Thursday, October 31, 2019

Cell biology Research Paper Example | Topics and Well Written Essays - 250 words

Cell biology - Research Paper Example The study of cells using microscopes can either be through transmission electron microscopy, fluorescence microscopy, scanning electron microscopy, confocal microscopy and optical microscopy (Lodish, 411). There are a number of techniques that are commonly used in cell biology. Immunohistochemisty/ immunostaining is a useful histological technique that locates (tags) proteins in tissues and cells through fluorescence microscopy (towards various desired goals). Another common technique, cell culture, is used to grow cells under special conditions in the lab, outside a living organism while gene knock down is a method used to elicit mutation in a selected gene. Computational genomics identifies certain patterns in genomic data as DNA microarrays are essential in noting variations in transcript levels of various experimental circumstances. The method of PCR indicates the number of gene copies found in the cell and the process of transfection introduces into a cell an entirely new gene. To discover which cells are expressing a certain transcript of RNA, cell biologists use in situ hybridization. During cell biology, purification of cells can be accomplished using techniques such as flow c ytometry, cell fractionation, immunoprecipitation, and so on (Pollard and William, 418). Some of the processes of the cell commonly studied by cell biologists include active and passive transport, adhesion, cell movement, DNA repair (cell death and senescence), gene expression, metabolism, cell signaling, division and autophagy. Knowledge of cell biology is useful in fields such as cancer research and other disciplines like genetics, microbiology, immunology, molecular biology, developmental biology, biochemistry, anatomy, biostatistics, ecology, epidemiology, histology, mycology, reproductive biology, toxicology, virology, bacteriology, and so on (Pollard and William,

Tuesday, October 29, 2019

Diversity Worksheet Essay Example for Free

Diversity Worksheet Essay 1. What is diversity? Why is diversity valued? Diversity means different. This can be a difference in cultures, goals, values, lifestyles, and ideas. There is not two people that will think or live alike. We need to learn to accept that others will do things and think different then we do. It is important to value our diversity in order to be able to work together. 2. What is ethnocentrism? In what ways can ethnocentrism be detrimental to a society? Ethnocentrism is where people believe that they are better than others in an ethnic group, but it can also develop from racial or religious differences. This can cause problem by leading to false opinions about different cultures, maybe causing communication problems. 3. Define emigration and immigration. Emigration is where people are exported from a country whether it is voluntary or not. Immigration is where people are coming into a new country to live as a permanent resident. Reasons that people might leave a country for one to another is that there may not be jobs there and even war can make people want to leave. 4. What are some of the ways groups of people are identified? There are four ways that groups are identified and they are race, religion, gender, and ethnicity. Racial group refers to minorities that are socially set apart because of obvious physical differences. Some examples would be the color of skin, the color of hair and maybe even the amount hair on the body. Religion groups vary worldwide. People should not be judged on the religion that they believe in. With gender it is said that males are the social majority and the women are the social minority. Ethnic groups are different because of the way cultural differences such as the food that they eat, the way that they raise their children, the language that they speak ,and even the way that they look at being married to somebody. 5. Why do people label and group other people? I would think that the reasons why people put others down would be that they want to make themselves look better and feel better about themselves. This can have a positive or negative effect on the person and the one that it is directed at. If it is positive it can help lead to the person or the group getting more confidence. If it is negative then it can lead to the group or individual becoming withdrawn from shame or bullying. 6. Define culture. Is culture limited to racial and ethnic backgrounds? Explain. The definition of culture is the characteristics of a certain group of people defined by everything such as the language they speak, the types of music that they listen to, the type of food that they eat, and the religion that they practice and believe in. I do not believe that it is limited to racial and ethnic backgrounds because every group is different in the way that they live and there is not right way or wrong way to live.

