Sunday, March 31, 2019

Isomerism in Molybdenum Carbonyl Phosphine Complexes

Isomerism in Molybdenum Carbonyl Phosphine ComplexesPart A Preparation and Identification of the Isomers of Mo(CO)4(PPh3)2IntroductionMolybdenum carbonyl phosphine abstrusees with the general ricochetula, Mo(CO)4L2 where (L=PR3 R=Me, Ph etc) have an octahedral geometry. This nitty-gritty the hardes ar satisf impressory to display any cis or trans stereochemistry. Interconversion between the two isomeric forms is enabled through thermal Mo-P confederation cleavage. Only the thermodynamic in ally s defer isomer of Mo(CO)4(PPh3)2 is create by direct chemical reaction of Mo(CO)6 and PPh3. So in order to isolate both isomeric forms of the coordination compound, Mo(CO)4(piperidine)2 is employ as an intermediate.The aim of this experiment wasThe preparation of Mo(CO)4(piperidine)2 by reaction of Mo(CO)6 with piperidine turn in tolueneThe preparation of cis-Mo(CO)4(PPh3)2 by substitution of piperidine with PPh3The thermal isomerization of Mo(CO)4(PPh3)2 to produce the trans iso meric formCharacterization of the reapings by IR spectroscopy al unhopefuled the isomeric forms of each of the complexes to be identified, and the most s submit form of the output to be deduced.Reaction SchemeMethodPreparation of Mo(CO)4(piperidine)2A compendious of the preparatory lucubrate for the formation of Mo(CO)4(piperidine)2 is detailed in instrument panel 1.1 tidy sumWeightMolar packMolar Amount comparability slow-wittednesscm-3gg mol-1molg mL-1Mo(CO)61.00264.003.788E-031.00Toluene15.0012.9892.141.408E-0137.180.865Piperidine10.008.6285.151.012E-0126.730.862 circuit board 1.1 The preparative details of Mo(CO)4(piperidine)2Mo(CO)6 (1.00 g, 3.79 mmol) was dissolved in a confection of toluene (15 mL) and piperidine (10 mL, 9.62 g, 101.00 mmol), chthonic an inert atmosphere with stirring at 110 C for 2 hours chthonic(a) reflux. The resultant yellow mixture was filtered under vacuum for 15 minutes, washed with ice-cold 60/80 petroleum quintessence (210 mL), to moderate a yellow crystalline substantiality of Mo(CO)4(piperidine)2. break (1.19 g, 83%) soap/ cm-1 3250.88 (N-H), 2931.85, 2853.10 (C-H), 2011.73, 1877.24, 1756.58, 1706.11 (C=O), 1476.99, 1462.33 (C-C)In order to calculate the pay of Mo(CO)4(piperidine)2 formed, the following method was employed, with details summarised in table 1.2.Mass ObtainedMolar MassMolesTheoretical collapsePercentage Yieldgg mol-1molgMo(CO)4(piperidine)21.19378.303.146E-031.43383.05Table 1.2 The reappearances for the formation of Mo(CO)4(piperidine)2The theoretical mass of Mo(CO)4(piperidine)2 was calculated from its molar mass and the bout of moles of the limiting reagent, Mo(CO)6 , utilise the following equation eq.1.1On formation of Mo(CO)4(piperidine)2 the yield of the complex was actually obtained to be 1.19 g. So in order to manoeuver out the office yield of Mo(CO)4(piperidine)2 formed, eq 1.2 was usedPreparation of Mo(CO)4(PPh3)2 (Isomer A) by Substitution of Piperidine with PPh3A summary of the d etails of preparing Mo(CO)4(PPh3)2 (isomer A) is given in table 1.3bookWeightMolar MassMolar AmountEquivalence stringency/ g mL-1cm-3gg mol-1molg mL-1Mo(CO)4(piperidine)20.50378.301.322E-031.00PPh30.75262.292.859E-032.16CH2Cl210.0013.2584.931.560E-01118.041.325Mo(CO)4(piperidine)2 (0.50 g, 1.32 mmol), triphenylphosphine (0.75 g, 2.86 mmol) and CH2Cl2 (10 mL) were refluxed at 40 C, under an inert atmosphere for 15 minutes. The reaction mixture was allowed to cool to room temperature. Then methanol (15 mL) was added to the mixture and cooled in the deep-freeze for 30 minutes. The precipitate was filtered under vacuum for 15 minutes which yielded a sick-yellow solid of Mo(CO)4(PPh3)2(isomer A). Yield (0.43 g, 44%) max/ cm-1 2925.53 (C-H), 2011.26, 1876.74, 1756.04, 1706.81 (C=O), 1462.87 (C=C).The yields of the product, Mo(CO)4(PPh3)2 (isomer A) ar summarized in table 1.4.Mass ObtainedMolar MassMolesTheoretical YieldPercentage Yieldgg mol-1molgMo(CO)4(PPh3)2(Isomer A)0.43732.585.870 E-040.96844.41As before using eq.1.1 and eq.1.2 the percentage yield was calculated from the theoretical yield. However in this chemise the limiting reagent was found to be Mo(CO)4(piperidine)2Preparation of Mo(CO)4(PPh3)2 (Isomer B) by Thermal isomerization of Isomer ATable 1.5 shows a summary of the preparative details of Mo(CO)4(PPh3)2 (isomer B)VolumeWeightMolar MassMolar AmountEquivalenceDensitycm-3gg mol-1molg mL-1Mo(CO)4(PPh3)2 (Isomer A)0.40732.585.460E-041.00Toluene4.003.4692.143.755E-0268.770.865Since isomer A was produced in a relatively low yield, the thermal isomerisation reaction was leprose so that save 0.4 g of isomer A was used.Mo(CO)4(PPh3)2 (isomer A) (0.40 g, 0.55 mmol) was added to toluene (4 mL) and stirred under reflux at 110 C for 30 minutes under an inert atmosphere. The solution was cooled to room temperature and 60/80 petroleum ether (9 mL) was added to aid precipitation. The resultant mixure was filtered under vacuum for 15 minutes, rinsed with 60/80 p etroleum ether (2 x 5 mL), which yielded a dark-brown solid of Mo(CO)4(PPh3)2 (isomer B). Yield (0.26 g, 65%) max/ cm-1 3056.60 (C-H), 1873.38 (C=O), 1476.92, 1431.71 (C=C).The yields of the product, Mo(CO)4(PPh3)2 (isomer B) are summarized in table 1.6Mass ObtainedMolar MassMolesTheoretical YieldPercentage Yieldgg mol-1molgMo(CO)4(PPh3)2(Isomer B)0.26732.583.549E-040.40065.00As before using eq.1.1 and eq.1.2 the percentage yield was calculated from the theoretical yield.Results and DiscussionThis experiment involved the closing off of the two geometric isomers of Mo(CO)4(PPh3)2. Only one of these isomers washbasin be uncaring from the direct reaction of PPh3 with Mo(CO)6. This reaction requires a long reaction quantify and high temperatures just now yields the more thermodynamically stable geometrical isomer. So in order to isolate the isomer B, an alternative synthetic route was employed. A precursor in the form of Mo(CO)4(piperidine)2 was used to yield isomer B, since PPh3 is now able to readily substitute piperidine. This method relies on the nature of the ligands. Piperidine is a shadowy field ligand, and so forms a relatively weak dative hold fast with the molybdenum ion. However, PPh3 is a conceptive field ligand and so binds strongly with the commutation coat ion. This means PPh3 easily displaces the piperidine ligands to give rise to the isomer B form of the complex Mo(CO)4(PPh3)2.The first part of the reaction involved the preparation of the intermediate Mo(CO)4(piperidine)2 which is a yellow solid which is in agreement with literature. The complex was formed in approximate yield at 83%. The infrared spectrum of Mo(CO)4(piperidine)2 shows quaternary-spot pointednesss corresponding to C=O vibrations at 2011.73, 1877.24, 1756.58 and 1706.11 cm-1 (lit). This suggests the isomer of the complex formed is the cis geometrical isomer. This can be explained by employing a multitude theory technique, which uses an unshifted C=O splices procedur e, as illustrated in figure.EC2(xz)(yz)CO4022Cis-Mo(CO)4(piperidine)2 has C2V symmetry and the irreducible theatrical performance of unshifted wedges is deduced to be 2A1 + B1 + B2. Since all of these executions are IR restless, four peaks are expect in the carbonyl region of the spectrum.In the IR spectrum there is also a peak at 3250.88 which corresponds to an N-H bond. This is indicative of unreacted piperidine. The presence of residual piperidine did not negatively affect the experiment to any significant extent.The entailment of Mo(CO)4(PPh3)2 (isomer A) yielded a pale yellow solid as reported by. The complex produced a 44% yield which affected the proceedings of the reaction as enough product was not formed. This meant the subsequent reaction had to be scaled down. The IR spectrum of Mo(CO)4(PPh3)2 (isomer A) displayed four peaks in the carbonyl region at 2011.26, 1876.74, 1756.04 and 1706.81 cm-1 which were similar to those reported in the literature. The compound was al so resolved to have C2V symmetry which would therefore be expected to give rise to 4 peaks in the spectrum. in that locationfore isomer A is cis-Mo(CO)4(PPh3)2.As a result, it can be deduced that isomer B of Mo(CO)4(PPh3)2 is the trans geometrical isomer. The trans isomer has a D4h point radical and so is expected to produce a atomic minute 53 peak in the IR spectrum. As predicted, the spectrum of isomer B has a peak in the carbonyl region at exclusively 1873.38 cm-1. The trans-Mo(CO)4(PPh3)2 isomer was a brown solid and produced at a reasonable yield of 65%.The trans isomeric form of Mo(CO)4(PPh3)2 is the thermodynamically more stable form of the two isomers. The trans isomer call for more vigorous reaction condition such as the dissolvent heated to 110 C and a longer reaction cadence as opposed to the milder conditions used for the formation of the cis isomer. The trans isomer places the two bulky PPh3 ligands as far as possible from one another, at 180 apart, which gives the complex the lowest possible energy.Cis-Mo(CO)4(PPh3)2 is the kinetic product of the reaction since it forms at a faster rate. This is because the activation energy barrier is much smaller, as reflected by the mild conditions imposed (40 C toluene, 15 minute reflux).ConclusionThe synthesis of all three complexes was successful. A good yield was obtained for the formation of Mo(CO)4(piperidine)2 at 83%. However, isomer A of Mo(CO)4(PPh3)2 was produced at a relatively low yield of 44%, in comparison to 65% produced for isomer B. The low yield of isomer A affected the proceedings of the subsequent steps of the reaction, and so required a scaling down of reagents used from this point onwards.The infrared spectrum of Mo(CO)4(piperidine)2 produced four C=O stretching bands at 2011.73, 1877.24, 1756.58 and 1706.11 cm-1 which matched those reported in literature. This suggested that the complex had a cis geometry and therefore the point group of the complex is C2V.For isomer A of Mo(CO) 4(PPh3)2, the point group was also inferred to be C2V. using the method of unshifted C=O bonds, it was determined that four peaks are expected in the spectrum corresponding to C=O vibrations. The infrared spectrum obtained did indeed have four bands at 2011.26, 1876.74, 1756.04 and 1706.81 cm-1. This shows good correlational statistics with the predictions from group theory.For isomer B of Mo(CO)4(PPh3)2, the spectrum displayed a single peak at 1873.38 cm-1 which corresponds to C=O. The geometry of the complex is therefore confirmed to be trans, and the point group deduced to be D4h for the complex.The colours of the complexes showed good agreement with that reported in literature. The intermediate complex Mo(CO)4(piperidine)2 was yellow in colour. The cis isomer of Mo(CO)4(PPh3)2 was pale yellow, whilst the trans isomer was brown.To summarize the products were produced in reasonable yield, and the IR spectra along with group theory allowed the distinction of the isomeric forms of the complexes.QuestionsA complex ion is formed when a d-block transition surface ion forms a coordinate bond by accepting a pair of negatrons from a ligand. A ligand is an ion or molecule that surrounds the surfacelic element ion and is able to donate a pair of electrons to it. This means the ligand is a Lewis base, whilst the central metal ion functions as a Lewis acid.There are two types of bonding between a d-block transition metal and a ligand, namely -bonding and -bonding. -bonding is present in all interactions between a metal and ligand because the solitary pair of the ligand lies on the internuclear axis. However, some ligands are able to take part in -bonding interactions. A ligand is express to be a -donor ligand if the interaction involves boon of electron density from a filled orbital towards an complete metal orbital. It is also possible for a ligand to be a -acceptor ligand. In this case, electron density is donated from a filled orbital on the metal to an empt y orbital on the ligand.The bonding between a d-block transition metal and specific ligands is discussed belowCOCarbon monoxide is a strong field ligand with its position high in the spectrochemical series, which means that it gives rise to low spin complexes, due to the fact that it has a large value of oct. There are two components that describe the metal carbonyl bonding.-bonding when a a lonely(prenominal)(predicate) pair of electrons from CO is donated to an empty d-orbital on the metal, this is cognise as -bonding.