Saturday, August 31, 2019

Conference Management

Abstract This project aims to create a common platform for organizing activities of conference. The conference management system will manage the abstracts and research papers submitted by scholars, reviewing them, and accepting or rejecting them. This will greatly reduce the costs and efforts of the conference managers and authors where they can directly interact through internet. Currently there is a need for such a conference management system, where research conferences relating to different fields can be managed by single application. This application can host any number of conferences and large number of paper can be submitted.The environment created would enhance the usability of conference’s thereby facilitating the researcher’s to submit their papers easily and making organizers to manage the research’s by forwarding it to the jury and taking their reviews. This would reduce a lot of effort. It would also eliminate the need to have expertise on employing people for managing all such activities. It would smooth the progress of conference management and all the activities will take place in well-defined manner. Table of Contents Page No. RecommendationI Dissertation Approval Sheet II Candidate DeclarationIIIAcknowledgementIV AbstractV Chapter 1 Introduction 1. 1 Overview and issues involved01 1. 2 Problem definition 01 1. 3Problem Solution 01 Chapter-2 Literature Survey 2. 1 Methodology 03 2. 2 Technologies and tools 04 Chapter-3 Requirements gathering 3. 1 Software requirements 08 3. 2 Hardware requirements 98 3. 3 Use case model 10 Chapter-4 Analysis 4. 1 Sequence diagrams 18 4. 2 Activity diagrams 22 Chapter-5 Design 5. 1 Technology selection 25 5. 2 Database design 28 5. 3 Implementation details Chapter-6 Testing 6. 1Test case and design30 6. 2Testing methods and strategies31Conclusion 37 Bibliography38 Chapter-1 Introduction This conference management tool aims at improving the conference management practices and reduces the burd en on the part of organizers, and provides the technical solution for the research paper submission and reviews. 1. 1 Overview and Issues Involved There are large numbers of conferences being taking place at different locations all over the world, we have seen researchers and eminent educationist submit their research papers at these conferences, they generally have to send the research paper through post and it takes a lot of time.This project is focused towards developing a management system that will cater to the needs of the conference organizers. 1. 2 Problem Definition In the present scenario, the conference organizers face a lot of problems in coordinating various activities that are associated with conference. This increases a lot of effort and needs a lot of expertise and large numbers of people are required to manage all the process. This definitely is not an easy task. There is a lot of trouble involved in submitting a research paper to a conference and then sending it to a jury, for review and their comments.To speed up this process of conference management was our main focus in this project. 1. 3 Problem Solution This project will be a fine demonstration of efficient use of technology and engineering in the web- application development field. This will cut down the organizing and maintenance cost of conference’s and will also reduce the efforts of author to send their research papers through post. This is done through creation of a conference management application that would assist the organizers to run their conference effectively.Our software product ‘conference management system’ is designed and developed to provide the rigid solution for the handling of conferences. We have designed an interface that will provide the platform for the researchers and educationist to submit their research papers online and it will be forwarded to jury for their review and comments. The system will help the user’s to create new confere nce by providing the information of the conference and the request will be forwarded to the administrator for validation.The administrator can accept or reject the conference request and he will have to authority to delete the author if he is found doing illegal activity on the system. The chair of the conference will add the program committee members to review the papers submitted in that conference. The chair can check the details of the paper submitted in the conference installed by him. The program committee member will be reviewing the conference for which he is selected by the chair to review the conference. The program committee can download the research paper for reading it so it can be reviewed in a better manner. . 1 Methodology To operate this software in a best possible way, the user should have some knowledge of accessing internet and navigating the internet through any browser. He should be aware of how conferences are hosted and the working of organization that hostâ €™s the conference i. e. from submitting of paper, forwarding it to the jury, and then finalizing selected research papers. 1 System Interfaces As our system is completely an independent system in itself thus it does not require any external API or any interface for interaction with any other system.It only interacts with the administrator and author’s, but not with any other software component. 2 Interfaces Our system will interact with the user only through the well defined graphical user interface. Client server architecture will be required for supporting the application. Client Server Architecture A server is anything that has some resource that can be shared. There are Computer servers, which provide computing power; print servers, which manage a collection of printers; disk servers, which provide networked disk space; and web servers, which store web pages.A client is simply any other entity that wants to gain access to a particular server. The interaction between client and server is just like the interaction between a lamp and an electrical socket. The power grid of the house is the server, and the lamp is a power client. The server is a permanently available resource, while the client is free to â€Å"unplug† after it is has been served. [pic] Fig 2. 1 Client-Server Architecture 2. 2 Technologies and Tools NetBeans NetBeans refer to both a platform framework for java desktop applications,and an integrated development environment(IDE).The NetBeans IDE is written in Java and can run anywhere a compatible JVM is installed, including Windows, Mac OS, Linux, etc. The NetBeans platform allows application to be developed from a set of modular software components called modules. The NetBeans Platform is a reusable framework for simplifying the development of Java Swing desktop applications. Among the features of the platform are: †¢ User interface management (e. g. menus, toolbars) †¢ User settings management †¢ Storage manag ement (saving and loading any kind of data) †¢ Window management Wizard framework (supports step-by-step dialogs) †¢ NetBeans Visual Library †¢ Integrated development Tools Adobe Dreamweaver Adobe Dreamweaver is the industry-leading web authoring and editing software that provides both visual and code-level capabilities for creating standards-based websites and designs for the desktop, smart phones, tablets, and other devices. It is a site building and publishing tool appropriate for intermediate to advanced users that allows you to create graphical interface and built-in advanced design and coding features.It enables use of basic JavaScript without any coding knowledge. Integrating features of Adobe Dreamweaver are amazing; it integrates with Adobe’s Spry Ajax framework and that makes an easy access to dynamically-generated content and interfaces. Adobe Dreamweaver is also integrated with Adobe Flash Professional, Fireworks, Photoshop Extended; this lessens th e amount of stages for making projects. Adobe Dreamweaver supports leading web development technologies such as HTML, XHTML, CSS, XML, JavaScript, Ajax, PHP, Adobe ColdFusion software, which make designing and development really magical.Powerful CSS tools do not need separate utilities, and reduce the need to manually edit CSS code in designing and developing websites. Adobe Dreamweaver is the best application for extension developers and web designers who design and put up websites. MySQL Mysql is a relational database management system (RDBMS) that runs as a server providing multi-user access to a number of databases. The SQL phrase stands for Structured Query Language. Free-software-open source projects that require a full-featured database management system often use MySQL.For commercial use, several paid editions are available, and offer additional functionality. Uses MySQL is a popular choice of database for use in web applications, and is a central component of the widely use d LAMP web application software stack—LAMP is an acronym for â€Å"Linux, Apache, MySQL and Perl/PHP/Python†. MySQL is used in some of the most frequently visited web sites on the Internet, including Flickr. com, Nokia. com, YouTube and as previously mentioned, Wikipedia, Google and Facebook. Glass Fish Server: Glassfish is an open source application server project led by Sun Microsystems for the Java EE platform.The proprietary version is called Sun GlassFish Enterprise Server. Glassfish is free software. The latest version of GlassFish released is v3. 1. Other Java EE application servers: †¢ JBoss AS †¢ WebSphere AS †¢ WebLogic Server †¢ Apache Geronimo MODULE-2 †¢ JDBC/ODBC: ODBC  (Open Database Connectivity) is a standard software interface for accessing database management systems (DBMS). The designers of ODBC aimed to make it independent of  programming languages, database systems, and  operating systems. Thus, any application can u se ODBC to query data from a database, regardless of the platform it is on or DBMS it uses.ODBC accomplishes platform and language independence by using an  ODBC driver  as a translation layer between the application and the DBMS. The application thus only needs to know ODBC syntax, and the driver can then pass the query to the DBMS in its native format, returning the data in a format the application can understand. Java DataBase Connectivity, commonly referred to as  JDBC, is an  API  for the  Java programming language  that defines how a client may access a  database. It provides methods for querying and updating data in a database. JDBC is oriented towards relational databases.A JDBC-to-ODBC  bridge enables connections to any ODBC-accessible data source in the  JVM  host environment. JDBC allows multiple implementations to exist and be used by the same application. The API provides a mechanism for dynamically loading the correct Java packages and registering them with the JDBC Driver Manager. The Driver Manager is used as a connection factory for creating JDBC connections. JDBC connections support creating and executing statements. These may be update statements such as  SQL’s CREATE, INSERT, UPDATE and DELETE, or they may be query statements such as SELECT. †¢ MySql †¢ Tomcat Server.Rational Rose Model Rational rose is an object oriented Unified Modeling Language (UML) software design tool intended for visual modeling and component construction of enterprise level software applications. Rose facilitates object-oriented analysis design, better known for OOAD. In fact, Rose is an acronym for Rational Object Oriented Software Engineering. The great things about Rose is that it allows analysts, engineers, writers and project managers to create, view, manipulate modeling elements in a Unified Modeling Language (UML) across the entire enterprise, using one tool and one language.The tool’s true value is that it expo ses software development problems early on in the development life cycle, helping you manage everything from straight forward projects to more complex software solutions. Basically, Rose supports use-case driven object modeling. Chapter-3 Requirement Gathering 3. 1 Software Requirements Functional Requirements |SRS 001 |Add new author |This system shall be able to add new users with valid email-id. | |SRS 002 |Install Conference |Conference management system shall provide users to add new conferences. |SRS 003 |Submit a paper |Authors can submit their papers in already existing validated conferences. | |SRS 004 |Conference validation by administrator |All the conferences are validated by administrators so as to avoid any unauthorized| | | |researches. | |SRS 005 |Program committee selection by Chair |Eminent program committee is selected by chair so as to provide best expertise and | | | |best research papers are selected. |SRS 006 |Paper selection by Program committee |The program committee can select the papers which he wants to review. | |SRS 007 |Upload review |The program committee member can upload his review for selected papers. | |SRS 008 |Mail to Authors and PC member |The chair can send mail from time to time to program committee member and author. | |SRS 009 |Paper download |The program committee can download the paper for further reading. |SRS 009 |Review form download |The program committee can download the review form for making reviews. | |SRS 011 |User feedback |User’s valuable feedback provides us a constant motivation of improvement. | Table 3. 1 Showing Functional Requirements Non-functional Requirements |SRS012 |Access Permission |The conference management system shall have several types of access permissions. For instance, | | | |the administrator is shall be able to validate conference requests and delete the author.At | | | |the same time, authors shall have restricted access to already submitted research papers. | |SRS013 |Mainta inability |The system shall provide the capability to backup the database and it is very easy to maintain | | | |and work on. | |SRS014 |Reliability |The system shall be available all the time, only a internet connectivity is required. |SRS015 |Flexibility |The conference management system shall be flexible and adaptable due to future plans of | | | |expanding the system. | Table 3. 