Saturday, December 28, 2019

Dust in The Great Gatsby Essay - 832 Words

In the novel The Great Gatsby, F. Scott Fitzgerald incorporates many different themes, but the most prevalent message is that of the impossibility of the American Dream. Fitzgerald writes of two types of people: those who appear to have the ideal life and those who are still trying to achieve their dreams. Tom and Daisy are two characters who seem to have it all: a nice house, a loving spouse, a beautiful child, and plenty of money (Fitzgerald 6; ch. 1). However, neither of them is happy, and both end up having affairs. Their lovers, Gatsby and Mrs. Wilson, are two examples of characters who are still trying to attain the perfect life. By the end of the novel, the hopes of both Gatsby and Mrs. Wilson have been dashed and they have†¦show more content†¦The other car, the one going toward New York, came to a rest a hundred yards beyond, and its driver hurried back to where Myrtle Wilson, her life violently extinguished, knelt in the road and mingled her dark thick blood with the dust (138; ch. 7). Dust is again used, this time to insinuate the lost dreams of a common woman. Fitzgerald also uses this symbol when he writes of Gatsbys vanquished hopes. Gatsby was a man who had fulfilled most of his dreams. He had a large house, lots of money, and he mingled with the rich and famous, but he still had one thing that he needed to make him happy (50; ch. 3). Gatsby had achieved all that he had for one purpose: to win the woman that he loved, Daisy (79; ch. 4). Gatsby finally had realized his dreams for a short while, when Daisy told him that she loved him (116; ch. 7). However, this perfection didnt last very long. Daisy soon went back to Tom, and Gatsbys visions of his ideal life were destroyed. When Nick visits Gatsbys house after Daisy had gone back to Tom, he noticed that there was an inexplicable amount of dust everywhere (147, ch. 8). This dust was what remained of Gatsbys obliterated fantasies. Fitzgerald foreshadows the end of Gatsbys hopes in the very beginning of the novel also by talking about dust. It is what preyed on Gatsby, what foul dust floated in the wake of his dreamsShow MoreRelatedEssay on The Dust Jacket of The Great Gatsby723 Words   |  3 PagesThe Dust Jacket of The Great Gatsby The dust jacket of The Great Gatsby has an extremely complex yet influential relationship to its text as well as its author. Francis Cugat, the artist of the cover, developed the painting through a series of ten sketches[1]. In each sketch he develops a new element of the painting which indicates the level of complexity in the final work. Interestingly, Fitzgerald never mentions the artist’s name in his correspondents with his editor Maxwell Perkins[2]Read MoreThe Great Gatsby By F. Scott Fitzgerald980 Words   |  4 Pages Covered in Ash By: Kaleigh O’Brien Clouds of dust linger. A hand placed straight outward, and nothing is visible. The atmosphere is gray, and darkness closes in. Take one step forward and an object appears. It is a body. Three bodies piled on top of each other, biodegrading, to be exact. They turn completely into dust, leaving only a pile of ashes and many questions’. Who are they? Where did they come from? Why are they here? What did they have in common? All these questions have an answer. ItRead More The Search for Utopia in The Great Gatsby Essay1131 Words   |  5 Pages   Ã‚  In Fitzgerald’s novel The Great Gatsby, the reader discovers multiple interpretations of utopia. Each character is longing for one particular paradise. Only one character actually reaches utopia, and the arrival is a mixed blessing at best. The concept of paradise in The Great Gatsby is â€Å"a shifting, evanescent illusion of happiness, joy, love, and perfection, a mirage that leads each character to reach deeper, look harder, strive farther†(Lehan, 57). All the while, time pulls each individualRead MoreThe Great Gatsby By F. Scott Fitzgerald1577 Words   |  7 Pagesthemes such as the novel written by F. Scott Fitzgerald, The Great Gatsby. In this novel, the character and the narrator Nick Carraway describes the mystery and puzzles of his past neighbor, and also the main character, Jay Gatsby. Gatsby is a multimillion tycoon who is madly in love with Daisy Buchanan, an amazing, upper-class woman with whom he had been together with, years prior. She is now ma rried to a man named Tom Buchanan. Gatsby dedicates his whole life to picking up money and status to satisfyRead MoreIllusion and Reality in The Great Gatsby Essay1548 Words   |  7 Pagesand Reality in The Great Gatsby  Ã‚  Ã‚     Ã‚   The Great Gatsby, by F. Scott Fitzgerald, is a novel about one mans disenchantment with the American dream. In the story we get a glimpse into the life of Jay Gatsby, a man who aspired to achieve a position among the American rich to win the heart of his true love, Daisy Fay. Gatsbys downfall was in the fact that he was unable to determine that concealed boundary between reality and illusion in his life.      