Sunday, January 19, 2020
Computer Laboratory Monitoring System Essay
Introduction Monitoring is the systematic collection and analysis of information as a project progress. It is aimed at improving the efficiency and effectiveness of a project or organization. It is based on targets set and activities planned during the planning phases of work. It helps to keep the works on track and can let management know when things are going wrong. If done properly, it is an invaluable tool for good management, and it provides a useful base of evaluation. It enables in determining whether the available resources are sufficient and are being well used, whether the capacity is sufficient and appropriate and whether doing the planned to do. Under monitoring we look at the process on organization could go through to design a monitoring system (Shapiro, 2008). Monitoring system is now in need by businesses and other industry. The system is introduces because of the arising problems and needs of different industries when it comes to maintenance of their facilities or equipments. With the use of such monitoring system, as explained by CMC industrial Electronics, operational efficiency is ensured. A lot of time delaying errors such as mechanical, human or Symantec errors will be avoided. Efficiency is also the key in allowing the company to evolve and develop. As the saying, being too careful will provide quality service that everyone would want, but it would take up a lot of time. By having a monitoring system to follow, the company is able to save time and provide maximum assistance and satisfaction to all the employees and clients. In education, the computer laboratory is usually monitored, Due to the high number of computers in a lab; technicians are having difficulties in monitoring computers. Institutions implement proper maintenance of computer laboratories with the help of a monitoring system. Iowa State University is an example. There are many computer labs on campus, including both public labs and college department labs. Public labs are accessible to everyone at the university, funded by the student computer fee paid by all students and managed by the Computation Advisory Committee (CAC). Iowa State Universityà uses monitoring system wherein problem experienced with hardware or software in a computer laboratory can be reported online. Computer laboratory monitoring system helps the instructors and the laboratory administrators to check and monitor all the hardware and software components of each computer inside a certain laboratory. Most of the computer laboratories are usually monitored in a manual way, they uses a logbook to list all their findings in a certain laboratory then an in charge person will confirm all the findings and make a solutions for the problems (Adamson, 2010). A computer laboratory, also known as a computer suite or computer cluster (a term also used for server clusters) is typically a room which contains many networked computers for public use. Computer labs can be found in libraries, schools, government buildings, science labs, community centers, companies with IT departments that requires such a place for their employees to do their jobs, and research centers. They are distinct from Internet cafes in that the usage of the computer lab is typically free for those with access. Printers, scanners, and other peripherals may augment the lab setup. Inside a computer laboratory room, students are able to apply the things they have learned during their lecture classes. A learning procedure called ââ¬Å"Hands-onâ⬠is needed so that students can apply all the things that theyââ¬â¢ve learned during their lecture. This computer hands-on can open the mind of the students to help them to face the civilization in real world, itââ¬â¢s like an office training where in the instructors are the bosses and the students are the employees, these employees must accomplish a certain task given by their boss. This will serve as their preparation before they are going to the real field in work (Otis, 2010). Nowadays, it is very visible that gadgets are everywhere. People use these gadgets in their daily life. Old man or young man, poor or rich people have their own gadgets specifically a cell phone. Most of the people depend on their phone not only in communicating but in other way just like the applications installed on it. Some of these cell phone applications are usedà by the students, and some of these applications are made for school stuffs for their work. School stuff such as class instructors is using an application to do his work easier. According to Bucki (2010), a mobile device is a generic term used to refer to a variety of devices that allow people to access data and information from where ever they are. This includes cell phones and portable devices.According to an article in the website of ITBusinessEdge, an IT Business Edge Site, a mobile phone is a device that can make and receive telephone calls over a radio link whilst moving around a wide geographic area. It does so by connecting to a cellular network provided by a mobile phone operator, allowing access to the public telephone network. By contrast, a cordless telephone is used only within the short range of a single, private base station. In addition to telephony, modern mobile phones also support a wide variety of other services such as text messaging, MMS, email, Internet access, short-range wireless communications (infrared, Bluetooth), business applications, gaming and photography. Mobile phones that offer these and more general computing capabilities are referred to as smartphones. In this study, the reseachers are going to develop and design a Colegio de Dagupan Computer Laboratory Monitoring System using Mobile