Sunday, December 29, 2019

Analysis Of The Twelfth Night - 1651 Words

For Bakhtin, carnival â€Å"offers the chance to have a new outlook on the world. To realise the relative nature of all that exists, and to enter a completely new order of things† To what extent do you feel that the â€Å"carnivalesque† conventions of comedy convey a meaningful challenge to the existing order of things? The Twelfth Night perhaps manifests around the continuous abolishment of social norms and traditional customs. The events that take place within the play are intertwined with typical connotations that surround abnormality and could possibly support the entry to â€Å"a completely new order of things†. Carnivalesque settings within any play radiate a sense of danger, excitement and a chaotic absurdity that essentially shapes the world as a whole. During the Elizabethan era, hierarchies were heavily implemented within society. Carnival and its comedic structure is too vast in nature to give one clear-cut definition, as it consists of numerous conventions and rituals, however one of the simplest and general ideologies behind Carnival is its eradication of social hierarchies. Carnivalesque undermines those who possess higher authority; perpetrating them to lack intelligence and act patently pompous. Parodies and degradation of those who possess power are portrayed with the use of costumes and masks; the archetypal relationships are presented through on going travesties, undermining and mocking the â€Å"indestructible† structure of the social order. Bakhtin suggests that CarnivalShow MoreRelatedTwelfth Night Analysis779 Words   |  4 PagesWilliam Shakespeare’s Twelfth Night is a well-known Christmas play, it is considered as one of the most successful comedies. The play starts when Viola and her twin brother, Sebastian, survive a shipwreck. When they cannot find each other, each thinks the other may be dead. Then they move on to two separate ways, establishing two story lines that finally meet with each other after involving funny mistaken identities. The love bug in the comedy bites not only Olivia and Orsino, but also SebastianRead MoreScene Analysis Of The Twelfth Night1351 Words   |  6 Pages Our group proposed, presented, and directing the stage performance for the Twelfth Night. In the beginning of the semester I had no clue of what to expect from this course, and reading the syllabus made Shakespeare’s Plays seem complex. I am somewhat familiar with William Shakespeare’s plays stemming from a Shakespeare course that I had taken at Harold Washington (City College of Chicago). My professor (Hader) informed the class that if we were looking to go on to a four-year university as an EnglishRead MoreTwelfth Night Character Analysis987 Words   |  4 PagesWilliam Shakespeare’s play â€Å"Twelfth Night† is one of many different themes. Two of the most recurring themes are sexuality and gender identity. It is these themes that make twelfth night a wonderful and revolutionary tale for that time period. It is hinted throughout the play that some of the characters may indeed be a tad bit gay. This helps support the claim that being attracted to membe rs of the same sex is not just a modern thing. The character of Antonio can be seen flirting with and doing thisRead MoreTwelfth Night Character Analysis1739 Words   |  7 PagesTwelfth Night is a romantic comedy that questions the nature of love, gender, and class. Viola disguises herself as Cesario, and this transformation into Cesario by Viola draws the admiration of Olivia. While Olivia is trying to attract Cesarios attention, Orsino is trying to catch Olivias eye which only creates a comedic love triangle. This love triangle creates the comedy in the book, while also questioning what love is, and the roles that gender, and class creates in Twelfth Night.  Ã‚  Ã‚  Ã‚  Ã‚   TwelfthRead MoreAnalysis of Twelfth Night Essay685 Words   |  3 Pagesquickly became one of the most popular playwrights in the city of London, and a favourite of the monarch, the powerful Queen Elizabeth I. Shakespeare wrote thirty-eight plays. Twelfth Night was written near the middle of Shakespeare career, around 1601, and most critics consider it as one of his greatest comedies. Twelfth Night is about illusion, deception, disguises, madness and the consequences of love. In the final scene of the play, all the confusion and complexities that have occurred areRead MoreAnalysis Of The Article Twelfth Night 998 Words   |  4 PagesThe introduction of Twelfth Night, written by M.M. Mahood, provides a cultural setting for readers to better understand the play. Although Mahood wrote the introduction for Twelfth Night, the information also allows readers to appreciate the magical freedom that A Midsummer Night’s Dream encompasses. Mahood delves into the cultural significance of Puritanism early in the 17th century through the character of Malvolio. Although Twelfth Night is a comedy, the presence of morally strict PuritanismRead MoreLiterary Analysis of Shakespeares Twelfth Night Essay933 Words   |  4 PagesShakespeare’s Twelfth Night is a play with themes