The Great Gatsby is a tightly structuredRead MoreThe Colors of Gatsby, F. Scott Fitzgeralds Famous Novel1640 Words   |  7 Pagesnovel, The Great Gatsby. With his well-chosen words, Fitzgerald painted a fantastic portrait of life during the Roaring Twenties in the minds of his readers, a picture rich with color and excitement. Four colors: green, gold, white, and gray played key roles in the symbolic demonstration of ideas and feelings which, woven together seamlessly, made The Great Gatsby a world-renowned work of literary genius. Some of the most well-known and intriguing symbolic imagery in The Great Gatsby comes fromRead MoreThe Damage Of The American Dream Character Analysis752 Words   |  4 PagesThe Damage of the American Dream The Great Gatsby by F. Scott Fitzgerald, wonderfully shows how the values of characters in the novel set the time period of the 1920s. The major characters in the story has clear motives and values which helps the reader understand high society before The Great Depression, and give a clear indication that the theme of the book is a twisted view of the American Dream. Nick Carraway is the first persona we are introduced to and arguably the most important; as he isRead MoreThe Great Gatsby - Eden Imagery Essay1023 Words   |  5 PagesIn the Great Gatsby, each character is longing for one particular paradise. Only one character actually reaches utopia, and the arrival is a mixed blessing at best. The concept of paradise in The Great Gatsby is a shifting, fleeting illusion of happiness, joy, love, and perfection, a mirage that leads each character to reach deeper, look harder, strive farther. There is Myrtle Wilsons gaudy, flashy hotel paradise in which she can pretend that she is glamorous, elite, wanted and loved. She clingsRead MoreEssay on The Great Gatsby by F. Scott Fitzgerald907 Words   |  4 PagesThe word â€Å"great† has many meanings – outstanding, eminent, grand, important, extraordinary, and noble – that vary with the intent of the speaker and the interpretation of the listener. Someone may perceive something as great, while someone else may consider that same thing horrendous. The greatness of a being is not determined by the individual, but by those around them who experience and perceive their greatness through actions and words. In the book The Great Gatsby by F. Scott Fitzgerald, theRead MoreTheme Of Eyes In The Great Gatsby864 Words   |  4 Pagesfamiliar can present itself as completely different. The nine chapter, American classic The Great Gatsby by F. Scott Fitzgerald has meaningful motifs, themes, and various writing techn iques used to express Fitzgerald’s ideas. The book follows Nick Carraway, a young bondsman, who documents the deadly affair between Daisy, who is married to Tom, and Gatsby, a bachelor who lives across from the Buchanans. Gatsby refuses to give Daisy up without a fight, which ultimately leads to his demise. Fitzgerald

Friday, December 20, 2019

A Case Of A High Profile Customer - 1115 Words

1.0 Introduction The report will be based on a case study of a high profile customer, Agatha, whose account was debited with $1,000,000 using an online service at Trustworthy Bank and Trust (TBT). In this case, TBT applies Triple Data Encryption Standard (3DES) in carrying out transactions. On receiving a message that her account, has been debited with $1,000,000 she contacted the bank manager, Jessica, on the account that the transaction was a forgery. However, the bank manager provided information authorizing her to transfer money to an offshore bank in the Cayman Islands. This was supported by encrypted message, â€Å"Thanks for your many years of fine service, Jessica. Please transfer $1,000,000 from my account to yours as a token of my esteem and appreciationÍ ¾ Signed Agatha.† The message was provided by Cayman on Jessica’s request. However, the client filed against TBT, bank manager (Jessica) and Cayman Island on account that the transaction was a forgery engineered by Jessica. On the other hand, TBT bank sued Agatha on account that all procedures were followed. As such, the report will seek to identify the ways that the bank would have prevented the controversy from occurring. Additionally, the report will highlight the responsibility of Cayman Island in determining whether the transaction was bogus or not. Moreover, the report will propose ways of improving 3DES security performance to eliminate controversy in future. Lastly, the report will contrast Advanced EncryptionShow MoreRelatedPurchasing1440 Words   |  6 PagesIf we are not careful to plan and design based on distributions as opposed to averages, the entire planning and design process will be flawed. That is why it is so important to go to the extra step to derive these profile distributions. As you start to look at the profiles of customer orders, purchase orders, item activity, inventory levels, and so on, the creative juices begin to flow for everyone on the project team. Everyone on the project team starts making good decisions and generating new ideasRead MoreHigh Value Cus tomer Profile, Using Data Mining Techniques1311 Words   |  6 PagesAbstract Studying about customer segmentation and creating a customer ranking plan has attracted more attention in recent years. In this regard, this project tries on providing a methodology for customer segmentation depending on their value driver parameters which will be extracted from transaction data. The objectives of this project is to identify the High Value Customer Profile, using data mining techniques such as classification and clustering approaches. In the first phase, the data will beRead MoreBusiness Benefits : Swot Analysis And Pestle Analysis1275 Words   |  6 PagesBenefits, SWOT Analysis and PESTLE Analysis. - Mission Statement To guide persons to the right path in their relations with a high level of privacy and confidentiality. - Three Business Benefits - SWOT Analysis Strengths: 1. The long established brand name and the stability performance as a result of the experience gained during the years of work. 2. The use of high technology and experienced staff who are ready to meet the members needs. 