Wednesday, October 30, 2019

Federalism As a System of Government Essay Example | Topics and Well Written Essays - 1000 words

Federalism As a System of Government - Essay Example The present research has identified that federalism promotes diversity in the system by allowing states and provinces to devise their own policies in matters related to public welfare such as education, health, and agriculture whereas at the same time it also ensures the unity among the various units of the states by giving the national responsibilities like currency, foreign affairs and defense to the central government. Federalism creates a very healthy political environment in the country which ensures political activity at the grass root level as well because the system of provincial and the system of local governments directly involve people in political activity. In this way people get to know about correct policy making and various policies can be tested in the country at the same time; better political grooming ensures better political leaders as well. Due to the disintegration of powers to various systems of governments reaching the grass root level through local and provinc ial governments, federalism provides a system in which good governance can be ensured. Each government has its own responsibility, federal government is responsible for the security of the country, provincial governments are responsible for the welfare of the public whereas local governments are responsible for providing services to the public; in this way the duties are divided and governments can work with greater efficiency and their performance is greatly enhanced. ... Federalism has turned out to be a very successful system of government however it has certain disadvantages as well. It allows certain disorderly members of the society to manipulate laws of taxation on various different commodities by purchasing and using them in different states because the government cannot impose tax or duty on interprovincial transfer of goods. The diversity in other laws which include laws related to criminal offense also allows the wrongdoers to escape punishment by moving to another state where the offense is not punishable under law. The laws related to social contract like marriage and inheritance are also exploited by people due to diversity among them in provinces and states. In certain situations the system of federal government allows interstate conflict to occur because certain projects related to natural resources and infrastructure which are beneficial for one state can affect people and the interests of any other state, in such a situation a riv alry between the states is promoted and thus the spirit of nationalism is greatly damaged. Federalism very often leads to disputes between states over the division of resources and responsibilities among the states. The federal system of government with its all system of governments is economically very costly to support because there is a large number of elected representatives and officials in the government which are salaried by tax money (Freely and Rubin). The presence of three parallel systems of government also creates complexity in the governance. The federal government is always biased towards one or another province because of the inherent attachment with a political party and thus in certain areas of governance where the provinces and

Monday, October 28, 2019

The World That We Live in Essay Example for Free

The World That We Live in Essay Not long ago the law of the jungle prevailed â€Å"kill or be killed†. Barbarism was at its heinous best. Darwin’s theory of â€Å"survival of the fittest† was apt for those times. The smaller animals were at the mercy of the bigger ones and the latter were at the mercy of the biggest and so on. Evolution continued and finally we are today at a position of being called the ultramodern man who has lots and lots of knowledge and education, robots and gadgets to assist him. He has every comfort that one can think of ! He can traverse the longest of distances in minutes, view matches and ceremonies being conducted thousands of kilometres away in his bedroom and so on because the list seems endless. But I have a serious concern†¦.i sometimes wonder whether we are still in the same precarious situation as our ancestors were? Is there any similarity between those times and the era that we live in? And my answer would unfortunately be â€Å"yes†. I have come to the conclusion after long hours of brainstorming and analysis. There is ample proof of this in our daily newspapers and television’s breaking news! How else do you justify the acts of crime and violence in the name of sex, caste, religion, panchs, fatwas, state, country, political parties etc. Hooliganism in any form for any cause should not be tolerated but it is being given wings to fly in our present day society. Everyday we have some slogans by our leaders (religious and political) which vent venom at somebody else and we are misguided. Everyday a son kills his parents or a girl is tortured for dowry. Everyday we find a minister being charged of fund misappropriation worth many crores. Everyday there are stories of gang war and shootouts for â€Å"supari†. We are living in a very dangerous era where this ugly problem is gathering tremendous momentum as it is sliding downhill and is threatening to wipe out the very progress made by man since existence. Hence I am very scared as a child. My fear is will man destroy himself? Will this world come to an end because of man’s inner insecurity and his own undoing? What is the need to develop nuclear warfare? What is the need to spread religious hatred and communal disharmony? Can’t we live in peace and harmony with a sense of eternal brotherhood? I pray god almighty to make every human sane enough to understand the motto of life and to lead it peacefully with love for others. Life is precious. We have made enough progress and we are making too. So let us not destroy ourselves,  rather live together and make this world a better place to live in.

Saturday, October 26, 2019

Spanish & English Superpowers of America :: essays research papers fc

Spanish & English Super Power's in America Ultimately, their stronger unified cultural need to establish their dominance in another land is the most important reasons for the foothold established by the English and the Spanish in the New World. It is true that a plethora of different races, ethnic groups, nationalities, and cultures arrived on the North American soil prior to 1776, the year that America began its process of embarking upon its independence, of officially becoming the independent country of United States of America. This begs the question of why did the Spanish (and Spanish Americans) and later primarily the English (and English Americans) become the dominant ethnic groups in the New World, and not the other nations that established settlements, for instance, perchance, the Dutch? This paper will argue that the predominant historical evidence, as discussed in The Ethnic Dimension in American History and Major Problems in American Immigration and Ethnic History as well as American Mosaic and the text Out of Many suggests that the reason for this dominance was twofold. First of all, Spanish and the English dominated the seas and the land, militarily, in the way that other European nations such as the French did not. English settlers in particular had religious as well as economic reasons for developing a cultural and sociological grip as well as an economic support in the new nation. The fact that the British and Spanish nations were both more unified, had more mercantile capitol support, and were technically more advanced than their rivals, particularly on the seas, coupled with their greater need to establish settlements in the new land to ensure their dominance. It is tempting to view the English dominance purely as a product of military might, of course. But while this undoubtedly played a factor in the domination of the English and the Spanish, ultimately the reasons for British and Spanish were more cultural than purely military or technological, this essay will argue. On a level of military technology the English in particular exercised military dominion, winning what came to be known as ‘Prince Phillips War,’ defeating Native American alliance against the New England colonists. The British also later dominated France and the still existing strong Native American tribes in what came to be known as ‘King William’s War’ in 1689. In May of 1702, England declared war on France after the death of the King of Spain, Charles II, to stop the union of France and Spain.

Thursday, October 24, 2019

Exploring Ethnic Minority Psychology in America Essay -- racism, divers

Reflecting on and changing the face of ethnic minority psychology is very important in today’s society. Race, ethnicity, culture and diversity are pressing societal issues that have existed for several years. Many people face issues everyday with their identity, which is the sense of self being independent of one’s ethnic background; empowering it and then transforming it; whether transforming is for the good or for the bad. People in our society, mainly our youth, have to deal with the pressures of being talked about when it comes down to what race they are, how many freckles they have or their face, how short or tall they are, their size as well as various other things. Interpersonal relationships are considered to have a bidirectional influence as well and can be captured in the saying â€Å"What goes around comes around†. It may not make matters the best, but for that moment, just thinking about the statement makes matters the best at the given time. De mographic changes such as darkening the complexion of America, is forcing psychology to address the needs of growing ethnic minority populations. Reflecting on these issues, dealing with the pressures of facing the different identities and such, different behaviors start to flare up. In this case, it is assumed that superiority humor theory should be used. This theory, having more to do with social groups, social status, social roles, and of course, humor is directed at individuals in positions of power rather than the targeting of the already vulnerable groups. Separating superiority theory from coping or arousal forms is advised. Humor serves as a number of important social functions in interpersonal communication, but it also contradicts remarks saying that there is no ... ...mental health professional, the church may be an important place to go and seek counseling for the issues they may be dealing with at that given time. So who is someone not to be who they are because someone does not like the way they look or the way they talk? It doesn’t matter because you, just like them, are a child of the earth. You do not have to change yourself for anyone because they feel insecure around you. They are not going to admit it but, but everyone goes through it at some time. In conclusion, if one would be willing to have an open mind and accept that the different cultures are united as one in a sense and are here on earth to stay living life would be somewhat peaceful. In spite of the cultural differences we are human and deserve to be treated as such. We had nothing to do with our own creation someone greater was in control.

Wednesday, October 23, 2019

Creating a Storyboard Essay

Assignment Your assignment is to work collaboratively to transform a section of a printed text into a storyboard. You will also include a written explanation of the intended effects of your cinematic choices. Steps Planning 1. Revisit a short story from this unit that you could imagine as a film. As a group, select a small passage to transform into a storyboard of at least 20 shots. You will not be able to capture the entire story in your storyboard; choose a compelling section that contains many visual elements. 2. As director, decide how you would like to show your version of this text and the effect you want it to have on your audience. Present your ideas to your group, and reach a consensus about your focus. Drafting 3. Brainstorm a sequence of shots. Consider framing, camera movement, lighting, sound, and editing in each shot. Use sticky notes to sketch out or describe each shot on the Storyboard Graphic Organizer. Be sure to consider the effect you are trying to create with each shot and the words or phrases that communicate your vision. Share this draft within your small group. Even if you plan photographs for your final draft, you should sketch what your photos will look like for this first draft. Decide how to share the responsibilities of producing each element of the storyboard. Create a draft. Refining 4. As a group, share your ideas with another group. Solicit feedback on †¢ Clear sequence of ideas †¢ Effective use of cinematic techniques in relation to the story †¢ Accurate identification and application of cinematic techniques Use the notes generated during the peer group discussion, and revise your storyboard. Add an explanation of the intended effect of your choices. Be specific in terms of your framing, lighting, sound, and other choices, and be sure that your effect is consistent with your cinematic choices. Support your explanation with textual evidence from the short story. Revising and Editing for Publication 5. Prepare your final draft. Choose a presentation method, such as mounting your frames onto poster board or creating a slide show. Label each frame with all the information required (shot type, angle, lighting, and sound), including intended effect of each shot.

