Saturday, December 28, 2019

The Sport Of Boxing And Sports - 957 Words

Millions and millions of people are part of some kind of sport worldwide. Many sports require more than one person in the team such as soccer and basketball. In the other hand there are sports that are exercised with only two persons, which are the opponents. Many times spectators just watch these sports but never think, much less, experience the challenges that athletes face. In the sport of boxing there are many effects psychologically that boxers face every time they set there feet on a ring. In life people go to college so that with their education one day they can get a well paying career. Similar to this example people are in the sport of boxing so that with a combination of their hard work and talent they can achieve something in life. Some other reasons to why people box is to prove to themselves of what they are capable of doing as well as for the fame. Once a boxer goes professional and starts to beat their opponents then, that is when media starts to get ahold of them. Com panies such as HBO, an American premium cable and satellite television network, then start to sponsor boxers. Once boxers start to get sponsored then that is when they start earning seven digit incomes. According to forbes.com, a leading online media company, Floyd Mayweather (professional boxer), will be paid $200 million dollars for this current year (2015.) Mayweather is the best-paid athlete in the world, which only translates to the amount of money a boxer can earn if he becomes famous.Show MoreRelatedBoxing Is A Sport With Conventional Rules Essay1822 Words   |  8 PagesMy version Boxing is a game with a long convention, with roots backtracking a great many years to the Olympics of the old Greeks Boxing is a sport with conventional rules, with longstanding history going back a huge number of years to the era of the ancient Greeks olympics.1 Boxing can be classed as a direct interactive sport. In both beginner and expert forms, the boxers wear cushioned gloves, striking and guarding with your fists clenched. Every session by and large goes on for 3 minutes and theRead MoreBoxing Is The Most Brutal Of Sports1553 Words   |  7 Pages Typically in sports the goal is to hit a homerun, score a goal, or even get a hole in one. However, there is one sport that is not like any other, boxing. This sport is the most brutal of sports. The goal is to knock out the opponent with devastating blows to the head. Boxing can be a very dangerous sport resulting in extreme injury or death, and there is a lot of pressure to use illegal drugs in an effort to win. Boxing also has many benefits, such as physical fitness, stress relieving, andRead MoreBoxing is Not a Violent Sport Essay1123 Words   |  5 Pages Boxing is a sport full of hard hitting, fast movements and lots of blood, but being a boxer is not too brutal for the society but it does have its good and bad. Boxing was found back in 697B.C in Germany. When it was first aired on TV people didn’t like it much and was commented as the worst TV show. But as the years went on more people started to get interested in the sport, and then kids wanted to become like their favorite boxer. And soon after boxing was the number one show that everyone watchedRead MoreViolence in Boxing and Similar Sports816 Words   |  3 Pagesessay about the dangers that came with sport of boxing called â€Å"Who Killed Benny Paret?†. His essay focused on a match that resulted in the death of a boxer named Benny Paret. The Investigations on Parets death reflected on many aspects, such as the role of the referee who did not act in time to stop the fight, the doctors examinations if he was really fit, the opponent who did not stop when Paret did not respond to his punches, and Parets manager and boxing authorities who were criticized becauseRead MoreBoxing Is A Sport With Conventional Rules Essay2209 Wo rds   |  9 Pages1. Introduction Boxing is a sport with conventional rules, with longstanding history going back a huge number of years to the era of the ancient Greeks olympics.1 Boxing can be classed as a direct interactive sport. In both beginner and expert forms, the boxers wear cushioned gloves, striking and guarding with your fists clenched. Every session by and large goes on for 3 minutes and the victor is the person who handles the most punches or thumps out his adversary. Boxing is likewise called pugilismRead MoreGeneral Aspects Of Sports Throughout Ancient Games Of Ancient Greece, Boxing, Wrestling And Pankration Essay2270 Words   |  10 PagesGeneral aspects of sports in ancient In Panhellenic games of ancient Greece, boxing, wrestling and pankration were the three major forms of combat sports. In Greece most slaves participated in these events. In many combat sports, a contestant wins by scoring more points than the opponent or by disabling the opponent. Athletes competed against others in a contest with established regulations and procedures, with the objective of beating the other competitors. From Peter Chapter 2 verse 17 it mentionsRead MoreThe Debate on the Banning of Boxing Essay1070 Words   |  5 PagesThe Debate on the Banning of Boxing Boxing is an ancient sport with a long history dating back centuries. It developed from bare knuckle fighting in the 18th and 19th century. The sport has already experienced a ban in 1865 and despite this remains a popular today despite this. The sport has rules established by Marquees of Queensbury that form the basis of modern boxing: three minute rounds and boxers must wear gloves. The spot attracts audience and athletes,Read MoreBoxing Should Not be Banned Essay923 Words   |  4 PagesBoxing Should Not be Banned In recent years, there have been many campaigns to try and have boxing banned. Those in favour of banning boxing argue that it is dangerous, potentially life threatening and generally unsafe. It can also be argued that it is immoral to give someone money forRead MoreJoyce Carol