Monday, October 14, 2019

Event Planning for Homeless Charity

Event Planning for Homeless Charity Michelle VillaruzBryan Rodriguez Tommy ThuChris Serrano Giveaways: A Charity Event Helping the Homeless Mission: Accomplish a well done community service for our nations neighborhoods that are experiencing homelessness and initiate an essential way of getting resources. Project Description: Conception The homeless need food, drinks, and bath and body essentials. Planning Catering to up to 75 homeless individuals, complete all tasks in three weeks. Retrieve $600 funds (Donations, Salvation Army, (San Francisco) Department of Homelessness and Supportive Housing) Start collecting goods and equipment (tents, tables, trash bags) to set up the charity event Find volunteers (product counter, assistants, drivers) Promote Golden Gate Park in San Francisco, date and time TBD Execution The turn out of the charity event goes well with the homeless retrieving their goods. Termination Clean up. Project Product: Homeless retrieving food, drinks, and hygiene products. Milestones: Funds and donations retrieved Resources complete (Volunteers, perishable items, equipment (tents, tables and trash bags, etc.) Make a website (Facebook page) + other promotions Search for a safe neighborhood park Set up date, time, check weather The turn up is real and moving well Assumptions: Everything goes as planned with cost, resources and time. If we do not make $600 in funds, well set another date for the event until we do If we do not have enough resources (volunteers, equipment, items) well make do with what we have Proposal Outline for Charity Event Helping the homeless Giveaways Executive Summary Homelessness is a huge issue in San Francisco Bay Area as well as the United States as a whole. Unfortunately, there are approximately 600,000 Homeless in America alone. Our team leader Bryan has requested ways to potentially fundraise for homeless and create ideas for a solution to homeless. His request includes different methods such as researching and fundraising. To create these ideas a basic knowledge on homelessness was needed. This included what it was like to be homeless and how some people became homeless. After gaining some knowledge of homelessness it was necessary to find ways to both raise awareness for homelessness as well as ways to fundraise for our non-profit organizations Fund. Problem a brief statement of the problem or need (one to two paragraphs) The homeless need food, drinks, and bath and body products and we will hold a charity event that will cater to their needs. Solution a short description of the project that includes what will take place, the benefit, how and where it will operate / work, for how long and who will staff it (one to two paragraphs) Well collect donations (food, drinks, bath and body products) and purchase water bottles. Funding requirements an explanation of the amount of money required for the project and future funding plans (one paragraph) The Salvation Army, The San Francisco Department of Homelessness and Supportive Housing are who we are planning on getting funds from. Well be collecting essential donations. Organization and its expertise -name, history, purpose, activities and capacity to carry out the proposal(one paragraph) Giveaways is a charity event held to cater to the homeless. It will be held in neighborhood parks. Donations of food, drinks, and hygiene products will be given away. Our team of volunteers will help make this work. With some funding from the Salvation Army and the SF Dept. of Homelessness and Supportive housing, we hope to carry out these good deeds. Statement of Need Three paragraphs that allow the reader to learn more about the issues, presents the facts and evidence that support the need for the project and establishes that your non-profit understands and can address the problem. -Use accurate, specific facts / data to support the project and illustrate the need. -Provide an example that hits home. -Provide hope (i.e. dont just talk about how bad run-off from development, emphasize what can be done about it) -Put a human face on it, provide real life examples and emphasize the needs of those served We need funds, donations, equipment, volunteers to successfully cater to the homeless. Project Description (See Above) Nuts and bolts of the project -Describe the project in a way that is interesting / compelling -Five sections OObjectives Define measurable improvements in behavior, performance, process or a tangible item that will result from the project. OMethods A detailed description of the activities leading to achieving the objectives that includes how, when (project timeline), and why the methods will work. OStaffing / Administration A short description of the number of staff, their qualifications and what they will be doing. OEvaluation A description of how the organization and the funder will know the project is a success. What methods will be used to evaluate success? What types of measures -qualitative or quantitative? Remember that success is not just completing a list of activitieswhat is the impact of the activity on achieving the objectives? Who will measure success? OSustainability Since funders rarely want to make a long term commitment to one organization, they want to know that the project will attract other funders. Evidence of current funding (for larger projects) is helpful and may be requested. Budget Provide a summary of direct and indirect expenses, as well as anticipated revenue, for the completion of the project. For ease of understanding, this summary is usually in the form of a chart and includes narrative to explain anything unusual. Estimated Labor Volunteers Estimated Materials 200 Estimated Contractors None Estimated Equipment and Facilities 400 Estimated Travel 15 Total Estimated Cost 815 Organizational Information (See Above) History, mission, and project fit within the mission, structure, programs and expertise, board, activities, staff, audience served, special needs of audience, why we are needed, and number of people reached through our programs. (one to two pages, maximum) Conclusion A concluding paragraph or two that is used to make a final pitch for the project. Everything goes as planned. Resources, cost, and time are met. Our clients (the homeless in San Francisco) have retrieved their essentials. Standard Proposal Letter Outline (a short version of the full length proposal) Ask for the gift -why you are writing and the funding request   Ã‚  