Tuesday, October 22, 2019

The Brenner Debate

The Brenner Debate The development of capitalism has often been discussed by historians who focus on the factors that could lead to the decline of the feudal society and emergence of the new socio-economic system. Much attention should be paid to the so-called Brenner debate because this discussion can throw light on various models that can explain the transformation of European societies.Advertising We will write a custom essay sample on The Brenner Debate specifically for you for only $16.05 $11/page Learn More This debate revolves around the claims made by Robert Brenner who emphasizes the idea that new class and property relations resulted in the development of capitalism. In turn, this debate is critically evaluated by other historians. On the whole, it is possible to argue that a single approach cannot account for the dramatic transformation that different countries underwent. Much attention should be paid to the arguments advanced by Guy Bois who combines the elements o f the demographic and class models. On the whole, it is vital to focus on such factors as the property relations between various economic agents, demographic trends, as well as the increase in the productivity. These are the main issues that should be examined in great detail. It is possible to examine the arguments put forward by Robert Brenner who argues that the transformation of European societies can be explained primarily by the changing class structures1. In his opinion, much attention should be paid to the property relations. The capitalist system of production could emerge provided that economic agents such as peasants could secure their property rights. This privilege can be viewed as a good incentive for increasing the volume of production. One should keep in mind that Robert Brenner rejects the demographic model according to which social and economic breakthrough were driven by population fluctuations. It is vital to remember that demographic patterns could significantly affect wages and the demand for products. However, this model does not explain the differences in the socio-economic development of various countries. These are the main points that Robert Brenner makes. Overall, his work stimulated additional research on this topic. The validity of these claims should be discussed more closely. Some of Brenner’s arguments are supported by other historians. For instance, it is possible to mention to mention Guy Bois who also examines the limitations of the demographic model2. In his opinion, this approach to the socio-economic development is too deterministic, and it cannot reflect the decisions of separate people. Moreover, this framework lays too much stress on such a factor as the struggle for resources.Advertising Looking for essay on social sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More Nevertheless, Guy Bois mentions that Brenner underestimates the importance of such a facto r as productivity. In particular, he notes that the increase in productivity led to the surplus of goods. More importantly, this factor contributed to the intensification of trade between and within communities. In this case, one should not speak only about the adoption of new technologies. One should also pay much attention to the way in which labor was organized. To a great extent, this view of the formation of capitalism is supported by Rodney Hilton3 who focuses on the pre-requisites for the development of the new socio-economic system. In his view, the differences in the productivity led to the accumulation of capital and the development of new institutions. This is why this notion should not be overlooked. It should be mentioned that other historians such as Postan and Hatcher argue that Robert Brenner lays too much stress on political power of different economic agents. Nevertheless, one should not overlook the influence of such factors as inheritance customs or attitudes to innovation, or military confrontations4. The main argument is that the economic stagnation of the feudal societies can be attributed to a diverse set of factors. Moreover, one should not suppose that the influence of demographic trends can be easily measured with the help of exiting research methods that require the study of quantitative data. The main problem is that these data are not always available to scholars. Additionally, historians such as Emmanuel Ladurie5 argue that the bargaining power of peasants can be explained by the population trends. In particular, the surplus of labor could strengthen the position of landlords. In the long-term, these trends could result in the formation of serfdom. This is why the validity of the demographic model cannot be fully rejected. Demographic trends are vital for showing how the bargaining power of different economic agents could change. For instance, the decline of the population could increase the wages of servants, as a result; these people could have more opportunities for accumulating capital. Similarly, the increasing population could contribute to increasing demand for various goods. Thus, the demographic model should not be disregarded. Overall, the socio-economic advance to capitalism cannot be attributed to only one factor such as new property relations or the changing demographic patterns. The development of the new political and economic system is not a deterministic process that can be easily predicted.Advertising We will write a custom essay sample on The Brenner Debate specifically for you for only $16.05 $11/page Learn More More likely, researchers should pay attention to such factors as class relations, new forms of property, demographic trends, and the changes in the productivity. Robert Brenner’s views on the formation of capitalism are important because they can show how the bargaining power of producers could increase with time passing. These are the main detail s that can be singled out. Bibliography Bois, Guy. â€Å"Against the Neo-Malthusian Orthodoxy.† In The Brenner Debate, edited by Trevor Aston and Charles Philpin, 107-119. Cambridge: Cambridge University Press, 1985. Brenner, Robert. â€Å"Agrarian Class Structure and Economic Development in Pre- Industrial Europe.† In The Brenner Debate, edited by Trevor Aston and Charles Philpin, 10-64. Cambridge: Cambridge University Press, 1985. Hilton, Rodney. â€Å"A Crisis of Feudalism.† In The Brenner Debate, edited by Trevor Aston and Charles Philpin, 119-138. Cambridge: Cambridge University Press, 1985. Ladurie, Emmanuel. â€Å"A Reply to Robert Brenner.† In The Brenner Debate, edited by Trevor Aston and Charles Philpin, 101-107. Cambridge: Cambridge University Press, 1985. Postan, Michael and John Hatcher. â€Å"Population and Class Relations in Feudal Society.† In The Brenner Debate, edited by Trevor Aston and Charles Philpin, 64-79. Cambridge: Cambridg e University Press, 1985. Footnotes 1 Robert Brenner, â€Å"Agrarian Class Structure and Economic Development in Pre- Industrial Europe,† in The Brenner Debate, ed. Trevor Aston and Charles Philpin (Cambridge: Cambridge University Press, 1985), 30.Advertising Looking for essay on social sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More 2 Guy Bois, â€Å"Against the Neo-Malthusian Orthodoxy,† in The Brenner Debate, ed. Trevor Aston and Charles Philpin (Cambridge: Cambridge University Press, 1985), 112 3 Rodney Hilton, â€Å"A Crisis of Feudalism,† in The Brenner Debate, ed. Trevor Aston and Charles Philpin (Cambridge: Cambridge University Press, 1985), 120 4 Michael Postan and John Hatcher. â€Å"Population and Class Relations in Feudal Society,† in The Brenner Debate, ed. Trevor Aston and Charles Philpin (Cambridge: Cambridge University Press, 1985), 66. 5 Emmanuel Ladurie, â€Å"A Reply to Robert Brenner,† in The Brenner Debate, ed. Trevor Aston and Charles Philpin (Cambridge: Cambridge University Press, 1985), 103.