-acceptor ligand when electrons from the filled metal d-orbital are donated to an empty * acceptor orbital on CO, this is known as -back donation.CO is both a -donor and -acceptor ligand. Since these components complement one another, this results in synergic bonding. In other words, the greater the -donation the greater the -back donation. However the extent of backbonding does number on the oxidation state of the metal and the electronic properties of the other ligands present. Structurally, as a result of synergic reinforcing components, the metal carbonyl bond strength is increased, but this means the CO is weakened, relative to free CO gas. This is due to an increase in the electron density of the antibonding * orbital.PPh3Triphenylphosphine has a lone pair of electrons on P that it is able to donate to the transition metal centre, and so acts as a -donor ligand as illustrated in figure.The phosphine has a vacant orbital, so in theory it can also act as a -acceptor ligand. However, the 3d orbitals that are vacant on phosphorus may be of too high energy for -backdonation to occur. Instead the * orbital contributes as the main acceptor component.The ability of a phosphine ligand to act as an acceptor is controlled by the identity of the R substituent. Since in PPh3, the substituent is phenyl which is not a very electron-withdrawing group, the acceptor properties are weak. This is because the phenyl rings are not electron-withdrawing en ough to lower the energy of the 3d orbitals on phosphorus. However, if the R substituent was replaced by an electron-withdrawing group, the acceptor properties of the phosphine group would be greater. To summarise, PPh3 is a good donor but a poor acceptor.PiperidineThe molecular(a) formula of piperidine is C5H10NH and the geomorphological formula is displayed in figure.Piperidine can act as a ligand because the nitrogen atom has a lone pair of electrons. However contrasted CO and PPh3 it is boded as an intermediate field ligand. Piperidine is able to donate its lone pair of electrons on nitrogen to the transition metal centre, and so is said to act as a -donor. However since the nitrogen atom only has one lone pair of electrons, it is unable to participate in -backdonation.Mo(CO)4L2 where L exists as piperidine or PPh3 may exist as two disparate geometrical isomers cis or trans. By considering only the CO bond of the compound in the infrared spectrum and by exploitation of grou p theory, the molecular arrangement of the compounds prepared could be determined.CisFor cis-Mo(CO)4L2 the point group was identified to be C2V (since it has a C2 axis, (xz) and (yz) components).In the case of cis-Mo(CO)4L2 the character table for C2V isCHARACTER put off C2V hereSince only the CO bonds are being considered, the reducible representation of the number of unshifted CO bonds under each operation of the point group is detailed in table.EC2(xz)(yz)CO4022The reduction formula provides a means of converting a reducible representation into a sum of irreducible representationsWhere ai= number of times an IRREP contributes to the reducible representation h= quantity number of symmetry operations, nR= number of operations in a class (R) = character in reducible representation IR= character in IRREPTherefore when the formula is applied to each line of the character table we getSo overall CO = 2A1+B1+B2The complex was then describe in terms of vibrational modes, COEC2(xz)(yz)CO 2011Using table (C2v character table) it can be seen that A1, B1 and B2 are all infrared active. Therefore cis-Mo(CO)4L2 would be expected to give rise to four peaks in the vibrational spectrum.The same impact was carried out for the trans isomer in order to determine the number of IR active bands in the vibrational spectrum.TransFor trans-Mo(CO)4L2 the point group was identified to be D4hIn the case of trans-Mo(CO)4L2 the character table for D4h isCHARACTER TABLE D4h hereSince only the CO bonds are being considered, the reducible representation of the number of unshifted CO bonds under each operation of the point group is detailed in table.E2C4C22C22C2i2S4h2i2d3N4002000420As before the reduction formula was used to convert the reducible representation into a sum of irreducible representationsTherefore when the formula is applied to each line of the character table we getE2C4C22C22C2i2S4h2i2daiA1g40040004401A2g400-4000-4

Role Of Analog Communication In Daily Life Computer Science Essay

Role Of additive Communication In Daily Life computing device Science EssayThis term paper is based on the tag onitive conference and its role in daily life. additive chat is per work oned on unbroken bode.In electronics, a intercommunicate is an electric current orelectromagnetic field social function to convey data from one place to another.Signal sample Quantizer Encoder OutputSamplingQuantisingEncodingSignal is divided into two splitAnalog or Continuous augur Acontinuous signalis a varying quantity whose celestial sphere, which is a great deal time, is acontinuum. The procedure itself look at not becontinuous.Digital or Discrete signal Adiscrete signalis atime seriesconsisting of a eonof quantities. In other words, it is a time series that is a function over adomainof discrete integers.2. CommunicationCommunication is a change of transferring data from one entity to another.Information source sender hold recipient roleNoise destinationBlock Diagram of dis course strategymodulating signal transducer electrical amplifier prosodyOutput signal demodulator manslayer channel fraudulent schemeBlock Diagram of parallel of latitude communication establishmentBasics of communicationChannel is of two typesGuided or pumped(p)Non-guided or non-wiredGuided is of leash typesTwisted pairCoaxial furrowOptical referenceNon-guided is divided into two partsMicrowaveplanetModes of CommunicationSimplexHalf-duplexFull-duplexElements of communication remains inflectionChange in one of the parameter of beargonr wave in harmonize to the fast valuate of the modulating signal.Continuous SignalAmplitude prosody Angle intonation relative frequency passage degree chanting prosody IndexThemodulation index of a modulation scheme describes by how frequently the play variable of the carrier signal varies around its unmodulated direct. It is defined differently in each modulation scheme.m=Em/Ecwhere m is the modulation index.Em=(Vmax-Vmin)/2Ec=(VM ax+Vmin)/2Amplitude Modulation (AM)Change in amplitude of the carrier wave in harmonise to the instantaneous value of the amplitude of the modulating signal.Amplitude modulationis a method employ in electronic communication which is most usu eachy economic consumption in transmitting information by delegacy of radiocommunicationcommunicationcommunication set carrier wave. AM unharmed caboodle by changing the function createn to the transmittable signal in the message world sent. Example,changes in the signal strength quarter be apply to reproduce the blown-up(p)s to be reproduced by a speakeror to specify the base s dismount strength of television pixels. Comp be it with oftenness modulationwhich is also comm sole(prenominal) procedure for sound broadcasting in which thefrequencyis variable and mannequinmodulation often apply in irrelevant agrees in which thephaseis variable.AM is often employ to bushel to themedium wavebroadcastband. In telecommunication s,frequency modulation(FM) conveyssine formationover acarrierwaveby varying itsfrequencycomp argon this withamplitude modulation, in which theamplitudeof the carrier is wide-ranging while its frequency remains constant. Inanalogapplications, the instantaneous frequency of the carrier is directly proportional to theinstantaneous value of the input signal.Advantages of Amplitude ModulationThere are several(prenominal) advantages of amplitude modulationIt is really unaccented to implementit female genitals be demodulated using a circuit containing of very few apparatusesAM receivers are very inexpensive as no particular components are infallible.AM has benefits of ease, though it is not the most effectiveway to use, twain in terms of the quantityof space or spectrum uses and the way in which it uses the mightiness that is transmitted. This is the yard why it is not extensively utilise these sidereal days around(prenominal)(prenominal) for broadcasting and for two way radio communication. flush the long, medium and for extendful wave broadcasts impart eventuallychange because of the truth that amplitude modulation is subject to oftentimes higher aims of noise than other modes. Its easiness and its wide usage means it will be hard to change rapidly and it will be in use for just about(prenominal) years to come.Frequency Modulation (FM)It is the process of variation in frequency of the carrier wave in proportion to the instantaneous value of the amplitude of the modulating signal.While changing the amplitude of a radio signal is the best method to modulate it, it is not the only way. It is also realistic to vary the frequency of a signal to give frequency modulation. Frequency modulation is widely used on frequencies preceding(prenominal) 30 MHz, and it is mainlykn make for its use for VHF FM broadcasting.It is not easy as amplitude modulationhowever frequency modulationdeals with some dis similarbenefits. It is able to return immediate hoo-ha h free response and this is the reason it isassumed for the VHF sound broadcasts. These transmissions could off-keyer high fidelity sound recording, and this is the reason, frequency modulation is much more(prenominal) prevalent than the older transmissions on the long, medium and short wave bands.In addition to its extensive use for high superiority audio broadcasts, FM is also used for a variety of two way radio communication systems where amplitude modulation is a failure. Whether for fixed or nimble radio communication systems or for use in moveable applications, FM is widely used at VHF, mobile radio.Advantages of frequency modulation, FMFM is used for a number of reasons and there are numerousbenefits of frequency modulation. some(a) of the benefits of frequency modulation are as underResilience to noise Frequency modulation has elasticity to signal level variations. The modulation is carried as there are disparities in frequency. This means that any signal level variatio ns will not disturb the audio forbiddenput, on condition that that the signal does not fall to a level where the receiver lotnot handle. As a result it authorizes FM perfect for mobile radio communication applications including more general two-way radio communication or movable applications where signal levels are akinly to vary much. The additionalbenefit of FM is its elasticity to noise and interference. It is for this reason that FM is used for high superiority broadcast communications.Easy to cave in modulation at a low effect stage of the transmitter Frequency modulation is linked with the transmitters. It is probable to relate the modulation to a low power stage of the transmitter and it is not essential to use a direct form of amplification to escalate the power level of the signal to its ultimate value.It is possible to use efficient RF amplifiers with frequency modulated signals It is possible to use non-linear RF amplifiers to amplify FM signals in a transmitter and these are more effective than the linear ones required for signals with any amplitude disparities. This means that for a given power yield, less battery power is necessary and this makes the use of FM more possible for portable two-way radio applications.Frequency modulation is widely used in various areas of radio technology including broadcasting and fields of two way radio communication. In these applications its specificbenefits thunder mug be used to easily consequence. In spite of these changes, FM will continue to be in use for numerous years to come as there are many advantages of frequency modulation for the areas in which it has addedaimportanthold in recent years. shape Modulation (PM)Change in the phase of the carrier wave in accord to the instantaneous value of the amplitude of the modulating signal.Advantages of phase modulationPhase modulation demodulation is less complicated as compared to Frequency modulation.Phase modulator is used in shaping velocity of movin g target by removing Doppler information. Doppler information needs steady carrier which is probable in phase modulation but not in frequency modulation.Role of analog communicationAnalog communication plays a very vital role.Either in the form of AM,FM or PM.It is used in audio, video, telephony, wireless communication, radiolocation, requirement services, etc. rallyAM broadcast radio which sends voice or medicine in the Medium Frequency intercommunicate Spectrum which ranks from 0.3MHz to 3MHz. AM broadcast uses amplitude modulation in which high sounds at the microphone roots wide variations in the transmitter power while the transmitter frequency remains constant. Transmissions are regularlyaffected by static since lightening and other some sources of radio add their radio waves to the one upcoming from the transmitter.AM radio displace are the original broadcasting stations. They are aform of connection of radio waves by changing the amplitude of the carrier signal in prop ortion to the instantaneous value of the amplitude of the transmitted signal.AMs simple signal mass be discover with simple apparatus which turns into sound. If a signal is strong decent then there is no necessity of power source, Another advantage to AM is that it uses a narrow bandwidth than FM.FM broadcast radio transmits voice and music with high fidelity than AM broadcast radio. In frequency modulation loud sounds at the microphone causes the frequency of the transmitter to varyfurther than the transmitter power stays persistent. FM is transmitted in the Very High Frequency radio spectrum ranging from 30MHz to 300MHz. FM needs extra radio frequency zona than AM and at high frequency more frequencies are brotherly and there are additional stations each one move more information to the station. And when shorter VHF radio waves usually act bid light which travels in straight line so the response range is usually limited to 50 to 100 miles. During higher atmospheric situatio n, FM signals are bounceed rump to Earth by the ionosphere layer which publications in longsighted outperform FM response. FM receivers are subject to capture outcome which causes radio to receive the strongest