Sunday, October 13, 2019

Viking Impact on Northern Europe :: miscellaneous

Viking Impact on Northern Europe When we hears the term Viking an immediate image of bloodthirsty men with long beards and horned helmets is conjured up in our minds. This is the image the historical sources have given us, and it is partly true. Vikings were merciless when raiding, but they were peaceful when they traded. Their navigational technology was exceptional, and the ones who settled in foreign lands contributed greatly to the lands’ culture. The Vikings are famous for their violent ways when they pillaged and plundered villages of Northern Europe. Their dramatic exploits commenced during 800 – 1050 A.D, The first being the raid on Lindisfarne Monastery in 793, followed by a chain of attacks all over the coast of northern Europe during the next 200 years. As the years went on the frequency of Viking attacks increased as they became bolder. They were opportunists, raiding when the villages were off–guard or weak and trading when they were powerful. The speed and tactical advantage of the Viking longships allowed them to slip quietly ashore, pillage the village and make a fast getaway via water before the village can summon an army. By this time some Viking plunderers would stay over winter in a village. Soon their raiding camps became settlements and Viking control over Europe began to grow, it was not long before Vikings overran most of England. The other skill that Vikings excelled at was the skill of navigation. Their longships were the cutting–edge technology at the time, and their ingenious sun-compass, which worked somewhat like a sundial, allowed them to sail to their destination with precision. The longships were usually made with oak boards stripped from trees with thin ropes soaked in pitch trapped between joints to act as a flexible, waterproof membrane. These ships, combined with their streamlines design, are very fast and seaworthy and would flex out of places when a sturdier ship would shatter. The sun compass is also very useful because it is the only directional tool at the time. It uses a shadow cast by a small pin in the middle of a round plate with bearings to give the direction. This tool allowed them to sail on open seas without landmarks for directions, a great advantage. This tool allowed them to sail on open seas without landmarks for directions, a great advantage. Through raiding, some Vikings settled in foreign lands, where they farmed, raised cattle and in time, contributed to the community like the natives.

Saturday, October 12, 2019

How does Hardy show social injustice in the 19th Century in England? :: Free Essay Writer

