Thursday, October 31, 2019

Compare and contrast two, current commercial strategies from different Essay - 1

Compare and contrast two, current commercial strategies from different corporate organisations operating in different industries - Essay Example The commercial strategies are noted to be the strategic specifications that helps in developing the overall credibility of a company to perform and even helps it to develop operations specifically from the initial production to final needs. The maintenance of a commercial strategy enhances the ability of an organisation to manage the various operations and maintain its sustainable growth and development (Duquette, Kotler, McClelland, Ranjan & Zimmerman, 2014). In this context, it can be inferred that many organisations are incorporating commercial strategies to enhance the ability of the organisations to perform. Based on this context, the paper elaborates on the incorporation of the commercial strategies adopted by McDonalds Corporation and Toyota Motor Corporation. The paper compares and contrasts the strategies used by the two companies to develop their sustainable domain. Toyota Motor Corporation is a Japanese based automobile company that has enhanced its hold across the globe and is entitled to be the first automobile company that has the ability to produce 10 billion cars a year. The company was instituted in the year 1937 and it deals with luxury cars and commercial vehicles. The company has developed its sustainable domain based on the effective management of strategies and efficient use of resources (Nkomo, n.d.). The strengths of the company are observed to be the strong holds on the market and brand recognition that the company has in the global market. The strong focus on the Research and Development (R&D) has been enhancing the market share and developing its brand image in the global market. Furthermore, with an extensive network all across the globe, the company has enhanced their level of consumer satisfactions and further developed their brand loyalty (Nkomo, n.d.). Irrespective of the massive global presence and enormous brand image, the company has been facing fall in sales. This could be

Tuesday, October 29, 2019

Evaluation of the Company's Strategy Assignment

Evaluation of the Company's Strategy - Assignment Example M&S caters to niche customers because the products are expensive and exclusively branded. This allows the company to focus on the customer’s demand pattern and provide maximum customer satisfaction. With the declining economic climate, M&S has invested in their pricing to ensure premium quality at unbeatable price. M&S encourages its suppliers to remain aware of changing fashion trends to reduce the risks of over-production. The M&S brand is known for its quality as opposed to quantity and hence customers buy less quantity but high quality. Most of the M&S clothing range within great prices and hence are able to maintain their loyal customers. Additionally, the customer loyalty that the company enjoys is great for its market share as well as its profit margins. The company has several drawbacks. M&S products cater mainly to older population and this limits the perspective of younger generation. Moreover, M&S is not quick in adapting to changing fashion trends like its competit ors and critics often tag their clothing as insipid and out of fashion. Also, the products are costlier than its competitors. With its resources like exclusively branded products, high quality customer service and trained management team, the company can look forward to a bright and profitable future. Contents I. Introduction †¦Ã¢â‚¬ ¦..†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦.......................4 II. ... .........†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦13 VI. The Ansoff Matrix..................†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..14 VII. SAFS Framework.............................................................................................16 VIII. Core competences and dynamic capabilities..................................................17 IX. Synopsis of the Overall Strategic Situation.....................................................18 X. Conclusion and Recommendations..................................................................19 XI. References...........................................................................................................20 Introduction Marks & Spencer is a world famous British multinational retailer specializing in clothes and luxury items. Marks & Spencer is well known for quality and variations in its products like its clothing lines comes in all sizes, colors and sty les. The company began its commitment to value, quality and customer service in 1884 when Michael Marks and Tom Spencer entered into a business partnership. The company has evolved to one of the largest retailers globally. The entity ventured into the food business in 1931 and later moved into financial services in 1985 (Marks and Spencer Plc., 2012). Marks and Spencer is one of the leading retailer in the UK catering to 15.8 million customers each week. The number of employees is over 75,000 (Case Study: Marks and Spencer, 2008). The success this can be attributed to the quality home products, stylish clothing and outstanding quality foods sold in 766 stores all over UK, and 418 stores in other countries worldwide (Annual Reports and Financial Statements, 2013: 7). The entity is the best provider of lingerie and women wear and are increasingly

