Saturday, November 16, 2019

The integrating earned value management

The integrating earned value management 3.3 EARNED VALUE PROJECT MANAGEMENT 3.3.1 Basics of Earned Value Project Management Project Management is often defined as the integrated management and control of Time, Cost, Resources and Quality for the successful on time and on budget completion of projects. Traditional approaches to PM ranged from simple Gantt Charts which help in representing the work to be done on a time scale to techniques likes CPM and PERT that addresses the needs of deterministic and probabilistic scheduling. All of these techniques tend to be used primarily for managing time. Cost is often measured independently by the accountants. This separation between cost and time is often the cause of project failure because the executing team is often unable to detect cost overruns until they are well past the point where they can change the outcome of the project. 3.3.2 Illustrative Explanation Earned Value Project Management (EVPM) is a concept that helps Project Managers seamless link Time and Cost for more effective control. Despite the difficult sounding title and the typical jargon associated with EVPM the basic idea is very simple and can be used effectively in a wide variety of situations. The best way to under stand EVPM is to walk through a sample project, so I am going to take you through a software project. Lets say we are working on the ERMS (enterprise resource management system) that has 10 deliverables/modules each to be completed in one month with a budget of 10 Lac Rupees each. The total project span works out to 10 months at a budget cost of Rs. 100 Lacs (Rs. 1 crore). We are at the end of the first three months and the Project Manager is busy preparing his project report. He starts up by reviewing progress and finds that two deliverables are fully complete while the third one is 80% complete. He checks with accounts and finds out that that a total of Rs. 28 Lacs have been spent so far. With this information he is ready to assign values to the three basic variables required to perform EVPM. These are as follows- 3.3.2.1 BCWS / Planned Value (PV) Budget Cost for Work Scheduled, also known as ‘Planned Value in the amount of money that should have been spent at this point in the life of the project if the project was proceeding as per plan. It is time phased budget baseline (figure). It is the approved budget for accomplishing the activity, work package or project related to the schedule. It can be viewed as the value to be earned as a function of project Work accomplishments up to a given point in time [12]. In our case we had planned to complete three deliverables in three months so we should have spent Rs. 30 Lac. A word of caution here, most projects dont proceed in a linear fashion (i.e. total budget/total duration in months). Correct BCWS values can be obtained from a resource loaded project plan that takes in account the actually work to be done in each period. Budget Cost for Work Scheduled is also called ‘Planned Value. 3.3.2.2 Budget at Completion (BAC) This is the total budget baseline for the activity, work package or project. It is the highest value of PV as shown in Figure-1 i.e. 100 Lac. 3.3.2.3 ACWP / Actual Cost (AC) This is the cumulative AC spent to a given point in time to accomplish an activity, work-package or project [12]. Actual Cost for Work Performed is the amount of money that we have actually spent on the project. Accounts have told us that we have spent Rs. 28 Lac. 3.3.2.4 BCWP / Earned Value (EV) This is the cumulative earned value for the work completed up to a point in time. It represents the amount budgeted for performing the work that was accomplished by a given point in time [12]. To obtain EV of an item, simply multiply its total budget by its completed proportion. Budget Cost for Work Performed is the assessment of the value of work that we have completed. Think of this as the worth of the work that we have completed, so if we had completed three deliverables we would have Completed 30 Lac Rupees worth of work. But we have only fully completed two deliverables so we have Rs. 20 Lac and we have 80% of the third deliverable. Partial completion is a tricky issue, because partial estimates generally vary from person to person depending on how optimistic or pessimistic they are. There are rules of the thumb (Heuristics) to deal with this situation. The common ones are 0-100 (give no credit till the task is complete), 20-80 (give 20% credit when the task is underway and the remaining 80% when it is completed), 50-50 (give 50% credit for starting the task and the balance on completion). The selection of method is up to you, but you need to ensure that you will use the same measure across the project for all tasks. In our case lets say we go with the 50-50 rule, so well give Rs. 5 Lacs credit for the third deliverable which brings the BCWP to Rs. 25 Lacs (20+5). Note that BCWP is also referred to as the Earned Value (EV). Lets start by calculating the two basic measures of performance SPI and CPI -3.3.2.5 3.3.2.5 Schedule Performance Index (SPI) Schedule Performance Index is an indicator for accessing our performance relative to the plan. SPI = BCWP/BCWS = 25/30 = 0.83. We know we are behind schedule, what SPI is telling us is that we have only completed 83% of the work that we originally planned to complete. 3.3.2.6 Cost Performance Index (CPI) Cost Performance Index shows us how much value we are getting for each Rupee that we spend on the project. CPI= BCWP/ACWP 25/28 = 0.89. We are over budget because, for producing Rs. 25 Lacs of work we have spent Rs. 28 Lacs. So we are only getting 89 Paisas of value for each Rupee that we spend. Just looking at SPI and CPI we know that we have a problem in that we are both over budget and behind schedule. A lot of work has been done on the use of SPI and CPI early in the project to predict the final outcome. Most of the work has been done in the US defense industry where researchers have looked at dozens of completed projects and tried to correlate their outcome with the status of their SPI and CPI early on during the project. Most studies show that the value of SPI and CPI when the project is only 20% complete can very accurately predict the final outcome. Using heuristics developed from these studies we can predict the following- Projected Project Duration = Planned Duration / SPI = 10 / 0.83 = 12 Month. So we are expecting that the project will be completed two month behind schedule, Projected Project Cost = Planned Cost / CPI = 100 / 0.89 = 112 Lacs. We are expecting a Rs. 12 Lacs overrun on the budget. Recovery Cost This is the cost that we will incur if we need to complete the project within the originally specified time by adding additional resource to the project. Projected Project Cost = Planned Cost / CPI*SPI = 100 / 0.89*0.83 = 135 Lacs Rupees. We should be ready to exceed the budget by 35% if we want to complete the project in time. Conventional wisdom says that your ability to change the outcome of a project is maximum at the start or the project and minimum near the end of the project. So it makes good sense to detect problems early and take action when you have room for maneuver. If you think about the 20% point intuitively, youll note that the any estimation errors that are leading to low CPI (i.e. budget overrun) are likely to effect the remaining activities of the project at the same rate, similarly the performance of your resources in execution is unlikely to get any better than what they have proven capable of in the first fifth of the project. Given the importance of early detection, think about conventional project management and how little it can tell you from the fact that you have completed two deliverables and 80% of the third and spent 28 Lac Rupees, Because of this, problems often evade early detection and by the time someone detects the problem its too late in the project to do much about it i.e. in a stage where the project is controlling the project manger instead of vice versa. 3.3.4 Integrating EVM Risk Management In todays uncertain business environment there is understandable pressure to improve the quality of decision-making at all levels in the organization. A number of techniques have been developed to address this concern, in an attempt to introduce some rational framework to the decision-making process. Two of the leading approaches are Earned Value Management (EVM) and Risk Management (RM). These stand out from other decision support techniques because both EVM and RM can and should be applied in an integrated way across the organization. Starting at the project level, both EVM and RM offer powerful insights into factors affecting project performance. Another key similarity between the two techniques lies in the word â€Å"management†. It is possible to conduct â€Å"Earned Value Analysis† and â€Å"Risk Analysis† to expose underlying drivers of performance. But both techniques emphasize the need to move from analysis to management, using the information to support proactive decision-making. Consequently, both EVM and RM encourage those using the techniques to take appropriate management action based on the results, and not to stop at mere analysis. Since both EVM and RM address the same problem space (performance of projects, programs, portfolios and businesses), and both provide management information to provide a basis for decisions and action, there has been considerable interest in the possibility of developing a combined approach to create synergistic benefits. Currently EVM and RM operate as parallel coexisting processes without systematic integration (although good project managers may intuitively link the two in practices). Much of the discussion to date on the relationship between EVM and RM has been rather theoretical, addressing the key principles underlying the two techniques. The objective is to analyze steps that can be implemented to combine EVM and RM in order to gain maximum benefit for projects and the organization. 