Thursday, December 26, 2019

How to Research Loyalist Ancestors

Loyalists, sometimes referred to as Tories, Royalists, or Kings Men, were American colonists who remained loyal to the British Crown during the years leading up to and including the American Revolution (1775–1783). Historians estimate that as many as 500,000 people —fifteen to twenty percent of the population of the Colonies— opposed the revolution. Some of them were active in their opposition, actively speaking out against the rebels, serving with British units during the war, or supporting the King and his forces as couriers, spies, guides, suppliers, and guards. Others were more passive in their choice of position. Loyalists were present in large numbers in New York, a refuge for persecuted Loyalists from September 1776 until its evacuation in 1783. There were also large groups in New Jersey, Pennsylvania and in the southern colonies of North Carolina, South Carolina and Georgia.1 Elsewhere they were a large minority of the population but least numerous in Mas sachusetts Virginia. Life as a Loyalist Because of their beliefs, Loyalists in the Thirteen Colonies were often treated as traitors. Active Loyalists may have been coerced into silence, stripped of their property, or even banished from the Colonies. In areas under Patriot control, Loyalists could not sell land, vote, or work in occupations such as doctor, lawyer, or schoolteacher. The outright hostility against the Loyalists both during and following the war ultimately resulted in the flight of about 70,000 Loyalists to British territories outside the colonies. Of these, approximately 46,000 went to Canada and Nova Scotia; 17,000 (primarily Southern Loyalists and their slaves) to the Bahamas and West Indies; and 7,000 to Britain. Among the Loyalists numbered not only colonists of British heritage, but also Scots, Germans, and Dutch, plus individuals of Iroquois ancestry and former African-American slaves. Begin with a Literature Survey If you have successfully traced your ancestry back to an individual living in America during the American Revolution, and clues seem to point to him being a possible Loyalist, then a survey of existing published source materials on Loyalists is a good place to begin. Many of these can actually be researched online through free sources that publish digitized version of historical books and journals. Use search terms such as loyalists or royalists and your area (state or country of interest) to explore available resources online in Google and in each of the historical books collections listed in 5 Free Sources for Historical Books Online. Examples of what you can find online include: Siebert, Wilbur H. The Loyalists of Pennsylvania. The Ohio State University Bulletin, 24 (April 1920). Digitized copy. Archive.org. http://archive.org/stream/pennsyloyalist00siebrich#page/n3/mode/2up : 2013.Lambert, Robert Stansbury. South Carolina Loyalists in the American Revolution, second edition. Digital book. Clemson: Clemson University Digital Press, 2010. http://www.clemson.edu/cedp/cudp/pubs/lambert/lambert.pdf : 2013. When searching specifically for historical publications, try various combinations of search terms such as United Empire Loyalists or loyalists pennsylvania or south carolina royalists. Terms such as Revolutionary War or American Revolution can turn up useful books as well. Periodicals are another excellent source of information on Loyalists. To find articles on this topic in historical or genealogical journals, conduct a search in PERSI, an index to over 2.25 million genealogy and local history articles appearing in publications of thousands of local, state, national and international societies and organizations. If you have access to a university or other large library, the JSTOR database is another good source for historical journal articles. Search for Your Ancestor in Loyalist Lists During and after the Revolution, various lists of known Loyalists were created which may name your ancestor. The United Empire Association of Canada has probably the largest list of known or suspected Loyalists. Called the Directory of Loyalists, the list includes about 7,000 names compiled from a variety of sources. Those marked as proven, are proven United Empire Loyalists; the rest are either unproven names found identified in at least one resource or those who have been proven NOT to be Loyalists. Most of the lists published during the war as proclamations, in newspapers, etc. have been located and published. Look for these online, in U.S. state archives, in Canadian provincial archives, and in archives and other repositories in other areas where Loyalists settled, such as Jamaica. --------------------------------Sources: 1. Robert Middlekauff, The Glorious Cause: The American Revolution, 1763–1789 (New York: Oxford University Press, 2005), pp 549–50.