2 Showing Non-Functional Requirements Development End †¢ Operating System (Windows, Mac OS, Linux) †¢ Java Development Kit (JDK) 5 or above †¢ HTML editor (Macromedia Dreamweaver 8) Client End †¢ Internet connection. †¢ A java enabled browser. 3. 2 Hardware Requirements Development End †¢ 500Mhz Intel Pentium-III or higher processor †¢ An Internet connection †¢ 512 MB RAM 600 MB of free hard-drive space, for each platform downloaded into the SDK, an additional 100MB is needed. Client End †¢ 500 MHz Pentium III processor above. †¢ 2 GB hard disk and 256 MB of RAM. †¢ An internet enabled device. †¢ Web Browser installed operating system. 3. 3 Use Case Model In this project, the analysis and design is used as a technique to conduct a research into conference management system. Design is completely based on definition of problem and the knowledge based construct. The use-case diagram which clearly depicts how this system behaves is constructed. End users can easily circumspect the operations carried out.Also the relationship between various elements is visible and the constraints are easily identified. [pic] Fig 1. 1 Use case for Author. [pic] Fig 1. 2 Use case diagram for Program committee member. [pic] Fig 1. 3 Use case diagram for Editor [pic] Fig 1. 4 Use case diagram for Administrator Use Case Description 3. 3. 1 UC01: Login 3. 3. 1. 1 Description:The user logs in the web site. 3. 3. 1. 2 Flow of events:User opens the login page; enter his id and password, and clicks on login button. 3. 3. 1. 2. 1 Alternative Flows: N. A. 3. 3. 1. 3 Special requirements:N. A. 3. 3. 1. Preconditions:The user must have registered him before with the web site and should hold a valid account. 3. 3. 1. 5 Post conditions: The user gets access to the site. 3. 3. 1. 6 Extension point:N. A. 3. 3. 2 UC02: Sign Up 3. 3. 2. 1 Description:The user registers him by entering his details. An account is made where his profile information is maintained. 3. 3. 2. 2 Flow of events Entering all the fields and then clicking on submit button. 3. 3. 2. 2. 1 Alternative Flows: N. A. 3. 3. 2. 3 Special requirements: N. A. 3. 3. 2. 4 Preconditions: The user should have a valid email account.The mandatory fields should not be left empty. 3. 3. 2. 5 Post conditions:The user has a valid account on the website. 3. 3. 2. 6 Extension point:N. A. 3. 3. 3 UC03: Install a Conference 3. 3. 3. 1 Description: The author can create a new conference. 3. 3. 3. 2 Flow of events: Users logs in, and then go to chooses create conference option and enters the co nference details and submits his request. 3. 3. 3. 2. 1 Alternative Flows: N. A. 3. 3. 3. 3 Special requirements:N. A. 3. 3. 3. 4 Preconditions: The user must have a valid account on the web site. 3. 3. 3. Post conditions: The request for a new conference is submitted. 3. 3. 3. 6 Extension point: N. A. 3. 3. 4 UC04: Submit Paper 3. 3. 4. 1 Description: The author can submit his research paper on the existing conferences. 3. 3. 4. 2 Flow of events: Author logs in, and then goes to chooses submit conference option and enters the research paper details and submits his paper. 3. 3. 4. 2. 1 Alternative Flows: N. A. 3. 3. 4. 3 Special requirements:The author must have a valid research paper. 3. 3. 4. 4 Preconditions: The author must have a valid account on the web site. . 3. 4. 5 Post conditions: The author’s research paper is submitted and will be forwarded to jury for review. 3. 3. 4. 6 Extension point: N. A. 3. 3. 5 UC05: Edit Profile 3. 3. 5. 1 Description:The user can access h is own profile information. He can either view or edit the profile. 3. 3. 5. 2 Flow of events: Users logs in, and then goes to My-Account section to view and edit his profile information. 3. 3. 5. 2. 1 Alternative Flows: N. A. 3. 3. 5. 3 Special requirements: 3. 3. 5. 4 Preconditions: The user must have a valid account on the website. 3. 3. . 5 Post conditions: The profile information is updated. 3. 3. 5. 6 Extension point:N. A. 3. 3. 6 UC06: Validate Conference 3. 3. 6. 1 Description: The administrator can validate the conference requests. 3. 3. 6. 2 Flow of events The administrator logs in and then goes to selects the validate conference option, then selects the conference requests which is to be validated. 3. 3. 6. 2. 1 Alternative Flows: N. A. 3. 3. 6. 3 Special requirements: N. A. 3. 3. 6. 4 Preconditions:The administrator must hold a valid account and must be properly logged in. . 3. 6. 5 Post condition: The selected conferences are validated. 3. 3. 6. 6 Extension point:N. A. 3. 3. 7 UC07: Add PC member 3. 3. 7. 1 Description: The chair has the right to invite the PC member to review the paper for a particular conference. 3. 3. 7. 2 Flow of events The author has to change his role from author to chair, then select the conference for which he wants to invite the PC member. 3. 3. 7. 2. 1 Alternative Flows: N. A. 3. 3. 7. 3 Special requirements: The author has to change his role from author to chair to be able to add 3. 3. . 4 Preconditions:The author is properly logged in and changes his role from author to editor. 3. 3. 7. 5 Post condition: The PC member is invited to review the paper for a particular conference. 3. 3. 7. 6 Extension point:N. A. 3. 3. 8 UC08: Review the paper 3. 3. 8. 1 Description: The PC member can review the paper for which chair has invited him. 3. 3. 8. 2 Flow of events The author will have to first change his role to PC member, then select the conference which he wants to review and then select the research paper for which he wants to write review.The PC member posts his review for that paper. 3. 3. 8. 2. 1 Alternative Flows: N. A. 3. 3. 8. 3 Special requirements: The author must be added by chair as a PC member for that conference. 3. 3. 8. 4 Preconditions:The PC member should be added by program chair to review that conference, and he should have changed his role from author to PC member. 3. 3. 8. 5 Post condition: The author posts the review of the paper. 3. 3. 8. 6 Extension point:N. A. 3. 3. 9 UC09: Download Paper 3. 3. 9. 1 Description: The PC member can download the research paper. 3. 3. 9. Flow of events The author changes his role from author to PC member, selects the conference and particular research paper, then downloads the paper. 3. 3. 9. 2. 1 Alternative Flows: N. A. 3. 3. 9. 3 Special requirements: The author must be added by chair as a PC member for that conference. 3. 3. 9. 4 Preconditions:The PC member should be added by program chair to review that conference, and he should have changed his role from author to PC member. 3. 3. 9. 5 Post condition: The PC member downloads the paper. 3. 3. 9. 6 Extension point:N. A. 3. 3. 10 UC010: View Paper Details 3. 3. 10. Description: The PC member can check the details of the research paper. 3. 3. 10. 2 Flow of events The author changes his role from author to PC member, selects the conference and particular research paper, then views the detail of paper. 3. 3. 10. 2. 1 Alternative Flows: N. A. 3. 3. 10. 3 Special requirements: The author must be added by chair as a PC member for that conference. 3. 3. 10. 4 Preconditions:The PC member should be added by program chair to review that conference, and he should have changed his role from author to PC member. 3. 3. 10. 5 Post condition: The PC member check the details of paper. 3. 3. 0. 6 Extension point:N. A. 3. 3. 8 UC11: Delete Author 3. 3. 11. 1 Description: The administrator can delete any author if he does any illegal activity. 3. 3. 11. 2 Flow of events The administrator logs i n and selects the author to be deleted. 3. 3. 11. 2. 1 Alternative Flows: N. A. 3. 3. 11. 3 Special requirements: N. A. 3. 3. 11. 4 Preconditions:The administrator must hold a valid account and must be properly logged in. 3. 3. 11. 5 Post condition: The author is deleted from the system. 3. 3. 11. 6 Extension point:N. A. 3. 3. 12 UC12: Logout 3. 3. 12. 1 Description: The administrator can delete the author. . 3. 12. 2 Flow of events The administrator logs in and selects the logout option and administrator is logged out. 3. 3. 12. 2. 1 Alternative Flows: N. A. 3. 3. 12. 3 Special requirements: N. A. 3. 3. 12. 4 Preconditions:The administrator must hold a valid account and must be properly logged in. 3. 3. 12. 5 Post condition: The author is logged out from administrator page. 3. 3. 12. 6 Extension point:N. A. Chapter-4 Analysis 4. 1 Sequence Diagram A sequence diagram is an interaction diagram in UML that emphasizes the time ordering of the messages. It shows how processes operate on e with another and in what order.It shows parallel vertical lines as different processes or objects that live simultaneously, and horizontal arrows as the messages exchanged between them, in the order in which they occur. The boxes across the top of the diagram represent the use cases, objects, classes, or actors. The dashed lines hanging from the boxes are called object lifelines, representing the life span of the object during the scenario being modeled. The long, thin boxes on the lifelines are activation boxes, also called method-invocation boxes, which indicate processing is being performed by the target object/class to fulfill a message.Messages are indicated on UML sequence diagrams as labeled arrows, when the source and target of a message is an object or class the label is the signature of the method invoked in response to the message. Return values are optionally indicated using a dashed arrow with a label indicating the return value. [pic] Fig 4. 1 Sequence Diagram for Lo gin [pic] Fig 4. 2 Sequence Diagram for Sign Up [pic] Fig 4. 3 Sequence Diagram for My-Account Section [pic] Fig 4. 4 Sequence Diagram for Paper Submission [pic] Fig 4. 5 Sequence Diagram for Conference validation [pic] Fig 4. 6 Sequence Diagram to add PC member. [pic] Fig 4. Sequence Diagram to write review for a paper. [pic] Fig 4. 8 Sequence Diagram to check submission details of a conference. 4. 2 Activity Diagram An Activity Diagram is essentially a flow chart showing flow of control from activity to activity. They are used to model the dynamic aspects of as system. They can also be used to model the flow of an object as it moves from state to state at different points in the flow of control. Activity diagrams commonly contain fork start & end symbol. [pic] Fig 4. 7 Activity diagram for Author [pic] Fig. 4. 8 Activity diagram for administrator Chapter-5 Design 5. 1 Technology SelectionWe are a part of a rapidly changing software industry. New and better software’s are cr eated every day. The main purpose of the software is to provide comfort to its users and also to the other developers. Java Java Platform, Standard Edition or Java SE is a widely used platform for programming in the Java language. It is the Java Platform used to deploy portable applications for general use. In practical terms, Java SE consists of a virtual machine, which must be used to run Java programs, together with a set of libraries needed to allow the use of file systems, networks, graphical interfaces, and so on, from within those programs.Java Development Kit jdk 1_5_0 it has been by far the most widely used Java SDK Sun contributed the source code to the OpenJDK. The Java Development Kit (JDK) is a Sun Microsystems product aimed at Java developers. Since the introduction of Java, it has been by far the most widely used Java Software Development Kit. A Java Development Kit (JDK) is a program development environment for writing Java applets and applications.It consists of a r untime environment that â€Å"sits on top† of the operating system layer as well as the tools and programming that developers need to compile, debug, and run applets and applications written in the Java language. A JVM can also execute byte code compiled from programming languages other than Java. Java was conceived with the concept of WORA: â€Å"write once, run anywhere†. This is done using the Java Virtual Machine. The JVM is the environment in which Java programs execute. It is software that is implemented on non-virtual hardware and on standard operating systems.JVM is a crucial component of the Java platform, and because JVMs are available for many hardware and software platforms, Java can be both middleware and a platform in its own right, hence the trademark write once, run anywhere. The use of the same byte code for all platforms allows Java to be described as â€Å"compile once, run anywhere†, as opposed to â€Å"write once, compile anywhere†, w hich describes cross-platform compiled languages. A JVM also enables such features as automated exception handling, which provides â€Å"root-cause† debugging information for every software error (exception), independent of the source code.A JVM is distributed along with a set of standard class libraries that implement the Java application programming interface (API). Appropriate APIs bundled together form the Java Runtime Environment (JRE). Java's execution environment is termed the Java Runtime Environment, or JRE. Programs intended to run on a JVM must be compiled into a standardized portable binary format, which typically comes in the form of . class files. A program may consist of many classes in different files. For easier distribution of large programs, multiple class files may be packaged together in a . jar file. JSP and ServletsA servlet is a Java programming language class used to extend the capabilities of servers that host applications accessed via a request-resp onse programming model. Although servlets can respond to any type of request, they are commonly used to extend the applications hosted by Web servers. To deploy and run, the Apache Tomcat Server may be used. It is an open source servlet container developed by the Apache Software Foundation (ASF). Tomcat implements the Java Servlet and the Java Server Pages (JSP) specifications from Sun Microsystems, and provides a â€Å"pure Java† HTTP web server environment for Java code to run.Java Server Pages  (JSP) is a  Java  technology that helps  software developers  serve  dynamically generated web pages  based on HTML,  XML, or other document types. JSP may be viewed as a high-level abstraction of  Java servlets. JSP pages are loaded in the server and are operated from a structured special installed Java server packet called a Java EE Web Application, often packaged as a  . war  or  . ear  file archive. JSP allows Java code and certain pre-defined actions t o be interleaved with static web markup content, with the resulting page being compiled and executed on the server to deliver an HTML or XML document.The compiled pages and any dependent Java libraries use Java byte code rather than a native software format, and must therefore be executed within a  Java virtual machine  (JVM) that integrates with the host  operating system  to provide an abstract platform-neutral environment. MySQL as a backend Features of MySQL 1. Speed: Of course, the speed at which a server side program runs depends primarily on the server hardware. Given that the server hardware is optimal, MySQL runs very fast. It supports clustered servers for demanding applications. 