3.3.4.1 Weakness in EVM and RM The strength of EVM RM has already been described, as their proponents seek to encourage wider update use. Each technique however has atleast one key weakness which presents a significant danger to those relying on the output to support strategic or tactical decision-making. For EVM, one of the main perceived weaknesses is its reliance on a key assumption, that future performance can be predicted based on past performance. Calculated performance measures (CPI, SPI, CV, SV etc) are used to predict forwards and estimate cost at completion or overall duration. Unfortunately there is no guarantee that the basic EVM assumption will be true, and it is likely that the future will deviate from that predicted by simply extrapolating from past performance. The strength of EVM lies in its rigorous examination of what has already occurred on the project, using quantitative metrics to evaluate project past performance. It goes on however to predict future performance by extrapolating from the past. But it is not possible to drive a car by only looking in the rear-view mirror. A forward view is also required, and this Is what RM offers. While project planning looks at the next steps which lie immediately ahead, RM has a horizon further into the future, It acts as forward-looking radar, scanning the uncertain and unclear future to identify potential dangers to be avoided, as well as seeking possible additional benefits to be captured. However this undoubted strength of being resolutely and exclusively future-focused is also one of the key weaknesses in RM. Any thing which occurred in the past is of little or no interest to the risk process, since there is no uncertainty associated with past events. RM starts with todays status quo and looks ahead. How the project reached its current position is not relevant to the risk process, unless one is seeking to learn lessons to assist RM on future projects. As a result RM as commonly implemented often lacks a meaningful context within which to interpret identified risks, since it has no means of capturing past performance and feeding this into the decision-making process. If EVM is weakened by assuming that future performance can be predicted from past performance, and if RM is weakened by looking only forwards with no real awareness of the past, a useful synergy might be obtained if a combined EVM-RM approach were able to address these weaknesses. Combining a rear-view mirror with forward-looking radar would use the strengths of complementary approaches to compensate for the weaknesses inherent in using each alone. Consequently it is possible to produce significant benefits by using RM to provide the forward view required by EVM, and by using EVM to provide the context required for RM. 3.3.4.2 Synergies from a Combined Approach Given the common aims of EVM and RM to examine and expose drivers of project performance in order to focus management attention on achievement of objectives, and given their differing perspectives towards the past and the future, a number of areas of possible synergy exist between the two techniques. The steps required to implement these synergies are [18]: Creating the baseline spend plan Predicting future outcomes Evaluating risk process effectiveness 1. Creating the baseline spend plan The foundation for EVM is the baseline plan of expected spend over time, creating the profile of â€Å"Budgeted Cost of Work Scheduled† (BCWS) or â€Å"Planned Value† (PV) against which project performance is measured. This baseline is derived from a costed and resourced project plan, including fixed and variable costs arising from financial and human resources. The BCWS profile is typically presented as a cumulative curve, or S-curve, as in Figure below. The baseline BCWS exists as the benchmark against which project performance will be measured. However one of the first things a project manager learns is that reality will never precisely match the project plan. As soon as work starts, there are variations in productivity, resource and information availability, delivery dates, material costs, scope etc. This is why a rigorous change control process is vital to successful project management. Although not all changes can be foreseen before the project starts, it is possible to assess the degree of uncertainty in a project plan, in both time and cost dimensions. This is the domain of RM. One of the first contributions that RM can make to EVM is to make explicit the consideration of uncertainty and risk when constructing the baseline BCWS. By undertaking a full risk assessment of the project plan before the project starts, addressing uncertainties in both time and cost, it is possible to evaluate the degree of risk in the baseline project plan. Quantitative risk analysis techniques are particularly useful for this, especially the use of Monte Carlo simulation on integrated models which include both time and cost uncertainty. These risk models take account of variability in planned values, also called â€Å"estimating uncertainty† (for example by replacing planned single-point estimates of duration or cost with three-point estimates or other distribution types), and they should also model the effect of discrete risks to reflect their assessed probability of occurrence and the subsequent impact on project time and/or cost. Both threats and opportunities should be addressed in the risk model, representing the possibility of exceeding or failing to meet the project plan. The results of the risk analysis allow the best case project outcome to be determined, representing the cheapest and. quickest way to reach project completion. Similarly a worst case profile can be produced, with highest cost and longest duration. All other possible outcomes are also calculated, allowing the â€Å"expected outcome† within this range to be identified. These can be shown as a set of three related S-curves, as in Figure below, which take account of both estimating uncertainty (variability in planned events) and discrete risks (both positive opportunities and negative threats). The ellipse at the end of the curves represents all possible calculated projects outcomes (90% confidence limit), with the top-right value showing worst-case (highest cost, longest schedule), the bottom-left giving best-case (cheapest and Quickest), and the centre of gravity of the ellipse being at the expected outcome of project cost and duration. The existence of this set of possible project outcomes raises the question of where the baseline spends profile for EVM should be set. The recommendation from a combined approach to EVM and RM is to use the expected value cumulative profile from a quantitative time-cost risk analysis as the baseline for BCWS. In other words, the central S-curve in Figure 2 would be used as the baseline instead of the S-curve in Figure 1. This ensures that the EVM baseline fully reflects the risk associated with the project plan (including an appropriate amount for contingency which is automatically incorporated in the risk analysis results), rather than measuring performance against the raw â€Å"all-goes-to-plan† plan. 2. Predicting future outcomes Both EVM and RM attempt to predict the future outcome of the project, based on information currently known about the project. For EVM this is achieved using calculated performance indices, with a range of formulae in use for calculating Estimate At Completion (EAC). Most of these formulae start with the Actual Cost of Work Performed to date (ACWP, or Actual Cost AC), and add the remaining budget adjusted to take account of performance to date (usually using the Cost Performance Index CPI, or using a combined Performance Efficiency Factor based on both CPI and SPI). These calculations of the Estimate To Complete (ETC) are used to extrapolate the ACWP plot for the remainder of the project to estimate where the project might finally end (EAC), as shown In Figure 3 below. RM predicts a range of possible futures by analyzing the combined effect of known risks and unknown uncertainty on the remainder of the project. When an integrated time-cost risk model is used, the result is a set of S-curves similar to Figure 2, but covering the uncompleted portion of the project, as In Figure 4. It is also possible to use risk nalysis results to show the effect of specific risks(threats or opportunities) on project performance as measured by earned value. Since the risk analysis includes both estimating uncertainty discrete risks, the model can be used to perform â€Å"what-if† scenario analysis showing the effect of addressing particular risks. 