Wednesday, December 18, 2019

Analysis Of The Book The 57 Books By Elie Wiesel

EXPOSITION: Night, in its original Yiddish form, was the first of the 57 books written by Elie Wiesel till date. The book titled Un di velt hot geshvign (And the World Remained Silent) in Yiddish, was published in abridged form in Buenos Aires, Brazil. Wiesel rewrote a shortened version of the manuscript in French, which was published as the 127-page La Nuit, and later translated into English as Night. The book gives a detailed and heart wrenching first person account of the activities that took place in the concentration camps under the Nazi rule during the Second World War. It describes how Elie, then a small boy, was severed from his mother and sister forever, and how he lost his father, his faith and also the will to survive by the end of his unimaginable ordeal. At first, the book did not become very popular because it brought forward the darkest zone of humanity; it broached a topic that the world wanted to leave untouched, forgotten. But that is exactly what Wiesel did not want to let happen. One of the great successes of this hugely appreciated and critically appraised book was that it managed to bring out the stark reality of the concentration camps, the Nazis, the Polish and all the people in the world who kept silent on the face of such atrocities meted out to their fellow citizens. Wiesel once remarked that the opposite of good was not evil, but indifference. The horror of the Holocaust was not only the acts committed by a section of people but the fact that aShow MoreRelatedTeaching Reasoning Methods in the Classroom Essays2083 Words   |  9 Pagesadd up to analysis. Analysis is a more exact process than simply playing critic. In An Introduction to Student Involved Assessment for Learning, Rick Stiggins (2012) walks the reader thro ugh a variety of reasoning methods including but not exclusive to analysis, synthesis, and evaluative reasoning. He helps the reader to understand the importance of the cognitive processes behind education and how sometimes the means are more valuable than the ends. According to Stiggins (2012), analysis involvesRead MoreAwareness6564 Words   |  27 Pagessocialisation and a better transmission of memories.20 Schacter21 highlights the primordial role that literature and the arts in general play in the recalling of memories and in the construction of autobiographical memory and â€Å"narrative identity.†22 The analysis of numerous literary works has indeed shown that it is through the writing process that memory is constructed and that seemingly lost memories can re-emerge. For instance, Marcel Proust considered the â€Å"search for lost time,† or the â€Å"remembrance of

Tuesday, December 10, 2019

Understanding the IT Virtualization Concepts

Question: Describe about the Understanding the IT Virtualization concepts, solutions and patterns in todays Organizations? Answer: Executive Summary The technology keeps on developing, and the need for generating virtual systems for refreshing the behavior of the real environment has become a major role of the IT software providers. For making a virtual environment, IT professionals have to use virtualization through developing a server implementation, investigating the requisition or operating system renovation as well as examining the use of software technology in the development habitat. This study has demonstrated the use of virtualization considering Citrix as the case organization. The study has shown that the importance of IT virtualization is increasing with a great speed where many business territories like Citrix are using virtualization to sprint live arrangement of servers to provide discharge, privacy, reliability and a nominal cost for hardware possession. With the help of server virtualization environments one hardware platform is able to deliver many servers or remote agency. The study has also revealed that different vendors are providing software and hardware virtualization results to the customers. This report enables the user to access either server-based virtualization or desktop-based virtualization. Developing a virtualization environment requires an understanding of the host system and its shortcomings including the need of the guest operating system. The overall study of this report encourage the reader to explore how virtualization can be imple mented in an organization and what are the possible steps for maintaining virtualization solution. 1.0 Introduction Virtualization is a software technique, which allows running numerous operating systems and different applications on the identical server at the same time (Lim et al. 2015). In the field of computing, the act of creating a virtual version of any technology includes virtual operating system, virtual storage gadget, and several resources of computer network (Li et al. 2013)). The implementation of virtualization in different IT services enables to transform the IT scenario. To perform this study, Citrix System has considered as the case organization. It is a multinational software company whose primary motive is to develop mobile workspace technologies, which comprises of virtualization, networking, mobility management, and cloud services (Hodge et al. 2012). In the first section, the evaluation of current virtualization solutions is mentioned which has been adopted by any organization. The later discussion contains potential benefits of virtualization and assessment of the technology requirements for improving the productivity of the chosen group. At the same time, an analysis of the needs for implementing virtualization and designing of a virtualization solution by a preexisting virtualization technique has been discussed. Systematic testing of virtualization environment in the chosen company and identification of the critical environmental factors within the enterprise that have a great impact on its virtualization solution has been discussed. Documentation and analysis of the test results of the test carried out in the previous section and how it impacts on the virtualization solution of the organization chosen. In the last part of the report monitoring the virtualization environment of the selected organization, measures that can be taken by the chosen company to maintain a virtualization have been discussed. Understanding the Commercial Impact and Potential of Virtualization Current Virtualization Solutions in an organization In this, new era of science and technology, application of computer-networking is getting sophisticated which results in demanding network security issues. Notably, virtualization in small enterprises is reducing the time disbursed on daily IT administrative tasks, like managing and summing up of new server tasks at hand, the addition of new employees or enlarging and projecting new applications. These techniques serve the