Sunday, December 29, 2019

The Attack On Pearl Harbor - 1113 Words

On December 7, 1941 America suffered one of its first terrorist attacks when a swarm of Japanese warplanes emerged from the clouds bearing their red symbol of the rising sun. Only one day after, December 8, the United States Congress declared war on the Empire of Japan, sparking our involvement in World War Two. Only a couple years after the attack on Pearl Harbor, America was already on its way to creating the atomic bomb. By July of 1945, America was ready to test its first bomb and was successful. America had only two test drops before deciding to unleash the uncanningly deleterious weapon they had created on Japan August 6 and 9, 1945. Considering the thousands of civilians that died instantly and the radioactive aftermath, the†¦show more content†¦Some could say that the main reason America made the bomb in the first place, was to show their potential power. Before all of this was coming into action, the U.S. and Russia made an agreement at the Yalta Conference that Rus sia would join the war under certain conditions. They had to have their status quo in Mongolia preserved, acquire more land, ports and railroads in order join the efforts (United States. Cong.). Once America made the bomb and decided that it was to be used, people like Winston Churchill decided that they did not want Russia to join the war. With the bomb and the new fear we created, we no longer depended on Russia’s help to win the war with Japan (Churchill, Winston). Americas other political justification was that the bomb would order the complete surrender of Japan. According to Henry Stimson, if they had continued to fight, the war would have gone on until 1946. They believed that in bombing Japan, the war would end quicker. Leo Szilard even states that the war would have ended on its own in under 9 months. They killed millions of innocent lives in return for a slightly shorter battle just to save themselves and display their superiority. Many argue that this was justified because there was warning. Although this may be the case for the first dropping, there was no warning for the second, according to the movie â€Å"Hiroshima: Why the Bomb was Dropped†. With America s desire to prove to Russia,Show MoreRelatedThe Attack On Pearl Harbor1582 Words   |  7 PagesThe attack on Pearl Harbor is known today as a horrible event brought on by revenge and Japan’s need for control. This event is one of the single most important events in American history proving that the Japanese armed services may have been strategically stronger and more powerful at one time. The United States was not involved in WWII; that began with Germany invading Poland. The attack on Pearl Harbor, however, led to the United States’ involvement in World War II. It also brought with itRead MoreThe Attack on Pearl Harbor754 Words   |  3 PagesAttack on Pearl Harbor Introduction. I chose this battle because I had been hearing about the attack on Pearl Harbor, but I did not know much about it. This paper talks about the countries that fought in this battle, where the battle was fought, what the geography was like during the battle, what the weather was like, what happened during this battle, how many casualties occurred, other things I learned about the battle, who won the battle, and how the battle was important to WWII. What countriesRead MoreThe Attack At Pearl Harbor1596 Words   |  7 Pages THE ATTACK AT PEARL HARBOR Colleen Hendy American History 1302 Professor Benjamin Carr July 25, 2016 The Attack at Pearl Harbor Seventy-five years ago, in the early morning of December 7, 1941, â€Å"the Japanese launched hundreds of attack planes off warships, 230 miles off the coast of Hawaii in the Pacific Ocean.† 2 The United States had no indication that an attack was about to occur. These planes were â€Å"heading straight to Oahu, the home of Pearl Harbor and the Unites States PacificRead MoreThe Attack On Pearl Harbor1741 Words   |  7 Pagescountries involved. Even though those were the major countries involved at the beginning, one major turning point in war was when the United States was brought into war, which probably changed how the war ended by American intervention. The attack on Pearl Harbor is what mainly triggered the action into being involved at war from the U.S. (Unfinished Nation, p612), and from that point on, the Japanese were treated very different, with discrimination and exclusion for many years (Identification RecordsRead MoreThe Attack Of Pearl Harbor1351 Words   |  6 PagesJapanese forces attacked Pearl Harbor. They demolished the entire United States Pacific Fleet. At the time, Franklin Delano Roosevelt was the thirty-second president of the United States. He was in his third term when the devastating attack began. The attacked took place at the U.S. Naval Base in Oahu, Hawaii. The air attack started at 7:48 in the morning, Hawaiian time. There were about 3,500 casualties from the bombing, and more than 2,300 of them were deaths. The attack beached or sank 12 AmericanRead MoreThe Attack Of Pearl Harbor832 Words   |  4 Pages On December 7, 1941 the world was embroiled into the attack of Pearl Harbor in Hawaii. Japan attacked Pearl Harbor with their ally, Nazi Germany. It started with Japan being a bit suspicious and not so thrilled with the Treaty of Versailles as it was seen as a way to keep everything in ship shape even if there were some disagreements in the world. The attack of Pearl Harbor could have been prevented if America had not forced them to trade, had not moved the Pacific Fleet in California, and by notRead MoreThe Attack On Pearl Harbor1442 Words   |  6 Pages West of Honolulu in Pearl Harbor, Hawaii on December 7th, 1941 Japanese pilots and leaders could be seen with eyes glowing with pride. For they had accomplished a great thing that day in the lagoon harbor. At that point they felt they has honored their Country with flying colors. Much of the harbor and surrounding lands was a United States