Saturday, December 28, 2019

How Gender Inequality Is Defined As The Unequal Treatment...

Introduction: Gender inequality is defined as the unequal treatment of individuals on the ground of gender. Gender inequality is the result from the different social construction as well as biological difference. It is the treatment of boys and girls differently at home, school, work, and other situations. From childhood, society develops norms that are expressing a gender role that what type of behavior is acceptable for boys and girls in the society. As, boys are expected to act with those toys that assist them in decision making roles, whereas girls usually play with those toys that teach them an expressive role like caring and nourishing. Gender role creates the masculinity and femininity identity that describe the masculine and feminine behavior for men and women in society. â€Å"Toys R Us†: For this observational data research, I chose to collect data from the largest children play store called â€Å"Toys R Us†. The store is very popular among the children’s for the largest collection of toys, games, and others play stuff. The store carries different characters of brand like Disney, Nickelodeon, Barbie, LEGO, Monster High, Hot wheels, Nerf, Star trek and others which identify the gender inequality in the store. In order to collect data, my main focus is to find the comparison among masculinity and femininity. This observational research also demonstrates the convergence of race or ethnicity among genders. Besides, the data from store describes the inequality between boys andShow MoreRelatedGender Inequality Of The United States1363 Words   |  6 Pagesof color, you’re going to be underpaid, so there’s really no point,† Daniel recalled (â€Å"Career and Workplace† 4). A future law graduate was told to throw away her dreams in regards to gender inequality. A girl named Reshma Daniel had to give up what she loved most because of a situation regarding both her race and gender. Reshma Daniel’s parents moved to America from India with just a couple dollars. Her parents wanted their children to live the American life. For Daniel, that simply meant law schoolRead MoreWest With The Night By Markham Essay1326 Words   |  6 Pageswhere she encounters lions, leopa rds, and tracks wild pigs. Markham enjoys the immense profusion of wildlife since she watches lions pacing across the Serengeti Plains, as well as a herd of gazelles, elands, wildebeests and zebras running all over the ground when escaping from the sound of the plane. Apart from that, the tone used in writing the memoir suggests that the author goes from one challenge to another. Throughout the book, she describes the way she grows up raising horses with her father, trainingRead MoreDoes Social Inequality Exist in Jamaica3694 Words   |  15 PagesIntroduction â€Å"Social Inequality allows for the exclusion of individuals and the formation of prejudices and discrimination. Carefully analyze and discuss the validity of this statement based on current events in the Jamaican society.† Social Inequality is the existence of socially created inequalities; it occurs when ideology and power combine to make one group of people feel inferior to another. From a sociological perspective people are able to assess both opportunities and constraints thatRead MoreGender Inequality in Europe2011 Words   |  9 Pagespresented it as my own. I have not used this work in a previous class (self – plagiarism). | HANOI UNIVERSITYFOUNDATION STUDIES DEPARTMENT----------oOo----------GENDER INEQUALITYIN EUROPETeacher: Nguyen Thi Phuong LeStudent: Tran Cong NguyenClass: 3Q12Course: EAP WritingDate: March 13, 2013 | ABSTRACT The gender inequality is commonly recognized as the top list concern of many countries around the world. This paper, based on secondary research, discusses this problem in Europe, as well asRead MoreOffer a Critique of What John Rawls Meant by ‘Fair Equality of Opportunity’2169 Words   |  9 Pagessubject matter and most famously for his work entitled, A Theory of Justice (1971). Here he explains how the â€Å"logical ordering of principles of justice can help to structure and regulate an ideal structure society† (John Rawls, 2003) This is not to say that the theory of justice principles can be used to restore justice to society, Rawls simply thinks that basic rights and duties assigned to individuals of society should be equally distributed and that if social and economic advantages were to be evenlyRead MoreDiscrimination Of The Department Of Human Resource Essay1973 Words   |  8 Pagesworld changing and progressing, with laws and enactments being made to reduce the level of gender discrimination especially for women and persons with disabilities. However, discrimination of gender still remains persistent and women continue to go through hardships and struggles in order to enjoy the same benefits as men. Women normally gravitate or lean in the direction where the jobs try