business needs of the small enterprises (Marakas et al. 2014). Some companies like Citrix System, VMware, Oracle, Red Hat, Oracle, Amazon, Google, Virtual Bridges, Parallels, Proxmox etc. are providing the best software solutions are using virtualization (Demestichas et al. 2013). Examples of small and medium sized organizations that are using virtualization solutions are VMware and Proxmox. (Bennett et al. 2012). The virtualization solutions implemented in VMware are VMware vSphere Essentials Plus, VMware vCloud Suite and VMware Horizon Suite. (Tsugawa et al. 2012). The application of VMware vSphere Essentials Plus is to start quickly the virtualization in small organizations and allows gaining the interest of server association and business progression (Lim et al. 2015). VMware vCloud deals with providing the components to convey infrastructure as a supply and rapidly evolve a data center into an easy moving private cloud. VMware Horizon Suite allows IT to convert physical and virtual applications and desktops into consolidate IT services that can be delivered safely to end users on their devices. (Tzanakaki et al. 2013). On the other hand, Proxmox implemented two virtualization solutions that are, Proxmox Mail Gateway and Proxmox virtual environment. A full virtualization management explanation is explained by Proxmox virtual environment, which is based on KVM and storage virtualization. While Proxmox mail gateway is a displayed mail proxy resulting in virus and spam filtering. It protects the mail server contrary to all email threats (Tzanakaki et al. 2013). Examples of two large organizations include Amazon and Google. Virtualization solutions used in Amazon includes paravirtual (PV) and hardware virtual machine (HVM). (Marakas et al. 2014). PV AMIs enables booting with a special boot loader named as PV-GRUB, which outset the boot cycle and then order loads the kernel mentioned in the menu (Li et al. 2013). HVM AMIs replenishes the strength to run an operating system precisely on top of a virtual machine beyond any adjustment (Yemini et al. 2013). On the other hand, Google uses Ganeti, which is a virtualization solution and helps in disk formation, OS installation, migration, creation and shutdown and can be recycled to shift a virtual machine slender by a physical system preemptively (Christensen et al. 2012). Potential benefits of virtualization Proper utilization of virtualization solution enhances the effectiveness of hardware with appropriate care to solve the problem if any. In the todays world of IT enterprises, the application of latest technologies that enables businesses to rise gradually thereby meeting customer needs (Christensen et al. 2012). Virtualization automation approves a virtual figure on an instrument, which is possibly re-imaged on other server when there is a failure in machine (Xavier et al. 2013). Virtualization of systems allows averting system striking caused due to software like device drivers. To get greater reliability, availability, and security VT-d for Directed I/O Architecture imparts methods for controlling the system devices in a better way using the construction of DMA and remapping of interrupt to individual the improved separation of I/O resources (Rost et al. 2015). Virtualization is adopted for collection of ineffective servers that can be exchanged against fewer machines. Moreover, software is tested even when separated in a safe virtual barriers and data centers can skillfully yield to new technologies, shifting work models and unstable corporate superiority using virtualization. Virtualization reduces the VMM complexities, upgrades reliability, allows protection and security, and improves the functionality, efficiency and performance (Tsugawa et al. 2012). The benefits that the selected company named Citrix is obtaining by virtualization include cloud-based storage techniques, XenApp, and XenDesktop (Kerravala et al. 2013. Cloud-based storage method allows Citrix to store the data of the customers in the cloud and enables to mobilize the date of the customers of Citrix, which they already contain (Demestichas et al. 2013). Now the application of XenApp is to transform Windows apps into a shielded mobile services, on the other hand, XenDesktop provides power to complete virtual desktops that are the applications of virtualization used in Citrix (Lim et al. 2015). Current technology requirements for implementing virtualization in a small medium enterprise Virtualization not only enhances the hardware regulation, but it also reduces the time that was taken to install a new server online. However, to implement IT virtualization technology, a small and medium size organization is required to be fulfilled the below mentioned requirements: The technology of virtual machine sprawl has become one of the primary concern facing by many small, medium enterprises that are using desktop and server virtualization (Yang et al. 2013). The ability for creation of virtual machines without the controlling and disciplinary acts of the physical world resulting in devices being provided unnecessarily Email, messaging, databases and storage facilities are the examples of information technology that encounters sprawl issues and are solved by virtual machine sprawl (Sun et al. 2013). The egenera vBlade technology provides support to the processor that can install the intricacy and restore all the trouble created by alteration of the hosts and the OS systems (Rost et al. 2015). It virtualizes and manages resources on a frame comprised of two-socket and four-socket x86 servers including storage and switches (Demestichas et al. 2013). The enterprise that has the unified content platform can debug and modify all the mistakes made by the cloud technology (Bennett et al. 2012). The free products could be handled by setting up the applications and the platforms which actually tries to debug and bring an approach (Uddin et al. 2012). Some of them are: VMware Ready seeks to implement proper management and mechanization that support the system against all features. Embedded OEM tried to evolve the coding stream, which has a business comprises of logging and automation services. ISV Centre focuses on the machines that can handle the physical mobility and manage the different platform levels. VMware Solution Exchange provides more concrete solutions by tracing the applications that are essential to execute the outcome and decide confidence (character). Each organization has some unique requirements, and similar steps are intricate in creating a good technology plan (Peng et al. 2013). Centric Systems can implement these five steps in developing technology plan: Firstly, the accessible technology strategy must be defined to clarify that whether the proposed technology can be used in the business or not (Drutskoy et al. 2013). Secondly, a comprehensive set of necessity