How does Hardy show social injustice in the 19th Century in England? Thomas Hardy was born in 1840 and died in 1928 at the age of 88. Thomas Hardy’s father was a stonemason and his mother a servant to a vicar. Hardy could not afford to continue his education as he wished and was apprenticed to John Hicks, a local church architect from 1862 to 1867. He served as assistant to Arthur Bloomfield, a London architect. Hardy hated London and returned to Dorset and worked for Hicks until 1874. Despite his employment Hardy was writing continually during this period of life. Over the next 22 years Hardy wrote 15 novels, more than 1000 poems and 4 volumes of short stories. Hardy wrote in these short stories about the law, class difference, women’s position in the society and city versus the countryside. Most of his stories are set in the Wessex, a fictional name that he gave to his stories. His stories are set 50 years back in the past and show the hardships, sufferings, trials and tribulations experienced by the working class. This book is from the collection of the stories The Withered Arm and other Wessex Tales. When Hardy became an architect he went to work in London. However, he missed the Dorset countryside so much that he returned there in 1867 and began writing novels and poetry. This was the first of many of his novels describing characters and scenes from country life. Hardy’s views about the countryside versus the city were about the injustice of the loss of the old way of life. Hardy went to work in London in 1862. He took a return ticket with him in case he repented his decision to work there. His aversion for London is apparent in his comments where he describes London as, â€Å"the monster with four million heads and eight million eyes.† Hardy describes the city in The Son’s Veto, as Sophie is looking through the window at â€Å"a fragment of lawn,† which shows the lack of greenery and space in London. He describes the air as, â€Å"hazy air,† which shows the huge amount of pollution in London unlike the pleasant and fresh air of the countryside. Hardy portrays all the houses in London as, â€Å"drab house facades,† which shows the ugly and depressing houses in London. The, â€Å"ever flowing traffic,† and other quotes just shows the repulsive and the disheartening city of London. Hardy approves of smuggling in The Distracted Preacher. Legally smugglers are to be penalized but every one ignores the law in The Distracted Preacher. Lizzy says, â€Å"it has been their practice for

Friday, October 11, 2019

What Is the Deep Web?