Sunday, October 27, 2019

Discussing The Characteristics Of Mobile Learning Information Technology Essay

Discussing The Characteristics Of Mobile Learning Information Technology Essay Mobile learning is the point at which mobile computing and electronic learning intersect to produce an anytime, anywhere learning experience. As mobile phone becomes popular in the society and many people can afford the cost, the demand of mobility is extended to teaching and learning purposes. 2.1 CHARACTERISTICS OF MOBILE LEARNING Mobile learning is dynamic. It is todays content not old news. On-line experts and best sources for emergencies are available[2] Mobile learning operates in real time. Learners get what they need, when they need it[2]. Mobile learning is collaborative as people learn from one another. It connects learners with experts, colleagues and professional peers[2]. Mobile learning is individual. Every learner selects activities from a personal menu of learning opportunities most relevant to his/her background at that very moment[2]. Mobile learning is comprehensive. It provides learning events from many sources enabling learners to select a favored format or learning method or training provider[2]. Mobile learning builds learning communities whose members forge[2]. 2.2: THE CHANGE OF LEARNING PARADIGMS Source:http://www.te.ugm.ac.id/~widyawan/mobilearn/MobilearnParadigm.pdf 2.3: INFORMATION TECHNOLOGY REVOLUTIONS Source: http://www.te.ugm.ac.id/~widyawan/mobilearn/MobilearnParadigm.pdf 2.4: HISTORY OF MOBILE DEVICES Modern mobile devices began with the Apple Newton in 1993, followed by the Palm Pilot in 1996. Five years later, the pocket pc and the introduction of flash player were the next significant introduction and have since been used for educational purposes. The next major development occurred when cell phones gained the capabilities of Personal Digital Assistants(PDAs) and merged connectivity. The various types of connectivity available through mobile devices include Wide Area Network (WAN), Local Area Network (LAN) and Personal Area Network(PAN). Within the area of education, it was originally envisioned that handheld devices could serve as computer replacements in which full courses could be delivered. Currently, there exist multiple devices available for mobile learning, ranging from PDAs to video players to cell phones. Add-ons to mobile devices such as cameras, barcode readers and Global Positioning System (GPS) are also popular. 2.5: USING MOBILE DEVICES FOR LEARNING Figure 1 shows students access to mobile devices. MAP FOR MOBILE Figure 2 2.6: MOBILE LEARNING FRAMEWORK It is predicted that the next phase of electronic learning development will be focused in mobile learning. Mobile learning is the point at which mobile computing and electronic learning intersect to produce an anytime, anywhere learning experience[2]. The following is a proposed framework for mobile learning: Mobile Learning Applications Mobile User Infrastructure (browser, handheld devices) Mobile Protocol(adoption of content with WAP) Mobile Network Infrastructure (cellular systems, satellites amongst others) Figure 3 Level 1: Mobile Learning Applications Many new applications are becoming possible and many existing electronic learning applications can be modified for a mobile environment[2]. Level 2: Mobile User Infrastructure In the mobile user infrastructure level, the design of new mobile learning applications should cater for the capabilities of the user mobile devices[2]. Level 3: Mobile Protocol In the mobile protocol level, the aim is to hide the underlying networks details from applications while providing a uniform and easy-to-use interface[2]. Level 4: Mobile Learning Infrastructure In the mobile network infrastructure level, service quality primarily depends on network resources and capabilities[2]. 2.7: CHOICE OF MOBILE DEVICE While various types of mobile devices can be used in mobile learning, the mobile device that will be considered during the development of the application will be mobile phone. 2.8: MOBILE PHONE Wherever you go nowadays, you can see people carrying their mobile phone with them. Mobile phone allows communication across the world, different countries and abroad countries. Nowadays, mobile phones do not only support voice calls, they can receive data and faxes, send short messages(SMS), access WAP services and provide full internet access using technologies such as GPRS. At the present time, mobile phones support wireless technologies such as: Infrared Bluetooth 3G WAP WIFI 2.8.1: LIMITATIONS OF MOBILE PHONE However, mobile phones possess various constraints that may affect their progress in the future. These are described as follows: Limited storage Small runtime heap Modest processor performance Limited screen size 2.8.2: CHARACTERISTICS OF THE LATEST MOBILE PHONES 2.9: WIRELESS TECHNOLOGIES Wireless Technologies denotes technologies in which the use of wire for communication is eliminated. Radio and TV broadcasting to mobile phone and Bluetooth are examples of wireless technologies. The latter was un-imaginable till Heinrich Rudolf Hertz in 1886-1988 demonstrated the transmission and reception of radio signals[4]. 2.9.1: DIFFERENT COMMERCIAL WIRELESS TECHNOLOGIES Radio FM and AM radio is the first to use wireless technology commercially. This brings wireless technology to the common man[4]. Television Another step ahead with wireless technology is Television broadcast. This introduces wireless technology even closer[4]. Mobile Mobile Technology such as GSM and CDMA made a revolution on communication and it uses time division, frequency division and code division multiplexing. These include the latest and hottest example of wireless technologies[4]. GPS Latest and greatest technology that uses wireless is Global positioning system-radio waves are used for this[4]. Bluetooth/WI-FI/Infrared With the introduction of computers, all these technologies are becoming popular to everyone. All these technologies are based on wireless. Bluetooth uses short range wireless technology that allows connection to various types of electronic equipment like printers, mobiles, camera amongst others to computers. WI-FI is mainly used to establish a wireless LAN and wireless internet connection which is called as hotspots[4]. 