Sunday, October 27, 2019

A Central Processing Unit

A Central Processing Unit A central processing unit, also known as central processor unit, is the hardware inside a computer system that process instructions of a computer program by performing the simple arithmetical, logical, and input/output (I/O) operations of the system. The term has been utilized in the computer industry about since the early 1960s. The concept, design, and implementation of CPUs have altered over the period of its history, but the foundation of its operation is still un-change. On big machines, CPUs need at least one printed circuit boards. For the personal computers and small workstations, the CPU is installed into one silicon chip called a microprocessor. In the 1970s the microprocessor type of CPUs had nearly fully implement all other CPU implementations. Modern CPUs are in big scale integrated circuits in packages usually smaller than four centimeters square, with hundreds of connecting pins. Two usual things of a CPU are the arithmetic logic unit (ALU), which process arithmetic an d logical operations, and the control unit (CU), which extracts instructions from memory and decodes then executes them, calling on the ALU when needed. Not every computational systems depend on a central processing unit. An array processor or vector processor has many parallel computing elements, with no unit to be known the center. For the distributed computing model, issues are corrected by a distributed interconnected set of processors. (Himes, A. 2012) Answer for question 1 Computers such as the ENIAC (Electronic Numerical Integrator And Computer) need to be physically rewired to carry different operations, that results these machines to be known as fixed-program computers. Since the word CPU is basically known as a device for software (computer program) execution, the very first devices that could rightly be known as CPUs came with the arrival of the stored-program computer. The concept of a stored-program computer was already existed in the design of J. Presper Eckert and John William Mauchlys ENIAC, but was not included in the beginning so that it could be complete faster. On June 30, 1945, before ENIAC was created, mathematician John von Neumann distributed the paper called First Draft of a Report on the EDVAC (Electronic Discrete Variable Automatic Computer). It was the plan of a stored-program computer that should be finished in August 1949. EDVAC was made to carry out some amount of instructions (or operations) of various types. The instructions can be combined to make useful programs for the EDVAC to work. The programs made for EDVAC were saved in high-speed computer memory instead of specified by the physical wiring of the computer. This settle the problem of a serious limitation of ENIAC, which was the cquite an amount of time and effort needed to reconfigure the computer to carry out a new task. Using the von Neumanns implementation, the progra m, or software, that EDVAC perform could be modified easily by changing the contents of the memory. (Himes, A. 2012) Every of the computer designs of the beginning of year 1950s was a unique design. There were no upward-compatible devices or computer architectures with numerous, varying implementations. Programs designed for a machine might not function on another kind, even other kinds from the similar company. This was not a great drawback at that time due to there was not a huge body of software made to work on computers, so starting programming from the beginning was not a serious issue. The design flexibility of the time was very crucial, for designers were very restrictive by the cost of electronics, yet just started to discover about how a computer could best be organized. Certain fundamental features implemented during this time like the index registers (on the Ferranti Mark 1), a return-address storing instruction (UNIVAC I), immediate operands (IBM 704), and the detection of invalid operations (IBM 650). (http://www.inetdaemon.com/tutorials/computers/hardware/cpu/ 2012) By the late of the year 1950s commercial builders had made factory-constructed, truck-deliverable computers. The most well known installed computer was the IBM 650, which used drum memory into the programs that were loaded using either paper tape or punched cards. Certain very high-end machines also utilize core memory which results in higher speeds. Hard disks were also start to become more widely use. (http://www.webopedia.com/TERM/C/CPU.html 1970) A computer is an automatic abacus. The type of number system will result the way it operates. In the early 1950s majority computers were made for specific numerical processing operations, and many machines utilized decimal numbers as their basic number system. That is the mathematical functions of the machines laboured in base-10 instead of base-2 as is general today. These were not solely binary coded decimal. Most machines usually had ten vacuum tubes per digit in each register. (Himes, A. 2012) At the end of year 1970, main computer languages were not able to standardize their numeric behavior due to decimal computers had groups of users too big to alienate. Even when designers utilize the binary system, they still had many strange ideas. Some used sign-magnitude arithmetic (-1 = 10001), or ones complement (-1 = 11110), instead of modern twos complement arithmetic (-1 = 11111). Majority computers used 6-bit character sets, due to they moderately encoded Hollerith cards. It was a serious revelation to designers of this period to be aware that the data word should be a multiple of the character size. They started to make computers with 12, 24 and 36 bit data words. (RMI Media Productions. 1979) As opposed to contemporary CPUs which was from the year 1990 until today, the design and growth of the CPU has new execution and levels which makes modern CPU more quicker, small and efficient in comparison to the early designs of CPU. One of the implementation is multi-threading. Present designs perform best when the computer is operating only an application, however almost every current operating-system permit the user to perform several applications at the exact time. For the CPU to alter over and do task on another program needs costly context switching. In comparison, multi-threaded CPUs can manage instructions from several applications at once. To do this, this kind of CPUs involve numerous sets of registers. When a context switch takes place, the contents of the working registers are merely duplicated into one of a set of registers for this intent. This kind of designs usually involve thousands of registers rather than hundreds as in a typical design. On the disadvantage, registers are likely to be somewhat costly in chip space required to implement them. This chip space could otherwise be utilized for some other function. Second implementation is multi-core. Multi-core CPUs are commonly multiple CPU cores on the similar die, linked to each other through a shared L2 or L3 cache, an on-die bus, or an on-die crossbar switch. Every of the CPU cores on the die share interconnect components with which to interface to the other processors and the rest of the system. These components might consist of a front side bus interface, a memory controller to interface with DRAM, a cache coherent connected to other processors, and a non-c oherent connected to the southbridge and I/O devices. The words multi-core and MPU (which is Micro-Processor Unit) have come into common usage for an individual die that consists of multiple CPU cores. Thirdly is very long instruction word(VLIW) and Explicitly Parallel Instruction Computing (EPIC). VLIW relates to a processor architecture made to utilize the advantage of instruction level parallelism (ILP). Whilst conventional processors typically only permit programs that specify instructions to be carried out one after another, a VLIW processor permit programs that can clearly specify instructions to be performed at the exact time (i.e. in parallel). This kind of processor architecture is meant to enable higher performance without the inherent sophistication of some other ways. Intels Itanium chip is based on what they call an EPIC design. This design supposedly offers the VLIW benefit of enhanced instruction throughput. Nevertheless, it prevents some of the problems of scaling an d complexity, by clearly giving in each bundle of instructions information concerning their dependencies. This information is calculated by the compiler, as it would be in a VLIW design. The initial versions are also backward-compatible with existing x86 software by means of an on-chip emulation mode. Integer performance was not good and regardless of enhancements, sales in volume markets continue to be low. One of the earliest CPU was the UNIVAC I (Universal Automatic Computer I) in the year 1951 and the speed of this CPU was 0.0008 IPS (Instructions per second). As in year 2011, one of the fastest personal computer CPUs was the Intel Core i7 Extreme Edition 3960X which has a staggering speed of 53.3 IPS. Compared to the early CPU like the UNIVAC I, the latest CPU is at least sixty-six times faster. (Mostafa, E. and Hesham. 2005) Conclusion for question 1 Central processing unit (CPU) is a very important component in a computer because it process instructions of a computer program by performing the simple arithmetical, logical, and input/output (I/O) operations of the system. That is why CPU also known as the brain of the computer. The CPU has rich in history since the year 1945 before the CPU term had been use and the design and implementation of the CPU had improved tremendously over the years, thus, becoming more powerful and efficient. CPU had been used in various type of computers, from personal computer to super computer. Introduction for question 2 Speaking of computer architecture, a bus is a subsystem that moves data among elements within a computer, or between computers. Initial computer buses were parallel electrical wires with several connections, but the term is now applied for any physical layout that offers the similar logical functionality as a parallel electrical bus. Current computer buses can use both parallel as well as bit serial connections, and can be wired in either a multidrop (electrical parallel) or daisy chain topology, or linked by switched hubs, as in the case of USB. Buses function in units of cycles, messages and transactions. Talking about cycles, a message needs an amount of clock cycles to be delivered from sender to receiver through the bus. Speaking of messages, these are logical unit of information. For instance, a write message contains an address, control signals and the write data. Speaking of transactions, a transaction comprises of a sequence of messages which collectively form a transaction. For instance, a memory read needs a memory read message and a reply with the requested data. (http://www.webopedia.com/TERM/B/bus.html 2007) Answer for question 2 Buses can be parallel buses, which transport data words in parallel on numerous wires, or serial buses, which transport data in bit-serial form. The addition of extra power and control connections, differential drivers, and data connections in every direction generally indicates that mojority serial buses have extra conductors than the minimum of one utilized in 1-Wire and UNI/O. As data rates raise, the issues of timing skew, power usage, electromagnetic interference and crosstalk across parallel buses turn into more and more hard to circumvent. One partial solution to this issue is to double pump the bus. Usually, a serial bus can be worked at greater overall data rates than a parallel bus, regardless of having less electrical connections, due to the fact a serial bus basically has no timing skew or crosstalk. USB, FireWire, and Serial ATA are the likes of this. Multidrop connections will not perform properly for fast serial buses, so most contemporary serial buses utilize daisy-ch ain or hub designs. Traditional computer buses were bundles of wire that linked computer memory and peripherals. Anecdotally termed the digit trunk, they were known as after electrical power buses, or busbars. Almost often, there was single bus for memory, and one or more independent buses for peripherals. These were accessed by separate instructions, with entirely different timings and protocols. (Null, L., Lobur, J. 2006) One of the initial complications was the utilization of interrupts. Early computer programs carry out I/O by holding out in a loop for the peripheral to become prepared. This was a waste of time for program that had other tasks to perform. Also, if the program tried to carry out those other tasks, it may take too long for the program to check again, causing a loss of data. Engineers therefore set up for the peripherals to interrupt the CPU. The interrupts had to be prioritized, simply because the CPU will only perform code for one peripheral at a time, and some systems are more crucial than others. (Lochan, R. and Panigrahy. 2010) High-end systems implemented the plan of channel controllers, which were primarily small computers committed to deal with the input and output of a given bus. IBM implemented these on the IBM 709 in 1958, and they became into a usual feature of their platforms. Other high-performance vendors like Control Data Corporation utilized identical designs. Commonly, the channel controllers would perform their very best to manage all of the bus operations internally, transferring data when the CPU was deemed to be busy elsewhere if likely, and only utilizing interrupts when necessary. This tremendously reduce CPU load, and allows outstanding all round system performance. To provide modularity, memory and I/O buses can be combined into a unified system bus. In this situation, a single mechanical and electrical system can be utilized to link together numerous of the system components, or in some instances, all of them. Later computer programs started to share memory common to some CPUs. Accessi ng to this memory bus needed to be prioritized, as well. The easy method to prioritize interrupts or bus access was with a daisy chain. In this scenario signals will normally pass through the bus in physical or logical order, eliminating of the need for complex scheduling. (Null, L., Lobur, J. 2006) A system bus is an independent computer bus that connects the primary components of a computer system. The method was created to cut down costs and boost modularity. It combines the functions of a data bus to transport information, an address bus to decide where it should be delivered, and a control bus to identify its function. Every mainboard has a set of wires running across it that interconnect all the devices and chips that are lugged into it. These wires are jointly known as bus. The amount of wires in the bus determines how wide the bus is. A data bus is a computer subsystem that enables for the transporting of data from one component to another on a motherboard or system board, or between two computers. This can involve transporting data to and from the memory, or from the central processing unit(CPU) to other components. Every one is made to manage a quantity bits of data at a time. The quantity of data a data bus can deal with is known as bandwidth. The data bus comprises o f 8, 16, or 32 parallel signal lines. The data bus lines are bidirectional. Numerous devices in a system will have their outputs linked to the data bus, but only one device at a time will have its outputs enabled. Any device linked on the data bus must have three-state outputs so that its outputs can be disabled when it is not getting utilized to put data on the bus. An address bus is a computer bus architecture function to transport data between devices that are known by the hardware address of the physical memory (the physical address), which is kept in the form of binary numbers to allow the data bus to access memory storage. The address bus is utilized by the CPU or a direct memory access (DMA) enabled device to find the physical address to convey read/write commands. All address busses are read and written by the CPU or DMA in the form of bits. An address bus is part of the system bus architecture, which was created to reduce costs and improve modular integration. (Ram, B. 2007 ) Nevertheless, majority of current computers use a wide range of single buses for certain tasks. An individual computer consists of a system bus, which links the main components of a computer system and has three primary elements, of which the address bus is one of them, together with the data bus and control bus. An address bus is gauge by the quantity of memory a system can access. A system with a 32-bit address bus can handle 4 gigabytes of memory space. More sophisticated computers utilize a 64-bit address bus with a supporting operating system able to deal with 16 gigabytes of memory locations, which is virtually infinite. A control bus is a computer bus that is utilized by the CPU to interact with devices that are contained inside the computer. This happens via physical connections such as cables or printed circuits. The CPU transfers a wide range of control signals to components and devices to transfer control signals to the CPU making use of the control bus. One of the primary goals of a bus is to reduce the lines that are required for communication. An individual bus enables communication among devices employing single data channel. The control bus is bidirectional and helps the CPU in synchronizing control signals to internal devices and external components. It is made up of interrupt lines, byte enable lines, read/write signals and status lines. Interaction between the CPU and control bus is required for operating an efficient and functional system. With the lack of control bus the CPU unable decide whether the system is obtaining or transmitting data. It is the control bus that manages which way the write and read information need to go. The control bus consists of a control line for write instructions and a control line for read instructions. When the CPU writes data to the main memory, it sends a signal to the write command line. The CPU also transmits a signal to the read command line when it requires to read. This signal allows the CPU to receive or transmit data from main memory. (Ram, B. 2007) Conclusion for question 2 Bus in computer architecture is a very important component in a computer. A bus is a subsystem that moves data among elements within a computer, or between computers. A system bus is an independent computer bus that connects the primary components of a computer system and this method was created to cut down costs and boost modularity. It combines the functions of a data bus to transport information, an address bus to decide where it should be delivered, and a control bus to identify its function. One of the primary goals of a bus is to reduce the lines that are required for communication.

