Monday, December 30, 2019

Have you ever wondered why, Disney tales all end in lies...

Have you ever wondered why, Disney tales all end in lies? This is what happened when all their dreams came true. Popular YouTube channel ‘Paint’ aka Jon Cozarts creates four simultaneous versions of himself singing as four major Disney characters, as if they were displaced in the real world – by wayne allen Brenner, 2013 posted back in February 2010. That takes on some pretty serious social issues today; he uses parody, humour and hyperbole to show the satirical devices through out his video. If you have ever wondered what happens after happily ever after, well, youre in luck. Cozart’s viral video has four Disney princesses, he sings about after the ‘ever after’ he includes some pretty controversial issues, Ariel is dealing with†¦show more content†¦Jasmine isnt faring much better; the CIA ruins her happy ever after by abducting her husband on suspicion of being a Taliban terrorist. Cozart implies ‘Hey, Im OK, but Im slightly scared, my husbands a mark for the War on Terror’ which sounds fairly true if it were actually to happen toda y†¦which is quite funny because of the quick judgement of culture, that they assume jasmine and her husband are caught causing fatalities by bombings nation and getting caught in the war on terror. Belle’s sequel might well be â€Å"Beauty and the Bestiality.† Princesses Pocahontas and Belle aren’t necessarily having the best ever after either†¦ living in the times of 1517-1700 they seriously weren’t that sophisticated, they both have been portrayed by Cozart as some pretty messed up humans, Belle being charged with bestiality and Pocahontas reportedly dying of ‘unknown causes’ which Cozart makes out as if she were to die of disease in his viral video, which surprisingly isn’t that surprising, since they were born in very unhygienic and uncivilised times where they didn’t know much. Cozart’s video is a comedy and mockumentary; he displays humour, hyperbole and parody. Cozart also creates many other videos similar to this one on his ‘paint’ channel, he has done us a deed by showing us the stereotypes and humour and a more mature look on this subject, which is highly amusing, the issues covered by Cozart are a quite accurate and thoroughlyShow MoreRelatedEssay on Fall of Asclepius95354 Words   |  382 Pagesbegin? The apocalypse happened so fast. In less than a month, monsters infested every part of this world. People panicked, people died. They clawed at each other just to get out of all the infested areas around the world. There was problem about fleeing from infested areas. Everywhere was infested. There was no where anyone could go without encountering the walking plague. You know that phrase War is Hell? Well... its dead wrong. War at least has some organization to it. What was faced in the lastRead MoreFundamentals of Hrm263904 Words   |  1056 Pages This online teaching and learning environment integrates the entire digital textbook with the most effective instructor and student resources With WileyPLUS: Students achieve concept mastery in a rich, structured environment that’s available 24/7 Instructors personalize and manage their course more effectively with assessment, assignments, grade tracking, and more manage time better study smarter save money From multiple study paths, to self-assessment, to a wealth of interactive visualRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 Pages Organizational Behavior This page intentionally left blank Organizational Behavior EDITION 15 Stephen P. Robbins —San Diego State University Timothy A. Judge —University of Notre Dame i3iEi35Bj! Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Editorial Director: Sally Yagan Director of Editorial Services:Read MoreProject Mgmt296381 Words   |  1186 Pages1.2.5 PERT analysis 7.1.2.6.3 Contingency reserves 7.3.3.4 Change control management G.7 Culture awareness 1.4.4 Project offices 8.1.2 Continuous improvement 5.1 Requirements vs. actual [5.3] Chapter 17 Agile PM 6.1.2.2 Rolling wave This page intentionally left blank Project Management The Managerial Process The McGraw-Hill/Irwin Series Operations and Decision Sciences OPERATIONS MANAGEMENT Beckman and Rosenfield, Operations, Strategy: Competing in the 21st Century, FirstRead MoreContemporary Issues in Management Accounting211377 Words   |  846 Pages Contemporary Issues in Management Accounting This page intentionally left blank Contemporary Issues in Management Accounting Edited by ALNOOR BHIMANI 1 Great Clarendon Street, Oxford ox2 6dp Oxford University Press is a department of the University of Oxford. It furthers the University’s objective of excellence in research, scholarship, and education by publishing worldwide in Oxford New York Auckland Cape Town Dar es Salaam Hong Kong Karachi Kuala Lumpur Madrid Melbourne Mexico

Saturday, December 21, 2019

Microsoft on Anti-Trust and Monopolies - 1278 Words