3. Diversification of provided services (friendshipRead MoreThe Implementation Of A Risk Based Approach1379 Words   |  6 Pagesinformation concerning the risks. It is significant appropriate mechanisms to be developed by the governments so as to provide information to relevant competent authorities, financial institutions and organisations facilitating the risk assessment. In case the required information are not available due to inadequate data provided by authorities for the risk assessment, incapability to share sensitive and confidential information and restrictions imposed by censorship and protection provisions, seriousRead MoreCompetitive Environment And Maintaining Customer Relationships1321 Words   |  6 Pagesmaintaining customer relationships is a key to business success because customers are considered as important strategic resources of a business. However, all business markets contain many subgroups of customers that behave differently, that have different ambition s, and have different purchasing behaviours. Hence each subgroup must be treated differently in order to build strong customer relationships. To compete with rival businesses, it is vital for a business to know enough about their customers and toRead MoreCase Study : Bt Technologies ( Btt ) Essay1574 Words   |  7 PagesCase Summary BT Technologies (BTT) is an Indian-based company which produces high quality engineering products for several industries such as the automotive and aerospace sectors and the agricultural and construction equipment industries. These products are separated into four separate SBU’s (Strategic Business Units) – which is where BT Technologies’ main sources of income are derived from. These four SBU’s are: †¢ BT Hydraulics †¢ BT Metal †¢ BT Power †¢ BT Aerospace Aside from these high qualityRead MoreAnalysis Of Sanyasi Naidu Dadi, By Dr. Neil Clark Warren981 Words   |  4 PagesSanyasi Naidu Dadi (@03688834) BMBA eHarmony Case Assignment : Dt: 09-08-2015 Summary eHarmony, started by Dr. Neil Clark Warren and his son-in-law Greg Forgatch in 1998, But it was officially launched in August 2000. After six months Houston investment firm Fayez Sarofim Company was invested $ 3 million. It is one of the main online dating websites. eHarmony helps singles to find serious, long-term relationships. The online person website targeted â€Å"mirage-minded† individuals. The main differenceRead MoreCredit Card737 Words   |  3 PagesCase Study : How much do credit card companies know about you? 1. What competitive strategy are the credit card companies pursuing? How do information systems support that strategy? The competitive strategy that the credit card companies are pursuing is product differentiation and customer and supplier intimacy. Product differentiation – we make use of IS in order to create new product and services at the lower cost. According to the case, the credit card companies are making use of the data toRead MoreCase 1-3 Canyon Ranch1383 Words   |  6 PagesCase 1-3 Canyon Ranch Table of Contents 1. Summary of the problem 3 2. The technology that is used to analyze the case and the technology that was discussed in the case. 3 3. Summary of Available Information 3 4. Pre-Analysis of the study 4 5. The analysis section 4 6. Recommendations 7 References 8 Lessons learned from the case 9 Meeting minutes 9 Case 1-3 Canyon Ranch Summary of the problem In spite ofRead MoreWYNDHAM INTERNATIONAL: FOSTERING HIGH-TOUCH WITH HIGH-TECH1403 Words   |  6 Pages WYNDHAM INTERNATIONAL: FOSTERING HIGH-TOUCH WITH HIGH-TECH Summary The Harvard Business Review case study on Wyndham International discusses the inception of the hotel company, its initial exponential growth followed by a rapid decline in 1999 due to various external and internal factors. The organization restructuring and changes in management introduced several guest loyalty programs, ByRequest in particular, to allow Wyndham International to reestablish its brand. This paper discusses

Thursday, December 12, 2019

Outsourcing Research Development Activities -Myassignmenthelp.Com

Question: Discuss About The Outsourcing Research Development Activities? Answer: Introducation The strategic decision making capability of the project owner can be improved with the inclusion of outsourcing of business functionalities. The knowledge domain is used for analysing the development cost of the project for determining the baseline of the project. The processes which are involved in the outsourcing of business activities to the third party are categorised as management of helpdesk processes, management of the data storage and associated application. The continuous procurement process can be undertaken for the deployment of outsourcing program for increasing the benefit of Aztek enterprise. The formulation of the communication program can helps increasing the processing of the business operation. The integration of the business operation helps in changing the capabilities of the Aztek organization. The