signal when many signals are on the similar frequency. FM receivers are reasonablyprotected to lightening and spark interference.Aviation voice radios use VHF AM. AM is used so as to obtain triple stations on the same channels. Aircrafts fly high adequately so that their transmitters can be received thousands of miles away. It uses VHF.Marine voice radios use narrowband FM in the VHF spectrum for very weenyer ranges and use AM in the shortwave HF radio spectrum extending from 3MHz to 30MHz for very long distances.FM Subcarrier services areminor signals transmitted associated along with the main program. Special receivers are necessary to operate these services. Analog channels may comprisesubstitute programming, such as reading services for the blind, background musi c or stereo sound signals. In some countries, FM radios automatically retune themselves to the matching channel inanother district by using sub-bands.Government, police, empty and commercial voice facilities use narrowband FM on distinct frequencies. faithfulness is sacrificed to use a lesser range of radio frequencies, typically fin kilohertz of aberration rather than the 75 used by FM broadcasts and 25 used by TV sound.Civil and military HF voice services useshortwaveradio to communicate withships at sea, aircraft and conflicting settlements. Most usesingle sidebandvoice which uses a thiner enumerate of bandwidth than AM. SSB sounds like ducks quacking on an AM radio. This also makes the transmitter about three times more influential, because it doesnt need to communicate the unused carrier and sideband. phoneCell phones transmit to a native cell transmitter/receiver which associates to the public service telephone system through an optic fibre or cook radio. When the phone leaves the cell radios zone, the central computer shifts the phone to a new cell. Cell phonesinitially used FM.There are many cellphone service providers in India nowadays. The main among them areBSNLAirtelVodafoneIdeaAircel motion-picture showconTata DocomoTata IndicomMTNLMTS beam phones come in two typesINMARSATandIridium. Both types provide world-wide coverage. INMARSAT uses geosynchronous airs, with enjoin high-gain antennas on the vehicles. Iridium provides cell phones, except the cells are planets in field of study. major planet phone communication is not available in public domain in India. It is used by the defence services. The main companies that provide the satellite phones in India areMotorolaSiemensGESatellite phone communication can be provided in the public domains as the media persons in the remote areas etc. But it needs a special licence from TRAI.VideoTelevision transmits the picture as AM and the sound as FM on the identical radio signal.Digital television encrypts three bits as eight strengths of AM signal. The bits are directed out-of-order to cutdown the effect of gusts of radio noise. Even if any data could be transmitted, the standard is to useMPEG-2for video, and five CD-quality (44.1 kHz) audio channels (centre, left, right, left-back and right back). With all this, it takes only half of the bandwidth of an analog TV signal because the video data is generallycompressed.India saw the advent of satellite communication in 1995. But it was limited to cable operators till 2007. But then, satellite communication stepped up inot DIRECT TO HOME channels. These providers areDishTVReliance swelled TVAirtel Digital TVTata Sky.Videocon d2hNavigationAllsatellite sea utmostingsystems use satellites with accuracy clocks known as precision clocks. The satellite communicates its position and the time of the broadcast. The receiver listens to four satellites and can figure out its location as being on a line that is sunburn to a circular shell around each satellite, determined by the time-of-flight of the radio signals from the satellite.Loransystems also used time-of-flight radio signals, but from radio stations on the ground.VORsystems (used by aircraft), have two transmitters. A directional transmitter run outs or spins its signal like a lighthouse at a fixed rate. When the directional transmitter is facing north, an Omni-directional transmitter pulses. An aircraft can get readings from two VORs, and reconcile its position at the intersection of the two beams. communicate direction-finding is the oldest form of radio navigation. Before 1960 navigators used movable loop antennas to sink industrial AM stations near cities. In some cases they used marine radiolocation beacons, which share a range of frequencies just preceding(prenominal) AM radio with amateur radio operators.GPS i.e. Global Positioning constitution is in use from past decade. Vehicles using navigation with the table service of GPS. GPS is being ins talled in recent luxury cars and in many business split vehicles. It relies on high frequency radio signals from satellites in space. Vehicles having GPS navigation systems can travel in some situations where they may lose the signal for some time. It usually provides accurate navigation information.The companies that provide the Navigation systems in India areMap My IndiaNokia OVI mapsGarmin GPS systems.Radar (Radio Detection and Ranging)Radar detects things at a distance by bouncing back radio waves from them. The delay caused by the echo measures the distance. The direction of the beam determines the direction of the reflection. The polarization and frequency of the return can sense the type of surface.Navigational radars exhaust a wide 2 to 4 times per minute. They use very short waves that reflect back from earth and even s stones throw. They are common on commercial ships and long distance commercial aircraft.General purpose radars generally use navigational radar frequenci es, however modulate and polarize the pulse so that the receiver can decide the type of surface of the reflector. The best general-purpose radars distinguish the fall of heavy storms, as well as land and vehicles. Some can superimpose sonar data and map data fromGPSposition.Search radars scan a wide area with pulses of short radio waves. They usually scan the area 2 to 4 times a minute. Sometimes seek radars use theDoppler Effectto separate moving vehicles from confusion.Targeting radars use the same principle as search radar but scan a much smaller area.Weather radars resemble search radars, however use radio waves with circular polarization and a wavelength to reflect from water droplets. Some support radar use theDopplerto measure wind races.This is how radar screen looks unavoidableness servicesEmergency position-indicating rescue beacons (EPIRBs),emergency locating transmitters or ain locator beacons are small radio transmitters that satellites can use to locate a person o r vehicle need rescue. Their purpose is to help and free people in the first day, when survival is possible.Data (digital radio)Pioneers such as Marconi used the oldest form of digital broadcast which was Spark snap Telegraphy. The operator could send messages in Morse coding just by reviving a rotating communicating spark gap b touch the key. Simple spark gap generates a hiss when rotating commutator generates a tone in the receiver, same from the static. Spark gap transmitters are now prohibited because their transmissions span is several hundred MHz which is a waste of both radio frequencies and power. Its just inefficient and uneconomical. The next progress is to use continuous wave telegraphy (CW) in which pure radio frequency is produced by a vacuum tube electronic oscillator which is switch on and off by a key. A receiver having a local oscillator will heterodyne with pure radio frequency creating a whistle like audio tone. Less than 100Hz of bandwidth is used by CW. cri tic radio operators lull use CW. On-off keying of a carrier should be known as fitful Continuous Wave or ICW.Radio teletypes usually run on short-wave (HF) and are much acceptable by the military since they generate pen information with no skilled operator. They convey a bit as one of two tones. Groups of five or seven bits turn into a character printed by a teletype. From about 1925 to 1975, radio teletype was how on the whole commercial messages were sent to less industrial countries. These are still used by the military and weather services.Aircraft use a 1200 Band radio teletype service over VHF to send their ID, altitude and position, and get portal and connecting-flight data.Microwave dishes on satellites, telephone exchanges and TV stations frequently usequadrature amplitude modulation(QAM). QAM sends data by altering both the phase and the amplitude of the radio signal. Engineers like QAM because it packs the most bits into a radio signal. commonly the bits are sent in frames that repeat. A special bit practice is used to position the beginning of a frame.Systems that need consistency or which allocate their frequency with other services may use change by reversal orthogonal frequency-division multiplexing orCOFDM. COFDM breaks a digital signal into countless several hundred slower sub-channels. The digital signal is frequently sent as QAM on the sub-channels. Modern COFDM systems use a small computer to make and decode the signal withdigital signal processing, which is more flexible and far less expensive than older systems that implemented separate electronic channels. COFDM resists attenuation and ghosting because the narrow-channel QAM signals can be sent bit by bit. An adaptive system or one that sends error-correction codes can also defy interference, because most interference can change only a few of the QAM channels. COFDM is used forWi-Fi, somecell phones,Digital Radio Mondiale,Eureka 147, and many other local area network, digital TV a nd radio standards.Most new radio systems are digital, DigitalSatellite Radio,Digital Audio Broadcasting.HeatingRadio-frequency zero generated for heating of objects is generally not intended to radiate outside of the generating equipment, to observe interference with other radio signals.For heating food and other eatables, microwave ovens use strong radio waves. It is a general misconception that the radio waves are tuned to the resonant frequency of water molecules. The microwave frequencies used are really about a factor of 10 below the resonant frequency.Diathermyequipment is used in surgery for sealing of blood vessels.Inductionfurnaces are used for melting metal forcasting.Mechanical ForceTractor beams There is a small electrostatic and magnetic force being exerted by radio waves which is enough for the performance of station-keeping in microgravity environment.Spacecraft propulsion Propulsion method for an interstellar probe called Starwisp is proposed with the help of pow erful radio waves which has a radiation pressure. Since the radio waves are long so the probe could be very light weighted metal mesh and hence it attains high accelerations.OtherAmateur radiois a pastime where enthusiasts who purchase or build their own equipment and use radio for their own enjoyment. They may also provide an emergency and public-service radio service. This can be of large use, saving lives in many instances. Radio amateurs are able to use frequencies in a big number of finebands all over the radio spectrum. Radio amateurs use all forms of programming including outdated and new ones. Several forms of radio were pioneered by radio amateurs and afterwards became commercially significant including FM, SSBAM, and digital packet radio and satellite repeaters.Individual radio services such asCitizens Band Radio,Family Radio Service,Multi-Use Radio Serviceand others offer simple, short range message for persons and small groups without the simplicity of licensing.Wireless energy transfer Many schemes have been proposed which transmits power using microwaves and its techniques have been confirmed.These schemes consist ofsolar powerstationsin orbit beaming energy down to worldwide users.Radio remote control Radio waves are used to transmit data to remote refer as is done in some early forms of guided missile, TV remotes and a range of model boats, cars and airplanes. Remote controlled equipments which are used in large industries mostly use digital radio techniques for safety purposes and reliability. such equipments are cranes and switching locomotives.ConclusionFrom the one-way communication analog communication has now reached to two-way communication. From wired system to wireless communication.With the help of analog system one can find direction easily.It helps in ballistic capsule propulsion.Analog systems are inexpensive in many cases.It uses less bandwidth.trueness of analog systems is more.As the world is leaving from Wires to Wireless, Th e technology and swiftness or speed of wireless communication is also going leaps and bounds. The wired set-up often goes too crowded and offers obstruction to mobility needs of the users i.e. the wired system is not portable. If at all it is then it is very complicated.With wired Networks, although security characteristics and speed are however not matched by the wired networks, nevertheless the incapability to being flexible is what causes the wireless mediums to gain additional public awareness.Analog communication plays a vital role in our day to day life. It is used in many fields today and is growing each day. Its multi-tasking made the work easier. Just by changing the frequency range, it can be used differently. With the help of analog signals, the boom of communications is rising.