to minimize inequality such as business related fields, while on the other hand their male counterparts parts tendRead MoreSOCIAL INEQUALITY BASED ON CASTE3733 Words   |  15 Pagesï » ¿ SOCIAL INEQUALITY BASED ON CASTE Contents 1. Introduction 2. Objectives 3. Scope 4. Definitions 4.1 Social inequalities 4.2 Caste 5. Why inequalities 6. Global caste discrimination 7. Case Study –Caste discrimination in India Context 7.1 Definition Background 7.2 Caste discrimination in practice 7.3. India’s legal framework 7.3.1 The Indian Constitution 7.3.2 The Indian Penal Code 7.4 Implementation issues 7.5 International commitmentsRead MoreGender Discrimination5921 Words   |  24 Pages GENDER DISCRIMINATION By Nkechi AGBOGO TABLE OF CONTENT 1. Abstract 2. Introduction 3. What does sex discrimination cover 4. Sex discrimination possible scenes 5. Forms of sex discrimination 6. Reasons for sex discrimination 7. Policies which should help reduce gender discrimination 8. Conclusion 9. Reference ABSTRACT Gender discrimination is an acute and persistent problem, especiallyRead MoreJloj9400 Words   |  38 PagesAppearance-based Sex Discrimination and Stereotyping in the Workplace: Whose Conduct Should We Regulate? Stan Malos Published online: 12 April 2007 # Springer Science + Business Media, LLC 2007 Abstract Court treatment of sex discrimination and harassment claims based on appearance and gender stereotyping has been inconsistent, particularly where the facts involve reference to sexual orientation. Ironically, court willingness to allow such claims may turn on the choice of verbal or physical conductRead MoreNorms And The Social System2752 Words   |  12 Pagesof actions undertaken by individuals and the stability of the social order. Social action, according to Parsons’ are guided by three systems: personality, cultural and social systems. The personality system is responsible for individual needs for fulfillment which drives man to make effort and perform actions. The cultural system has to do with the development of symbols and signs that convey generalized meaning and the social system is about the multiplicity of individual actors relating with one

Friday, December 20, 2019

Descriptive Essay Embodiment And Emotional Memory On...

The article I selected is â€Å"Embodiment and Emotional Memory in First vs. Second Language† by Baumeister, Foroni, Conrad, Rumiati and Winkielman. The reason why I chose to review this article is because as a Bilingual person whose native language is Spanish and second language is English I wanted to know how different my brain and memory reacts to both languages. Especially, I was hoping to find answers in the article and learn more about myself through it. I have always been curious about what happens when I meet someone who only speaks English, will the connection that I create with said person be as strong as a connection I can form with someone who speaks Spanish?. The study discussed in this article targets Spanish and English Speakers†¦show more content†¦However, there are things that I feel more confident talking about in English rather than in Spanish, which to me is weird. This article aims to explain the relationship between feelings, words, languages an d the reaction of your brain, memory and even facial muscles to interactions in two different languages, which makes me feel identified. I am also very interested in neurolinguistics and what happens to our brain when we learn new languages and this article has given me the information I was looking for. Moving on to the article itself and the study that is being analyzed in it, the authors start by identifying native language as L1 and second language as L2. The purpose of the study was to follow up with previous researchers who have found that language and emotions are linked and that said link is solider in L1 than in L2 which has been acquired far along in life. They wanted to reflect their findings in changes in emotional memory and embodied responses when Spanish and English was being interchangeable between bilingual people. The researchers formulated two hypotheses. The first hypothesis was based on the idea that the processing of emotional words in L2 would result on less embodied simulations (Muscle resonance) that it would in L1 participants. The second hypothesis stated that L2 participants had a harder time processing and categorizing emotional wordsShow MoreRelatedMetz Film Language a Semiotics of the Cinema PDF100902 Words   |  316 PagesFILM LANGUAGE FILM LANGUAGE A Semiotics of the Cinema Christian Metz Translated by Michael Taylor The University of Chicago Press Published by arrangement with Oxford University Press, Inc. The University of Chicago Press, Chicago 60637  © 1974 by Oxford University Press, Inc. All rights reserved. English translation. Originally published 1974 Note on Translation  © 1991 by the University of Chicago University of Chicago Press edition 1991 Printed in the United States