2.9.2: INVESTIGATION OF POTENTIAL WIRELESS TECHNOLOGIES There are three technologies that best suit the communication of two or more computers using standard network protocol without network cabling. An overview of these three technologies is described below: WAP The WAP protocol stack is made up of the Application layer Session layer Transaction layer Security layer Transport layer It provides an environment in which applications and services for portable and wireless devices are developed and executed. It includes a microbrowser, a markup language interface and push technology for the transmission of data to applications residing on clients plus multimedia message capabilities and content formats. Wireless Application Protocol(WAP) or WAP 2.0 is next generation of the WAP specification that delivers a richer and more secure experience to mobile internet services and even printers. WI-FI Wi-Fi stands for Wireless Fidelity and is used to define any of the wireless technology in the IEEE 802.11 specification including the wireless protocols 802.11a, 802.11b and 802.11g. The Wi-Fi Alliance is the body responsible for promoting the term and its association with various wireless technology standards[5]. A Wi-Fi network can also be used to enable connectivity to a larger Local Area Network(LAN) , Wide Area Network(WAN) or the internet[5]. To be able to use Wi-Fi, you must be using a computer or PDA that possess Wi-Fi connectivity already working. Most portable computers can add Wi-Fi using an adapter that plugs into a PC card slot or USB port[5]. Wi-Fi is supported by many applications and devices including video game consoles, home networks, PDAs, mobile phones, major operating systems and other types of consumer electronics[6]. Bluetooth Bluetooth wireless technology is a short range communication technology intended to replace the cables connecting portable and/or fixed devices while maintaining high levels of security[7]. The structure and the global acceptance of Bluetooth Technology means any Bluetooth enable devices, almost everywhere in the world, can connect to other Bluetooth enabled devices located in proximity to one another[7]. Connections between Bluetooth enabled electronic devices allow these devices to communicate wirelessly through short-range, ad hoc networks known as piconets[7]. 2.9.3: WIRELESS TECHNOLOGIES COMPARISON There exist numerous technologies to develop a mobile application. Hence, a comparison is made between these technologies in order to select the most appropriate technology depending upon the requirement of the system to be developed. Range Worldwide 10 m 100 m Frequency range 1000-Mbit/s 2.4 Ghz 2.4 Ghz Transmit range 54 Mbps 1 Mbps ~10Mbps Power High 1/5 of Wi-Fi High Penetration Penetrate objects Penetrate objects Penetrate objects Line of sight Not required Not required Not required Cost Cheap Cheap Cheap 2.10: WAP TECHNOLOGY WAP is an enabling technology based on the internet client server architecture model for transmission and presentation of information from the World Wide Web(WWW) and other applications utilizing the Internet Protocol(IP) to a mobile phone or other wireless terminal. However, WAP is a global standard developed by the WAP Forum for wireless devices to access the intranet and telephony services. WAP can also be used to access data from corporate intranets through public or private IP networks[8]. Figure 3 shows the WAP services that are currently offered. Figure 4 2.10.1: FORMATION OF WAP Ericson, Motorola, Nokia and Phone.com founded the WAP forum in June 1997 to create license-free standards for the entire industry to use in order to develop products based on WAP. 2.10.2: WAP SPECIFICATIONS WAP is an open specification that defines a set of protocols application, session, transaction, security and transport layers. To leverage existing programming and development skills, WAP is based on existing standards and protocols such as XML, HTTP, UDP, HTML and Javascript[8]. The key elements of the WAP specification include: A well-known application development framework- The WAP transport model is analogous to the internet model, except for the gateway that is inserted between the web server and the client[8]. WML(Wireless Markup Language) as the standard markup language. A browser inside WAP services that parses WML and WMLScript[8]. A framework to support advanced telephony, like WWW to mobile messaging, call forwarding, mobile to telefax access and address book access[8]. Figure 5 Figure 4 compares a protocol stack based on the internet model to WAP. As you can see, numerous networks are included in WAP with the ultimate goal of targeting multiple networks. WIRELESS SESSION LAYER(WSP) The wireless session protocol is an interface between the application layer and delivers all functions that are needed for wireless connections. A session mainly consists of 3 phases: start of the session, transferring information back and forth and the end of the session. Additionally, a session can be interrupted and started again(from the point where it was interrupted)[9]. WIRELESS TRANSACTION PROTOCOL The Wireless Transaction Protocol (WTP) is a transaction-oriented protocol, executed using a datagram service. WTP offers the following functions[9]: Three classes of transaction services Unreliable one-way requests Reliable one-way requests Reliable two-way request/response transactions Optional user-to-user reliability