that parallel the folly of the festival it is named after. The main storyline of the p lot plays on this a lot by mixing up the stereotypes around gender that were very present at the time. However, a sub-plot involving secondary characters defines this theme even more. It takes the idea even further by relating servants’ attempts to blur the lines between social classes. Twelfth Night’s Maria and Malvolio both have great aspirations to rise aboveRead MoreAnalysis Of Shakespeare s The Twelfth Night 1246 Words   |  5 PagesCharles 1 Bradley Charles Professor Eddie Coleman English 100 14 November 2016 Writing Devices in Shakespeare s The Twelfth Night William Shakespeare is one of the most well-known writers of all-time. William Shakespeare was born in the United Kingdom in April of 1564, to a family who was neither noble or wealthy (http://www.shakespeareinamericancommunities.org). He attended the local grammar school, where he was taught Greek mythology, Roman comedy, history, grammar, and Latin. He didRead MoreCritical Analysis of Shakespeares Twelfth Night Essay examples992 Words   |  4 PagesWilliam Shakespeare’s Twelfth Night is a comedy, first published in 1623. Love is a key aspect of Shakespeare’s comedies in which self-identity is found through the development of love from infatuation to acknowledgement of character. Orsino is the epitome of Shakespeare’s transformation of self. In the beginning of the play, Orsino is self-absorbed and head-over-heels for Olivia. In this stage of love we see Orsino’s infatuation and selfishness in his feelings of love. As the play moves on, ViolaRead MoreA nalysis Of Shakespeare s Taming Of The Shrew And Twelfth Night 702 Words   |  3 PagesDisguise and Trickery One of the many factors that William Shakespeare implements throughout all of his comedic plays is the element of disguise and trickery. This element is shown through his works of As You Like It, Taming of the Shrew, and Twelfth Night. The primary purpose for using disguise and trickery is for deceit. The deception involved with changing characters’ identities is used for momentary gain. In the end, the concluding outcome of such deceit leads to exposure of a higher truth

Friday, December 20, 2019

The Acknowledgement Of Core And Peripheral States On...

I. Introduction The acknowledgement of core and peripheral states on global stage has long been existing as a nature of international relations. The presence of commanding powers, constructed by advancements in economy, social complexion, technology, and ideology, enables world orders in which underdeveloped countries find their gap with established states challenging to narrow. Imperialism and dependency theories were therefore begotten to explain complicated relationships between nations, among them the flow and tendency of influence. While these two get their own criticism, in the age of globalization, the notion of interdependence threatens the validity of such theories (Hesmondhalgh, 2008). However, this essay attempts to argue that imperialism and dependency theories are still applicable to communications policy field in a world of global inter-connectedness due to varied outlooks on interdependent conditions. The understanding about making communications policy with international relevance in mind concerns nevertheless. The significance is that the globalized world has rendered changes to conditions of each country, forcing them to consider resistance or dependence regarding external actors in accordance with new environments. New players have emerged in new sets of relations and perform their own imperialist actions. Along this perception, the essay discusses the implication of the aforementioned theories relating to some pronounced countries’ communicationsShow MoreRelatedMcdonald Marketing of Service12670 Words   |  51 Pagesof Contents Acknowledgement 3 Executive Summary 4 1 Company’s Corporate and Marketing Objectives 6 2 Situation Analysis 7 2.1 External Environment 7 2.1.1 PESTLE Analysis 7 2.1.2 Competitive Audit 10 2.2 Internal Environment 11 2.2.1 Internal Environment 11 2.3 Goods or Services Continuum 14 2.4 Services Characteristics 14 2.4.1 Intangibility 14 2.4.2 Heterogeneity 15 2.4.3 Perishability 15 2.4.4 Inseparability 15 2.5 Core and Peripheral Elements 15 Read MoreA Learning-Based Approach to Organizational Change: Five Case Studies of Guided Change Initiatives9407 Words   |  38 Pagesthrough 2) making fundamental process improvements. In each case there is a different solution to the seemingly-contradictory demands of work and learning, short-run business results and long-run process improvement. An important role is played by a core learning team, a reflective leadership group that develops collaboratively a shared vision and strategy for the initiative which combines the two key elements in a way that works for the setting. The learning-based initiative is viewed as a livingRead MoreA Project Report on Habib Bank Ltds Management Information Systems5834 Words   |  24 PagesOF CONTENTS† Sr.No Contents 01 02 03 04 04 05 06 07 08 09 10 11 Acknowledgement