Monday, October 21, 2019

Effectiveness of operational control system management of Safeguard Securicor

Effectiveness of operational control system management of Safeguard Securicor Free Online Research Papers 1.1 Introduction to study Security is the degree of protection against danger, loss, and criminals. Nowadays, security systems become very important to any business or field in the certain industry which is Banking, Wal-Mart, personal assets and so on. There are many criminal problems due to social life exponential developing. In Malaysia these problems overpowered with existence of Securities Commission Malaysia. The purpose on doing this research on â€Å"effectiveness of operational control system management of Safeguard Securicor† is to analyze whether the management system security that applied in Safeguard Securicor is very effective to control all their operational. Security has to be compared and contrasted with other interrelated concepts which are Safety, continuity, reliability. The key difference between security and reliability is that security must take into account the actions of people attempting to cause destruction. The first security system was implemented in the 1960s to provide exporters of technology and facilities assurances that these were used for peaceful purposes only.In order to conduct this research, the researcher will identify the main factors that Safeguard Securicor has taken to control the operational system. Researcher can also determine the corporate social responsibilities of on their network and to determine the risk that Safeguard Securicor may face in order to control their operations. 1.2 Introduction to variable A Management Control System is a system of collection of machines and people that work toward an objective. A system can be determined as a series of steps or phases consisting of a processing phase, an input phase, and an output phase. A control system adds measurement, reporting and analysis phases to the system. Output is measured, compared beside a plan, analyzed if judged as important, and after that reported back to the proper earlier phases of the system in the structure of positive or negative reinforcement. In a management control system, data and information is usually feedback to managers of the different system phases. Managers have the responsibility to take an appropriate action based on the data and information provided. 1.3 Need for study Researcher has to study to analyze and determine whether the management of operational control system in Safeguard Securicor is effective to ensure that they provide a high quality service to their customers. This research is important because many thief issues were facing by Safeguard Securicor and from this research, researcher can analyze, evaluate, and find appropriate solutions for the problem that Safeguard Securicor may face to manage their operational system. 1.4 Objective 1.4.1 To analyze the main factor that Safeguard Securicor has taken to control the operational system. 1.4.2 To determine responsibility of cooperate social network on their network. 1.4.3 To investigate how Safeguard Securicor manage their employee for a particular event or task. 1.4.4 To find out the major factor that Safeguard Securicor takes to select their employee with high responsibility. 1.4.5 To identify the risk that they may face in operational control system. 1.5 Overview for Safeguard Securicor Safeguard Securicor is the leading international security solutions group that opened branches in Malaysia. Safeguard Securicor specialize in outsourced business processes in sectors where security and safety risks are considered a strategic threat. Safeguard Securicor provide services such as: Cash Services- Cash Processing, Courier Services, Cash Transportation, Bank Escort Services, Cashier Services, ATM Outsourcing and Management, Full Outsourcing Solutions For Financial Institutions, Retail Cash Management, Valuable Escort Services, ATM Second Line Maintenance and Treasury Services. Manned Security- Mobile Patrols, VIP Guards, Static Guards, Reception Services, Alarm Response Services, Store Detective Services, Event Security and Guard Dog Patrol Teams. Security Systems-The Design, Supply, Installation, Monitoring and Maintenance of Access Control, CCTV and Burglar Alarm and Alarm Reporting Systems, Asset Tracking Systems and the Design, Supply and Installation of Physical Security Products and Equipment. Other Security Services-Corporate Investigations and Security Consultancy Services, Security Training and the Provision of fully Integrated Security Solutions. Corporate Responsibility Safeguard Securicor prides it company on being responsible in how it handles relationships with stakeholders, employees, communities, and customers. The group values illustrate what Safeguard Securicor stands for. Within the group has a senior executive champion that responsible for ensuring the values become strength for Safeguard Securicor doing business. BEST PEOPLE- Safeguard Securicor always takes care to employ the best people, develop their skill and ability, provide opportunity and encourage employee to live Safeguard Securicor values. INTEGRITY- Safeguard Securicor always trusted to do the right thing. EXPERTISE- Safeguard Securicor builds up and shows their expertise through innovative and leading boundary approach to creating and delivering the service. TEAMWORK AND COLLABORATION- Safeguard Securicor work together for the benefit as a whole. CUSTOMER FOCUS- Safeguard Securicor has good relationships with customers that create trust and work together for the shared benefit in organizations. PERFORMANCE- Safeguard Securicor challenges each of their employees to improve performance year by year to generate long term god performance. Diversity Inclusion Diversity is source of strength for Safeguard Securicor and gives the key competitive advantage such as diverse workforce, understand the requirements of customers and recognize opportunities for improvement and innovation. Employees distribute the service that customers relied on keep their assets safe and secure. Success operational will depend on skill to attract and retain talented employee to support the challenges of company diverse customers and continued business development. As a security company with a clear direction towards usually male conquered occupations, Safeguard Securicor faces challenges in motivating a diversity and inclusion plan. Safeguard Securicor have to think globally but act locally, the HR director takes generally responsibility for taking on some challenges by Sharing, identifying, and developing best practice in diversity and inclusion for the businesses. Supporting in improving the diversity on their management teams. Develop an inclusive work environment in the company. Health Safety Safeguard Securicor are in the business of managing risk, whether that is property, people, or assets. The safeguard security business is challenging and dangerous that need employees work in aggressive environments, providing armed escorts for convoys, clearing mines, and dealing with the fight from rebel attacks. Safeguard Securicor entirely recognize the dangers challenges and work exceptionally hard to ensure that Safeguard Securicor employees will be given proper training, back up support and tools to facilitate them to remove or extensively reduce the risks they meet at work operational. CHAPTER 2 REVIEW OF LITERATURE The meaning of literature review is a â€Å"critical analysis of a segment of a published body of knowledge through summary, classification, and comparison of prior research studies, reviews of literature, and theoretical articles.† (Wisconsin). Literature review can be establish by any documents that was published or unpublished, ideas, data collections, information content, written evidence from a other researcher was done they research on certain view in the topic. Many researchers were done presented on the research of general management focusing on operational control system management. The effective management very important for company to make sure that company grow fluently and minimize risk. According to (Christensen, David S, 1989) Management Control Systems (MCS) theory is a useful integrative tool for organizing, explaining, and understanding the jargon and concepts of performance measurement. MCS theory can help make sense of the criteria by providing a way of organizing and remembering the criteria and the related jargon and concepts. In 1965, other researcher defined management control as separate from operational control and strategic control. Different categories of control are discussed between formal and informal controls; behavior controls and output; action, clan controls and bureaucracy; administrative and social controls; and results, market and personnel controls (Langfield-Smith, K. 1997). Management control systems have been recognized as important in the implementation and formulation of strategies (Dent, 1990; Bromwich and Bhimani, 1994). The appropriate design and using management control system is influential in successful consequently contribute and implementation to enhanced organizational performance (Simons (1987). Simons (1987) anticipated control system for two strategies that would be differing. Simons used the following control system attributes on his study : he use external data, extent and tailored control system, forecast data, intensity of monitoring performance results, goals related to output effectiveness, frequency of reporting, cost control, extent and formula based bonus remuneration. As a major Safeguard organization, Safeguard Securicor plays a significant role in the lives of hundreds of thousands of people directly through employment and relationships with customers and suppliers, and indirectly through involvement in the communities in which employees live and work (Safeguard Securicor, 2007). Safeguard Securicor strategy is the safety and security of customers, their assets and the general public, so Safeguard Securicor are constantly contributing to a safer society. Safeguard Securicor is committed to operating to the highest levels of business ethics throughout its operations. Thus the policy covers a wide range of areas including: human rights, bribery corruption, compliance with the law, accounting standards ILO Declaration on Fundamental Principles and Rights at Work, health safety, and whistle blowing complaints (Safeguard Securicor, 2007). To ensure management in operational control are effective, the businesses’ Risk Assessments and Controls Self Evaluation analysis is reviewed closely and can also indicate weaknesses or issues that need to be addressed (Safeguard Securicor, 2008). This monitoring activity helps to ensure that both managers and employees have a clear understanding of the company ethical standards of operation and the expectations of stakeholders. Management is also given assurance on their compliance with group standards and any remedial action to be taken is identified. Diversity is source of strength for Safeguard Securicor that gives key competitive advantage. With such a diverse workforce, Safeguard Securicor better placed to understand the needs of customers and identify opportunities for innovation and improvement (Safeguard Securicor, 2008). Employees deliver the service that customers rely on to keep them and their assets safe and secure. Success operational control system will depend on ability to attract and retain talented people so that Safeguard Securicor has the resources to support the challenges of diverse customers and continued business growth. CHAPTER 3 Research Methodology Research methodology can be determined as a research methods that researcher will use for getting information from particular company. There are two types of research methodology which is quantitative and qualitative methodologies. These two types of the research methodology will be used during the research. There have particular method of qualitative research which is survey, direct observations, interviews, and analysis of certain material and documents. 3.1 Population Researcher chooses Safeguard Securicor at Petaling Jaya, Kuala Lumpur as a selected area to gather data information. This selected area is suitable to doing a research because that is the Head Quarters of Safeguard Securicor, Malaysia. From that, the researcher can get a fresh primary data collection from management of the company. The researcher will select the staff of Safeguard Securicor from the middle-level management to line workers. Total of staff and workers in Safeguard Securicor is 400. 3.2 Sample size and Sampling Technique In order to complete this research and get the required information, the researcher will select 40% is 160 samples from the total staff and workers of Safeguard Securicor, Petaling Jaya. Sampling Technique Sample technique can be defined as a segment of the workers that is selected for collecting primary data information. For this research, researcher will use random sampling technique based on probability sampling. Probability sampling is important in social research survey that possible to make inferences from information regarding a random sample to the respondents that was selected. 3.3 Primary Data Primary data is data that collected originally sources by the researcher. There are the advantages of using primary data for the research. The researcher may use such methods as: Direct observation – Researcher will observe the Safeguard Securicor regarding the management of their system control security in completing the task. Surveys – Researcher will write surveys for collect considerable information and detail data. Researcher have to trust the honesty of the respondent in build self verifying questions Interviews – Researcher also will use interview in order to collect data information in this research. Interview can be a slow method to gather information, and high cost. Some respondent will show non-verbal communication such as fidgeting, face-pulling, hand gestures, shrugging, and sarcastic expressions. A problem that researcher will face is that respondent might say what they think and they might avoid being honestly in giving information on their jobs. 3.4 Secondary Data Secondary data is collected from external sources such as internet, magazines, newspapers, reviews, and research articles. Secondary data can be determined as a cheaper and easier method to collect data information rather than primary data. The problem that researcher may face is uncertain often the accuracy, integrity, and reliability of the data. For this research, researcher use logs to see the feedback from Safeguard Securicor such as fault logs, error logs, complaint logs, and transaction logs. Information and, data objective source can give valuable on the data about system performance for researcher. Researcher also collects data information about Safeguard Securicor by using both of the method. Some of the information needs to use data from newspaper, journal, magazine, and books and for some information needs to use by observation, interviews, and questionnaires to get all data and information. For this research proposal, researcher will use secondary data to collect the particular information that researcher needs. For the primary data, researcher will use to the next project dissertation for collecting the entire data finding. 3.5 Ethical Consideration In order to doing this research, researcher the need to follow some ethical consideration to completing data collection. Researcher should give the notice or information referred to do research to get confirmation from Safeguard Securicor to participation in order to collecting data information. Researcher should not give encouragement or pressure to respondent of any kind shall be applied to staff or workers to become a respondent for this research. Researcher must be kept all the data information in strictly and confidential. Researcher should give any optional to the respondent in answer all the question, such as in order to fulfill the personal detail into questionnaires. Researcher could be careful how question or word will bring sensitivity to respondents. This important because to avoid something happen that would cause physical and emotional. For the interviews, the researcher should prepare the question and that may be kind of open and unstructured. For the informal interviews, the research will give a freedom to respondents so that they can express themselves without any compulsion. Finally, the researcher should preserved detail of their respondent as much as possible. 3.6 Time Frame Researcher has designed the time frame as guideline to completing this research proposal. All the information it will illustrate by using Gantt chart. Starting from 18th November 2009, researcher start to finding the interest research topic that researcher wants doing this research proposal. Researcher takes four days to select a research topic and follows by finding the research objective for this research and finished by 21st November 2009. On 23rd November 2009, researcher starting to collect and getting data information that suitable with the research topic and follows by doing review of literature that taken one weeks to complete the review of literature and finished by 29th November 2009. On 30rd November 2009, researcher starts doing research methodology that taken two days and follows by conclusion that finished on 02nd December 2009. CHAPTER 4 CONCLUSION In this research, researcher explores the effectiveness of operational control system management toward on Safeguard Securicor, Petaling Jaya, Malaysia. Many factors will effect on the control system management of Safeguard Securicor to ensure all the operational under control. From this research, all the data collection will be use to the next project dissertation to analyze more detail according the Safeguard Securicor manage in their operational. Safeguard Securicor is one of the big safeguard company that provide security services to such as manned security, cash services, security system and other security services for corporate company. In the line, researcher needs to analyze how Safeguard Securicor manage the thief issues and problems that their face. This research proposal can be use for investigate how the some company or organization manage and control the operational and situation in handling some task that are given. Some of the company will use the feedback from the customer as a guideline to make improvement on their service. For Safeguard Securicor, as a large company that provided safety security service, important to this company to plan and manage a proper strategy in their operational, so that Safeguards Securicor can avoid and handling bad thing happen and can reduces complaint from the customer. Research Papers on Effectiveness of operational control system management of Safeguard SecuricorIncorporating Risk and Uncertainty Factor in CapitalThe Project Managment Office SystemOpen Architechture a white paperResearch Process Part OneBionic Assembly System: A New Concept of SelfDefinition of Export QuotasNever Been Kicked Out of a Place This NiceInfluences of Socio-Economic Status of Married MalesMarketing of Lifeboy Soap A Unilever ProductThe Relationship Between Delinquency and Drug Use