2. Ease of use: MySQL is a high-performance, relatively simple database system.From the beginning, MySQL has typically been configured, monitored, and managed from the command line. However, several MySQL graphical interfaces are available as described below: †¢ MySQL Administrator: T his tool makes it possible for administrators to set up, evaluate, and tune their MySQL database server. This is intended as a replacement for mysqladmin. †¢ MySQL Query Browser: Provides database developers and operators with a graphical database operation interface. It is especially useful for seeing multiple query plans and result sets in a single user interface. Configuration Wizard: Administrators can choose from a predefined list of optimal settings, or create their own. †¢ MySQL System Tray: Provides Windows-based administrators a single view of their MySQL instance, including the ability to start and stop their database servers. 3. Cost: MySQL is available free of cost. MySQL is a â€Å"Open Source† database. MySQL is part of LAMP (Linux, Apache, MySQL, PHP / Perl / Python) environemtn, a fast growing open source enterprise software stack. More and more companies are using LAMP as an alternative to expensive proprietary oftware stacks because of its lower co st, reliability, and documentation. 4. Query Language Support: MySQL understands standards based SQL (Structured Query Language). 5. Capability: Many clients can connect to the server at the same time. Clients can use multiple database simultaneously. You can access MySQL using several interfaces such as command-line clients, Web browsers. 6. Connectivity and security: MySQL is fully networked, and database can be accessed from anywhere on the Internet, so you can share your data with anyone, anywhere.The connectivity could be achieved with Windows programs by using ODBC drivers. By using the ODBC connector to MySQL, any ODBC-aware client application (for example, Microsoft Office, report writers, Visual Basic) can connect to MySQL. 7. Portability: MySQL runs on many varieties of UNIX, as well as on other non-UNIX systems, such as Windows and OS/2. MySQL runs on hardware from home PCs to high-end server. MySQL can be installed on Windows XP, Windows Server 2003, Red Hat Fedora Linux , Debian Linux, and others. We have maintained our database in MySQL that involves maintenance of information. 5. Database Design It is defined as â€Å"centralized repository of information about data such as meaning, relationships to other data, origin, usage, and format†. Our data dictionary is designed in order to fulfill: †¢ A document describing a database or collection of databases †¢ An integral component of a DBMS that is required to determine its structure †¢ A piece of middleware that extends or supplants the native data dictionary of a DBMS. The most challenging phase of the system life cycle is system design. The term design describes a final system and the process by which it is developed.It refers to the technical specifications that will be applied in implementing the candidate system. It also includes the construction of programs and program testing. System design is a solution, a â€Å"how to† approach the creation of a new system. This important phase is composed of several steps. It provides understanding and procedural details necessary for implementing the system recommended in the feasibility study. Emphasis is on translating the performance requirements into design specifications. The first step is to determine how the output is to be produced and in what format.Samples of the output and input are also presented. Second, input data and master files (database) have to be designed to meet the requirements of the proposed output. The operational (processing) phases are handled through program construction and testing, including a list of programs needed to meet the systems objectives and to complete documentation. Finally, details related to justification of the system and an estimate of the impact of the candidate system on the user and the organization are documented and evaluated by management as a step toward implementation.The design approach that was suited for the project turned out to be object-oriented design. It creates a representation of the real world problem domain & maps it into a solution domain that is software. Unlike other methods, object-oriented design results in a design that interconnects data objects(data items) & processing operations in a way that modularizes information & processing , rather than processing alone. E-R diagrams represent the schemas or the overall organization of the system. In order to begin constructing the basic model, the modeler must analyze the information gathered during the requirement analysis for the purpose of: classifying data objects as either entities or attributes, ? identifying and defining relationships between entities, ? naming and defining identified entities, attributes, and relationships, ? documenting this information in the data document. ? Finally draw its ER diagram. To accomplish these goals the modeler must analyze narratives from users, notes from meeting, policy and procedure documents, and, if lucky, design document s from the current information system. [pic] Fig 5. 1 Enhanced Entity-Relationship diagram. Chapter 6 Testing 6. Test Case and Design Software testing is a critical element of software quality assurance and the ultimate review of specification, design and code generation . Testing of the software leads to uncovering of errors in the software and reveal that whether software is functional and performance requirement are met. Testing also provides a good indication of software reliability as software quality as a whole. The result of different phases are evaluated and then compared with the expected results. If the errors are uncovered they are debugged and corrected.A strategy approach to software testing has the generic characteristics: †¢ Testing begins at the module level and works outwards towards the integration of the entire computer based system. †¢ Different testing techniques are appropriate at different point of time. †¢ Testing and debugging are different ac tivities, but debugging must be accommodating in the testing strategy. †¢ A strategy for the software testing must be accommodate low level tests that are necessary to verify that a small source code segment is performing correctly according to the customers requirement and that of developers expectations.Testing Objectives †¢ Testing is a process of executing a program with the intent of finding an error. †¢ A good test case is one which has a high probability of finding an as yet undiscovered error. †¢ A successful test is one that uncovers an as yet undiscovered error. †¢ Our objective is to design tests that systematically uncover different classes of errors and to do so with minimum amount of time and effort. Testing Principles: †¢ All tests should be traceable to customer requirements. †¢ Tests should be planned long before testing begins. The Pareto principle applies to software testing. †¢ Testing should begin â€Å"in the small† and progress towards testing â€Å"in the large†. †¢ Exhaustive testing is not possible. †¢ To be most effective, testing should be conducted by an independent third party. 6. 2 Testing Methods and Strategies: Any engineered product can be tested in one of two ways: White-Box Testing: Knowing the internal workings of a product, tests can be conducted to ensure that the internal operation performs according to specification and all internal components have been adequately exercised.For testing our project, we have used the Black-Box testing methods, and a short description of this testing method follows: Black-Box Testing: Black box testing, also called â€Å"Behavioral testing†, focuses on the functional Requirements of the software. It enables the software engineer to derive sets of input conditions that will fully exercise all functional requirements for a program. It is a complementary approach to â€Å"White-Box testing† that is likely to uncover a different class of errors. Black Box testing attempts to find errors in the following categories: †¢ Incorrect or missing functions Interface errors †¢ Errors in data structures †¢ Behavior or performance errors †¢ Initialization and termination errors. Snapshots for Test cases: [pic] Fig 6. 2. 1 Snapshot for login Test Cases Description: following testing checks the authenticity of the end-user. Test 01 : Test case for successful Login Login ID: pushpendra Password: blackboard System Output: Successful Login Test 02 : Test case for incorrect password Login ID: pushpendra Password: chalk System Output: Incorrect user-id or Password [pic] Fig 6. 2. 2 Snapshot for conference installation Test CasesDescription: this lets you install a new conference. Test 01 Conference name: International conference on environmental studies Conference acronym: ICES Email: [email  protected] com City: Indore Country: India Your role: chair Research area: environmental Any other information: Send request System output: conference successfully installed. [pic] Fig 6. 2. 3 Snapshot for paper submission Test Cases Description: this lets you submit your research paper in your desired conference. Test 01: Name: mohit maheshwari E-mail: mohit. [email  protected] om Country: India Organization: Accenture India Title: cloud computing Abstract: benefits of new cloud computing Keyword: ACC Paper: paper1. pdf Browse System output: new paper successfully submitted. [pic] Fig 6. 2. 4 Snapshot for changing role Test Cases Description: this lets you change the role as per as requirement. Test 01: Present role: Author Change role New role: Chair System output: Your role successfully changed. [pic] Fig 6. 2. 5 Snapshot for updating profile Test Cases Description: this lets you update your personal information.Test 01: Name : ankit jain Contact number: 9407217505 E mail: [email  protected] com Organization: Microsoft India Country: India Password: anjtdf Change password: fhdfioh Submit System output: your profile successfully updated. [pic] Fig 6. 2. 6 Snapshot for review of the paper Test Cases Description: this lets you review the form previously submitted by you. Test 01: ID : 412 Author: mohit jain Review rating: 4. 5 Comment: it was very innovative. Submit System output: your form has been successfully reviewed. Conclusion Software’s are making everyday life of humans being easier & faster.This type web-application shows â€Å"How we can solve management problem? † Hence, software is managing the record & database in behalf of humans. After completion of this website, authors and administrator can now access the conference’s and can submit the research paper of their interest field. It is aimed at improving the infrastructure of the conference organizer’s by providing authors an opportunity to submit their papers. Thus it can manage the entire conference process related to paper submission, jury selection, and paper review, under the complete control of the administrator.In our project, we have used Mysql RDBMS for the creation, maintenance and use of the database. The user interface is designed using Java servlets, JSP using Netbeans IDE. We have defined two users for this system, author and administrator, each with their own access and rights and activities. This project allowed us to interact with JSP and servlets. We explored java database connectivity and also became familiar with requirements of a conference management system. BIBLIOGRAPHY/REFRENCES 7. 1 BOOKS REFERED The following books were used extensively for the project development and implementation. . â€Å"The Complete Reference Java2† Tata McGraw-Hill publishing Company Limited. By- Herbert Schildt. 2. The Complete Reference to JAVA SERVER PAGES 3. Head First – Java Servlets 4. Software Engineering Pearson edition By Ian SommerVille 5. Database Management System by Ivan Bayross 7. 2 WEBSITES REFERED †¢ http:// www. google. com †¢ http://www. wikipedia. com †¢ http://www. w3schools. com/css/css_examples. asp †¢ http://www. w3schools. com/js/default. asp †¢ http://www. jsptut. com/ †¢ http://www. roseindia. net/jsp/jsp. htm

