dependencies, Phase 2-Formal project requests for business unit, and Phase 3-Transforming business unit request into enterprise goal portfolios. Phase I was able to reduce and re-categorize projects because business units realized that many of their initiatives were very similar to other initiatives throughout the company which lead projects to become grouped together into common enterprise projects. This phase identified dependencies among projects. Therefore, without completed projects, the other projects could not be started. This phase also involved members becoming exposed to information about proposed initiatives across the company which gave them a greater understanding and appreciation of different business units. This helps migrate away from the current silo thinking and start focusing on initiatives in an enterprise-wide level. At the end of this phase, the proposed $210 million was simplified to a list of projects that required $170 million. Phase 1 was a critical starting point in aligning all business initiatives and trimming down projects. With the list in hand, we now step into Phase 2. During Phase 2 each business unit was required to classify each proposal into the type of investment (stay in business, return on investment, and option-creating investment) and technological application type (base-enterprise IT platform, enterprise applications, and customized point solutions). These classifications would influence how particular investments would be treated in the selection and prioritization process. Business units had to rank projects by priority and associate projects with enterprise goals. There was criticism that projects were reclassified as enterprise, but they really weren’t enterprise projects. The is because business units had to think of ways to associate their project with enterprise goals to improve chances of funding since the stay in business projects were given high priority, then the enterprise projects and finally individual business units. So if your project wasn’t a stay in business or enterprise project then the business units were tempted to reclassify their project to an enterprise project instead of a business unit. This built frustration as managers are looking for their own funding but don’t have the overall view to properly prioritize which lead other projects get the funding. Finally, Phase 3 consisted of ranking business unit goals based upon enterprise goals/needs. The key concept of governance is to align organizational activity with corporate goals and strategy. The assessment of the new process is to align business goals with enterprise goals and fund the top priority projects that would support the next round of growth goal areas. The NRG program is the readiness program called â€Å"Next Round of Growth† it was aimed to define the goals, functions, and organizational changes required to support and enable the new global product diversification strategy. The Next Round of Growth Enterprise Goal Areas is to support expanded product portfolio which is customer loyalty, new vehicle value, pre-owned vehicle business, stable infrastructure, and optimize supply flow. In order to reach a final project list, VWoA had to simplify and categorize projects, assess their business impact, and distinguish their alignment with goals all while making trade-off decisions. The process is an improvement over the old process since the business units were required to prioritize based on the enterprise-wide goals instead of their own business unit. It also avoided the less organized and less centralized method in prioritizing projects. The new process led business units to work together and make decisions that would affect their unit using the overall company strategy. They would also recognize other business unit’s priorities and provide a greater appreciation of their business unit and the work that they do. This helps alleviate other business units ranking their initiatives as more important than another. As this being a new process at VWoA, this process failed to capture and fund the supply flow project. The unfunded supply flow project revealed a flaw in the new process system. The supply flow project did not get funding because it was recognized at the global level and not at the VWoA importer level. The loss of funding would constitute a major setback for globalization initiatives based in Germany so this particular project must be funded somehow and Matulovic had to think of options on how to make this happen. The recommendation at this point is to remain focus on the most important strategic goals of VWoA and proceed funding all projects in the final project list in the top-ranked portfolio. He should not take funding from other funded projects to try and help fund the supply flow project. That would lead to intense push back and affect working relationships since projects which are important to VWoA’s strategic goals will be neglected. He should also not leave it to the supply flow area to work out what to do about this project because that decision would lead to a project waiting to fail. Dumping a project on them to figure out, without the proper resources is nearly impossible to successfully complete. Re-opening the new prioritization process that took nearly 3 months to complete is unnecessary and wasted time. The process will not have to be reopened, rather to find alternative sources for funding to proceed with the supply flow project. Due to the global reach of the project, it is unreasonable for the project to be funded solely by VWoA, but rather allocating the funds under the parent company or among all companies under the umbrella of the parent company, Volkswagen Group. Volkswagen Group sets the budget at VWoA and several organizational entities at VWoA would play a role in controlling which projects are funded. There are four specific teams involved in this process: the ELT (Executive Leadership Team), the ITSC (IT Steering Committee), the PMO (Project Management Office), and the DBC (Digital Business Council). If they are unable to find alternative funding then they should consider this project as an exception or special condition to figure out a way to fund the project. This is common where successful businesses continuously create new opportunities which cannot be covered by existing IT decisions. Matulovic should reach out to the supply flow group in Germany to present and communicate the different options for alternative funding and the importance of funding the top-ranked portfolio and the supply flow project and get them involved in the solution process. In managing IT priorities in the future, there needs to be a change in the new process to include support and recognize the global level projects and not just at the VWoA level. This ensures other vital projects don’t fall through the cracks like the supply flow project in this case study. The Volkswagen Group should reevaluate that proper funding is allocated for both the VWoA and global level initiatives. Matulovic’s fellow executives that communicated the concern of unfunded projects were involved in the decision making process and if they thought these goals didn’t align with the company’s goals, then they should have voiced their concerns to the process teams, ELT,ITSC, PMO, and/or the DBC, not to Matulovic. The expectation of all VWoA’s employees should be in support of the company’s overall strategic goals, not just their own business units.