3. Evaluating risk process effectiveness A risk can be defined as â€Å"any uncertainty that, if it occurs, would have a positive or negative effect on achievement of one or more project objectives†. RM aims to address this uncertainty proactively in order to ensure that project objectives are achieved, including completing on time and within budget. As a result, if RM is fully effective, actual project performance should closely match the plan. Since EVM performance indices (CPI, SPI) measure deviation from plan, they can be used to indicate whether the risk process is being effective in addressing uncertainty and controlling its effects on project performance. If CPI and/or SPI are below 1.0 indicating that project performance is falling short of the plan, then one of the most likely underlying causes is that the risk process is failing to keep the project on course. An Ineffective risk process would fail to avoid adverse risks (threats) proactively, and when threats materialize into problems the project incurs delay and/or additional cost. Either the risk process is not identifying the threats, or it is not preventing them from occurring. In this situation, management attention should be directed to the risk process, to review its effectiveness and consider whether additional resources are required, or whether different techniques should be used. Conversely, if CPI and/or SPI are above 1.0 indicating that project performance is ahead of plan, the risk process should be focused on exploiting the opportunities created by this situation. Best-practice RM addresses both threats and opportunities, seeking to minimize threats and maximize opportunities. When EVM indicates that opportunities exist, the risk process should explore options to capture them and create additional benefits for the project. It should also be noted that if CPI and/or SPI far exceed 1.0, this may indicate other problems in the project and may not simply be due to the existence of opportunities. Typically, if actual performance is much greater than expected or planned, this could indicate poor planning or incorrect scoping when setting up the initial baseline plan. If this highly anomalous behavior continues, a baseline re-planning effort should be considered, which of course will involve the need for further risk management. Similarly if CPI and/or SPI are well below 1.0, this may not simply be due to the impact of unmanaged threats, but may indicate problems with the baseline plan or scope. Figure 5 illustrates the relationship between the values of EVM indices (CPI and/or SPI) and RM process effectiveness. The key to using EVM indices as indicators of RM effectiveness is to determine appropriate thresholds where action is required to refocus the risk process. Clearly some variation of EVM indices is to be expected as the project unfolds, and it would not be wise to modify the risk process in response to every small change in CPI /or SPI. However if a trend develops crosses the thresholds of â€Å"common variance†, action should be considered. Figure 6 illustrate this, with the thresholds of â€Å"common variance† for CPI /or SPI set at = 0.9 and =1.25. A further â€Å"warning threshold† is set at 0.75, suggesting that an adverse trend is developing and preparatory steps should be taken. The thresholds of 0.75, 0.9 and 1.25 used in Figure 6 are illustrative only, and organizations may be able to determine more appropriate threshold values by reviewing historical trend data for CPl and SPI, and identifying the limits of â€Å"common variance† for their projects. Plotting the trend of CPI and SPI over time against such thresholds also gives useful information on the type of risk exposure faced by the project at any given point. For example Figure 6 Indicates that the project schedule is under pressure (SPI trend is consistently below 1.0), suggesting that the risk process should focus on addressing sources of time risk. The figure also suggests that cost savings are possible which might create opportunities that can be exploited, and the risk process might be able to maximize these. These recommended action types are illustrated in Figure 7, corresponding to the following four situations: Both CPI and SPI high (top-right quadrant), creating opportunities to be captured Both CPI and SPI low (bottom-left quadrant), requiring aggressive action to address threats High SPI but low CPI (top-left quadrant), requiring focused attention to cost risk, with the possibility of spending additional time to address High CPI but low SPI (bottom-right quadrant), where attention should be paid to addressing schedule risk, and cost trade-offs can be considered Figure 7 also suggests that if either CPI or SPI (or both) remain abnormally high or low, the baseline plan should be re-examined to determine whether the initial scope was correct or whether underlying planning assumptions were unfounded. It is important to note that these action types should be viewed only as 1st options, since other considerations may lead to different actions. For example in projects with high schedule-constraints (e.g. product launch, event management etc), the trade-off between time cost may be prioritized differently than in cost-constrained projects. 3.3.4.3 Discussion Both Earned Value Management (EVM) and Risk Management (RM) seek to improve decision-making by providing a rational framework based on project performance. EVM examines past performance against clearly-defined quantitative metrics, and uses these to predict the future outcome for the project. RM looks ahead to identify and assess uncertainties with the potential to affect project performance either positively or negatively, and develops responses to address each risk proactively. Both techniques share a focus on project performance, and have the same purpose of developing effective actions to correct unwelcome trends in order to maximize the Likelihood of achieving project objectives. One (EVM) does this by looking back at past performance as an indicator of likely future performance. The other (RM) looks ahead at possible influences on future project outcomes. These two approaches are not in conflict or mutually exclusive. Indeed their commonalities imply a powerful synergy, which i s available through combining the complementary strengths of each technique and using insights from one to inform the application of the other (as summarized in Table 5). 1. Creating the baseline spend plan (BCWS/PV) Develop costed WBS to describe scope of work, without hidden contingency Produce fully costed and resourced project schedule Assess estimating uncertainty associated with initial time/cost estimates Perform risk identification, risk assessment and response development Quantify time and cost risk exposure for each risk, taking account of the effect of agreed responses Create integrated time/cost risk model from project schedule, reflecting both estimating uncertainty (via 3-point estimates) Select risk-based profile as baseline spend profile (BCWS/PV); it is most common to use the â€Å"expected values†, although some other confidence level may be selected (say 80%) 2. Predicting future outcomes (EAC) Record project progress and actual cost spent to date (ACWP), and calculate earned value (BCWP) Review initial time/cost estimates for activities not completed, to identify changes, including revised estimating uncertainty Update risk identification, assessment and quantification, to identify new risks and reassess existing risks Update integrated time/cost risk mode! with revised values for estimating uncertainty and discrete risks, taking account of progress to date and agreed risk responses Select risk-based calculation as estimate of final project duration and cost (EAC), using either â€Å"expected values†, or some other confidence level (say 80%) Use risk-based profile as updated expected spend from time-now to project completion 3. Evaluating risk management process effectiveness Determine threshold values for CPI and SPI to trigger corrective action in risk process (or use default values of 0.75, 0.90 and 1.25) Calculate earned value performance indices (CPI and SPI), plot trends and compare with thresholds Consider modifications to risk process if CPI and/or SPI cross thresholds, enhancing the process to tackle opportunities more effectively if CPI and/or SPI are high, or refocusing the process on threat reduction if they are low Take appropriate action either to exploit opportunities (high CPI/SPI), address threats (low CPI/SPI), spend contingency to recover time (high CPI/low SPI), or spend time to reduce cost drivers (high SPI/low CPI) Consider need to review initial baseline, project plan or scope if CPI and/or SPI persistently have unusually high or low value Table-5: Summary of steps to integrate EVM and RM http://support.sas.com/documentation/cdl/en/orpmug/59678/HTML/default/evm_sect3.htm http://www.tech-archive.net/Archive/Project/microsoft.public.project/2007-05/msg00594.html http://www.allpm.com/index.php?name=Newsfile=articlesid=2184 http://www.allpm.com/index.php?name=Newsfile=articlesid=2184theme=Printer http://www.freepatentsonline.com/4424121.html http://www.ustreas.gov/tigta/auditreports/reports/094602fr.html http://www.ustreas.gov/tigta/auditreports/reports/094602fr.html http://www.dcma.mil/communicator/spring_summer04/evm.cfm http://www.parm.com/index.php?option=com_contenttask=viewid=171Itemid=35 http://www.parm.com/index.php?option=com_contenttask=viewid=177Itemid=35 http://www.scribd.com/doc/4614499/Project-Performance-Measurement http://www.baz.com/kjordan/swse625/htm/tp-py.htm http://guidebook.dcma.mil/79/evhelp/what.htm http://www.acq.osd.mil/pm/faqs/evbasics.htm http://commdocs.house.gov/committees/bank/hba57680.000/hba57680_0.HTM http://www.allbusiness.com/management/risk-management/8945762-1.html http://www.parm.com/index.php?option=com_contenttask=viewid=171Itemid=35 http://www.bcs.org/server.php?show=ConWebDoc.5912 http://www.plannerlife.info/2007/07/what-is-earned-value.html http://evm.nasa.gov/tutoriala.html Earned Value Management (EVM) Tutorial http://glossary.tenrox.com/earned-value.htm http://support.sas.com/documentation/cdl/en/orpmug/59678/HTML/default/cpm_sect42.htm http://www.ombudsman.forces.gc.ca/rep-rap/sr-rs/sf-ts/rep-rap-02-eng.asp http://www.freepatentsonline.com/6006060.html http://www.pmi.org/Search/GenieRedirector.aspx?genieID=6685iss=1 http://www.pmi-cpm.org/pages/events/IPM06/Practice_Symposia.html http://edgar.sec.gov/about/oig/audit/337fin.htm http://www.scribd.com/doc/4614499/Project-Performance-Measurement http://www.acq.osd.mil/pm/faqs/evbasics.htm http://www.baz.com/kjordan/swse625/htm/tp-py.htm http://www.parm.com/index.php?option=com_contenttask=viewid=177Itemid=35 http://www.dcma.mil/communicator/spring_summer04/evm.cfm http://guidebook.dcma.mil/79/evhelp/what.htm