of America 09 08 07 6Read MoreLanguage of Advertising20371 Words   |  82 PagesPeculiarities of Advertising Language Moscow - 2010 Summary The peculiarities of advertising language are the subject of this graduation paper. At the beginning, in the first chapter is given a generalRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 Pages E SSAYS ON TWENTIETH-C ENTURY H ISTORY In the series Critical Perspectives on the Past, edited by Susan Porter Benson, Stephen Brier, and Roy Rosenzweig Also in this series: Paula Hamilton and Linda Shopes, eds., Oral History and Public Memories Tiffany Ruby Patterson, Zora Neale Hurston and a History of Southern Life Lisa M. Fine, The Story of Reo Joe: Work, Kin, and Community in Autotown, U.S.A. Van Gosse and Richard Moser, eds., The World the Sixties Made: Politics and Culture inRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 PagesBetter Job 91 4 Emotions and Moods 97 What Are Emotions and Moods? 98 The Basic Emotions 100 †¢ The Basic Moods: Positive and Negative Affect 100 †¢ The Function of Emotions 102 †¢ Sources of Emotions and Moods 103 Emotional Labor 108 Affective Events Theory 110 Emotional Intelligence 112 The Case for EI 113 †¢ The Case Against EI 114 †¢ Emotion Regulation 115 OB Applications of Emotions and Moods 115 Selection 116 †¢ Decision Making 116 †¢ Creativity 116 †¢ Motivation 117 †¢ Leadership 117 †¢ NegotiationRead MoreOrganisational Theory230255 Words   |  922 Pagesorganization theory. Henk W. Volberda, Chair of the Department of Strategic Management Business Environment and Vice-Dean of the RSM Erasmus University, Netherlands At last, a text that brings organization theory into the 21st century! This is the first organization theory textbook to provide full and informed coverage of a range of contemporary developments in the field. Notably, it includes diverse contributi ons to organization theory made by critical management studies. It really is pathbreaking

Thursday, December 12, 2019

GAP Generation free essay sample

1. INTRODUCTION -Defination: differences between people of a younger generation and their elders, especially between a child and their parents generation. -Gap generation is more and more today 2. BODY a. Reasons Firstly, there are some different opinions between parents and children of their career, education and love. †¢Of ideas on general conduct comprising dress, food habits etc. †¢Morality, marriage career †¢Of tastes on art, music, literature, and in short total outlook. †¢Imposition of the self-righteous attitude of the older generation on the young. †¢Biological evolutionary difference Development of technology that makes young generation have independent life with. Example: the old think that when you become a wife , you need to take care of everything in your faminly. Its very hard and take a lot of time so you should stay at home. But the young think that she should do social activities, so business like man. However , if they do like that , they dont have enough time for family . We will write a custom essay sample on GAP Generation or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page As the result , the house work is very confusing. To get balance between family and work is difficult , not everyone can do. This is one of the answer to the bad relationship of mother-in- law and daughter-in-law. Actually, is there generation gap or it is just gap in spirit Because the young think that they are different from the old , they dont want todepend too much. There is a thought attached in their head that why we should listen to the old . No , they dont understand b. Consequences The young are not recive the old’s experience. The old have experience, they live longer. The old do not know way to adapt new environment. The young live in a new period of time so they can understand what is changing. c. Solutions The parents should often talk to their children Parents and children should have same hobby to exchange information and experiences 3. CONCLUSTION: All of them had better look into the problem together to contribute their ideas and reach the most common solution. Why don’t we try understanding each other to overcome everything in harmony and happiness

Wednesday, December 4, 2019

Employee Acceptance Unified Communications -Myassignmenthelp.Com