feature The WTP user triggers confirmation for each received message[9]. WIRELESS TRANSPORTATION LAYER SECURITY(WTLS) The wireless transport layer security is an optional layer or stack which consists of description devices. A secure transmission is crucial for certain applications such as e-commerce or WAP- banking and is a standard in these days. Furthermore, WTLS contains a check for data integrity, user authentication and gateway security[9]. WIRELESS DATAGRAM PROTOCOL(WDP) The wireless datagram protocol represents the transfer or transmission layer and is also the interface of the network layer to all the above stack/layers. With the help of the WDP, the transmission layer can be assimilated to the specifications of a network operator. This means that WAP is completely independent from any network operator. The transmission of SMS, USSD, CSD, CDPD, IS-136 packet data and GPRS is supported. The Wireless Control Message Protocol(WCMP) is an optional addition to WAP, which will inform users about occurred errors[9]. 2.10.3: HOW WAP WORKS A typical WAP network consists of the following components[8]: User with WAP-enabled device Gateway Application server The Application server can be located in either a public or private IP network. The gateway is normally located in telecom networks but it can be setup by a company using its own computer systems[8]. A typical scenario using WAP technology A user with a WAP device requests content from the application server[8]. The request reaches the gateway first, which does the protocol translation from WAP to HTTP and routes the HTTP request to the destination server[8]. The server returns WML output and adds HTTP headers to the gateway, depending upon whether dynamic or static pages are requested[8]. The gateway converts WML and HTTP to binary form to conserve bandwidth and returns a WAP response to the user[8]. The browser inside the WAP device interprets the WML and shows the contents[8]. 2.10.4: WAP LIMITATIONS Compared to PCs, wireless devices are limited in terms of processing power, memory, battery life and display size. Other issues of low bandwidth, latency and connection stability brings motivation to come up with new set of WAP technologies[8]. 2.11: INVESTIGATION OF POTENTIAL MOBILE WAP (and Web) INTEGRATED DEVELOPMENT PLATFORM Web development on mobile phones has long suffered from a rigid platform and the inability for mobile browsers to keep up with current web technologies. You could test your WML code with a cell phone but most providers charge a premium for Web access and testing could cost a lot. Instead, there exist emulators that are available, some of which are packaged with a full SDK while some even include a full Integrated Development Environment (IDE). 2.11.1: WML EMULATOR Instead of installing an entire WAP SDK, you can install a WML emulator. An emulator allows you to view the contents of your WML files as they would be appear on the screen of a WAP-enabled device. There are various WAP emulators available. Some are illustrated below: WAP PROOF 2008 professional version 4.2.0327 WAP Proof is an emulator of a WAP browser for Microsoft Windows, a universal WML, HTML and XHTML intended for designers of mobile content. It is designed for the preview and debugging of mobile websites. The purpose of a WAP proof is to emulate the rendering of WML 1.3, HTML, XHTML Mobile Profile 1.0 and Chtml documents by different devices. The mobile- oriented content is rendered exactly as if it was downloaded on the real cellphone[10]. The source code of the WML document can also be viewed as illustrated below. KLONDIKE WAP BROWSER This is produced by Apache Software. Klondike looks like a Web browser and is therefore very easy to use for beginners. Local WML files can be accessed easily. Klondike WAP Browser employs the Wireless Markup Language (WML) through an implementation of Klondike WAP Microbrowser Engine, including character entities, text input and validation, single and multiple selection boxes, variable substitution, deck-card task and event shadowing, deck access control, GET and POST methods, variable escaping, timers, and BMPs and BMP anchors[11]. YOSPACE Yospace is a mobile application s innovator and platform provider allowing digital publishers, mobile application developers, and mobile operators to rapidly and affordably deliver mobile video services[12]. WAP developers can use the desktop edition of the emulator to preview WAP applications from their desktop as the emulator provides a reasonably faithful reproduction of the actual handset products. WinWAP This is produced by Slob-Trot Software. WinWAP is a WML browser that works on any computer with 32-bit Windows installed. Moreover, it is web browser for WAP made by Winwap Technologies available for Microsoft Windows and any Windows CE powered device, like the common Windows Mobile powered Pocket PC phones[13]. WML files can be browsed locally from the hard drive or the internet with HTTP(as with your normal browser). 2.11.2: WEB SERVER SERVICES SOFTWARE EasyPHP version 5.3.2 EasyPHP is a complete software package that allows you to use all the power and the flexibility that dynamic languages like PHP offer as well as the efficient use of databases. Package includes an Apache server, a MySQL database, a full PHP execution, as well as easy development tools for your applications. You can change MIME configuration in apache to make the server recognize WML pages, WMLS and WBMP. CERN server It is a generic public domain full-featured hypertext server that can be used as a regular HTTP server. The server is typically running on port 80 to serve hypertext and other documents but it can also serve as a proxy a server on a firewall machine, that provides access for people inside a firewall to the outside world. Furthermore, the server runs on most Unix platforms[14].

