Wednesday, December 25, 2019

Equal Rights for Same-Sex Couples Essays - 1973 Words

Imagine being in love with someone, but never having the ability to make the relationship official. For many same-sex couples across the United States of America this is a reality. Even though great strides have been made in the advancement of gay rights, homosexual couples still face opposition from the Federal Government by being denied the right to a marriage. Same-sex marriages should be constitutionalized. While the Federal Government denies gay and lesbian couples the right to marry, there are some state governments which allow same-sex couples the right to domestic partnerships, civil unions, and marriages. â€Å"Comparing marriage to civil unions and domestic partnerships is a bit like comparing diamonds to rhinestones† (Human†¦show more content†¦These states which grant domestic partnerships and the states mentioned above which allow civil unions are in the beginning stages of trying to rectify the Federal Government’s Defense of Marriage Act. Cu rrently six states and one territory issue marriage licenses to gay and lesbian couples. These states are Connecticut, Iowa, Massachusetts, New Hampshire, New York, and Vermont plus the District of Columbia (Human Rights Campaign). Though these states and Washington, D.C. allow gay marriage, these couples still do not have the same rights and benefits as heterosexual couples. There are many financial benefits received from a marriage which make it appealing to same-sex couples. These rights and federal tax benefits are given to married heterosexual couples, but homosexual couples do not receive them. Such benefits include the couple filing for joint tax returns and â€Å"inheriting money or property from his or her spouse without paying tax† (Zajac, Koova, and Rocks 29). Due to the Defense of Marriage Act (DOMA), which states marriage as being a legal coming together of husband and wife (Zajac, Koova, and Rocks 29), marriages for same-sex couples are deemed unconstitutio nal. This means that even though a state may approve and allow a gay couple to be â€Å"married†, the Federal Government prohibits it. Gay and Lesbian couples along with many gay-rights activists strongly oppose the Defense Of Marriage Act. Even the Obama administration,Show MoreRelatedEqual Rights to Marry for Same-Sex Couples2911 Words   |  12 Pagesï » ¿California Proposition 8: Same Sex Marriage The equal right to marry for same-sex couples in the United States has acquired growing public support over time, with a quantity of state-level laws passed and others presently up for debate. Proposition 8 was a ballot proposition and constitutional amendment that was passed in the November 2008 state elections in California. The measure added a new provision, Section 7.5 of the Declaration of Rights, to the California Constitution, which providesRead MoreThe purpose of this policy brief is to recommend to the State of Florida a policy that will1200 Words   |  5 Pageslegalize same-sex marriage and acknowledge same-sex marriages recognized by laws in other states. This policy is necessary because current laws in Florida that restrict marriage to different-sex couples violate the US Constitution’s commitment to equal protection under the law and because the Due Process Clause protects individuals freedoms of personal choices, which includes their choice to marry and have a family. The benefits of this proposal far outweigh the disadvantages, and ensure equal rightsRead MoreSame Sex Marriage Is A Matter Of Civil Law1270 Words   |  6 PagesSame-sex marriage is one of the most controversial issues in the modern world. In the past, marriage was recognized as a social union between a man and a woman and in most cultures, homosexuality was viewed as abnormal and forbidden. However, today, homosexual relationships are fighting their way towards global acceptance as the LGBT community has been extremely active, advocating for their right to marry since the early 90s. With an increased in tolerance for homosexuality in society, controversyRead MoreThe Amendment Of Same Sex Marriage1441 Words   |  6 Pagesallow same sex couples to marry or have a marriage license. The Fourteenth Amendment talks about the right for Due Process. The Fourteenth Amendment protects privacy rights. Obergefell vs Hodges talks about same sex marriage. Some states did not want to give marriage licenses to the same sex and that was part of the issue in Obergefell versus Hodges. In the 1980s, it was hard to be gay or lesbian. It was considered criminal in some states. The Fourteenth Amendment does support the case of same sexRead MoreMarriage Law : The Legal Union Of A Couple As Spouses1642 Words   |  7 PagesMarriage is defined as the legal union of a couple as spouses. The elements of marriage include: (1) the parties legal ability to marry each other, (2) mutual consent of the parties and (3) a marriage contract as required by law. (Legal Information Institute, 2014, n.d.). In the United States, marriage law is regulated by the individual state. Standards such as age, residency, relation, mental capacity, and gender are requirements regulated on a