Sunday, October 20, 2019

Bsnl Training Essay Example

Bsnl Training Essay Example Bsnl Training Essay Bsnl Training Essay mzn, who permitted me for the practical training in their Department. I am also grateful to all Technical Staff of B. S. N. L. whose transcendent thoughts were the tremendous source of inspiration and encouragement, which will be definitely important for me as far my future is concerned. They explained primary techniques in a very easy manner. I also extend my gratitude to whole staff of B. S. N. L. , Muzaffarnagar, for their kind cooperation. CONTENTS Page No.  ¦ Company Profile 4-5  ¦ Vision, Mission and Objectives 6  ¦ Broadband Services 9 Technology Used 10  ¦ Wired Line 11-17  ¦ Wireless Line 18-26  ¦ Bibliography 12 COMPANY PROFILE On October 1, 2000 the Department of Telecom Operations, Government of India became a corporation and was christened Bharat Sanchar Nigam Limited (BSNL). Today, BSNL is the largest Public Sector Undertaking of India and its responsibilities include improvement of the already impeccable quality of telecom services, expansion of telecom network introduction of new telecom services in all villages and instilling confidence among its customers. Bharat Sanchar Nigam Ltd. formed in October, 2000, is Worlds 7th largest Telecommunications Company providing comprehensive range of telecom services in India: Wireline, CDMA mobile, GSM Mobile, Internet, Broadband, Carrier service, MPLS-VPN, VSAT, VoIP services, IN Services etc. Presently it is one of the largest leading public sector unit in India. BSNL has installed Quality Telecom Network in the country and now focusing on improving it, expanding the network, introducing new telecom services with ICT applications in villages and wining customers confidence. Today, it has about 47. 3 million line basic telephone capacity, 4 million WLL capacity, 48. 11 Million GSM Capacity, more than 37382 fixed exchanges, 44966 BTS, 3140 Node B ( 3G BTS), 287 Satellite Stations, 480196 Rkm of OFC Cable, 63730 Rkm of Microwave Network connecting 602 Districts, 7330 cities/towns and 5. Lakhs villages. BSNL is the only service provider, making focused efforts and planned initiatives to bridge the Rural-Urban Digital Divide ICT sector. In fact there is no telecom operator in the country to beat its reach with its wide network giving services in every nook corner of country and operates across India except Delhi Mumbai. Whether it is inaccessible areas of Siachen glacier an d North-eastern region of the country. BSNL serves its customers with its wide bouquet of telecom services. BSNL has set up a world class multi-gigabit, multi-protocol convergent IP infrastructure that provides convergent services like voice, data and video through the same Backbone and Broadband Access Network. At present there are 0. 6 million DataOne broadband customers. The company has vast experience in Planning, Installation, network integration and Maintenance of Switching Transmission Networks and also has a world class ISO 9000 certified Telecom Training Institute. BSNL cellular service, CellOne, has more than 49. 09 million cellular customers, garnering 16. 98 percent of all mobile users in its area of operation as its subscribers. In basic services, BSNL is miles ahead of its rivals, with 35. 1 million Basic Phone subscribers i. e. 85 per cent share of the subscriber base and 92 percent share in revenue terms. BSNL plans to expand its customer base from present 47 millions lines to 125 million lines by December 2007 and infrastructure investment plan to the tune of Rs. 733 crores (US$ 16. 67 million) in the next three years. The turnover, nationwide coverage, reach, comprehensive range of telecom services and the desire to excel has made BSNL the No. 1 Telecom Company of India. VISION, MISSION OBJECTIVES VISION: To become the largest telecom Service Provider in   Asia. MISSION: To provide world class State-of-art technology telecom services to its customers on demand at competitive prices. To Provide world class telecom infrastructure in its area of operation and to contribute to the growth of  the  countrys economy. OBJECTIVES: (1) To be the Lead Telecom Services Provider. (2) To provide mobile telephone service of high quality and become no. 1 GSM operator in its area of operation. (3) To provide point of interconnection to other service provider as per their requirement promptly. 4) Contribute towards: (i) National Plan Target of 500 million subscriber base for India by 2010. (ii) Providing telephone connection in villages as per government policy. (iii) Implementation of Triple play as a regular commercial proposition. (5) To facilitate R D activity in the country. Voice The majority of all telecommunication today uses Digital techniques, and the dominance of digital is so strong that in this text we will neglect Analog communication almost completely. When communicating voice digitally, the sound waves in the air must be digitalized. This is done by sampling the sound waves: measuring their shape, and converting this measurement into numbers. These numbers are a digital form of the voice signal. At the receiver, the measurement values (called samples) are used to reconstruct the original sound wave. To be able to reconstruct the voice with sufficient quality, the number of samples taken (called the Sampling-rate) and the accuracy of each sample (called the Resolution) must be sufficient. This is a trade-off, because the more samples, the more digital numbers needs to be transmitted, and this costs money. As a good compromise for understandable voice, the telecom community agreed to take 8000 samples per second, each 8 bits precise. This will not result into perfect audio-quality, but it is enough to understand the person on the other side of the line. As you are converting the sound waves to digital numbers, you create a continuous stream of information flow: every second you generate transport terminate 8000*8 = 64000 bits. This amount is called the Bit-rate. As a result a single digital voice connection is often referred to as a 64 kbps (kilo-bits-per-second). This continuous stream lasts as long as the phone conversation lasts, typically a few minutes. Note: As a comparison, an audio CD signal uses 44100 samples per second, each 16 bit precision, and two channels (left+right) to provide stereo. You will agree that CD sound quality is much better than a phone-line, but the price for this is that you need to transport 1. 411 Mbps for the CD (mega-bits-per-second), where only 64 kbps for a telephone line. Data When computers or machines communicate with each other, they usually dont send a continuous stream of information. Typically a computer needs some limited input data, then processes this, and responds with a limited amount of result data. Therefore data communication is using the concept of information packets a group of information bits. So one computer sends a packet of input to the other computer, which processes it, and then returns a packet with the results. BROADBAND SERVICES Broadband is often called high-speed Internet, because it usually has a high rate of data transmission. In general, any connection to the customer of 256 kbit/s (0. 256 Mbit/s) or more is considered broadband Internet. The Organization for Economic Co-operation and Development (OECD) has defined broadband as 256 kbit/s in at least one direction and this bit rate is the most common baseline that is marketed as broadband around the world. Telecommunication regulatory authority of India(TRAI) defines broadband as â€Å"an always on data connection that is able to support interactive services including internet access has the capability of the minimum download speed of 256Kbps to an individual subscriber from the point of presence of the service provider intending to provide broadband service where multiple uch individual broadband connections are aggregated the subscriber is able to access these interactive services including the internet through the POP. The interactive services will include any services for which a separate license is specifically required. For example- real time voice transmission, except to the extent that it is presently permitted under ISP license with internet Telephony†. TECHNOLOGY USED Broadband access technology is classified into two categories: Wired Line * DSL (Digital subscriber’s line) * Cable Modem * PLC (power line communication) * Optical fibre technologies Wireless Line * 3G Mobile Wi-Fi (Wireless fidelity) * Wi-Max * FSO (Free space optical) * LMDS MMDS * Satellite Wired Line: * DSL: Digital subscriber lines apply modern digital techniques on twisted pair medium to deliver new services over existing infrastructure. The bandwidth and quality of a typical analog telephone line is relatively low (300 3400 Hz). This is mainly because there is a wide variety of types, lengths, qualities, etc of twisted pairs used, and an analog line must assume the worst-case common denominator of all. However, todays more powerful signal processing and computing techniques allow building equipment hat adapts to each particular twisted pair, optimizing the use of it case by case, and resulting in much higher throughputs. For the Telecom operator, the advantages are: * No additional cable-cost: uses existing telephone line. * Telephone network is not used for data-services, like accessing the Internet. Telephone networks are dimensioned for phone calls, not for accessing the Internet. For example the average phone call duration is 100 seconds, when surfing the Internet this is much longer, resulting in congestion in the telephone network. Advantages for the end-user: High throughput up to Mbps. * Telephone is still available when surfing the Internet, telephone and data-services can be used at the same time. HDSL XDSL is a family name for a number of similar techniques. The x is a placeholder for several variants of Digital Subscriber Line (DSL). The first one, which was developed, was High Speed Digital Subscriber Line (HDSL) It is a symmetrical technique, the same bandwidth is available in both directions. HDSL is typically deployed in the network where 2. 048 Mbps are needed, but only twisted pair (no coax or fiber) is a vailable. ADSL Asymmetrical Digital Subscriber Line (ADSL) is the best-known variant of XDSL: The main principles are the same, but the bandwidths are divided Asymmetrical: more bandwidth is made available from network to user (Downstream) then from network to user (Upstream). This matches with typical residential applications, Such as: * Video-on-Demand (VOD): video, typically a few Mbps going downstream, with the user control (selecting the video, play, stop, rewind, etc) only a few kbps going upstream. * Internet: WEB-contents going downstream are megabytes; user requests are only a few hundred bytes. Figure: Internet Access Provider, ADSL VDSL Digital subscriber lines make a trade-off between bandwidth and distance: the shorter the line, the higher the throughput. As a result of this, a number of variants of DSL-techniques are being developed, from long distance – low bandwidth to short distance high bandwidth. Another parameter is the division of Upstream/Downstream bandwidth. This can be: * Symmetrical: the same in each direction, * Asymmetrical, fixed * Asymmetrical, dynamic: the total bandwidth, upstream+downstream is fixed, but at any time this total can be assigned in a certain ratio to either direction. New DSL variants using these new techniques are called Very High Speed Digital Subscriber Line (VDSL) Figure: Different DSL technique CABLE MODEM A cable modem with a splitter can provide Internet access to multiple PCs, if they are connected via a LAN. * Tuner converts TV channel to a fixed lower frequency (6 to 40 Mhz). * Demodulator performs A/D demodulation, error correction MPEG synchronization. * MAC extracts data from MPEG frames, filters data for other cable modem, runs the protocol. * Burst modulator performs RS encoding modulation frequency conversion/A conversion. Interface can be PCI bus, universal serial bus, Ethernet or others. Figure : -Cable Modem POWER-LINE COMMUNICATION(PLC) This is a new service still in its infancy that may eventually permit broadband Internet data to travel down standard high-voltage power lines. Broadband over power lines (BPL), also known as Power line communication, has developed faster in Europe than in the US due to a historical difference in power system design philosophies. Nearly all large power grids transmit power at high voltages in order to reduce transmission losses, then near the customer use step-down transformers to reduce the voltage. Since BPL signals cannot readily pass through transformers, repeaters must be attached to the transformers. In the US, it is common for a small transformer hung from a utility pole to service a single house. In Europe, it is more common for a somewhat larger transformer to service 10 or 100 houses. For delivering power to customers, this difference in design makes little difference, but it means delivering BPL over the power grid of a typical US city will require an order of magnitude more repeaters than would be required in a comparable European city. The second major issue is signal strength and operating frequency. The system is expected to use frequencies in the 10 to 30 MHz range, which has been used for decades by licensed amateur radio operators, as well as international shortwave broadcasters and a variety of communications