Friday, October 25, 2019

Prejudice and Racism at Our School :: Sociology Racism Prejudice Essays

Prejudice and Racism at Our School Racism...the belief that a particular race is superior to others; discrimination or prejudice based on race. Racism has been around for a long time and its effects have been seen a lot in the past few centuries: during the 1800s and earlier - in slavery, the Civil War, and slaves being freed; and then recently, during the 1900s - in the Civil Rights Movement. Everyone in the United States is supposed to have equal rights and not be discriminated against because of race, but sadly, that is not always what happens. Racism shouldn’t be around anymore, but it is, even in WCCHS. Sometimes it’s in the form of racist comments or racial slurs, and other times it’s in the form of "who hangs out with whom." Something needs to be done about this. I think that if there were more integration in school-related activities, then students of different races would learn to accept each other the way they are, and racism wouldn’t be an issue at WCCHS. As was stated, even though there shouldn’t be racism at WCCHS, there is. Although once in a while teachers might be involved if someone says something racist against them, most of the racism is between students. Although I don’t really see a whole lot of it and what I do see isn’t major, it is still there. Generally, Hispanics and non-Hispanics get along okay at WCCHS; a lot of the racism expressed in these two groups is just little things, such as racial slurs or mean comments about someone just because they are or aren’t Hispanic. To get a broader view on racism at WCCHS and why it occurs, I interviewed Karen Miller, a freshman of Polish and German descent; Gabe Antonio, a freshman of Mexican descent who knows both English and Spanish; and Mr. Sayner, a World Geography/Global Studies teacher of western European descent. Karen, Gabe, and Mr. Sayner all agreed on their definitions of racism. Gabe said that racism means â€Å"people saying bad stuff about other races and cultures,† Karen said that it means that someone doesn’t like another person just because of their race - they are prejudiced, and Mr. Sayner said it means â€Å"people judging someone else based on physical characteristics like skin color.† In all three definitions you see that people are basing their opinions of others on outward characteristics rather than finding out for themselves what they are like.