Oates: The Cruelest Sport1453 Words   |  6 PagesCruelest Sport, she argues that boxing is a cruel and savage sport and that it should not be practiced or even considered a sport. The title of this work The Cruelest sport leads to the questions: Why is it the cruelest sport? Is it because of the physical injuries? Or is it because of the corruption? Oates argues that because the ultimate goal of boxing is to injury someone, it is a barbaric sport. Boxing is the only sport where two men climb into a ring and fight each other like animals. Boxing is harmfulRead MoreFriday Night Fights941 Words   |  4 PagesU.S. History Friday Night Fights Boxing, which is also known as pugilism or prize fighting, has been a highly popular combat sport for many years. In boxing, two fighters are placed in an arena, called the ring. The fighters then engage in hand-to-hand combat with padded gloves specifically made for the sport. Boxing is a sport that many people around the world participate in and watch. It is also a sport which has sparked much controversy. Boxing had reached a high point of popularity in the

Friday, December 20, 2019

How Water Usage Is Affecting The World And The People...

Throughout generations the human population has overlooked the importance of water. Despite the fact that we use water every day and for just about everything people seem to disregard the fact that water is a limited resource. As a result, water is being depleted at an alarmingly fast rate. In this essay, I explore the theme of water that recurred throughout modules 5,6,7 of Core 1. I draw upon these modules to explore how water usage is currently affecting the world and the people within societies. Additionally, I elaborate on the conflict brought upon by water and how the future of the world looks like if we fail to act. I also explore the stances of the authors in these modules and how their texts relate to one another in leading the†¦show more content†¦In exploring this dilemma module 5 raises questions such as Who will be entitled to water when supplies become scarce? In the text, Facing the Fresh Water Crisis, Rodgers claimed that the exponential water consumption wil l eventually degrade all ecosystems on Earth. In response to the question raised by module 5 Rodgers argued that current technologies can avert a water war between societies. He takes a preventive approach to satisfying the need for water in society. Instead of facing the issue of water scarcity before it is too late, Rodgers aims to efficiently satisfy the need for water to prolong our water supply. Thus, eliminating potential conflict that would result from trying to meet the water needs when supplies become low. However, it is important to realize that many nations, especially underdeveloped nations, already struggle with having constant access to water. Demand for water in these places, much like everywhere else, tends to be high but with a very low supply. In contrast, developed societies have high demand and constant and abundant access to water. As a result, not everyone’s’ water needs are being met. Thankfully, Rodger’s plan aspires to decrease our water consumption, so that everyone’s needs can be met. Rodgers proposed that municipalities increase the cost of water usage, along with repairing outdated water infrastructure in cities and in agriculture (Rodgers, pg 2, 2008). As for satisfying the water needs in underdevelopedShow MoreRelatedApplications For Real World Problems1534 Words   |  7 PagesSomeone who applies his or her knowledge of the pure sciences to make practical applications for real world problems is by definition an engineer. Engineers are the people who create solutions to issues that the world faces on a daily basis, from miniscule problems such as creating a more ergonomic workplace to large scale issues such as global warming. Without engineers the world would not be as advanced as it is today, we would all still be clueless about electricity, we wouldn’t have theRead MoreWater Scarcity Of Water Shortage1100 Words   |  5 Pages Water Scarcity Maria Luna Arizona State University Planet earth is made up of seventy percent of water and thirty percent of territorial land. Of that seventy percent, ninety-seven percent is salt water, meaning only three percent is drinkable water. Accounting for that three percent, only one percent is surface water; the other two percent is ground water. Most of the surface water is unusable due to agriculture runoff; industrial trash is a great deal of surface water that hasRead MoreSocial Responsibility in the development of Albertas Oil Sands1401 Words   |  6 Pagesdevelopment in northern Alberta has become a hot bed for debate between producers and environmental groups. With worldwide water crisis rapidly developing the use of water in the development Alberta’s oil sands begs the question, are the oil sands in northern Alberta being developed with social responsibility in mind? Social responsibility is a balance companies must maintain between people, the planet and profit. Propaganda produced by environmental agen cies and oil companies must be examined for biases;Read MoreEffects Of Plastic On Marine Life, And Increasing Plastic Waste On Land1406 Words   |  6 PagesIn this paper, I will explain the overuse of plastics, and how plastic is affecting marine life, and increasing plastic waste on land. I will also be explaining how social media’s are affecting the lives of teenages and adults all over the world, because of how much we depend on them. More than 80% of the litter in the ocean originates on land. Most of the litter is plastics. In an interview, Richard Thompson stated, â€Å"Plastics are very long-lived products that could potentially have service overRead MoreThe World s Dependence On Fossil Fuels1706 Words   |  7 PagesThe World’s Dependence on Fossil Fuels Introduction: When you think of fossil fuels what comes to mind? Perhaps you think of the massive oil rigs set up around the world or