Wednesday, November 13, 2019

The Theme of Time in Slaughterhouse-Five Essay -- Slaughterhouse-Five

The Theme of Time in Slaughterhouse-Five Many writers in history have written science fiction novels and had great success with them, but only a few have been as enduring over time as Kurt Vonnegut's Slaughterhouse-Five. Slaughterhouse-Five is a personal novel which draws upon Vonnegut's experience's as a scout in World War Two, his capture and becoming a prisoner of war, and his witnessing of the fire bombing of Dresden in February of 1945 (the greatest man-caused massacre in history). The novel is about the life and times of a World War Two veteran named Billy Pilgrim. In Slaughterhouse-Five, Kurt Vonnegut uses structure and point of view to portray the theme that time is relative. The way Kurt Vonnegut structures Slaughterhouse-Five aids in the portrayal of the theme that time is relative. The novel is broke down into two parts: Vonnegut's story about the novel and the life story of Billy Pilgrim. The life story of Billy Pilgrim which is "presented as a series of episodes with no chronological order" . This mirrors the structure of the novel which has a beginning, middle, and end but not in there respective places. (Dawley 1) Billy states numerous times in the novel that he has become "unstuck in time" and that the time travel periods "aren't necessarily fun". (Vonnegut 23) While the reader never leaves the main plot line of the fire-bombing of Dresden for very long, Billy still travels alot. Billy "has seen his birth and death many times" and "all the events in between". (Vonnegut 23) The reader learns that "the things Billy Pilgrim" cannot change are "the past, the present, and the future". (Vonnegut 60) Many of the time warps are to his later-life as an opt ometrist. During his life as an optometrist he marries one o... ...y the good moments and bad as well that life brings to us. (Dunstan 1) Slaughterhouse-Five gives the reader insight on the meaning of life, time, and war. The thought of humans being able to view their lives moments concurrently and not linearly is erroneous to the reader, yet Kurt Vonnegut brings into the reader's head the idea of time being relative and only existing in human's imaginations. Works Cited ClassicNote. Insanity of war in Slaughterhouse-Five. 29 Jan 2001. http://www.gradesaver.com/ClassicNotes/Titles/slaughterhousefive/essays/insanitywar.html Dawley, Jason. The use of Fragmentation in Slaughterhouse-Five. 29 Jan 2001. http://www.geocities.com/hollywood/4953/kv_fragmentation.html>. Dunston, Brittany. Destruction of Dresden, destruction of Vonnegut's dream. 29 Jan 2001. Vonnegut, Kurt. Slaughterhouse-Five. New York:Dell, 1991. The Theme of Time in Slaughterhouse-Five Essay -- Slaughterhouse-Five The Theme of Time in Slaughterhouse-Five Many writers in history have written science fiction novels and had great success with them, but only a few have been as enduring over time as Kurt Vonnegut's Slaughterhouse-Five. Slaughterhouse-Five is a personal novel which draws upon Vonnegut's experience's as a scout in World War Two, his capture and becoming a prisoner of war, and his witnessing of the fire bombing of Dresden in February of 1945 (the greatest man-caused massacre in history). The novel is about the life and times of a World War Two veteran named Billy Pilgrim. In Slaughterhouse-Five, Kurt Vonnegut uses structure and point of view to portray the theme that time is relative. The way Kurt Vonnegut structures Slaughterhouse-Five aids in the portrayal of the theme that time is relative. The novel is broke down into two parts: Vonnegut's story about the novel and the life story of Billy Pilgrim. The life story of Billy Pilgrim which is "presented as a series of episodes with no chronological order" . This mirrors the structure of the novel which has a beginning, middle, and end but not in there respective places. (Dawley 1) Billy states numerous times in the novel that he has become "unstuck in time" and that the time travel periods "aren't necessarily fun". (Vonnegut 23) While the reader never leaves the main plot line of the fire-bombing of Dresden for very long, Billy still travels alot. Billy "has seen his birth and death many times" and "all the events in between". (Vonnegut 23) The reader learns that "the things Billy Pilgrim" cannot change are "the past, the present, and the future". (Vonnegut 60) Many of the time warps are to his later-life as an opt ometrist. During his life as an optometrist he marries one o... ...y the good moments and bad as well that life brings to us. (Dunstan 1) Slaughterhouse-Five gives the reader insight on the meaning of life, time, and war. The thought of humans being able to view their lives moments concurrently and not linearly is erroneous to the reader, yet Kurt Vonnegut brings into the reader's head the idea of time being relative and only existing in human's imaginations. Works Cited ClassicNote. Insanity of war in Slaughterhouse-Five. 29 Jan 2001. http://www.gradesaver.com/ClassicNotes/Titles/slaughterhousefive/essays/insanitywar.html Dawley, Jason. The use of Fragmentation in Slaughterhouse-Five. 29 Jan 2001. http://www.geocities.com/hollywood/4953/kv_fragmentation.html>. Dunston, Brittany. Destruction of Dresden, destruction of Vonnegut's dream. 29 Jan 2001. Vonnegut, Kurt. Slaughterhouse-Five. New York:Dell, 1991.