Technology to improve the existing process in monitoring and recording the status of each computer laboratory. Colegio de Dagupan, formerly Computronix College, was first established as a computer-electronics training center offering short term courses in computer programming and repairs. The institution provides different colleges and one of those is the College of Information and Computing Studies. The CHED also awarded the college as one of the Center of Development in Information Technology last 2007. Since the institution offers computer related courses, it provides computer laboratories for the students. Colegio de Dagupan uses the manual way of recording the result in monitoring their computer laboratories. The instructor uses a computer laboratory report form in reporting computer laboratory problem then submits the form to the technician to repair what has been reported however if the technicianà canââ¬â¢t solve the problem he will consult the administrator to find solutions and fix the problem accordingly. The technician will submit the report forms to be noted by the administrator then record the data at the logbook. Using their manual process, problems are encountered such as time consuming in requesting computer resource problems, delayed action in fixing computer problems, time-consuming, inefficient and unreliability in preparing technicians report. CdD-CLMS using Mobile Technology is necessary in Colegio de Dagupan in order to have a centralized repository for the problem reports about hardware and software defects and other problems they encounter. It will enable them to monitor the most problems occur, about hardware defects and other peripheral devices inside the computer laboratories and the causes. Assuming that all computer laboratory IT instructors are using android phones for reporting purposes The mobile serves as the main device for creating a report regarding computer laboratory problems and assuming that the router used by the school has a large network coverage. The router serves as a bridge to provide a connection between the Android phone and the server. Conceptual framework In order to organize the way on how and why a project takes place and to understand its activities, prior research will be conducted. The developer has developed a conceptual framework that will be use to map and assess the research findings. The framework shown in Figure 1 identifies the inputs, activities or processes, the output and it shows the expected relationship among these components. The diagram of the framework summarizes how the study resumed to work. The input contains the existing manual process of Colegio de Dagupan in terms of monitoring computer laboratories, the hardware and software requirements in the development of the system and the functional requirements from the stakeholders. The process includes the methodology used which is the RAD Methodology. By the use of this method, the proposed project will yield a faster, reliable and high-quality system that will meet the needs of the clients and users.
Friday, January 10, 2020
Fish Cheeks by Amy Tan Rhetorical Strategies Essay
Gifted author of Fish Cheeks, Amy Tan, assures young girls that being different is not only acceptable, but also advantageous. Rhetorical strategies-such as imagery, tone, diction, and appeals (logos, ethos, pathos)-were the brushes with which she painted a portrait of self-acceptance for teenage girls everywhere. Tan uses a sympathetic tone to relate to the awkward teenage reader that is experiencing the same thing and the nostalgic adult reader that has experienced. Tanââ¬â¢s word choice [diction] exposes her insecurity in her heritage and desire to be an average American teenager, in her opening. The author described traditional American food in an appealing way, ââ¬Å"â⬠¦roasted turkey and sweet potatoesâ⬠¦Ã¢â¬ but omitted any detail about ââ¬Å"â⬠¦Chinese food.â⬠She labeled American manners as ââ¬Å"properâ⬠, but dubbed her relatives and their Chinese customs as ââ¬Å"noisyâ⬠. The significance of this strategy lies in its ability to make the text relatable. The entire narrative relies on the authorââ¬â¢s shared experience with the audience, being ashamed of their incongruity and their pursuit of normality. In the third paragraph, Tan enlists the aid of imagery to provide the reader with a more accurate depiction of the scenery on that night. Vividly detailing the assortment of food; Tan was not describing how she saw the food but how she feared Robert would. As revealed later in the text, Tan is quite fond of her cultureââ¬â¢s taboo cuisine. So, the description of the food using negatively connoted words like slimy, bulging, fleshy, rubbery, and fungus were used to transmit her concern about how she and her family would be perceived. This use of imagery and diction exemplifies Tanââ¬â¢s transmission of emotion-first worry and anxiety, then relief and acceptance- to her audience throughout the text. The appeals to ethos and pathos were vital for Tan to be able to relate to the audience. She had to first establish her credibility as someone who had experienced being a part of two different cultures and the desire to fit in. She did this by telling the narrative in first person. Also she showed great contrast between the two cultures she belonged to by illustrating her familyââ¬â¢s traditional Chinese Christmas contrary to American traditions. Then, she appealed to pathos by frequently attaching an emotion to every part of the story. For example, in the opening she conveyed a sense of worry with her use of repetitive questions. Likewise, Tan suggested a feeling of relief in the end with her shift in diction, from negative words like ââ¬Å"despairâ⬠to more positive words like ââ¬Å"stunnedâ⬠.