Introduction And History of HBL Organizational Chart of HBL Management Information system Hardware used by HBL Software used by HBL Database Management Networking Online Presence Security and Backup Conclusion And Recommendation References Page 03 03 07 08 18 19 21 23 24 25 27 28 Management Information Systems 2 â€Å"HABIB BANK LTD† â€Å"ACKNOWLEDGEMENT† In the name of Allah the praiseworthy, the passionate whose blessingsRead MoreSeminar-Report-on- Optical Fiber Communications7997 Words   |  32 PagesTable of Content TABLE OF CONTENT ACKNOWLEDGEMENT 7 1.0 Introduction 8 2.0 History of Optical Fiber 9 3.0 Construction of Optical Fiber 12 4.0 Guiding Mechanism in Optical Fiber 13 5.0 Basic Components of OFC 15 5.1 Transmitter 15 5.2 Fiber 15 5.3 Receiver 15 5.4 Process 16 6.0 Principle of optical transmission 16 6.1 Refractive Index 16 6.2 Snell’s Law 17 6.3 Critical Angle 17 6.4 Total Internal Reflection 18 6.5 Acceptance Cone 19 6.6 NumericalRead MoreProject on Wipro13311 Words   |  54 Pages which is in affiliation with GGS Indraprastha University and has undertaken a minor project on â€Å"WIPRO TECHNOLOGIES† in the partial fulfillment of B.B.A degree as required under the rules of the university. Mr. JATIN VAID ( Project Guide) ACKNOWLEDGEMENT This project work, which is my first step in the field of professionalism, has been successfully accomplished only because of timely support of my well wishers. I would like to pay my sincere regards and thanks to those, who directed meRead MoreProfessional Learning Communities Of Educators4217 Words   |  17 Pagespractice via professional learning communities. †¢ Explore the conditions that support the development, dissemination and transfer of innovative practice in professional learning communities. †¢ Examine the fit of current descriptive models of the stages and indicators of the development of, and transition to, innovative pedagogies to live examples of professional learning communities of educators. †¢ Identify suitable tools and techniques for the analysis of the evolution of educational innovationRead MoreEducation in the New Powerhouse Economies: Catching Up or Leading the Way?5758 Words   |  24 Pagesand/or China.† India and China: Catching Up And Leading The Way In recent years, China and India have both exploded onto the international education landscape as major global forces (Altbach 2009). China is considered one of the world’s most influential economies (OECD 2010b), whilst India is seen as playing a key role in the global knowledge economy (Agarwal 2007). India has also been described as â€Å"the science superpower of the Third World† (Altbach Chitnis 1993:1). The sheer scale of the educationRead MoreOb Practices at Chaudhary Group in Nepal13261 Words   |  54 PagesCognitive Dissonance, Diversity Management Table of Content Abstract 3 Executive Summary 6 Acknowledgment 8 1. Introduction 9 1.1 Introduction of Chaudhary Group 9 1.1.1. Vision 9 1.1.2. Mission 9 1.1.3. Management Philosophy 10 1.1.4. Core Values 10 1.2. Business Area 11 1.2.1. FMCG 11 1.2.2. Consumer Durables 12 1.2.3. Automobile 13 1.2.4. Infrastructure 13 1.2.5. Financial Services 14 1.2.6. Specialties 15 1.2.7. Citizen Chaudhary 16 1.3. Future Plans and Programs 17 1.4Read MoreEasyday Bigbazaar7420 Words   |  30 Pageson â€Å"CUSTOMER SATISFACTION WITH REFERENCE TO BIG BAZZAR EASYDAY IN AGRA† was carried by me in the partial fulfillment of B.COM (HON) Programme. It is not been copied from anywhere else. KARAN VERMA B.COM – VI SEM. DEI, AGRA ACKNOWLEDGEMENT â€Å"NO MAN IS COMPLETE IN KNOWLEDGE BUT SINGLE RAY OF KNOWLEDGE CAN BE HELPFUL TO MAN†. The research on â€Å"CUSTOMERS SATISFACTION WITH REFERENCE YO BIG BAZAAR EASYDAY IN AGRA† has been given to me as part of the curriculum in Three-YearRead MoreEssay about Marketing and Entry Mode19449 Words   |  78 PagesLecturer: Dr. Gerald Pollio Executive Summary Problem, Purpose and Method Decision-makers, like sailors, need to know how to ride out a potential storm and to understand how the winds may change in the future. (World Economic Forum 2009) In global automobile field, Toyota’s faced several problems in European market at the entrance and what entry mode did Toyota choose? Why did they select those entry modes? And how did they manage their internal and external network structure during the entry

Thursday, December 12, 2019

IT Consultants Western Widgents