Friday, October 25, 2019

This Is Audie Murphy Essay -- essays research papers

This is Audie Murphy's life story. At the tender age of 12, he becomes the head of the family after his father deserts them. He joins the army at the age of 18 and through the course of the war is decorated for valor nine times thus becoming the most decorated combat soldier in World War II. Audie does one of the bravest acts any soldier ever did during the war. He climbs aboard a burning tank destroyer and single handedly keeps the enemy from advancing on his position. He spends almost an hour on top of the tank destroyer until his ammunition is exhausted. Seconds later after climbing off the tank destroyer, it explodes. For this action, Audie receives the Medal of Honor. PVT, AUS  Ã‚  Ã‚  Ã‚  Ã‚  30 Jun 42 PFC, AUS  Ã‚  Ã‚  Ã‚  Ã‚  7 May 43 CPL, AUS  Ã‚  Ã‚  Ã‚  Ã‚  15 Jul 43 SGT, AUS  Ã‚  Ã‚  Ã‚  Ã‚  13 Dec 43 S/SGT, AUS  Ã‚  Ã‚  Ã‚  Ã‚  13 Jan 44 2d LT, AUS  Ã‚  Ã‚  Ã‚  Ã‚  14 Oct 44 1st LT, AUS  Ã‚  Ã‚  Ã‚  Ã‚  16 Feb 45 1st LT, INF, ORC  Ã‚  Ã‚  Ã‚  Ã‚  21 Aug 45 CAPT, INF, TEX NG (Federal Recognition)  Ã‚  Ã‚  Ã‚  Ã‚  14 July 50 CAPT, INF, NGUS  Ã‚  Ã‚  Ã‚  Ã‚  19 Oct 50 MAJ, INF, TEX NG (Federal Recognition)  Ã‚  Ã‚  Ã‚  Ã‚  14 Feb 56 MAJ, INF, NGUS  Ã‚  Ã‚  Ã‚  Ã‚  14 Feb 56 MAJ, INF, USAR  Ã‚  Ã‚  Ã‚  Ã‚  8 Nov 66 SERVICE Audie L. Murphy enlisted in the Army of the United States, 30 June 1942, at Dallas, Te...