state-by-state basis. Until recent changes, the DefenseRead MoreSame Sex Marriage Should Be Legalized . The Same Sex Marriage1723 Words   |  7 Pages Same sex marriage should be legalized The same sex marriage has been widely debated in many countries for a long time. It is an important issue because it concerns basic moral and human rights. People all over the world come to the United States in search of freedom and equality. Being able to marry anyone, no matter the gender, is a freedom of right, but if that freedom of right is taken away from people than there is no equality. Homosexual peopleRead MoreWhy Same Sex Marriage Is Morally Right And Should Be Legally Recognized1648 Words   |  7 Pagescomplications with marriages in today’s society? How does religion plays a major part in marriage? According to Toby L. Ditz, â€Å"Marriage laws have historically withheld and continue to withhold the right to marry and the legal privileges associated with marriage from whole classes of people: slaves, interracial couples, and gay partners (Ditz, 2001,500)†. The way marriage is viewed in this newer generation differs significantly from the past. People’s observations and opinions on matrimony and its true meaningRead MoreSupreme Court Case Study725 Words   |  3 Pageshad made, with a 5-4 majority, a controversial ruling decreeing that denying equal recognition to same-sex couples was in violation of the Equal Protections Clause of the Fourteenth Amendment. Those on the minority cited concerns of judicial restra int, the connection between marriage and procreation, and whether or not marriage is a Constitutional issue in the first place. Nevertheless, equal recognition for same-sex couples became the law of the land. History James Obergefell and his partner JohnRead MoreSame Sex Marriage Should Be Legal Essay1348 Words   |  6 Pagestoday is that socially and religiously many people feel that same sex marriages are unacceptable and these couples should not be given the same rights as heterosexual couples. Same sex marriage should be legalized because same sex couples should have the same benefits as heterosexual couples, their children can benefit from the benefits of legally married couples, and it will economically and ethically improve the United States. Same sex marriage has been accepted and legalized in many countries aroundRead MoreCreating Capabilities: The Human Development Approach by Martha Nussbaum 1015 Words   |  4 Pagessubjected to be treated equally. We are granted equal rights in order to live as dignified human beings. Although we strive to achieve equality for all, obvious inequality and discrimination still exist around the world. Same-sex marriage still remains to be a problem around the world today and it is one of the many cases of inequalities that needs to be dealt with. Many countries and many states within the United States still have policies prohibiting same sex marriage. Through her novel Creating Capabilities:

Tuesday, December 17, 2019

The Problem Of Electronic Cigarettes - 1717 Words

During my teenage years, I was dared to try a cigarette, not thinking I was going to get addicted. However, I did and before I knew it I became a smoker. At first, it was just recreational, but that changed quickly. I began buying cigarettes and smoking regularly throughout the day. It progressed to smoking a pack per week. I knew it was a terrible habit and I was ashamed of it. The hardest part was hiding it from friends and family hoping they would not find out. I came to the realization that I had to quit. It was not as easy as I had anticipated it to be. A friend of mine named Issack showed me this new thing he was trying called vaping.He was a smoker too but he stopped smoking cigarettes and started vaping.Vaping is the same thing as smoking electronic cigarettes. I believe there are many misconceptions about electronic cigarettes that leads many to believe it bad for you but that s not the case. Electronic cigarettes can help you quite,save money, and even help with your health . There is a new product called electronic cigarettes available that are supposed to help people fight their addiction to cigarettes. It is a battery powered device that heats a nicotine diluted solution into a vapor and then it is inhaled. They are seen as a healthier, and affordable alternative to tobacco cigarettes. It is much safer because it does not have as many harmful chemicals as tobacco cigarettes and it is more affordable for consumers. Unfortunately, electronic cigarettes areShow MoreRelatedElectronic Cigarettes Should Be Legal1444 Words   |  6 PagesElectronic cigarettes are designed to replicate cigarettes without the smoke, tobacco, and tar. Although smokers enjoy the electronic version of a cigarette, many non-smokers are not too fond of being around one. These devices provide nicotine to the user by converting a liquid mixture to an aerosol, usually composed of propylene glycol, vegetable glycerin, flavored chemicals, and a varying amount of nicotine (Grana). Elec tronic cigarettes have caused a major debate among doctors, smokers, andRead MoreElectronic Cigarettes : Research Paper1236 Words   |  5 PagesElectronic