Question: Discuss about the case study IT Consultants for Western Widgents. Answer: Introduction: The western widgets is a wholesale business that supplies widgets to clients in a local area and other regions. The company has gained the reputation in years for being fast and reliable in providing their services to clients. The company achieves this through a turnaround from the submission and delivery of orders; this is because they have built a large clientele base over the years throughout the southwest and Toowoomba region. Widget consultants is located in the local industry estate and occupies the large single storey shed of the warehouse and a co-located building where the main office is situated. The following service level agreement discusses issues, which will be covered by the organisation to meet the clients needs in all areas (Deng, et al., 2003)(eContent, 2006). The agreement discusses, objective, period of the agreement, procedure, and other important areas of the service level agreement such as the information technology, contingency plan that looks at some of the t hreats and ways to minimise down time for business critical function, the customer service staff responsibilities and the responsibilities of the employee in this agreement. Service Level Agreement Statement of Intent The aim of this agreement is to provide the company with a strong base that will pave way for close co-operation between the clients for disaster management action plan to be provided by Western Widget IT consultants. The agreement is important in ensuring that the services are provided in an efficient and timely manner to the clients. The objectives of this agreement is detailed in section 1.2. This agreement is dependent on each participant fulfilling and knowing their responsibilities and having an environment to maintain and meet the main issues in the service areas (A.Harzing A.Pinnington, 2011)(Akpoyomare, et al., 2012)(Briggs, et al., 2016)(Cameron, 2004). Objective of Service Level Agreement To come up with proper responsibilities that all parties will undertake in the agreement, To create an environment that will be conducive to a two-way relationship between the client and the office administration to ensure that there is a strong support of the clients needs and administrative activities. To make sure that the IT consultant achieves the provision of high quality service for the client when it comes to disaster recovery with full support of the client as required. To elaborate on the day of beginning for the service level agreement, initial levels and the provision of reviews for the terms underlayed. To show in detail the types of services that will be provided by the IT consultant and the level of service that will be expected by the organisation to reduce the misunderstanding between the organisation and the client. To come up with a formal system of service objective way of monitoring and make sure that assessment of the recovery program are based on facts. To ensure that there is a mutual understand of the IT consultant requirements / abilities and that of the terms required in the disaster recovery program. Provide the IT consultant and the client a single and openly referenced documentation. Period of Agreement This service level agreement will begin on the specified date in the Memorandum of Understanding with reference to the acceptance of the terms by each party and shall continue so unless otherwise agreed by the parties. Agreement Review Procedure The review procedure of this agreement will be done annually and at a date, which is mutual agreed by the client and office administration of Western Widgets. In kind of review will cover services that are provided, procedures and all service levels. Any type of change to the agreement will have to be approved by the office of Western Widgets administration and the Client. Representatives The Western Widget consultants and the clients nominate the following representatives to be responsible for the monitoring and the maintenance of this service level agreement. Western Widget Administration Representative Client Representative Reference Documents As part of the agreement, the following documents will be vital, as a basis for the procedures and policies by Western Widgets in executing is services. The documentation will also define the levels of support that are required and activities being prioritized with regard to the needs of the client. First of all the supports services by the administration of western widgets will be provided with the current standard operating procedures for IT consultants, the company also has a code of federal regulations that will be followed, property management regulations, orders of execution, personnel management rules and regulations, letters and other bargaining agreements(Jones, 2014)(Bozarth Handfield, 2012)(Early, 2006). Service Level Monitoring In order for this service level agreement to succeed, then it will call upon the ability for the company to measure performance accurately to gather reliable and credible information, which the IT consultant will provide, to the customer and support areas, which are provided by the services. These factors will need to be measurable, meaningful and constantly monitored. The services will also be compared with the target levels agreed by the client and the IT consultant. Should there be any form of discrepancy between the agreed target and the service levels by the two parties; then a solution should come between the two parties and come up with a resolution on the same. Monitoring of the service levels will also be done by the Western Widgets administration and the client representative (Cohen, et al., 2007)(Armstrong, 2012). The consultant will also be responsible in providing progress reports for the