maybe your mind wonders to how fossil fuels formed in the Earth millions of years ago. Truthfully the full extent of our usage of fossil fuels around the world is widely not realized. Around the Christmas season as you decorate your Christmas trees consider this: if your Christmas tree is artificial then it is likely manufacturedRead MoreNature Is Composed Of Animals, Plants, Landscapes And Many1283 Words   |  6 Pages Nature is composed of animals, plants, landscapes and many other features of the world that are distinct to all human creations. Nature has been set apart as something untouched and free of human touch. Natural resources refer to all the materials that are available in our Planet earth. They are basically utilized by people to satisfy their physiological needs, including shelter, clothing, air, water. People are unique creatures who have survived a nd reproduced in a myriad of environments due toRead MoreTechnology s Impact On Society1507 Words   |  7 Pagesalia Monsanto ENC1101-Swirsky Argumentative/Persuasive Essay Technology’s Impact on Society 21ST century technology has indubitably made life more convenient for us. This can be looked at in a positive or in a negative way. Technology has essentially taken over the world. Replacing almost everything in our homes, schools and communities. Modern Technology has brought tons of negative effects on society including depression, lack of social skills, obesity, poor sleep habits, stress, constant distractionsRead MoreThe Effects Of Renewable Energy On The United States1550 Words   |  7 Pagesfuels, such as oil, natural gas and coal because their use is not sustainable due to their formation taking billions of years. (Morse) These resources have caused irreparable damage to the planet and its atmosphere, affecting the ozone layer, thus causing climate change. The Deep water Horizon oil spill (also referred to as the BP oil spill) began on 20 April 2010 in the Gulf of Mexico. This unfortunate disaster had a negative impact on more than eight thousand species, and over a hundred spill exposureRead MoreHow Climate Change Affects Us1565 Words   |  7 PagesThe following research will explain how climate change affects us, what it has done in our past and what effects it will have on our future. Climate change is something that is happening as we speak, however, many people in our society are completely unaware of what is causing it and how it can affect the earth. Charts from NASA and The Intergovernmental Panel on Climate Change (IPCC) will give a visual of how the temperatures have changed in recent years and how they will be changing in the futureRead MoreGlobal Warming : Causes And Effects880 Words   |  4 Pagestemperatures on Earth are rising and it’s affecting the way people live. Many people feel concerned about this issue while others could not care less. Developing countries do not understand the impact global warming has and how they should contribute to it while developed countries that contribute to global warming know that this situation is a big impact. Global warming is caused by a myriad of factors and as a result have negative effects on the people and how they live. The biggest cause of global

Wednesday, December 11, 2019

Current Situation Information Technology †Myassignmenthelp.Com

Question: Discuss About The Current Situation The Information Technology World? Answer: Introduction Big Data generally refers to the gathering of huge amount of data sets and complex information. In this current situation the information technology world there we can see an issue where these technologies are exceeding the existing storage, communicational and computational capacities of conventional systems [1]. There are various techniques to connect to people or organization by the use of internet or any other conventional way. The technique and information that helps in connecting, is incrementing in a huge rate and volume. But this rapid increase is also creating a concern about the privacy and security issues of the data. Based on the networking system and hierarchical models the database system has also advanced its area of use to the relational and objective database system [15]. By the implementation of web sources these database can also be accessed via data or web management services. Since there is a great concern about the security and privacy of these network systems, it is important to know the aspects of theses security concerns. In this report we are going to review and research about the privacy and security issues in domain of Big Data and IoT (Internet of Things). Overview on BigDataand IoT SecurityandPrivacyProblems Big Data is the set of complex and large data that the traditional data processing software applications lack capability to handle. Big Data is mainly used to increase the storage capability and increase the processing power [2]. It is more complex and includes challenges like storage, analysis, data capturing, transfer files, sharing, visualization, querying, updating information and privacy. Knowledge management in Big Data has three main functionalities Volume, Variety and Velocity. Recently two more Vs has been included Values and Variability. There are several kind of tools in Big Data analysis like NoSQ, MapReduce that includes Hadoop, S3 storage, Servers and Processing. But as the benefits rises there is a constant introduction of new and vulnerable [3]. Three has been a rise in the security concern in each of these different domains. There are privacy and security issues of Big Data by the following aspects: Transaction logs protecting and information Filtration of end-point inputs and validation Calculation of Security distributed framework and similar processes Protection and securing of data in real time Protection the accessibility control methodology, communication and encryption Data provenance Access control granular Security protection for non-rational data stores Similarly, IoT refers to the