Andres Becerra Espinoza Ms. Mary Glenn English 10th Grade March, 21 2013 What is the Deep Web Surface Web and its Benefits There is a big influence of technology on our daily life. Electronic devices, multimedia and computers are things we have to deal with everyday. The Internet, especially, is becoming more and more important for nearly everybody as it is one of the newest and most forward-looking media and surely -â€Å"the†- medium of the future. (Markus Temmel, Martina Theuermann, Eva Ukowitz, and Tanja Vogrin 2001)The future is here, and we live it every day by waking up and grabbing the device that is nearest to us, looking at the screen and confirming that this will be a nice day. All of this is only possible because of the Internet. According to the Freesoft Encyclopedia this untouchable (maybe touchable with touchscreen devices) interactive multimedia library has made human life easier and faster for the last 18 years. It was created in 1969 by the Defense Department with the purpose of wartime digital communication. It was called the DARPA Internet Program.But the Internet as we know it now was reformed, modified,and commercialized in early 1990, and the World Wide Web (WWW) was introduced. (Brent Baccala, Kyle Hourihan, 2012) It takes about five seconds to find anything on the web. It is as easy as typing some label words, pressing the enter key, or -cliking the â€Å"search† button-, and a couple million options will appear on the screen. This process has become more simple over time and new microphone and voice recognition software enables disabled people to dictate to their Internet connected device, what is that they want to see, hear, or read.Introduction to the Deep Web But is the search engine showing all of the results available? This is a question that is rarely posed, but I found the answer, and it is: No. According to Luisiana State University, when you use a search engine like Google or Yahoo! , the information you get back is sometimes referred to as the â€Å"Surface Web† or the â€Å"Visible Web. † However, there's a lot more information out there – There are millions of web pages that Google and Yahoo can't find. That's the Deep Web.For example, a Google search will not pick up all information in the Library of Congress web pages. To find those web pages you would have to go to the Library of Congress home page and perform a search there. So, why can't you find those pages with your Google search? ; Search engines like Google cannot fid Deep Web pages because they are within specialized databases. Typical search engines simply aren't allowed to access them. The Deep Web is made up of valuable material, like the information within the Library of Congress web pages. In January 2006, Marcus P.Zillman wrote -the Deep Web covers somewhere in the vicinity of 900 billion pages of information located through the World Wide Web in various files and formats that the current search engin es on the Internet either cannot find or have difficulty accessing. The current search engines find about 8 billion pages-. (Louisiana State University, 2008) The Deep Web (also called Deepnet, the invisible Web, DarkNet, Undernet or the hidden Web) refers to World Wide Web content that is not part of the Surface Web, which is indexed by standard search engines.Mike Bergman, credited with coining the phrase, has said that searching on the Internet today can be compared to dragging a net across the surface of the ocean: a great deal may be caught in the net, but there is a wealth of information that is deep and therefore missed. Most of the Web’s information is buried far down on dynamically generated sites, and standard search engines do not find it. Traditional search engines cannot â€Å"see† or retrieve content in the Deep Web – those pages do not exist until they are created dynamically as the result of a specific search.The Deep Web is several orders of mag nitude larger than the surface So basically, the Deep Web is mainly made up of pieces of information that are not appearing in a typical Internet search because they are for private database use and are not open for the public eye. But that is not all, Deep Web also have content of its own, with servers that take advantage of the invisibility of this web pages compared to the surface web. In the Deep Web they find true freedom to post whatever they feel like posting without the restraints of any law. Deep Web ContentOffering anonymity and freedom, the Deep Web has transformed over the years into a deep, almost inhospitable, little-explored information repository that can host anything from the most innocent content to the most ruthless and unthinkable. Within the Deep Web are private intranets protected with passwords, as well as documents in formats that cannot be indexed, encyclopedias, dictionaries, and journals. (Pablo Albarracin, Christopher Holloway, 2012) But that is not all; Satnam Narang, Manager of Symantec Security Response, says that because the Deep Web is hidden from view, it is an especially attractive place for shady activities.Many cybercriminals gather in places like private forums with restricted access. Many users are already familiar with the Internet's dark side: how to download music illegally, where to see the latest movies for free, or how to order prescription drugs for a little extra money. But the Deep Web goes farther. Almost unimaginably farther. Child pornography, arms trafficking, drugs, hired assassins, prostitutes, and terrorism. all make the Deep Web the largest black market to ever exist. On the Deep Web you can find sites that sell stolen credit cards, teams that will clone credit cards through ATMs, people selling cocaine, and more,† says Dmitry Bestuzhev, director of Kaspersky Lab's team of analysts. Of course, not all uses of the Deep Web sites are â€Å"evil. † It has also been very helpful to citizens who find their personal liberties threatened, or who are being watched by government agencies. WikiLeaks is an example of one of the uses of the Deep Web. When it was first launched, and for a long time, before it became public, the WikiLeaks site operated in the Deep Web.Even today, if someone wants to blow the whistle or upload information to WikiLeaks, it is possible to publish it on the Deep Web. The diversity of things that can be found on the Deeo Web is illustated by its enormity. Michael K Bergman, an American academic and entrepreneur, is one of the foremost authorities on this other Internet. In the late nineties he undertook research to try to gauge its scale. â€Å"I remember saying to my staff, ‘It's probably two or three times bigger than the regular web,†Ã¢â‚¬Ëœ he remembers. â€Å"But the vastness of the deep web (†¦ ) completely took my breath away.We kept turning over rocks and discovering things. † In 2001 he published a paper on the Deep Web that is still regularly cited today. â€Å"The Deep Web is currently 400 to 550 times larger than the commonly defined world wide web,† he wrote. â€Å"The Deep Web is the fastest growing category of new information on the Internet †¦ The value of Deep Web content is immeasurable †¦ Internet searches are searching only 0. 