naval base and was also the headquarters of America’s Pacific fleet. On December 7th, 1941, the Japanese attack on Pearl Harbor in Hawaii became America s Read MoreThe Attack On Pearl Harbor917 Words   |  4 Pageslive in infamy (Staff, 2009). This famous words were delivered by former United States President Franklin D. Roosevelt. A day that change America forever. This paper will provide a description of the events that build up to the attack on Pearl Harbor, the effects of the attack and will al so provide insight on how the United States responded. Events For four years, conflict between China and Japan continued to escalate influencing U.S. relations with both nations, and eventually contributed to theRead MoreThe Attack On Pearl Harbor1042 Words   |  5 PagesJonah Keller Grace Komorous WWII Report 15 March 2017 Pearl Harbor Introduction â€Å"Pearl Harbor is an inlet, or bay on the southern coast of Oahu, an island in Hawaii.† The attack on Pearl Harbor was a surprise attack on the U.S naval base, located in Hawaii. On December 7, 1941 Japanese warplanes carried out an attack on the U.S naval base Pearl Harbor. Japan’s plan was to just completely destroy the pacific fleet. That way the Americans would not be able to fight back as Japan’s armed forces spreadRead MoreThe Attack On Pearl Harbor1478 Words   |  6 PagesOn December 7, 1941 Japan stealthily attacked the U.S. Naval base located at Pearl Harbor, Hawaii resulting in many casualties. This IMC plan will outline the objectives, strategies and tactics in order to promote awareness of the attacks as well as develop positive community involvement. The challenge is to inform the residents of Hawaii as well as the general American public concerning the attacks on Pearl Harbor. The objectives discussed in this plan will be achieved through the creation of a

Saturday, December 21, 2019

William Hemingway s The Cafe - 1246 Words

After the older waiter turns off the light to the cafe and closes up, he then proceeds to carry the conversation with himself. This again, displays his loneliness. The text states, â€Å"Turning off the electric light he continue the conversation with himself. It is the light of course but it is necessary that the place be clean and pleasant. You do not want music. Certainly you do not want music. Nor can you stand before a bar with dingily although hat is all that is provided for these hours† (Hemingway, 382). He continues to convince himself that the cafe is needed for all the people who are lonely, like him, and the old man. However, it is time to close up and head home. Instead, he decides to go to a bodega. The text doesn’t overtly state why he goes to the bodega, but you can infer that he is trying to understand the younger waiter. He knows that a bodega isn’t like the cafe at all, but he is willing to give it a try. Besides, he doesn’t want to go ho me to nothing. The text goes on to say the following,â€Å"What did he fear? It was not fear or dread. It was a nothing that he knew too well. It was all a nothing and a man was nothing too. It was only that and light was all it needed and a certain cleanness and order† (Hemingway, 383). In order to cope with nothing, he too, needs to go to a cafe but none are open at this hour. He then goes on to say a prayer but replaces the lord, god, and religion for nothing or nada. For the older waiter, he doesn’t find meaning in religion. ItShow MoreRelatedResearch Paper-Manila Hotel3275 Words   |  14 Pagesreceptions, anniversaries, conventions, and exhibitions. II. Body The hotel contains the offices of several foreign news organizations, including The New York Times. It has hosted numerous historical persons and celebrities, including authors Ernest Hemingway and James A. Michener, U.S. President John F. Kennedy, The Beatles, actors Michael Jackson, Douglas Fairbanks, Jr., and John Wayne, publisher Henry Luce, entertainer Sammy Davis, Jr., Prime Minister Sir Anthony Eden, and many various world leadersRead MoreI Just Wanna Be Average6008 Words   |  25 Pagesmultiple-choice exams. Hed poke me in the back: once for the answer under A, twice for B, and so on; and when hed hit the right one, Id look up to the ceiling as though I were lost in thought. Poke: cytoplasm. Poke, poke: methane. Poke, poke, poke: William Harvey. Poke, poke, poke, poke: islets of Langerhans. This didnt work out perfectly, but Dave passed the course, and I mastered the dreamy look of a guy on a record jacket. And something else happened. Brother Clint puzzled over this Voc. E d. kid

Friday, December 13, 2019

A Brief History of Stephen Hawking Free Essays

Today I will introduce a famous and outstanding scientist to you. A brief history of Stephen Hawking. The main contents include four aspects Stephen William Hawking is an English theoretical physicist and cosmologist, whose scientific books and public appearances have made him an academic celebrity. We will write a custom essay sample on A Brief History of Stephen Hawking or any similar topic only for you Order Now Stephen William Hawking was born on 8 January 1942 (300 years after the death of Galileo) in Oxford, England. His parents’ house was in north London, but during the Second World War Oxford was considered a safer place to have babies. When he was eight, his family moved to St Albans, a town about 20 miles north of London. At 11 Stephen went to St Albans School, and when he was 17 he went on to University College, Oxford, his father’s old college. Stephen wanted to do Mathematics, although his father would have preferred medicine. Mathematics was not available at University College, so he did Physics instead. After three years and not very much work he was awarded a first class honours degree in Natural Science. Stephen then went on to Cambridge to do research in Cosmology, there was no-one working in that area in Oxford at the time. His supervisor was Denis Sciama, although he had hoped to get Fred Hoyle who was working in Cambridge. After gaining his Ph. D. he became first a