Question: Discuss About The Employee Acceptance Unified Communications? Answer: Introduction: The introduction of the Information Communication Technology (ICT) has changed the mode of operation of the organisations (Bloom et al. 2014). The organisations operation achieves simplification, and their productivity gets enhanced. However, if the technology is not appropriately adopted, it can prove to be a great trouble and stressful for the organisation (Lee and Lee 2015). The subject of the report is Curtain Co. who had a bitter experience with the technological adaptation. The deemed report is devised to supervise and guide the subject towards the benefits offered by the network infrastructure. While designing the report it has been kept in mind to keep the language understandable for the corporate people. After reading the report, the readers will be able to understand about network infrastructure and the benefit offered by them. An insight into the network service has also been offered by the in the report along with the services that the deemed organisation can adopt. Final ly, the report has been concluded with the data processing facilities along with discussion over data storage solutions and data processing model. Appropriate recommendations on the technological adaptations have been made depending on the needs of the deemed organisation Curtain Co. Network Infrastructure: The software and hardware resources of an organisation together form the network infrastructure of the organisation (Vange et al. 2015). The role of the network here is to enable connectivity, communication, management and operations of the organisation (Ramachandran et al. 2012). The deemed infrastructure offers communicative services and channel among the users, services, operations, external networks (internet) and applications. The most relatable components of the network infrastructure have been discussed in the following subsections along with the organisational benefits they offer. Network Convergence and Unified Communications: Network convergence refers to the mode where multiple communicative techniques like video communication, telephonic communication and data communication co-exist within the network. The reason for making the multiple communicative modes co-exist is to earn flexibility and convenience that is commonly not offered through separate infrastructure (Kinne 2013). Multiple other benefits are offered by a converged network of which some has been mentioned as follows. Less spacious and cost-efficient: Converging of the network enables equipping of less hardware to operate the same workload while supporting energy-efficient and smaller data centre devices. Smartness to the systems: The organisational system enjoys enhanced efficiency from both business and technological perspective through centralising the management of the IT resources, system consolidation, resource utilisation rate boosts and cost reduction. UC or unified communication is equipped by the organisations to enhance the productivity, collaboration and communication of the organisation. To achieve the described objective UC integrates the communication services that consists of instant messaging, audio, video web conferencing, presence information and others together (Silic, Back and Sammer 2017). Multiple organisational benefits are offered by unifying of the communication mediums, some of the priors are mentioned as follows: Freedom to work: Unifying of the communicative system offers flexibility of communication from anywhere at any hour. This freedom can prove to be of great significance for Curtain Co. as their units are spread throughout the country with three different time zones. Enhanced Security: All the communicative mediums are unified as one, and thus, the organisation will need to monitor only a single channel that minimises the chance of trespassing or whistleblowing from within the organisation. Information safekeeping: Unified communication replaces the multiple bills for communicative modes from the vendors to a single bill from the vendor providing unified communication. Other records are also merged as one for a complex free and resilient safekeeping. LAN Types: The method of connecting computers and other devices in a small geographical location (a campus or a building) is known as Local Area Networking or abbreviated as LAN (Mahalingam et al. 2014). The deemed networking type offers high speed along with the ease of implementation at cost-efficient rates. The LAN can be sub-categorised in two different categories, the first being wired LAN and the second and is wireless LAN (wLAN). The former use cables as the mode of communication channel and the data are transmitted through the channel. The following types of cables can be equipped to act as the data communication channel. Unshielded Twisted Pair Shielded Twisted Pair Multi-Mode Fibre Single Mode Fibre While for the wLAN the air or open space is the communication channel. Unlike the wired mode the talked about system offers flexibility of the connected device within its domain. It is recommended that the organisation equip both the mode of LAN. The reason for stating the same lies on the fact that due to some physical error the wired LAN may stop operation and interference from other waves will affect the quality of wLAN. Hence, it is recommended to keep both the modes as a contingency for the other. WAN: In the deemed case the subject needs communication that extends throughout Australia and hence they need the type of networking that will enable them to communicate to its branches. LAN is suitable