outsourcing program is recommended for the following factors: The resources and associated business operation are used for reducing the budget integrated with the business activities. The investment of the processes should be evenly distributed. The supply and demand can be evenly distributed for managing the business operation on the outsourced program The inclusion of outsourcing program helps in completing the project with the use of new tools and technologies by the third party. The outsourcing model is comprised of the administration control, maintenance and development program, service provider, procurement management program, application deployment scheme, and others. The security is the major concern with the business activities which are outsourced on the other business platform developed by the third party. The security of the outsourcing program can be achieved with the deployment of the fixation procurement process, intrusion detection and prevention system, administrative control on the IT services provided by the service providers, and firewall management system. The data centre is the key area which required heavy security program during the outsourcing of activities (Peters, 2015). The outsourcing activities can be accessed from the remote areas with the development of the global hub to get relevant information for e nhancing the working culture of the enterprise. The list of processes which are outsourced with the help of outsourcing model are categorised as business processes, administrative processes, application service process, Design and operating processes, application and development maintenance processes, infrastructure, and IT services which can be depicted from the figure below: Change management program for transforming existing business architecture with the Outsourcing program: The outsourcing program helps in minimizing the risks associated with the existing values of the enterprise. There are many activities in the existing system which has transformed on the outsourced platform of the third party which are categorised as development of the project activity schedule, open forum for variation in the ideas, training and development program for the working employees, and others. The most crucial activity which is associated with the transformation of business architecture to the outsourced program is the signing and development of the service level agreement with the supplier and contractor for completing the activities within scheduled time and cost. The service level agreement sets the idea management operation to bring innovation in the working structure of the existing company. The continuity of the project can be retrieved with the deployment of the backup schedule and program for the management of business activities (Thomson, 2012). The deployment of actions and on-going processes helps in changing the scenario of the current working program of the Aztek organization because it indulge the communication platform between the participating units s uch as executive committee, management committee, and operational committee. The satisfaction level of the customers can be improved with the management of progress reports. The escalations received help in management of the financial area, conflicts and dispute resolution, and compliance management program (Sen, 2009). Use of Research Methodologies: The accuracy of the research methodologies helps in achieving the project objectives. The company is planning for the deployment of the outsourced platform for reducing the risk associated with the project development plan. The data should be collected in the direction to verify and validate the advantages associated with the implementation of the outsourced program in the working structure of the organization. The qualitative and quantitative approaches are used for gathering data in the direction of outsourcing program. Interview: The interview is conducted with the top executives with the organizations which are working on the outsourced program to know the benefits and flaws of the new program. It helps in finding out the research questions such as Is the outsourced program helps in increasing the turnover of the company? The outsourcing progam plays a vital role in the development of the skills and expertise in the behaviour of the working employees. It helps in identifying the time and activities which can be efficiently outsourced to the third party. It helps in collecting data which can develop the alternative plan for resolving the issues associated with the working structure. Sampling: The small population is chosen for testing the efficiency of the outsourced program by documenting the findings of the testing program undertaken for completing the outsourced program for the organization. It has been analysed that around 25% of the turnover can be improved with the deployment of the outsourcing activities. Amalgamation of different sources for the data collection process: The primary data and secondary data should be collected on the basis of research questions designed for undertaken the research methodology. It helps in finding out the negative and the positive escalation associated with the working of outsourced program. Review of financial sector with the deployment of outsourced program: From the research and analysis, we have concluded that the outsourcing program