Thursday, October 24, 2019

Sun Microsystems Strategic Positioning

SUN MICROSYSTEMS: STRATEGIC POSITIONING Susan L. Elvins National American University History, Strategy, International Abstract This thesis will discuss the corporate strategy of Sun Microsystems and the multiple issues they have faced both domestic and internationally. Sun Microsystems provides open source software applications and different types of hardware for business consumers. A benefit Sun Microsystems provides with new technology to customers is offering them the ability to trade computer parts when upgrading. ii CONTENTS Abstract †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. ii CHAPTER 1 SUN MICROSYSTEMS: INTRODUCTION †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 1 CHAPTER 2 SUN MICROSYSTEMS: HISTORY †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 2 History †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 2 Continued Growth †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 2 CHAPTER 3 SUN MICROSYSTEMS: MARKETING †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 4 SWOT Issues †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 4 Microsoft vs. Sun Microsystems †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 4 CHAPTER 4 SUN MICROSYSTEMS: PRODUCT TECHNOLOGY †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 6 Software †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 6 Servers †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. History Conclusion †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 6 CHAPTER 5 SUN MICROSYSTEMS: CODE OF ETHICS †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 8 Employee Code of Ethics †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8 Employee Relationships †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 9 Anti-Discrimination Policy †¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 9 CHAPTER 6 SUN MICROSYSTEMS: LEGAL ISSUES†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 0 Hardware Patents †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 10 CHAPTER 7 SUN MICROSYSTEMS: INTERNATIONAL COUNTRY ANALYSIS (ITALY) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 11 CHAPTER 8 SUN MICROSYSTEMS: INTERNATIONAL ENVIRONMENT †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 12 International Economy Results †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 12 Domestic Economy Results †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 12 CHAPTER 9 SUN MICROSYSTEMS: INTERNATIONAL DEMOGRAPHICS †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 13 iii CHAPTER 10 SUN MICROSYSTEMS: INTERNATIONAL POLITICS †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 4 CHAPTER 11 SUN MICROSYSTEMS: INTERNATIONAL SWOT †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 15 SWOT Analysis †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 15 CHAPTER 12 SUN MICROSYSTEMS: GLOBAL BUSINESS STRATEGIES †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 16 Five Business Level Strategies †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 16 CHAPTER 13 SUN MICROSYSTEMS: CHANGE MANAGEMENT †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 17 Server Management †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦.. 17 CHAPTER 14 SUN MICROSYSTEMS: STRATEGIC CHANGE †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 8 Product Upgrade †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 18 Storage Management †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 19 Open Source Management †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 19 CHA PTER 14 IMPLEMENT PLAN OF CHANGE †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 20 Implement Change †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 20 CHAPTER 16 IMPROVEMENT RECOMMENDATIONS †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 1 References †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 22 CERTIFICATE OF AUTHENTICATION NATIONAL AMERICAN UNIVERSITY . 25 APPENDIX A PORTER’S FIVE FORCES †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 26 APPENDIX B GOVERNMENTAL PARTIES †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 27 iv History, Strategy, International CHAPTER 1 SUN MICROSYSTEMS: INTRODUCTION Over the last 26 years, Sun has built a strong business strategy to satisfy commercial and consumer buyers with multiple products. When it all comes down to it, Sun Microsystems is one of the most defined and trusted computer manufactures in the globe. This thesis paper discusses the achievements of Sun Microsystems, Inc. Chapter 2 looks into the history of Sun Microsystems. Chapter 3 reviews the choice marketing strategy of Sun and how they have improved their current business position. Chapter 4 examines what products Sun provides consumers in software, storage, desktops, workstations, and microelectronics. Chapter 5 discusses the business code of ethics policy. Chapter 6 explores the legality of Sun Microsystems. Chapters 7 through 11 discuss the international facility of Sun Microsystems in Milan, Italy and chapter 12 explores their global business strategies. 1 History, Strategy, International CHAPTER 2 SUN MICROSYSTEMS: HISTORY In 1982, four people got together and built Sun Microsystems, Inc. in Santa Clara, California. The latest date of 2007 annual reports confirms this company now has 34,000 employees worldwide. According to Hoovers, the top three executives are Jonathan I. Schwartz, President, CEO and Director, then Scott G. McNealy, Chairman, and then Gregory M. Papadopoulos, EVP Research and Development and CTO. (Hoovers, 2008) Since 1982, Sun Microsystems has believed, â€Å"The Network is the Computer† to achieve their company success. History In 1983, Sun made enough revenue to open operations overseas in Europe. (Sun, 2008) This new overseas office gave many capabilities to what Sun could accomplish. For example, Sun opened their doors in multiple international countries to build revenue. The first international operations for Sun opened in Canada in 1985 (Sun, 2008). The following year, operations started in Asia then in Australia. Sun, 2008) In 1988, Sun reached their first $1 million dollars in sales revenue, which is a major milestone. (Sun, 2008) In 1990, Sun introduced the first workstation which was a new plateau reached. (Sun, 2008) This workstation brought new strategy into Sun’s marketing strategy because of opportunity it added. Continued Growth In the late 1990’s, Sun expanded their business horizons int o hardware then built a T1 server which handled the backbone of the Internet. (Sun, 2008) That same year, Sun completed the Micro, Standard, and Enterprise editions of the Java 2 platform 2 Comment [US1]: Period follows citation not before History, Strategy, International 3 application. (Sun, 2008) Java software gives opportunity to developers they previously did not have. This software allows programmers to develop and build ideas more easily. Java is used in web browsers to this day, so it is important to ensure that application stays updated as required. History, Strategy, International CHAPTER 3 SUN MICROSYSTEMS: MARKETING The marketing strategy of Sun Microsystems did change as the company increased the product line because with additions they needed to build a correct strategy. The reason for changing the marketing strategy is to compete with businesses just like them. Sun Microsystems has always ensured that their consumers receive the best products and the best in customer service. In 1992, a great marketing strategy used by Sun was to join with Hewlett Packard and announce new workstations built specifically for technical businesses. As the author of Computerworld magazine stated, â€Å"The companies are pitching their workstations to different customers–Sun wants to displace PCs from commercial desktops and HP is focusing on the midrange and high-end workstation user. (Johnson, 1992, 4) SWOT Issues Just like any other business, Sun has strengths, weaknesses, opportunities, and threats. Keeping those four key points in mind will provide Sun the assistance they need to further their possibilities in the world of technology. Sun was able to acquire the program application MySQL. In many technical circles such as networking, the word â€Å"lampâ₠¬  will be used during a discussion between administrators. An IT article explains how these letters are also read. The letters of lamp each stand for an application used to build a network server; Linux, Apache, MySQL, and PHP. Anonymous, 