has been developed to describe the accessibility requirements of Citrix and thereby assessing the latest technology (Dong et al. 2012). Thirdly, the purchasing of accessible technology is required, and identification of internal technology systems is needed to increase accessibility (Khan et al. 2012). Fourthly, when the accessible technology is available in addition to new technology it can be forwarded to Centrix Systems. This step also includes increasing awareness within employees about the opportunity of affordable technologies, and the employees must be trained to use accessible features (Tsugawa et al. 2012). Lastly, the available technology that has been implemented on Citrix Systems is required to be maintained, and success is evaluated including opportunities for improvement. Be able to design virtualization deployments. Needs analysis for a virtualization deployment in an organization Citrix Systems provides application and desktop virtualization, enabling to have a complete, flexible result that supplies Windows applications and desktops to all users on available devices while securing necessary information in the data center (Khan et al. 2012). Using virtualization in Citrix reduces VMM complexities, it enhances reliability, protection and certainty, improves the functional operations, and improves the performances (Kerravala et al. 2013). Streamlined implementation and lifecycle management reduce desktop and application management costs. Implementing virtualization process leads to delivery of apps and desktops on demand, without working for hours to prepare traditional hardware and thereby build focus on business initiatives (Drutskoy et al. 2013). Design of a virtualization solution for a given virtualization implementation in an organization Virtualization is a hardware / software solution that enables multiple operating systems to work on a single hardware system. In an organization like Citrix, the following designing methodologies can be implemented to get best IT solutions: Storage virtualization can be used in Citrix Solutions that can ensure the best performance involved with storage I/O real and virtual servers (Uddin et al. 2012). Network access virtualization facilitates production of any application containing high network activity, which will be influenced without committed NICs or a robust network virtualization solution (Sun et al. 2015). Memory and CPU virtualization is required in Citrix not over to commit virtual storage in a single operating system (Dong et al. 2012). To neglect the critical situations created by harmoniously active virtual machines may not outreach the actual memory (Hodge et al. 2012). Be able to implement virtualization deployments Steps taken to maintain virtualization solution Citrix System applies IT virtualization rostrum, and different steps are need to be followed to get a proper performance of the virtualization techniques. The steps that need to be taken by Citrix System to maintain virtualization solutions are: Step 1: Choosing of a proper virtualization solution Before implementing virtualization solution in Citrix, the appropriate virtualization solution is needed to be adopted. In general, two methods are available which can organize centralized thin-client background for customers including virtual desktop infrastructure (VDI) and remote access terminal services. Citrix system has an option to use XenApp as remote access terminal services (Jain et al. 2013). Step 2: Assessment of the network before implementation of virtualization In this step, the Citrix System need to investigate the network and must check whether satisfactory bandwidth is available or not. Moreover, enough bandwidth is required to be maintained to guide the peak load of all virtual desktop users (Lim et al. 2015). Step 3: Development of a desktop virtualization server scheme In this step, Citrix System needs to use server supervising tools to accumulate and dispatch data about the systems resource implementation (Xavier et al. 2013). If there is a failure in the server, then all the virtual desktops will breakdown and to avoid such circumstances the virtual desktops need to spread across multiple servers (Yemini et al. 2013). Step 4: Up gradation of storage to support desktop virtualization In this step, desktop virtualization settles every PC's data on servers. Hence, the data center SAN requires enough additional storage to host all the virtual desktops (Bennett et al. 2012). Citrix need to estimate their customers repository requirements and combine this extra storage with current SAN environments before implementing desktop virtualization (Peng et al. 2013). Step 5: Requirement of protocol interoperability and graphics acceleration hardware Citrix system may use Microsofts Remote Desktop Protocol (RDP) and the Independent Computing Architecture (ICA) to exchange the client-server data (Tzanakaki et al. 2013). The company must also be aware of whether their customers desktop endpoints are suited with the virtualization protocols or not (Kerravala et al. 2013). Latest rules are designed to implement graphics acceleration hardware and virtualization software named CAD is used which can still strive software-based protocols (Christensen et al. 2012). Step 6: Implementation of desktop virtualization in phases For maintaining desktop virtualization, Citrix system needs to prepare a mockup application in laboratory using apparatus that is relevant to their customers and also refreshing workloads to construct for real deployments (Yang et al. 2013). Step 7: Aggressiveness with endpoint security Citrix System needs to perform due assiduity when implementing desktop virtualization to firm each endpoint attacking. Effective endpoint security allows virtualization less acceptable that customers will alter their local operating systems or create other changes to the endpoint (Tsugawa et al. 2012). Systematic testing of virtual environment and its usefulness in Citrix System Virtualization is IT field provides many desktop virtualization solutions. Several virtualization techniques are available in Citrix, which includes server, desktop virtualization application, networking, cloud computing techniques and software as a service (Rost et al. 2015). The applications provided by Citrix solution includes: Request for mobilizing apps and desktops- XenApp- It is a virtualization solution, which allows accessing to Windows applications and desktops independent of the machine (Hodge et al. 2012). XenDesktop- It is a virtualization solution which conveys Windows apps and desktops as a source of safe mobile services (Demestichas et al. 2013). With the help of XenDesktop, IT mobilizes the business, and the centralizing control minimizes the costs for intelligent belongings (Christensen et al. 2012). Application for managing enterprise mobility XenMobile- It is