cigarettes Guerrier, Ingrid Capstone research paper Mrs.layzell Mrs.Mella 1-10-16 Abstract Electronic cigarettes have been around for about a decade. No one is sure of what havoc they can cause yet because of how new they are in existence. Throughout the past years more and more issues have been arising from this product that was originally assumed to be harmless. Now we are faced with the question are they really as safe as we thought or should increase investigation to see whatRead MoreShould Electronic Cigarettes Be Banned?911 Words   |  4 Pagesof traditional cigarette smoking in the United States, including California, has decreased, the rates of electronic cigarette smoking, known as vaping, has drastically increased. In 2013 2.6 percent of all Americans used electronic cigarettes, including 3.5 percent of all Californians. While the 2015 statistic for California has not been released, nationwide that number has jumped to 10 percent1. Electronic cigarettes are often marketed as a safe alternative to traditional cigarettes that releasesRead MoreEffective Smoking Ce ssation Tool Or A New Way For Children1742 Words   |  7 PagesNeed E-Cigarette Health Policy. Jennifer A. Sibley, RN, BSN University of Florida â€Æ' Effective Smoking Cessation Tool or A New Way for Children to be Introduced to Nicotine? Why We Need E-Cigarette Health Policy. Background and Significance Electronic cigarettes, also known as e-cigarettes, were invented in 2004 by Chinese pharmacist Hon Lik following his father’s death from lung cancer (CASAA, 2012). With the intention of offering a safer alternative to traditional tobacco, e-cigarettes quicklyRead MoreShould Electronic Cigarettes Be Harmful?1676 Words   |  7 PagesDespite various claims via online websites and advertisements, electronic cigarettes are not a safe alternative to regular cigarettes. Often advertised as having no dangerous chemicals, many people would think that they are completely safe because of these misleading ads. However, electronic cigarettes still have toxic chemicals inside of them, and even more that are created when smoking them. The biggest reason cigarettes are addictive is because of a drug called â€Å"nicotine† inside of them. ThisRead MoreEssay about Electronic Cigarette Legalization Analysis982 Words   |  4 PagesSince 2008, Electronic Cigarettes have become widely p opular across the United States, despite the obvious health benefits the long term health effects of â€Å"smoking† electronic cigarettes are still unknown to researchers today. Electronic Cigarettes are the answer to a safer method of consuming nicotine despite its more popular tobacco products. Even though the effects of consuming large amounts of nicotine in a persons’ system is unknown, the unbanning of electronic cigarettes in Los Angeles decreaseRead MoreThe Effects Of E Cigarettes On The Health Organization1503 Words   |  7 Pagesalternatives; the highest in demand being the electronic cigarette or e-cigarette. E-cigarettes are battery-powered devices that create a vapor mist from a heated liquid solution when the user inhales on a mouthpiece (Wagaman). As of their creation in 2006, a growing number of people are taking up â€Å"vaping† instead of smoking, resulting in an industry worth $2.7 billion worldwide (Senthilingam). Although the product is hea lthier than the traditional tobacco cigarette, there are many defects that keep it fromRead MoreShould Electronic Cigarettes Be Regulated?1090 Words   |  5 Pageswork in one’s favor, or one’s choices may work in contrariety of one’s goals altogether. Electronic cigarettes, also called e-cigarettes or e-cigs, are an alternative choice to smoking actual cigarettes. Whether e-cigarettes should be regulated is a controversial topic among the people of the world today. A few people withhold the beliefs that electronic cigarettes should not be regulated as regular cigarettes are. It is possible that they believe that the regulation will lead to the prohibition orRead MoreElectronic Cigarettes: A Safer Alternative? 1074 Words   |  4 Pagesreplacement therapy or more likely to stop smoking than those without. So that brings us to electronic cigarettes a new growing trend which may prove to be an alternative to current replacement therapy products. In the United States electronic cigarettes are being advertised as a safe alternative to tobacco products, even though they are not currently regulated by the FDA. Although, electronic cigarettes have not been proven as a viable alternative to other smoking cessation products, there is evidenceRead MoreShould E-Cigarettes Be Restricted in Public Areas? Essay1598 Words   |  7 PagesShould E-Cigarettes Be Restricted In Public Areas? E-cigarettes have heating elements that are battery operated and hold cartridges of nicotine and other liquids and flavoring. They were produced to assist those who are trying to quit smoking or reduce the amount of nicotine that is actually inhaled in the body to make it a safer product for the consumer than actually smoking a cigarette. There is controversy on whether or not this product promotes a safer nicotine habit or stimulates someone to

Monday, December 9, 2019