Research Fellow, and later on a Professorial Fellow at Gonville and Caius College. After leaving the Institute of Astronomy in 1973 Stephen came to the Department of Applied Mathematics and Theoretical Physics, and from 1979 to 2009 he held the post of Lucasian Professor of Mathematics for 30 years. The chair was founded in 1663 with money left in the will of the Honorable Henry Lucas, who had been the Member of Parliament for the University. It was first held by Isaac Barrow, and then in 1669 by Isaac Newton. Stephen Hawking has worked on the basic laws which govern the universe. He showed that Einstein’s General Theory of Relativity implied space and time would have a beginning in the Big Bang and an end in black holes. These results indicated it was necessary to unify General Relativity with Quantum Theory. One consequence of such a unification that he discovered was that black holes should not be completely black, but should emit radiation and eventually evaporate and disappear. Another conjecture is that the universe has no edge or boundary in imaginary time. This would imply that the way the universe began was completely determined by the laws of science. Stephen has many technical publications, such as The Large Scale Structure of Spacetime, 1973. This is a book written by Stephen Hawking and George Ellis. They attempt to describe the foundation of space itself and its nature of infinite expansion, mathematically as well as theoretically. The book is too hard to read, he derides it as â€Å"highly technical and quite unreadable† and advises readers to not seek it out. Information Loss in Black Holes is an article about the question of whether information is lost in black holes. He also has three popular books published. The first one is his best seller A Brief History of Time, which stayed on the British Sunday Times bestsellers list for a record-breaking 237 weeks. The book attempts to explain a range of subjects in cosmology, including the Big Bang, black holes and light cones, to the nonspecialist reader. Its main goal is to give an overview of the subject, but unusual for a popular science book, it also attempts to explain some complex mathematics. The second one is Black Holes and Baby Universes and Other Essays, It is a collection of both introductory and technical lectures on the thermodynamics of black holes, but it also includes descriptions on Special Relativity, General Relativity and Quantum Mechanics. This collection of lectures also includes essays on Hawking’s personal life when he was young and, most famously, his disease, motor neurone disease. The book also includes an interview of Stephen Hawking. The third one is The Universe in a Nutshell. The book explains to a general audience various matters relating to his work the part of superstring theory in quantum mechanics. It tells the history and principles of modern physics. It is generally considered to be a sequel to A Brief History of Time. Stephen has many interesting ideas. He is known for his three big ideas. Idea about Alien life, he suspect there could be life and intelligence out there in forms we can’t conceive. Just as a chimpanzee can’t understand quantum theory, it could be there are aspects of reality that are beyond the capacity of our brains. Idea about Time travel, he believes that we can start our time travel through wormholes. He thinks wormholes are all around us, only they’re too small to see. They occur in nooks and crannies in space and time, nothing is flat or solid. If you look closely enough at anything you’ll find holes and wrinkles in it. It’s a basic physical principle, and it even applies to time. Idea about Leaving earth, He said if humanity is to survive long-term, we must find a way to get off planet Earth. It will be difficult enough to avoid disaster in the next hundred years, let alone the next thousand or million; our only chance of long-term survival is not to remain inward-looking on planet Earth, but to spread out into space. Professor Hawking is the recipient of many awards, medals and prizes, Known for Wolf Prize, Prince of Asturias Award, Copley Medal, and Presidential Medal of Freedom. And he is also a Fellow of the Royal Society and a Member of the US National Academy of Sciences. This picture shows President Obama talks with Stephen Hawking before presenting him the Presidential Medal of Freedom on 12 August 2009. The Medal of Freedom is the nation’s highest civilian honour. Stephen Hawking continues to combine family life (he has three children and one grandchild), and his research into theoretical physics together with an extensive programme of travel and public lectures. How to cite A Brief History of Stephen Hawking, Papers

Thursday, December 5, 2019

International Journal Applications Computer -Myassignmenthelp.Com

Question: Discuss About The International Journal Applications Computer? Answer: Introducation Mobile applications are being increasingly used by the users and business organizations all across the globe. The increase in the use of enterprise mobile applications has allowed the business units to flourish as the mobile apps enable them to reach out to maximum number of customers. The enterprise mobile application is required to be developed for an insurance company. The company provides insurance plans and policies to the customers and there is a wide range of policies that are offered. The sales representatives and sales executives are hired to explain the customers about the details of the insurance policies. With the expansion of the business tasks and activities, it is now required to develop and implement a sales support application for the organization (Li and Steenkamp, 2010). The proposal of the application has already been presented and the same has been appreciated by the stakeholders of the organization. Proposed Solution The solution that has been proposed is in the form of an enterprise mobile application. The insurance company is expanding at a rapid rate. There are new sales