a virtualization solution, which conveys mobile device management (MDM), enterprise-grade productivity apps and mobile application management (MAM) (Khan et al. 2012). Application for optimizing and securing networks NetScaler- It is a web application distribution controller that creates applications run five times greater. CloudBridge- It is a common platform that enhances and associates applications, optimizes bandwidth usage beyond third party applications (Sun et al. 2015). Application for building cloud infrastructure XenServer- It is an open source virtualization environment that allows in managing server, cloud and desktop practical framework (Tzanakaki et al. 2013). Documentation and Analysis of the test results Citrix System is required to plan in an organized manner to obtain experimental findings in the virtualization solution as provided by them. IT needs to focus on data management, accessing of applications and data, managing of enterprise mobility, mobilizing of desktops and applications, optimization and security of networks, and need to build cloud infrastructure (Dong et al. 2012). The different techniques of virtualization solution enable the customers of Citrix to obtain a useful output. For accessing data Citrix receiver is used which allows access to applications, desktops and data quickly (Khan et al. 2012). For managing the enterprise mobility XenMobile, Worx Mobile Apps, and GoToAssist is used which helps in maintaining and securing apps, devices, and data (Kerravala et al. 2013).To mobilize apps and desktops XenApp, XenDesktop and XenClient are used. For optimizing and securing networks NetScaler and CloudBridge are used which allows the data center network to amend the del ivery of all web applications and CloudBridge advances user involvement and productivity by enabling rapid, safe remote access. To build the cloud infrastructure, Citrix is using CloudPlatform, CloudPortal Business Manager, and XenServer as their virtualization solutions (Khan et al. 2012). Be able to manage virtualization environments Monitoring the virtualization environment in Citrix Citrix provides the flexibility that carry out some complexity in the administration of virtualized infrastructure. It provides its single share of complications though virtualization is advantageous to IT operations (Hodge et al. 2012). Citrix is a cloud computing company that allows mobile workstyles. Its offers virtualization solutions for different requirements including: Citrix Receiver to access the data and applications. XenMobile, Worx Mobile Apps, and GoToAssist to manage the enterprise mobility. XenApp, XenDesktop and XenClient to mobilize the applications and desktops. NetScaler and CloudBridge used to optimize and to secure the networks. CloudPlatform, CloudPortal Business Manager and XenServer used to build the cloud infrastructure (Jain et al. 2013). Measures taken by Citrix to maintain a virtualization environment Scalability: Citrix system deals with the capability of the network it is applying for various applications. It supports the regular workloads. There are different hardware and software used as resources. Allocation of an additional capacity virtual machine is also used (Lim et al. 2015). Consolidation: To maintain the physical environment based on IT infrastructure, Citrix system need appropriate hardware, software, supply, storage device, RAM, etc. Every day the company is developing different products related to an application (Peng et al. 2013). Agility: The unparallel level of flaccidity and acuteness to the data center happens in virtualization. Citrix uses discrete components of software, which can develop various servers. Distribution of the hardware and software resources is done to get a fixed performance (Yemini et al. 2013). Reliability: When Citrix system uses costly hardware and software then failure may occur, error by human or potential failure. Whenever it is required the organization migrates a software object to physical hardware (Bennett et al. 2012). Critical review and analysis of overall impact of virtualization and impact on a business due to virtualization: In any business, the use of virtualization is much more essential. The business organizations are implementing virtualization for getting the following benefits: Lessen the operating expenses. Provide better reply by IT to appeal for new services. Increase SLAs on IT services (Xavier et al. 2013). Replenish business continuity. Improve the service given to the customers. If any business organization does not implement virtualization then the following consequences may occur: The cost of the application equipment will be increasing gradually. Minimize the business value of data centers. Lack efficiency in the work structure. Reduce the functionality and performance. 5.0 Conclusion: Virtualization solution is the most important aspect in IT sectors. Citrix system is an American software organization using virtualization or a potential combination of hardware and software to implement Windows application, desktop virtualization, and networking, cloud computing. It operates an integrated software service that tests the virtualization environment and identifies the critical factors and its solution. For high productivity in IT companies, virtualization solutions play the crucial role. References Bennett, S.M., Anderson, A.V., Neiger, G., Rodgers, D., Huntley, B.E. and Smith, L.O., Intel Corporation, 2012.Injecting virtualization events in a layered virtualization architecture. U.S. Patent 8,151,264. Christensen, C. and Wessel, M., 2012. Surviving disruption.Harvard Business Review,90(12), pp.56-65. Demestichas, P., Georgakopoulos, A., Karvounas, D., Tsagkaris, K., Stavroulaki, V., Lu, J., Xiong, C. and Yao, J., 2013. 5G on the horizon: key challenges for the radio-access network.Vehicular Technology Magazine, IEEE,8(3), pp.47-53. Dong, Y., Yang, X., Li, J., Liao, G., Tian, K. and Guan, H., 2012. High performance network virtualization with SR-IOV.Journal of Parallel and Distributed Computing,72(11), pp.1471-1480. Drutskoy, D., Keller, E. and Rexford, J., 2013. Scalable network virtualization in software-defined networks.Internet Computing, IEEE,17(2), pp.20-27. Hodge, P., 2012. Virtualizing Your Process Control Computers.Chemical Engineering Progress,108(1), p.22. Jain, R. and Paul, S., 2013. Network virtualization and software defined networking for cloud computing: a survey.Communications Magazine, IEEE,51(11), pp.24-31. Kerravala, Z., 2013. The Software-Defined Data Center is Key to IT-as-a-Service.Cell,301, pp.775-7447. Khan, A., Zugenmaier, A., Jurca, D. and Kellerer, W., 2012. Network virtualization: a hypervisor for the Internet?.Communications Magazine, IEEE,50(1), pp.136-143. Li, X., Bai, G., Liang, Z. and Yin, H., 2013, July. A software environment for confining malicious android applications