increases the business value of the organization. It plays a vital role in increasing the turnover of the company. It is the cost effective technique for managing the cost spent on purchasing the required resources for the organization to complete the business plan on time. The third party will take over the working program of the Aztek enterprise for improving the financial condition of it. The turnover of the company helps in generating goodwill of the organization among the customers. The customers get attracted towards the enterprise for increasing the profitability ratio of the Aztek organization. The skilled employees play an important role in the development of the global market. The outsourcing company should work under the regulatory compliance of the government for increasing the authentication of the activities performed to resolve the legal associated with the working culture of the enterprise. The uncertainty can raises the budget allocated to the delivery of each outsourced activity. The impact of the failure of planning activities can be seen on the over budgeting of the cost The functionality of the traditional and the existing working can be completely changed with the deployment of the innovative outsourced program. The outsourcing of the processes and project activities are equipped with financial statement of the enterprise. The cost of completing the activities can be efficiently minimized with the involvement of third party in the working platform of the Aztek business terminology (Patil, 2013). The management of the ethical code of the conduct helps in improving the financial statement of the enterprise which are classified as effective management of the banking transaction, customers code for banking transaction processes, association and deployment of financial plan, and deployment of financial and insurance services. The service providers are working on acco mplishing the business activities within the time limit so at to complete the project within the offered budget of the project. The analysis of the sponsorship helps in identifying the financial condition of the organization (Mirkovic, 2007). The growth and the turnover of the company can be efficiently improved with the effective management of the working processes. The activity of outsourcing works on providing key resources at the time of demand. The reviewing of the financial condition of the firm helps in analysing the work flow and management of outsource activities which plays a key role in the development of the complete project. The handling of the activities to the third party helps in the financial growth of the enterprise. Impact on existing traditional security system with the deployment of outsourcing program: The changes in the functional and operational program of the traditional working environment help in enhancing the working culture of the Aztek enterprise (Jansen, 2011). The management of the business processes according to the new and trendy techniques of the outsourced program helps in creating the new working climate for the improvement of technical and operational skills of the working employees. The employees can sharpen their skills and expertise with the training and development program according to the need and requirement of the outsourced program. The activity of outsourcing indulges the inclusion of third party in the working environment of the enterprise which can be the gap and breakthrough for the occurrence of data leakages for the loss of confidential information of the existing firm (Moore, 2008). The loss of confidential information can result into the occurrence of obscure in the working environment and flow of activities. The purpose of the enterprise to outsourc ed their business processes to the third party is to minimize the cost associated with the completion of activities, deployment of strategic decision for increasing the flow of operational perspective view of the working processes, unavailability of the skilled and expertise team members and other participating unit according to the requirement of business processes, unavailability of the skilled workers in the outer space of the firm, and the constraint and pressure of completing the project on time and within allocated cost (Kelvin, 2013). The security and risks associated with the outsourced business operations is the major concern of the Aztek enterprise. There is requirement arises of the new security and risk mitigation system for the outsourcing of the business operation are categorised as migration platform for outsourcing processes, transmission of activities involves the data conversion for managing the outsource program, efficiency of the resources available, maintainabil ity of the control structure of business sequence, involvement of external parties for the inclusion of service provider, and satisfying customers credentials. The international standards should be included in the development of the security architecture of the Aztek enterprise. The focus of the new system involves the development of the new environment for increasing the efficiency of the existing system. The activities which are involved in the security architecture of the Aztek enterprise are accuracy, integrity, confidentiality, management, maintenance, transmission process, and others. The maintainability of the enterprise depends on the pillars of