personnel and customers that are becoming a part of the company with its expansion. Due to the expansion of the business, it is no longer possible for the sales representative to explain all the details of the insurance plans and policies to the customers. Also, the increased information and data sets are now becoming difficult to manage (Unhelkar and Murugesan, 2010). The proposed solution will allow the organization to list all of its plans and policies on the mobile application for the customers to view the details of the same. The plans selected and preferred by the customers will then be explained to them by the sales representatives and executives. There will be increased transparency that will be set up and managed between the customers and the sales staff. The changes in the policies and plans will also be easy to make. The information will be easily available and there will be no issues associated with replication and modification. In case of absence of any initiatives by the organization in this regard, it will become very difficult to keep a track of all the information and data sets. It will also become difficult to maximize the customer base as the updated information on the insurance policies will not be available to the customers as per their expectation. The enterprise mobile application will overcome all of these problems and issues. Assumptions The project resources will be provided with the tools and equipment that will be necessary for the completion of the project tasks and activities. The project resources will be provided with the environment that will be necessary for the completion of the project tasks and activities. The budget for the project that has been allocated for the completion of the project tasks will be $100,100. There will be five phases that will be present in the project and the project will be completed in a maximum of 115 days. Strategic Alignment with the Organizations Business IT Strategies Alignment Perspective Description Strategic Execution The strategies and objectives of the organization are to make sure that the maximum number of insurance plans and policies are sold and provided to the customers. The goal of the enterprise mobile application falls in line with the organizational strategies as the application will enhance customer engagement and relationship (Gomes and Yasin, 2017). There are various phases and steps that are involved in the project of the development and deployment of the enterprise mobile application. These phases will make it easy to achieve the project and organizational strategies. The management has taken the business decisions to allow the project resources to be provided with adequate tools and equipment for the completion of the project activities. Technological Aspect The enterprise mobile application will be developed in such a manner that it can be used on Android, iOS and other mobile operating systems. The application will be compatible with the rest of the technical tools and equipment that are being used in the organization. The programming language for the application would be PHP and this language will allow the application to be flexible, inter-operatable and adaptable in nature. The application will make use of MySQL and cloud databases for the storage, management and retrieval of information. The information will remain safe and secure on these platforms (Babu, 2017). There will be cloud models that will be used in the application for delivery and deployment. These would include private cloud model and PaaS model. These will provide the required level of security and privacy for the application. Competitive Potential The use of enterprise mobile application will improve the customer relationships and the engagement of the customers with the organization. This would allow the improvement of the organizational reputation in the market. There are many insurance companies that are present in the market. However, with the set up and implementation of the enterprise mobile application, the organization will gain a competitive advantage. Service Level The project will have the resources selected as per their skill sets and knowledge. The allocation of duties and responsibilities will be done in such a manner that there is no overlapping of the resources. The changes that will be launched by the project will have numerous benefits on the employees, that is, the sales staff associated with the company. It is because of the reason that the business activities will be streamlined and there will be increased customer information that will be provided to the sales executives. It will allow them to analyze the information and data sets to understand the preferences and choices of the customers in terms of their desired plan and policy. Value Proposition There will be a number of benefits and advantages that will be provided by the enterprise mobile application for the insurance company. Target Buyer Problem that will be Solved Reasons for the Preference to the Solution Sales Representatives and Executives The updated customer details, their preferences and choices will be available to the sales personnel and staff members. The accessibility of the mobile application is better as compared to the website. The integration of the mobile application is also easier and better than the website. The customer information will be readily available on the mobile application. Customers The customers will be able to view the details of the insurance plans and policies. The engagement and relationship with the organization will also improve. The accessibility of the mobile application is better as compared to the website. The integration of the mobile application is also easier and better than the website. The customer information will be readily available on the mobile application. Business Partners The revenues and profits earned by the organization will improve as the existing performance, quality and operational issues will be resolved. The customer base