Friday, August 30, 2019

Different cinderella stories Essay

Numerous countries for countless of years have told Cinderella stories in different languages and in many different ways. These worldwide Cinderella stories may have different characters or even have different ways to interpret them. Also these Cinderella stories may have completely different magical interventions that help Cinderella throughout the story. For example the stories â€Å"Aschenputtel† and â€Å"The Twelve Months† are both a Cinderella story but have a lot of differences. Although these two Cinderella stories are not a lot alike they still have much in common. In the Cinderella story â€Å"Aschenputtel†, the girl is approached with the magical intervention of birds helping her. As for â€Å"The Twelve Months†, the girl is approached with magical intervention by the months that change the seasons for her. This magical intervention is very different from one another for these two stories even though they both involve nature. The nature plays a different type of role for each story. In â€Å"Ascheputtel† the nature is animals around her helping her, while in â€Å"The Twelve Months† the nature is Mother Nature herself helping the girl. Also one of the differences is the attitude of the stepmother and her daughters in each of the stories. In â€Å"Aschenputtel† the stepsister’s attitude is all about trying to outdo Aschenputtel band trying to force their feet into â€Å"the golden shoe† (Aschenputtel 186), so that they might marry the prince. In â€Å"The Twelve Months† the step sisters are not trying to outdo her. They simply want to be mean and cruel to her. Although these stories are very different from on another they are also alike. They both follow the five factors of being considered a Cinderella story. The five factors to be considered a Cinderella story are to have a girl that is put down, an evil influence, magical intervention, an item that identifies the girl, and the girl has to marry a prince. These factors must be met but can have various different ways to illustrate them. The first two factors are the same for both the stories because each story has a girl who is put down by the evil influence of her stepmother and stepsisters. The magical intervention is in both stories and is represented by nature. An item that identifies each girl from the stories is a little different though. In Aschenputtel the item is her shoe in which she has lost. In The Twelve Months the item is the apples. Finally the last factor is shown in both stories by marriage. Overall, Cinderella stories including â€Å"Aschenputtel† and â€Å"The Twelve Months†, have differences but in the end they all come down to the five factors. All Cinderella stories are not as different as you may think. Works Cited The Brother Grimm â€Å"Aschenputtel.†: Page 186.

Thursday, August 29, 2019

Red Scarf Girl

Feelings of Sympathy There is nothing worse than the act of betrayal. Jiang Ji-li, a girl who was always praised by her teachers and always felt warmth in her home started to be exposed to the real world and how people can walk away from those who were there for them their whole life and treated as if they were non existent. She never thought that her fellow peers could deceive her, betray her. Who would have ever thought that the same people who Jiang Ji-li kindly helped with their home work could easily point their guns at her.Not only does the reader feel sympathetic towards Jiang Ji-li but also fury towards the students and how she was treated because of her family's black status. Jiang Ji-li is not really not to blame for what kind of traits she bears or her stance, she was babied and never really let out of her cage into the wild where she could see things for herself. Jiang Ji-li's weak character also contributes to the kind of mood the author feels during the time he/she read s the book.Ji-li, by the way she acts, she seems very fragile and she is not one that can easily accept what negative things that are said about her. Ji-li thinks that there is only good things and good people in the world. If it's not said or pointed out to her, she would never have noticed it. She is too carefree, allowing herself to think that there are only harmless people, that they would never hurt her until there was a da-zi-bao written about her, â€Å"Ke Cheng-li doesn't like working-class kids. He only likes rich kids†¦We have to ask the question, What is the relationship between them after all? † If she had been a very strong girl, knew where she stood and didn't care what others said about her or her family, the reader would have felt a different mood. Though there are other factors that contribute to the story, for instance â€Å"setting. † In this novel, it talks about the Cultural Revolution of Chairman Mao whose intention was to do good things to C hina starting by ridding the Four Olds and bringing in the Four News.Without this historical time period in the book, there would be no chaos in the country, and there would have been no class status that separated the rich from the working-class families. The setting affects the mood of the reader. If the author of the novel chose to change the setting and only the setting, there would be a huge to the mood the reader feels. â€Å"Suddenly I wished that I had been born into a different family. I hated Grandpa for being a landlord,† one cannot help but feel sympathetic towards Ji-li, who was not yet ready to face the cruel world.It's unimaginable how much anger can be inside her especially if she hates someone she has never met, which makes the reader feel pity for her. How hurt she must be, a girl always showered with warmth, love and compliments now being thrown dirt on. Throughout the book, I've felt sympathy towards Ji-li. She tries very hard to do what's right, and aims to be successful but her black class status held her back. Always fearing that people will make fun of her black class status, she shied away from doing things she wanted to do.In the epilogue of the book, even though Chairman Mao had died, her status continued to follow her, refraining her family to move forward, and remain under those who had better statuses. Some might feel fury towards the movement, how it was not right because it allowed many others, besides the Jiang family to suffer because of criticism due to their wealthy lifestyle or committing other â€Å"crimes. † What might make the reader feel especially sympathetic towards Ji-li's situation is how she was confused about what to do, she was suffering and she was told she had two roads she could take.She could either leave her parents and their family's black status or she could stay with her family and remain loyal. Ji-li didn't have a choice, she didn't choose to be born into the kind of family she was born in. Why did it matter that her grandfather was a landlord? She wasn't. The main contribution to the mood, in my opinion was probably the traits that Ji-li bear. What she felt, the readers could feel because it was her point of view that they looked at.

Wednesday, August 28, 2019

Racial essentialism and Racial constructivism Term Paper

Racial essentialism and Racial constructivism - Term Paper Example Racial essentialism is a malady that affects the American population from pre-historic times to the modern world. The American population is largely divided into two races, which are the black Americans and the whites. The notions that hold the phenomenon of racial essentialism purport that some races are better than other races, a factor that mostly triggers war between the white and the black people in the United States. The genesis of the racial segregation can be traced to the colonial times when the whites used to enslave Africans in their plantations as workers. The deep-rooted racism has not waned since most whites and blacks have been enemies in all spheres of life. America has been experiencing a subtle war between the two races for the longest period. There have been different cases of assassination of white people by black police or black people by white police. The underlying reason that propagates such atrocities is racial essentialism's notions. The most striking notion that propels such outrageous acts is that whites feel more superior to the blacks. On the other hand, blacks are vengeful since they believe that they are as superior as the whites in terms of intelligence, physical attributes, and work productivity and so they deserve equal treatment. The war that transpires between the two races occasionally is akin to a battle for race superiority. Thus, the reason is still coalesced into the notion of race or skin color. The war against racial prejudice in America.