for other networking needs, however; its limited range is an issue for the subject. WAN can sort the domain problem of the organisation. Wide Area network abbreviated as WAN is the mode of networking with a vast domain. The domain of the WAN services can extend from a state to entire world (Bitar, Gringeri and Xia 2013). The benefits of the WAN network are not limited to the domain only; it also offers centralisation of IT infrastructure that is the organisation will have to set up only one data storage facility at the headquarter and it will manage the rest. Other benefits include privacy enhancement as the information is transmitted through the WAN channel instead of the internet. However, for Curtain Co., the most suited mode of networking will be a combination of LAN and WAN. The diagr am below suggests the network infrastructure for Curtain Co that is a combination of LAN and WAN. The LAN is equipped for operational purpose within the organisations branches and for inter-branch communication the small LANs are merged to establish a WAN. IP DNS Management: IP management system allows the user optimisation of the IP addresses that are being used in a network (Sparks, Roach and Campen 2014). The talked about management solution also offers interaction between other systems and protocols of the network to maintain a balance between them. The management of the IP will enable the organisation to keep track of all the activities being performed through an IP address and thus prevent many undesired able situations. On the other hand, DNS is the method through which a user is enabled to navigate the servers using a name instead of the code (Ordua-Malea and Lpez-Czar 2015). Hence, it is more important to manage the former to prevent any leakage of data or whistleblowing. However, other advantages are also offered by the same like rerouting of traffic in case it exceeds the limit, prevention of interruption and global monitoring of the organisational informational assets. Network Services: Multiple network services are available in the commercial market for the organisational use, and they are simplifying the organisational operations. Some of the considered services that can prove to be of great significance for the organisation has been discussed as follows: Voice over IP: Voice over IP as abbreviated as VoIP offers the users to advantage of making calls by use of the broadband over conventional phone systems that operate using analogue methods (Carter 2012). The mode of call is not limited to voice calls only but also offers the advantage of communication through video and instant messaging mode as well. The talked about systems advantage is not just limited to offering multiple modes of communication on a single unit but also offers a cost advantage over the primitive mode of communicational techniques. VOIP also offers the advantage of accessing the service of VoIP from remote locations, if the user has access to a communication channel along with the credentials to log in to the server. Email: Electronic mail or email is the process that enables the exchange of information through electronic devices. Adopting the deemed network service will offer the organisation with lots of benefits and opportunity that have been mentioned as follows. First and foremost, to its advantage is that it provides communicative ease to the users and can also be used for collaborative communication as it enables sharing of information to multiple users (Mark, Voila and Cardello 2012). The considered service saves the expenditure on the stationary items and on posting the mails consisting of essential documents and others while offering sustainable physical security. The service can also assist the organisation in marketing as email marketing is one of the most popular marketing methods in existence. Extranet: The talked about network service is a form of intranet (restricted and private network) that can be accessed with limited accessibility by the stakeholders on receiving credentials from the organisation (Sun et al. 2012) The foremost advantage that the organisation will gain on equipping the service is that of safekeeping of the personal and stakeholders information which can also be manipulated when needed. The controls of the network are withheld to the organisation which reduces the chances of errors. The organisation can also earn a sense of credibility for the organisation as the former is giving them access to their server. Supply chain management of the organisation also earns a positive boost from an adaptation of the considered system. Simple Network Management Protocol (SNMP): The talked about network service is a network management protocol equipped for gathering information from and configuring various network devices such as servers, hubs, router, switches and other on an IP network (Hale 2012). The considered service offers the benefit of establishing a secure connection between the headquarter