Thursday, January 2, 2020
High School Students Should Be Allowed For Wearing Red...
1.) Should high school students be allowed to wear red ribbons, a symbol for aids awareness, on school property? The first amendment rights are available to teachers and students. Students and teachers do not shed their constitutional rights of freedom of speech or expression at the schoolhouse gate. Tinker v. Des Moines, 89 S.Ct. 733 (1969). Therefore, high school students should be allowed to wear red ribbons in support of aids awareness on school property; so long as such silent, passive expression of opinion do not materially and substantially disrupt the work and discipline of the school, or offends the rights of other students. Moreover, schools should not prohibit students from exercising their First Amendment rights because of the school fear or apprehension of disruption that may occur from such expressions. Freedom of expression would not truly exist if the right could be exercised only in an area that a benevolent government has provided as a safe haven for crackpots. Id. Attending high schools should be more than just exposing students to a structured curriculum. High school should also be a place where students are allowed to think outside of the box. Schools should inspire creativity, sparks curiosity, and fuels ambition. Wearing red ribbons in support of aids awareness could be viewed as a creative silent, passive expression, which could spark curiosity and fuel ambition among the students. Many great humanitarian movements were started by aShow MoreRelated1000 Word Essay85965 Words à |à 344 PagesArmy Emergency Relief ............................ 37 Army Sexual Assault Prevention and Response Program ........... 40 EO - Equal Opportunity ................................ 44 AFAP - Army Family Action Plan .......................... 48 ARC - Army Red Cross ................................. 50 Army Reenlistment / Retention Program ...................... 51 Army Safety Program .................................. 53 Army Sponsorship Program .............................. 55 QOLP - Army Quality of LifeRead MoreBrand Building Blocks96400 Words à |à 386 Pageseffective packaging or marketing. Given these characteristics, they enjoyed only temporary sales spurts during recessionary times. No more. While still offering so-called price brands, retailers are also increasingly offering private label brands at the high end of the business. Such brands are competitive with national brands in quality and marketing support but have substantial cost advantages - in part because the cost of the brand management team, sales force, and advertising is lower and can be spreadRead MoreAdidas Marketing Plan20779 Words à |à 84 PagesFinalâ⬠©Assignmentâ⬠© â⬠© Nathanâ⬠©Couryâ⬠© Christienâ⬠©Crynesâ⬠© Erinâ⬠©Doddsâ⬠© Priyaâ⬠©Nathanâ⬠© Jackieâ⬠©Smith â⬠© Aprilâ⬠©30,â⬠©2010â⬠© Executiveâ⬠©Summaryâ⬠© â⬠© Adidasâ⬠©hasâ⬠©beenâ⬠©aroundâ⬠©sinceâ⬠©1924â⬠©andâ⬠©hasâ⬠©grownâ⬠©toâ⬠©beâ⬠©oneâ⬠©ofâ⬠©theâ⬠©topâ⬠©companiesâ⬠©inâ⬠© providingâ⬠©aâ⬠©varietyâ⬠©ofâ⬠©highâ⬠©qualityâ⬠©productsâ⬠©toâ⬠©consumersâ⬠©interestedâ⬠©inâ⬠©sports.â⬠©Itâ⬠©isâ⬠© currentlyâ⬠©theâ⬠©numberâ⬠©twoâ⬠©brandâ⬠©inâ⬠©theâ⬠©sportingâ⬠©goodsâ⬠©industry,â⬠©trailingâ⬠©itsâ⬠©mainâ⬠© competitorâ⬠©Nike.â⬠©Adidasâ⬠©hasâ⬠©aâ⬠©strongâ⬠©focusâ⬠©onâ⬠©bothâ⬠©performanceâ⬠©andâ⬠©style,â⬠©asâ⬠©opposedâ⬠©toâ⬠© Nikeââ¬â¢sâ⬠©moreâ⬠©pureâ⬠©performanceâ⬠©emphasisRead MoreAdidas Marketing Plan20768 Words à |à 84 Pagesâ⬠©Ã¢â¬ ©Ã¢â¬ ©Ã¢â¬ ©Ã¢â¬ ©Ã¢â¬ © â⬠© Finalâ⬠©Assignmentâ⬠© â⬠© Nathanâ⬠©Couryâ⬠© Christienâ⬠©Crynesâ⬠© Erinâ⬠©Doddsâ⬠© Priyaâ⬠©Nathanâ⬠© Jackieâ⬠©Smith â⬠© Aprilâ⬠©30,â⬠©2010â⬠© Executiveâ⬠©Summaryâ⬠© â⬠© Adidasâ⬠©hasâ⬠©beenâ⬠©aroundâ⬠©sinceâ⬠©1924â⬠©andâ⬠©hasâ⬠©grownâ⬠©toâ⬠©beâ⬠©oneâ⬠©ofâ⬠©theâ⬠©topâ⬠©companiesâ⬠©inâ⬠© providingâ⬠©aâ⬠©varietyâ⬠©ofâ⬠©highâ⬠©qualityâ⬠©productsâ⬠©toâ⬠©consumersâ⬠©interestedâ⬠©inâ⬠©sports.