Thursday, October 24, 2019

Honesty Versus Justice and Due Process Versus Crime Control

Honesty versus Justice and Due Process versus Crime Control Lisa Moore University of Phoenix Ethics in Justice and Security CJA 530 March 07, 2010 Roger Long JD Honesty versus Justice and Due Process versus Crime Control The criminal justice system is built on a foundation of honesty and justice. For justice to work, the justice system, and criminal justice professionals must be honest. The word honesty, describes an individual that doesn't lie, cheat, steal, or abuse to get ahead for personal or professional gain. The word justice describes the concepts of moral rightness based on ethics, rationality and fairness. How can there be justice if the guilty go free or if the innocent pay for crimes he or she never committed. â€Å"In order for this to occur, our legal system must be one that demands absolutely honesty, such as when someone is called to testify he or she is asked, Do you swear to tell the truth, the whole truth, and nothing but the truth? If false accusations and false evidence are presented against the innocent, they will be punished as if they are guilty† (RealPolice, 2000). The place of honesty in a system that promotes justice has sparked a controversial issue among the Criminal Justice world, that honesty could be put on the back-burner when pursuing justice. For example when officers present false evidence to prosecutor in order to have a case against the accused when they believe he or she will not be found guilty. A good example of deception by law enforcement occurred in 1993, when â€Å"Craig D. Harvey a New York State Police trooper was charged with fabricating evidence. Harvey admitted he and another trooper lifted fingerprints from items the suspect, John Spencer, touched while in Troop C headquarters during booking. He attached the fingerprints to evidence cards and later claimed that he had pulled the fingerprints from the scene of the murder. The forged evidence was used during trial and John Spencer was sentenced to 50 years to life in prison† (New York Times, 1993. ) It is â€Å"important that the officials within the justice system be held to higher standards in moral and ethical behavior. As the law enforcement arm of our legal system, Law enforcement officers take a front-line role in activating the laws our legislators create. If they arrest those they know are innocent, create fake evidence against the innocent, or otherwise undo the requirement of honest and honorable behavior, they undo the processes of the justice system from the very beginning, and therefore corrupt the whole process† (RealPolice, 2000). Honesty and justice are the entities that we depend on to distinguish between right and wrong, good and evil, legal and illegal. We depend on justice to keep us safe from evil and allow us to live our lives in harmony and peace, without chaos. According to John Locke (1690), we, as citizens, give up sovereignty to a government or other authority in order to receive or maintain social order through the rule of law under the Social Contract Theory. Crime control and due process models are â€Å"two competing systems of values operating within criminal justice, the tension between the two accounts for the conflict and disharmony that now is observable in the criminal justice system† (Hoffman, p. 12, 2000). Although they are both different systems both impact the way our judicial system is ran. â€Å"When comparing the due process and crime control models, it should be kept in mind that proponents of both models embrace constitutional values† (Hoffman, p. 11, 2000). The concept of Crime Control Model is to get the criminal off the street and to protect the innocent. â€Å"The Crime Control Model could perhaps be seen in a negative mannerism due to the fact that it assumes the alleged criminal is guilty even before they step foot into the court, this model supports those actions of the police and prosecutors to the fullest extent† (Zalman, p. 3, 2002). This â€Å"model moves the alleged criminal through the system with the forethought that everyone is guilty until proven otherwise, and also limits the amount of plea-bargaining and appeals. The main objective of the criminal justice process should be to discover the truth or to establish the guilt of the accused† (Hof fman, p. 11, 2000). The â€Å"Due Process Model resembles an obstacle course† (Zalman, p. 13, 2002). â€Å"This system is far more realistic in the fact that it leaves room for error. It does not automatically assume that the alleged criminal is guilty before the case is proven. This system does not want to risk prosecuting an innocent person† (Zalman, p. 13, 2002) it â€Å"demands the prevention and elimination of mistakes to the extent possible. The Due Process Model is said to be â€Å"suspicious of those who are power hungry and merely looking to convict. The difference between the two models in this sense is that the Crime Control Model is based upon factual guilt and the Due Process Model is based upon legal guilt† (Zalman, p. 14, 2002). â€Å"Due Process is also based upon equal treatment of the defendant. The reason that this is believed is because it is felt that errors are the cause for an invalid conviction. While the Crime Control Model strongly contradicts this view it can sometimes hinder a person’s rights within the system† (Zalamn, p. 14, 2002). In the case of Charles Manson, the crime control model, was swift and took the criminal off the streets. â€Å"Manson was found guilty of conspiracy to commit the Tate and LaBianca murders, carried out by members of the group at his instruction. He was convicted of the murders themselves through the joint-responsibility rule, which makes each member of a conspiracy guilty of crimes his fellow conspirators commit in furtherance of the conspiracy's object† (Linder, 2002). The case of â€Å"Roe v. Wade is a good example of the due process model, making it a crime in under Texas law to assist a woman to get an abortion violated her due process rights. The Court held that a woman's right to an abortion fell within the right to privacy protected by the Fourteenth Amendment. The decision gave a woman total autonomy over the pregnancy during the first trimester and defined different levels of state interest for the second and third trimesters† (Oyez Project, 2010). Both models have been opposing each other for years, the crime control model used by law enforcement is based on the assumption that the evidence in a case is reliable and factual not fabricated. Under the due process model the individual charged with a crime will have his or her rights protected To determine that one model is better than the other one would have â€Å"to make a value judgment. Crime control reflects conservative values, whereas due process model reflects liberal values. In my opinion the due process model is unbiased, and follows the principles of the Declaration of Independence† (Hoffman, p. 1, 2000). Too bad the two models cannot come together to form a model that would work for everyone. References (1993) â€Å"Police Investigation Supervisor Admits Faking Fingerprints† The New York Times Retrieved March 7, 2010 from http://www. nytimes. com (2000) â€Å"Honesty in the Justice System† RealPolice Retrieved March 7, 2010 from http://forums. rea lpolice. net Hoffman, D. (2000) â€Å"Great Debate in Criminal Justice: Should the Crime Control Model or the Due Process Model Prevail† Criminal Justice Cliff-Notes pgs. 1-12 Retrieved March 7, 2010 Linder, Doug (2002) â€Å"The Charles Manson (Tate-LaBianca Murder) Trial† UMKC Law Retrieved March 7, 2010 from http://www. wikipedia. com Locke John (1690) â€Å"Two Treatises Government† Project Gutenberg (10th edition)Retrieved March 7, 2010 from http://www. gutenberg. org/dirs/etext05/trgov10h. htm The Oyez Project, â€Å"Roe v. Wade, 410 U. S. 113 (1973)† Retrieved March 7, 2010 from http://oyez. org/cases/1970-1979/1971/1971_70_18 Zalman, M. (2002) â€Å"Analysis of the Crime Control and Due Process Models† Criminal Procedure: Constitution and Society Retrieved March 7, 2010 from http://www. associatedcontent. com