Tuesday, August 27, 2019

Categories of Computer Crime Essay Example | Topics and Well Written Essays - 500 words

Categories of Computer Crime - Essay Example codes; the creation of false bank accounts; theft of personal information and misuse of the stolen information; the virus infection created on computers that can hamper the proper software operations and damage records. Today, the biggest crime created through computer use is the electronic financial account transfer (Computer-Based Crime, 2011). To date, identity theft has the fastest growing crime rate in America. Identity theft is the pilfering and illegal use of private information from an unsuspecting individual to access personal financial accounts. The targeted personal data include a victim’s address, birth date, telephone number, social security number (SSN), bank account number, credit card number, or other valuable identification records to be used for the thief’s economic gain. Criminals use this information in opening new credit and depository accounts, applying for home or car loans, leasing homes, apartments or vehicles (Brody, Mulig & Kimball, 2007) applying for benefits, or filing fake tax returns (Palmer, 2006). In worst cases, perpetrators use the obtained private information to take over the victim’s identity, create enormous debts, or use in a criminal activity under the victim’s name (Brody, Mulig & Kimball, 2007). Phishing is a scam that uses volumes of electronic mail messages to attract innocent victims into disclosing private information. A phishing email illustrating a believable problem lures the victim to a fake link that is a replication of the victim’s bank web address; the victim then fixes the imaginary concern and verifies account information and divulges personal identification. Subsequently, the phisher uses the pilfered PIN number, secret code, and identity to drain the victim’s bank account (Brody, Mulig & Kimball, 2007). Pharming is a technically higher form of phishing wherein a virus is unknowingly downloaded on the victim’s computer. The prey keys in a genuine web address but is instead redirected to a

In defense of El Salvador Essay Example | Topics and Well Written Essays - 1000 words

In defense of El Salvador - Essay Example However, rather than understand the situation in El Salvador in the same way that it is represented to the individual via the news media, it is instead important to realize that the situation that exists within the country is quite different from the horrific and grizzly reports that are so often the topic of cautionary tales on late night news shows. Further, even though it is true that nations such as Afghanistan may have a lower â€Å"murder rate†, the security of a traveler in such places can be reduced to a question of how foreigners are viewed and treated.   Accordingly, the level of interaction that violence has with the average tourist or foreigner within El Salvador is extraordinarily small; due in part to the fact that almost all of the violence is predicated upon gang related activity and the quest to control narcotic distribution networks.   This is invariably something that the simple tourist has little knowledge of or interest in; thereby partially shielding them from the eventuality of being caught upon the internecine struggle that has recently defined this otherwise pristine nation within Central America (Olate 384). Firstly, although it is true that El Salvador has a very high murder rate and this causes the would-be tourist or business visitor to be concerned, the reality of the fact is that the violence towards foreigners is relatively on par with any other Central American or Caribbean nation.   Although this does not mean that the stakeholder in society should simply be unconcerned about the rate of violence.

Monday, August 26, 2019

The Use of Animal By-products for Human Medicine Term Paper

The Use of Animal By-products for Human Medicine - Term Paper Example ill provide a background of the medical field and will be divided into two parts: the historical and culturally based background, and the prevailing contexts of the general utility of animal-based medicinal products. In the second section, I will discuss the legal and politico-economic dimensions of animal-based products, crucial in the preparation of medicines, with reference to economical, ecological, sanitary and cultural contexts. I will finally end the paper with a conclusive discussion of the future of animal-based products, with regard to the prevailing nature of their extraction and availability, as well as global viability and large-scale application. Here I will delve on why there is a need for consideration, with regard to the sustainable future utility of these products, in the growing global populations. Historical and Cultural Background Animals, as well as animal-derived products, from various parts of their bodies or organs, have through history, constituted an increa singly growing segment of medical substances’ general inventory. Their utility as sources of varying medicines is traceable to early historical times, as showcased through various cultural utilities, with this still being practiced in the field of herbal medicine. Through the aforementioned zoo-therapy, various ailments afflicting man, continue being treated and hence the importance of this form of medication to many populations. Human culture, individually/ uniquely and wholesomely, provides for a structured medical system, which utilizes different animal species, for various medicinal purposes (Costa-Neto and Eraldo 33). Amongst the myriad of therapeutic medical practices carried out within the larger global arena, zoo-therapy constitutes a vital alternative. Cultural and Historical... The paper will be organized into two main sections, which will further display the prevailing contexts influencing the need of anima-based products for human medicine. The first section will provide a background of the medical field and will be divided into two parts: the historical and culturally based background, and the prevailing contexts of the general utility of animal-based medicinal products. In the second section, the author will discuss the legal and politico-economic dimensions of animal-based products, crucial in the preparation of medicines, with reference to economical, ecological, sanitary and cultural contexts. The author will finally end the paper with a conclusive discussion of the future of animal-based products, with regard to the prevailing nature of their extraction and availability, as well as global viability and large-scale application. Here the author will delve on why there is a need for consideration, with regard to the sustainable future utility of these products, in the growing global populations. This paper makes a conclusion that with an increase in the monetary value of animals procured, with the both political and socio-economic can be either positive or negative. Positive if there is greater regulation and conservancy, with the latter resulting from increased poaching and clandestine procurement of animal species. Animal, as well as plant-based medicines, through increased utility in contemporary contexts, provide for a case study of how both western and traditional forms of medication can be incorporated into the overall human health and medical development.

Sunday, August 25, 2019

As a manager Research Paper Example | Topics and Well Written Essays - 250 words

As a manager - Research Paper Example Decisions are arrived at after an objective scrutiny of the underlying facts and ideas. The ENTJ personality style does not allow for subjective judgment, or relying on previous experiences. It enhances the quality of the decision-making process. The ENTJ personality style is not independent of other personality styles. The style ought to recognize that some decisions rely on existing trends. It does not allow for flexible decisions that are adjustable to the dynamic working environment. The decision-making process should incorporate a sufficient balance between both objective and subjective judgment. The personality type is strict on guidelines and set rules. It is best applied in careers that do not allow personal feelings and emotions to take part in the decision-making process. Such careers include; Law, Real Estate, and Engineering. The three careers do not provide any grounds for subjectivity; that is, decision-making is based on the laid-down facts (Tieger, & Tieger, 2009). The MBTI test is a sufficient performance measure that analyzes different employee attributes. I would use the test to enhance job deployments. The test would ensure that employees are stationed in departments that suit them. Long-term goals for this test would be to increase job satisfaction within the entire workforce; hence increasing

Saturday, August 24, 2019

Research Report - Experimentation Essay Example | Topics and Well Written Essays - 1000 words

Research Report - Experimentation - Essay Example The source of the trust-image (dependent variable) in the experiment was a store visit by a close ally and was manipulated as one/zero. The store image was manipulated as positive/negative implying positive or negative the impression on its ability and competence in carrying out basic store services. The experiment used apparel stores for its investigations. This was a good selection especially considering that there are a great number of new apparel stores being opened in India from time to time. This provided an excellent opportunity for carrying out a longitudinal experimental study on emergent stores. Sampling and subjects The subjects used in the experiment were students in a renowned Management Institute in India. Random sampling was used to gather the 160 subjects from four out of the institute’s seven largest dormitories. This is a good sampling procedure because it does not give room for the selection of a biased group of subjects for example subjects of a certain soc io-economic class, taste preference or whose parents own large apparel shops in India. Being college students, the subjects ranged from 20-28 years in age. This was very good considering that individuals in this age bracket were free from parental influence in terms of shopping preference for example apparel purchase. According to Kaul et al (2010), the use of male respondents is another positive aspect of this research and it improves the reliability of its results. This is because product quality for formal and informal men’s wear in large Indian apparel stores is relatively established. If ladies had been sampled in the experiment, the results would have had some levels of bias and unreliability. This is because their formal wears are western and are only available in limited range in few large stores and selected cities. However, the use of ladies under a parallel experiment would have been good for proofing further the reliability of the results obtained from male subjec ts. When the results of pre-visit and post visit scenarios were compared, they were similar. The participants also verified the research results by naming large apparel stores they could recollect after the experiment. As expected, all the participants mentioned various large regional and national apparel shops. This was in line with the hypothesis of the experiment and hence the experiment can be said to be worthy and valid in indicating that store image has an impact on the shopper trust. This was supported by use of a manipulation check to check the experiment’s believability. The manipulation check was in form of an open-ended question â€Å"According to you, on what has your friend probably based his opinion about the store?† Kaul et al (2010), In addition to the manipulation check, an additional item to test the respondents’ willingness to visit the store again was used.. However, it was not necessary to use the manipulation checks and additional test item because the data collected were too rich to be analysed. Therefore, it is true to say that the experiment was overdone. As much as the data collected was too rich, it could also be unreliable because it could just be a reflection of top-of-mind recall instead of all relevant cues. The experiment did not involve repeated experimentations which should have been done after some good

Friday, August 23, 2019

Financing New Ventures Assignment Example | Topics and Well Written Essays - 500 words

Financing New Ventures - Assignment Example This has paved way for diversification in investment According to (Harrington, 1987) it allows the investor to avoid unsystematic risks such as poor management of the company which will automatically lead to returns not being realized. From this model a linear relationship has been developed to show the relationship between systematic risk and the expected return. As compared to weighted average cost of capital (WACC) this model gives a robust discount rate that can be used for assessing the investment. Using WACC a project can be turned down when its internal rate of return is less that of WACC. This is because WACC is based on the assumption that any investment doesn’t have an effect to financial and business risk. Using CAPM, gives internal rate of return that is higher than the security market line and a return that can minimize or eliminate system risk. CAPM is considered as the best tool to calculate the cost of equity as compared Dividend Growth Model (DGM). This is because it takes into account the systematic risk level of the business relative to stock market. Portfolio effect refers to the addition of other investment into the portfolio with aim of reducing risk. This can be termed as diversification of portfolio such that change in the value of one investment e.g. bond in the portfolio there will be a response to change in the value of other assets in the portfolio. Portfolio effect has the ability to minimize a specific risk attached to an asset in a given portfolio, but this depends or lies on the degree of correlation of assets held in the portfolio (Hirt & Block, 1990). Diversifying portfolio can be achieved in either horizontal or vertical diversification both will help to reduce the risk associated to a given asset, vertical diversification occurs when an investor decides to add different form of assets or securities in his portfolio e.g. cash, corporate bonds, and building. This is advisable since whenever a