via resource virtualization. InEngineering of Complex Computer Systems (ICECCS), 2013 18th International Conference on(pp. 208-211). IEEE. Lim, J., Song, S., Lee, S., Doo, S. and Yoon, H., 2015. The Design of a New Virtualization-Based Server Cluster System Targeting for Ubiquitous IT Systems. InUbiquitous Computing Application and Wireless Sensor(pp. 361-375). Springer Netherlands. Marakas, G.M. and O'Brien, J.A., 2014. Introduction to Information Systems.info: Singapore: McGraw Hill, 2014. Peng, S., Nejabati, R. and Simeonidou, D., 2013. Role of optical network virtualization in cloud computing [invited].Optical Communications and Networking, IEEE/OSA Journal of,5(10), pp.A162-A170. Rost, P., Berberana, I., Maeder, A., Paul, H., Suryaprakash, V., Valenti, M., Dekorsy, A. and Fettweis, G., 2015. Benefits and Challenges of Virtualization in 5g radio aCCess networks.Communications Magazine, IEEE,53(12), pp.75-82. Sinha, S., 2015, September. DynaSAN: Multipathing integration, load balancing failover over storage virtualization. InReliability, Infocom Technologies and Optimization (ICRITO)(Trends and Future Directions), 2015 4th International Conference on(pp. 1-5). IEEE. Sun, S., Kadoch, M., Gong, L. and Rong, B., 2015. Integrating network function virtualization with SDR and SDN for 4G/5G networks.Network, IEEE,29(3), pp.54-59. Tsugawa, M., Figueiredo, R., Fortes, J., Hirofuchi, T., Nakada, H. and Takano, R., 2012, June. On the use of virtualization technologies to support uninterrupted IT services: A case study with lessons learned from the Great East Japan Earthquake. InCommunications (ICC), 2012 IEEE International Conference on(pp. 6324-6328). IEEE. Tzanakaki, A., Anastasopoulos, M.P., Zervas, G.S., Rofoee, B.R., Nejabati, R. and Simeonidou, D., 2013. Virtualization of heterogeneous wireless-optical network and IT infrastructures in support of cloud and mobile cloud services.Communications Magazine, IEEE,51(8), pp.155-161. Uddin, M. and Rahman, A.A., 2012. Energy efficiency and low carbon enabler green IT framework for data centers considering green metrics.Renewable and Sustainable Energy Reviews,16(6), pp.4078-4094. Uddin, M., Talha, M., Rahman, A.A., Shah, A. and Ahmed, J., 2012. Green Information Technology (IT) framework for energy efficient data centers using virtualization.International Journal of Physical Sciences,7(13), pp.2052-2065. Xavier, M.G., Neves, M.V., Rossi, F.D., Ferreto, T.C., Lange, T. and De Rose, C.A., 2013, February. Performance evaluation of container-based virtualization for high performance computing environments. InParallel, Distributed and Network-Based Processing (PDP), 2013 21st Euromicro International Conference on(pp. 233-240). IEEE. Yang, M., Li, Y., Jin, D., Su, L., Ma, S. and Zeng, L., 2013, August. OpenRAN: a software-defined ran architecture via virtualization. InACM SIGCOMM computer communication review(Vol. 43, No. 4, pp. 549-550). ACM. Yemini, Y., Kliger, S., Florissi, D., Benjamin, S. and Rabover, Y., VMTurbo, Inc., 2013.Managing resources in virtualization systems. U.S. Patent 8,396,807.

Monday, December 2, 2019

Unethical business practices and their effects

Introduction In the contemporary world, businesses that comply with the rightful ethical conducts are decreasing drastically. In most businesses, at least one business practice is done in an unethical manner. The unethical practices in businesses are adversely affecting governments through the loss of taxes (George Jones, 2010). Consequently, the world economy is facing a crisis as businesses evade from paying taxes.Advertising We will write a custom term paper sample on Unethical business practices and their effects specifically for you for only $16.05 $11/page Learn More With globalization, companies are trying their best to reap maximum profits and outweigh their competitors’ profits at the expense of the global economy. Transparency and accountability is outdated as companies are aiming at one thing; to reap maximum profits at all cost. Cases have occurred where companies that had been involved in unethical practices clear their names in cour ts through bribery. The executives of such companies protect their brand names, and they fight to maintain the company’s reputation through corruption. At the end of the day, the government, employees, investors, competitors, and the customers suffer while the crooks enjoy the fruits of their unethical business practices. This paper will give a stringent analysis of the various unethical business practices and the effect that they have on the organization. The paper will bring in ideas, information, and examples of unethical business practices in major organizations. Unethical business practices and their effects on the organization Manipulation and exploitation of employees Employees are very essential stakeholders in any company because they determine the level of productivity of the company. However, some managers take advantage of defenseless employees to exploit them in one way or another. The vulnerable employees have no choice but to be submissive. Some unethical pract ices that harm the employers include low wages and unsafe working environment. Some employers have made it a routine to have their private cloakrooms while the other employees use unsanitary cloakrooms. Essentially, any practices that make the employees uncomfortable in the work place are unethical, as they do not comply with the federal working standards. We take an example of G4S Company, which is one of the largest private companies in the world. The company has a motto of delivering excellent services and maintaining the highest level of ethical standards. However, in the recent past, reports indicated that G4S did not adhere to its motto, and its ability to control its worldwide operations failed considerably.Advertising Looking for term paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The executives of the company have turned up to be violent towards their junior employees. The executives confront the employ ees; they pay then low wages, and increase pressures in the work environment (Hill Plimmer, 2013). Unethical business practices are likely to have adverse consequences to the organization. G4S is at the risk of destroying its reputation; therefore, the future of the company is at risk. The G4S Company has existed for decades and it has expanded globally, however, the company can collapse within a short period if its reputation is disputed. Currently, G4S’s has slipped in its ability to manage its global empire. It was so embarrassing that G4S was unable to supply enough security guards in a contract that would earn it massive profits during the 2012 Olympics. It is noteworthy that G4S operates in third world nations that have rampant corruption and fraud cases. There is a very high possibility of the G4S executives in such nations to be drawn into