2008) Microsoft vs. Sun Microsystems Microsoft is a company that many consumers know for the popular operating software they provide, Windows. Some may not be aware of legal issues that had taken 4 Comment [US2]: Magazines and newspapers are in italics History, Strategy, International 5 place between Microsoft and Sun regarding the Java application. A 2004 article put many business owners at ease when the authors stated, â€Å"Just before last Christmas, secret talks aimed at ending one of the bitterest wars in business foundered. (Guth & Clark, 2004, A1) The disagreement began on October 1997 when Microsoft was sued for using Java incorrectly. In January 2001, Microsoft and Sun did reach an agreement finally to settle the 1997 case in which Mic rosoft paid Sun $20 million dollars. (Guth & Clark, 2004) The settlement of this case actually allowed both companies to move forward without regrets. On March 10, 2008, Microsoft and Sun Microsystems met once again and this time it was on better terms. Both companies created an alliance including the grand opening of the Sun/Microsoft Interoperability Center. The center is located in Redmond, Washington, the same location of the headquarters for Microsoft. One benefit this center received was the type of Sun server and storage system. The other benefit was the type of Microsoft server software. (Johnson, 2008) History, Strategy, International 6 CHAPTER 4 SUN MICROSYSTEMS: PRODUCT TECHNOLOGY Software Sun provides many options to consumers when choosing from software. It is not just operating systems. Sun provides Java and Java Enterprise Systems to the consumers. Consumers have the ability to use Mobile Solutions when they are away from their away from their main computer. Business management software is available on levels of security for identity management or systems management. Software tools to assist database maintenance, application management, and development production are also available. The latest version of Solaris is Solaris 10 and it was released in 2004. (Sun, 2008) Servers Sun Microsystems has been busy improving since the original SPARC came onto the market. Now consumers have multiple options within this category to chose. For example, a consumer could choose a â€Å"Blade† server, the â€Å"x64† server, a Netra server, a SPARC erver, an Entry Rack Mount server, a Mid-range server, or a High-End server. Each product has advantages and disadvantages that will match up to a consumer’s needs. If a business still needs to consider options, the Sun web site performs a comparison of the servers. If a business needs something more customized, Sun will provide rack cabinets so the business can build a specialized rack sys tem to meet their own needs. History Conclusion Sun Microsystems provides more than software, main frames, and rack systems to the consumer. Over the last 26 years, Sun has built a strong business strategy to satisfy History, Strategy, International 7 commercial and consumer buyers with multiple products. Sun is a business that believes the best way to earn revenue is to stay focused on important issues. Keeping focus on business strategy and consumer needs will turn growth and revenue into prosperity. History, Strategy, International CHAPTER 5 SUN MICROSYSTEMS: CODE OF ETHICS In 2001, Sun Microsystems built a Business Conduct Office (BCO) to assist employees and board members as necessary. (Corporate, 2008) To ensure employees are assisted in the best possible way, Sun keeps this document consistently updated. An employee can contact the human resources department should they have any questions or concerns. Employee Code of Ethics After employees are hired, they are provided with documentation listing a helpfully written ethics policy each person is required to follow. As an employee, a person is expected to use common sense in the decision-making process. More importantly, Sun requires each employee and board member to follow these company ethical guidelines: â€Å"Be familiar with these Standards of Business Conduct and follow them at all times. Comply with all applicable governmental laws, rules, and regulations in the performance of their duties on Sun’s behalf. Be sensitive to situations which could lead to inappropriate business conduct and avoid engaging in such inappropriate business conduct. Comply fully with the letter and spirit of Sun’s Conflict of Interest policy and always conduct Sun business in a manner that avoids conflicts between personal interests and Sun’s best interests. Promptly bring to the attention of appropriate Sun management or Sun’s Business Conduct Office any known or perceived unacceptable business conduct or illegal behavior. Seek appropriate guidance when it is suspected that business conduct issues. 8 History, Strategy, International 9 Always conduct Sun’s business with honesty and integrity and refrain from conduct that would negatively impact Sun’s reputation. † (Sun Microsystems, 2007) Employee Relationships Businesses must build a working relationship between their employees just as they do with their consumers. It is also important for employees to know they will always have the respect of their employer at all times. Employees are expected to return the same professional conduct as a courtesy to their employer. In addition to professional standards, Sun has a global anti-discrimination policy that protects employee rights. This anti-discrimination policy serves dual purpose because it protects an employee’s rights and it prevents discrimination within the company. Anti-Discrimination Policy In the anti-discrimination policy, there are four types of harassment examples. They are verbal harassment, visual harassment, physical harassment, and sexual demands. (Sun Microsystems, 2007) An example of verbal harassment is co-worker insults another with explicit jokes or makes sexual remarks towards another person. Visual harassment is considered graphic material whether it is written, printed, or sent through email. Physical harassment is considered more sexual driven as a person intentionally brushes up against another in a way that is unwelcome. Sexual demands are defined as unwanted sexual advances. History, Strategy, International CHAPTER 6 SUN MICROSYSTEMS: LEGAL ISSUES Sun Microsystems has a legal department that has the capability to work through multiple situations. For example, Sun took legal action against Microsoft after discovering their Java code was used to advance Microsoft’s Internet Explorer. After Sun and Microsoft ironed legal differences in front of a judge in 2004, both companies emerged with new ideas. According to a 2007 article in the Wall Street Journal, â€Å"Sun has agreed to sell servers that come with Windows installed at the factory. Some customers already run Windows on Sun's x86 systems — those that use chips from Intel Corp. and Advanced Micro Devices Inc. — but had to buy and install the software themselves. † (Lawton & Clark, 2007) The executive vice president of Sun’s systems group stated, â€Å"This is quite a different situation. (Lawton & Clark, 2007) It is obvious seeing Sun and Microsoft business activities they can become allies and begin build something new to benefit the consumer. Hardware Patents Another legal issue was resolved between Sun and a company named Custom Hardware Engineering over a patent dispute. Financial Wire briefly explained this suit in an article because of the delicate legal information involved . This independent service stated, â€Å"Custom Hardware had filed an antitrust counterclaim against the charges and was seeking $140 million in damages. † (FinancialWire, 2007) Sun settled the counterclaim with an amount that has not been disclosed. Because Sun purchased this hardware company, Sun in turn legally owned all rights however; one could possibly see why Custom Hardware attempted to sue for counter damages. 10 History, Strategy, International CHAPTER 7 SUN MICROSYSTEMS: INTERNATIONAL COUNTRY ANALYSIS (ITALY) This section of the Sun Microsystems research paper discusses the international facility. The global center is located in Milan, Italy. The international center provides consumers the exact services that American customers receive. This section provides economic details of Italy such as employment and unemployment. Other information discussed is things pertaining to demographics and the future of how Sun can progressively build its facility in the country. Over the last 26 years, Sun Microsystems has built a strong business strategy to satisfy commercial and consumer buyers with multiple products. When it all comes down to it, Sun Microsystems is one of the most defined and trusted computer corporations across the globe. 