â⬠©Itâ⬠©isâ⬠© currentlyâ⬠©theâ⬠©numberâ⬠©twoâ⬠©brandâ⬠©inâ⬠©theâ⬠©sportingâ⬠©goodsâ⬠©industry,â⬠©trailingâ⬠©itsâ⬠©mainâ⬠© competitorâ⬠©Nike.â⬠©Adidasâ⬠©hasâ⬠©aâ⬠©strongâ⬠©focusâ⬠©onâ⬠©bothâ⬠©performanceâ⬠©andâ⬠©style,â⬠©asâ⬠©opposedâ⬠©toâ⬠© Nikeââ¬â¢sâ⬠©moreâ⬠©pureâ⬠©performanceâ⬠©emphasisRead MoreMarketing Communications Notes17720 Words à |à 71 PagesWe address the moral and ethical issues faced by marketers and look at the steps taken by governments and industry associations to regulate marketing practices. We finish the unit with a discussion of social responsibility and how and why marketers should engage in positive and socially responsible marketing activities. In this unit, you need to refe r to: 1 2 3 Chapters 1, 13 and 14 in your Clow and Baack textbook; this study unit, Unit 1; and Readings 1.1ââ¬â1.4: â⬠¢ ââ¬ËMarketing ethics and behavioural predispositionsRead MoreAccounting Information System Chapter 1137115 Words à |à 549 Pagesb. Your company will need to exchange information with various external parties. Identify the external parties, and specify the information received from and sent to each of them. The author turns this question into an in-class group activity. Students are divided up in groups, told to close their books, and given 15 minutes to: a. Think through the business processes, key decisions, and information needs issues in their group. b. Identify the external users of information and specify the informationRead MoreLogical Reasoning189930 Words à |à 760 Pagesnot in any way that suggests that the book Logical Reasoning or its author endorse you or your use of the work). (2) Noncommercial You may not use this work for commercial purposes (for example, by inserting passages into a book that is sold to students). (3) No Derivative Works You may not alter, transform, or build upon this work. An earlier version of the book was published by Wadsworth Publishing Company, Belmont, California USA in 1993 with ISBN number 0-534-17688-7. When Wadsworth decidedRead MoreFundamentals of Hrm263904 Words à |à 1056 PagesThis online teaching and learning environment integrates the entire digital textbook with the most effective instructor and student resources With WileyPLUS: Students achieve concept mastery in a rich, structured environment thatââ¬â¢s available 24/7 Instructors personalize and manage their course more effectively with assessment, assignments, grade tracking, and more manage time better study smarter save money From multiple study paths, to self-assessment, to a wealth of interactive visualRead MoreMarketing Mistakes and Successes175322 Words à |à 702 Pageswritten permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc. 222 Rosewood Drive, Danvers, MA 01923, website www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201)748-6011, fax (201)748-6008, website http://www.wiley.com/go/permissions. To order books or for customer service please, call 1-800-CALLRead MoreProject Managment Case Studies214937 Words à |à 860 Pagesauthorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, e-mail: permcoordinator@wiley.com. Limit of LiabilityDisclaimer of Warranty: While the publisher and author
Wednesday, December 25, 2019
Secret Shortcuts to Essay Basics Topics That Only Very Few People Know About