Microsoft: On anti-trust and monopolies (or How A Linux User Can Court Ostracism) Introduction In 1890, the US Congress passed the Sherman Act. Further, the Clayton Act was enacted in 1912. This was followed by the Robinson-Patman Act of 1936. These antitrust laws prohibit agreements in restraint of trade, monopolization and attempted monopolization, anticompetitive mergers and tie-in schemes, and, in some circumstances, price discrimination in the sale of commodities. Thus, the goals of a free market controlled by individual choice and individual action were codified. Monopolies, cartels and discrimination were outlawed. Truly free markets mean more competition, more goods, more choices, lower prices and enhanced product†¦show more content†¦Such switching costs are high, with the consequence that consumers are effectively locked-in to Windows. In sum, Microsoft (in the courts view) dominated a market the boundaries of which prevent competition from entering and consumers from leaving. This in turn means that, unfettered by competition, Microsoft did not need to succeed on its merits; it could charge a price for Windows higher than if it had to respond to competition. The Case for Microsoft Still, the possession of these attributes merely made Microsoft a monopoly - Microsoft would be in violation of antitrust law only if it misused that power, by engaging in an illegal form of exclusionary conduct to protect or extend that monopoly. This, in fact, was the burden of the accusation that started the case in the first place, an accusation involving what was once called the browser wars Ââ€" pitting its Internet Explorer against Netscapes Navigator. Microsoft effectively made its browser and the OS (as the company itself would assert) inseparable. This effectively created a massive distribution network - and seemed, indeed, a clear use of monopoly power to win the browser wars. In addition, Microsoft sought to make deals both with computer manufacturers and with online services like AOL to offer Internet Explorer with their products, sometimes exclusively, and itShow MoreRelatedA Comparison of Two Monopolists in a Competitive Market Essay977 Words   |  4 Pagesof Two Monopolists in a Competitive Market According to Webster , to have a monopoly is to have exclusive ownership, possession, or control. The following essay is an examination of Microsoft in comparison to this definition and another commonly known monopoly, Standard Oil. Also attention will be given to the necessary role of and problems with monopolies. Competitive Market vs. Monopoly A competitive market consists of many buyers and sellers. Markets thrive becauseRead MoreMicrosoft: An Examination of Monopolies1023 Words   |  4 Pagesï » ¿Microsoft: An Examination of Monopolies Introduction This paper examines the nature of monopolies and the anti-trust policies developed by the government to discourage them. It specifically considers Microsoft and the case brought against it by the Federal government to prevent its becoming a software monopoly. In many cases, the government is justified in pursuing such anti-monopoly policies to protect competition and by extension the consumer. There are some instances, however, when allowingRead MoreThe Federal Trade Commission Act931 Words   |  4 PagesIn 1890, the United States Congress passed the first Anti-Trust Law, called the Sherman Act, in an attempt to combat anti trusts and as a â€Å"comprehensive charter of economic liberty aimed at preserving free and unfettered competition as the rule of trade.† (The Antitrust Laws). Twenty four years later in 1914, Congress passed two more Anti-Trust Laws: the Federal Trade Commission Act, which created the Federal Trade Commission whose aim is to protect American consumers, and the Clayton act, whichRead MoreAntitrust Law Violation Of Antitrust Laws1277 Words   |  6 PagesAntitrust Law Violations Introduction This paper will discuss the Google case that was presented by Microsoft stating that Google was in violation of antitrust laws. Also, in this paper some of the pecuniary and non-pecuniary costs will be discussed. Given in this paper will also be my thoughts on monopolies and oligopolies. Antitrust Case Google was investigated for antitrust behavior because they were claimed to be an â€Å"internet bully that abuses its dominance of online search and advertising†Read MoreCase Study Economics- Microsoft and Monopoly808 Words   |  4 PagesMicrosoft and Monopoly Case Study of Strategies used by Microsoft to leverage its monopoly position in operating systems in Internet Browser market Introduction: Microsoft has monopoly in PC operating systems, Windows operating systems which are used` in more than 80% of Intel based PC’s. This market has high technological barriers. Threat to Microsoft is not from new operating systems but from alternate products such as browsers, which are new softwares that can be used with multiple operatingRead MoreA Note On Trust Issues933 Words   |  4 PagesTitle page Trust Issues Zhou Xiaoyan torimichelle74@gmail.com Content Abstract†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. page 2 Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦... page 2 Subtitle 1 †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ page 3 Subtitle 2 †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ page 3 Conclusion†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦......... page 4 References†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.......... page 5 Trust Issues Abstract: The article reports on the anti-trust investigations conducted by ChineseRead MoreAntitrust