communication paradigm that is recently envisioned as one of the most vital part of everyday life. It is the network of networks which gives value added service and in which a lot of massive objects, sensor devices and digital devices are connected through the ICT (Information Communications Technology) infrastructure. The IoT gathers data and information at anytime and at anyplace, related to anyone and anything, initially implementing at the path of network and services [4]. There are privacy and security issues of Internet of things by the following aspects: Consumers those uses free online services like social networking, emails, websites etc. are aware of the fact that consequently they become the part of the online service and hence become the data source for the organizational business. This helps in analyzing of data sources and improves the satisfaction of the customers. Here is where the conflict comes when these data are sold to third party for further analysis without the concern of the security and online service privacy of the customers [14]. The number of users data that are gathered has to be significantly larger from the past collection gathered. Some of these technologies can gather such sensitive information of customers by analyzing the daily activities that may range from the health conditions to financial records. SecurityInformation andSecurity Problems There are several security issues regarding Big Data and IoT [5]: Non-relational data store: Let us take an example of NoSQL databases that is independent from anyone else as a rule need security (which is rather given, kind of, through middleware). Endpoints: Security arrangements that draw logs from endpoints should approve the credibility of those endpoints, or the investigation wouldn't do much good. Real-time compliance or security tools: These create a colossal measure of data; the key is figuring out how to disregard the false positives, so human ability can be centered on the genuine ruptures [16]. Distributed framework: Most enormous information executions really convey gigantic handling employments crosswise over numerous frameworks for quicker investigation. Hadoop is a notable example of open source tech associated with this, and initially had no security of any kind. Dispersed preparing may mean less information handled by any one framework, yet it implies significantly more frameworks where security issues can manifest. Storage: In the architecture of Big Data, there is a general storage where the data and information are stored on more than one tier. It depends on the need of cost vs. performance [13]. Let us take an example like the high prioritized data has to be stored in the flash media. Hence, the lockdown storage refers to the creation of a tier-conscious strategy. Access controls: There is requirement of critical; importance that may provide a system in which authenticates or encrypts verifies the user and hence determine the priority customer. Data mining solution: Most enormous information usage really circulates gigantic handling occupations crosswise over numerous frameworks for speedier investigation. Hadoop is an outstanding occurrence of open source tech engaged with this, and initially had no security of any kind. Disseminated handling may mean less information prepared by any one framework, yet it implies significantly more frameworks where security issues can edit up.These are the core of numerous enormous information conditions; they discover the examples that propose business systems. For that very reason, it's especially imperative to guarantee they're secured against not quite recently outer dangers, but rather insiders who manhandle organize benefits to get touchy data including yet another layer of enormous information security issues. Granular auditing: This determines the attacks occurred that have been missed and hence make situations that may improve the situation in future. It is a large amount of data itself that can be enabled and protected by vital security issues in Big Data identification. Data provenance concerns primarily about Metadata (data about the data): This is tremendously vital that helps to know from where the data emerges from [12]. The users who are accessible to the data and what the data are used for. These data are generally analyzed within minimum amount of time and exceptional pace in which the breaches get activated. Favored clients occupied with this sort of action must be altogether checked and nearly observed to guarantee they don't turn into their own enormous information security issues. Analysis of tackling Security Problems There is requirement of approximation in this real world since the analyzing and data collection tools have security aspect that has been functionally stored in the technology. The deployment of Security and Information Event Management (SIEM) solution is vital to aggregated logs in security system and the automatic identification of potential breaches. Hadoop is another simple way to identify the big data security and privacy issues [6]. Thus, Hadoop has become one of the most popularly used technologies to address breaches. There has been a range of security leading solutions that has been provided to evolve the technologies which are ideally commercial grade that to help the lock down process. These systems are generally added together by the open source contributors, for example Apache Accumulo. Therefore, by the introduction of Hadoop in Big Data security system, the remaining techniques that can be used are the authentication check and encryption [7]. The tacking of data security and privacy challenge in IoT has some unique techniques: At first there is requirement of understanding the uniqueness of the challenges over the security system in IoT and hence making the development of the next technology accordingly. Finding out the risks related to Big Data, greater the amount of sensitive data, creates greater risk of