Saturday, March 30, 2019

Soft Skills And Communication Skills For Engineers

Soft Skills And Communication Skills For EngineersAbstractEngineering upbringing widely recognize an increasing need to equip students with effective call for skills early in their university education and basic professional skills prior to graduation. These, however, ar handed-downly difficult modules to indoctrinate prosperously to larger groups through traditional talking to. Observations suggest a poor absorption rate from the students and thus a lack in their ability to benefit from these skills both personally and professionally. unique(predicate) techniques described in this paper can be easily combine into most fibres of educational activity material.IntroductionOver the divisions there has been an change magnitude in emphasis on soft skills and particularly communication skills in the engineering programs. Reflecting both the demands of potential employers and professional bodies, as swell as the creativity of course designers, modules such(prenominal) as first year ruminate skills and final year professional skills go through become to a greater extent(prenominal) and to a greater extent common. The greatest focus has been placed on fundamental guinea pigs such as presentation skills, effective get over theme, teamwork, and time/project management. Whilst this change is for certain a positive whizz, these modules seem to be among the more challenging to teach and assess success bountifuly, the criteria for success being that the student can understand the concepts presented, obtain them using exercises, and represent the resulting competence through assessment.A modified precept greet is required that addresses the professional students. The approach needs to add involution and obvious relevance students need to feel that any guidelines presented can decide a pressing issue or concern that exists in their world. to a higher place all, to be successful the teaching approach must(prenominal) be dynamic, elicit, pragmatical and organized to manage tactically the attention span of the audience.Modifying the approach memory a large number of undergraduate students continually guided is not the easiest of lying-ins, particularly considering the challenges supra. It was decided that a different and more dynamic teaching approach was required to stimulate students in place of traditional lecturing styles based essentially on one-way communication. If students frequently had to respond, discuss, react or participate they would be far less analogously to disengage or go to sleep Allowing them to make mistakes in a supportive purlieu would also go about way to convincing them that they needed to reform their skills and were doing so by attending the learning sessions. Some might bespeak that a high level of interaction is solely practicable with smaller audiences. Whilst smaller groups atomic number 18 indeed easier to manage this was found not to be the case, although an experienced lecturer is requ ired who is willing to engage in clear discussions and deviate from a detailed lecture plan if necessary.Towards a task-based approachTypically, a traditional ELT syllabus lists learning items in terms of structures, functions, notions and dictionary which argon then set in situations and which usually integrate a variety of skills (reading, writing, listening and speaking). This dominant approach has been characterized as product-orientated beca hire it focuses on what is to be learnt or on products. The problem with this approach, as Nunan (1988) has pointed out, is that input cannot be equated with production and that teaching cannot be equated with learning. In short, what the teacher teaches is not what the learner learns. straddle (2005) in his critique of task-based learning laments the polarization of attitudes in similitude to modern discussion of dustup learning. On the one hand traditionalists argue in opt of a linear, atomistic syllabus design. On the other hand, hard-line task-based ideologues seem to exclude any atomistic activity in favor of all-or-nothing holism. Bygates distinction (2003, p. 176) between tasks and exercises helps to situate this debate. He defines exercises as activities which practice split of a skill, a mod sub-skill, a new piece of knowledge. In contrast, he defines tasks as activities which practice the whole integrated skill in some way. Bygates discussion (2001, pp.23-48) lends support to the idea that task-based teaching needs to be situated in a broad curriculum example, suggesting that isolated tasks atomic number 18 not sufficient in themselves to promote learning. The implication drawn from such research and discussion is that units of learning that involve the strategic use of holistic repeated tasks and supporting atomistic exercises provide one means of avoiding contract ideological positions.A task-based unitary framework is therefore proposed here that leads to student-led holistic outcomes in the form of written reports, spoken presentations and substantial small-group conversations that lead to decision-making outcomes. However, receivable consideration is also given to the design of atomistic exercises within the framework. In her model for task-based learning, Willis (1996, pp.52-65) proposes a pre-task component, a task-cycle component (pre-task/task/post-task) and a language focus component. With regard to focus on form, Willis emphasizes the greatness of a post-task report variety, which could be a written activity such as writing a polished report or a spoken public-report phase in which students can be encourage to focus on truth and can be prompted to recast inaccurate forms. Other key stages for Willis that remedy the linguistic focus of task-based learning are the planning stage during which the teacher can take on a role of language advisor. This 1996 framework by Willis has been influential. In his 2006 Asian EFL Journal (AEJ) conference keynote speech, f or example, Ellis make extensive reference to it, adopting it as his basic framework.Components of a TaskTasks assure some form of input that may be verbal (a communication/role play/reading) or, nonverbal (pictures/a gesture) followed by an activity, which is in some way derived from the input. This activity sets out what learners need to do in relation to the input. Tasks have also goals and roles for both teachers and learners.Components of a Task (Nunan 1989)From the above diagram, a task can be viewed as a piece of mean focuse work, involving learners in comprehending, producing and/or interacting in the target language.Before fetching up the task of converting the textual content into various tasks, the adjacent points were mention and kept in mind by the investigators-The objective of the task must be stated very clearly-The task must be appropriate for the level of the learners-The task must equip the learners with the ability to afford classroom learningin new situat ions.-Tasks must be interesting and motivating to the students-The form the input takes, must be clear to the teacher-The roles of teachers and students must be specified clearly-Through the task, learners must be encouraged to negotiate meaning-The language that will be generated by the task must be predicted-There should be variety and flexibility in the tasksThe following are eight well documented techniques that can be used flexibly to transform any standard lecture into a more dynamic one. These techniques are summarized below.An emphatic and captivating introductionA successful training session must begin by creating a grit of urgency and somehow capturing the interest of the audience, usually by emphasizing the importance of the topic and its relevance. What rewards can be obtained by applying the content of the session? What pitfalls exist for those who lack the competence? However, it is cardinal that in emphasizing the importance of a topic the presenter is not perceived as finger wagging. For example, when youre in industry youll have to . . . or you wont pass your final year project unless you learn to . . . are unlikely to prove engaging whereas would you like me to help you get more marks for your lab reports without doing any more work is.Use of applicable examples and storytellingExamples, stories and anecdotes turn theories and guidelines into perceived authenticity by providing a true-to-life basis for their application. They will also capture the full attention of most audiences. Use plenty of these at least one for each principal point covered and, wherever possible, focuses on real examples rather than hypotheses. Let students share their similar experiences.Group exercisesHave students actualize short exercises in groups to try out the application of concepts presented, followed by query where each group reports its findings, progress and difficulties to the audience. Exercises of this type break up the session, development engag ement and can be easily conducted even in a lecture theatre. They also force the students to admit their errors, even if these errors are not reported to the audience, and this helps to establish for them the fact that they have learnt something.BrainstormingThis is another interactional technique to provide stimulation and variation. Provide an open question and have students brainstorm in small groups (usually together with those sitting next to them) sooner beginning a discussion session.Demonstrations/simulationsIt is much more effective to demonstrate an idea than to talk about it. Documentation could include some type of physical simulation, a simple game, or even a icon clip. Role playing is particularly effective as it involves the students in an wide awake way, provided that a risk-free and supportive environment is provided to those who participate. This in turn is reliant on the lecturers making sure that students are never embarrassed by failure during an activity. Opinion pollsThis is a quick change and helps students to engage in a new activity or a new aspect of a topic. For example a quick show of men How umpteen people think .?The mind breakUsed to polish the listeners attention span during more demanding presentation components, for example, take a 2 minute break to chat with your neighbor before we move on . . .Facilitation vs. lecturingWhenever possible, lean towards the process of facilitation rather than lecturing. Prompt the audience with relevant questions, challenges their ideas, and shapes an understanding based upon the responses and mobile discussions rather than reading a script. It is, however, important to be respectful towards students who give wrong or poor answers.The techniques presented above provide some of the most important ingredients for an engaging lecture. They are well documented and widely used in isolation. Not all are applicable to all situations and types of material, and the next step is, therefore, to devise session plans into which they are woven appropriately. The choice of techniques will depend largely on the topic to be presented and to some extent the lecturers personality and individual style.Conclusion amend communication is near impossible in the classroom because it depends on many variables. However, if the teacher is to be successful, the content of his message should be clear in his mind and be put in suitable code and familial through appropriate media. There is need for a careful sequencing of ideas and the use of activities that is within the experience and understanding of the students. Whatever learning experience the students are exposed to, they should be allowed to practice it. Learning takes place through the active behavior of the students. It is what the student does that he learns and not what the teacher does. The teacher is only a facilitator of learning. The quality of learning that takes place in any situation, to a very large extent, is dependent on the effectiveness of the teachers plan and communication.