Monday, November 11, 2019

Christian Family Center School Essay

Domingo St. Barangay Holy Spirit, Quezon City is composed of Elementary and high school. Christian Family Center School Foundation uses manual way in operating their library. Library is regarded as the brain of any institute; many institutes understand the importance of the library to the growth of the institute and their esteem users (students). Library system that offers many flexible and convenient features, that allows librarians and library users to maximize time and efficiency. Library System gives the all detailed information about students, staff and books. It will track on the how many books available in library and books issued to the students. It shows popular book among the students. It will provide book lost in library. Library is derived from the old French â€Å"libraries† which means â€Å"a collection of book†. Reading materials in a school are stored in libraries. The Library is a place in which books and related materials are kept for use but not for sale. It is also organized for use and maintained by a public body, an institution or a private individual. In addition, it is a place in which we get information in different formats and from many sources. The library must be neat so that it is conducive for learning. It is the place where students and researchers go to in order to find all the questions to their queries and ultimately find answers. It is therefore the role of a librarian to keep the place as clean and as orderly as possible. It is also his duty to keep safe all information related to library transactions like the ins and outs of books. Statement of the Problem Based on the conducted interview and observations, the group had come up with the following problems being encountered by the project. The study seeks to answer the following problems: 1. They spend more time in recording the inventory of the books and also in recording the transactions of borrowing. 2. Possible of losing the records. 3. The authorized person exerts more effort in this manual ways. 4. The records are unorganized. Objectives of the Study The following are the objectives aimed by the researchers to create a useful Library Management System to the proponents, Christian Family Center School Foundation. 1. To be able to develop a system that helps the school library to secure the information/data inputted. Only the authorized person can access the system. 2. To be able to minimize the time and effort of the person who is in charge in searching books. 3. To be able to minimize the possibility of losing the data. 4. To be able to have an organized data in library. Scope and Limitations The scope of the program is you can easily record the books being barrowed by the students. It also has a very user-friendly interface. Thus the users will feel very easy to work on it. The software provides accuracy along with a pleasant interface. Make the present manual system more interactive, speedy and user friendly. The transaction reports of the system can be retried as and when required. Thus, there is no delay in the availability of any information, whatever needed, can be captured very quickly and easily. Although this proposed system benefits the users, it also has its limitations. First the system is connected into a network. Only one can computer at a time can access the system. Second, the person that can access the system is limited (Librarian/Staff). Significance of the Study This IT project intends to provide an accurate and effective Library Management System which will benefit the following: Librarian/Staff, the librarian handles the monitoring of information in the library. It will lessen the time, enhance the level of work, help its processes more reliable and efficient, and provide accuracy and security of data information. Students, students can borrow and return books in the library. It will make the process of borrowing and returning books easier. CHAPTER 2 REVIEW OF RELATED LITERATURE AND STUDY This chapter presents the related literature and studies, local and foreign, that gives bearing to the present study. Local Literature According to Malnig (1991), online research began more than 25 years ago with convoluted and cumbersome searches through Dialog. Operational long before the common place use of the internet, the EarMest Dialog system was completed in 1996. It was world’s first online information retrieval system to be used globally with materially significant databases and for the use in libraries. However, it was said that it has a more technical interface than the newer versions on online libraries, and the manual library system. Biggs and Biggs (1987) conducted a survey of the heads of academic library reference services to examine the collection development for the study titled â€Å"Reference Collection Development in Academic Libraries: Report of a Survey†. It was found that selection and weeding were not guided by any written policy and studies of use of collection were missing. Authors concluded that online sources were important factors in selection. Harloe and Budd (1994) in â€Å"Collection Development and Scholary Communication in the Era of Electronic Access† examined the relationship between collection development and system of scholarly communication in academic library. They discussed on ownership verses access to information and presented strategies for collection development in electronic networked system. Sridhar (1995) wrote an article named â€Å"Problems of Collection Development in Special Libraries†. He explored the various factors affecting collection development in special libraries and highlighted the significance of collection development policy manual. Author pointed out the various problems related to document selection and procurement. Andrade and Vergueiro (1996) also wrote an article under title â€Å"Collection Development in Academic Libraries: A Brazilian Library’s Experience†. The article is based on the collection development practices of a Brazilian academic library. Authors outlined the different models of collection development given by professionals. Haider (1996) in his paper â€Å"Acquisition and Collection Development in Pakistan† analyzed the constraints faced by Pakistani libraries in the procurement of books from abroad. Lack of proper management, absence of competent personnel, non-existence of acquisition policy statements, non-existence of selection aids, ever shrinking library budgets, fluctuating rate of the rupee, inflation, import policy, trade embargoes against some countries, fiscal policy etc. were the major hurdles found. Foreign Literature According to Britannica Online (2010), the word library derives from Latin â€Å"Liber†, which means â€Å"The Book†. The origin of libraries dates back around 3rd century B. C in Babylonia, where keep written records which has been part of their history. The first libraries as a collection of books were evidenced in Greek temples and those established in conjunction with Greek schools and philosophy in 4th century B. C modern libraries usually contain periodicals, microfilms, tapes, videos, compact discs, and other materials in addition to books. Dewey (1992), as cited by Pasilan (2000) defines in integrated library system as the one that bring together numerous library task into one system. It allows the library to have a direct on its automation with a great efficiency. It also allows the user to use the library data for the acquisition, cataloging and circulation of library collections. Hoffer, Prescott and McFadden (2002) defines a database as an organized collection of related data. They also defined data as known facts that are recorded and stored on a computer system are structured to be easily stored, manipulated, queried and retrieved by data users. Thornton (2000) â€Å"Impact of Electronic Resources on Collection Development, the Roles of Librarians, and Library Consortia†. Study was conducted to find the impact of electronic resources and the Internet on collection development and discuss the changing role of librarians, library co-operation and collection development. It had been concluded that consortia will become more important sources in electronic information world. Pandita (2004) in her paper â€Å"Collection Development in the Digital Era† examined the impact of electronic format on the collection development. She pointed out that the policy of content development needs to be worked out and re-designed. Mandal and Panda (2005) in their research paper titled â€Å"Collection Development in the Internet Age and the Need for a Consortium in the Engineering College Libraries in West Bengal: A Study† discussed the different dimensions of collection development. The existing state of library collection and infrastructural facilities of 17 engineering college libraries in West Bengal were examined. Author suggested the staff training, provision of adequate staff and funds, appropriate infrastructure in IT and a need based collection. Mulla and Chandrashekara (2006) â€Å"E-Resources and Services in Engineering College Libraries – A Case Study†. Study was conducted to examine the efforts made by the engineering college libraries in Karnataka to build electronic resources. Results of the study revealed that collection and service infrastructure of the libraries in sampled regions were not up to the mark and libraries were struggling to build digital collection and in disseminating digital information due to lack of ICT infrastructure, IT trained manpower and paucity of finances, etc. Adekanmbi and Boadi (2008) in study titled, â€Å"Problems of Developing Library Collections: A Study of Colleges of Education Libraries in Botswana† ascertained the availability and use of collection development policies in the college of education libraries, in Botswana. In addition to using questionnaires, interviews were conducted to gather information from senior librarians, deputy principals of colleges and board of the affiliated institutions of the University of Botswana. Study brought to notice that majority of the libraries did not have collection development policies. Lack of constant training for librarians, inadequate staff, lack of support from administration and unavailability of collection development policies were some of the major problems found. It was further found that majority of the libraries did not involve their users in formulation of policies and did not implement these for collection development. Study revealed the need to train librarians on collection development. Mary and Sankar (2008) â€Å"Collection Evaluation of PSN College of Engineering and Technology Library and PET Engineering College Library in Tirunelveli District†. Authors described the various techniques of evaluating the document collection in academic libraries and evaluated the collection development practices of two engineering colleges. Sharma et al. (2008) evaluated the collection development in libraries of 38 engineering colleges of Orissa under title â€Å"Collection Management of Engineering College Libraries of Orissa: An Evaluative Study†. Information was collected from libraries using questionnaires. Study concluded that  growing dissatisfaction of the users arising from non-availability of needed documents and lack of provision of services could be boiled down to some extent, by rendering at least CAS or current contents or information about latest addition to users. Mallaiah and Gowda (2009) in paper â€Å"Collection Development in Mangalore University Library: A User Study† discussed the usefulness of collection development in a university library and attempted to find