information system and theft of identity manipulation of devices, IP theft and manipulation of networks or servers and many more. IoT enabling security of data like protection of integrity, confidentiality and authentication data [8]. Privacy issues exploration depends on the extent the customer need the privacy and the techniques by which these issues can be maintained by still making the data useful for the customers. The role of shared trust and metadata assumptions over the end to end security across platforms. Recent Security problem related to the chosen topic IoT is a system comprising of physical gadgets, which are additionally embedded with sensors, hardware, and programming, in this way enabling these gadgets to trade information [9]. This at last permits better joining between genuine physical substances and PC worked frameworks. IoT is the following huge thing affecting our lives in significant ways and number of elements. Innovations like Column-arranged databases, SQL in Hadoop, Hive, Wibidata, PLATFORA, SkyTree, Storage Technologies, Schema-less databases, or NoSQL databases, Streaming Big Data investigation, Big Information Lambda Architecture, Map-lessen, PIG, and so on., helps in managing the huge measure of information created by IoT and different sources. Real difficulties that can bring ground breaking prizes when they are fathomed: Tremendous information volumes[10] Trouble in information accumulation Contradictory measures New security dangers No unwavering quality in the information Central moves in plans of action Gigantic measure of information to break down A quickly advancing protection scene The above focuses are a portion of the difficulties that IoT huge information faces. The rate in information development in extending each second, stockpiling in a major test, handling and keeping up is significantly more repetitive [11]. The apparatuses that are created to deal with the two innovations are step by step changing as per the requirement. Conclusion Associations must guarantee that every enormous datum bases are resistant to security dangers and vulnerabilities. Amid information accumulation, all the fundamental security insurances, for example, ongoing administration ought to be satisfied. There is a requirement to work together on advancing the standards and practice to identify the threats and security issues regarding Big Data and Internet of things. Since IoT has the requirement of being developed from level for safety, thus has to be tested. There are a couple of territories of concern and security and protection and information gathering productivity are likely the most troublesome issues we are confronting. Remembering the enormous size of huge information, associations ought to recollect the way that overseeing such information could be troublesome and requires remarkable endeavors. Be that as it may, making every one of these strides would help keep up purchaser security. There is a need of developers to work along wit h the manufacturers to ensure the security at highest priority. So protecting the customers and organization has to be the primary concern not the second thought. This report is a survey about the IoT and Big information security system, the effects of IoT on enormous information, the huge information advances and the challenges. Since there is a noteworthy effect of IoT on enormous information we have to rapidly collected, total structure to deal with the day by day evolving conditions. Security bargain and wasteful aspects in information gathering instruments result in lost status, cash, time and exertion. Yet, there is trust in light of the fact that both the IoT and the enormous information are at a developing stage and there will be redesign Reference [1]M. Conti, A. Dehghantanha, K. Franke and S. Watson, "Internet of Things security and forensics: Challenges and opportunities", Future Generation Computer Systems, 2017. [2]G. Newe, "Delivering the Internet of Things", Network Security, vol. 2015, no. 3, pp. 18-20, 2015. [3]K. Sood, S. Yu and Y. Xiang, "Software-Defined Wireless Networking Opportunities and Challenges for Internet-of-Things: A Review", IEEE Internet of Things Journal, vol. 3, no. 4, pp. 453-463, 2016. [4]J. Ziegeldorf, O. Morchon and K. Wehrle, "Privacy in the Internet of Things: threats andchallenges", Security and Communication Networks, vol. 7, no. 12, pp. 2728-2742, 2013. [5]M. Hussain, "Internet of Things: challenges and research opportunities", CSI Transactions on ICT, vol. 5, no. 1, pp. 87-95, 2016. [6]"Lack of security in Internet of Things devices", Network Security, vol. 2014, no. 8, p. 2, 2014. [7]J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang and W. Zhao, "A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications", IEEE Internet of Things Journal, pp. 1-1, 2017. [8]M. Eltayeb, "Internet of Things", International Journal of Hyperconnectivity and the Internet of Things, vol. 1, no. 1, pp. 1-18, 2017. [9]C. Tankard, "Big data security", Network Security, vol. 2012, no. 7, pp. 5-8, 2012. [10]G. Lafuente, "The big data security challenge", Network Security, vol. 2015, no. 1, pp. 12-14, 2015. [11]T. Win, H. Tianfield and Q. Mair, "Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing", IEEE Transactions on Big Data, pp. 1-1, 2017. [12]C. Constantine, "Big data: an information security context", Network Security, vol. 2014, no. 1, pp. 18-19, 2014. [13]C. Everett, "Big data the future of cyber-security or its latest threat?", Computer Fraud Security, vol. 2015, no. 9, pp. 14-17, 2015. [14]R. Kemp, "Legal aspects of managing Big Data", Computer Law Security Review, vol. 30, no. 5, pp. 482-491, 2014. [15]H. Hassan, L. Yang and M. Qiu, "Special issue on Big Data Security and Intelligent Data in Clouds (BDS-IDC)", Concurrency and Computation: Practice and Experience, vol. 29, no. 14, p. e4215, 2017. [16]"Using big data to reduce security risks", Computer Fraud Security, vol. 2012, no. 8, p. 3, 2012.