privacy and confidentiality. The service level agreement plays an important role for the management of business processes. Data flow for the management of data security of the Aztek organization: The distribution of the processes to the multiple sites of the outsourced program is equipped with various challenges for the continuity of the business process on the outsourced environment. The third party focuses on the business processes for acknowledging the capabilities of the company to cope up with the development of the project. The productivity of the organization can be improved with the outsourcing curriculum of the processes. The efficiency of the stakeholder depends on the procedure of data security plan. The inclusion of the pilot process helps in knowing the security procedures which are used for providing security to the data (Hogmen, 2012). The continuity of the project can be retrieved with the deployment of the backup schedule and program for the management of business activities. The cryptographic procedures are used for encryption and decryption of required data at sender and receiver end. The following flowchart gives the detail of processes which are involved for managing the flow of data securely between the participating units in the outsourced network of activities. In this flowchart, we analyse that the outsourcing of activities depends on analysing the requirement of the Aztek enterprise. The activity of outsourcing works on providing key resources at the time of demand. The reviewing of the financial condition of the firm helps in analysing the work flow and management of outsource activities which plays a key role in the development of the complete project (Cobb, 2013). The pilot processes and interviewing techniques should be used for knowing the requirement of the client. The service level agreement should be signed for managing the security of data in the maintenance and deployment of the outsourced program. The participating units focus on the quality of the activities for managing the security of data to retain its confidentiality and integrity for achieving accuracy in the final project. Threat, vulnerabilities, and consensus Matrix: Risks Description Priority Impact Mitigation strategies Inefficiency in the designing process of the outsourced third party The efficiency of the third party can be measured with the analysis of the initiative taken by the company to start the project. The negative escalation can result in the flaws occurred in the development of the final output. Inadequacy and inaccuracy in the estimation of the cost can affect the working procedure of the enterprise High The failure of the project at the completion of the final activities Inclusion of automatic CADD system for the development of the design for competing the project activities Unavailability of the skills and expertise in the working employees The analysis should be done for identifying the expertise which exist in the working employees of the outsourced company. The selection of the employees to complete the tasks is the vital role in the handling of the outsourced program. High The delay in the project can occur due to the Unavailability of the skills and expertise in the working employees Inclusion of training and development program Relationship between the uncertainty and the business activity plan Risk associated with the planning phase for synchronizing the outsourcing activities. The cost effective techniques are not efficiently used in the planning of outsourcing procedures Medium It can raises the budget allocated to the delivery of each outsourced activity. The impact of the failure of planning activities can be seen on the over budgeting of the cost PMBoK standards should be used Inefficiency in the activity management plan The uncertainty is the major factor which is responsible for the incompletion of outsourced activities. The scheduling of the business activity plan can result into the failure in delivering the project on time Low The chance of uncertainty to occur is very low but it can affect the baseline of the completion of the project. Reviewing of the business activity plan Use of out-dated and expertise The outsourced company does not use the upgraded version of application for completing the business activity of the Aztek organization Low It can affect the inefficiency and low quality output The upgraded version of equipment should be used for completing the business operation of the Aztek enterprise. The development of the mitigation plan is the result of using expertise, knowledge and skills in the effective and efficient manner. Inclusion of endemic processes The endemic processes of the outsourced program can affect the work flow in completing the outsourced program. The expertise employees of the third party can be involved in the endemic processes of the outsourced program High Delay in the delivery of the project within the allocated baseline of completing the activities. It can raises the dissatisfaction in the employees of the Aztek organization. Inclusion of expertise employees of the Azte organization in the third party development program because it can help in generating new ideas and complete the outsourced activities in the allocated time. Association of the hidden cost with the business activity chart The inefficiency in the cash flow statement increases