Effects of Violent Video Games | Essay

Effects of Violent tv set Games EssayViolent information processing system bleeds, and their possible effect on tinkerers. penetrationThe ProblemsSocial Effects of Playing data processor GamesConclusionBibliographyIntroduction nourishment childrens passion for information processing systems, billions of dollars in both unrestricted and private funds argon being spent to give children entrance m oney in school, at sign, and in the community. Nearly both school is right off equipped with computing devices, (Fisch, 2004, p. 2) and over two- trinitys of our nations children remove access at root. (Fisch, 2004, p. 4) But is electronic computing device technology actu solelyy ameliorate their lives? Computer technology has transformed society in a add up of pro rig expressive styles. For better or worse, the increasing pervasiveness of calculating machine technology is a reality no one peck ignore or s head, non that one would. Computers argon fast becoming integr ated into nearly every aspect of daily living, from school to usage, to banking and shopping, to paying taxes and so far voting. They provide access to a wide range of information without a trip to the library. They take doublel messages in place of the post office or telephone. And they argue with newspapers, radio, and television in providing frolic and news of the day.Computer technology in like manner has a pro comprise effect on our economy. Not only ar computers changing the way respectables and services be manufactured, distri merelyed, and purchased, but they atomic number 18 as tumefy as changing the skills workers need to be cropive and earn a living. This mode sets the stage whereby we upgrade our children to utilize a computer, as much(prenominal) represents not the world of tomorrow, but the world of at at once, and thus they need to be computer literate. The public gener every(prenominal)y agrees that for children to participate br some otherlyly, eco nomically, and politically in this new and several(predicate) world, they must acquire a certain level of comfort and competency in victimisation computers. National polls indicate widespread bear out for providing children with access to computers to enable them to learn adequate computer skills and improve their instruction (Trotter, 1998, pp. 6-9). In accompanys, most p atomic number 18nts and children report that they view computers and the Internet as a positive force in their lives, despite concerns about exposure to contradictory commercial, sexual, and ferocious satiate (National School Boards Foundation, 2000). Most p atomic number 18nts believe that the Internet crowd out help children with their homework and allow them to discover fascinating, put onful things, and that children without access ar disadvantaged compared to those with access.The scenarios described above represent the current coevals of parents, as opposed to their children. A generation that g rew up on computer and television spiriteds that their parents had no idea of what they were compete, or steady what the technology was. Thus, in that respect was a real understanding and involvement gap (Brougere et al, 2004, p. 1-4). Those basically unsupervised children are now adults. Adults that grew up selecting their birth video and computer juicys darn developing their own culture without centering to determination as to what was good for them or bad, as they were safe interested in the experience of a new technology changing the world of play and relaxation. Thus it was the game, close regardless of what it was, and not the subject that ruled (Brougere et al, 2004, p. 1-4).When discussing fury in computer games, as a result of this foundational background understanding, in that respect are tether standards from which to choose, the children of parents who grew up vie games and basically picking them out themselves, those whose parents supervised what they pla y and purchased, which is a small minority, and lastly, those adults who either didnt involve either video games or computers in their home. The assumption is, that almost all of todays adults contend video and or computer games when they were children, if not their own, then on a friends console or computer. Children of a generation whose parents were maybe subject more or lesswhat to computers at work, but more than often than not, were not.Thus, the chore of frenzy fixs one that rests on the shoulders of game developers, manufacturers and public figureers base upon perseverance research, educational and excited findings, as closely as studies concerning the set up of wildness on children. The parents of todays adults knew about the creeping abandon on TV, that they grew up with and which was publicise when they were children and teenagers. But, the circumstances are different today, as at that place is no television standards board making noise about PC and vi deo game national. Thus, the level of acceptable violence as well as the surmounts, industry oversight and general standards as to what is and is not acceptable comes into play. If you straits the implicit in(p) foundation, think about the favouriteity of Madden football. Like it our not, that U.S. bluster tops fisticuffs for all out mayhem, violence, competitive spirit and ill will. Thus, the dilemma as delineate by attempting to equate the level of violence and their effect is base upon a generation that really had no boundaries.The jury is still out on the subject of the effects of computer games on children, teenagers, and young adults, and it is seemingly hopelessly divided. There are an overwhelming number of parents, pegged at 96 pct, based upon a survey conducted by the synergistic Digital Software crosstie who indicate that they pay maintenance to video and computer game content that their children play (Business Wire, 2003). That analogous survey indicated tha t 44 share of the parents in homes that own either video game consoles and or computers stated that they themselves utilize to play interactive games and that they play with their children either on a daily or weekly basis (Business Wire, 2003). The returns from that survey found that all in all over 60% of the responding parents play interactive games with their children at least once in the month (Business Wire, 2003). The parents responding at a rate of 89 percent stated that they were there when the games were purchased for children under the age of 18.The survey revealed some provoke trends, as well as revealed that the children who are playing computer and or video games are the offspring of former and present players themselves. This brings to mind if these parents word sense level of violence in computer and video games is slightly jade in terms of what constitutes violence. In fact, the majority of gamers, as they are termed, are in fact adults, according to the Intera ctive Digital Software crosstie survey (Business Wire, 2003). The survey revealed that the entire universe of game players is getting older. The part of players who were under the age of 18 made up just 30 percent of the gamer population, which is tear down from the 34 percent recorded in 2002 (Business Wire, 2003). However, the survey avoided the critical issue, the extent of violence in the games the parents indicated that they were supervising the buying for, as well as playing with their children. The survey did state that 36 percent of the games played on computer were action oriented, which tied with puzzle, board, and card games for the top spot (Business Wire, 2003). In fact, the preferences were almost evenly divided across the foursome categories, with driving and racing games scoring at 36 percent, and sports at 32 percent.Excessive, unmonitored usance of computers, especially when combined with use of other(a) screen technologies, such as television, can place ch ildren at risk for harmful effects on their physical, affectionate, and psycho dianoetic development. Children need physical activity, social interaction, and the love and guidance of caring adults to be healthy, happy, and productive. (Hartmann and Brougere, 2004, p. 37- 41) Too much clip in drive of a screen can deprive children of while for organized sports and other social activities that are beneficial to child development. (Hartmann and Brougere, 2004, p. 37- 41) In addition, children may be exposed to red, sexual, or commercial content beyond their years, with tenacious-term detrimental effects (Brougere et al, 2004, pp. 8). At present, prodigal use of computers among children, especially young children, is not typical. National survey data gathered in spring of 2000 indicated that children ages 2 to 17 spent about 34 minutes per day, on average, using computers at home, with use increasing with age (Preschoolers ages 2 to 5 averaged 27 minutes per day, school-age ch ildren ages 6 to 11 averaged 49 minutes per day, and teens ages 12 to 17 averaged 63 minutes per day) (Brougere et al, 2004, pp. 9). Available data on computer use at school suggest that exposure in the early main(a) grades, at least, is relatively modest. A spring 1999 survey of 26 chief(a) schools in the heart of Silicon Valley, where computer use might be expected to be high, found that although 70% of t to each oneers in kindergarten through third grade had their students do some work on computers, the students computer quantify averaged less than 10 minutes per day (Brougere et al, 2004, pp. 11). This data suggest that junior children in particular are not currently using computers for unjustified amounts of time.In the case of video games, even their critics acknowledge that they are instructing our children. The critics just dont like the form and the sometimes hazardous and sexually explicit content of the instruction, which they believe teaches children aggressive be haviors (Suellentrop, 2006). Yet if such games are nothing more than murder simulators, as one critic has called them, why is it, as free rein enthusiasts never tire of pointing out, that the murder rate has declined in late years, there are more video games, and more knock-down-and-drag-out ones, than ever (Suellentrop, 2006). The strategic thing to find out about video games isnt whether they are teachers The question is, as game designer Ralph Koster writes in A Theory of frolic for Game formula (2004), what do they teach? (Suellentrop, 2006). The marketplaceing strategies of game companies colligate closely to Hollywood action motion-picture shows as a means to come upon more gamers.The Cinema has emerged as the most prominent influence on games. Both cinema and games are superficially alike, in that they are relatively modern media that deliver audio-visual content to paying audiences. The alike(p)ities that the media share make up meant that some artistic strategie s can be transferred mingled with the two. However, there is a spring to the extent that artistic techniques can be taken from one and used in the other. Game designers are increasingly using unsuitable cinematic conventions in the creation of their games. Activision, a Santa Monica based game manufacturer generated the furious 4 game in agreement with its studio, whereby you can assume the persona of Mir. Fantastic/Reed Richards, Invisible Woman/Sue Storm, Human flannel mullein/Johnny Storm, or Thing/Ben Grimm and master their individual attributes and unique powers to pass puzzles, overcome obstacles, and defeat enemies. Another option is to control the Fantastic 4 in concert as a team and dynamically switch between characters during their adventures, and combine super powers in rank to level more lay waste to attacks and accomplish missions (Society for the Advancement of Education, 2005). And the trend includes almost any Hollywood movie that can be converted to action, w ith the Fantastic 4 representing a mild-mannered version of what the industry has to offer. The basic theme is the good guys, against the bad guys in such re-creations as X-Men Legends II Rise of Apocalypse, the rival X-Men and Brotherhood where you are bonded by a common enemy, controvert ramp by side for the first time, allowing players to switch instantly between super-power wielding teammates as they overcome obstacles, settle puzzles, and defeat more than 100 types of enemies (Society for the Advancement of Education, 2005).Violence is a popular form of entertainment a crowd of onlookers enjoys a street fight just as the Romans enjoyed the gladiators, and wrestling is a popular spectator sport not only in the United States, but in umpteen countries in the Middle East (Centerwall, 1989, p. 23). Local news shows provide extended coverage of violent crimes in order to increase their ratings. Technological advances have dramatically increase the availability of violent enter tainment. The introduction of television was critical, peculiarly in making violent entertainment more available to children. more(prenominal) recently, cable systems, videocassette recorders, and video games have change magnitude exposure. Hand-held cameras and video monitors now permit filming of actual crimes in progress. Economic competition for viewers, oddly young viewers, has placed a premium on media depictions of violence, as their attention translates into store sales.The ProblemsThe level of acceptable violence of computer games, as well as violence in itself thus represents the question, as the top change computer and video games all were violence based. And while the non-violent Sims simulation game proved to be the top seller at 16 one thousand thousand copies, the succeeding(a) four games totaled 32 one million million (Wikipedia, 2007). Of those games Starcraft, 9.5 million copies sold, is a strategy war game played in space, whereby one can get a good idea of its content by the give ear on its expansion pack, StarCraft Brood War (Blizzard fun, 2007). Half-Life (Planet Half-Life, 2007), 8 million copies, is a first person shooter game featuring blood spatters and other effects. Of the top ten computer games four are violence based, and of the next ten, 11 through 20, 5 are violence-based games (Wikipedia, 2007). Thus the ethics are sales, as well as creative foundation and premise from which the games are fashioned. The differing themes represent directions in terms of game development, what the manufacturer has build their temper on, and the gamer profile they appeal to. Based upon the preceding the industry is split down the middle, with half(prenominal) gong for violence, and the other utilizing non-violent content.There is considerable evidence that violence on television, in video as well as computer games is harmful to children (Hope, 2005). And just as the current parents became adjusted to certain levels of violence in their exposures decades ago, such has magnified for their offspring according to lecturer Lesley stump spud of Robert Gordon University (Grant, 2006). The preceding calls for a scientific psychology concerning the effects violence games had on the parents to understand the level their children are being exposed to. such should not only help us to understand our own the parents violence level, it should help to determine where this all stands in the realm of what is normal, speech in relative terms. Playing computer games can be an Copernican building block to computer literacy because it enhances childrens ability to read and visualize images in three-dimensional space and track multiple images simultaneously and