will also increase along with their trust in the company. The transparency between the customers and sales executives will improve with the implementation of the mobile application for the company. This level of transparency will be difficult to obtain with the setting up of the website. The assessment of the requirements and risks will also be readily done. Project Sponsor The revenues and profits earned by the organization will improve as the existing performance, quality and operational issues will be resolved. The customer base will also increase along with their trust in the company. The transparency between the customers and sales executives will improve with the implementation of the mobile application for the company. This level of transparency will be difficult to obtain with the setting up of the website. The assessment of the requirements and risks will also be readily done. Suppliers and Vendors The increase in the business operations will demand increase need of networking equipment and database requirements for the application. The transparency between the customers and sales executives will improve with the implementation of the mobile application for the company. This level of transparency will be difficult to obtain with the setting up of the website. The assessment of the requirements and risks will also be readily done. Project Costs There are various costs that are associated with the project. These include the cost of resources, development costs, design and testing costs, cost of trainings and cost of support and maintenance. There will also be a one-time cost involved which would include the cost of tools and equipment. The cost has been estimated as per the project activities and the estimation method used has been bottom-up estimation. The resources and the cost associated with the resource have been described in the table below. Role of the Project Resource Type Max. Units Std. Rate Project Manager Work 100% $ 72.00/hr Technical Expert Work 100% $ 58.00/hr Business Advisor Work 100% $ 62.00/hr Senior Mobile Application Developer Work 100% $ 54.00/hr Junior Mobile Application Developer Work 100% $ 45.00/hr Mobile Application Tester Work 100% $ 40.00/hr Network Expert Work 100% $ 48.00/hr Network Analyst Work 100% $ 38.00/hr UI/UX Expert Work 100% $ 60.00/hr Mobile App Designer Work 100% $ 60.00/hr Trainer Work 100% $ 62.00/hr Technical Writer Work 100% $ 55.00/hr Project Management Control There are various management methodologies that have been created which include Project Management Body of Knowledge (PMBOK), Projects In Controlled Environment (PRINCE2) and agile methodology. The management methodology that is suitable in the case of enterprise mobile application for the insurance company is PMBOK. It is because of the reason that the project risks, conflicts and issues will be adequately handled by this approach. There are various knowledge areas that come under PMBOK for the management of the cost, schedule, resources, scope, risks and many more (Csbdu, 2014). The methodology will allow the project leadership and management with the ability to handle all of the project tasks and activities in an efficient manner. Management and Overseeing of the Project There will be a Project Manager that will be deployed in the project that will be the primary resource in the project. The resource will be responsible and accountable for the handling and management of the project activities such as planning, control and closure (Pathak, Pateriya and Pal, 2012). Communication and meetings will be managed and facilitated by the Project Manager and will be assisted by the Business Advisor and Technical Expert. There will be communication guidelines and meeting rules that will be followed during the project lifecycle. Information on the Project Progress There will be team meetings that will be organized by the Project Manager on a daily basis. The meeting will be attended by all of the internal project resources. There will be project progress and status that will be discussed in the meeting. The project issues and conflicts will also be discussed in the project. There will also be weekly team meeting that will be organized by the Project Manager with the external stakeholders. The external stakeholders will include Project Sponsor, Business Partners, Suppliers and Vendors along with the end-users. These stakeholders will be provided with the information on the project status and progress (Ucl, 2012). There will also be a reporting structure and format that will be followed during the project timeline to make sure that the latest information on the project progress is provided. The same has been illustrated in the table below. Report Name Report Frequency Report Submitted To Report Submitted By Weekly Status Report Weekly Project Sponsor Project Manager Daily Status Report Daily Project Manager Project Team Members Defect Report Weekly Project Manager and Project Sponsor Mobile Application Tester Closure Report At the end of the project Project Sponsor Project Manager Infrastructure Requirements The enterprise mobile application that will be developed for the insurance company will work on the mobile operating systems as Android, iOS and Windows. These operating systems have been selected as these are the ones that are high on demand in the market. Most mobile devices are either equipped with Android or iOS as the operating platform. Therefore, the availability and accessibility of the application on these platforms will allow maximization of the customer base (Pope-Ruark, 2012). Coding Language and Tools The coding language that will be used in the application for the development of the front end will be PHP. The coding language will provide the qualities such as flexibility, inter-operatibility and adaptability. This will make sure that the application features are incorporated and the application is accessible with ease (Moe, Dingsoyr and Dyba, 2010). Microsoft Visual Studio will be used for the coding