Wednesday, December 4, 2019

Challenges of Mixing Methods and Methodologies

Question: Discuss about the Challenges of Mixing Methods and Methodologies. Answer: Introduction: Inventory flow management is considered as one of the most critical and costly aspect of supply chain management. The companies are rigorously trying to balance the cost of inventory so that it is able to fulfill customer requirements. Storing to many stocks increases the cost of warehouses and attaches with the capital further it also causes loss to vendors if in any case there is a drop in demand. When there is very less or no inside available in the inventory upstream, downstream retailers, manufacturers and distributors cannot give commitment for huge orders with guaranty apart from that these people will also not be able to deliver proper forecast. Inventory management is usually considered as a very dynamic and flexible system which is very sensitive towards parameters of cost and it is been developing throughout years. It is also termed parlance management because supply chain managements deals with material flow control from the raw materials suppliers at one end and delivery of finished goods to the consumers at the other end. The most of these techniques are usually dependent of scientific principles further it's based on mathematical and theories of probability. The inventory management is responsible for various activities like marketing, purchasing, production and other techniques so that it can balance the conflicting tools (Bhasin , 2016) This system is responsible to provide knowledge to manage the flow of materials in an efficient manner, utilize people and equipment effectively and coordinate internal activities. The well managed inventory flow management demonstrates that the customers receive the goods efficiently in proper time. It further allows the members of the team to match the inventory with consumer's demand .Apart from that it is mandatory to meet the objectives of the system including capacity, profitability and productivity. There is some of the basic inventory terms listed:-Cycle stock-It is the basic amount of material required in order to meet the demands of the customer. Transit Stock-It is the reroute among the locations which carry the stock. Speculative Stock-It is basically the extra amount of raw materials required to meet the high consumer needs. It is different than normal short term demand. Safety Stock- It is the extra amount of stock in excess of the cycle stock which is usually maintaine d to compensate the uncertainties of the growing demand and substitution.It can also be expressed through a fixed amount (Coca Cola Journey , 2017) The inventory stock management has a good match with demand and supply further replenishing the requirement of inventory. Various operations such as transporting, manufacturing and warehousing; all these are responsible to generate imbalances in the system which finally gives rise to inventory management especially in FMCG industries. Errors in predicting the consumer demand generally impact the production of the product been produced in the plant. Apart from that changes related to promotional and seasonal impact the consumer demand for any particular product. Hence in these case shortages of the inventory further generate imbalances in the entire system. For eg:- shortage of labor, shortage of transportation.raw materials shortage and capacity of manufacturing constraints ; these all are generally responsible for inventory shortage and the company in such cases is unable to meet demands of the customers (Cahan, 2003) One of the most important parameter of shortage of inventory is scheduling. There are basically three kinds of scheduling problems in the FMCG industries:-First the schedule can be inadequate, second the schedule is not carried out in a proper manner and third the schedule can be disturbed by unexpected scenarios such as bad conditions of weather or breaking of equipments. The efficient inventory management will be trading off the conflicts of operations and constraints of inventory so that it can aim for an effective compromise that maintains enough inventories to meet customer demand yet covers variation in the forecast (Floyd Fowler, 2009) Inventory is very crucial and it very much mandatory but there are other expenditures associated with the same; and the expenditures increases with the increase in levels of inventory generally when indirect and direct cost is indulged. The bigger the inventory, the higher is the possibility of loss by damage, obsolescence, aging and theft. A bigger inventory can result into inefficient handling. It is always recommended to spend ample amount of time in re-warehousing, double handling and stock rotating through man-hours which may have be crucial for some other task. It is very common factor in FMCG industries to carry manufacturing cost of 25% out of the total amount of funds allocated for inventories. Sometimes the expenditure allocated for inventories can be used elsewhere according to the latest requirement of the industry. Thus it is important for the operations to carry out enough inventories so that it can be always updated with its stock so that shortage scenarios can be avoi ded (Green, 2011) The principle of inventory management states that the industrial plant has good amount of production flexibility and capacity and enough area for storage. The