Thursday, August 22, 2019

Computer aided design package Essay Example for Free

Computer aided design package Essay A company called Engineering ? Us have employed me to find out the cost, benefits and the drawbacks of upgrading from their current method of hand made technical drawing to using an up-to-date Computer Aided Design (CAD) package. This company designs and constructs office furniture to order; because of this work only begins on an item once the exact details of the item have been calculated and have the clients approval. The current method which is used to gather the information that the designers need to make the drawings for the office is to send over a person to measure the location where the item or items of furniture will be located and how they will get the item into the building. After this has happened and the measurements have been given to the designers the designers will draw the blueprints by pen and paper. After they have drawn the design they will send the blueprint via one of the companys employees to the client for him/her to look at and decide if it is what they wanted. If the client decided they liked the design the blueprint would be sent down to the workshop where they would start construction of the design. If the client didnt like the blueprint that the designers had made Engineering ? Us would find out from the client what was incorrect with the blueprints, then the designers would redesign the blueprints with the clients inputs in mind. After this it is shown to the client again to see if it is to their liking. The reason the company is upgrading to a CAD based system from their hand drawn method is that up until now they have only had to make items on a smaller scale with a lot of time allowed for each project. Currently they allow the designer to make the drawings on the A0 paper taking their time which would take a few months, then have it sent to the manufacturing department to be constructed. Now they have managed to negotiate a contract with another company who will require Engineering ? Us to make the items faster, this means that they will need the technical drawings drawn faster so they can construct the items sooner. To allow this to happen they have decided to change from their current system to a computer based system using a CAD package appropriate to their needs. Engineering ? Us is a small company; they have one office and a workshop which are situated in separate places. The office block is where the items are designed and the workshop is where they are constructed using the designs from the office block. To transport the drawings from the office block to the workshop they walk over from the office block to the workshop with them, the reason they do this rather than any other method is that the two locations are very close together. Engineering ? Us has ten people working in the workshop where they are constructing the designs that are made and they have two designers drawing the blueprints in the office. There are also seven people who take blueprints out to clients to make sure that they like the drawing before Engineering ? Us constructs the design. These five people also take orders and measurements of the areas where the clients want the items to be placed and deliver the items to the client using a company van. The company has three supervisors, one is in charge of the technical drawing department, one is in charge of the workshop and one is in charge of the five people who communicate directly with the clients. One manager is in charge of all three of the supervisors and then the director of Engineering ? Us is above him. In total this brings the number of employees working for Engineering ? Us to twenty and two of these twenty employees will be using the system I am to justify. The company has recently won a new contract from a client and now has to construct a lot more furniture over a shorter period of time. For the company to meet these demands they have decided to upgrade their workshop to use a CAM machine that will speed up construction. The CAM machine has already been chosen by the company and the training plus everything else that is required for the CAM machine to operate. Engineering ? Us only require me to analysis the designing part of the company and make this more efficient to keep up with the new contract they have acquired. Engineering ? Us wants me to come up with a system that will run a CAD package that I justify for the company to use. This system will have to output a file format compatible with the CAM machine so that they integrate with each other easily. The contract will provide the company with i 60,000 at the end of the year once all of the items have been constructed and delivered to the client. This will be paid in instalments at the end of each month of i5,000. This contract will also be renewed with the client providing that Engineering ? Us can adequately provide the items they required within the allotted time frame. The system that I have been asked to come up with will have two users; these two users are currently working with Engineering ? Us and they will need to be trained in using the new system as they have not had any training or experience with any CAD application. They also need to have the capability to back up their drawings daily so that if something did happen to their hard drive they wouldnt have lost everything. They also want all three computers linked up to their own network separate to any others that the company already have. It also needs to be connected to the internet so they can download updates for their CAD package as updates become available over the internet. The company has given me a budget of i 15,000 to come up with a costing to make or to buy two PCs capable of running a CAD package that I justify and anything else that is needed to run this application. With this budget I will also need to buy an A0 plotter, two graphics tablets, networking equipment and training for the employees on using the CAD package. P2 The company currently has two computers in their office block; these computers are very old and are only used for word processing for administration tasks. The current specification of their computers is shown in the table below: Component Specification Processor Intel Pentium 166 MHz (Random Access Memory) RAM 30MB Optical drive CD-ROM x8 speed Hard drive 9GB Modem 56K The computers they currently have cant be upgraded to use any of the new CAD packages because everything in the current computers would all need to be replaced to make it compatible with any new CAD packages. This would effectively mean making a new computer rather than upgrading it, so just constructing a new computer would be a more cost effective way of proceeding. For that reason it would be better to keep these computers for administration purposes they are currently being used for, this would allow the company to still use them and not have to throw them away as they do their current task perfectly. DeltaCAD, MiniCAD, TurboCAD and AutoCAD are four different CAD packages that I have found that could do the job required by Engineering ? Us. The reason I have chosen these four is because the CAM machine in the workshop will only accept . DWG files for reading and if the CAD package didnt output . DWG files it would not be able to integrate with the CAM machine. These files must be contained on a floppy disk as the CAM machine has only a floppy drive input and then it will read the data from it and construct to the specified design. I have chosen to further investigate three separate CAD packages out of the ones listed above; these three are DeltaCAD, TurboCAD and AutoCAD. The reason I have decided to investigate these further is that DeltaCAD is the cheapest, TurboCAD is the mid range and AutoCAD is the most expensive out of the packages. Using these three will give me a wide band of different costs for the different CAD applications which will allow me to come up with cheap systems, mid ranged and expensive an system for the company. This will help me not only stick to the budget I have been allocated but may also save the company money depending on the over all costs of the CAD package that is used. After finding out more on DeltaCAD, TurboCAD and AutoCAD I have found out that the latest versions of these three CAD packages are DeltaCAD 5. 0, TurboCAD 10 and AutoCAD 2005. DeltaCAD is made by a company called Midnight Software, TurboCAD is made by a company called IMSI and AutoCAD is made by a company called Autodesk, both IMSI and AutoCAD sell other products that are like CAD, but they will not be suitable for the tasks that Engineering ? Us require of it. Upon further investigation I have discovered one problem with TurboCAD that DeltaCAD and AutoCAD dont have is that the CAM machine might not read the files it outputs perfectly. TurboCAD 10 outputs a different type of file but they state that this type of file is perfectly compatible with any CAM machine that reads . DWG files. Although they say this I think that from past experiences there could be problems from time to time with this type of file on Engineering ? Uss CAM machine, when these problems arise it will slow the construction process down. P3/M2 I will have to either buy a new PC from a store or make the computers myself; whichever approach is adopted the hardware that will have to be in the machine will be the same and is listed below: Motherboard which will support all other hardware required for the computer   Video card to output a display on the monitor for the user to see what they are doing   CD-ROM drive to install the software applications which will be needed for the task the company requires of it   Floppy Drive to move the . DWG files to the CAM machine in the workshop to construct the items, this can also be very useful for fixing a broken computer or to help analyse its fault   Case for all of the components that will make up the computer to go into. RAM for the computer to open up applications and to keep data that is being used at the present times Hard drive to install the software applications on and store the CAD files created   Keyboard for the users to enter in alphanumeric data and other characters   Mouse or other pointing device for the user to move the curser on the screen   Processor to be able to process all of the data that needs to be processed   Processor heat sink to take heat off of the processor and disperse it into the air. Fans to keep the components inside the computer cool enough to work correctly, e. g. processor fan, case fans and video card fan   DVD/CD reader rewriter drive to back up the drawings that they produce during the day   Monitor for the user to view what they are doing while using the computer Other hardware that will be needed that is not part of the computer and is not needed to get the computer working, but will be required by the company to enable it to do all the work required is the A0 plotter and graphics tablets. An A0 sized plotter will be used to print off the CAD drawings on A0 paper and used to show the blueprints to the clients, they then decide if they like it or not from these blueprints. The reason that they will need to be printed out on A0 size paper is because due to the size of the items they are designing and the amount of information that needs to be shown to the clients it can only be easily displayed on an A0 sized piece of paper. One advantage of the system for the plotters is that there would only need to be one cheap plotter that prints off the drawings in low quality.