whether the UGC-INFONET E-journals were meeting the users information needs. Local Study The developments in information environments implies that new collection development policies need to be revised from time to time to ensure access to a wider range of e-documents and e-databases. These policies should give more emphasis on licensing agreements, copyrights, intellectual access, the mode of payment, subscription costs and archiving. A number of attempts have been made by the university libraries and academic institutions to develop collection development policies. Suzanne D Gyesley (2001) reported that the escalating price and rapid growth in electronic journal databases along with traditional print subscriptions and monographs forced library administrators and collection development librarians to make decisions between printed products or electronic formats in the new millennium. A separate study was conducted at A&M University libraries, Texas, USA in the disciplines of political science and economics to compare the annual subscription prices and percentage increase of 203 core printed journals with their electronic counterparts during 1998-2000 academic years. The electronic use statistics were examined for the expensive serials based on the number of hits by the users. Based on this study he reported that libraries were forced to pay for dual subscriptions both for paper and in electronic form. It also revealed that faculty and students were satisfied with the use of e-journals. It also indicated a trend that libraries would switch to electronic format if the price of electronic journals dropped. Considering the question of what the present collection of libraries mean to the user in the current information environment. Collection analysis techniques educate and support the new library staff about collection and provide better data to determine collection development priorities for budget planning. It helps librarians to assist their patron’s search for information. The collection was evaluated using online analysis tools. Topics covered are about the importance of e-book collections, faculty participation in the selection for more balanced and comprehensive collection management plan. Their article lists out the benefits of conducting collection analysis. It revealed that collection analysis has a positive impact on collection development and management. Findings inferred from this study suggest that access to the collection were improved and some problems encountered with a particular collection were identified. Foreign Study Mukherjee (1965) carried out a study titled, â€Å"Library Facilities in Training Colleges of India† to assess the prevalent position of 50 teacher training college libraries. Questionnaire was used as data collection tool. Study revealed that majority of libraries did not have sufficient space for proper functioning. Some of teacher training colleges did not have their own libraries. Staff and students depended on the university libraries to which education section was attached. Naidu (1981) in his research paper, â€Å"College Libraries in Andhra Pradesh: With Special Reference to Andhra University† attempted to find the causes leading to unhappy situation of libraries. Author disclosed the gloomy picture of college libraries and suggested to lay down some norms and standards for college libraries by inspection commission of each university. He further suggested that at least 6% of the college budget should be spent on library. Author emphasized the need to give initiation to users in the beginning of each academic year. In an article titled â€Å"A Survey of College Libraries in West Godavari District† Raju (1984) explored the prevailing position of libraries of 18 colleges affiliated to Andhra University, Waltair. Various facets of libraries i. e. library staff, building, collection, book banks, budget and technical services, etc have been examined. Financial sources were found inadequate. DDC and AACR-I were popular among libraries. Survey revealed the immediate need to improve the services to meet information needs of students, teachers and research scholars. Kumbar (1986) took up a study named â€Å"College Libraries under ulbarga University Area: A Survey. † He assessed the existing situation and status of 54 colleges libraries. Besides using questionnaires, interviews were also conducted to collect data. Only one librarian possessed master’s degree in Library Science. Survey represented a disappointing picture of libraries as only 12 libraries had their own buildings. Libraries were spending more funds on books and comparatively less on periodicals. Library services were not found satisfactory. It was found that more than 50% libraries brought out annual reports. Jasmer Singh (1990) carried out research for doctorate degree on the topic â€Å"College Libraries in Punjab: A Statistical Analysis of the Problems† He conducted a survey to find the problems being faced by college libraries of Punjab and Chandigarh and also attempted to study the use of libraries. He covered 210 colleges under study, including five colleges of education also. Questionnaire-I was used to know about the prevalent position of libraries and problems being faced by librarians in managing these. Two separate questionnaires were used to know the opinions of students and teachers about their respective libraries. Bajpai (1995) in research paper â€Å"Evaluation of College Library Services in Delhi† assessed the services of college libraries in Delhi and identified their problems. He brought forward that librarians often found it difficult to deal with teaching and non-teaching staff members regarding return of books. For this, library rules existed only on paper and were not being implemented properly. Chopra (1995) revealed the problems being faced by college libraries of Punjab in his article titled â€Å"College Libraries in Punjab: Some Problems Re-Considered†. Article is based on the personal observations of the author. He grouped these problems into three parts i. e. problems related to the management of colleges, problems concerned with principals of colleges and finally those related to library staff. Shortage of staff, inadequate funds, physical facilities, circulation of books, stock verifications and library hours etc. were the facets discussed in paper. Martin (1976) in his article â€Å"User Studies and Library Planning† discussed the user studies and appraised their role in library planning. Author provided various guidelines for conducting user studies and concluded that user data strengthens the planning and decision-making processes at several levels, so the responses of users should be an integral part of the ongoing practice of librarians, providing constant feedback. Coker (1993) has written a useful article titled â€Å"Libraries Verses Users? How and How Not to Deter Library Users†. Author examined the various factors influencing the  attitude of users towards libraries and also took into consideration the socioeconomic, technological, physical/technical and psychological/ emotional conditions shaping up the perceptions of non users, inhibit users and potential users. Wildemuth (2003) in article titled â€Å"Why Conduct User Studies? The Role of Empirical Evidence in Improving the Practice of Librarianship† emphasized that by gathering evidences about library users, their interactions with library services and materials and context in which those materials and services are used, librarians can make sound decisions for the future. Author discussed on the methodology for conducting user studies and utilization of results as basis for decision making. Carr (2006) â€Å"What Users Want: An Academic ‘Hybrid’ Library Perspective†. Author described the development of user centered approach in academic libraries over the recent decades. He wrote that largely unquestioned ‘user get what we give them’ attitude was being transformed into ‘what do users want? ’ approach. The failure to take what users want into account would leave academic library high and dry in the desert of lost opportunities. Definition of Terms Used in the Case Study. 1. Library – is derived from the old French â€Å"libraries† which means â€Å"a collection of book†. 2. Librarian – the person who is in charged in the library. 3. Computer – is composed of the hardware, software and people. 4. Book – reading material. 5. Staff – the assistant of the librarian. CHAPTER 3 THE EXISTING SYSTEM The diagrams below represent the flow of the existing system of Christian Family Center School Foundation Library System. It shows also the Equipments and Software used. Context Level Data Flow Diagram of Christian Family Center School Foundation Library System. Diagram 0 – Next Level of Christian Family Center School Foundation Library System Level 1Diagram Showing the Decomposition of Process 2. 0 from the Level 0 Diagram Status AvailableBook Book Information Details of Books Student Receipt Equipment Currently Used, Specifications, and Cost The table below shows the Equipment and Currently Used, Specifications, and Cost of the Existing System. OFFICE SUPPLIES QUANTITY UNIT PRICE TOTAL Ball pen / pencil 15 10. 00 150. 00 Log Book 2 54. 75 109. 50 Paper Pack 5 75. 00 375. 00 Envelope 26 4. 25 110. 50 Stapler 1 85. 25 85. 25 Total: 830. 25 FURNITURE AND EQUIPMENT. COST VALUE TOTAL Computer Package 26,975. 00 1 26,975. 00 Filling Cabinet 1,568. 00 1 1,568. 00 Electric Fan 800. 00 4 3200. 00 Chairs 280. 00 48 13,440. 00 Tables 850. 00 8 6,500. 00 Total: 51,683. 00 Software Currently Used and Cost The table below shows the Software Currently Used and Cost. SOFTWARE COST TOTAL Windows 7 1000. 00 1000. 00 Microsoft Office 2000. 00 2000. 00 Total: 3000. 00 CHAPTER 4 THE PROPOSED SYSTEM Methods of Research Used The proponents used RAD method by planning the requirements for the system and meet to assign the own task of the members of the proponents. The proponents give a date for deadline where the proponents will meet for the easier and fast way, the proponents talk through internet to compile their assigned task and finished the system. Data Gathering Instruments Interview is defined as a meeting to people face to face to cinfer about something or an act of a questioning to receive a desired answer that is necessary in solving a specific problem. Interview benefits the researches in the sense that this will be used in gathering facts. The interviews will be conducted on the July 12, 2014 and to that respondent who uses the system directly. The diagrams below represent the flow of the proposed system of Christian Family Center School Foundation Library System. Level 1 Context Level Data Flow Diagram of Christian Family Center School Foundation Library System Level 1 Diagram 0 – Next Level of Christian Family Center School Foundation Library System Level 1 Diagram Showing Decomposition of Process 1. 0 from the Level 1 Diagram 0 Program Flowchart Equipment Currently Used, Specifications, and Cost The table below shows the Equipment and Currently Used, Specifications, and Cost of the Existing System. OFFICE SUPPLIES QUANTITY UNIT PRICE TOTAL Ball pen / pencil 15 10. 00 150. 00 Log Book 2 54. 75 109. 50 Paper Pack 5 75. 00 375. 00 Envelope 26 4. 25 110. 50 Stapler 1 85. 25 85. 25 Total: 830. 25 FURNITURE AND EQUIPMENT COST VALUE TOTAL Computer Package 26,975. 00 1 26,975. 00 Filling Cabinet 1,568. 00 1 1,568. 00 Total: 28,543. 00 Software Currently Used and Cost The table below shows the Software Currently Used and Cost. SOFTWARE COST TOTAL Windows 7 1000. 00 1000. 00 Microsoft Office 2000. 00 2000. 00 Microsoft Visual Basic 2010 Express 1000. 00 1000. 00 Total: 4000. 00.