Investigation On The Anti Monopoly Law868 Words   |  4 PagesReferences†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.......... page 5 Trust Issues Abstract: The article reports on the anti-trust investigations performed by the Chinese authorities to the business enterprises in acquiescence with the Anti-Monopoly Law in 2014. Corporations that were investigated by these authorities embrace the automobile dealer Chrysler collection China Sales Ltd, telecommunication firm Qualcomm Incorporated, and technology Company Microsoft house. Conjointly mentioned is information on theRead More Microsoft vs. The Government Essay examples1293 Words   |  6 PagesMicrosoft vs. The Government Microsoft has developed into an inescapable force within the technological field. Coming from a delayed humble beginning, it has had to devote large sums of money to approach the levels of the founding technological companies. Today, Microsoft controls the market in computer software. How they have achieved this status is what some have come to question. Through â€Å"bundling† software programs, manipulating other computer companies, and packaging dealsRead More Microsoft: Thank Goodness it is a Monopoly Essay639 Words   |  3 PagesMicrosoft: Thank Goodness it is a Monopoly Many people, with the government are trying to label Microsoft as a monopoly. Why is there any delay going around doing that? There is no reason to brand Microsoft as a monopoly. There is part of monopolistic competition and supply-demand acting on this case. The whole trial is about the free internet browser, Internet Explorer, that Microsoft gives out free and includes with its Operating system, Windows. Netscape does the same marketing ofRead More The Microsoft Antitrust Story Essay1532 Words   |  7 PagesThe Microsoft Antitrust Story One of the most significant cases in the business world is the US vs. Microsoft. In this case the US asserts that the business practices used by Microsoft create an unfair and dominant market and make them into a powerful monopoly. On the other hand, Microsoft argues that it is being unfairly punished for its success. This case is important because it will greatly affect the economy, other large corporations, its competitors, consumers, and Microsoft’s stockholders

Friday, December 13, 2019

Labour economics Free Essays

Trade unions are also known as Labour unions. It is the association of labourers in a particular trade, industry, or company, created for the purpose ot securing Improvements In pay, benefits, working conditions, or social and political status through collective bargaining. It’s an organization whose membership consists of workers and union leaders who are united to protect and promote their common interests. We will write a custom essay sample on Labour economics or any similar topic only for you Order Now What do you mean by Collective Bargaining? It is a formalized process by which employers and independent trade unions egotiate terms and conditions of employment and the ways in which certain employment † related Issues are to be regulated at national, organizational and workplace levels. It is a collective and a continuous process. The principle of ‘give and take’ has been infused in the principle of Collective Bargaining. It is a technique that has been adopted by the unions and the managements to reconcile their conflicting Interests. It is called ‘collective’ because the employees as a group select representatives to meet and discuss differenced with the employer. It is known as argaining’ because the method of reaching an agreement involves proposals and counter proposals, offers and counter offers and other negotiations. Definition of collective Bargaining by Byar Rue (1991 It Is a process that Involves the negotiation, drafting, administrative and interpretation of a written agreement between an employer and a union for a specific period of time. Collective Bargaining:- To Employees:- Importance of 1 . CB helps to develop a sense of responsibility and accountability among the employees. 2. CB increases the morale and productivity of employees. 3. It helps In securing a prompt and fair settlement of grievances. 4. Effective collective Bargaining machinery strengthens and gives value to the trade union movement. 5. The discrimination and exploitation of workers, If any, Is constantly monitored and addressed. To Management:- 1 . It helps in reducing labour problems to the minimum and in maintaining cordial relations labour and management 2. It opens up the channel of communication between the workers and management thus increasing worker participation In decision making. 