Wednesday, August 21, 2019

Hurricane Katrina Disaster Response Essay Example for Free

Hurricane Katrina Disaster Response Essay Bureaucratic/hierarchical model is a kind of organizational management wherein all the members of the organization contribute for the achievement of its purpose which is to give the best possible performance. It has rules and regulation which the members followed. and the personnel took orders from the top. The advantages of bureaucratic/hierarchical model include the following: its power and technical system is implemented by means of its rules and regulations; these rules are well-defined and managed fairly which are the reasons why members and clients agree and measure up to its authority. It has rights and benefits or privileges which serve as a protection to its members as well as its clients, regardless of their status. Bureaucratic/hierarchical model has the capacity to work efficiently and effortlessly, giving power to the people to operate in a synchronized or harmonized way. However, bureaucratic/hierarchical model has its disadvantages as well, and these are the following: agreement or conformity is not always appreciated due to the fact that this may hinder or impede the capacity to attend and respond to events that has not been encoded into their system of rules and regulations; it has the tendency to build a conspiracy or plot among its members; also its administrator has the tendency to become more occupied in maintaining the official form that they lose sight of their original main purpose. Meanwhile, the network model is a kind of organizational management composed of independent people and group that operate in many levels, has links across boundaries, and worked together for a common purpose. It has multiple leaders, and its members meet occasionally. The main purpose of the network model is to provide quality services to its clients through high degrees of informal communications via worldwide web. Because of this purpose, numerous advantages can be derived from networking. First of all, it provides a faster proliferation of information and other related announcement between those at sharp-end and those who support them. It enables members to render high quality services through the various skills and capacity of their teams wherever and whenever the need arises. Technical wise, network can still operate even in cases of natural disaster thereby lessening disruption as it can adjust accordingly. However, as much as this model has numerous advantages, it also has its disadvantages. Among them are: the lack of hierarchy does not always ensure quality services; the fact that since the people involved in this model has less chance of meeting, in cases of any trouble or problem, it takes longer for them to coordinate; and although they have high tech equipment plus the capabilities to operate these equipments, it does not guarantee of reliability in instances of electricity crisis and disasters. Wise (2006) proposed implementing an â€Å"adaptive management† approach for disasters to solve the solution to the above mentioned management model. Adaptive management is a kind of management which makes use of the combination of science and management, and its approach is based on the new information they have acquired. Their approach of management starts with having meeting with members and personnel to discuss the problem and discuss their plans. They will then create a group who will monitor and study the facts and figures, as well as inform their leader about the results of their study. This not only helped solve the problems but at the same time provide an opportunity for organizational learning to all the people involved. The process in adaptive management model includes the following: they first identify the worries and reservations regarding the matter at hand; after which the leader, together with his personnel launched ways or means to test the proposition and suggestion regarding the matter or problem. The last step they take is; after thorough study and consultation with all the personnel concerned, they will then proceed to change their system for a new one which they believe will accommodate for better handling and solving of the matter or problem at hand. Given the Hurricane Katrina scenario, if the adaptive management approach is applied from day 1 when Hurricane Katrina is still in Category 1, the authorities assigned to the disaster division of the government would have lost no time in conducting an emergency meeting to discuss contingency plan with regards to the approaching typhoon. They would have studied and discussed all the angles and possibilities in case the typhoon gained strength. After that, the authorities would improvise plans on safety measures for the public, and formed groups who will monitor the status of the typhoon, the course of its travel 24/7, and update the head of the department from time to time. When one levee collapsed, the authorities would have been able to prevent other levees to collapse because the adaptive management model is more suitable to utilize in case of emergencies like what happened at the height of Hurricane Katrina. As a conclusion, this student recommends the use or application of adaptive management approach for the Hurricane Katrina. For one, this approach is more accurate and reliable since it is more updated due to the continuous training of the manager and personnel of organization with this approach. They possess high technology equipment that proves to be more accurate, and their personnel have the skills and capabilities to handle these equipments that will surely save time in responding to emergencies and disasters. All these aspects will surely be more proficient in handling emergency situations as they lead to better and fast coordination, that can save life better and faster than when bureaucratic/hierarchical model and network model is employed. Bibliography Brown, T. L. and Potoski, M. (2003). Management capacity in municipal and county governments. Public Administration Review. 63(2). Business system-the bureaucratic model. (2008). Business Open Learning Archive. Retrieved March 18, 2009, from The Business Open Learning Archive database. Wise, C. R. (2002). Organizing for Homeland Security. Public Administration Review 62, 131 – 144.