and other units of Curtain Co. The considered network service also offers the advantage of keeping track of the attempts made to hijack the network. The service also offers certain other minor benefits of keeping track of the consumables. Data processing Facilities: Colocation Data Centre: Data centre is the term that is used for the facility (a group of networked storage and servers) that the organisations use for the purpose of storing, processing or even distribution of data in bulk amount. Thus colocation refers to the data centre that is used by more than one organisation for its networking accessibility (Chang and Wills 2016). The colocation data centres benefit can be classified into following three categories: Scalability: The colocation data centres offer scalability to the organisation that is the organisation can change accordingly with its need. Sustainability: The considered solution also offers sustainability by safekeeping the informational resource while maintaining its operations by minimising the power, network and others lose along with substantial cost savings. Cost: Colocation centre offers high security because it holds accountability towards the organisation associated with it. Storage Area Network (SAN): Decusatis, Carranza and DeCusatis (2012) have quoted SAN as the network that offers access to block-level, consolidated data storage. The talked about storage solution is primarily adapted for the purpose of enhancing storage devices (disk arrays, optical jukeboxes and tape libraries) to the servers. The above mentioned process is done to make the devices appear as locally attached device for the operating system. Like the data centre, SAN also offers scalability option to the organisation along with an isolated data keeping and performance. The talked about solution also offers long distance connectivity and centralising of the database while offering a disaster recovery option. Cloud: Cloud computing has proven to be the most desired preference for the current commercial market. The reason for the such a high demand for the talked about solution lies in its attributes. The data in the considered model is saved in a remote server of cloud vendor that can be accessed through the internet. The cloud servers use the virtualisation techniques (Yang and Jia 2013). Another reason for the desirability for the talked about storage solution is the benefits offered by it. The first and foremost advantage offered by the talked about service is the saving offered by the same in saving the physical space and cost saved in maintaining and implementation of the solution. The storage solution also offers high security if offered from an appropriate vendor. Cloud vendors like Google, Amazon, Microsoft and Apple store the data in layers on multiple that makes it difficult for the trespasser to hack in (Chang and Wills 2016). The storage solution can easily be accessible by th e organisations headquarter and units with appropriate authorisation. All the benefits offered by the considered solution makes it most suitable for the considered firm, however, the latter need to keep consideration of the cloud vendor. Distributed Database: The considered solution uses multiple computers that can be located at same or geographically dispersed locations (however must be internetworked) to store the data. It makes the data secure and out of reach from the cyber attackers (Abadi 2012). The discussed solution also offers advantages like reliability, enhanced performance, cost savings and others. Though it is recommended over the cloud storage solution because the data will be stored at multiple units of the organisation and the employees will have access to it which increases the chance of whistleblowing or leakage of data. Data processing Model: Client server (C/S) model: Oluwatosin (2014) has stated that the discussed server model is an interactive server framework where the user posts the query and the server responds accordingly. The benefits offered by the discussed model includes strong security along with backup and in undesired situation s recovery of the information. It also enables centralisation of the controls which in response enhances the overall productivity of the organisation. Peer-to-Peer (P2P): The discussed solution is the most suitable for the considered organisation as the server connects the computing devices in peers that enable continued operation of all the units of the organisation in case of failure of one server. In the C/S model, the centralisation of controls can lead to situations where the failure of the central server to crash the operations of the headquarter along with all the units but P2P is immune to the discussed situation (Mayer et al. 2013). The advantage of the considered server model also offers minimisation of the bills and others. Conclusion: In conclusion, it can be stated that technological adaptation is a necessary measure for the organisations