services that will have been provided and they will be called upon to share with th e representatives of the clients organisation. Complaints During the implementation of this agreement, all complaints regarding: Actual type of support offered. Expected levels of support offered. Responsibilities of each personnel during the administration of the agreement. Any other issues that are related to this document or the relationship between the IT consultant and the client. Information that will be received by each party shall be forwarded in form of writing to the two signatories of this agreement. The main intention will be to ensure that there is a transparent resolution of all problems. IT Consultants Service Desk Service Desk The IT consultants service desk will be responsible for providing IT support services to the clients and employees of the organisation. Some of these services will include client information security, networking services, real-time online customer care, handling customer complaints, responding to clients emails and management of the organisational activities. Scope The IT consultant will be responsible in provision of all services but not limited to clients needs especially in handling client complaints, administering and answering client emails, providing online real-time complaints response and managing clients calls. Such other activities will include as indicated in 3.0 Customer Service Statement The aim of customer service will be to attend to any need, complaints and other calls from the organisations clients. This will also include providing the customer will the right information, provide alternative solution to a crisis and be able to make appropriate referrals when needed at any point. Key Performance Indicator Targets for Service Desk There should be evidence of overall customer satisfaction. This will be collected by allowing a customer to fill an online survey customer feedback after each access of the companys services. The company will also have a performance score which will be used to rate whether customer are happy with the services provided by the company. If the rate is higher than it means that client was satisfied and would recommend the consultant to the next customer that his needs were met. There will also be the use of an average resolution time indicator. This means that the customer will report to the administration the time that was used to respond to his needs. If his problems were responded to in a timely manner then the consultant will have performed to the requirements (Armstrong, 2012). Lastly, the consultant would also want to know if the customer issues were resolved satisfactorily during a disaster (Briggs, et al., 2016). I.T Consultants Responsibilities General responsibilities: The IT consultant should be able to handle general problems that affect the clients under their care. He should be able to provide prompt response to any problem that come to them. IT consultant will also assist in selling the name of the organisation to the clients will come for other services. This will involve introducing the client to services other than those they came to seek help. The IT consultant will also be responsible for other clerical tasks for the organisation that will include other secretarial service as deemed necessary. Service Desk responsibilities: Receive, track, monitor and assist in any customer disasters. Collect and distribute information within the network and outside which are more complex to the customer. Provide an end user and in-house user documentation. Responsible for operations in the IT help Desk outside the normal business hours or on a needs basis. Review and update all data shifts on a continual basis Data Communications responsibilities: Research and document common data related problems. Develop and provide IT related training to clients on a needs basis. Manage client information including recovery of lost information and provide IT related solutions (Wischnowski, et al., 2003)(Kramar, et al., 2012). In charge of real-time customer related response during a disaster occurrence. Ensure and maintain the highest level of confidentiality between the client and the company. This will include recording and keeping all clients information, not sharing client passwords with other staff members or companies. Maintain high levels of professionalism and perform other duties as may be assigned (Jacobs Chase, 2014). Hours of Operation The hours of operation for Western widgets will be as follows: Office Hours: 8:00 AM- 5:00 PM for seven days a week. Overtime Hours: 5:00PM to 8:00AM from Monday to Friday. Response Times to Incidents The response time to incidents reported by clients will be within 20-30 minutes of the call. INCIDENT RESPONSE TIME Low internet communication 20-30 minutes Payroll system low 20-30 minutes Crashed Customer feedback system 1 hour Priority Level Response Times Priority level Response time will be within 10 minutes. PRIORITY RESPONSE TIME Poor customer feedback system 10 Faulty Phone extension lines 10 Poor network server 10 Service Requests (SR) Response time for service will be done within 2 hours of the call. This will involve gathering of information from the person requesting, finding appropriate person and details and reverting to the client. Custom Requests (CR) Custom request shall be done within 12 hours of the call. Escalation Process Escalation process will take within 2 to 3 working days. This will provide time to investigate the issue, find the right response, repackage, and revert. I.T Service Continuity and Security Planned Outages Planned outages for this agreement will only be visited during the following window period between 9:00AM 9:00 PM on Sundays. It will however be changed depending on the needs of the client and upon prior notice. Disaster Recovery and Service Recovery Objectives Data Security and System Integrity There will be strict handling and administration of clients data all time. In times of access to the clients data, the client shall be duly informed to authorise any use of data. The client shall also deserve administrative rights of his data and will provide authorisation for its use. Customer Responsibilities To provide as much information as deemed necessary by the IT consultant. To not withhold any information when asked to do so by the consultant. To share all the administrative rights with the consultant so long as it will be used in solving the disaster at hand. To cooperate with the consultant during the time of the services. To act with respect and prompt response when asked by the consultant. To meet all the costs and other requirements as described in the service. To respond to other calls by the consultant (Adrian, 2007)(H.Zhao Seibert, 2006). Disaster recovery Plan Plan Updating The Disaster Recovery Plan updating will properly be controlled to the needs of the client. All the changes made will be fully tested and appropriate amendments made before signing of the SLA. All the Disaster Recovery Plan procedures will be done under the control of the IT Consultant. Documentation and Storage With regard to the Disaster Recovery Plan, all information will be documented and stored in secure locations as directed by the company. The senior management will be issued with the Storage device and a hard copy of this agreement. Each team member will also be issued with a CD and hard copy of the plan. There will be a master copy; this will be stored in specific resources that are established for this course. Strategy for Backup With regard to this agreement, all the business processes between the IT consultant and the client will be listed. The strategy will involve the maintenance of a duplicate site that will enable an instant switching between the headquarters and the backup area. Some of the most vital areas will include: KEY BUSINESS PROCESS BACKUP STRATEGY IT Operations Fully mirrored recovery site Tech Support - Hardware Fully mirrored recovery site Tech Support - Software Fully mirrored recovery site Facilities Management Fully mirrored recovery site Email Fully mirrored recovery site Purchasing Fully mirrored recovery site Disaster Recovery Fully mirrored recovery site Finance Fully mirrored recovery site Contracts Admin Fully mirrored recovery site Warehouse Inventory Fully mirrored recovery site Product Sales Fully mirrored recovery site Maintenance Sales Fully mirrored recovery site Human Resources Off-site data storage facility Testing Fully Mirrored Recovery site - Fully mirrored recovery site Workshop Fully Mirrored Recovery site - Fully mirrored recovery site Call Center Fully mirrored recovery site Web Site Fully mirrored recovery site Management of Risks With regard to the business processes, there are disruptive threats that will occur anytime that will affect the service. Some of the potential threats for the IT consultant are listed in the below table. Each risk has been examined clearly with regard to the level of business disruption that could arise from each disaster. Potential disasters have been assessed as follows: Potential Disaster Probability Rating Impact Rating Brief Description Of Potential Consequences Remedial Actions Fire 3 4 Excess power load that could cause cables to heat up. Fire and smoke detectors on all floors. Act of sabotage 5 Electrical power failure 3 4 Redundant UPS array together with auto standby generator that is tested weekly remotely monitored 24/7. UPSs also remotely monitored. Loss of communications network services 4 4 Poor LAN or ISP that will lead to loss of communication. Purchase a new service provider. Have backup. Probability: 1=Very High, 5=Very Low Impact: 1=Total destruction, 5=Minor annoyance Plan Triggering Events There will be key issues identified by the IT consultant that will trigger the activation of Disaster Recovery Plan. With regard to the work under the Service Level Agreement, some of the main key trigger issues are: Total Loss of Power Total Loss of Communication Lack of coordination between the management and the IT team Total Loss of Local Area Network When this happens all the departments will assemble at the working group-meeting hall or at the recreation