11 History, Strategy, International CHAPTER 8 SUN MICROSYSTEMS: INTERNATIONAL ENVIRONMENT Sun has built a center in Milan and it is called the Solution Center. They believe it will â€Å"expand business opportunities, lower development costs, and get products to market quickly†. (Sun, 2008) Customers can choose from products such as Solaris and Linux servers, desktop computers, and other types of storage peripherals. Four services available in the Milan Solution Center are proofs-of concept, benchmarks, product and solution demos, and porting. (Sun, 2008) International Economy Results In Italy, the first economic quarterly period was reported as $387,952 million Euros. It was showing a 0. 7% change from the previous quarterly period with a 1. 9% change from the previous year. Italy, 2008) As of May 2008, the employment rate status was 23,229 and the unemployment rate was 6. 5%. The total imports of goods and services in May 2008 amounted to $40,150 million Euro. Total exports of goods and services in May 2008 amounted to $39,688 million Euro. SDDS data reported the revenue of 2007 being $724,246 million Euro. (Italy, 2008) The Sun fa cility is located in Milan, Italy. Domestic Economy Results As of August 2008, Sun Microsystems reported its fiscal results. The revenue for the fiscal year was $13,888 billion. Revenue results for Q4 of fiscal 2008 are $3. 780 billion. Net-income for the fiscal 2008 earnings is $88 million. Cash earnings from operations of fiscal year are $1. 3 billion. (â€Å"Sun Microsystems,† 2008) 12 History, Strategy, International CHAPTER 9 SUN MICROSYSTEMS: INTERNATIONAL DEMOGRAPHICS On July 2007, a census reported the population of Italy to be 58,147,733 residents approximately. (Intute-World Guide, 2006/2008) The total residents in the labor force as of 2007 were 24. 86 million. The exports of Italy are engineering products, textiles and clothing, production machinery, motor vehicles, transport equipment, chemicals, food, beverages and tobacco, minerals and nonferrous metals. The country of Italy has boundaries to Austria, France, San Marino, Slovenia, Switzerland and the Vatican City including a coastline that spans 7,600 kilometers. (Intute-World Guide, 2006/2008) There are eight seaports, Augusta, Genoa, Livorno, Ravenna, Sarroch, Taranto, Trieste, and Venice. Italy has one gas pipeline and one oil pipeline. Two types of railways and 612 merchant ships are available to carry commercial or industrial cargo. (CIA-The World, 2008) Population According to The World Fact Book, the population of Italy was 58,145,321 as of July 2008. The median age of the male was 41. 4 years. The median age for the female was 44. years. The census of 2001 showed literacy rate for the male population as 98. 8% and the literacy of the female population as 98%. In a census as of 2006, school age expectancy for males was 16 years and school age expectancy was 17 years for females. (CIA-The World, 2008) 13 History, Strategy, International CHAPTER 10 SUN MICROSYSTEMS: INTERNATIONA L POLITICS According to the Maps of the World, there are three government components in Italian politics executive, legislature, and judiciary. (Government and, 2008) The executive area is in essence the Prime Minister while judiciary has control over legal power of the country. Italian citizens are permitted to vote at the age of 18. They can choose from a multiple list of governmental parties listed in Appendix B. (Government and, 2008) 14 History, Strategy, International CHAPTER 11 SUN MICROSYSTEMS: INTERNATIONAL SWOT Even though Sun has a facility in Italy, a SWOT analysis must be followed to ensure business operations move smoothly. SWOT analysis is defined by Bnet. com as, â€Å"an assessment of Strengths, Weaknesses, Opportunities, and Threats. SWOT analysis is used within organizations in the early stages of strategic and marketing planning. It is also used in problem solving, decision making, or for making staff aware of the need for change. It can be used at a personal level when examining your career path or determining possible career development. † (Cnet Networks Inc, 2008) In essence, the SWOT analysis is used to guide a business with structure and conformity. SWOT Analysis The SWOT analysis shows how strengths and weaknesses are internal whereas opportunities and threats are external. Using that philosophy, Sun must keep track of strengths or business advantages at their Milan facility. Sun should consider how to improve the current business status by increasing revenue in the technical market. When a business keeps aware of opportunities, it can improve their status. A few examples provided by QuickMBA. com are, â€Å"an unfulfilled customer need, arrival of new technologies, loosening of regulations, and removal of international trade barriers. † (Swot Analysis, 1999/2007) For example, currently Sun has a few facilities with trade barriers so should they be lifted that will allow easier delivery of product and building of revenue. Furthermore, Sun has 10 General Prohibition restrictions with specific countries and customers. (Sun Microsystems, 1994/2008) These restrictions protect Sun as well as their employees. 15 History, Strategy, International CHAPTER 12 SUN MICROSYSTEMS: GLOBAL BUSINESS STRATEGIES The three strategies business owners can choose from when determining what will work best for their business strategy on a global scale are multi-domestic, global, and transnational. The multi-domestic business strategy focuses on all overseas countries the firm has operations. The global strategy focuses on how products are delivered to the countries. According to Cangemi, â€Å"a transnational strategy seeks to combine aspects of both multidomestic and global strategies in order to emphasize both local responsiveness and global integration and coordination. † (Cangemi, 2008) Five Business Level Strategies Sun builds benefit from the five business level strategies that are cost leadership, differentiation, focused low cost, focused differentiation, and integrated strategy. Sun recognizes five items their business could face while attempting to improve. These items known as Porters Five Forces are competitive rivalry, power of suppliers, power of buyers, threats of substitutes, and threats of new entrants. A visual of Porters five forces is displayed in Appendix A. (Recklies, 2007) Albert Einstein once said, â€Å"Try not to become a man of success but rather to become a man of value. † (Success Quotes, 1994/2007) Sun delivers value to their consumers both domestic and international. Sun has grown to a successful business because of their continuous years of hard work from the CEO and all employees. Sun has proven to succeed in business it takes dedication, communication, and the willingness to work outside of the box. 16 History, Strategy, International CHAPTER 13 SUN MICROSYSTEMS: CHANGE MANAGEMENT Since 1982, Sun Microsystems has followed a structured business plan of goals for company products, services and higher revenue earnings. The 1980’s was a time for many companies to begin automating their systems. While some companies were just beginning to automate, Sun introduced its first workstation for businesses. In 1983, Sun opened the first facility overseas in Europe to expand products and increase revenue. Server Management In 2000, Sun customers who purchased high-end servers experienced a memory glitch error. Because of the error’s location, a statement was released on anonymity. The CIO stated, â€Å"Sun has taken an aggressive approach to addressing these issues with our customers. We have identified the source of the problem and taken steps to ensure that it does not happen again. † (Wagner, 2000, 10) Executives have said even though consumers were requested to sign a nondisclosure agreement to protect proprietary information, Sun plans to releasing a system board before the New Year that should resolve this error. Just as a gardener pull weeds for vegetables growth, Sun executives train personnel so they can grow within the business and excel. 