Secret Shortcuts to Essay Basics Topics That Only Very Few People Know About The Benefits of Essay Basics Topics The very first thing you ought to do is identify the form of compare and contrast essay which you're handling. There are respective patterns that writers can use whenever writing an argumentative essay even though there is not any particular model of organization. You should present your topic, obviously, and also your thesis statement that has the function of indicating to your readers what is the probable path of the whole work. So now you are aware of how to pick the best compare and contrast topics and the various segments you require to address when writing. In terms of the organization of the last essay, it's advisable to use a 5-paragraph structure. Following are several types of essay topics for students that are categorized in many sections so you can easily chose the topic in accordance with your need and requirement. Remember that the thesis plays the central portion of your essay where it's a point or argument you're making. You are able to restate your thesis statement and point out a number of the arguments used over the whole essay that backs it up. A thesis is your primary argument wrapped up into a couple of sentences, usually close to the conclusion of your intro paragraph. The student must create a thorough conclusion which should support the degree of students' writing skills. Since you may see, the topics are split between multiple categories so it would be simpler that you select one. You can also select an emotional topic. Quite frequently, the ideal topic is one which you truly care about, but you also will need to get ready to research it. In most instances, the topics you pick should be closely related. The 5-Minute Rule for Essay Basics Topics In organizing, the fundamental sections of an essay should act as the heading. Categories, essay topics could possibly be divided into. Finding the most suitable topic for the essay may be a challenging undertaking for the student who must compose an essay. The aim of your essay is defined by the sort of paper you're writing. The last paragraph of the essay stipulates the conclusion. Now that you're aware that we are the very best online essay writing service to work with, don't hesitate to pay a visit to our site and order an essay. Well, if you think the above mentioned discussion, you know where to have essay writing help. You need to pick words that will make sure that the reader may wish to keep on reading that essay. A whole lot of college English handbooks provide essay prompts to help students see what sorts of topics can get the job done well for the assignment. You see it is an unusual topic which may be quite challenging to imagine or explain, but some students might just turn that topic into a masterpiece. Naturally, it's so much better when a student is supplied a freedom to pick the subject of their essay. When students are writing their argumentative essays which need to find, read and analyze plenty of material to do good. In a lot of the circumstances, you ought to look for items to compare that have some differences but similarities too. It is crucial to find out more about the topic so that it would be grounded on facts and not simply simply full of personal suggestions and opinions. Always start with something that you are conversant with when deciding upon a very good topic. Selecting a topic is an essential issue that partly estimates final success of the job. Remember which you can make funny argumentative essays if you do a few things. Tell us a topic which you have changed your head on in the last three decades. One of the greatest approaches to convince anybody's mind is via an emotional connection. Pick a distinctive topic that others may not think of, and whatever you select, make certain you know a lot about it!