3. CB helps to create a sense of Job security among employees. . It makes simpler for the management to resolve issues at the bargaining level rather than taking up complaints of individual workers. MINIMUM WAGES AND FAIR WAGES It Is the lowest wage permitted by the law or by a special government. The minimum wage attempts to protect employees from the exploitation, allowing them to afford the basic necessities of life such as clothing, water, food and shelter. The minimum wage rate fluctuates between countries, and sometimes between states or provinces. tOf3 It must prov10e not only Tor tne Dare suoslstence 0T IITe out Tor tne preservatlon 0T he efficiency of the workers by providing some measures of education, medical care, etc Criteria: It must be calculated for a family of 4 units. It must be able to provide 2700 calories per adult per day. It should be sufficient for 18 yards of cloth per unit per annum. There should be a provision for reasonable house rent, light, fuel and miscellaneous items. The Minimum Wages Act, 1948 is an Indian legislation enacted by the Parliament of India for statutory fixing of minimum wages paid to skilled unskilled labourers. Under the act, a tripartite committee â€Å"the Tripartite Committee of Fair Wage† was appointed that et definitions and guidelines for formulating a wage structure in India. The objectives of this act were :- To provide minimum wages to the workers working in the organized sector. To stop exploitation of the workers by paying them lower wages and making them work for longer hours. To empower the government to take steps for fixing the minimum wages and to revise it in a timely manner. A Living wage is a wage that is high enough to maintain a normal standard of living. It is not only for the bare essentials for the worker and his family, but also for comfort, protection against ll-health, social needs, etc. Fair Wages refers to wage levels or company practices regarding wages that provide a living wage for workers while still complying with all national regulations (such as minimum wage, overtime payments, provision of paid holidays, etc. ) It is in between minimum wages and living wages, but below the living wage. With a fair wage, employees should be able to maintain a decent standard of living for themselves and their families. CHARACTERISTICS OF INDIAN LABOUR MARKET The Indian labour market can be categorized into three sectors: Rural workers Organized of the formal sector Urban unorganized or informal structure Two-third of India’s workforce is employed in agriculture and rural industries. One- third of the rural households are agricultural labour households, subsisting on wage employment. The unorganized sector has low productivity and offers lower wages even though 94% of India’s working population is engaged in this sector. Wage determination for organized sector:- The ‘day, Week’ and ‘month’ are the basic units for wage calculation. Normal working week is 5 days (for government) or five half days/ six days. Hour’ is generally not a unit for wage calculation in the organized secotr. Wage determination for unorganized sector:- ‘Day is the common unit of calculation for unorganized sector. In certain cases, piece rate wages (it is the pay for each item produced) is in vogue, as well as hourly wages. MODERN THEORY OF WAGES The modern economists are of the view that Just as the price of a commodity is determined by the interaction of forces of demand and supply, the wage rate of specific types of workers can also be determined in the same way with the help of sual demand and supply analysis. This is why modern theory is also known as demand and supply theory of Wages. Now the demand for labour is a derived aemana. t I Is aerlvea Trom tne aemana 0T goods wnlcn It produces, along wltn otner factors of production. The marginal revenue product of labour (MRP) means the addition to the firm’s revenue which it obtains by hiring one additional worker. The entrepreneur will continue hiring workers up to the point at which the cost of employing a worker is Just equal to the marginal revenue product of the labour. Now ue to the law of diminishing returns, the marginal revenue productivity of labour decreases as more and more workers are employed and hence the demand cure for labour is downward sloping. If we add up the demand curves for the labour of all the individual firms, we get the demand curve of the industry which determines the wage rate for labour. Now the supply of labour means the number of workers ready to work at the existing wage rate. Unlike the supply of other goods, the supply of labour cannot be increased with the increase in demand. Under perfect competition, the upply curve of a firm is perfectly elastic and the firm cannot influence the price/ wage. The supply curve of an industry is upward rising from left to right, this means that an industry can get more labourers at higher wages. Determination of the equilibrium wage level: Wage rate is determined by the supply of and demand for labour. Equilibrium wage state is said to be determined at the point where supply and demand are equal. In the fgure below, at point N, the supply curve and demand curve cut eachother. WN is the equilibrium wage rate. How to cite Labour economics, Papers Labour Economics Free Essays Because the coefficient is less than 1, the price elasticity is said to be inelastic. 