the concern of raising the hidden cost associated with the deployment of the business activity chart. Low Over budgeting of the project due to the inclusion of hidden cost with the business activity chart. Relocation and reviewing business activity chart for the allocation and estimation of correct inflow and outflow of the cost No new innovation Practising of the traditional working of the outsourced company can limit the innovation in the designing capabilities of the enterprise. The outsourcing platform can result in the wastage of inner talent, experience knowledge, and expertise of the working employees of the Aztek organization Medium Demotivation in the working employees of the Aztek enterprise due to deficiency in the inner talent, experienced knowledge, and expertise. Involvement of the employees on the working platform of the third party. Data protection and security risks The inclusion of breaches in the data protection and security program of the enterprise can affect the working culture of the outsourced program. The privacy, confidentiality, integrity, and accuracy are the major concern area in the data transfer program across the Aztek and outsourced organization High The inefficiency in the completion of activities due to the loss of data confidentiality, accuracy, and integrity program. Antivirus and antimalware program should be used Intrusion detection and prevention system should be used Firewall management system Not Using of Experienced knowledge The expertise employees of the third party can be involved in the endemic processes of the outsourced program. Practising of the traditional working of the outsourced company can limit the innovation in the designing capabilities of the enterprise. The outsourcing platform can result in the wastage of inner talent, experience knowledge, and expertise of the working employees of the Aztek organization High Dissatisfaction in the working employees which can affect the working procedures undertaken by the employees for finishing the activities. Involvement of the employees on the working platform of the third party Inefficiency of the outsourced company The processes used for completing the outsourced company are inefficient High Failure of the project can raises dissatisfaction in the stakeholders The review of working culture of the outsourced company should be undertaken with th accordance of the checklist developed for outsourcing the business activities (Kavcic, 2014). Limited use of regulatory compliance program Inefficiency in using regulatory compliance program of the government Low Negotiation in the deployment of business activities Reviewing of requirement specification plan Difference in the service level agreement The services are not efficiently provided by the outsourced company as mentioned in the service level agreement Low Failure of the project can raises dissatisfaction in the stakeholders The review of working culture of the outsourced company should be undertaken with th accordance of the checklist developed for outsourcing the business activities. Chaotic environment The role and responsibilities are not efficiently divided between the participating unit which can raises the dissatisfaction of the working employees Low Inefficiency in completing the business activities The analysis of the skills and expertise should be undertaken before distributing the roles and responsibilities of the working employees. Discussion: It has been identified that the strategic and tactics decision should be taken for outsourcing the business activities for improving and increasing the turnover of the Aztek enterprise. From the research and development program it has been concluded that the 30% of the profit can be improved with the inclusion of outsourcing program. The continuous improvement program helps in increasing the efficiency of the business activity plan. The contingency plan can be leveraged down for the involvement of the continuous training program. The feasibility study helps in identifying the inefficiency and flaws of the existing culture. The quality of the processes can be improved with the deployment outsourcing model. The IT operations can be outsourced for increasing the functionality of the business operations of Aztek organization. The functionality of the outsourcing helps in increasing the cooperation and coordination between the business processes. The utilization of resources helps in deve loping new environment for the working culture of the participating units by the management of demanding resources (Alner, 2015). The upgrading of the existing platform with the inclusion of new technologies helps in providing the quality of work for increasing the efficiency of the deployed outsourced program. The newer application of outsourced program changes the scenario of the Aztek organization. The involvement of the stakeholders helps in providing accurate information for increasing the efficiency of the outsourced program. The quality control and assurance activity is the key outcome and consequences of the outsourced program. Recommendation: The quality of the work provided by the Aztek enterprise can be improved with the deployment of activities to the third party because it provides the resources and operational processes for completing the activities within time and cost by maintaining the demand and supply of the