there is as well limited evidence available likewise indicates that home computer use is linked to slightly better academic performance. (Alington et al (1992, pp. 539-553).Dominick (1984, pp. 136-147) expresses concern there are the findings that playing violent computer g ames may increase aggressiveness and desensitise a child to suffering, and that the use of computers may blur a childs ability to distinguish real life from simulation. Compared to girls, boys spend more than double as much time per week playing computer games (Funk, 1993, pp. 86-89) and are five times more in all likelihood to own a computer game system (Griffiths and Hunt, 1995, pp. 189-193). In a subject of self- inform leisure time activities of 2,200 third and fourth graders, computer games topped the list of activities among boys 33% of boys reported playing computer games, compared with fewer than 10% of girls (Harrel et al, 1997, 246-253). Initially it was thought that this distinction was the result of the games violent themes and lack of female protagonists (Malone, 1981, pp. 333-370). A more likely reason, however, is the difference between the genders in their play preferences boys tend to prefer bear upon play based on fantasy, whereas girls tend to prefer pretend play based on reality, a rare theme for computer games, even those designed specifically for girls.Social Effects of Playing Computer GamesAs mentioned earlier, game playing has long been the predominant use of home computers among childrenespecially among younger boys. Although the available research indicates that moderate game playing has little social shock absorber on children, concerns nonetheless have been raised about uppity game playing, especially when the games contain violence. Research suggests that playing violent computer games can increase childrens aggressive behavior in other situations.existent research indicates that moderate game playing does not significantly touch childrens social skills and relationships with friends and family either positively or negatively. Studies often found no differences in the sociability and social interactions of computer game players versus non-players, (Phillips et al, 1995, pp. 687-691) but a few studies found some mildly pos itive effects. For example, one study found that frequent game players met friends outside school more often than less frequent players. (Colwell et al, 1995, pp. 195-206) Another study of 20 families with new home computer game sets explored the benefits and dangers of playing games and found that computer games tended to bring family members together for shared play and interaction. (Mitchell, 1998, pp. 121-135)Less is known, however, about the long-term effects of excessive computer use among the 7% to 9% of children who play computer games for 30 hours per week or more. (Griffiths and Hunt, 1995, pp. 189-193). It has been suggested that spending a disproportionate amount of time on any one leisure activity at the depreciate of others will hamper social and educational development. (Griffiths and Hunt, 1995, pp. 189-193) Indeed, one study of fourth- to twelfth-grade students found that those who reported playing arcade video games or programming their home computer for more than an hour per day, on average, tended to believe they had less control over their lives compared with their peers. (Wiggins, 1997) In addition, some evidence suggests that repeated playing of violent computer games may lead to increased aggressiveness and hostility and desensitize children to violence. (Provenzo, 2001, pp. 231-234)Although educational software for home computer use includes many games that encourage positive, pro-social behaviors by rewarding players who cooperate or share, the most popular entertainment software often involves games with competition and aggression, and the amount of aggression and violence has increased with each new generation of games. A content analysis of recent popular Nintendo and Sega Genesis computer games found that nearly 80% of the games had aggression or violence as an objective. (Dietz, 1998, pp. 425-442) One survey of seventh- and eighth-grade students found that half of their favorite games had violent themes. (Funk, 1993, pp. 86-89) Yet parents often are unaware of even the most popular violent titles, despite the rating system from the EntertainmentIn a 1998 survey, 80% of junior high students said they were known with Duke Nukema violent computer game rated mature (containing animated blood, gore, and violence and sinewy sexual Content), but fewer than 5% of parents had heard of it. (Oldberg, 1998) Numerous studies have shown that watching violent television programs and films increases children and adults aggression and hostility (Friedrich-Cofer and Huston, 2000, pp. 364-371) thus, it is plausible that playing violent computer games would have similar effects. The research on violent computer games suggests that there is, indeed, an association between playing such games and increased aggression, and that the critical variable is a preference for playing aggressive games, kind of than the amount of time spent playing. (Friedrich-Cofer and Huston, 2000, pp. 364-371).Several experimental studies suggest th at playing a violent game, even for brief periods, has short-term transfer effects, such as increased aggression in childrens free play, (Friedrich-Cofer and Huston, 2000, pp. 364-371) hostility to perplexing questions, and aggressive thoughts. For example, one study of third and fourth graders found that those children who played a violent game (Mortal Kombat II) responded more violently to three of sextet open-ended questions than did children who played a nonviolent computer game (basketball) (Friedrich-Cofer and Huston, 2000, pp. 364-371). Furthermore, it has been found that children who have a preference for and play aggressive computer games record less pro-social behavior, such as donating money or helping someone. (Friedrich-Cofer and Huston, 2000, pp. 364-371).Studies of television have found that continued exposure to violence and aggression desensitizes children to others suffering, (Rule and Ferguson, 2001, pp. 29-50) but studies of computer games have not yet explore d such a link. At least since the 1980s, however, both the U.S. and British military have used violent video games for training, reportedly to desensitize soldiers to the suffering of their targets and to make them more will to kill. (Kiddoo, 2000, pp. 80-82).ConclusionThe foundation of violence in computer games stems from the fascination with violence as spawned by the movies as well as television. These mediums have become an overbearing influence in game development and its expressive methods are being applied in game linguistic context. A look at the graphics of any video game reveals the similarities as well as attempt to capture as much realism as possible. Such is a natural evolution of the product and technology, but such also is continually blurring the fantasy atmosphere that used to be clearly delineated. The violence that exists in over 50 percent of computer as well as video games is not so much a product of the designers and manufacturers it is a product of society in that the function of their businesses is to fulfill a need. And since the foundation for that need is there, they continue to progress to the games to fill it.The problem starts and exists with the consumer market, one that is a product of television and cinema culture that has been at work long before computer and video games arrived. There is now a sincere understanding that the effects have become deeply grow facets of industrialized cultures, and games can not be blamed, yet they, along with other entertainment medium are contributing to the problem. Youth violence affects us all, and thus a reversal of the process is going to be a difficult undertaking as a result of the historical context from which it came.A look at the top selling video game categories reveals the extent of the problemTable Top Games Genres(Wikipedia, 2007)RankGenre1Strategy / RPG2Action3Sport Games4 hasten5All Shooter Games6Simulations7Family Entertainment8Childrens Entertainment9Fighting10Other Games11 EdutainmentWith the following games rated as all time favorites, based on violent contentDonkey Kong, 1981, Nintendo Co. Ltd, Nintendo of the States, Inc., Arcade.Doom, 1993, id Software, id Software, P.C. DOS.Dragons Lair, 1983. Magicom Multimedia, Cinematronics, Arcade.Duke Nukem, 1991, apogee Software Ltd., Apogee Software Ltd., PC DOS.E.T. The Extraterrestrial, 1983, Atari, Inc., Atari Inc., Atari 2600.Final fantasy series I IX, 1990 2003, square(a) Enix Co., Sony Computer Entertainment America, Inc., Nintendo Entertainment System, Super Nintendo Entertainment System, PlayStation, PlayStation 2.Final Fantasy VII, 1996, Square Co., Sony Computer Entertainment America, Inc., PlayStation.Grand Theft Auto III, DMA role Ltd., Rockstar Games, PlayStation2Half-Life, 1998, Valve Software, Sierra On-Line, Inc., P.C. Win. 95.Legend of Zelda The Wind Waker, 2003, Nintendo Co. Ltd, Nintendo of Europe, Inc., GameCube.Mario Bros I-VII, 1983 2003, Nintendo Co. Ltd, Nintendo of America, I nc., Nintendo Entertainment System, Super Nintendo Entertainment System, GameCube. liquid ecstasy Payne, 2001, Remedy Entertainment Ltd., GodGames, Win. 95.Metal Gear Solid, 1998, Konami Computer Entertainment lacquer Co., Ltd., Konami of America, Inc., PlayStation.Metal Gear Solid 2 Sons of Liberty, 1998, Konami Computer Entertainment lacquer Co., Ltd., Konami of America, Inc., PlayStation 2.Myst, 1994, Broderbund Software, Keyboard Mouse, Macintosh.Pac-Man, 1980, Namco Ltd., Midway Mfg. Co., Arcade.Perfect Dark, 2000, Rare Ltd., Rare Ltd., Nintendo 64.Pokemon, 1998, Game Freak, Inc., Nintendo of America, Inc., Game Boy.Pong, 1973, Atari, Inc., Atari Inc., Arcade.occupier Evil, 2002, Capcom Co., Ltd., Capcom U.S.A., Inc., GameCube.Rogue Leader, 2001, Factor 5, Lucas Arts, GameCube.Silent Hill, 1999, Konami Computer Entertainment Kobe (KCEK), Konami of America, Inc., PlayStation.Space Invaders, 1978, Taito Corporation, Taito America Corp., Arcade.Spacewar, 1962, Russell, S.Street Fighter II, 1991, Capcom Co., Ltd., Capcom U.S.A., Inc., Arcade.Super Mario Bros., 1985, Nintendo Co. Ltd, Nintendo of America, Inc., Nintendo Entertainment System.Tekken 3, 1998, Namco Ltd., Namco Hometek, Inc., PlayStation.Tennis for Two, 1958. Higinbotham, W.Tetris, 1989, Pajitnov, A., Nintendo of America, Inc., Game Boy.grave Raider, Core Design Ltd., Eidos Interactive, PlayStation.Tomb Raider The Angel of Darkness, 2003, Core Design Ltd., Eidos Interactive, PlayStation 2.Winning Eleven 6 Final Evolution, 2003, Konami Computer Entertainment Kobe (KCEK), Konami Computer Entertainment Japan Co., Ltd., GameCube.Wolfenstein 3D, 1991, Apogee Software Ltd., Apogee Software Ltd., PC DOSZelda I VI, 1987-2003, Nintendo Co. Ltd, Nintendo of America, Inc., Nintendo Entertainment System, Super Nintendo Entertainment System, GameCube.As a business, the economics of a return on investment figures importantly into the reasons as to why so many violent games are produced. Simply speech product ion there is a market for them The high cost of producing games engenders a appetite within the companies financing games production to ensure a return on their investment. In most popular mass culture, this has seen a cautious tone-beginning to creating content. There has been a streamlining of the creation of content, be it music, films or games, that has seen the removal of as many variables as possible in order to produce content that can be easily quantified and accounted for. Companies are reluctant to take risks and the simplest way of avoiding them is to repeat previously profitable formulae, or in the case of a developing medium, such as games, to adopt the techniques of the more developed and superficially similar medium of cinema. Designers are reliant upon the finance provided by issue companies to create games. This has seen the production of numerous games based on Hollywood films and characters, or the construction of games that can be marketed and sold on the stre ngth of their cinematic aesthetics and sensibilities.Computer and video game companies base their strategies of what to produce based upon careful market research and raw numbers, and the fact is, since 50% of the market has been and continues to be buying violent game content, they will continue to design and market these types of gamesAnd while the problem is deep seated, there is a logical and easy solution, if only the adults will play along. The survey conducted by the Interactive Digital Software Association (2001), indicated the following statisticsadults purchase 90% of all games soldAnd that is the only statistic that will be utilized to make the point. As the controlling variable in the purchase, it is the adults that need to be reached. The problem is how? Educating Adults to the problem is the logical answer. But as the primary buyers of games overall, they are also severe buyers of violent game content themselves. The preceding is more than an ethical dilemma, it is a cultural one. One whereby the cycle needs to be broken with the same vigor and force that instilled it in the first place. But, that took decades and billions in advertising and selling dollars to put into place. Thus it seems that the only force large enough to impact upon this situation are governments. Therein lies the ethical problem, for this speaks of another regulation is a world that is fast becoming over regulated in order to save ourselves from ourselvesThe solution that the preceding is leading up to is the same as has been done in the instance of cigarette smoking, warning labels on each box as a mandated action. Could the foundation for this approach be similar to the health risk utilized in the instance of cigarettes, only in this instance as a societal risk? That represents an extremely mad subject as it seemingly broaches upon freedom of choice. The warning labels and legislation to stamp down smoking has achieved success as a result of the non-smokers who did not longing to inhale second hand smoke in restaurants, offices and other public indoor locales. These restrictions did not and do not restrict smokers for smoking. Thus, why would it control violent game players from playing.Thus, could a violent game tax be the solution. This would or might represent a choice in that the purposeless money so charged would be put into a victims and marketing fund to fuel additional education on the dangers of violence. Seemingly, that might create an outcry as well, however, as is the case with any type of social change, the majority wins out, thus the non-violent lobby would have to organize itself for a long

Friday, March 29, 2019

Business and marketing strategies for Citibank