basic quantity required for scheduling and planning the receipt of ingredients, raw materials and supplies packaging must be taken into consideration when estimating and calculating finished product requirement, certain patterns of demand , seasonal swings and activities related to promotional might need pre production specific SKU's in order to avoid capacity of production at bottlenecks. But whenever there is pre production of goods there might be less capacity of storage in the production area. In these scenarios there is a shifting of inventory to the distributing centers based on estimated demands. One needs to note that if the required facility has much capacity of constraints or an unbalanced infrastructure then it's mandatory for the team of management to modify the basic inventory process principle (Helfat Martin, 201 4) The FMCG industries basically need to be proactive in nature for product recall. The earlier model of business required traceability from individual stores to distribution centers. The recent survey conducted on approximate 48 industries in FMCG sector states that the primary cause for installing an automated control system and material tracking system is to get real time visibility and accuracy of inventory so that it can efficiently track and trace the system of inventory. Further the report stated that 52 percent of the industries now use bar coded labels so that they can keep a track on their raw materials, goods finished and progress of work. In order to monitor raw materials, finished goods in the current scenario; it is mandatory to avoid accidental shifting of materials. To work in the real ambience the companies require the industry need to instantaneously hold the inventories either on SKU's real time expiration control of inventories .This can prevent the expired inventory allocation from entering the other processes .Hence resulting in downfall in distribution chain (Hutchison Boxall, 2014) The aim of inventory flow management is to match demand with supply on regular time .There are two main methods to manage the flow of inventory most frequently termed as production push and warehouse pull. Production push is regarded as one of the most traditional technique whereas warehouse pull is the new one. At times the system of pull is much suitable to the requirements of the distribution network and beverage industry as it the exact consumer demand the basis for substituting inventory. But for satisfying the demands of the consumers without further interruption a certain quantity of inventory must be send out of the door. In this case the production pull system works very well. Both distribution and production push works very well (Lislie, 2011) In the inventory management production push process the periodic demand estimation is often converted into the production plan and a production schedule. Further the process of push production is further converted into transportation schedule which allocate the amount for transporting to each and every distribution center based on each forecast. In the production push process, the facilities with respect to the production or other elements involving centralized planning generally control and manage the movement of inventory within its distribution centers and location. The push process is generally introduced in the processes during periods of promotion, when the products are supposed to push out of the production area on assigning basis. In the inventory management warehouse pull process, demand forecast is also responsible for the plan of production and modification in schedule of production on the basis of inventory substitution taking into account distribution center (Metcalfe, 2 002) The system of pull in inventory flow management deals with responding to consumer's demand. Here the consumer is considered as a important factor while deciding the requirement, location and amount of SKU's. The push process generally sends out the materials based on the forecasted demands of the market or blanket allocation. The pull system sends out the materials on the basis of the demands of the distribution centers which are directly dependents on consumer's demand. The pull process works under right time principle so that it can conduct quick and frequent flow of info and goods. The cost cutting is usually maintained by replacing waste such as inventory which stays too long or huge amount of safety stocks. The pull system functions better than pull system as it is able to operate and deal with all the complex scenarios of beverage industry by using the technology at optimal level. The pull system of the inventory management is combined with scheduling of production and planning of resource it facilitates the matching of supplies with the actual customer demands within the supply chain again the reversal of planning information from consumers to suppliers (Randolf, 2009) The FMCG industries are making a drastic change by shifting from push system management to pull system inventory management. At the same time there are various factors involved which will lead to success of pull system in future. On primarily basis the industry should have a general knowledge about the pull system .It employees should have a basic idea on operation and estimation during the entire process (Austin Seitanidi, 2012.) Secondly it's important for the cross over to have a proper commitment by the team of management