03% †¦ of the [total web] pages available. † (Andy Beckett, 2009) The First Five Levels of the Deep Web Deep Web is also divided by sectors or levels in which content variates.Each level down represents a deeper type of information and is also harder to reach. In some cases, you need an invitation from someone who has permission or an account on a web page. This becomes constant since level 4. Level 1 Web – Surface Web; Reddit Webpage (social news website), Digg Webpage (social news website), Temp Email Services, Newgrounds (animations and games), Vampire Freaks (online community for the Gothic–industrial subculture), Fore ign Social Networks, Human Intel Tasks, Web Hosting, MYSQDL Databases College Campuses.Level 2, Web – Bergie Web; FTP Servers, Google Locked Results, Honeypots (traps set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems), Loaded Web Servers, Jailbait Pornography, Most of the Internet, 4chan (blogging webpage) , Freehive (weapon blog), Let Me Watch This (online free movie site), Streams Videos, Bunny Tube (pornography website).Level 3 Web – Deep Web; â€Å"On The Vanilla† Sources, Heavy Jailbait Pornography, Light Child Pornography, Gore, Celebrity Scandals, Gossiping Websites, Hackers, Virus Information, FOIE Archives, Suicides, Raid Information, Computer Security, XSS Worm Scripting, FTP Servers (Specific) , Mathematic Research, Supercomputing, Visual Processing, Virtual Reality (Specific) Tor Required After This Pont. Eliza Data Information, Hacking Groups FTP, Node Transfers, Data Analysis, Post Date Generat ion, Microsoft Data Secure Networks, Assembly Programmer's Guild, Shell Networking, AI Terrorisists, Cosmologists/MIT.Level 4 Web – Charter Web; Hard Candy (Child Pornography), Onion IB , Hiden Wiki, Candycane, Banned Videos, Banned Movies, Banned Books, Questionable Visual Material, Worldwide Personal Records, â€Å"Line od Blood† Locations, Assasination Box, Headhunters, Bounty Hunters, Illegal Games Hunters, Rare Animal Trade, Hard Drugs Trade, Human Trafficking, Corporate Exchange, Multi Billion Dollar Deals, Most of the Black Market†¦ Closed Shell System Required After This PontTesla Experiment Plans, Hardcore Rape Child Pornography, Necrophillia Child Pornography, Group Child Pornography, WWII Experiment Successes, Josef Mengele Successes, Location of Atlantis, Crystaline Power Metrics, Gandolium Gallium, Garnet Quantum Electronic Processors, Broder's Engine Plans, Paradigm Recalescence, Forward Derivatal Supercomputation, AI in a Box, CAIMEO (AI Superintell igence), The Law of 13's, Geometric Algorthymic Shortcuts, Assasination Networks, Nephilism ProtocolsLevel 5 Web – Marianas Web; Very Little People Know What Is Hidden Under This Level. Polymeric Falcigol Derivation and Quantum Computation knowledge is required to enter this level. Bitcoins, Deep Web Currency According to the Bitcoin official website, bitcoin is one of the first implementations of a concept called crypto-currency, which was first described in 1998 by Wei Dai on the cypherpunks mailing list.Building upon the notion that money is any object, or any sort of record, accepted as payment for goods and services and repayment of debts in a given country or socio-economic context, Bitcoin is designed around the idea of using cryptography to control the creation and transfer of money, rather than relying on central authorities. (Bitcoin Project 2009–2012) Bitcoins fit perfectly on the Deep Web requirements. They ensure the users anonimity and are also a stable c urrency that has been out there for about fourteen years. Bitcoin Prize is not well stablished and variates violently.A bitcoin is equivalent to approximately 14 US Dollars. But it can go as high as 54 US Dollars. Deep Web And The Law According to Chloe Spencer, the Government is very aware of the existence of the ‘Deep Web’. However, due to the intricacy of its design, they seem to be struggling to tackle the large amount of crime concealed within the dark net. An anonymous administrator of Silk Road (online illegal drug store) released a statement last year regarding the FBI’s promise to crack down on the trading of illegal products online.It said: â€Å"We will be diverting even more effort into countering their attacks and making the site as resilient as possible, I’m sure this news will scare some off but, should we win the fight, a new era will be born. Even if we lose, the genie is out of the bottle and they are fighting a losing war already. † Conclusion Ever since the first time I heard about the Deep Web, I got deeply interested and started my research on the topic. I found out and downloaded the required software, double checked that my proxy settings were well configurated. And got into my first Deep Web onion website, which was the hidden wiki.There I found plenty of information that seemed interesting, and that site provided with links too. So the first thing I looked up for was leaked cellphone technology information. Everything about the Deep Web seem to be found, I read about the precautions that needed to be done, and followed as well as I could. But that was not enough. Some day I was wandering around some links, and reading random information, when this link appeared, I had my guard down. And the link redirected me to a hardcore gore site. Those images were horrid. Since then, I have never got into the Deep Web again.It is full of great things, but it is really not worth it. I think that if international go vernments looked after the people who upload and fill the Internet with all of that morbid information. Deep Web could be a more user-friendly experience. Deep Web is not a place for everyone to be, people need to know what they can end up finding, that is the reason I liked this topic for my research paper, I would not like any of my classmates to see what I saw. Thankfully it was not something as disgusting as child pornography. But I prefer keeping my restrictions by now