Critical Thinking - Reasoning and Problem Solving

Question Discuss about theCritical Thinking, Reasoning and Problem Solving. Answer: Literature Review Remote Desktop Access According to this paper[1], the authorhas described a procedure to access the desktop by using the android mobiles. This procedure depends on the Virtual Network Computing (VNC) method. For this purpose, the desktops or computers are required to install a virtual network computing servers with the help of wireless service. By using wireless platforms, clients may be able to access and execute the performance. The picture of the desktop is compacted before it is transmitted to the android mobiles. There are few capacities given to facilitate the survey on mobile phones. The alternate operation can be utilized instantly to access the periodically used locations. The responsibility of a current key can be seen utilizing the management work. The function of twin view helps the clients to see two locations at the same time. The prototype or model is now installed utilizing Java and inspected on a Java based android mobiles. This application helps to monitor the assessments and helps in ex changing the file in the network management, inside a wireless location. The application of system through the internet is implemented in the next level. The same RFB convention is utilized for the information exchange. The structure of Virtual Networking Computing (VNC) may be required for the system implementation. Because of wide utilization of android gadgets, this framework will be created for tablets and for all the portable gadget. This framework will give the ability to the clients to access their desktops through internet. In this paper [2], the mobile phones are connected as an accessing device of a remote desktop. The performance of the mobile phone depends on the execution of Java programs in past days. The results for that method contains reading and writing of e-mail and web page browsing. According to this paper, the trend has switched to Android applications. In current situation, the mobile acts as a remotely accessing computer. The remote control through the network is provided by the desktop sharing system, which is denoted as Virtual Network Computing. It provides the controlling function with the updated graphical screen from the mouse, keyboard capturing and through device controllers. This system is only based on the Remote Frame Buffer protocol. These protocols are used to share the information between the connected devices. The TCP/IP protocol is used to transmit the information from one port to another in the range of 5900-5906. There are two types of application that are required for VNC system to do proper work. The server application is used for machine which is controlled by the controller and the client. Also it is used for supervising the device. Based on the performance, the client side is known as viewer. The controlled machine is a major response to view the desktop which shares the information and also is used to convert and capture the activities of the user via RFB protocol messages. In another side, the server should break the events which are collected from the client and sends them to the self-system. Server must have the responsibility to update the graphic screen request via sending the desktop view to client connection. Through the mobile phone the user can directly access the desktop and work with that. If the user wants to talk to anyone using the mobile phone, the user should terminate the connection of the network. As per [3], every android mobiles can access the desktops remotely. The keyboard and the mouse are accessed via touching the screen of the mobile, the computer is handled for the support of accessing the remote desktop. The keyboard and mouse is also used to provide the functionality in typing and handling the desktop. When the application part is accessing the desktop, the server must need on PC and it accesses the mobile phone, where the server must be an android device. The server should break the events which is sent by the client and it is injected to the self-system. The major part of the LAN connection in the network is used to connect the devices such as computer and android device. This process is done by entering the IP address and port number that is generated from any side of the server which is a server in the computer or the server in the android device. Due to this reason, it implements the socket primitives and accesses the android device using the "NANOHTTPD" protoco l. The usage of the updated graphical screen from a keyboard and mouse capturing and controlling the device provides the controlling functionality. The above system used the RFB protocol to transmit the information in between the connected devices. There are two types of application that are required for VNC system to do proper work and the server application is used for machine which is controlled by the controller and client. Moreover, it is also used for supervising the device. With the help of a mobile phone, the user can easily access the desktop from anyplace. It is stated in [4], that the user accesses and controls