Tuesday, December 17, 2019
The War Of Osama Bin Laden - 844 Words
It has now been fourteen years since the tragic event of Sep 11 in New York, when hijackers struck two planes into the northern and southern building of the twin towers. Unfortunately two thousand and nine hundred and ninety six people lost their lives that day including over five hundred Muslims. Few days later it was concluded that alqeda terrorists in Afghanistan under the leadership of Osama bin laden were responsible for the deadly attack. Less than a month after the attack the U.S invaded Afghanistan in order to capture those who were responsible and a short time after Iraq was also invaded for the same purpose. For the next decade the U.S spent an annual of one trillion dollars towards the fight on terror. Fourteen years later it isâ⬠¦show more contentâ⬠¦The Council on American Islamic Relations (CAIR) which is the largest leading organization for Muslim civil rights in the United States since 1995 conducted a report on Islamophobia and its impact on the west. They rep orted that there are approximately thirty seven inner core groups whose primary purpose is to promote prejudice against or hatred of Islam and Muslims and that there are approximately thirty two outer groups whose primary purpose does not appear to include promoting prejudice against or hatred of Islam and Muslims but whose work regularly demonstrates or supports Islamophobic themes. (Legislating fear. Islamophobia and its impact in the United States 2013. Print.) According to the same report the thirty seven inner core groups benefited from a total of approximately $119,662,719 in donations and endorsements from 2008-2011 towards their effort in propagating Islamophobic rhetoric and ideologies. Many founders of these organizations all seem to make the same claim which most recent republican
Monday, December 9, 2019
The Real Price of a College Education Essay Example For Students
The Real Price of a College Education Essay So where do you plan to go to college? What college do you go to? Where did you get your degree?I am sure you have heard these questions quite a few times in your lifetime already. You have probably heard these questions from people you do not even know. For these questions to come up so often and by so many people, they must obviously relate to something rather important, a college education. Just how important to you is a college degree? I believe it should be everyones priority to do everything they can to obtain one. Have you ever been turned down by a job, denied a promotion, or simply wondered why someone you know is making more money than you, when you know you might be better at that job? Did you ever take the time to think this might be because you do not have a college degree?As you can see todays standards for education have been raised much higher than in previous years. Years ago there were no requirements for an education. Through the years there became a demand for a high school education, now a high school education and fifty cents will get you a candy bar. In todays society a college education is needed and in most cases required. Even a full four-year college degree is becoming the bare minimum as we enter the new century. In most cases today people are choosing to continue their education beyond their four-year degree. Most people are now looking towards obtaining their masters degree in their field of study. This is showing us the competition we are facing in the working world and just how important that college diploma is. Many people will argue the fact that college costs a great deal of money, so why should they spend money when they can be earning money. My answer to that is, you have to look at the overall view and look at where you would like to be in ten years from now. I agree that college does cost a great amount of money, a state funded college such as Bloomsburg or Penn State costs about nine-thousand dollars a year for residents including room and board. A private college education such as Kings or Wilkes can cost as much as thirty-two thousand dollars per year including room and board. The money you make without a degree can look impressing at first, but that might just be because you are young. The job you obtain will not leave you with much room for advancement, whereas once you obtain a college degree you can come out and be the boss of those people who have been there for the past four years while you were in college. The money you will make at that higher position will make those years of school worth every penny you invested. Many people may argue that experience is the best education, and I agree with them to a certain extent. Experience is learning and hands on in your field, but a background education is also useful and no matter how you may feel, the way of society is what we have to follow and that piece of paper, a diploma, is what counts. Take a look at your family, friends, and people you know. Now look at which direction our world and society is turning towards. How many elderly people do you know that have gone to college? Probably not many because a college education was not important many years ago. Now look at todays adults, I think it would be safe to say about half have gone to college. This is because there was a need for one and some chose to go and others didnt. Looking at todays teens and young adults, the majority are in college, are planning to go, or have already gone. Why is this?Societys youth are going to college because they realize what they are going to face in the real world, the competition, and they want to be ready for it. Now look at todays children, how many parents want their children to go to college? I would say close to all of them. Parents want their