hall as an alternative. Disaster Recovery Team The IT consultant will contact and assemble the Disaster Recovery Team. The responsibility of this team will include but not limited to the following: Restore the Key IT service in a span of 1 hour of the incident. Establish areas of emergency and course of action. Recover to normal Business within 4-6 hours after the incident. Coordinate activities with the client and his team as first responders. Report to the IT consultant and the client on progress. Disaster Recovery Procedures for the Management Team The IT consultant will ensure that there is a hard copy of the names and contact numbers of each employee working in various departments. The management department will work with the IT consultant in storage of customer and client information, both in a backup hard disk and in hard copy. They will also be issued with the Disaster Recovery plan and business continuity plan, which they will be allowed to keep in their homes in the event that the building could be inaccessible due to natural disasters like fire. There will also be close contact will all employees with regard to disaster and immediate action for the company. Employees who will not reach fellow staff from their list will be provided with staff emergency contacts. If the manager of a particular department assigned to contact another client is inaccessible, the backup staff member will do this job. Recorded Messages and other updates Whenever staff desires to get latest information and response from the organization, they will be provided with a toll free number, which will be listed in the disaster recovery card. In the card, there will be details on the nature of disaster, where to assemble and constant updates regard time and day to resume work. Financial and other legal issues The disaster recovery Plan team will prepare an initial financial and personal assessment of each employee. It will then compare this with the impact of financial affairs of the clients business. Some of the areas to look at will include: Health fitness Family background Financial documents Sources of revenue Check books, credit cards, online bank accounts Cash at hand Contingency Plan Objectives and Phases The main objectives of the Contingency Plan will be to ensure that there is uninterrupted existence of the companys business functions to the client as per the service level agreement. This will evolve around the protection of two most vital areas of the clients business, and this is Data and Personnel. All areas of the business contingency plan will address protection and safety of Data and Personnel information. This will be done in the following order: Contingency Phases The IT consultant together with the client will determine which team member will be responsible for each function during the contingency plan phase. There will be addition duties and responsibilities that will address specific actions and functions during each phase. Response Phase The response phase thus will server the following functions: To come up with an immediate and controlled mechanism at the place of action. Conduct the initial assessment of the impact of the incident, if there were losses or damage of equipment and disruption to the IT business and operations. To investigate and provide proper information on, if, or when there will be access to the system will be allowed. Provide the client with facts that are necessary to make right and informed decisions with regard to the resumption and the recovery of the business. Resumption Phase The main activities during the resumption phase will be: To organize and establish an IT management and control center and a site for the resumption of IT operations. The team will also activate and mobilize the support system that is necessary to support and facilitate resumption of activities. The team will also notify and appraise all the urgent business operations from the directives of the IT consultant and the client. The team will also alert all employees, suppliers, customers and the entire organization of the progress. Recovery Phase During the recovery phase of the contingency plan, the IT consultant and his team will prepare and implement all the actions necessary to support the recovery of very sensitive and urgent business processes. The team will also coordinate with the IT consultant and the Client to discern responsibilities will fall above their jurisdiction or beyond their control. In addition, the team will liaise with other employees in various departments during the recovery processes. Restoration Phase In this phase, the IT consultant and his team will come up with procedures that are necessary to implement the contingency plan; this include migration or relocation of the business process to an alternative site or service provider. The team will also ensure the implementation of important procedures that will support, mobilize operations and technology department migration or relocation. IT consultant will oversee all the relocation or recovery efforts and perform staff, stakeholders and customer notification