unethical practices that may further portray the company’s incompetency. Essentially, there are numerous fraud cases in th e management of the company, and those practices are driving G4S into the grave. Unfair competitive practices All business people aim at gaining a competitive advantage over their competitors to win the trust of many customers. Companies would spend millions of dollars to employ strategies that would enable them to enhance their sales. However, there are those business people who opt to employ unfair and unethical business practices that result into unfair competitive practices. Wal-Mart was a victim of unfair business practices in the recent past. The multinational company invested heavily to investigate and determine the extent to which its competitors adhere to the anti-bribery law. Wal-Mart did the investigation in Mexico, Brazil, China, and India, which are its major international markets. In its investigations, Wal-Mart discovered that its competitors were indeed violating the corruption act that guides foreign investors. One of the Mexican subsidiaries that happen to be Wal-M art’s major competitors had indeed paid bribes to be allowed to open new stores in Mexico (Clifford Barstow, 2012).Advertising We will write a custom term paper sample on Unethical business practices and their effects specifically for you for only $16.05 $11/page Learn More To make the matters worse, the subsidiary’s parent company suppressed the investigations through bribery. With regard to the mentioned allegations, there is a high possibility that the competitor company evades many other compliance payments to the government though bribery. The unfair competitive practices would only earn a company massive profits in the short run. However, upon investigation and publicity of the matters, the company will have its reputation destroyed. Unethical business practices as those practiced with Wal-Mart’s competitors will result into bad publicity, and the company may never win the publicity trust in the future even though it struggle s to employ ethical conducts. Moreover, if the courts decide to be very strict with such companies, they may be fined heavily. The executive may receive merciless jail terms and finally, the company may end up becoming bankrupt because of the high costs associated with unethical business practices. Bending the company rules In many companies, employees are obliged to submit to their supervisors and managers. They have to obey the authority and perform all their commands. In fact, junior employees have a tendency of alleging to their supervisors in every aspect. Therefore, regardless of how wrong an instruction is, the junior employees are sometimes obliged to abide by the rules of their supervisors and managers. It is noteworthy that performing unethical practices in the work environment is wrong regardless of where the orders came from. Some junior employees are obliged to withhold information regarding the unethical practices of their bosses for the fear of intimidation, which tha t is also unethical. In July 2 2010, the New York Times revealed the case of GlaxoSmithKline Company. The company’s director agreed to pay fines amounting to $3 billion because of promoting a drug for unapproved uses, and improper marketing for other drugs (Thomas Schmidt, 2012). Further investigations indicated that the company lured the doctors by enticing them with luxury trips and spa treatments. The company would meet the full payments of hunting excursions and all sorts of luxuries to win the doctors, and force them to promote some unapproved drugs. Moreover, GlaxoSmithKline financed the publishing of a medical journal that had manipulated clinical trial data to promote the use of the Paxil drug in children.Advertising Looking for term paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The highly sensitive information was very essential for the prosecutors to file charges against the GlaxoSmithKline Company, and it was very controversial to find out who disclosed those unethical practices. Sure enough, the whistle blowers were some of the employees of the company. Companies have to be warned that there is a whistle blower policy that rewards employees with substantial rewards. Essentially, whistle blowers earn a great share of the amount that the federal government recovers from the unethical business practices that they report. In fact, a policy guiding taxpayers against fraud has set aside about $10 billion to compensate the whistle blowers. Therefore, managers and supervisors should be warned that employees would be submitting to their unethical orders to set them up. Lack of transparency Companies are always obliged to portray transparency in all their activities. However, cases have occurred where company executives hide some controversial information from th e most important stakeholders of the company. Some companies will present false statements to the investors to clarify why they cannot afford to pay the dividends. Whenever the investors resolve to have the company investigated, the company managers and other executives resist the investigations. The executives of some companies have taken advantage of humble investors to mishandle their propriety. Some executives are even sued for creating false financial statements to deceive the investors. Moreover, company executives evade form paying the taxes using the false statements. Cases have occurred where auditors are bribed to certify false financial statements so that powerful companies can evade from paying the rightful amounts of taxes to the government. Company executives ought to know that legal lawsuits have adverse consequences to the company. Firstly, the court can impose heavy fines to the company, which can declare it bankrupt. The court can order the suspension of the compan y’s activities for a considerably long period. In the case of molesting the investors, the company places itself at a high risk of lacking investors in the future. Of course, new investors would never buy the shares for such companies, and the company’s activities may come to a spontaneous halt because of the lack of funds. Unethical treatments to suppliers and customers Every business must have suppliers of raw materials and customers who purchase their finished products. Essentially, the relationship between the company, its suppliers, and its customers ought to have mutual benefits. However, some businesses are too greedy to allow the other parties to enjoy some good profits. Some companies pay their suppliers so low, such that the suppliers lack the value of the efforts that they input in their work. As if that is not enough, some companies go ahead to produce low quality or unsafe products. In case the company faces strict regulations in the country of production, the unsafe products are shipped into third world nations. This