Wednesday, October 23, 2019

Case Study of the Parish Church of Zejtun

Introduction What led the community to construct the Parish Church of Zejtun? Prior to the bing parish church of Zejtun, there was what is now called theOld Parish Church of Zejtun,or more normally known as theChurch of Saint Gregory, a mention name gained due to the presence of a statue of Pope Saint Gregory the Great situated near to the church. The inside informations refering the building of this church are unknown, but several architectural parts of the church indicate that parts of it were built in the 15Thursdaycentury while others have been constructed in the undermentioned century. By the terminal of the 17Thursdaycentury and the early old ages of the 18Thursdaycentury, the population of Zejtun has seen considerable growing. This growing resulted in the so parish church of Zejtun to go non fit for intent, therefore serious idea started to be made about the demand of a church which could function a turning population. The primary event that set on paths the thought of the building of a new parish church started all due to a ground that the so baronial 1s of the community strived to go good known. Therefore, with the want of going known and besides to be remembered for centuries, it was Gregorio Bonici who signed a contract which showed that a land known astal-Chasirawas to be donated to the church to function as the site to raise what would go the new parish church of A »ejtun. This contract can be said to hold been a really generous one, as the donated site, which besides had the advantage of being in the Centre of A »ejtun, could non merely be the topographic point for a new monumental church, but it besides had the infinite for a vestry, an oratory, and besides a broad church square. To reaffirm the importance that helpers gave towards their privation to be remembered during these ages, in the instance of the parish church of A »ejtun, apart from Gregorio Bonici there was before besides a nother citizen whom donated land to the church, but this land was considered as non being a preferred one due to the constrains it held and besides because of its distance off from the Centre of the town, which was truly of import at that clip since it had to function for the whole community at a clip in which there was no dependable manner of transit. Besides, the Testaferrata household, the inheritors of Gregorio Bonici, owned an communion table in the chief crypt of the church. But for baron Bonici this was non his last contribution, he wanted to be certain that this undertaking moved swimmingly and reached its’ phase of completion, therefore he continued to shoot money towards the funding of the undertaking up to a upper limit of 30 old ages after he and his married woman had died, as is found written in his secret will. hypertext transfer protocol: //www.A »ejtunparish.com/pages/r1/zepDart.asp? m=394 hypertext transfer protocol: //www.mepa.org.mt/A »ejtun The first measure to do this undertaking materialise saw its induction by the design of the celebrated designer Lorenzo Gafa’ . This can be seen in the trial study of Cocco Palmier of 1693, naming Lorenzo Gafa’ as the interior decorator of the program of the new church and which by that clip he had already started working on the eastern side of the church. Almost nil can be said sing the old ages that followed, as the consequence of research that has been made in this respect is that there are no studies on what was go oning and the advancement of the undertaking. Another of import point which leaves a nothingness when it comes to discoursing about the primary phases of building, an point which most likely has been lost, is the original set of programs of Lorenzo Gafa’ . The research done by Giulia Privitelli in her thesis ‘THE PARISH CHURCH OF ST. CATHERINE OF ALEXANDRIA IN A »EJTUN: AN ARCHITECTURAL APPRAISAL’has resulted in the determination of paperss located in the archives of the Cathedral Museum of Mdina, which although doesn’t consist of the existent programs of Gafa’ , there is a papers which lists three of import dimensions, those of the breadth and length of the nave, and besides the dimension of the transept. These dimensions are recorded inpalmiand although some disagreements can be found when it comes to change overing these dimensions to metres, they come truly close to the existent sizes. Taking as an illustration the length of the nave ( without the apsis ) , it is recorded as was supposed to be 182 palmi, which converts to 46.6m, of which there is a different of merely 1.9m from the existent size, measured as 44.5m. If we were to take these measurings as being what Gafa’s plans consisted of, the result would hold been a latin-cross form church, a signifier which was get downing to derive popularity with the Maltese community. With such information, it is normally understood that the bein g of other parts of the church, such as the side-aisles, were ulterior add-ons and non portion of Gafa’s original programs. It was the 25Thursdayof November 1692, when Gregorio Bonici and the remainder of the local community, have seen the grade of the start of the building on site, for a edifice that the locals of A »ejtun felt a great demand of. On that twenty-four hours, Bishop Cocco Palmier placed a medallion which exhibited his coat of weaponries, inside a lead box which was put at the foundation of the church. With the work of Guilia Privitelli, today we have a new position sing the architecture of the parish church of A »ejtun. Privitelli’s thesis, in contrast with the other antecedently published literature, does non merely take into consideration the early designs of Lorenzo Gafa and his artistic beginnings. The thesis takes into history ; the ulterior additions/alterations done to the church and how these additions/alterations have been affected by the already present construction. What has besides seldom been given adequate importance, is that several old ages have passed from when the undertaking started until it was wholly finished to the current signifier it is today. Throughout these old ages, the leading of this undertaking has been transferred from one individual to another, and with such alteration that already by itself brings a alteration in the manner the undertaking director thinks and plants, there is besides the factor of what became stylish and aesthetically mor e preferable at the clip of a certain building stage. When such factors are given equal importance in a published literature, so one can get down to do comparings sing the architectural designs and cosmetic inside informations that came out at different periods and under different undertaking directors. To give a farther different position, this paper will be laid out as if one doing a circuit around the parish church of A »ejtun, of which foremost the outside will be discussed and so the focal point will turn about the inside of the church. Outside As stated already earlier, the parish church of A »ejtun has the signifier of a Latin-cross, it is a church which has a size which is well bigger than those churches which have been antecedently built. One might believe that this thought of edifice in the signifier of a Latin-cross was due to the influences brought to us by the Knights of St. John. This is true, but there was besides an thought which emmerged from one of the most of import oecumenic council of theRoman Catholic Church, the Council of Trent. Although the council didn’t give instructions on the manner in which a church had to be built, it gave a form in which the chief altar-space had to be flanked by transepts which were normally made externally seeable. When discoursing about the parish church of Zejtun, one can debate about whether the church still holds a true typology of a Latin-cross or non, and this is chiefly due to the ulterior add-ons of the oratory edifice and besides the side isles which made the o utside of the church look wholly different so it was intended to be by Lorenzo Gafa.FacadeA characteristic which is frequently recognized sing the facade, is the proportion between the breadth and the tallness, in which the horizontality is greater than the breadth with a entire ratio of 1.51:1, composed of seven bays divided vertically in two equal parts ( while excepting the bell towers and the frontispiece ) . The verticalness gained through the usage of Doric pilasters on the lower grade and the Ionic pilasters straight above, which reach along the whole facade making the already celebrated seven bays, is lessened with the presence of uninterrupted entablature, therefore beef uping the already strong horizontality feature. It should be noted though that if we excluded the late extension of the sides, the facade would hold most likely consisted of merely the in-between three bays, therefore the sense of horizontality would hold been wholly non present with a tallness to width rat io wholly the antonym from the current bing facade. All three doors of the facade along with the two statue niches above the little side doors have a triangular pediment, while the stained glass window above the chief door has an arched pediment, besides it can be said that the frontispiece has a broken arched