the remote server (remote desktop) by using the RDP (Remote Desktop Protocol) which gives the capacities of desktop control and remote login. Microsoft Corporation enforces the Remote Desktop Protocol from the protocol families of ITU-T T.120. By differentiating the important benefits when compared to the various remote desktop design, the frame-buffer access protocol depends on ideally transferring the GDI (Graphic Device Interface) data from a server, rather than the complete bitmap pictures. This paper suggests a remote collaborating system that is planned and actualized on the structure of RDP. The proposed framework was comprised of a cross control conspire with transport re-encryption design that gave the full capacities for every single remote coordinated effort. For example, remote control, application approach and transferring towards all the RDP users. Therefore, it gives the recording and replaying plans to the packe ts RDP for replaying the greater part of the definite tracks through which a multiparty gathering experienced. The execution displayed and assessment demonstrates the system practicality and it suggests that it has adaptable model for the modern services. According to this paper [5], the best software tool is a Remote Machine Control System. The user can access the desktop through internet by using this application and can play out the managerial tasks like program accessing, checking the required hardware and checking the users. The software is used to connect two different networks from various locations and also interacts with them. In the most recent decade, dispersed frameworks engineers are frequently dependent on the middleware stages to expand their efficiency. Living amongst the working framework and appropriated applications, middleware frameworks gives reflections that avoids application designers with a few information that is built-in for the circulated programming. For example, arrange correspondence primitives, handling of failure, heterogeneity, administration query, synchronization, information marshalling and unmarshalling. Java RMI is considered as the most well-known middleware stages. Critical Thinking on Issues As per [6], the system administer faces many issues on Remote Desktop Protocol (RDP) when establishing the connection between systems. The Remote Desktop Disconnected is an error message that is shown when it does not support the Microsoft Product. This is why the error message will be displayed. This is a reason for disconnecting the remote system and it points implicitly. The causes for problems are listed below. Misunderstanding the settings and terminologies. Unauthorised access from end-user. Conflicts occurring during port assignment. Misconfiguring RDP- TCP Group policy settings during Remote Desktop Service configuration. When trying to connect a remote computer, the above mentioned problems are attempted by a system administrator. It is important to identify the issues and it delivers the solutions which are mentioned in [7]. Misunderstanding of the Settings and Terminologies The Remote Desktop Licensing Server for example aka Terminal service Licencing should be installed on the system. The Remote Desktop Session Host (aka Terminal Server) is also required to be installed for establishing the remote connection. In the first step, the connection is established on both the servers. After that, the systems are connected. When thinking out of the network, the Remote Desktop always supports two connections concurrently. So, it is not necessary to get licence for the connection establishments. Unauthorised Access from End-user The end-user has an appropriate right to access the remote desktop. The user groups should have an authorized permission to use the remote system. The control will be given by the server. For example, the user receives the right by suggesting and by having authorization to sign up the system. These access controls are provided by the server. The local security policy on the server provides the facility to allow the user to login with the authorized account. Port Assignments The port assignment is a major problem on the Remote Desktop access. The issue causes either blocking the port or port assignment conflicts on the server systems. To detect and resolve this problem, it is required to verify whether the default port for RDP (port number=3389) is either blocked or not. It is necessary to ensure that the port assignment is managed by the TermService. Misconfiguration of Settings Another major issue is that the limited number of end-users can access the Remote Desktop Service at a session time. Obviously, the error message "Failure to connect" will be displayed on the end-users system by the Help Desk call. It can be handled by, Enabling the unlimited connection setting Settings of Network Adapter under (RDP-TCP properties) and displaying on the RD session Host server. It is stated in [8] that in the end-user support centre, the help desk is always associated. While establishing the first help desk, there is no need of information to be implemented. Twenty years ago, the first help desk was established and accepted. Before