Saturday, November 9, 2019

Two Years are Better than Four Essays

Two Years are Better than Four Essays Two Years are Better than Four Paper Two Years are Better than Four Paper In the essay â€Å"Two Years Are Better Than Four, author Liz Addison declares that Rick Perlstein and friends say college is not mattered, is coming to an end. As Liz does, as a college student I also swiftly, disagree with them, college’s experience shows me, that I can learn in a quick matter of time, with less money, and move on my life with my head full of knowledge ready to work. And perhaps move forward to a higher level. I feel nowadays, many university students tend to quit school; they are full of debts without jobs, they thought maybe they are wasting their time. I know this because I have an older brother who is attending Sacramento State, who is having to take out loans, accepting the fact, he may be in debt for some time. Yet he strides to work his very best, in school movativing me todo the same as well. I think, going to college is a halting place to go through before university; and it is a smarter way of thinking to do so. A short summarize of the content wi ll show how college is a matter. First, community college gives a chance to everyone who wants to follow their dreams to do so. In addition, the door is open to everybody without any social range or economic, a low-income person will be welcome in college. As an example, I intend to be a correctional officer, yet I chose college to study the first levels, have a degree, find a job and later seek admission to the university. I strongly agree with the state that Liz borrows from Thomas Jefferson, â€Å" Everybody should have an education proportional to their life†. Unfortunately, the average income between rich and poor in America is not accurate, everyones supposed to become somebody in life; college gives opportunity to everyone who wants to do so, to become whatever they want, and at any age with a low cost. I still say Perlstein is wrong, as much as the income level between rich and poor in America stays unbalanced; college will always be there to gives an opp