systems (military, aeronautical, etc. ). However there are some disadvantages of using PLC communication: N/w characterstics devices can advesely affect signal strength quality. Electronic loads nearby high frequency radiation sources may cause high frequency noise that interferes BPL. Some PLC systems are not fully operable at very low or no load without battery backup. Physics limits frequency on power lines to ; 100 Mhz. BPL is not likely to be available soon for high voltage(;66Kv)power lines. Conventional electronic surge arrestors severely attenuate BPL signals. OPTIC-FIBRE TECHNOLOGY Currently fibre costs are high as compared to copper but there is a trend towards decreasing costs of optical fibre cables and photonics employed. To carry same information as one fibre cable we would need hundreds of reels of twisted wire copper cables. Fibre is 23 times lighter than copper cable 36 times less in cross section. Advantages Of Optic-Fibre Communication: Small Size and Weight: Optical fibers have very small diameters which are often no greater than the diameter of a human hair. Hence, even when such fibers are covered with protective coatings they are far smaller and much lighter than corresponding copper cables. This is a tremendous boon towards the alleviation of duct congestion in cities, as well as allowing for an expansion of signal transmiss ion within mobiles such as aircraft, satellites and even ships. Signal Security: The light from optical fibers does not radiate significantly and therefore they provide a high degree of signal security. Unlike the situation with copper cables, a transmitted optical signal cannot be obtained from a fiber in a noninvasive manner (i. e. without drawing optical power from the fiber). Therefore, in theory, any attempt to acquire a message signal transmitted optically may be detected. This feature is obviously attractive for military, banking and general data transmission (i. e. computer network) application. Ruggedness and Flexibility:- Although protective coatings are essential, optical fibers may be manufactured with very high tensile strengths. Perhaps surprisingly for a glassy substance, the fibers may also be bent to quite small radii or twisted without damage. Furthermore cable structures have been developed which have proved flexible, compact and extremely rugged. Taking the size and weight advantage into account, these optical fiber cables are generally superior in terms of storage, transportation, handling and installation to corresponding copper cables, whilst exhibiting at least comparable strength and durability. System Reliability And Ease Of Maintenance :- These features primarily stem from the low loss property of optical fiber cables which reduces the equirement for intermediate repeaters or line amplifiers to boost the transmitted signal strength. Hence with fewer repeaters, system furthermore, the reliability of the optical components is no longer a problem with predicted lifetimes of 20 to 30 years now quite common. Both these factors also tend to reduce maintenance time and costs. Enormous Potential Bandw idth: The optical carrier frequency in the range 1013 to 1016 Hz (generally in the near infrared around 1014 Hz or 105 GHz) yields a far greater potential transmission bandwidth than metallic cable systems. i. e. coaxial cable bandwidth up to around 500 MHz) or even millimetre wave radio systems (i. e. systems currently operating with modulation bandwidths of 700 MHz ). At present, the bandwidth available to fiber systems is not fully utilized but modulation at several gigahertz over a hundred kilometers and hundreds of megahertz over three hundred kilometers without intervening electronics (repeaters) is possible. Therefore, the information – carrying capacity of optical fiber systems has proved far superior to the best copper cable systems. Wireless Line: * Bluetooth: Bluetooth is a standard and communications protocol primarily designed for low power consumption, with a short range (power-class-dependent: 1 meter, 10 meters, 100 meters) based on low-cost transceiver microchips in each device. Bluetooth enables these devices to communicate with each other when they are in range. The devices use a radio communications system, so they do not have to be in line of sight of each other, and can even be in other rooms, as long as the received transmission is powerful enough. Bluetooth exists in many products, such as telephones, printers, modems and headsets. The technology is useful when transferring information between two or more devices that are near each other in low-bandwidth situations. Bluetooth is commonly used to transfer sound data with telephones (i. e. with a Bluetooth headset) or byte data with hand-held computers (transferring files). Bluetooth protocols simplify the discovery and setup of services between devices. Any Bluetooth device can, in theory, host any other Bluetooth device. This makes using services easier because there is no longer a need to set up network addresses or permissions as in many other network. More prevalent applications of Bluetooth include: Wireless control of and communication between a mobile phone and a hands-free headset. This was one of the earliest applications to become popular. Wireless networking between PCs in a confined space and where little bandwidth is required. Wireless communications with PC input and output devices, the most common being the mouse, keyboard and printer. Replacement of traditional wired serial communications in test equipment, GPS receivers, medical equipment, bar code scanners, and traffic control devices. For controls where infrared was traditionally used. Sending small advertisements from Bluetooth enabled advertising hoardings to other, discoverable, Bluetooth devices. Future of Bluetooth: * Broadcast Channel: enables Bluetooth information points. This will drive the adoption of Bluetooth into mobile phones, and enable advertising models based around users pulling information from the information points, and not based around the object push model that is used in a limited way today. Topology Management: enables the automatic configuration of the piconet topologies especially in scatternet situations that are becoming more common today. This should all be invisible to the users of the technology, while also making the technology just work. * Alternate MAC PHY: enables the use of alternative MAC and PHYs for transporting Bluetooth profile data. The Bluetooth Radio will still be used for device discovery, initial connection and profile configuration, however when lots of data needs to be sent, the high speed alternate MAC PHYs will be used to transport the data. This means that the proven low power connection models of Bluetooth are used when the system is idle, and the low power per bit radios are used when lots of data needs to be sent. * QoS improvements: enable audio and video data to be transmitted at a higher quality, especially when best effort traffic is being transmitted in the same piconet. Figure: -A typical Bluetooth USB dongle * 3-G Mobile: 2. 54 3 G falls into the category of broadband access. 2. 5G- GSM (EDGE/GPRS), CDMA 3G-VMTS/WCDMA, CDMA, speed achieved by 3G is 384K(M),2048K(S) Technology| 3G| Frequency Band| 1. 8-2. 5 GHz| Bandwidth| 5-20 MHz| Data Rate| Up-to 2 Mbps| Access| W-CDMA| FEC| Turbo-Codes| Switching| Cirsuit/Packet| Figure: -3G Services * Wi-Fi: A Wi-Fi enabled device such as a PC, game console, cell phone, MP3 player or PDA can connect to the Internet when within range of a wireless network connected to the Internet. The coverage of one or more interconnected access points - called a hotspot - can comprise an area as small as a single room with wireless-opaque walls or as large as many square miles covered by overlapping access points. Wi-Fi technology has served to set up mesh networks, for example, in London. Both architectures can operate in community networks. In addition to restricted use in homes and offices, Wi-Fi can make access publicly available at Wi-Fi hotspots provided either free of charge or to subscribers to various providers. Wi-Fi also allows connectivity in peer-to-peer (wireless ad-hoc network) mode, which enables devices to connect directly with each other. This connectivity mode can prove useful in consumer electronics and gaming applications. Figure : -A keychain size Wi-Fi detector. Operational advantages: Wi-Fi allows LANs (Local Area Networks) to be deployed without cabling for client devices, typically reducing the costs of network deployment and expansion. Spaces where cables cannot be run, such as outdoor areas and historical buildings, can host wireless LANs. * WiMAX WiMAX, an approximate acronym of Worldwide Interoperability for Microwave Access, is a telecommunications technology that provides for the wireless transmission of data using a variety of transmission modes, from point-to-point links to full mobile cellular-type access. The technology provides upto 70 Mb/sec symmetric broadband speed without the need for cables. The technology is based on the IEEE 802. 16 standard (also called WirelessMAN). The name WiMAX was created by the WiMAX Forum, which was formed in June 2001 to promote conformity and interoperability of the standard. Uses: The bandwidth and range of WiMAX make it suitable for the following potential applications: * Connecting Wi-Fi hotspots to the Internet. * Providing a wireless alternative to cable and DSL for last mile broadband access. * Providing data and telecommunications services. Providing a source of Internet connectivity as part of a business continuity plan. That is, if a business has a fixed and a wireless Internet connection, especially from unrelated providers, they are unlikely to be affected by the same service outage. * Providing portable connectivity. Comparison with Wi-Fi: Comparisons and confusion between WiMAX and Wi-Fi are frequent, possibly because both begin with the same two letters, are based upon IEEE standards beginning with 802. , and are related to wireless connectivity and Internet access. However, the two standards are aimed at different applications. WiMAX is a long-range system, covering many miles/kilometers that typically uses licensed spectrum (although it is possible to use unlicensed spectrum) to deliver a point-to-point connection to the Internet from an ISP to an end user. Different 802. 16 standards provide different types of access, from mobile (similar to a cellphone) to fixed (an alternative to wired access, where the end users wireless termination point is fixed in location. ) * Wi-Fi is generally a shorter range system, typically tens of yards/meters, though its range can be extended to over a kilometer using directional antennas. Wi-Fi uses unlicensed spectrum to provide access to a network. Typically Wi-Fi is used by an end user to access his/her own network, which may or may not be connected to the Internet. If WiMAX provides services analogous to a cellphone, Wi-Fi is similar to a cordless phone. * WiMAX and Wi-Fi have quite different Quality of Service (QoS) mechanisms. WiMAX uses a mechanism based on connections between the Base Station and the user device. Each connection is based on specific scheduling algorithms, which means that QoS parameters can be guaranteed for each flow. Wi-Fi has introduced a QoS mechanism similar to fixed Ethernet, where packets can receive different priorities based on their tags. This means that QoS is relative between packets/flows, as opposed to guaranteed. * WiMAX is highly scalable from what are called femto-scale remote stations to multi-sector maxi scale base that handle complex tasks of management and mobile handoff functions and include MIMO-AAS smart antenna subsystems. * LMDS: Local Multipoint Distribution Services (LMDS) is a radio-based access system. A fixed base-antenna (typically on a high building or tower) called Hub, services a number of users, which are also fixed. (Customer antenna on top of building). The access has a broadband capacity it can be used for all kinds of telecom services: * POTS or ISDN telephony. * Data services such as LAN interconnect, ATM, IP networks, etc. * Digital Video broadcasting. And potential customers are: * Businesses * Schools, Libraries, Health care providers * Residential consumers Each Hub is at the center of cell, a few kilometers in size, containing hundreds or thousands of users. Interconnections between hubs are typically done through fiber-optic core networks. The radio frequencies used are in the range 28 GHz to 42 GHz. This requires line-of-sight between hub and end-user. The word Local in LMDS refers to the relative short distance, or small cell-size. The words Multipoint Distribution refers to the point to multipoint nature. Figure 36: Local Multipoint Distribution Services * Free Space Optics (FSO): It is optical wireless, point-to-point line of sight broadband technology that is an alternative to fiber optic cable systems. It can transmit up to 1. 25 Gbps at a distance of 4 miles. * Satellite: It offers two-way Internet access via satellite orbiting the earth about 22000 miles above equator. PC through a special satellite modem broadcasts the requests to the satellite dish located on top of the roof / building which in turn transmits receives signal from the satellites. But it is slower in uplink as well as in downlink. BIBLIOGRAPHY (1) www. bsnl. co. in (2) www. wikipedia. org (3) www. howstuffworks. com (4) www. esnips. com