Thursday, October 10, 2019

“Relic” By Ted Hughes Essay

Although nature may be seen as a beautiful way in which different living creatures coexist, Ted Hughes however sees this differently. In the poem Relic he writes about how the creatures in the sea use each other as a means to their end. In this poem, the persona has found a jawbone on the sea shore amongst other bones of dead sea creatures. This sends the persona in deep thought and is made to wonder where it has come from and what it passed from. These predators that live in the â€Å"deeps† have to live from eating other creatures in order to survive. This is seen in the phrase, â€Å"camaraderie does not hold†. These creatures that feed on others in order to ensure their survival however are eaten by other creatures and where before they were victimisers, they have now fallen victim to others. The sea is portrayed as a continuous cycle where life is halted by death and this can be seen by the action of the jawbone to â€Å"continue the beginning†. The idea that life is recycled is also evoked through the use of the long endless lines. These extended lines keep the poem flowing in the sense of a cycle and also in rhythm. Another way, in which the idea of continuity is highlighted, is the fact that this poem evolves the whole cycle in one stanza. The rhythm in this poem is not achieved through a fixed meter, but by repetition. This is also done by the extensive use of monosyllabic words which increases the pace of the poem. The alliteration in â€Å"broken by the breakers† and the use of consonance help the reader to visualise the atmosphere at the beach were the jawbone was found, that is hearing the waves splashing with words like â€Å"flip† and â€Å"gnawn†. The tone exposes the fact that the sea is not a friendly place to be in and even the creatures that prey on other creatures, therefore are on top of the food chain, also become â€Å"Jaws eat and are finished and the jawbone comes to the beach† as they also become part of this recycling process. â€Å"Time in the sea eats its tail† and â€Å"indigestibles† are thrown away. Whatever the sea can’t make use of is disposed of which is an efficient way to help the other sea creatures to survive. The bones become a reminder of an animal which has served its purpose in the sea.

Wednesday, October 9, 2019

In what ways does the presentation of Polonius contribute to the play Hamlet? Essay

‘Hamlet’ By William Shakespeare Question: In what ways does the presentation of Polonius contribute to the play Hamlet? Answer: Polonius, counsellor to the King, father of Ophelia and Laertes (and although there is no evidence, it is possible that he held a position at court under Hamlet’s father, the old King), seems to have a close and developed relationship with the Royal family and knows a lot about the family history and background in detail. With the audience knowing this, Shakespeare can use Polonius as a weapon against Claudius in order to protect himself or to blackmail the King. He is a man who is trusted by Claudius, the King of Denmark who tells Laertes, Polonius’ son, that his father is incalculably important to Denmark, † The head is not more native to the heart, The hand is more instrumental to the mouth, Than is the throne of Denmark to thy father. † (Act 1 Scene 2- Lines 47-49) Here, the audience would most probably be double-minded and slightly confused. This is because; this quote could have a double meaning. It could be that Claudius wants to get rid of Polonius but finds difflculty in doing so as he is a faithful servant towards himself, the King. Polonius could be an â€Å"instrumental† devise for Claudius for those critical times. We soon learn that Polonius is an over-protective father who only wants to protect his children from society and has a strong authority over his son and daughter. This is learnt when Claudius calls to Laertes: â€Å"Have you your father’s leave? What says Polonius? † (Act 1 Scene 2- Line 57) More evidence of Polonius’ fatherhood is reflected in Act 1 Scene 3, when Laertes is talking to Ophelia before he is about to leave for France. Polonius enters the scene giving lecture-like advice to Laertes about factors to engage in and factors not to engage in. † Be thou familiar, but by no means vulgar. † (Act 1 Scene 3-Line 61) He does not trust his son, which is why Polonius calls on Reynaldo â€Å"to make inquire of his behaviour. † Not only this, but he gives long-winded advise to Ophelia without considering her feelings by playing with his words, and accusing Ophelia of not being able to make her own sensible decisions. â€Å"You speak like a green girl† (Act 1 Scene 3-Line 101) Polonius’ playing with words does not stop here; he uses plays on words to make himself seem intelligent, while the king and queen are not impressed at all. When he realizes that his ‘artificial intelligence’ is not working, he comes up with his â€Å"lovesick† plan (to spy on Hamlet and use Ophelia). Polonius does not only ‘educate’ his children for their own benefits but also to his advantage. He uses them, Ophelia in particular, to promote his career leading to Claudius to be proud when it is revealed that Ophelia is carrying out her father’s dirty work for him without knowing, which reveals the degree of Polonius’ craftiness. Polonius’ job is his priority (this is reflected when he uses Ophelia to maintain his head high in front of the King) and it is shown in the play that he is capable of going to extreme measures just in order to satisfy all and to keep his head high. I think he wants all too much to impress the king and queen, which explain his silly â€Å"talking in circles. † For example, when he says, â€Å"Give first admittance to th’ambassadors; My news shall be the fruit to that great feast. † (Act 2 Scene 2-Lines 51-52) Shakespeare uses a character like Polonius in this play to complement the whole play. Polonius’ ironical jokes make the audience laugh and balances out the play against the tense and important scenes in the play, HAMLET † Do you see yonder cloud that’s almost in shape of a camel? † POLONIUS † By th’mass, and ’tis like a camel indeed. HAMLET † Methinks it is like a weasel. POLONIUS † It is backed like a weasel. HAMLET † Or like a whale? POLONIUS † Very like a whale. (Act 3 Scene 2-Lines 339-344) In act 3 scene 2, when Polonius is told to fetch Hamlet, Hamlet plays with his words towards Polonius and makes him say anything that he, Hamlet chooses. Polonius is made to say that he sees imaginary shapes, which Hamlet suggests, are in the clouds.