Tuesday, August 20, 2019

Internet And Its Impact On Globalization Media Essay

Internet And Its Impact On Globalization Media Essay The expansion of telecommunication or the Information and telecommunication technology (ICT) is the outcome of the microelectronic revolution which has created channels for the process of monitoring and processing of the information. It has become more pervasive than the radio and the television in todays globalised world. Incontestably now Internet has gained the position of the worlds largest electronic network. The debate is still going on regarding the origin of the Internet as some says that its origin was way back in late 1960s by the United States Department of Defence which created Arpanet (which was invented for a nuclear blitz.) There are others who oppose its origin in the United States by the Department of Defence. In 1984 Arpanet was expanded and opened to the scientific community when it was taken over by the National Science Foundation, transmogrifying into NSFNET, which linked five supercomputers by a variety of private access system.  [1]  As according to the Ex- Director General of WTO, Roberto Ruggiero, Internet provided cheaper faster and easier method of communication, an alternative that has created, global audience. According to Thomas Friedman, in his book The world is flat states, Earlier one has to go to the post offices to send mails and other things but now, it is just a game of seconds that we sent mails and it reaches there the more accurately and with speed.  [2]   Internet is the major provider of information as what the various Internet companies like America Online (AOL), CompuServe etc allows individual to connect with the Internet with just modem to plug in. The capabilities of the Internet are such that we can define it as bidirectional mode of mass communication. It has created a kind of word of mouth networks in which individuals share their opinions, views, expressions and the cyber world gives them enough space for this bidirectional means of communication. Internet which is so much blossomed into this globalised world is also the result of the telecommunication or existing telephones, fiber-optics and satellite systems, was made possible by the technological innovation of packet switching, in which the individual messages are decomposed, transmitted by various channels, and then reassembled, virtually instantaneously, at their destination.  [3]   I, in this paper is taking up the issue of Internet and its impact on the globalisation from the (global) business standpoint and also bring into the socio economic effect and also the cyber crime that is taking place into the cyber world. And also tries to bring into it the digital divide . The growth of Internet in last few years has flabbergasted the most exhausted or lacklustre economy. Before starting with the whole oratory I would like to give a brief explanation on how Internet has its importance in the field of business and also into other fields. I would emphasise onto the importance of Internet as a means of Information and communication technology and also as means by which the whole world is getting connected 24 hours a day. Much of the Internet is used for the private as well as for the commercial purposes many uses them for simple source of entertainment. Although the dominant ideologies sustained largely outside the Internet, the growing communities of the cybercitizen s Netizens brings the views and expressions of people together and cyberspace give them the opportunity to express. As Hauben and Hauben (1997) refer to as Netizens: Net Citizens. It has created its own terminology in its own world such as search engines like google.com; Wikipedia .com etc. I would also like to include here that in the present world as we talk about Globalisation which is a growing phenomenon and that can be described as a shift towards a more integrated and interdependent world economy'(Hill 1997) However, the history of the term globalisation is not very new. After the world war in 1980s the West claimed that there is an end of the history. George. W. Bush the then, President of the United States said, countries would cooperate peacefully as participants in one worldwide market, pursuing their interests while sharing commitments to basic human values. The debate into the globalisation is still going on as some some defined it as the Americanisation, of the world t hrough mechanisms like WTO, IMF, and Mc Donalds all backed up by US power. In simple terms it is a process of interaction and integration among the people, companies and governments of different nations, a process driven by the international trade and aided by information technology(Carnegie endowment) The term globalisation is defined in simple terms as advance of human cooperation across national boundaries but can also be defined as for the self interest and also for the global cooperation. Fukuyama has defined globalisation as modernisation. However there is still a debate which is going on about the different views of globalisation and are put forth that the globalisation is just a historical development or a myth? As David Held argues, Globalisation helds to deepening, widening and speedening up of world in all aspects of contemporary social life. According to the American Heritage, Globalisation is the act, process or policy of making something worldwide in scope or applicati on. However if I talk about the Internet and its impact on Globalisation from the global business point of view which is the topic of the paper then the first I would like to emphasise over the use of the Internet in global business under the regime of globalisation. The Internet is growing at the rate of 30% per annum in number of users, and 100 % cent per annum in hosts on Internet. It is expected that by then of the year 2000, the user base will touch 200 million. It is estimated that there are 7000 ISPs worldwide, mostly in the US. In fact more than 60 percent of the users and ISPs in the Internet world are in the US (Sinha 1999).  [4]   If I talk about ISPs in India then, India has the first dial-up e-mail network was set up between National Centre for Software Technology (NCST) and the Indian Institute of Technology (IIT Bombay) in 1986, followed by connections to the US and Europe. In 1994, a satellite communication network for the Education and Research Network (ERNET) w as set up with the assistance from the United Nations Development Programme (UNDP). The Software Technology Parks of India (STPI) and National Informatics Centre (NIC) opened the gates for Internet gates to software exporting companies and government agencies as well. And in August 1995, Videsh Sanchar Nigam Limited (VSNL) introduced commercial Internet access in India.  [5]   If I look into the impact of the Internet on globalisation from business standpoint then I must first see that how the globalisation has changed the face of the business and make it internalisation of the business or trade and bring it into lot of ways. Leading market research firms have predicted that business-to- consumer retail commerce over the Internet, though amounting to almost nothing as late as 1995, will continue to grow at an astonishing pace and may exceed $100 billion by 2003 (McQuivey et.al., 1998) (I 1.pp1)* With the coming of Internet the new technology has grown up in the field of Information and technology is another accelerator for the mechanism of the Globalisation into the global business. And also if I look into it from the global economic perspective then can say that it also includes the WTO and the GATT agreements which includes the security of the data available at the Internet regarding the business and also for the other related issues. If I look into the trade in globalisation from the Information and communication point of view then before the internet the business was not on that exploring and expanding way as it is now after the introduction of Internet. There were just locals into the locals and the concept of global was there but not on large terms because the cost of making business was very high as the telecommunication charges were high as well as very few business opportunities were introduced, or I can say that the Internet has transformed the business from traditional supply chain to the electronic supply chain. Traditional Supply Chain Electronic Supply Chain 1.Electronic Data Exchange through telephone or fax Internet made it easy. 2.Long term Relationship Technology enabled relationships. 3. New Business opportunities were not there as the concept of on-line trading was not introduced. However in electronic supply chain it is very easy to access to increase the global interaction with people through various means of telecommunication 4. Management cost is also very high as for the maintenance of the data. Less Expensive. With the introduction of Internet in Global Commerce the business activities becomes fast. Accessibility to the data is available at anywhere anytime in any part of the world. Internet can be said as the fertile ground for the companies. During 1990s there has been an explosive increase in the presence of the company websites on the Internet, and an increasing sophistication in the ways that companies use the Internet for sales, public affairs, marketing and stakeholders relations.  [6]  Most of the dominant literature on the Internet is dominated by the prevalent discussion that puts Internet as a medium of business. Eg: A person in US wants to purchase a carpet from India, by giving order online on a website can easily purchase it. So Internet in one sense has made the global into local. As rightly defined by Mr.Clinton in 1997, new frontier for business, and no less a figure than the US President has described the internet as the Wild West of the global economy .  [7]  The companies made their corporate websites onto the Internet and retain the services of public relation firms for the services of the customers. It plays a role of the vehicle for the running of trade on Internet and also it provides a wider space too. The internet is no-space or a headspace, in which physical movement from site to site can only be described in terms of difference of experience (Mizrach 1997, italics in original).  [8]  The construction of the cyberspace on Internet is another issue for the cyber discourse. Bell and Valentine argues that, this may involve the appropriation of spatial concepts at scales ranging from the body to the global.  [9]  By this the companies target their consumers or their prejudices. Today the Internet industry has widened the scope of the business by providing its services a over the globe and at affordable and 24/7. The changing demographics of the Global economy states about the world output as, United States was the dominant industrial power in the early 1960s. It consists of 40% of the total world output in 1968 but 20% in 1997.  [10]   However the critique of the Internet into the global world is that while Internet Backbone Providers (IBPs), also called core providers, exchanged traffic at NAPs under so- called public peering agreements, smaller companies, ISPs, accessed the Internet via backbones. With increasing utilisation of the Internet these public NAPs became susceptible to congestion, resulting in delays and dropped packets. In consequences, large backbones began to directly interconnect with each other through so called private peering arrangements and started to charge transit fees for providing interconnection to private providers.  [11]   Downstream providers collect money at the edge of the Internet and buy connectivity from upstream ISPs or from backbones. However many authors has showed their concern about the concentration and market power in the core network. The problem has its source in 1997 when, starting with UUNET, top-tired IBPs began to refuse to peer with smaller backbone providers and to exclusively peer among each other under so-called non-disclosure agreements which means that peering conditions are kept secret. However , Milgrom and Mitchell and Srinagesh counter these concerns by arguing that a hierarchichally built Internet with a smaller number of core providers is cost effective since it is minimise both the routing and transaction cost.  [12]  This is very much helpful in business as it is cost effective and is provided at the affordable prices and also at the cheaper rates. Internet has removed the physical distances by bringing the world together not only in commerce but also in every sphere. Though it removes the geographical boundaries, it can be used as a tool for gathering the information as it can be indeed used as type of superhighway that connects a number of established networks with the individual system  [13]  , and can be used as a resource of obtaining incredible amount of information. With the Introduction of the Internet into the business a businessman can check the current position of the business anywhere and anytime around the world which was of course not possible earlier. As with the introduction of the various technological instruments like cellular phones, laptops etc and also with the innovative technologies like 3G and all in which the access of the information is just a click away. With chatting onto the internet Live or by emailing or by the current statics which is available online to the consumer s well as trade both can be benefitted. By using Internet as a tool it is easy to work all together as a wide network. As the information which is available on the internet can be trusted also but the debate is still going on this issue as some says that the information available can be trusted while the others say that it can be hacked over and the data can be misused and accessed for the private purposes. It has made the global business to become possible because for the smaller business it was not possible to go global before the internet but now it is possible by the way of online trading which leads to the internationalisation of the business. However the global digital divide has also expanded. As the Internet developed unevenly throughout the world, creating what has become known as the global digital divide. The number of Internet users is one of the most widely used indicatiors of development of this emerging medium of communication. Less than 10 %cent of the worlds population uses the Internet, and the gap between the developed and the developing countries has continued to widen since the early 1990s.(Figure.)* Statistics compiled by the International Telecommunication Union as of the end 2002 indicates that the Internet use as a proportion of the population ranges from less than one percent in many underdeveloped African, Central American and South Asian countries to between 50 and 60 % cent in Iceland, the United states, Scandinavia, Singapore or South Korea.  [14]   I would like to say that this is the major difference or demarcation which brings the digital divide into the world accessibility over the Internet. As the world which is underdeveloped cannot use the wide networks of the internet which brings commerce, communication and interaction with other parts of the world this still continues the topic for the debate into the globalised world. Global capalist forces generates profound inequalities between the developed core, the developing semi-periphery, and the underdeveloped periphery.  [15]   The most replicated finding into the literature is the communication media is that it is been used by people of the higher socioeconomic status. A long tradition of research in media studies conforms the so-called knowledge gap hypothesis.  [16]   It reflects that people of the higher status can use the internet at any cost however those who belong to the lower socio economic status cannot use it as frequently as can by the higher status. But statistics shows that it is increasing with the variety of empirical studies of the global digital divide using aggeregate data have found evidence to the effect that the average standard of living and the average educational level in the country- arguably the analogs of socioeconomic status of the individual level- are strong predictor of Internet use. Using individual level data gatheref in 24 countries, Chen, Bose and Wellman (2002) also found a strong correlation between socioeconomic status and Internet use.  [17]   This reflects th e digital divide that is prevailing into the globalised world. With such global digital divide the global trade is not possible upto certain extent because with this only a certain part of a world which is globalised and developed can access the commerce as well as all the benefits of the Internet and use it on their own terms and conditions. If I talk about the Global business through Internet then online trading is another fact that is taking place such as: amazon.com; reddiff.com; eBay. in etc. For online business, parties must be prepared to use the necessary technology. Organisation find themselves more easy to access the information about the consumers and contact them, and consumers can also access the information about their account online, many banks have also started online trading such as in India State Bank of India started the online trading through which a consumer can access the information about the transaction at any time and from anywhere. I would like to say that internet or the Information and communication technology has empowered the consumers to do everything and anything they need and want to know and to search for, they can compare the prices online and can bid over that. Internet also brings more transparency into the market and global customer will also increasing because of this and also their demands increases. Internet is a part of the institutionally complex, economically important, tightly regulated and highly politicised telecommunication sector. National telecommunication system and markets differs in their reach, quality and cost, which in turn are affected by the way in which regulation takes place, the ownership of companies active in the sector, and the intensity of competition. It is important to note that the competition can translate not only into lower prices (or costs of access and use to the user) but also in more service differentiation, choice and quality. Thus, policymaking in this area tends to have a large impact on the various dimensions of media access and use.  [18]   I can say on that policies are been made and regulated by the telecommunication department and it depends upon the accessibility of the consumer which policy is been accessed by them and it absolutely depend upon the family income of the consumer which plan or the policy is been accessed by them. The re are political conditions also which effects on the growth of the communication media, different social behaviour and the social relationships will leads to the different field of communication. It also depend upon their social circle as what various social networking sites like facebook.com; twitter.com; orkut.com do and tries to explore various new contacts which is beyond the existing. The growth of the internet worldwide is not just only because of the socio-economic status or its cost effectiveness but also the political and the sociological variables and also resources through which it is available to the whole world but also results and data shows that the digital divide is also prevailing into the world through which the whole worlds accessibility to the internet is not possible. If I talk about the impact of the internet in globalisation which is the topic of this paper from business standpoint is like when the other part of the world is not able to access the internet an d not able to get information regarding the online trading and commerce, it is another ongoing debate which is still prevailing into the global society. The Impact of Internet onto the Globalisation with the business standpoint states the competitiveness that has emerged into the global trading as the markets are openly accessed by the consumers have the choices to demand more. As the access to the internet is made possible for the people of the highly socioeconomic background is more than the access of the socially poor people shows the divide into the internet world and also its cost efficiency doesnt work into the world which does not have access to the Internet e.g: the developing world, which have less access into the internet cannot avail these opportunities as these are only available to the people of the developed world such as United States and the European countries. However internet has impacted the way in which services were offered and delivered. The relationship between the customer and the firm becomes more insidious here. The impact of the internet on globalisation is such that it also brings the concept of plagiarism and various other cyber crimes such as, eg: a book or an article is been written by an author is available online and someone has copied it from the book and use it by his or her name without giving reference is a matter of plagiarism. Secondly the server access is although possible to each and everybody through computers and unique IP (Internet Protocol) address through which we can browse the internet but there are few who hack the servers and use it according to their individual purposes. For which various measures are been taken by the Government of various countries and various regulatory measures are also been made but not implemented in the way it should be it also a topic of debate in this globalised world. Though servers can also be used to deny the service that has to be delivered. The government in order to control the cyber crime that has increased and still increasing, according to the Statistics of the US FBI, Incidents of the American Internet networks being broken i nto are rapidly increasing by 30% annually, making the US suffer tremendously.  [19]   The impact of the internet into the globalisation is been discussed into this seminar paper on the fields of global business, digital divide, socio-economic status, security and also the cybercrime. All these need a regulatory measure and its implications. Hegemonic uses of the Net include commercial applications, (Weis 1992; Cronin 1996) particularly advertising and shopping but also purchasing and marketing, in addition to uses by public agencies that legitimate and sustain existing ideologies and politics as normal, necessary, or natural.  [20]   However, the Internet also faces the counter hegemonic discourses, as all groups does not favour the use the use of the internet in all spheres of life. They refuse to accept the ideologies of those who believe to go with the opinion of the general public. Conclusion: In the entire oratory of Impact of Internet on Globalisation from a business standpoint, a global business is missing or been treated as business only through the developed part of the world. This crisis is constructed into the light of the digital divide especially when we are talking into the terms of e commerce or e trade or e business. However in my course of going through the reports and scholarly articles and books, I came to the conclusion that e business or e trade is possible only through the Internet but if this is not available to the developing countries and also because of the socio economic gap as only those can afford who have wealth and not to those who dont have. One more point can be added here as education or knowledge. Computer literacy can also become important criteria for internet knowledge. As Young argued that, Internet is both complex as well as easy and through Internet crosses the geographical and political divides and also it brings separation between pub lic and private social spaces and places. Once the Internet is opened it should be used as a tool through which information can be gathered and it should not used as an objective. And State should try to overcome with the challenges such as cyber literacy, and also to bridge the digital divide between the developed and the under developing world. Thus, we can conclude with the note that the impact of internet on the globalisation has both the negative as well as the positive impact as also the view of the critiques states the same, I through this paper would hope for the better policy and strategy by the idea and emergence of global village to tackle the problems which are prevailing into the world and must be isolated so that the entire world can access the Internet and business can help the developing countries also to come up from the state of under developed to the state of developed and also the hegemony of the e-trade must break from the hands of the developed countries.