and prior support by members in the senior management. Thirdly there should be introduction of performance parameters so that it can be established within the line of objectives in supply chain management .Fourth, all the locations should have timely and accurate info about the demands and quantities of inventory management. Fifth, an accurate estimating and forecasting system should be established and the sales and operation tem should be liable to it equally. Sixth, parameters of operations such as lead times, cycle times, and capacities are often required to understand production, warehousing and transport. Seventh, it is mandatory to have accurate info and good communication to solve the complexity of business by indulging software system and finally transportation is required for scheduling the systems (Finegan, 2001) The main preference of all the employees in the FMCG distribution and manufacturing is to satisfy the demands of the consumer for production. Controlling and monitoring the inventory is done in order to match the consumer's demand by scheduling the transportation and productions in a way which can decrease the usage of resources in a complex and constant balance. In order to manage the shifting of materials throughout the entire distribution centers and processing unit they usually develop the ability to meet the changing demands of business. This is further integrated with right policies, system and production. The management of processes and technology are usually done on the basis industrial practices and further by effective achieving the balance of inventory flow management. This leads to a company's success in today's challenging time. Managing the entire material transportation efficiently throughout the processing tenure and distribution of proper Inventory management is a crucial part of the "Seamless tube "within any respective FMCG company. The common focus of this sector is on customer satisfaction. The main goal of this sector is to produce good quality goods at nominal rates further packaged and delivered according to the latest demands of the consumers. Proper management of the inventory flow management ensures that every customer and supplier has uninterrupted delivery of delicious and fresh products of the FMCG company. This is also regarded as the greatest form of service delivered to customers. The enti re inventory management basically works on this fundamental. Sector 1 ($,m) Sector 2 ($,m) Sector 3 ($,m) Sector 4 ($,m) Median 306.2 308.2 290.5 317.2 Mean 331.2 295.2 281.5 278.8 Trimmed mean 316.9 201.1 295.7 300.9 References Bhasin , H ., 2016.Marketing strategy of Coca cola Coca cola marketing strategy. [Online]Available at: https://www.marketing91.com/marketing-strategy-of-coca-cola/ [Accessed 5 November 2017] Coca Cola Journey. , 2017 . Sustainiblity .[Online] Available at: https://www.coca-colacompany.com/sustainability [Accessed 4 April 2017] Cahan, J., 2003. Mini-lecture on writing a critique- effective acade. [Online] Available at: https://www.personal.psu.edu/faculty/b/j/bjj6/ENGL015-2001Critique.html [Accessed 4 April 2017]. Floyd, J. Fowler, J., 2009. Survey Research Methods. 4th ed. Nashville: SAGE. Green, R.R. et al., 2011. Management matters in New Zealand: How does manufacturing measure up? Wellington.: Ministry of Economic Development Ministry of Economic Development. Helfat, C.E. Martin, J.A., 2014. Dynamic Managerial Capabilities: Review and Assessment of Managerial Impact on Strategic Change. Journal of Management, 41(5), pp.1281-312. Hutchison, A. Boxall, P., 2014. The critical challenges facing New Zealands chief executives: implications for management skills. Asia Pacific Journal of Human Resources, 52, pp.23-41. Lislie, J.D., 2011. THE BENEFITS AND CHALLENGES OF MIXING METHODS AND METHODOLOGIES:Lessons Learnt From Implementing Qualitatively Led Mixed Methods Research Designs in Trinidad and Tobago. Caribbean Curriculum, 18, pp.87-120. Metcalfe, M., 2002. Preparing a critique of an article: Using argument as an inquiry. [Online] Available at: https://godot.unisa.edu.au/register/articles/5.doc [Accessed 4 April 2017]. Purdue University, 2016. WRITING A THESIS STATEMENT. [Online] Available at: https://owl.english.purdue.edu/handouts/print/general/gl_thesis.html [Accessed 4 April 2017]. Randolf, J.J., 2009. A Guide to Writing the Dissertation Literature Review. Practical Assessment, Research and Evaluation, 13, p.14. Austin, J.E. Seitanidi, M.M., 2012. Collaborative value creation: A review of partnering between nonprofits and businesses: Part I. Value Creation Spectrum and Collaboration Stages. Nonprofit and Voluntary Sector Quarterly, pp.726-58. Finegan, J., 2001. The impact of personal values on judgments of ethical behaviour in the workplace. Journal of business ethics, 13(9), pp.747-55. ICAEW, 2011. Code of Ethics C. [Online] Available at: https://www.icaew.com/en/membership/regulations-standards-and-guidance/ethics/code-of-ethics-c [Accessed 4 April 2017]. Mc Devitt, R. Van Hise, J., 2002. Influences in Ethical Dilemmas of Increasing Intensity. Journal of Business Ethics, 40(3), pp.261-74. Stanga, K.G. Turpen, R.A., 1991. Ethical judgments on selected accounting issues: An empirical study. Journal of Business Ethics, 10(10), pp.739-47. Porter, M.E. 2008, 'The five competitive forces that shape strategy'. Grnig, R. Gaggl, R. 2005, Process-based strategic planning, Springer Science Business Media.