Saturday, October 19, 2019

Finance Essay Example | Topics and Well Written Essays - 1000 words - 9

Finance - Essay Example (as to differentiate it to Private Finance), Housing and construction (availability of infrastructures), Output, capacity, and capacity utilization of existing and planned infrastructures, Merchandise trade, National accounts, Labor market, Population, Prices and Wholesale and Retail trade Some specific items under the broad categories mentioned includes the amount of potential customers and their preference, trends in economic growth and operating expenses such as wages, costs of local supplies, taxes and other expenditures, operations and profitability of competitors, planned economic ventures and differences in currency denominations. Also included is the determination of availability of resources, inflation rates, external debt payments as a measure of the credibility and involvement of the governing institutions of the country. Equally important issues that must be considered are risks such as insolvency of the buyer, risk of protracted default or the failure of the buyer to pay the amount due within six months after the due date, risk of non-acceptance and surrendering economic sovereignty. There are also political risks (which would influence economic conditions) that must be taken into consideration such as the risk of cancellation or non-renewal of export or import licenses, conflict risks, risk of expropriation or confiscation of the importers company, risk of the imposition of an import ban after the shipment of the goods, transfer risk or the imposition of exchange controls by the importers country or foreign currency shortages. The World Bank currently has a numerical measure/ ratings in determining the ‘business friendliness’ of countries. It would seem that forecasting would require voluminous data. This would indeed be the case for some forecasting projects. However, some ventures would only require some data depending on the forecast models and equations they are using. There are many reasons why business firms are going global foremost

Friday, October 18, 2019

Water Management in India Research Paper Example | Topics and Well Written Essays - 1750 words

Water Management in India - Research Paper Example The challenges of water management in India stem from resource problems whereby the protection of water sources is yet to be effective. Deforestation along with other hazardous activities threatens the water sources of the Asian giant. Moreover, infrastructural parameters hinder the achievement of full access to water by many residents of India. Though, the water problem in India is more visible in cities particularly slums. As a result, numerous organizations both local and international along with government agencies have focused on water supply in slum areas. The management of water in India is closely related to hygiene because the access to water is the only way to guarantee good hygiene in the society. Therefore, improving water supply is considered central towards enhancing the standards of hygiene. This paper evaluates water management in India through a number of perspectives to bring out the current state of water administration in the Indian subcontinent along with its rel evant effects on life. Primary issues will be listed and discussed regarding how they influence water management. Major organizations in the process of water administration will be discussed. One of the primary issues in India regarding water management is the utilization of water for agricultural purposes. Owing to the unreliable weather of India, certain areas are dependant of water for irrigation purposes. The insufficiency of rain makes farmers become dependant on water supply for agricultural use.

This assignment involves researching the Starbucks Coffee Company (UK) Essay

This assignment involves researching the Starbucks Coffee Company (UK) Ltd (Starbucks) and its role in the COFFEE AND SANDWICH SHOP INDUSTRY in the UK - Essay Example In the UK, Starbucks obtains a leadership position in the coffee and sandwich industry in the UK creating a unique value propositions and unique brand image. â€Å"According to the retail analyst Euromonitor, the company has a 16.7 per cent market share, one per cent ahead of Costa Coffee† (Hickman 2008). In spite of recent decline, the Starbuck’s managing director in the UK admits: â€Å"â€Å"We have seen steady consumer-led growth in the UK market and we remain excited by the opportunities presented by [it],† Mr Broad said. â€Å"International markets as a whole continue to be a growth engine for the company.† (Walsh 2008). For Starbucks, brand positioning serves to make competitors attractive brands seem deficient. This goal is achieved by introducing a new benefit to the category. Starbucks positioning of coffee as a destination rather than a product made other coffees seem ordinary and unexciting. Alternatively, introducing a comprehensive position might make less complete offerings seem deficient (Baye 2002). Starbucks, Tte biggest player in Britains  £900m-a-year coffee shop industry offers blander drinks than its competitors Costa Coffee and Caffà ¨ Nero and is costlier than most rivals, testers for the consumer group† (Hickman 2008). In the UK, Starbucks has built a powerful experiential brand. Starbucks stores are much more than a place to purchase a jolt of java. They offer a brief reprieve in a hectic day; a chance to inhale the rich aroma of fresh coffee and listen to relaxing music, while tasting a rich, specially prepared brew in the company of like-minded coffee addicts. One hallmark of the Starbucks experience, and any great experience really, is consistency. â€Å"Starbucks remains the more recognized chain with 27% of the respondents rating it their favorite, with Costa at 15%† (UK coffee market 2007). Today, political situation is stable marked by democratic processes and liberalization reforms. Strong political

Thursday, October 17, 2019

Education - Curriculum Essay Example | Topics and Well Written Essays - 1000 words

Education - Curriculum - Essay Example Research though different than evaluation is a necessary component of curriculum evaluation. Curriculum evaluation is an ongoing process that does not begin at the end of curriculum delivery; instead formative and summative evaluations are used conjointly to create a comprehensive view of the curriculum. Likewise, all those in contact with the curriculum from the teachers to the curriculum design specialist enact curriculum evaluation. This model provides a functional example of curriculum evaluation in which all aspects of the curriculum are evaluated and analyzed for program improvement. Asking the right questions requires understanding of the desired goals in each area of the curriculum. Evaluating educational goals complete with their objectives in each area are the first step in assessment of the curriculum. Curricular components that should be addressed are; is the curriculum relevant, is there a balance in the curriculum, is the curriculum integration desirable, is the curriculum properly sequenced, is there a continuity of programs, are learning’s transferable, is the scope of the curriculum adequate, realistic, and are curricula well articulated between levels (Oliva, 2003)? Understanding the goals for curriculum and students in these areas is the first key to curriculum evaluation. The curriculum specialist must know the key component goals in order to evaluate effectiveness and areas of needs. Asking questions requires research and evaluation. It is important to note that although closely related, evaluation and research, in the curriculum evaluation process are separate tools that combine to create a functional analysis of a program. Evaluation is the process, which determines the effectiveness of a program. Evaluation answers questions such as; is the scope of the curriculum realistic, is the sequence appropriate, is the curriculum age-appropriate, is the curriculum relevant

The Politics of Organisational Change Essay Example | Topics and Well Written Essays - 2500 words