3. We know that if the price of a product changes, we will see movement along the emend curve. We will write a custom essay sample on Labour Economics or any similar topic only for you Order Now Name and explain, using an example, three factors that can cause the demand curve for labor to shift. (3 marks) Factors that cause the demand curve for labor to shift can be the income levels of consumers. When there is an increase in one’s pay their confidence will rise which will allow them to want to spend more money. The demand of goods and services increase because there is also an increase in their disposable income. Also when there is an increase income some consumers taste and preferences may change Just like if there was huge decline in the income (they would prefer to shop on the sale jack). If they do not make as much money as before the demand for that goods or service will decrease (shift to the left) while they look for substitutes (goods or services for a cheaper price). For example, if Katherine gets laid off from work, instead of buying cleaning agents for their washroom at Shoppers Drug Mart where she normally shops, she would probably rather pick up two bottles of Pine sol for a dollar each at Dollar. Also firms may decrease the hours for their employees or even lay employees off when there is a decline in demand for their goods or services. They would not hire additional workers because their revenue may not cover their additional cost. 4. Briefly explain the difference between pay equity and employment equity. (2 marks) Pay Equity focuses on paying an employee for the value of their work without discriminating against the employees’ sexual orientation. Whereas employment equity lies under the Human Rights legislation, where one should not be discriminated by their sexual orientation, religion, age, race, and disability. This allows a firm’s workplace environment to be more diverse and allowing everyone an equal opportunity when applying to work for one’s company. How to cite Labour Economics, Papers

Thursday, December 5, 2019

Mobile Technology Pro and Con of California Smartphone Bill

Question: Discuss about the Pro and Con of California Smartphone Bill? Answer: Introduction In the modern era of information and communication technology individual are habituated to using computer and its application. But the mobile development and its application are used rapidly in the new growing sectors (Griffey 2012). There is an international positive influence of mobile technology. Thus implementing an effective mobile technology developed as well as developing countries are providing an effective service. Mobile technologies as well as applications are running on a small hand device which is easy to use, movable and accessible from any place and anywhere. It is observed that many people are using this technology to use the internet to contact family and friends, create and edit documents, for file content management, for entertainment and document handling (Cragg and Chapman 2013). On the other manner, it has been seen that to function in a better ways, Information technology uses a broad spectrum of software and hardware solutions that help an organization to anal yze, evaluate and gather data and information in well-organized manner. Thus, present report has discussed the government assesses and encryption of data and information on electronic devices such as mobile. This sector also argued about the pro and cons of California Smartphone Bill. Mobile and encryption technology:- The demand for assessing to organization data and information through mobile technologies include the Apple iPad and iPhone, device running Window 7 mobile and Google android or using RIM Blackberry is raising customer behaviors and preferences spill over the organization workforce. In addition, with the help of mobile technology people use company resources and data without being fixed to a single area. On the other hand, an effective mobile technology helps an organization to set up new clients and also check stock and price availability. Mobile technology contains the mobile infrastructure, GPS tracking solution, mobile hardware and software, etc. (Cragg 2011). Protection of data and information is the highest property of an organization, because with help of businesss data and information other organizations or competitor build better market and gain better profit. Thus to protect client data and information, Most of IT technology organization such as Apple, Google and Samsung implement better security policies in their devices. Moreover, to implement better security and protect individuals data in more convenient manner organization use encryption software or encryption algorithm to scramble the information and make it complex or unreadable. The data and information transmitted or stored and when someone wants to view information or data they use the password or pass key to decrypt or unlock it (The Huffington Post 2016). Apple, Google and other mobile technology strategies in data protection Android by Google and IOS of Apple hold approximately more than 96 percentage of Smartphone in an international market and they implement most effective security policies in their devices. As per the Apples website, the devices running new version and IOS8.0, the personal information and data including messages, photos, contacts, iTunes, call history, remainder, and notes is placed under an effective protection of individuals password (macobserver.com 2016). On the other hand according to Apple and Google, they implement an effective data protection acts in its devices. As per their view, they make their devices in such a manner that no one can access their devices without a pass code. In addition, if an individual can forgot