resources. The outsourcing of activities to the third party for the completion of project on time is recommended for the Aztek enterprise. It has been seen that the outsourcing program can increases the turnover of the enterprise with ease for providing the project on time to the customers. It helps in raising the satisfaction level of the customers which make them bounded and loyal towards the services of the Aztek organization. The processes of outsourced program should be mapped with the standard policies and security procedures to provide security to the existing system. The risk management program helps in minimizing the risks associated with the outsourced program. The 60% of the risks can be overcome with the inclusion of risks mitigation plan with the deployment of each activity. The knowledge area of the working employees can be enhanced with the implementation of training and development program according to the global need and requirement (Chaudhary, 2013). The quality control is the major factor which is responsible for the management of the outsourced program. The continuation of the outsourced program helps in reducing the cost with the deployment of associated activities. The systematic treatment of the business operational plan in the outsourced environment can affect the working of the Aztek enterprise. The outsourced program works effectively in the management of technical risk, legal risk, economic risks, operational risks, resource allocation risks, and other. The feasibility analysis and reviewing of the procedures helps in the selection of activities which should be outsourced on the third party environmental platform to increase the effectiveness of the working c ulture of the undertaken enterprise (Brown, 2014). The development of the mitigation plan is the result of using expertise, knowledge and skills in the effective and efficient manner. The effective use of quality and cost can plays a vital role in reducing the risks associated with the operational processes undertaken by the third party outsourced program. Conclusion: Outsourcing program plays a vital role in increasing the turnover of the company. It is the cost effective technique for managing the cost spent on purchasing the required resources for the organization to complete the business plan on time. We analyse that the outsourcing of activities depends on analysing the requirement of the Aztek enterprise. The pilot processes and interviewing techniques should be used for knowing the requirement of the client. The inclusion of outsourcing program helps in completing the project with the use of new tools and technologies by the third party. The innovation can be created in the quality of work provided to the stakeholder at the completion of the outsource program. The security and risks associated with the outsourced business operations is the major concern of the Aztek enterprise. The upgrading of the existing platform with the inclusion of new technologies helps in providing the quality of work for increasing the efficiency of the deployed ou tsourced program. References: Alner, M. (2015). The effects of outsourcing on information security. Retrieved from https://www.ittoday.info/AIMS/DSM/82-01-90.pdf Brown, S. (2014). Global outsourcing and insourcing survey. Retrieved from https://www2.deloitte.com/content/dam/Deloitte/us/Documents/strategy/us-2014-global-outsourcing-insourcing-survey-report-123114.pdf Chaudhary, D. (2013). Consider IT infrastructure outsourcing. Retrieved from https://www.netmagicsolutions.com/data/images/WP_Why-outsource-your-IT-Infrastructure16-08-231471935316.pdf Cobb, M. (2013). Outsourcing security issues: Managing outsourced software development. Retrieved from https://www.computerweekly.com/tip/Outsourcing-security-issues-Managing-outsourced-software-development Hogmen, G. (2012). Benefits, risks, and recommendation for information security. Retrieved from https://resilience.enisa.europa.eu/cloud-security-and-resilience/publications/cloud-computing-benefits-risks-and-recommendations-for-information-security Jansen, W. (2011). Guidelines on security and privacy in public cloud computing. Retrieved from https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-144.pdf Kavcic, K. (2014). Strategic management of outsourcing. Kelvin, K. (2013). Guidelines on information security. Retrieved from https://rbidocs.rbi.org.in/rdocs/content/PDFs/GBS300411F.pdf Mirkovic, N. (2007). IT infrastructure outsourcing: Risks management by the process improvement . Moore, R. (2008). IT outsourcing security. Retrieved from https://www.infosec.gov.hk/english/technical/files/itos.pdf Patil, S. (2013). A review of outsourcing. Retrieved from https://ac.els-cdn.com/S1877042814031176/1-s2.0-S1877042814031176-main.pdf?_tid=aaea2a40-a1a7-11e7-9d66-00000aacb35dacdnat=1506312895_b1b8628d0be2eb7fc18481cb9fb381bf Peters, I. (2015). Outsourcing and the role of internal audits. Retrieved from https://www.iia.org.uk/media/1431908/Outsourcing-and-the-role-of-internal-audit-FINAL.pdf Sen, A. (2009). Outsourcing of research and development activities. Retrieved from ftp://ftp.repec.org/opt/ReDIF/RePEc/ibf/gjbres/gjbr-v3n1-2009/GJBR-V3N1-2009-7.pdf Thomsom, D. (2012). Information technology outsourcing. Retrieved from https://chapters.theiia.org/montreal/ChapterDocuments/GTAG%207%20-%20Information%20technology%20outsourcing_2nd%20ed.pdf