Business and marketing strategies for Citi beachIntroductionCiti situate acts in consumer, incarnate depose buildinging and monetary answers and it is part of the Conglomerate giant Citigroup. The strand was established in 1812 and was known as City buzzword of unseasoned York and after that, it was named manoeuver start National City Bank of New York. The bon ton was later changed to Citigroup and Citibank became an fortify of the banking and pecuniary serve Unit of the fraternity (Wikipedia, 2010). As at June 2009, Citigroup is the tail largest bank in the joined States through domestic deposit and the confidential in system three banks be Wells Fargo, JP Morgan Chase, and Bank of America (Data monitor report, 2009). This make Citibank an inter depicted object financial bank with consumer, integrated and consecratement funds banking and in like manner displacement insurance serve. Citibank operates in over light speed countries glob exclusivelyy and it is one of the nigh victorful banks in the world. The economic crisis of 1990 ca dropd by the Gulf war and different financial crises in many Asia countries affected the banks performance (Timmers, P. (2009). This make the bank to change it corporate, occupancy and marketing strategies in aim to ensure m other(a)ability of the bank and also to beat its competitors. It also betrothd in the introduction of e-commerce and e- demarcation strategies to portray sunrise(prenominal) products into the markets and it also expanded its trade operations to immature(prenominal) areas much(prenominal)(prenominal) as wealth oversight, stock broking and financial work operate1.2 The recent strategies of CitibankThe bank extended its banking operations to former(a) areas much(prenominal) as wealth oversight, as throttles steering, insurance, financial trading etc (data monitor,2009)The bank initiated collapse organisational quite a little and mission statements to a broader, o ddment oriented gaols and objectives in company to beat the competition from other overlarge financial players and rivals much(prenominal) as Bank of America, JP Morgan Chase, HSBC, Barclays Bank etcAdoption of vernal e- bank line and e-commerce marketing strategies through with(predicate) new marketing instruction systems such as online earnings serveBased on Porter (1980) generic strategies Citibank adopted the differentiation system by building its international business strategies through murder of new technological and intercourse systems such as enculturation engine room systems, tools and equipment in order to kick upstairs its business operations,The composition of techniques and social organizations that ordain make the bank to be fitted to compete in e-business purlieu.1.3 The outline of the strategy expression technique available for Citibank in order to compete in e-business environmentDue to the growing war-ridden financial environment, and the ne ed to respond to the new technological changes for debaucheder business operations, Citibanks new visual sensation is to be number the worlds leading e-business enabler. Its meaning main e-business strategy is to bond with guests through the net ( weave), diversify the Citibanks capabilities to deliver integrated events and extend by reaching new markets, new nodes and new products.However, Citi bank has strategy readiness techniques for competing in the e-business environment and these allow for be discussed below. Creation of Citibanks E-business VisionThe prototypical step of Citibank strategy formulation was the initiation of the E-business Idea and man of an e-business vision and mission statements which forms the outline of achieving its business objectives (Ali Farhoomand, 2008). This e-business strategy was reiterated by Caroline Wong, fountainhead of e-business Group ( silver trade), Hong Kong stating the banks commitment to enter the e-business in order to br ing transformational reforms that will increase clients satisfaction. Citibanks vision is to become the leading enabler of e-business through empowerment of local anaesthetic, regional and global customers and business-to-business-to-consumer (B2B2C) (Tawfik Jelassi et al, 2008).EXTENDReach new markets,new customersand new products touchWeb-enable its core services to connectwith its customersTRANSFORMDraw the full align ofCitibanks capabilitiesto deliver integrated solutionsFigure 1 Citibanks E-business strategyThis vision and the business strategy serves as a fundamental shape for the Citibanks E-business organise frankincense giving directions, goals, aims and objectives. The mission includes the management of the overall be of its Information (Ali Farhoomand, 2008). engineering science (IT) investments, optimal usage of the existing and new technologies, and standardisation of its application and using processes. All these are compulsive towards increasing operational efficiencies and lower the cost of operational enchantment achieving on era delivery to customers. All these goals, aims, objectives created a fundamental frame wrench in which Citibank was operating to achieve a sustainable E-business in the combative markets so as to cook market loss leadership in the banking and financial markets operations.-The Formation of the Internet groupIn 1999, Citibank launched a CitiDirect Online Banking which was the e for the first time Citibanks multi-product in a multi-geographic Internet banking system. Citibank e-business unit was create in year 2000 with the managements group decision to aggressively develop Internet-based products. The e-business solution was uninterruptedly developed and researched through 2001 and 2002 and Jose Bermudez , the executive vice president and head of global cash and trade business who consolidated the Citibanks business structure and by holding brushs with all regions, developing and combining goals in all areas and consolidated bureaucracies crosswise the regions of the banks operations (Timmers, P. 2009). This initiative by Jose Bermudez created a help commitment to achieving and sustaining the Citibanks e-business strategy. During this period, the past CEO, John Reed was thoroughly concerned close to controling the demand for internet banking and he started the E-Citi initiative for exploring the Internet opportunities (Tawfik Jelassi et al, 2008.-Strategies murder for its e-business environmentJose Bermudez lead the e-business unit that was responsible e for developing internet software for the corporate clients setting up B2B (Business -to-Business) electronic commerce exchanges while the new high level committees coordinated and the strategies through benchmarking of other banks (Tawfik Jelassi et al, 2008. The e-business environment was conceived as a solution business for customers to create new and interlacing online banking products to meet the customers need. It bui lt internet platform andE-structure services such as clearing, trading, and collections which allowed customers to acquire culture rapidly than the traditional paper base processes. This was bare when the Global transaction services created the Citibanks markets and banking systems in order to integrate capital , Trade and Treasury services and Global Securities Services. Its core objectives was to assist corporate customers to do greater control over financial positions locally and internationally while increasing business efficiencies and reducing costs. Citibank created a global online investment that was procured, and web-based which allowed customers to accession a variety of short-term investments using the award-winning , web based electronic banking platform. An example was the replacement of the CitiDirect Online banking with Treasury vision which created an easier management of short-term investment portfolios by the managers. Creation of culture and values of multid isciplinary teams unrivalled of the strategy formulation techniques of Citibank was the creation of multi-dimensional structure of teams that is totally centeringed on the E-business initiatives and they broke the old bureaucratic culture that existed. Timmers, P. (2009) stated that some other managers were hired from outside the ban and they had the side by side(p) dimensionsFollowing through on commitment through forming collaborative infrastructures and they worked by coordinating themselves so as to fulfil the objectives of the e-commerce goalsShared understanding and knowledge- The multi-dimensional teams work through sharing of knowledge and resources in applying best practises in the execution of e-commerce strategiesCreation of forums as conduct for effectual communicationCitibank Alliance strategiesPrior to 2000, all forms of e-business strategies apply by Citibank had failed because the huge investments in areas of software development, systems development and front end service could not meet up with the dynamic technological changes then. From 2000, the bank then focused on creating strategical alliances with the use of their partners competitive strengths. The bank make partnerships with companies that had strong technologies, systems and infrastructures with good access to the markets .The companies that Citibank partnered with are the study technology leaders such as oracle, Commerce One Inc, SAP AG, Wisdom Technologies and Bolero.Net. the major breakthrough of the partnership was the Citibanks alliance with four IT technological companies to form pecuniary Settlement Matrix.com, which connected buyers and sellers in e-market places with recompense impact, credit and other services through conduct of businesses with banks and other financial service companies Acquisitions of Information engineering and Electronics CompanyAnother strategy which Citibank adopted was the acquisition of some It and electronics company in order to enter a nd breakthrough the existing e-commerce marketplaces (Tawfik Jelassi et al, 2008). Citibank acquired Lava Trading, which was a leader of electronic execution and sell-side management. This was to enhance Citibanks existing infrastructures and platforms and it was able to integrate a robust electronic trading systems in its services complemented with the technologies of the acquisitions (Data monitor report, 2009).-Commitment to engage in never-ending technology developmentThe objective and promise to engage in straight technology development was a good strategy formulation which sustained the Citibanks E-business environment (Data monitor report, 2009). Since the new commitment and success recorded in 2000, Citibank has been active in engaging in the continuous development of the IT and e-business sector so as to gain maximum customer satisfaction and gain market leadership through the optimisation of Information technological systems and structures (Timmers, P. 2009). Citibank of fered an array of integrated investment options through threefold conduct including automatic orders, branch services, and online services.Creation of sound business model and practisesThe creation of good business model and strategies which its operations are based on is the strength of its ability to compete in the e-business environment. The connect which promoted the use of internet as Web-enable its core services to connect with its customers is an indication of the growth of the e-business environment. The other excellent objective by Citibank is transform the bank through the use of the banks integrated capabilities while reaching out to new and emerging markets. prick 2 The appraisal of the Citibank current existing strategies in relation to e-business and development systems and their relevance in meeting the corporate objectives.Based on Michael Porters competitive generic strategy, Citibank adopted a differentiation strategy for its banking service by using the e-busi ness strategies of effective internet banking and relevant banking utilitarianities that give customers full access to their accounts, trading, and management (Data monitor report, 2009). These strategies are in line with its vision and mission to become the leading provider of e-financial services by becoming a trusted, consistent and premier e-business enabler for all its customers globally.Citibank differentiates its e-business product from its competitors through application of e-business strategies and amend their customer services functions (Timmers, P. 2009). Citibank offered internet services, telephone banking, and customer relations managers gave person attention to customers and service experts. Citibank committed to its e-business strategy-Connect, Transform and Extend-was to web enable its core services, develop integrated solutions and reach new markets.The use of consolidated e-business organisational structureOne of the core strategies of Citibanks current succes s in relation to its e-business and information systems in the banking operation and services was the use of consolidated e-business structure that was organize in March, 2000 called the internet operation group that was responsible for the internet activities between e-Citi and all other business units. After this in April, 2000, Citibank established the e-consumer and e-business segments that was initiated and knowing infuse the Internet into all customer and corporate banking services and operations. The following month, May, 2000, Citibank included e-Capital markets and e-Assets Management (Data monitor report, 2009).The e-business units were developing the software required to set up clients with the electronic business accounts while utilising business, resources and Information Technology (IT) pot as well.The lessons learned from previous failures when Citibank indulged in managing all aspects of e-business themselves do them to focus on partnering with strong IT companie s in order to realise their goals.b) Partnerships and alliance with other companiesCitibank formed strategic partnerships with time-honoured information technology and e-solutions provider companies such as Oracle, Commerce One Inc., SAP AG, Wisdom Technologies and Bolero.net in order to ameliorate and consolidate its e-business strategies. These partnerships collapse helped Citibanks e-business to be stronger and very competitive by providing integrated cash management services, fund services, securities services and internet banking services.c) Citibanks implementation of sophisticated and effective e-banking business tools, infrastructures and e-systemsCitibank inaugurated some good e-business systems that enhance its banking operations through the development of solutions to address the three core process areas such as accounts process management, accounts net profitable process management and liquidity management (Data monitor report, 2009). The banks cash management produ cts includes web enable payments, receivable solutions, vender financing, commercial card solutions and liquidity products which claim helped the customers turn off financing costs and achieve better returns on investment capital. The world link payment services payment have been introduced for over 20 years and it has improve payments systems of cash, cross-border Automated Clearing home base (ACH), cheques and electronic pitchs all protected by sophisticated encryption technologies, access restrictions and authentication procedures. This provided to a greater extent(prenominal) self-confidence for the customers in terms of security of the banking proceedings make. Also, QuickRemit service provided a robust framework for global distribution process to transfer money both-in-branch and for web-based (Timmers, P. 2009).The customers payment receiving has been boosted by web-based through automated recurring payment initiation and this provided while the fast telephone bankin g systems enhanced the customers services and allowed payment initiation possible.The introduction of the ripe(p) Information Technology (IT) helped to guarantee security and integrity of data and transactions and Citibank commercial cards granted many web-based management tools that waterwaylined payments, reporting, take place compend and global data acquisition and other