before, during and after relocation of resumption of business process. Assumptions During the implementation of the contingency plan, the following assumptions are made; First, it is there will be evident running telecommunication connectivity and fibre optic cabling which Internet Service Provider and the Telecom Department will provide. Also all the necessary Memorandums of Agreement and Understanding will have been executed. Major Issues and Factors Some of the major Issues that can be encountered by the IT consultant during the implementation of the contingency plan will be as follows: The lack of clients budgetary commitment to the Disaster recovery. Absolute commitment by the clients senior management to Contingency plan and disaster recovery. Interruption to the proposed scheduling procedures for the repairing and backing up of files to the storage system. The development and execution of the Memorandum of understanding and Agreement and Service Level Agreement. Completion of the required assessment for and completion of the procurement of required Items for the business processes. Contingency and Disaster Recovery Plan matrix Core business functions Characteristics of interruption Short term (Up to [TIMEFRAME]) Long term (More than [TIMEFRAME]) Payroll Inavailability of building and payroll system Organize with the bank to ensure payments are wired as previousely done in the past month. IT consultant to organise for a backup payroll system be installed promptly. Email No Email Access In the Building and Fault with the exchange Server IT consultant to advice ISP . Accounts to be set up to access email over webmail of the disaster is not recovered promptly. Buy a new server or borrow server and rebuild. Collect back ups from off store storage. Network- Including Print and remote access No access to shared drives, prints and financial information IT consultant to contact IT supplier to support remotely. Implementation or repair of terminal server to wait until access to the building is restored. If the problem persists decision to be made on purchasing a new one. Phone and landlines Access to phone system down including mobile phones Contact Telcom firm to fix the problem. Advice the provider to separate main lines from extension systems Arrange for telcom firm to remove diversion Accounting Systems No access to building and other special financial systems IT consultant to contact IT supplier and repaire SQL server. If unrepairable purchase new server. Signatures of approval By signing below, all parties agree to the terms and conditions described in this Agreement. The Terms and Conditions will apply for (check the required box only): Services As per Appendix A Service Catalogue Hours of Coverage As per this SLA Director, Information Technology Management Support IT CONSULTANTS: Name: Damien John Stritch Position: IT Technician/Consultant Signature: Date: 12/08/2016 Manager Western Widgets Name: Position: Signature: Date: References A.Harzing A.Pinnington, 2011. International Human Resource Management. London : Sage Pub. Adrian, H., 2007. Corporate truth: the limits to transparency. Sterling: VA: Earthscan.. Akpoyomare, O., Adeosun, L. Ganiyu, R., 2012. Differentiation and Positioning Strategy: A Toss of the Same Coin.. International Journal of Management and Sustainability, 1(2), pp. 53--65. Armstrong, M., 2012. Armstrong's handbook of management and leadership: developing effective people skills for better leadership and management. s.l.:Kogan Page. Bozarth, C. Handfield, R., 2012. Introduction to operations and supply chain management. 3rd ed. Upper Saddle River, New Jersey: Pearson Prentice Hall.. Briggs, D. M., Swailes, S. Baker, S., 2016. The measurement of worker relations: the development of a three-component scale.. Leadership Organization Development Journal, 37(1), pp. 2-12. Cameron, K., 2004. Strategies for successful organisational downsizing. Human Resource Management, 33(2), pp. 189-211. Cohen, L., Manion, L. Morrison, K., 2007. Research Methods in Education (6th Ed.). Abingdon: Routledge. Deng, J., Menguc, B. Benson, J., 2003. The impact of human resource management on export performance of Chinese manufacturing enterprises.. Thunderbird International Business Review, p. 409429. Early, J., 2006. Service level agreements. Nursing management , 3(3), p. 25. eContent, 2006. Governance: corporate social responsibilty and employee accountability. Innovation: Management, Policy, Practice, 8(1), pp. 8-12. H.Zhao Seibert, S., 2006. The big five personality dimensions and entrepreneurial personality dimensions and entrepreneurial. Journal of Applied Psychology, pp. 91(2), 259-271.. Jacobs, R. F. Chase, R. B., 2014. Operations and supply chain management. 14th ed. New York: McGraw-Hill/Irwin. Jones, R., 2014. Largest IT consulting Companies. Arkansas Business, 52(31), p. 90. Kramar, Syed, R. a. J, 2012. Human Resource Management In A Global Context. London: Palgrave Macmillan (658.3KRA). Wischnowski, M., Pfluke, J. Twining, D., 2003. Writing an Interagency Agreement. Young Exceptional Children, 6(4), pp. 11-17.