that, it is difficult to contact friends and colleagues with the assistance of the help desk. But now, the critical issues in help desk is analyzed by the managers of savvy technology. The helpdesk came as a telephonic communication. This technology is considered as an efficient technology and it manages multiple type of communication interaction between the people economically. This efficient technology is called as 'service desk'. The communication between the people may be in terms of voice or non-vice such as email and messaging. By using the transition from self-assistance to remote incident resolution, the operation cost can be reduced as half of the original cost. But the performance is increased by service quality which i s provided for communication. Source of the Support The end-user must evaluate the user support strategy is based on the value and cost. According to the company, the support worker and outsourcing with Third Party Company is important. It is critical to do and it is a very challenging process. So, the end-user strategy is used for supporting the outsourcing process. As the survey says, the technical work to support outsourcing of the company is centralized by using help desks. It is applicable for all the Information technologies and business process outsourcing managements. Thus, 40% of the people from managers are working for a company to resolve this problem in IT industries. The solution is provided by the people who work for the in-house services. Hence, according to the survey only 3% people support only work for outsourcing the process. The major challenge is to find and get help desk workers for an automated products and outsources is mentioned in the paper [9]. While analysing the problem of outsourcing in business industry, the business strategy is well grown by providing the customer services and support systems. According to the help desk value, the price for each call is either fixed or bundled. Method of Support The primary decision is based on the source which is provided by the support given to outsource. Often the end-user contacts the helping people through the dedicated help desk. The issue in this method is handled by the application of question proficiency and convenient to the end-user by receiving help from them. Providing inaccurate, obscure and incomplete information from the help desk to the end-user is a major issue. Because, the help desk should support the end-user by contacting them. Thus, it leads to a big deal in the technical support method. The outsourcing support help desk provides the facility to ask the clearing method by contacting the people who need help. According to the survey, most of the people contact the support people through telephone contact. Because, asking clearly is the best solution for the end users. Thus, the phone contact is preferred for interaction between the end-user and the support specialist. It is a great opportunity for the end user to clarify the issue details. Though the telephonic method helps for support process, sometimes it is too difficult to encounter stress and frustration. Because, not all the end-users have knowledge about the issue thoroughly. Therefore, the support specialist needs to improve the confidence of the application and access the resources. References [1] J. chintalapati and S. Rao T.Y.S, "Remote computer access through Android mobiles",IJCSI International Journal of Computer Science Issues, vol. 9, no. 5, 2012. [2] A. Jadhav, V. Oswal, S. Madane, H. Zope and V. Hatmode, "VNC Architecture Based Remote Desktop Access Through Android Mobile Phones",International Journal of Advanced Research in Computer and Communication Engineering, vol. 1, no. 2, pp. 98-99, 2012. [3] K. Bhandari, V. Mandole, A. Munde and S. Takmare, "Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser",International Journal of Computer Science and Information Technology Research, vol. 3, no. 1, pp. pp: (369-373), 2015. [4] C. Tsai and W. Huang, "Design and Performance Modeling of an Efficient Remote Collaboration System",International Journal of Grid Distribution Computing, vol. 8, no. 4, 2015. [5] R. Kumar and A. Anil, "Development of Remote Access Network Communication (RANC)",International Journal of Computer Applications (0975 8887, vol. 27, no. 8, 2011.ed: 26- Jan- 2017]. [6] K. andeep Bhandari, V. Baliram Mandole, A. Dattatray Munde and S. Takmare, "Secured architecture for remote virtual desktops - IEEE Xplore Document",Ieeexplore.ieee.org, 2015. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/4621741/. [Accessed: 28- Jan- 2017]. [7] . Darabont, K. Kiss and J. Domokos, "Performance Analysis of Remote Desktop Virtualization based on Hyper-V versus Remote Desktop Services",MACRo 2015, vol. 1, no. 1, 2015. [8] S. Kapoor, A. Verma and A. Lala, "To Access Remote Desktop using Windows Azure Cloud Computing",IJARCCE, pp. 98-100, 2015. [9] H. Ohta, Y. Sato, T. Sagawa, T. Fujita and S. Katsuki, "Sa1204 An Introduction to Remote Internet Access for Capsule Endoscopy: Using the Cloud to Diagnose Images and a Remote Desktop Control to Check the Real-Time Viewer",Gastroenterology, vol. 142, no. 5, pp. S-242-S-243, 2012.