purpose, Microsoft Project for the designing of schedule and Gantt chart and the database will be MySQL and cloud databases. There will be testing tools, such as TestLink and Bugzilla that will also be used. Cloud Services There are a number of cloud delivery and deployment models that will be used in the application. The cloud services will be used for the deployment of the application. The private cloud will be used for the purpose of the application deployment. This will provide the desired level of security and privacy to the application. The cloud model will keep the network and information related security risks and attacks aside. There will also be cloud delivery model that will be used. This will be cloud Platform as a Service (PaaS) model. The framework or the platform will be provided for the purpose of cloud delivery. Cloud databases will also be used in the application for the storage and retrieval of information and the data sets (Umsl, 2017). Software Methodologies The design of the mobile application shall be based upon the responsive web design principles. There are various design parameters that must be followed and maintained in the application. These shall include the consistency of the application in terms of the layout, color scheme and theme. The application design must adjust and respond as per the user action. The navigation shall be smooth and the application shall have a high degree of usability. The development methodology that must be followed in the application shall be agile methodology for application development. This methodology will allow the application to be flexible and adaptable in nature. There will be sprints that will be associated with the development approach and every sprint will have a subset of the requirements from the product backlog. The sprint will last for two to four weeks and there will be a daily SCRUM meeting that will be organized and facilitated by the Project Manager (Mahnic and Zabkar, 2012). The changes will be handled in an easy and effective manner with the use of the agile development methodology. There may be many changes that may be made in the requirements and technology associated with the application. The level of customer satisfaction will also improve with the use of agile methodology in the application. This is because of the reason that the customers will be informed about the project progress at all times (Kaur and Bansal, 2017). The agile practices are ad-hoc and value based in nature which will ensure that the application is scalable and supportable in nature. Testing is an important activity in the projects and there are testing practices that are necessary to be taken during the project. There are various types of testing that must be performed in the case of mobile application project. Mobile application testing comprising of system and integration testing practices must be followed and carried out during the project. There shall also be security and performance testing practices that shall be carried out to find out the bugs and defects in the application (Azanha et al., 2017). A defect report must be published at the end of every week and shall be submitted to the Project Manager and the Project Sponsor. Internationalization for a Global Market It is necessary to ensure that the application can be used by the users all across the globe. There are certain features that may promote internationalization for a global market. The language options present in the application must be immense so that the users from every part of the globe shall be able to access the application. The application must ask the user for the preferred language option and it shall be added to the customization features. Similarly, the payment options used in the application for the payment of the insurance plans and policies shall be varied. There shall be international currencies that must be accepted and shall be compatible with the application. It is also necessary for the application to make sure that the information security and privacy laws are followed. There are also many of the ethical and professional codes of conduct shall be followed. In this manner, the internationalization for the global market shall be promoted and maintained in the application. Social Media Integration Strategies It is necessary for the application to be integrated with the social media accounts and platforms so that maximum number of customers and users may get associated with the application. For this purpose, the users shall be allowed to log in to the application using social media accounts, such as, Facebook, Twitter, and Instagram etc. There shall also be an option in the application to post and share information to the social media networks or to pass on the information to the contacts added in the social media accounts. In this manner, the social media networks and platforms will be integrated in the application. It will also make it easy for the sales executives and personnel to gain the information regarding the customer preferences and choices. The social media integration will also enable the executives to post and share the information regarding the latest offerings and details of the new insurance plans and policies (Modeus, 2013). There will be many advantages that will be offered by the social media platforms and networks in terms of the maximization of the customer base. Risk Management There may be many risks that may be associated with the mobile application and each of these risks may have a certain degree of impact and probability associated with them. The risks along with their impact and likelihood, ranking and description along with the response strategy have been described in the table below. Risk Name Description Risk Likelihood Impact Risk Rating (! Is lowest and 5 is highest) Response Strategy Information Security and Privacy Risks There may be execution and occurrence of the information security and privacy risks with the execution of the attacks such as information