pediment. The frontispiece is made of a marble tablature written in the twelvemonth 1720, and it serves to mark the dedication of this church towards Saint Catherine of Alexandria. This frontispiece stands in the center of two statues, stand foring Saint Peter and Saint Paul, in which at first were the lone statues decorating the facade of the A »ejtun Parish Church. It was around the eightiess that the facade was besides ornamented with two other statues in the niches straight above the little side doors, allegorically portraying religion ( ‘Fede’ ) and hope ( ‘Speranza’ ) . Side-aisles It was around 1779 that the side-aisles of the A »ejtun Parish church were constructed, therefore traveling from the initial three in-between bays, to the current bing seven bays facade. At the clip during the 18Thursdaycentury, it was a known factor that churches wanted to portray a genuinely greater dominant visual aspect over the surrounding, therefore the easiest manner this could be gained, since besides the site permitted for such undertaking particularly in the instance of the parish church of A »ejtun, was the add-on of the side-aisles. The proposal for such undertaking wasn’t granted permission based on the thought that the church wanted to tag farther monumental laterality, but the issue of serious demand of sidelong support support was brought frontward based on the fright that there was the possibility that the nave could fall in. This was the idea of Giuseppe Bonnici together with a figure of designers. Although this big extension was certainly non wholly need ed to merely reenforce the nave supports, when the factors of ; viability, need for enlargement due to the turning community and besides the aesthetically pleasing visual aspect this undertaking could hold provided, were taken into consideration, the permission was to the full granted. This extension of the side-aisles brought with it several alterations, such as the little domes on the sides, which have the map of allowing visible radiation into the church along with the several stained glass Windowss on the sides of the nave. Besides there was the building of an arched buttress screen. This undertaking has normally been understood that it had been completed on the 3rdof May 1779 due to the fact that one can happen this day of the month engraved on one of the winging buttresses, which most likely was the last flying buttress to be built. Bell Towers What remains to be discussed when it comes to the west side of the church are the bell towers. It must be understood that even as said before, ab initio the facade of the parish church of A »ejtun was wholly different due to the fact that merely the nave was existing, though this doesn’t mean that there were no bell towers. When looking at the thickness of the transept walls, at their internal handbill walls it is noticed that these could hold been what remains of the bell towers that existed at the transepts. The architectural thought of making two bell oarsmans on the frontage was non really popular in the early seventeenth-century churches and Gafa’s subsequently church designs, but the Maltese were made to alter their head as this characteristic of a two-towered western frontage was implemented to the Mdina Cathedral. The ground for which the location of the bell towers of the parish church of A »ejtun was changed to the current place, is seen to be a forceful one, and the chief cause was due to the bad province in which the bell towers had ended. It is said that the component which air current forces from the north-west way. The figure of bells which have been placed in these bell towers goes up to fourteen, crossing merely over three hundred old ages. Today, the bell tower on the right houses the five to the full working bells, four of which have been produced in 2005, while another ( ‘Antonia’ ) was founded in 1947 and shill has a good tonal sound, all of which have been done by the British company John Taylor. Dome Although it has been said that the bell towers have been severely affected by the air current, up to the point of necessitating Reconstruction, on the contrary, at that clip the dome was still to the full structurally stable and didn’t demand to be changed or restored. But the current dome of the Parish Church of A »ejtun isn’t the original one which was designed by Lorenzo Gafa, alternatively, the old lantern-less dome had to be dismantled and rebuilt, based on the design of Joseph Zahra. It was in early 20Thursdaycentury that the original dome was deemed to be structurally non safe, and was therefore dismantled, with Zahra’s design taking over. Though the dome has been reconstructed ( while wholly non following Lorenzo Gafa’s design ) , the original dome membranophone has been kept. It can be easy noticed that the current dome design followed no geometrical order so as to do it a incorporate component together with the Lorenzo’s dome membranopho ne. The diameter of the dome has been recorded to be approximately 11.61m, merely about 0.04m less than the dome of the Mdina Cathedral. External Ornamentation Apart from the two rock sculptures stand foring allegorical figures of Faith and Hope which have already been discussed, one can happen another exclusion made to figurative sculptural ornament. On the North and south frontages of the church one can happen bull-like antefixa. These figures, although they are H2O spouts which have been modified, can be compared to the well-known â€Å"tongue-masks† , which are figures that are created so as to assist in maintaining off evil liquors. These type of â€Å"tongue-masks† , with broad and convex eyes and a level and widened nose have become widely popular in Malta during the stay of the Order of Saint John. During the early 19Thursdaycentury this sculptural tradition, together with its symbolic significance, started to lose its popularity within the Maltese community. Interior Upon come ining into the parish church of Zejtun, one can recognize the big proportions of the inside. When compared to churches organize the primary coevals, it can be said that the proportions of the parish church of Zejtun are of significant difference and the nave can be considered as a good illustration. The nave normally had an country which covered a span which was twice every bit long as it was broad, but in the instance of Zejtun’s church, the measuring ratio is 1:2.46, giving a stronger eastern impulse when standing on the interior. A greater nave tallness and internal light was obtained due to the attack adopted for the roofing system, which was introduced into the Maltese community by Francesco Buonamici. What can besides be noticed about the nave of the parish church of Zejtun is that it has a feature of continuity. This characteristic is present due to the Attic pilasters that follow the same perpendicular lines as those created by the elephantine pilasters at th e nave degree, making a strong signifier of integrity between the lower and upper portion of the church. During the clip in which the side-aisles were non constructed, the arches that open from the nave, integrated communion tables in them. These communion tables were subsequently moved backwards due to the extension of the side-aisles. All the side-aisles communion tables are composed in the same manner, built all in a niche-like composing, with the sidelong sides of these ‘niches’ decorated with pictures. One interesting characteristic is that they are placed within the thickness of the side-aisles’ walls, a characteristic which makes the side-altars different from the communion tables at the transepts and those of the choir. Some characteristics are common for all the communion tables of the church, even the chief communion table. All the communion tables are elevated by two stairss, keeping a symbolic significance that one must look or make upwards, doing the perceiver spiritually feel that there is a force which is much greater than him. Besides all communion tables have their ain, or portion between them, a cupola, in which instance the side-aisle’s communion tables have one cupola each, which is the same as those of the choir and the transepts, but of a smaller graduated table and which are less adorned. Eleven of the communion tables have a pleasing signifier of architectural and sculptural model, of which can be in some manner considered as being of a Baroque manner, although the communion tables of the choir and the transepts are a bit over-elaborated to be wholly considered as of the Baroque manner. Decision In decision, it can be said that when one Tours about and inside the parish church of Zejtun dedicated to Saint Catherine of Alexandria, one is touring a church of which throughout its building has fallen in the custodies of several interior decorators, most of which have influenced the concluding signifier of the church. The different custodies, and the old ages taken for the completion, have resulted in the building of a monumental edifice, a edifice of which certainly can break function as the new religious meeting topographic point for the community of Zejtun, and a memorial which the local community thinks that is the edifice which genuinely honours its dedication to Saint Catherine of Alexandria.