Sunday, December 1, 2019
Micro + Soft - The Split Of An Empire Essays - Competition Law
Micro + Soft - The Split Of An Empire Micro + Soft - The Split of an Empire Kendra Phelps BUS 415.3 / Business Law Rob Goodwin July 5, 2000 Table of Contents I. Introduction: The Allegations and the Laws 3 II. Introduction: The Proof 4 III. Trial 5 Table 1 6 IV. The Proposal 8 V. Microsoft's Response 9 VI. The Foes and Their Thoughts 11 VII. Current Status and Discussion 12 VIII. Recommendations 15 References 18 Micro + Soft - The Split of an Empire Could the megalosaurus business that was conceived in 1975 really be split in two - or three? This is what U.S. District Court Judge Thomas Penfield Jackson has decreed in order to put a stop to the monopolistic shenanigans that Microsoft calls business as usual. The Department of Justice (DOJ) and 20 states are suing Microsoft Corporation in one of the largest antitrust lawsuits brought about since the investigation and ensuing breakup of AT&T in 1984. If Judge Jackson gets his way, Microsoft (MS) could very well be two different companies sparring with each other. I. Introduction: The Allegations and the Laws Essentially, the plaintiffs are charging Microsoft with the following three violations: 1) Microsoft has waged an criminal campaign in defense of its monopoly position in the market for operating systems designed to run on Intel-compatible personal computers (PCs). More specifically, the plaintiffs contend that Microsoft violated Section 2 of the Sherman Act by engaging in a series of exclusionary, anticompetitive, and pillaging acts to maintain its monopoly power. They also assert that Microsoft attempted, although unsuccessfully to date, to monopolize the Web browser market, which is also in violation of Section 2 of the Sherman Act. Finally, they claim that some specific measures taken by Microsoft as part of its campaign to protect its monopoly power, specifically, tying its browser to its operating system and entering into exclusive dealing arrangements, are also a violation of the Sherman Act, Section 1 . II. Introduction: The Proof The plaintiffs have already shown at trial that MS possesses an extremely dominant, persistent, and increasing share of the relevant market. Microsoft's share of the worldwide market for Intel-compatible PC operating systems currently exceeds 95 percent, and the company's share would rest well above 80 percent even if the Mac OS were included in the figures. The plaintiffs also proved that the applications barrier to entry protects Microsoft's dominant market share. This barrier ensures that no Intel-compatible PC operating system other than Windows can attract significant consumer demand, and the barrier would operate to the same effect even if Microsoft held its prices substantially above the competitive level for a protracted period of time. Together, the proof of dominant market share and the existence of a substantial barrier to effective entry create the presumption that Microsoft enjoys monopoly power. Microsoft did not create the barrier to entry all by itself, the consumers' preferences helped this along, however, Microsoft took specific predatory measures to make sure that its product attracted the market and ultimately trapped the market. Section 2 of the Sherman Act prohibits the act of monopolization. This means that the act itself is unlawful, not monopolies. It states that Every person who shall monopolize, or attempt to monopolize, or combine or conspire with any other person or person, to monopolize any part of the trade or commerce among the several States, or with foreign nations, shall be deemed guilty of a felony. Here is the law - the plaintiffs found the proof. They found it in many of MS's actions and in their contracts with distributors and they have written testimony, records, and even admissions by MS of their many actions. Yet, MS still maintains that it is not a monopoly. Unfortunately for MS, there are only two defenses to the allegation of monopolizing that have been acknowledged. One is the defense of innocent acquisition, meaning that they somehow gained acquisition (or purchased) because of superior skills or foresight and that it wasn't calculated or targeted. The second defense for monopolizing that is recognized is a natural monopoly. This means that there would be a very modest market that could only support one competitor, such as a small town coffee shop, newspaper, or video store. Obviously, Microsoft doesn't fit into either category, and if it did fit into one of
Subscribe to:
Posts (Atom)