Monday, December 2, 2019

The smoothie industry Essay Example

The smoothie industry Paper The smoothie industry has and is still experiencing exponential growth. This case analysis will delve into the industry by observing its external and internal environment. Utilizing Griffins Model as a guideline; eco-environment, economic, technological, political/legal, social/cultural, international dimensions and its task environment will be closely analyzed. A. External Environment: I. Eco-Environment: Since the smoothie industry relies heavily on fresh fruit and juices for its ingredients, the eco-environment definitely has an important role. The climate can either limit or help the industry thrive depending on the fruit(s). Fruits such as oranges thrive during summer season and strawberries flourish in the winter season. The seasons not only affect the ingredients that go into the smoothies but also affect the amount of people drinking the smoothies. According to Bill Winter, One of the risks in juice bars is seasonalityjuice bar sales plateau when the weather cools (Business Review Weekly, Australia 2001). We will write a custom essay sample on The smoothie industry specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on The smoothie industry specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on The smoothie industry specifically for you FOR ONLY $16.38 $13.9/page Hire Writer II. General Environment: A. Economic Dimension: The market for smoothies has grown by more than 30 per cent each year since the mid-1990s (Ehlrich). Juice Smoothie Association (JASA) predicted back in 2001 juice bar sales would surpass $1 billion. Dan Titus, director of Juice Gallery Multimedia and JASA, also adds, We have been following the juice/smoothie segment for several years now and predict that 2002 will continue to exhibit positive growth and revenue picture (Business Wire, 2001). B. Technological Dimension: Astute Solutions , a leading provider of eCRM solutions, created the software program Power Center(tm) for management use in multi-channel customer contacts. PowerCenter is a powerful consumer response and tracking system that integrates multiple channels of communication and multiple customer databases (Business Wire, 2002). Incentive Systems is another technology that provides spreadsheet system. Nina McIntyre, vice president of worldwide marketing at Incentive Systems, says Potentially its data stream from point-of-sales systems, from cash registers systems, wherever [users] capture the transactions that are being measured. We can integrate with those software packages, the data flow into our incentive management system, and then we calculate the incentive payments (Managing Customer Service, 2001). Technological research studies have indicated that isoflavones (found in soy) may actually prevent the growth of estrogen-dependent breast cancer cells as r eported in March 2000 issue of the Journal Cancer Research (The Desert News). C. Political/Legal Dimension: Smoothie industry must follow regulations. Food and Drug Administrations (FDA) regulation is that foods must have to have at least 6.25 grams of soy protein per serving and must also meet other criteria in being low in fat, cholesterol, and sodium (The Desert News). Regulations enforced by OSHA also have salient stimuli to the industry. Federal and State regulations are also salient, regulations such as Equal Employment Opportunity Commission, Time Off to Vote, Federal Family and Medical Leave Act and California Labor Code. D. Social/Cultural Dimension: Smoothies have become an alternative in Americans health conscience. In recent past years, they have been conscientious about their fat-in-take. Smoothies provide a healthy indulgence packed with fruity flavors and nutrients that comply with societys taste and health conscience. Good health is the principle factor behind smoothie producers growing interest in soy bases for their products (Dairy Field). According to Liz Zamites, marketing manager of brand development for cold beverages, Baskin-Robbins USA, Glendale, Calif., The experience of watching a smoothie being made reinforces the perception that you are using quality ingredients, that its not full of preservatives and that there are actually fresh fruit in there. E. International Dimension: In Great Britain, diluted products masquerading as smoothies are capitalizing on the lack of product definition (PR Newswire, 2001). This is because British Soft Drinks Association does not recognize smoothies as its own category. Manufacturers are labeling drinking products smoothie just because they have fruit in them. III. Task Environment: A. Competitors: The smoothie industrys main competitors are; Fantasia Fruit Juice Company- its juices have herbal and vitamin supplements such as vitamin C and St. Johns wort (thought to have calming effect), reported to have been said by Barnhorn, their mission is to nourish the Midwest community we grew up in. Planet Smoothie-127 locations in 21 states and plans to open 30 more locations in the New Orleans area, Smoothie King- operates in vitamins and nutritional supplements retail, has 276 locations and was founded more than 30 years ago, annual sales of $60 million (Ronette King). ZiA Juice Co.