breaches, information loss and leakage. High High 4 The risk response mechanism and strategy that will lead to the apt treatment of the risks shall be risk mitigation by making use of technical, administrative and physical controls Database Security Risks The confidentiality and privacy of the information may get impacted with the occurrence of SQL injection and database security attacks Medium- High High 4 The risk response mechanism and strategy that will lead to the apt treatment of the risks shall be risk mitigation by making use of technical, administrative and physical controls Network Security Risks Man in the middle attacks, eavesdropping attacks along with the malware attacks may have an adverse impact of the security of the networks. High Medium-High 4 The risk response mechanism and strategy that will lead to the apt treatment of the risks shall be risk mitigation by making use of technical, administrative and physical controls Ethical Risks There may be insider threats and attacks carried out by the members of the internal staff and there may also be non-adherence to the ethical standards and principles. Low High 5 The risk response mechanism and strategy that will lead to the apt treatment of the risks shall be risk avoidance by providing ethical trainings and methods Schedule and Budget Risks There may be schedule or budget overrun that may be witnessed which may lead to the inability to meet the delivery deadlines (Kumar and Gregory, 2013) Low High 5 The risk response mechanism and strategy that will lead to the apt treatment of the risks shall be risk avoidance by excessive monitoring and control Technical Faults The technical tools and equipment may turn faulty and there may be failures that may take place. Medium Low-Medium 3 The risk response mechanism and strategy that will lead to the apt treatment of the risks shall be risk transfer to the suppliers and vendors (Olson, Birge and Linton, 2014) Quality Risks The quality standards and practices may not be followed and adhered during the project tasks and activities. Low High 5 The risk response mechanism and strategy that will lead to the apt treatment of the risks shall be risk avoidance by providing trainings on the quality standards Operational Errors and Mistakes There may be operational errors and mistakes that may be carried out by the end users Low-Medium Medium 3 The risk response mechanism and strategy that will lead to the apt treatment of the risks shall be risk mitigation Integration and Deployment Strategies The application shall be integrated with the rest of the technical systems and tools by carrying out a compatibility analysis as the first step. The networking tools and connections will be integrated first followed by the database and the other applications being used in the organization. The deployment of the application shall be done by making use of the private cloud as the cloud deployment models. The private cloud will be used for the purpose of the application deployment. This will provide the desired level of security and privacy to the application. The cloud model will keep the network and information related security risks and attacks aside (Machado, Pinheiro and Tamanini, 2014). It is necessary that the integration and deployment of the application is correctly done so that the performance of the application is maintained. There shall also be integration testing that must be done so that the application integration and successful deployment shall be ensured. User Acceptance and Change Management User acceptance testing shall be carried out so that the user experience from the application shall be determined. The testing process and practice must be carried out by the end-users and the test cases shall be provided to the users covering the functional and non-functional aspects of the application. The areas of improvements must be highlighted and the changes shall be made. There shall also be customer feedback and comments that must be collected at the end of each sprint (Cervone, 2011). There will be changes that will be presented by the users and there may also be changes that may be requested by the sponsor and end system users in terms of the technology and functionality. These changes shall be managed and handled by using a defined change management plan. There must be phases present in this plan in terms of the change preparation, management and reinforcement. The changes that are approved by the Project Sponsor in terms of the change requests shall be entertained. There must be change handling objectives and methodologies that shall be followed. In this manner, it will be possible to handle and manage the changes with much ease. Application Maintenance The maintenance of the application shall be done by making use of an automated cycle. In this cycle, the application shall be scanned in terms of its functionality and technology that is used. The maintenance cycles must be carried out in the application by highlighting the areas of improvement in terms of the application codes and methods. The patch management plan and cycle shall be followed to highlight the list of the security patches and updates that need to be installed. The incidents reported by the end users shall also be analyzed during these cycles along with the monitoring and analysis of the system and network activity logs. These will bring out the areas of improvements along with the information on the maintenance objectives and goals. The backup of the data and information sets shall also be taken frequently so that in case of a security risk or occurrence, there is no damage done to the information associated with the application. Future Opportunities and Enhancements Technology is changing at a rapid pace and there are many new improvements that are being done in the area of technology. There are many new developments that are now taking place in the area of mobile application development. For the sales support application that will be designed for the