Wednesday, November 6, 2019

Free Essays on Time Capsule

We are a society that is on the go, we try to do more in less time, and we want it â€Å"now.† The 21st century has been labeled by some as the century of â€Å"Instant Gratification.† As a result, technology has developed by leaps and bounds, to satisfy our growing need for wanting what we want, when we want it. If I were asked to name three items to place in a time capsule that would best represent the 21st century I would select a microwave, a computer, and a VCR (Video Cassette Recorder). I feel a microwave best represents the 21st century because it fits perfectly into our â€Å"on the go† lifestyles. It is easy to use, takes less time, and is safer than conventional cooking. With a few basic rules and directions, even our children can use a microwave. All it takes is a couple of minutes, and a few taps on the keys, and then anyone can have a hot meal. The microwave has become the new kitchen marvel. I would also include a computer because a computer gives us the opportunity to do more in less time. For example, computers can figure out simple and complex math problems, quickly and effectively. Computers can also point out our mistakes in writing, so that we can make corrections quicker and with less mess. Our children enjoy learning through games available in learning software. This frees up adults’ time to accomplish other tasks, and the children seem to learn quicker when they are enjoying themselves. Without computers we would not be able to tap into the wealth of knowledge available on the Internet. We enjoy sharing our knowledge with one another, and we can communicate in a flash with the use of instant messaging and e-mail. Lastly, I would include a VCR because humans love stories and the VCR reinforces our desires of â€Å"Instant Gratification.† The human race has always been storytellers, whether the stories are real, make believe, new or old. In the 21st Century, we have many ways to convey our stor... Free Essays on Time Capsule Free Essays on Time Capsule We are a society that is on the go, we try to do more in less time, and we want it â€Å"now.† The 21st century has been labeled by some as the century of â€Å"Instant Gratification.† As a result, technology has developed by leaps and bounds, to satisfy our growing need for wanting what we want, when we want it. If I were asked to name three items to place in a time capsule that would best represent the 21st century I would select a microwave, a computer, and a VCR (Video Cassette Recorder). I feel a microwave best represents the 21st century because it fits perfectly into our â€Å"on the go† lifestyles. It is easy to use, takes less time, and is safer than conventional cooking. With a few basic rules and directions, even our children can use a microwave. All it takes is a couple of minutes, and a few taps on the keys, and then anyone can have a hot meal. The microwave has become the new kitchen marvel. I would also include a computer because a computer gives us the opportunity to do more in less time. For example, computers can figure out simple and complex math problems, quickly and effectively. Computers can also point out our mistakes in writing, so that we can make corrections quicker and with less mess. Our children enjoy learning through games available in learning software. This frees up adults’ time to accomplish other tasks, and the children seem to learn quicker when they are enjoying themselves. Without computers we would not be able to tap into the wealth of knowledge available on the Internet. We enjoy sharing our knowledge with one another, and we can communicate in a flash with the use of instant messaging and e-mail. Lastly, I would include a VCR because humans love stories and the VCR reinforces our desires of â€Å"Instant Gratification.† The human race has always been storytellers, whether the stories are real, make believe, new or old. In the 21st Century, we have many ways to convey our stor...

Monday, November 4, 2019

How does the promotion strategy effect the customer purchase Dissertation

How does the promotion strategy effect the customer purchase - Dissertation Example This was a qualitative study based on primary data collection through questionnaire. The objectives of the study have been achieved. The study finds that advertising has a long-term orientation while other elements of the promotion mix, such as sales promotion, publicity and interactive promotions have an immediate impact resulting in consumer purchase. Sales promotion initiatives such as free offers and coupons tend to draw consumers instantly. Online marketing through social media platforms fetch tremendous publicity. These build awareness which, with further constant promotions can give rise to interest and desire to purchase the brand. Thus, promotions first create a brand perception on the minds of the consumers and then gradually turn them into consumers. However, there cannot be a set strategy applicable to all companies or products and services. The study concludes by highlighting the limitations and making recommendations for further research on the subject. Table of Content s Chapter I Introduction 1.1 Background 1 1.2 Purpose of the Study 3 1.3 Research Aims & Objectives 4 1.4 Research Question 4 1.5 Structure of the Study 4 Chapter II Literature Review 2.1 Definition of Promotion Strategy 6 2.2 Importance 7 2.3 Successful Promotion Strategy 8 2.4 Other effect on Customer Purchase 9 2.5 Relationship between promotion strategy and customer purchase 10 2.6 Conclusion 11 Chapter III Methodology 3.1 Research Philosophy 12 3.2 Research Approach 12 3.3 Research Design 13 3.4 Data Collection 15 3.5 Data Analysis 16 3.6 Validity & Reliability 16 3.7 Ethical Considerations 17 Chapter IV Findings and Discussions 4.1 Chapter Overview 19 4.2 Findings 19 4.3 Discussions 27 Chapter V Conclusion and Recommendations 5.1 Conclusion 33 5.2 Limitations 35 5.3 Recommendation for further research on the subject 35 Reference 37 Appendix 40 Charts & Tables Chart 4.1 Do you play League of Legends? 19 Chart 4.2 How often do you play LoL? 20 Chart 4.3 LoL is better than Defens e of The Ancients 21 Chart 4.4 IPL 5 is better than LoL 2012 21 Chart 4.5 Fan of Facebook page of LoL 22 Chart 4.6 Reasons for watching LoL 2012 (season 2) 23 Chart 4.7 Option to buy Riot Points 24 Chart 4.8 Riot Points or Play up the Levels 24 Chart 4.9 Reasons for buying the Riot Points 25 Chart 4.10 Play only with Free Riot Points 25 Chart 4.11 Attraction of New Champion Skins 26 Chart 4.12 Source of LoL Costume 26 Chart 4.13 Use of Costume 27 Chapter I Introduction 1.1 Background An effective marketing strategy is based on identification of the target audience and then identifying means to influence this target segment. Marketers usually build upon existing standard strategies adopted by others. However, standard strategy such as celebrity endorsement is no more sufficient to entice the customer. Consumers today can choose where, when and how they engage with a brand and they prefer to do so online (Launchfire Interactive, 2008). They respect innovative marketing programs that v alue their customers as partners, and that rewards them for their interest and engagement. This consumer demand and consumer consciousness has resulted in the emergence of a new marketing mix element – interactive promotions. Launchfire Interactive cites of a study by Borrell Associates which forecast that expenditure on interactive promo

Saturday, November 2, 2019

Management thories Essay Example | Topics and Well Written Essays - 3000 words

Management thories - Essay Example This research will explore the contribution of Hofestede to our understanding of the effect of culture to international management practices of organisations. Through utilisation of a huge database of statistics on culture, Hofestede managed to come up with an analysis of the patterns describing the similarities and differences of cultures in five main dimensions. His research focused only on international business managers, which enabled him to come up with a true picture of how culture influences management of international organisations. These five dimensions include power distance, individualism, masculinity, uncertainty and long-term orientation (Smith, Peterson & Schwartz 2002, p. 235). Power distance refers to the level of inequality that prevails among people (Smith, Dugan & Trompenaars 1996, p. 241). This inequality is acceptable by all people, both those with power and those without power. A high power distance society accepts inequality in the distribution of power and the members have a good understanding of their position in the system. With a low power distance society, there are an equal sharing of power and a high dispersion of power. The members in a low power society consider themselves equal. This idea means that in a high power nation such as Malaysia, reports will only reach the topmost managers who will hold meetings in a closed room with only the presence of powerful leaders (Smith, Dugan & Trompenaars 1996, p. 246). Individualism is a reflection of the strength of the relationships possessed by the people concerning others in the entire community. A high level of individualism means that there are no tight connections among them. It also means that there is a low degree of sharing of responsibilities except for family members that can only include the few closest friends. On the other hand, in a society where individualism is low, there is