17 History, Strategy, International CHAPTER 14 SUN MICROSYSTEMS: STRATEGIC CHANGE In December 2002, Sun Microsystems accomplished one more business goal after automation of their data center. Gordon Haff, analyst at Illuminata explains, Making effective use of data-center assets always has been an issue, but it's been exacerbated by the technology build-out of a few years ago. People would be very happy with a magic solution that allowed 1,000 servers to be managed as easy as one server, but that doesn't exist today, software developments such as IBM's Project eLiza, Hewlett-Packard's Adaptive Management Platform, and Sun Microsystems' N1 are steps in the right direction. (Greenemeier, 2002) Product Upgrade In April 2004, Sun Microsystems performed a product upgrades to Linux that provided business consumers desktop ease. This Linux version provides a newer version of Enterprise Java desktop. Not only that, system administrators can now control the entire desktop from a central platform. Chris Maresca, senior partner from Olliance Consulting states, â€Å"The desktop is one of the largest cost components of any modern corporation. When you layer on top of that the cost of server-based productivity apps tied to desktops, like Exchange, and you factor in the support costs for the desktops, servers and updates/security patches, plus mandatory hardware upgrades every few years, [the migration case] becomes even more compelling. † (Rooney, 2004) 18 History, Strategy, International 19 Storage Management In 2004, an upgrade that brought positive results to Sun was in the data management department. Sun announced the products StorEdge 6920 and Sun StorEdge 9990 storage devices. Marc Canepa, executive vice president of Sun Microsystems storage products says, â€Å"We don't think of storage as a separate company that just happens to be owned by Sun Microsystems, just like we don't believe that the strategy to reduce cost and complexity is one of going to a customer and taking over the whole operation. † (Fonseca, 2004) Open Source Management The strategy for this project has increased as time progressed because it is a very important product. An example of this is Sun classifying commercial open-source business strategies into four categories. Driver, Feinberg, and Weiss listed them in a Sun Microsystems Open Source 2008 report as: Sponsor open-source projects and solutions as an active member of a community, leverage open-source software embedded in other products and services, support and integrate selected products and services with open-source solutions, and provide direct, commercialized products and services of open-source solutions. (Driver & Feinberg, 2008) History, Strategy, International CHAPTER 14 IMPLEMENT PLAN OF CHANGE Sun Microsystems provides a vast amount of products, which support multiple needs of customers. To ensure the best strategy, Sun Microsystems must implement a plan to improve their current strategic position. When a business uses one strategy continuous, employees tend to become complacent then fall into a comfort zone. When Sun implements a new strategy, they could experience some resistance from employees because they did fall into that comfort zone. Implement Change When a business is ready to improve, management needs to be aware of three things, people, communication, and training. As John Kline explains in his article, â€Å"Implementing organizational change is a difficult and critical task. It has always been that way and is getting more so with the accelerated rate of change in most organizations. † (Kline, 2007) Employees must be aware of the changes made and how it will affect them. It is important for managers to stay communicated with their staff and keep them informed of any changes as they take place. During the process, managers should be training employees so they are prepared for the new conversion. 20 History, Strategy, International CHAPTER 16 IMPROVEMENT RECOMMENDATIONS Sun has a scheduled budget for research and development. The current strategy has allowed this company the ability to build a strong position in technology. Sun purchased a software company to complete a software collection for service-oriented architecture (SOA). Unfortunately, since this purchase Sun has not regained any lost ground. Sun must research what is currently available for storage management software and reconsider improving the plan for usage in mainframe systems. Sun should make a plan of time to review servers being sold. For example, newer technology will allow the company to provide things which older technology could not. A question Sun Microsystems must consider is how to manage replacements of damaged servers from customers when those particular servers have been replaced with newer models. Perhaps it is an opportunity for Sun to offer their customers a discount in such cases. In conclusion, Sun has built a strong business strategy to satisfy commercial and consumer buyers with multiple products. Because marketing is their responsibility, they must track sales and competition then readjust as necessary. Sun Microsystems is a defined and trusted computer corporation that international and domestic markets will work with. 1 History, Strategy, International 22 References Cangemi, R. R. (2008). The Formulation of an International Strategy. Pace University. p26-4. CIA-The World Factbook Italy. (2008). Retrieved August 11, 2008, from CIA Web site: https://www. cia. gov/library/publications/the-world-factbook/print/it. html Cnet Networks Inc. (2008). SWOT Analysis Definition. In BNet. com. San Francisco: C net Networks, Inc. Driver, M. , Feinberg, D. & Weiss. (2008). Open Source at Sun Microsystems, 2008 (Research Note G00156448). Denver, CO: Gartner. Fonseca, B. (2004, September 20). Sun, HP Focus on Storage; Goal is to simplify SAN management. Eweek, p. 31. Government and Politics in Italy. (2008). San Jose, CA: MAP XL Inc. Greenemeier, L. (2002, December 2). Automating the Data Center. InformationWeek (917), 65. Guth, R. A. , & Clark, D. (2004, April 5). Peace Program-Behind Secret Settlement Talks: New Power of Tech Customers; Microsoft, Sun Bury Hatchet, As Big Clients Demand Products Work Together; Gates Spotted in Enemy Camp. Wall Street Journal, p. A1. Hoovers. (2008). Sun Microsystems Executives [Data]. Available from Hoovers, http:// www. hoovers. com/free/co/people. html? ID=14833 Intute-World Guide. (2008). (Original work published 2006) Retrieved August 7, 2008, from Intute Web site: http://www. intute. ac. uk/sciences/worldguide/html/ 920_people. html History, Strategy, International 23 Italy: Economic and financial data. (2008) Retrieved on August 9, 2008 from http://www. istat. it/fmi/ITALY-NSDP. html#Real_Sector Johnson, M. (1992, November 16). Su n, HP Rev Workstations. Computerworld, p. 4. Johnson, R. (2008, March 10). Sun and Microsoft Expand Investment In Interoperability With New Center in Redmond, WA. Sun News. Kline, John A. (2007, January 1). How to implement change in your organization: the key: communicate, communicate, communicate. The Free Library. Recklies, D. (2007, December 30). Porters Five Forces. The Manager. org. Rooney, P. (2004, April 19). Migrating To LINUX. CRN, pp. 28. Success Quotes [Albert Einstein Quote]. (2007). (Original work published 1994) Retrieved August 17, 2008, from Quotations Page Web site: http:// www. quotationspage. com/subjects/success/ Sun Microsystems Export Prohibitions Disclaimer [International Trade Services]. (2008). (Original work published 1994) Retrieved August 17, 2008, from Sun Microsystems Web site: http://www. un. com/sales/its/prohibitions. html Sun Microsystems Reports Final Results for Full Fiscal Year and Fourth Quarter 2008. (2008, August). Sun Newsletter. Sun Microsystems, Inc. (2008). History. Retrieved from Sun Microsystems, Inc. , http://www. sun. com/aboutsun/company/history. jsp Sun Solutions Center: Milan, Italy. (2008) Retrieved on August 9, 2008 from: Sun Microsy stems: http://www. sun. com/solutioncenters/locations/milan/ Sun's Open Source Experiment. (2008, January). IT Week, 13. History, Strategy, International 24 SWOT Analysis. (2007). Original work published 1999) Retrieved August 17, 2008, from Quick MBA Web site: http://www. quickmba. com/strategy/swot/ Wagner, M. (2000, Nov 13). Sun under Fire for Crashes – IT Execs Say Server Vendor was Unresponsive; Hardware Fix for Memory Glitch is coming. Internetweek, PG10. History, Strategy, International CERTIFICATE OF AUTHENTICATION NATIONAL AMERICAN UNIVERSITY GRADUATE STUDIES Submitted to: Dr. Richard H Gayer Submitted by: Susan L. Elvins Course: Strategy and Policy Date of Submission: September 11, 2008 Certificate of Authorship I hereby certify that I am the author of this document and any assistance I received in