insurance company, there must be enhancements that shall be made in the future. There will be many opportunities that will be available to the application development team for the future. Security must be kept as a top priority for the application. It is because of the reason that the threat landscape is changing with each passing day. There are new forms of mobile security risks that are being created and being launched in the market. Therefore, the updates and inclusion of the latest security tools and protocols shall be made to the application. It shall then be followed by the use of Big Data, Business Intelligence and Artificial Intelligence as the technologies. These technologies shall be used and the application functionality shall be upgraded according to the same. The current set of functionalities will use data analysis and warehousing as some of the Business Intelligence technologies. There is a lot of research and development work that is currently going on in these areas that shall be included in the application. The application must add functionalities in terms of the addition of new insurance plans and policies, their comparison with the other insurance providers in the market, display of market trends to the customers and likewise. Conclusions It is recommended that the authentication and access control is used and implemented in the application. The users shall be allowed to securely login by implementing two-fold authentication in the application along with role based and attribute based access control. The application shall also be integrated with the security controls, such as, anti-malware and anti-denial tools along with intrusion detection and prevention tools. It shall also be ensured that the database security is enhanced. Also, the team members that are allocated for the project shall be done on the basis of their skills and knowledge sets. There shall be an analysis of the skills of the project team members that must be carried out in terms of the latest mobile technologies and design parameters. The enterprise mobile application that will be developed for the insurance company shall be done by making use of agile methodology as the development methodology along with the use of Project Management Body of Knowledge (PMBOK) as the management methodology. There shall be involvement of cloud services as cloud based delivery and deployment along with the cloud databases. There are various types of testing practices that must be carried out in terms of the system and integration testing, security and performance testing. The project resources shall be managed by making use of advanced resource management tools and concepts along with the organization of daily team meetings by the Project Manager. An effective communication and reporting structure shall also be followed. References Azanha, A., Argoud, A., Camargo Junior, J. and Antoniolli, P. (2017). Agile project management with Scrum. International Journal of Managing Projects in Business, 10(1), pp.121-142. Babu, M. (2017). Impact of firms customer orientation on performance: the moderating role of interfunctional coordination and employee commitment. Journal of Strategic Marketing, pp.1-21. Cervone, H. (2011). Understanding agile project management methods using Scrum. OCLC Systems Services: International digital library perspectives, 27(1), pp.18-22. Csbdu (2014). A Guide to the Project Management Body of Knowledge. [online] Available at: https://www.csbdu.in/csbdu-old/pdf/A%20Guide%20to%20the%20Project%20Management%20Body%20of%20Knowledge.pdf [Accessed 10 Oct. 2017]. Gomes, C. and Yasin, M. (2017). Toward promoting effective strategic performance: the relevance of the alignment of performance measurement and competitive strategic choices. International Journal of Business Excellence, 12(3), p.329. Kaur, R. and Bansal, K. (2017). Students Performance Analysis Using Scrum Practices. International Journal of Engineering Research and, V6(04). Kumar, M. and Gregory, M. (2013). An exploration of risk management in global industrial investment. Risk Management, 15(4), pp.272-300. Li, Z. and Steenkamp, A. (2010). Mobile Enterprise Architecture Framework. International Journal of Information Technologies and Systems Approach, 3(1), pp.1-20. Machado, T., Pinheiro, P. and Tamanini, I. (2014). Project management aided by verbal decision analysis approaches: a case study for the selection of the best SCRUM practices. International Transactions in Operational Research, 22(2), pp.287-312. Mahnic, V. and Zabkar, N. (2012). Measuring Progress of Scrum-based Software Projects. Electronics and Electrical Engineering, 18(8). Modeus, G. (2013). Social media - Integrate it and perform better?. [online] Available at: https://www.diva-portal.org/smash/get/diva2:632477/FULLTEXT01.pdf [Accessed 10 Oct. 2017]. Moe, N., Dingsoyr, T. and Dyba, T. (2010). A teamwork model for understanding an agile team: A case study of a Scrum project. Information and Software Technology, 52(5), pp.480-491. Olson, D., Birge, J. and Linton, J. (2014). Introduction to risk and uncertainty management in technological innovation. Technovation, 34(8), pp.395-398. Pathak, S., Pateriya, P. and Pal, P. (2012). A Case Study on Software Development Projects in Academic Knowledge Centers using SCRUM. International Journal of Computer Applications, 43(10), pp.20-24. Pope-Ruark, R. (2012). We Scrum Every Day: Using Scrum Project Management Framework for Group Projects. College Teaching, 60(4), pp.164-169. Ucl (2012). Monthly Project Progress Report. [online] Available at: https://www.ucl.ac.uk/isd/itforslms/projects/other-aisc-projects/school-pharmacy/docs/P110108-00_-_UCL_SoPharmacy_Merger_2012-02.pdf [Accessed 10 Oct. 2017]. Umsl (2017). Cloud Models/Architecture. [online] Available at: https://www.cs.umsl.edu/~sanjiv/classes/cs5750/lectures/cma.pdf [Accessed 10 Oct. 2017]. Unhelkar, B. and Murugesan, S. (2010). The Enterprise Mobile Applications Development Framework. IT Professional, 12(3), pp.33-3