their password then manufacturer cannot retrieve their password. California smart phone Bill California implements new smart phones bills, as per the bill Existing rule and regulations requires that a Smartphone or mobile devices that is built on after 1st July 2015 and put up for sale in California after that date, contains an effective technology solutions at the time of sale (digitaltrends.com 2016). It contains the hardware, software and both hardware and software that once started and communicated to the mobile phone devices can make inoperable the effective features as explained of the Smartphone of the unlawful clients. As per this new smart phones bill, a mobile device or Smartphone that is built on or after 1 January 2017 and put on the market in California to be able of being unlocked and decrypted by its operating system and manufacturer. The bill would, apart from the terms as provided, subject a lessor or seller that knowingly not fulfill to follow with this requirements will lead to a civil punishment of $2500 for each mobile phone device or smart phone leased or sold (leginfo.legislature.ca.gov 2016). The bill would proscribe a lessor or seller who has paid on to buyers of phone. In addition,, this act would authorize only a district attorney and Attorney General to bring a civil suit to implement these provisions. Should such a bill pass, it would, similar to the New York bill, influence both Google, and Apple. Android and iOS have default encryption settings that don't permit the organizations to get to secured client telephones. Beginning with iOS 8, Apple stopped putting away encryption keys for iOS gadgets, making it unthinkable for the organization to open substance on password ensured gadgets under police demand (rt.com 2016). In a discussion with Ars Technica, Cooper contended that giving neighborhood law authorization authorities the techniques to get to decoded or unencrypted cell phones utilizing warrants to battle unlawful activity like human trafficking was not the same as giving the CIA or NSA free get to. "In case, a terrible gentleman country can get a quest record for your home, bank, and get a court order for pretty much anything, As of late, a father of six was killed in Evanston, Illinois. City of Evanston, Police trust that before his murder, the subject was robbed of a huge total of cash. There were no observers to or observation footage of the murdering. The deceased used iPhone 6 and Samsung Galaxy S6 Edge running Google Android. Cook County prosecutors provided Google and Apple with legal warrants to open the Smartphone, trusting that pertinent proof may be put away on them. Google and Apple answered, in substance, that they proved unable, in light of the fact that they didn't know the client's password. Data that may be vital to unraveling the murder, accordingly, had successfully kicked the bucket with the casualty. His crime stays unsolved. His executioner stays on the loose (cnet.com 2016). It is not hyperbole to speak that starting in September 2014; Americans yielded a measure of their insurance against ordinary violations to Google's and Apple new encryption arrangements, before the progressions, neither organization, as far as anyone is concerned, ever proposed that their encryption keys, held by the organizations, were defenseless against hacking or robbery. California Smartphone Bill includes; a) As per the Federal Communications Commission, cell phone theft now represents approximate thirty to forty percent of thefts in numerous significant urban areas the nation over. A large portion of these thefts regularly turns vicious with some subsequent in the loss of life. (b) Consumer Reports extends that approximately 1.6 million Americans were exploited for their cell phones in the year 2012. (c) As per the time New York Times, one hundred thirteen cell phones are stolen or lost each moment in the US (FBI 2016). (d) As per the County of San Francisco and the Office of the District Attorney for the City in the year of 2012, more than fifty percent of all thefts in San Francisco included the theft of semaphores and mobile devices. (e) Thefts of cell phones in Los Angeles expanded twelve percent in 2012, as indicated by the Los Angeles Police Department. (f) As per the press report, the global trafficking of stolen cell phones by composed criminal associations has become exponentially as of late as a result of how gainful the exchange has gotten to be. (g) With a specific end goal to be compelling, antitheft innovative arrangements should be universal as thieves can't recognize those cell phones that have the arrangements empowered and those that don't. Accordingly, the technical arrangement ought to have the capacity to withstand a hard reset or working framework minimize, come reequipped, and the evasion setting of the arrangement should be to motivate the buyer to empower the arrangement amid the introductory gadget setup. Buyers ought to have the choice to certifiably choose to cripple this insurance. However, it must be clear to the purchaser that the capacity the customer is choosing to impair is planned to keep the unapproved utilization of the gadget. Pro and cons of California mobile Bill A California administrator has presented the US' second