The Politics of Organisational Change - Essay Example This is a change from transactional leadership, a traditionalist governance system where rewards are strictly contingent on performance from a functionalist perspective. Trust-based philosophies in transformational leadership are designed to foster job role autonomy and flexibility, thus promoting employee freedom to ensure dedication and loyalty to meeting organisational objectives. The multiple constituencies perspective is inter-linked with chosen management philosophy as it relates to connecting with subordinate personnel with recognition of emotions and psychological needs related to their decision-making power in the organisation. It is not until these needs are satisfied that change can be enacted successfully as constituencies in the organisation respond according to perception of politics rather than the tangible realities of change, politics and organisational design. The politics of change and psycho-social considerations The multiple constituencies approach to organisational development recognises the foundations and validity of the psychological contract as a template methodology for enacting more consensus-based organisational changes. This post-modern approach to managing people and leading them through organisational change practices rejects unitarism as a viable management strategy, a system of governance that is centralized and control is established through non-consensus governance actors (Grieves). Effectively, in order to attain commitment and adherence to change practices, the subordinate constituency must be granted recognizable power-sharing opportunities throughout the change processes to promote perceptions of autonomous working environments; a lean toward organisational democracyÃ'Ž. However, in order for a legitimate and true democracy to exist, it must sustain seven distinct characteristics. These are freedom, openness, trust, transparency, fairness, equality and accountability (Bar rett 2010). â€Å"If there is no consensus within organisations, there can be little potentiality for the peaceful resolution of political differences associated (with change)† (Almond and Verba, p.251). Planned change, such as the push and pull factors identified through Force Field Analysis, dictate the need for negotiated strategies in order to maximise positive change outcomes. For instance, when fear of change is identified as it relates to a specific change goal, fear can be mitigated through more effective interpersonal communications between governance and subordinate work teams or promoting job security as part of the psychological contract. In this case, the leadership of the organisation appeals to the foundational needs of employees as identified in the fundamental Hierarchy of Needs promoted by

Wednesday, October 16, 2019

Education - Curriculum Essay Example | Topics and Well Written Essays - 1000 words

Education - Curriculum - Essay Example Research though different than evaluation is a necessary component of curriculum evaluation. Curriculum evaluation is an ongoing process that does not begin at the end of curriculum delivery; instead formative and summative evaluations are used conjointly to create a comprehensive view of the curriculum. Likewise, all those in contact with the curriculum from the teachers to the curriculum design specialist enact curriculum evaluation. This model provides a functional example of curriculum evaluation in which all aspects of the curriculum are evaluated and analyzed for program improvement. Asking the right questions requires understanding of the desired goals in each area of the curriculum. Evaluating educational goals complete with their objectives in each area are the first step in assessment of the curriculum. Curricular components that should be addressed are; is the curriculum relevant, is there a balance in the curriculum, is the curriculum integration desirable, is the curriculum properly sequenced, is there a continuity of programs, are learning’s transferable, is the scope of the curriculum adequate, realistic, and are curricula well articulated between levels (Oliva, 2003)? Understanding the goals for curriculum and students in these areas is the first key to curriculum evaluation. The curriculum specialist must know the key component goals in order to evaluate effectiveness and areas of needs. Asking questions requires research and evaluation. It is important to note that although closely related, evaluation and research, in the curriculum evaluation process are separate tools that combine to create a functional analysis of a program. Evaluation is the process, which determines the effectiveness of a program. Evaluation answers questions such as; is the scope of the curriculum realistic, is the sequence appropriate, is the curriculum age-appropriate, is the curriculum relevant

Tuesday, October 15, 2019

Investigating the relationship between personality and Leadership Essay

Investigating the relationship between personality and Leadership - Essay Example One such example is application of the trait theory of personality to the leadership skills displayed by Jack Welch when he was the CEO of GE. The definition of personality as a group of traits owes a lot to Raymond Cattell who fully supported the idea of a personality being formed as a mixture of various elements (Statt, 2004). He presented sixteen different factors which affect human personality and considered them to be the source traits from which other traits were to be found in humans. The collection of these traits and the way a person responds to various situations creates a surface persona which we think of as the personality of an individual (Plucker, 2007). Cattell’s research shows us that personality plays a great role in how people react to situations and leaders are one group of people who often have to respond to changing situations on a rapid basis (Plucker, 2007). They may also have to guide and lead people towards a given goal, share their vision with the followers and motivate the followers when their intrinsic motivation is lacking. Such constructs of personality are certainly supported by research as well as business analysts of which Welch (2005) reports that leadership connects deeply with the personality of an individual. Leadership itself is a rather difficult term to define because many different philosophers, thinkers and even business professionals have give different meanings for it. However, the general directions given by analysts like Welch (2005), Byrne (1998) and Gardner (1995) have several common points with the definition given by House (2004) who states that the quality of leadership is, â€Å"The ability of an individual to influence, motivate, and enable others to contribute toward the effectiveness and success of the organizations of which they are members (House, 2004, Pg. 15)†. With this definition, the importance of leadership in business can be fully understood if it is applied to the