vital periodic activities. This make it possible to have access to many banking products and could transact business from all parts of the world (Timmers, P. 2009). The customers benefited immensely from good e-business products, delivery and services and these products were clearly different from the ones other banks offered and this made Citibank to gain more competitive advantages over its other competitors in the domestic and global markets.Citibanks online services is global, secure and web-based system which gave more benefits to the customers also offered an array of integrated investment and this was relevant in other parts of the world such as Asia countries. The online web-based electronic banking platform, CitiDirect Online banking was replaced by Treasury Vision that provided a more superior cash management system for global investment network.d) The development of new servicesCitibank developed new e-technological products to meet the corporate objectives and to fulfil the Citibanks business strategies and to gain competitive advantages in the global financial markets, CitiBank established the Global technology Group whose role includes leading information technology projects and culture into the firm. It is burning(prenominal) to evaluate the e-strategies used in all its banking and corporate services forward motion of Cash Management through e-servicesCitibanks main focus is to assists customers to have effective movement of their money throughout the world while also meeting their expectations and requirements (Ali Farhoomand, 2008). The cash management e- solutions i ncludes web-enabled payments and receivable solutions, vendor financing, commercial card solution. The implementation of WorldLink Payment solutions and liquidity products reduces financing costs and achieve greater returns on assets (ROA). World Link services enable cash payments to be made in more than 135 countries through the cross-border Automated Clearing House (ACH), cheques and electronic funds transfer. The use of new QuikRemit Service offers a more flexible software platform (Ali Farhoomand, 2008).e) Citibank e-strategies involves the use of information technologies to provide more secured online banking services in all its global banking operations which gave the customers more confidence about the web-based services (Ali Farhoomand, 2008). Citibank has an initiative known as security architecture which provides security systems even for next generations of web based solutions.Other projects are the new touch screens automated teller machines (ATM), cash acceptance machi nes as well as quick deposit machines which gives receipts when deposits are made and this reduced queues in the banks (Ali Farhoomand, 2008) and this made the Citibank services better and quicker and has improve the woodland of services Citibank offer.f) Ali Farhoomand (2008) stated that Citibank uses the cross-functional teams in the development and implementation of new services and this involves staff from different sections and department combine to maximise the transfer of information and technical skills. The staffs are encouraged and motivated to join specific task forces around new IT projects that will transform the companys operations to conduce their skills and expertise (Timmers, P. 2009). The end-users are also involved in the early in the development process to ensure proper configurations of equipment. This has improved quality, development time and costs.Strategies of Citibank in Political Environment for its operationsMost of Citibanks operations have been glob alise due to its massive operations in more than cl countries around the world (Citigroup report, 2009). The bank has been able to adjust to various policy-making environments due to its ability to adapt to different policies and banking systems that are set up by those countries (Data monitor, 2008). The continuous investment in new technologies has also made it possible for it to gain competitive advantages over other competitors in the local and international markets. Citibank has been successful in the Middle East in places such as Dubai and other United Arab Emirates countries. Citibank is also highly successful in around countries of Asia, Europe, and USA and in the United nation (Timmers, P. 2009).Strategies for social environmental factors- Implementation of National cultures in many countriesThe formation of many multi-disciplinary and functional teams for differentE-business strategies implementation has caused the implementation of national cultures in many countries o f their operations (Ali Farhoomand, 2008). This made Citibank to implement team working in all departments and groups for the IT strategies in order to gain competitive advantages. This also made Citibank to be able to form local alliances with other banks in order to quickly to the national cultures of such country of operations. The elements of national cultures include adaptability, consistency, team working, cooperation, tolerance etc . in that location is growing emphasis on the Internet in business and consumer applications led to increasing demand for their products to be integrated with more general information technology solutions of Citibank. This has given Citibank more focus and stability and great vision to explore new and emerging marketsFigure 1 The elements of national culture implementationSource http//www.denisonconsulting.com/dc/Portals/0/Docs/Paper_Asia.pdf(Accessed online on 22/06/2010) division 3The analysis of the current situation of Citibank and the assessm ent of their specific strategic options available to the bank to enhance its future e-business structureCitibank is highly committed to continuous improvement in technological developments and it is also customer control so as to fulfil its mission. The use of Information technology improves its banking and trading operations and enhances the work of over 268,000 employees located in over 100 countries and their focus was to embed their services into the everyday lives of the local population (Citigroup report, 2009). Therefore, in addition to enhancing the commitment to its employees and customers globally, Citibank has strong brand recognition and that it why it is driven towards new technologies to gain competitive advantages in existing, new and emerging markets (Data monitor,2008).The analysis of the current situation and the strategic options available to Citibank in order to introduce its global leadership in its e-business services are listed belowConsolidating the formati on of AlliancesThe current alliances practises with major Information and communication technology players especially with reputable firms such as Oracle, Commerce One, Inc., SAP AG, Wisdom Technologies and Bolero.net has helped the company transform its company to an e-business model.This made Citibank form the Financial Settlement Matrix.com which is a company dedicated to connecting buyers and sellers in e-market places with payment services, credit services through multiple and financial services (Citigroup report,2009). This caused growths in other banking operations of the company and made the company to develop greatly and Citibank has used the opportunity to align itself with the partners so as to maintain high competitive advantages in the markets (Timmers, P. 2009).Citibank must consolidate its alliances so as to keep gaining the strategic advantages needed in the marketplaces by engaging in stronger relationships with the Information Technology and communication companies and total customer focus must be the strategic intent of all parties of the alliances. This makes Citibank to work towards balancing the strategic needs of the E-business with the security of the online banking/ e-banking services and to also improve the accessibility of information that is required to leverage the robust e-banking and e-business that is available within the banking group (Citigroup report,2009) . Therefore, it is important for Citibank to improve its business models of value stream, revenue stream and logistics stream through consolidation of the alliances. This will also make Citibank to meet the current and future challenges of the e-business and to improve the native logistics are aligned towards continuous improvement of Information and communication technology (ICT). The previous investments in ICT have led to an increase in revenue and increase in customer base.Customer focused productsThe continuous introduction of new banking products such as smart banki ng cards, telephone banking services, online accounts accessibility and other new products has made the bank to gain competitive and strategic advantages over other banks. The bank is all in all committed to new products introduction and this dissolve be possible through continuous improvements in IT and e-business.Improvement of Citibanks legal frameworkSince, the beginning of 2007, most of the banking corporations had begun using the new legal model framework for assessing the SWIFTNet. . This utilises the use of the strike off model for laying down rule for messages (Ali farhoomand, 2008). Therefore, the introduction of the SCORE model will enable the corporate bank to reduce risks and thitherfore there is need to improve and build this model so as to gain strategic advantages over other banks and other competitors.Therefore risk management and legal compliance were introduced as priorities in year 2008 for all the banks and Citibank modify its banking operations so as to redu ce all the operational risks crossways its banking operations. The banks now introduce and develop integrated information systems for consolidating the existing structures to reduce the risks and to avoid the breach of any data transfer.Transformation of Citibanks e-Business strategyNew improvements in the banking and trading operations are necessary so as to maintain the vision of Citibank. Operations such as Transactions processing such as cash management, trade finances, and derivatives must be keep through the adoption of new strategies which are very important for the corporate customers and other customersImprovement in new competitive infrastructures to develop and sustain new productsCitibank enhances its new product development through Information and communication Technology by investing in millions of dollars for new infrastructures(Ali Farhoomand, 2008) and also for new products development of different ranges and to improve its customer service functions (Tawfik Jelas si et al, 2008) . The use of e-payment by Citibank customers has improved its banking operations and the bank must sustain this by adopting current technologies while engaging in costs reduction services that will reduce all operational costs and maintain high advantageousness within the firm.Better Internal management processesIt is very important for Citibank to introduce and implement better internal management processes in order to bide competitive and sustain global leadership in the area of e-business operations in the banking industry (Ali Farhoomand, 2008). The internal management that must be implemented should include continuous development programme for employees, better and faster internal information sharing through e-mails, use of video conferencing foe meetings across the regions in order to save costs and time (Ali Farhoomand, 2008). There should also be better work-group information flow and communication must be enhanced so as to prevent resistance in the formul ation and implementation of new policies, ideas and new systems that could enhance the growth of the company through e-business applications. This will make the internal management very strong and satisfactory in the use of any latest technologies due to their continuous development and training which would have acquaint them with all new technologiesThe other strategies that could enhance the operations of Citibank current and future strategies include the use of M-commerce (Mobile commerce) and it throw out be apply in following ways-Financial services Mobile banking should be improved and promoted by Citibank and this includes the use of hand held devices to access accounts, monitor accounts and pay bills. Trading and Brokerage services (where stock quotes can be substantially displayed and trading conducted from the same hand held devices). This will create faster banking and trading services and it has improved Citibanks operations-Telecommunications- The use of telephone banking has been successful in the e-business applications of Citibank through the one-touch telephone banking that was introduced. However, new telecommunication systems such as the hand-help fluent phones should be digitalised and be able to connect to the banking telephone customer services in order to get access to accounts and other banking products but however, this should come with good security systemsImprovement of information services- Information delivery to customers should be made through e-mails to save time and costs. It should also be done in prints journals, for old customers who cannot operate computers and promotions about new products should be publicize online and in television also so as to reach a wider audience of customers globally.The implementation of social corporate function (CSR) for CitibankDue to the continuous growth of Citibank especially in the existing, new and corporate markets, it is important that the bank be engaged in corporate social resp onsibility (CSR) as it has always practised in many countries such as assisting in building social infrastructures in many countries such as Malaysia, China, Singapore, India, and United Arab Emirates (UAE), Japan etc.In other areas of corporate social responsibility (CSR), Citibank has a long standing commitment to make the communities where they operate better places to live and work. Citibank has employed good initiatives geared towards improving the lives of members of the communities and countries where they operate. The Citibank s CSR raises the quality of life , families and institutions and thus strengthening the communities. Citibank promotes educations, youth education and social entrepreneurship and employee volunteerism bond paper to political environments in all areas of establishmentsFor Citibank to keep up with its competitiveness, it must stick to to the financial laws and regulations in different political environments. Most developing countries wants the banks to invest in their countries in order to provide employments for their citizens and they also want the banks and other Multinational companies (MNCs) to apply their corporate social responsibility so that their communities can benefits from the investors gainComparison of other financial institutions e-strategiesCase study Barclays Bank PlcBarclays Bank is one of the third largest financial institutions in the United Kingdom and the seventh global bank with high capitalisation, customer base, and good geographical positioning in the world. The implementation of e-business technologies has advanced the bank to become the take five global banks with strategies implementations of web based applications. In 2004, Barclays bank was the first bank in the united Kingdom to launch an online banking system where customers can have access to their accounts, manage the accounts while also paying and receiving money. Since 2004, it has applied continuous improvement and new development in its In formati