- lower-cost alternative to Jamba Juice(Nations Restaurant News), ZiA has taken pride in providing Customerization and LifeSTYLING for its customers, ZiAs menu consist of signature fruit smoothies with supplements such as Siberian ginseng and soy protein, along with frozen coffee-blended beverages and freshly made fruit and vegetable juices (Nations Restaurant News). VIP Smoothies- although a newly developed company, has already developed a plan of attack on selected markets with product national initial distribution with FSI coupons and billboard and radio advertising (Frozen Food Age). Other notable competitors are Juice it Up and Juice Stop, they too have a share in dominating the market (Business Review Weekly- Australia). Freshens Smoothie Company- it is an Atlanta based company and has 500 stores in operation, which is becoming the nations fastest growing smoothie chain. Freshens has collaborated with MET-Rx and developed a full line of nutritional boost-ers especially designed for Freshens (Dairy Field). B. Customers: Dairy Field reports, Bucking the trend toward fatty on-the-go refreshments, todays consumers are reportedly slurping down smoothies with increasing frequency. A typical smoothie drinker has been narrowed down to ages between 18 to 34 with a higher household income, and is more likely to be female (Zamites). A survey conducted by AC Nielsen showed that, The intent to purchase was over 70 percent Among households with children under 18, it was over 80 per cent. What they found astounding from this survey was that almost half of those surveyed were not regular smoothie drinkers. The other half of the percentage drinks at least one smoothie a week. C. Suppliers: Whole Foods- has been identified as being the worlds largest retailer of natural and organic foods. According to Angi McMurray they feature foods free of artificial flavors, colors, sweeteners, and synthetic preservatives, and unbleached grains and grain products. Southwest Traders- a firm based in Temecula provides and delivers fresh fruits and vegetables such as oranges, lemons, carrots, celery, etc. It also supplies napkins and cups. Southwest is one of the nations largest suppliers to ice cream and yogurt shops and juice bars as reported in The Business Press/California. D. Regulators: Food and Drug Administration (FDA)- regulates the labeling of foods. As reported in The Desert News, in year 2000, the FDA allowed the soybean industry to say that 25 grams of soy protein eaten daily, in conjunction with a diet low in saturated fat and cholesterol, may reduce the risk of heart disease. This salient because since then soy protein has been in high demand and the smoothie industry quickly capitalized on this. For the average diet of 2000 calories a day, the World Health Organization, USDA and other leading authorities recommend that 55-60% of calories come from carbs, 10-20% from proteins, and 20-30% from fats. Plus, studies show that diets low in sodium, containing a good source of potassium, may reduce the risk of stroke and high blood pressure!(www.jambajuice.com) Occupational Safety Health Administration- oversees the well-being of employees and customers. Strict regulations are enforced constantly by OSHA inspectors. They make often visits to store sites unexpectedly. E. Strategic Allies: One known strategic ally is Amazon Advertising. Jamba Juice has teamed up with Amazon Advertising to handle branding and some advertising (ADWEEK). Lynda Pearson, creative director at Amazon in San Francisco said that Jamba is an ideal client because it offers people on the go on an appealing alternative to burgers and french fries. F. Labor Market: In an interview with Rodney Moore, district manager of Orange/San Diego 1, the labor market consist of ages 16 to 22 year olds. Jamba Juice takes pride on hiring employees that exemplifies the companys core values and attitude. G. Labor Unions: This is not a factor in this case because Jamba Juice employees are not unionized. H. External Owners: After an interview with Rodney Moore, Jamba Juice does have external owners but their identities are classified since it is still a privately owned company. B. Internal Environment: I. Owners: Given that Jamba Juice is a privately owned company; its internal owners identities are unidentifiable. II. Board of Directors: Only two of the five members of the board were identified. They are Kirk Perron and Paul Clayton. Kirk J. Perron Founder A visionary from the start, Kirks passion for health and fitness led to the creation of Juice Club. At the age of 27, he opened the first Juice Club store in San Luis Obispo in the spring of 1990. Since then, Kirk has contributed greatly to the organization by fulfilling various roles from Store Operator to CEO to Chairman of the Board. As the Founder, he is actively involved in company affairs ranging from store design to brand development, and currently chairs the Jamba Wellness Advisory Board. His passion and commitment to providing the best possible experience for all customers remains the standard to which Jamba Juice aspires every day (www.jambajuice.com). Paul E. Clayton, Jr. President and Chief Executive Officer Paul joined Jamba in February 2000. Prior to joining Jamba, Paul spent 16 years with the Burger King Corporation where he held a variety of marketing and general management positions. In 1994, Paul was appointed Senior Vice President, Worldwide Marketing and in 1997 he was appointed President, Burger King North America. He was responsible for operations, new store development, marketing and franchise relations for more than 8,000 restaurants in North America. Paul started his career as a Restaurant Manager for McDonalds in Bonn, Germany. He received his B.S.B.A from Boston University in 1980 and his MBA from the University of North Carolina at Chapel Hill in 1984. III. Employees: Employees from day one, go through an orientation of the company and the store, trained to be highly skilled in preparing smoothies and to be knowledgeable of ingredients and products, procedures and policies. Current 25 employees range from ages 16 to 26. Majority of the employees live within proximity of 5 miles to the store. The workforce is well diversified, employees having Asian/Pacific Islander background, African-American descent, and European ancestry. Employees from day one, go through an orientation of the company and the store, trained to be highly skilled in preparing smoothies and to be knowledgeable of ingredients and products, procedures and policies. The stores general manager is Carrie Gentry age 21. She has been with the company for 2 years and was transferred from Thousand Oaks. She now resides in Santee. Our newly acquired assistant general manager is Gary Smith age 25. He is new to the company.