Anti-Colonialism and Education Essay Example for Free

Anti-Colonialism and Education Essay In Anti-Colonialism and Education: The Politics of Resistance, George J. Sefa Dei and Arlo Kempf have given us a stimulating intellectual account of the issues surrounding the active attempt for educational liberation. The authors who have contributed to the volume have been well chosen to present creative approaches to this abiding problem in most of the world. As we engage the legacies of colonialism we are more certain today that the nonmaterial legacies are as important in our thinking as the material ones when we engage questions of resistance and recovery. The colonizer did not only seize land, but also minds. If colonialism’s in? uence had been merely the control of land that would have required only one form of resistance, but when information is also colonized, it is essential that the resistance must interrogate issues related to education, information and intellectual transformations. Colonialism seeks to impose the will of one people on another and to use the resources of the imposed people for the bene? t of the imposer. Nothing is sacred in such a system as it powers its way toward the extinction of the wills of the imposed upon with one objective in mind: the ultimate subjection of the will to resist. An effective system of colonialism reduces the imposed upon to a shell of a human who is incapable of thinking in a subjective way of his or her own interest. In everything the person becomes like the imposer; thus in desires, wishes, visions, purposes, styles, structures, values, and especially the values of education, the person operates against his or her own interest. Colonialism does not engender creativity; it sti? es it, suppresses it under the cloak of assistance when in fact it is creating conditions that make it impossible for humans to effectively resist. And yet there has always been resistance and there are new methods of resistance gaining ground each day. The intricacies of engaging colonialism are as numerous as the ways colonialism has impacted upon the world. Indeed, the political-economic, socialbehavioral, and cultural-aesthetic legacies of the colonizing process have left human beings with a variety of ways to confront the impact of those legacies. What we see in Anti-Colonialism and Education is a profound attempt to capture for the reader the possibilities inherent in educational transformation through the politics of resistance. Professors Dei and Kempf have exercised a judicious imagination in selecting the authors for the chapters in this book. Each author is an expert in the area of the topic, skilled in presentation of the facts based upon current theories, and articulate in the expression of a need for educators to understand the pressures ix FOREWORD both for and against colonialism. However, they all take the position that it is necessary to explore all formulations that might achieve a liberated sphere of education. Since education normally follows the dominant political lines in a country where you have colonial political principles you will ? nd colonial education. If you have the vestiges of past colonial practices, you will see those practices re? ected in the educational system. I remember a colleague from Algeria saying to me that when the French ruled the country the students learned that their ancestors were the Gauls. When independence came to Algeria, he said, the people were taught that their ancestors were Arabs. The fact that this was only true for those individuals who had Arab origins, and thirty percent did not have such ancestry, was uninteresting to the political agenda. And so it has been in every nation where you have a political intention to mold a country on the basis of domination you will also have resistance. One seems to go with the other regardless to how long the process seems to take to commence. This is not just an exciting work intellectually; it is a beautiful book edited with intelligence and executed with the kind of research and scholarship that will bring us back to its pages many times. Each author seems to feel the same desire to teach us to be truly human; that is enough for us to inaugurate our own anti-colonialism campaign in our schools and colleges. I shall gladly join the fray to make the world better. Mole? Kete Asante Elkins Park, PA 19027 USA x ACKNOWLEDGEMENTS This book could not have been completed without the political interest and will of the many people who shared their knowledge in this joint undertaking. While the task of re-visioning schooling and education for the contemporary learner and teacher may be daunting at times, we believe strongly that it is by no means insurmountable. In fact, we have a wealth of knowledge with which to help transform education into a process and practice that serves the needs of the collective. We hope this book will contribute to the debate and discussion of how to address not only the imperialization of knowledge but also the various forms of intellectual colonization that mask themselves as everyday academic truth and valid knowledge. George Dei would like to thank the students of his graduate level course, SES 3914S: â€Å"Anti-Colonial Thought and Pedagogical Challenges† in the fall of 2004 whose insights and discussions helped propel the vision for this collection. Arlo Kempf would like to thank Lola Douglas, Meghan Mckee and Randy Kempf for their support and loveliness. He would also like to thank George Dei and the contributors for their ideas and hard work over the duration of this project. We both owe a great deal of intellectual depth to our colleagues, peers and friends who constantly challenge us to think more deeply and avoid academic closure. It is in the actions and resistance of the people that theory is born and takes life – to all who struggle against colonialism without the privilege of a pen in hand, we thank and salute you. Our academic objective for the book was also shaped by a desire to let our community politics inform intellectual pursuits at all times. We want to thank Geoff Rytell, who initially helped proofread sections of the book, as well as Cheryl Williams for her ongoing support. Finally we say â€Å"thank you† to Joe Kincheloe, Shirley Steinberg and Peter de Liefde who made this book a reality. George Dei Arlo Kempf xi GEORGE J. SEFA DEI INTRODUCTION: MAPPING THE TERRAIN – TOWARDS A NEW POLITICS OF RESISTANCE INTRODUCTION I begin this chapter with a question germane as to why and how we articulate anticolonial thought. Informed by Steven Biko’s (1978) earlier work, I ask: â€Å"Why is it necessary for us as colonized peoples to think and re? ect collectively about a problem not of our creation i. e. , the problem of colonialism? † This question is central since colonialism has not ended and we see around us today various examples of colonial and neo-colonial relations produced within our schools, colleges, universities, homes, families, workplaces and other institutional settings. It is often said that globalization is the new word for imperialism. History and context are crucial for anti-colonial undertakings. Understanding our collective past is signi? cant for pursuing political resistance. Haunani-Kay Trask (1991) writes about the importance of the past to Indigenous peoples as a way to challenge the dominant’s call to amputate the past and its histories. For the people of Hawaiia, Trask notes that â€Å"we do not need, nor do we want [to be] liberated from our past because it is source of our understanding . . . [We] . . . stand ? rmly in the present, with [our] back to the future, and [our] eyes ? xed upon the past, seeking historical answers for present-day dilemmas† (p. 164). In order to understand the knowledge and resistance of the past as it relates to contemporary politics of resistance, one has to know and learn about this past. As noted elsewhere (Dei, 2000, p. 11), for colonized peoples decolonization involves a reclamation of the past, previously excluded in the history of the colonial and colonized nations. They must identify the colonial historical period from the perspectives of their places and their peoples. Knowledge of the past is also relevant in so far as we as people must use that knowledge â€Å"responsibly†. But our situatedness as knowledge producers and how we perform â€Å"the gaze† on subjects, at times accord power and privilege to some bodies and not others. Therefore, an anti-colonial struggle must identify and de? ne a political project and show its connections to the academic engagement. Franz Fanon and Karl Marx have both cautioned us that â€Å"what matters is not to know the world but to change it†. This assertion calls for a recognition of the multiple points/places of responsibility and accountability. For example, what does it mean to talk of accountability as far as identity and subjectivity, however complex? It may well mean taking the stance that in political work for change, certain issues are not negotiable. In other words, we need to see there are limits and possibilities of â€Å"negotiating† in anti-colonial struggles and politics. As Howard (2004) asks: How much can be G. J. S. Dei and A. Kempf (eds. ), Anti-Colonialism and Education: The Politics of Resistance, 1–23.  © 2006. Sense Publishers. All rights reserved. DEI accomplished if we decide to â€Å"negotiate† around domination or oppression? Are we negotiating as part of a democratic exercise? Rabaka (2003) has argued that â€Å"one of the most important tasks of a critical anti-colonial theory . . . is to capture and critique the continuities and discontinuities of the colonial and neocolonial in order to make sense of our currently . . . colonized life and . . . worlds† (p. 7). Therefore as we begin to ? esh out anti-colonial theory and practice, it is ? tting to ask some critical questions (see also Butler, 2002): Is there still a colonized South? What about a colonized North? Do we think of neo-colonialism/colonialism/post-colonialism as bridges, as new articulations, or as a continuation with no marked differentiation? What is â€Å"post† about/in the â€Å"post-colonial†? Is the theoretical distinction between neo-colonialism and colonialism spurious at best? What are the purposes and underlying intentions of making such distinctions? What are the convergences and the divergences in post-colonial and anti-colonial thoughts? Does â€Å"neo† in neo-colonial mean â€Å"new†, or â€Å"transformed†? What is neo-colonialism? What are its antecedents and its marked practices? What are the mechanisms and institutions that constitute neo-colonialism? Why do we speak of neo-colonialism and not anti-colonialism? Are the structures, practices and ideas which enable colonialism really that different from those of neo-colonialism? Are the differences between neo-colonialism and colonialism more than theoretical? Whose interests are advanced in speaking of neo-colonialism/post-colonialism? What are the [dis]junctures and [dis]continuities between colonialism and neo-colonialism? How do discursive forces and material aspects interact to further our understanding of colonial? How do we speak of power, coercion, subjectivity, agency and resistance in anti-colonial discursive practice? What are the relations between neo-colonialism and White supremacy? The book does not presume to offer full answers to all these questions. But it is hoped the discussions that follow offer some entry points into a new politics of engagement towards the formulation of a critical anti-colonial lens. The power of the anti-colonial prism lies in its offering of new philosophical insights to challenge Eurocentric discourses, in order to pave the way for Southern/indigenous intellectual and political emancipation. In this discussion, anti-colonial is de? ned as an approach to theorizing colonial and re-colonial relations and the implications of imperial structures on the processes of knowledge production and validation, the understanding of indigeneity, and the pursuit of agency, resistance and subjective politics (see also Dei and Asgharzadeh, 2001). Colonialism, read as imposition and domination, did not end with the return of political sovereignty to colonized peoples or nation states. Colonialism is not dead. Indeed, colonialism and re-colonizing projects today manifest themselves in variegated ways (e. g. the different ways knowledges get produced and receive validation within schools, the particular experiences of students that get counted as [in]valid and the identities that receive recognition and response from school authorities. The anti-colonial prism theorizes the nature and extent of social domination and particularly the multiple places that power, and the relations of power, work to establish dominant-subordinate connections. This prism also scrutinizes 2 INTRODUCTION and deconstructs dominant discourses and epistemologies, while raising questions of and about its own practice. It highlights and analyzes contexts, and explores alternatives to colonial relations. Loomba (1998) sees colonialism as signifying â€Å"territorial ownership† of a place/space by an imperial power, while imperialism on the other hand is the governing ideology for such occupation. Anti-colonial thought works with these two themes/projects – colonialism and imperialism as never ending. The colonial in anti-colonial however, invokes much more. It refers to anything imposed and dominating rather than that which is simply foreign and alien. Colonialism reinforces exclusive notions of belonging, difference and superiority (Principe, 2004). It pursues a politics of domination which informs and constructs dominant images of both the colonizer and the colonized (Memmi, 1969). Colonialism is not simply complicit in how we come to know ourselves and its politics. It also establishes sustainable hierarchies and systems of power. Colonial images continually uphold the colonizers’ sense of reason, authority and control. It scripts and violates the colonized as the violent â€Å"other†, while, in contrast, the colonizer is pitted as an innocent, benevolent and [imperial] saviour (see also Principe, 2004). This historical relationship of the colonizer and colonized continues to inform contemporary subject identity formation and knowledge production. It shapes and informs identities by recreating colonial ideologies and mythologies (Tuhiwai-Smith, 1999). In theorizing the anti-colonial discursive framework, I would highlight some key salient points. All knowledge can be located in the particular social contexts from which it emerges. Such location shapes the ways of knowing and understanding the social and political relations at play in constructing social realities. The anti-colonial prism takes the position that all knowledges are socially situated and politically contested. The anti-colonial discourse is situated in colonial relations of power that are contested through resistant practices against domination and oppression. In working with resistant knowledges, the liberating in? uence of critical anti-colonial discourse becomes clear. The anti-colonial discourse works with the idea of the epistemological power of the colonized subjects. The colonial knowing is situated and informed within particular social contexts (see also Harding, 1996). Such â€Å"situated knowledges† (hooks, 1991; Collins, 1990) also point to the importance of subjectivity, positionality, location and history. In this regard, the anti-colonial referent is to the epistemologies about, and of, marginalized, colonized subjects. Particular and different interests are served by knowledge systems, and the anti-colonial aim is to subvert dominant thinking that re-inscribes colonial and colonizing relations. The ability and strength of the anti-colonial prism to draw upon different discursive traditions to explain social and political phenomena is an important strength for multiple knowings. But anti-colonial thought, while borrowing from other theoretical frameworks, is not constrained by dominant epistemologies. It calls for a critical awareness of the social relations and power issues embedded in the ways of organizing the production, interrogation, validation and dissemination of knowledge in order to challenge social oppression and 3 DEI consequently subvert domination. It also calls for acknowledging accountability and power. Since the burden of oppression is not shared equally among groups, and that even among the oppressed we are not all affected the same way (see also Larbalestier, 1990), we must all be able to address questions of accountability and responsibility of knowledge. It is within such a context that one must evaluate the politics of anti-colonial thought, in its call for a radical transformation of the analytical and conceptual frames of reference, used both in the academy and in mainstream public discourse so that the minoritized, subjugated voice, experience and history can be powerfully evoked, acknowledged and responded to. Unless we are able to articulate the grounds on which we share a dialogue and challenge the power relations of knowledge production, we will be shirking the responsibility of acting on our knowledge. The academic project of anti-colonial thinking and practice is to challenge and resist Eurocentric theorizing of the colonial encounter. Such Eurocentric theorizing is best captured in representations of minoritized/colonized bodies and their knowledges, and through the power of colonial imageries. The anticolonial critique also deals with interrogations of colonial representations and imaginaries examining processes and representations of legitimacy and degeneracy through the mutually constitutive relations of power. Colonialisms were/are practised differently; they differ in their representations and consequently have myriad in? uences, impacts and implications for different communities. Colonial practices can be refracted around race, gender, class, age, disability, culture and nation as sites of difference. In many ways the â€Å"anti-colonial thought† is the emergence of a new political, cultural and intellectual movement re? ecting the values and aspirations of colonized and resisting peoples/subjects. The Western academy cannot continue to deny the intellectual agency of colonized peoples. As resisting subjects, we will all have to confront and deal with the historic inferiorization of colonial subjects, and the devaluation of rich histories and cultures. What is required is critical educational praxis that is anchored in anti-colonial thought to challenge and subvert the â€Å"Western cultural and capital overkill†, and shed the insulting idea that others know and understand us [as colonized subjects] better than we understand ourselves (see also Prah, 1997, pp. 19–23). Colonized peoples require an anti-colonial prism that is useful in helping to disabuse our minds of the lies and falsehoods told about our peoples, our pasts and our histories (see also Rodney, 1982). We need to present anti-colonial discourse as a way to challenge Eurocentric culture as the tacit norm everyone references and on which so many of us cast our gaze (Kincheloe and Steinberg, 1998, p. 11). This approach to anti-colonial discursive thought and practice is also informed by the academic and political project calling for knowledge that colonised groups can use to ? nd authentic and viable solutions to our own problems. In this struggle we can point to some positive developments. For example everywhere today, we (as colonized peoples) are reclaiming and reinvigorating our marginalised, and in some cases, lost voices and are speaking for ourselves. Within educational academies in North America and in the South, there 4