to maintain their position in the competitive market. However, selection of appropriate network infrastructure is mandatory for an organisation otherwise, the former can prove to be of high annoyance for the organisation. Hence, the discussed report has offered a brief overview of the factors that need to be considered before building the network infrastructure of the organisation. It has also discussed the various advantage that different networking services, storage solutions and server models can offer to the organisation. The above mentioned measure has been achieved by evaluating multiple options available for each of the discussed topic and making appropriate recommendations for the discussed organisation Curtain Co. The recommendations are offered based on the requirements of the deemed organisation along with its experience with an adaptation of the technology in its ope rations. Hence, the report can be emphasised to state that the organisation should not omit technological adaptation into its organisational operations due to its previous experience instead should devise an appropriate infrastructure for the same and gain a competitive advantage in the market. References Abadi, D., 2012. Consistency tradeoffs in modern distributed database system design: CAP is only part of the story.Computer,45(2), pp.37-42. Bitar, N., Gringeri, S. and Xia, T.J., 2013. Technologies and protocols for data center and cloud networking.IEEE Communications Magazine,51(9), pp.24-31. Bloom, N., Garicano, L., Sadun, R. and Van Reenen, J., 2014. The distinct effects of information technology and communication technology on firm organization.Management Science,60(12), pp.2859-2885. Can, A.B. and Bhargava, B., 2013. Sort: A self-organizing trust model for peer-to-peer systems.IEEE transactions on dependable and secure computing,10(1), pp.14-27. Carter, S., 2012. E911 VoIP Essentials for Enterprise Depoloyments.XO Communications, LLC. Chang, V. and Wills, G., 2016. A model to compare cloud and non-cloud storage of Big Data.Future Generation Computer Systems,57, pp.56-76. Decusatis, C.J.S., Carranza, A. and DeCusatis, C.M., 2012. Communication within clouds: open standards and proprietary protocols for data center networking.IEEE Communications Magazine,50(9). Hale, B., 2012. Network ManagementBack to the Basics.Solarwinds Whitepaper,16. Kinne, B.J., 2013. IGO membership, network convergence, and credible signaling in militarized disputes.Journal of Peace Research,50(6), pp.659-676. Lee, I. and Lee, K., 2015. The Internet of Things (IoT): Applications, investments, and challenges for enterprises.Business Horizons,58(4), pp.431-440. Mahalingam, M., Dutt, D., Duda, K., Agarwal, P., Kreeger, L., Sridhar, T., Bursell, M. and Wright, C., 2014.Virtual extensible local area network (VXLAN): A framework for overlaying virtualized layer 2 networks over layer 3 networks(No. RFC 7348). Mark, G., Voida, S. and Cardello, A., 2012, May. A pace not dictated by electrons: an empirical study of work without email. InProceedings of the SIGCHI conference on human factors in computing systems(pp. 555-564). ACM. Mayer, P., Klarl, A., Hennicker, R., Puviani, M., Tiezzi, F., Pugliese, R., Keznikl, J. and Bures?, T., 2013, September. The autonomic cloud: a vision of voluntary, peer-2-peer cloud computing. InSelf-Adaptation and Self-Organizing Systems Workshops (SASOW), 2013 IEEE 7th International Conference on(pp. 89-94). IEEE. Ordua-Malea, E. and Lpez-Czar, E.D., 2015. The dark side of Open Access in Google and Google Scholar: the case of Latin-American repositories.Scientometrics,102(1), pp.829-846.Oluwatosin, H.S., 2014. Client-server model.IOSRJ Comput. Eng,16(1), pp.2278-8727. Ramachandran, S., Tyagi, P., Mallesan, S., Kulshreshtha, G., Shetty, S., Raman, R. and Bhatia, M., Genband Us Llc, 2012.Voice over IP (VoIP) network infrastructure components and method. U.S. Patent 8,194,640. Silic, M., Back, A. and Sammer, T., 2017. Employee acceptance and use of unified communications and collaboration in a cross-cultural environment. InRemote Work and Collaboration: Breakthroughs in Research and Practice(pp. 1-22). IGI Global. Sparks, R.J., Roach, A.B. and Campen, B., Tekelec, 2014.Methods, systems, and computer readable media for throttling traffic to an internet protocol (IP) network server using alias hostname identifiers assigned to the IP network server with a domain name system (DNS). U.S. Patent 8,645,565. Sun, Y., Wang, N., Shen, X.L. and Zhang, J.X., 2015. Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences.Computers in Human Behavior,52, pp.278-292. Vange, M., Plumb, M., Kouts, M. and Wilson, G.S., Circadence Corp, 2015.System and method for implementing application functionality within a network infrastructure. U.S. Patent 9,185,185. Yang, K. and Jia, X., 2013. An efficient and secure dynamic auditing protocol for data storage in cloud computing.IEEE transactions on parallel and distributed systems,24(9), pp.1717-1726.