Tuesday, October 22, 2019

The Importance Of Having A Value Base Social Work Essay Example

The Importance Of Having A Value Base Social Work Essay Example The Importance Of Having A Value Base Social Work Paper The Importance Of Having A Value Base Social Work Paper Social work involves working with some of the most deprived and vulnerable people in society. It is working with persons, groups and communities, seting into pattern Social Work Values that aid people to get the better of possible subjugation they face. The actions of Social Workers are to advance societal alteration, aid work out jobs and empower and liberate people to assist heighten their well being. ( British Association of Social Workers, 2002 ) It needs to be understood that Social Workers must be argus-eyed against the possibility of development or subjugation of Service users through unethical Practices. ( Thompson, 2005: Pg 108 ) All Professional businesss are guided by ethical codifications and underpinned by Values ( Bishman, 2004 ) and from the really beginning of Social Work, the profession has been seen as steadfastly rooted in values ( Reamer, 2001 ) ( Cited by Bishman, 2004 ) Every individual has a set of beliefs which influence actions, values relate to what we think others should make and what we ought to make, they are personal to us. ( Parrot, 2010:13 ) Although society may been seen as holding shared values we are all brought up with different personal values bases, this is an of import point to see when working with others, because our values can act upon the manner we behave. It would hence be seen as foolish to undervalue the significance of values within the Social Work Profession. ( Thompson, 2005: 109 ) Our Personal Valuess can alter over clip, and our behavior can change as a consequence of the state of affairs we are in. From a immature age one of the most of import values instilled in me by my parents was to hold regard for others, this should be carried throughout life as we should handle others the manner in which we would anticipate to be treated. The importance of holding a value base for Social Work is to steer Social Workers and protect the involvement of Services Users. ( Parrot, 2010:17 ) As a rehearsing Social Worker it is of import to recognize personal values and to be able to understand, state of affairss will show themselves were personal and professional values can conflict. It was merely when we had the talkers in that I began to oppugn my ain values. NISCC outlines a codification of Practice for Social Workers to adhere to, from listening to the talkers in category one issue that was highlighted was that of partnership. Partnership is now a really apparent portion of mundane linguistic communication of people involved in the procedure of supplying attention. ( Tait and Genders 2002 ) However it is non ever set into pattern. Mr Y referred to being kept in the dark about his unwellness, he was finally given a diagnosing, but it was neer explained to him what the significance of this diagnosing was or how it would impact his life. Social Workers have to exert professional discretion, due to the nature of their work ; opinions have to be made which involve values and effects that make the worker accountable for their actions. ( Thompson 2009 ) Partnership working is really of import for people with a disablement, I was able to recognize a struggle with my personal values when one of the Mr X spoke about a visit to the GP, where the GP was inquiring the carer how the Service User was experiencing instead that inquiring them, from listening to this I was able to recognize that this is something that I have done in the yesteryear and possible infantilises the person with remarks such as mentioning to them as we dote or wee pet and I neer thought that there was anything incorrect with utilizing these statements, nevertheless from the experience gained I can recognize that my personal values and the professional values are in struggle at this point. It is a manner of suppressing this person, and failure to advance their rights as an individual. When sing this in concurrence with the NISCC Code Of Practice, it was clear that there was a conflicting of values. NISCC states that as a Social Care worker we must protect the rights and promote the involvements of service users and carers as the Disabled Movement states Nothing about us, without us. We need to see the Service User position, one of the talkers stated effective partnership working should include the professionals and the Service user. Partnership is a cardinal value in the professional value base underpinning Community Care. Braye and Preston-Shoot 200343 ) Partnership should be promoted in several ways such as maintaining an unfastened duologue between professionals and Service Users, puting purposes, being honest about the differences of sentiment and how the power differences can impact them and supplying the Service User with information that helps to advance their apprehension. ( Braye and Preston-Shoot 2003 ) In the instance if the talker who was non given a diagnosing for a long clip and was merely put out of the adviser s office this cardinal countries did non use. Another issue that was striking was that of independency, ab initio my personal position was non of person with a disablement being independent, my personal experience in the yesteryear had led me to believe that people with a disablement required a batch of aid and were dependant on a carer to supply that aid, I did nt see them as being in employment. Some of these values were rather hibernating until I began working in the Social Care Field. The Speakers that we had in from Willow bank explained that they all have occupations and purpose to be every bit independent as possible. This highlighted the struggle between my personal and professional values which I need to be cognizant of. The NISCC codification of pattern provinces a Social Worker should advance the independency of Service Users, this is one struggle that I can admit with my personal values, I need to look at the bigger image an position the service users as single people with alone traits and involvements it is of impor t that they are non labelled due to their disablement, It is viewed that it is society which disables physically impaired people, disablement is something imposed on top of damages by the manner we are unnecessarily isolated and excluded from full engagement in society. ( Oliver 1996 ) My Personal position was that I believe that we should take to make things for people with disablements, I have frequently found myself transporting out undertakings for them that I know they are able to execute themselves, when the talker from 6th sense spoke about how she had been spoon fed and pushed around the resort area as a kid had gave her a sense of erudite weakness, it made me admit my ain actions. Again this is another country where my personal values conflict with the professional values. Respect for individuals in an highly of import values, although I believe I was brought up to demo regard for others by making dependence in a manner is disrespectful to the person. The publicity of independency is of import, it is important to see those with a disablement as single people. The NISCC codification of pattern high spots As a societal attention worker, you must esteem the rights of service users while seeking to guarantee that their behavior does non harm themselves or other people. Keeping in line with the NISCC Code of Practice I need to actively dispute my ain biass in order to guarantee that I am advancing anti-oppressive pattern. Bing able to understand the value conflicts in pattern can turn out to be really good. It can assist us admit the differences in the power construction, which can suppress the service user. Social Workers aim to authorise the Service User, to assist them assist themselves. It is of import that Professional values are ever at the head to advance anti-oppressive pattern. Social Work Practice is underpinned by Torahs, policies and processs. It is of import to ever be cognizant of the Service Users perspectives, this will assist guarantee more effectual and efficient pattern. Both our personal and professional values need to be acknowledged for effectual and efficient pattern. It is of small usage if Social Workers have a professional value base which does nt inform or act upon their pattern, Social Work moralss can be understood as Values put into actions. ( Banks, 2006 )