state bill went for forcing indirect accesses that would permit law requirement powers to get to scrambled gadgets, for example, cell phones. The bill, AB 1681, presented by California state get together part Jim Cooper, is like a bill re-presented in New York State. The fundamental contrast is that the New York bill is gone for battling terrorism, the California bill was exhibited as a way to battle human trafficking. The main pro of implementation of California Mobile Bill is a security risk. Security advocates have criticized such legitimate endeavors as in fact unworkable, and Apple CEO Tim Cook has contended that secondary passages went for permitting law authorization access would definitely be misused by malignant performers. "In the event that you stop or debilitate encryption, the general populations that you hurt are not the people that need to do awful things," he said in a meeting last November (Thetelecomblog.com 20 16). "It's the great individuals. The other individuals know where to go." He said the organization stays resolved to "end to end encryption and no secondary passages" (Apple 2016). Google has likewise advanced secure interchanges, for example saying in 2014 it would rank destinations with HTTPS encryption higher in list items. The state endeavors mirror a more extensive strain between governments, a significant number of which are pushing for restrictions on encrypted communication, and cell phone producers, for example, Google and Apple, which say such impediments hazard making security vulnerabilities. In March of a year ago Google official executive Eric Schmidt anticipated at a gathering that administration endeavors to breaking point encryption would come up short, including, "we don't know how to fabricate a trap entryway in these frameworks which are just accessible to the great folks." Industry eyewitnesses have estimated that the California and New York state laws would be unlawful under US government procurements that prohibit states from forcing exorbitant hindrances on interstate trade. If this bill is implemented then data confidently and privacy act not be followed in an effective manner. On the other hand, it has been seen that implementation of this will is not easy because of an organizati on (fpf.org 2016). Also, as per the data protection act it has been seen that without permission of an individuals organization as well as the government has no authority to access data and information (Jay and Hamilton 2003). Also, Google and Apple argued that it is not easy to make such type of hardware or encryption technology to access data and information. Therefore, as per my opinion regarding California Smart phone bill, it has been said that implementation of this will not secure individuals data and information. In addition, Government said that they use this law to track individuals location, but it may also hamper individuals rights and ethics. On the other manner, most of an individuals do not want their information to any one thus in such a manner if government implements this bill in their countries then they do not obey individuals act. Conclusion Thus taking into the above consideration, giving special access to California law authorization and insight offices will be unsafe, as opposed to support to national security. Regardless of worries of going dark the consistent increment of smart phones overall furnishes these organizations with a continually developing measure of important information furthermore, meta-information to use in distinguishing and seeking after focuses of investigations. References Apple,. 2016. "Apple". https://www.apple.com//?afid=p238%7CsJeCN3FhD-dc_mtid_1870765e38482_pcrid_107649348127_cid=aos-us-kwg-brand-slid-. Cragg, P.; Chapman. 2011. Mobile Technology. IGI Global. Cragg, Paul, and Prue Chapman. 2013. Mobile Technology. Hershey, PA: Idea Group Pub. FBI,. 2016. "Going Dark: Encryption, Technology, And The Balances Between Public Safety And Privacy". https://www.fbi.gov/news/testimony/going-dark-encryption-technology-and-the-balances-between-public-safety-and-privacy. fpf.org,. 2016. "Fpf.Org". https://fpf.org/wp-content/uploads/SwireCrypto070715.pdf. Griffey, Jason. 2012. Mobile Technology And Libraries. Jay, Rosemary, and Angus Hamilton. 2003. Data Protection. London: Sweet Maxwell. leginfo.legislature.ca.gov,. 2016. "Leginfo.Legislature.Ca.Gov". https://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=201320140SB962. The Huffington Post,. 2016. "California's 'Kill Switch' Bill Fails". https://www.huffingtonpost.com/entry/california-kill-switch-bill_n_5209335/. cnet.com,. 2016. "Cnet.Com". https://www.cnet.com/news/california-wants-to-ban-encrypted-smartphones/. digitaltrends.com,. 2016. "Digitaltrends.Com". https://www.digitaltrends.com/mobile/california-encryption-bill-law/. macobserver.com,. 2016. "Macobserver.Com". https://www.macobserver.com/tmo/article/california-bill-would-ban-encrypted-smartphones. rt.com,. 2016. "Rt.Com". https://www.rt.com/usa/264801-california-senate-smartphone-warrants/. Thetelecomblog.com,. 2016. "California Follows Suit, Proposes Anti-Encryption Smartphone Bill Thetelecomblog.Com". https://www.thetelecomblog.com/2016/01/22/california-follows-suit-proposes-anti-encryption-smartphone-bill/.