very sad incidence affects innocent individuals who purchase such products unknowingly. Some companies are used to offering the intermediaries with kickbacks so that they can continue purchasing their products. Companies that practice unethical business conducts that harm the suppliers and the consumers should know that their practices might have adverse consequences than anticipated. Once the suppliers find other places where they can sell their products at fair prices, they would stop supplying raw materials for such companies with immediate effect. Unethical business practices that involves the offering of kickbacks to win customers could have costly legal repercussions. Finally, the consumers have all the rights to file lawsuits in case they consume unsafe products. Such cases may have adverse consequences to the business, which may end up paying heavy fines, or even being ordered to close down because of their unet hical practices. The destroyed reputation of such companies may cause their sales to reduce drastically, and the company may end up being bankrupt. Deceptive sales practices Companies’ sales managers are obligated to try all possible ways of making massive sales. However, that does not mean that the companies should involve themselves in deceptive sales practices. In the GlaxoSmithKline case, the company promoted its unapproved antidepressants for human consumption (Thomas Schmidt, 2012). The unethical business practice clearly indicated that the executives of the company were extremely selfish. No amount of fine can compensate for the unethical practice of selling unapproved drugs to humans. Further, the company distorted the data of a diabetic drug that recorded very high sales, and it marketed other drugs improperly. Genuinely, drugs are meant to enhance human life, and the named unethical practices concerning drugs are so inhumane. Even after paying the fine amounting to $3 billion, GlaxoSmithKline does not tremble because their sales exceeded that amount by far. While GlaxoSmithKline may not feel the pain of paying such a huge fine, the company executives should know that its publicity reputation was destroyed. The company may never gain the huge profits that it made in the past. Regardless of how effective their drugs would be, informed customers will tend to shy away from purchasing their drugs. Once consumers know that a company employs unethical business practice in their operations, the effects are inerasable. A company like GlaxoSmithKline that has had some good reputation for many years can have its brand name torn down because of a single unethical incident. Therefore, companies that are practicing deceptive and unethical sales practices should know that their practices would tore the company down in a matter of seconds. Harming the environment All companies ought to adhere to the pollution norms set by the government. Moreover, the compan ies should adhere to the corporate social responsibility policy that obliges companies to honor the surrounding environment and the people in it. However, cases have occurred where companies are involved in unethical behaviors that harm the environment. Some companies release chemical pollutants into the air or into water bodies. Such companies do not care about the repercussions of their ill deeds. The companies release toxics that harm the lives of the living things around their locality. They evade the expenses that are associated with the treatment of toxics before they are released into the environment. This sad incidence clearly indicates that the greedy executives of such companies care less about those individuals and other living things that are affected in one way or another. One thing that companies harming the environment without caring ought to know is that some individuals who lived in the past cared about the people in the current generation. They should make it their obligation to think about their descendants who will need a safe environment. Moreover, the affected individuals would be junior employees of the company who may suffer from lifestyle diseases. Of course, the company will have to cater for their Medicare bills, and pay fines if employees decide to sue the company. It is noteworthy that the worst repercussion of unethical behaviors regarding the destruction of the environment is the lowered organizational credibility. The company’s partners, customers, and all other stakeholders will feel intimidated to be associated with a company that does not value the environment. Further, the courts can even order the company to be closed down. Conclusion Indeed, unethical business practices harm a series of people, whereas; only a few greedy incumbents enjoy the fruits of their ill deeds. Essentially, if the global economy is to be on the safe side, companies must adopt ethical business practices. Business executives must ensure that th eir businesses spend their investors’ monies in worthwhile projects. They should ensure that the investors obtain their dividends in time. As discussed, some vulnerable employees suffer in silence, and it is upon the business managers to ensure that they treat all their employees equally. The managers have a responsibility of offering a favorable working environment for all their employees. They have to ensure that the employees’ salaries are disbursed at the right time. In the case of customers, the involved stakeholders of the company must ensure that the customers obtain quality products and services. Business managers should never take advantage of their might to disadvantage their competitors. Moreover, company managers should understand that the government depends on taxes to develop the nations. Therefore, company executives are obliged to ensure that the company pays taxes exclusively. Finally, companies are requested to have a corporate social responsibility. Polluting the environment should be outdated, as companies ought to employ practices that are environmental friendly. Companies should comply with the government’s rules of conserving the air, water, and the general environment. Certainly, if all companies adopt the above named ethical practices, every individual in the world would be very comfortable, whereas, companies will be making honorable profits. References Clifford, S. Barstow, D. (2012). Wal-Mart inquiry reflects alarm on corruption. The New York Times. Web. George, J.M. Jones, G.R. (2010). Understanding and managing organizational behavior (6th ed.). Upper Saddle River, NJ: Prentice Hall. Hill, A. Plimmer, G. (2013). G4S: The inside story. Financial Times. Web. Thomas, K. Schmidt M.S. (2012). Glaxo agrees to pay $3 billion in fraud settlement. The New York Times. Web. This term paper on Unethical business practices and their effects was written and submitted by user Camryn Campos to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.