Tuesday, October 8, 2019

New Business Start Up Essay Example | Topics and Well Written Essays - 3750 words

New Business Start Up - Essay Example As they are planning to introduce a totally new product and brand to consumers, they are anxious about the consumers' response and reaction. For that detailed survey was carried out. It must be notified that Radiant Co. products target skin conscious people of upper middle and upper class. Sample size focused on age groups of 15 onwards. The Survey primarily focused on age level between 15-25 because sun protection and beauty conscious people are mostly found in this age group. But other age groups were also explored to know their behavior. In the soap market many brands dominate the scene, making their presence felt in one way or the other either through aggressive advertising or promotional schemes. LUX dominates the soap market through its outstanding market share, as supported by the survey result its market domination is 51%. LUX with periodical revitalization of its brand has kept the product in the British for a long period of time. Therefore, LUX appears to be the major competition for Hibuty in the soap industry, especially when one of its soap is providing sunscreen formula as an additive feature. Next stands SAFEGUARD, with 23% market share. SAFEGUARD is gaining a lot of popularity as a medicated soap fighting germ all- round -the- clock. There is a future threat to Hibuty of its emerging as a new competitor, although not a direct one as SAFEGUARD presents itself as medicated rather a sun protective soap. Other soaps include Nivea Milk, English Lavender, Safeguard, Lifebouy and Dove. Most Influencing Factors in Soap Purchasing The major influencing factor of potential Hibuty customers, in making their purchasing decision for soap is GOOD QUALITY. 60% of the market gives performance of the soap a priority when buying it. Second most influencing factor determining their soap purchasing decision is brand loyalty with 25% of the market getting affected by it. Third factor being again brand loyalty (23%), fourth most influencing factor is easy availability (30%); fifth most affecting factor is less price (36.5%). Least most influencing factor is status of soap marked as imported (50%). Survey reveals that soap purchasing decision in not at very much influenced by foreign status of the soap. The survey shows that there is opportunity for any soap that offer good quality at reasonable price, potential customers of Hibuty are not very price conscious as they consider LESS PRICE option among the least influencing factors list. Commonly found skin type Survey purports that most common skin type found is oily with 40% of the customers having it. Normal skin types consist of 32% of the market, t-zone or combination skin (13%), sensitive (5%). Preference of fragrance in