Thursday, December 26, 2019

Visa Inc.

Visa Inc. Present Vision Statement Visa Inc. is an American-based global payments technology corporation that allows the governments, businesses, and consumers to utilize the digital currency. In other words, Visa Inc. is a financial services company that operate worldwide. As premier company in the payment technology industry, the company thrives to enhance its global network that connects numerous financial institutions with millions of cardholders and merchants daily. The company is also committed to making significant contributions to the communities in which they operate. Brief History Visa Inc. has been pioneering payments and being at the core of cashless revolution for over 55 years (Visa Inc. 2017). The company history can be traced back in 1958 after the Bank of America established its initial consumer credit card program for medium to small sized merchants and middle-class consumers in the United States. In 1974, the company had already expanded to the international market, and in 1975, it launched the debit credit. In 1976, the BankAmericard was renamed to Visa. In 2007, regional businesses merged to form a global corporation, Visa Inc. and it went public in 2008. In 2016, the company acquired the Visa Europe. Today, the company has expanded its operations to over 200 countries around the world with its services and products available on devices such as laptops, tablets, cards, and mobile devices (Visa Inc., 2017). Consumers and competitors The main consumers involve individual consumers, financial institutions, businesses, merchants, government entities, and strategic partners. The consumers products and services include debit cards, credit cards, prepaid cards, and commercial cards. The main competitors include MasterCard, American Express, JCB, and Discover Diners Club. In some countries, the evolving regulatory landscape and the technological and innovation advances are changing the scope of competition. This has resulted to emergent of new entrants and enabling processing competition or local and regional networks such as STAR, Pulse, and NYCE in the United States, EFTPOS in Australia, and Interac in Canada (Visa Inc. 2016). Formal organizational structures The company has an established matrix organizational structure with the management team and the board of directors. The reporting relationships follow a matrix or a grid structure, rather than the hierarchical structure. According to Analoui and Karami (2003, p.193), Matrix structures integrates â€Å"both the functional structure and the divisional structure simultaneously.† In this case, the workers in the organization have twofold reporting relationships in which they can report both to the product manager and functional manager. The management team is led by Alfred Kelly, Jr., who is the companys Chief Executive Officer while the Board of Director is led by Robert W. Matchullat, who is an independent chair. The management team collaborates to steer the company through network and product innovation, sales growth, brand management, and operational activities among others (Visa Inc., 2015). Profile its top leadership The company has an inclusive and fearless leadership that is led by Alfred F. Kelly, Jr. who is the Chief Executive Officer and the member of the board of directors. Ryan MClnerney is the president while Kelly Mahon Tullier is the Executive Vice President, General Counsel, and Corporate Secretary. In the board of directors, the top leaders include independent Chair, Robert W. Matschullat, who is a former Chief Financial Officer and Vice Chairman of The Seagram Company Limited. He is followed by the Lloyd A. Carney, a Chief Executive Officer at Brocade Communications Systems, Inc. Other top leaders include Lynne Biggar, a Chief Marketing and Communications Office and Jim McCarthy a Global Head of Innovation and Strategic Partnerships. The leadership team constitutes a team of individuals who have excellent skills and world-class experienced in corporate management and financial services (Visa Inc., 2015). Factors in the organizations general environment and its impact The main factors in Visas general environment include political, economic, social and technological factors. Political factors The decisions in the public sector have a significant impact on the Visas industry, business, and the communities where they operate. In this case, the company is permitted by law to participate in the political processes to better serve the interest of their employees, shareholders, and other stakeholders. In addition, the positive government attitude in the banking industry and current legislations favor the company. Economic factors The major economic factors that have an impact on Visas operation include consumer credit and spending, unemployment rates, and saving and investment levels among others. For instance, the gross savings have relatively decreases from 24.786 percent in 2014 to 24.746 percent in 2015 and hence pose a small impact on the companys operations (The World Bank, 2016). Socio-cultural factors These factors include a rapid change in lifestyle that demand for high-class services and products such as credit cards. In addition, increase in population and literacy level has also increased the demand for Visas product and hence favoring the business. Technological factors Technological advancement has led to the latest development in automatic voice recorder, automated teller machines, global money transfer, and credit card facility. People now prefer to stay in a cashless society, which promotes the business and operations for Visa, Inc. Task environment Main factors in Visas task environment include competitors, suppliers, and customers. Competitors The main competitors include MasterCard, American Express, JCB, and Discover Diners Club. The technological advancement and regulatory changes are favoring the new entrants in the industry and consequently threatening the profitability and performance of Visas business. Consumers The main customers involve individual consumers, financial institutions, businesses, merchants, government entities, and strategic partners. The cashless society and demand for middle-class products such as credit and debit cards have a positive impact on the profitability of Visa, Inc. Suppliers The company has ensured a positive relationship with the suppliers to grow its brand around the globe. The company has established programs such as iSupplier portal and supplier diversity to create a better connection with the suppliers globally (Visa Inc., 2017). Culture of organization The company promotes the culture of integrity that aligns with the established values and ethical standards. This culture provides every employee an opportunity to participate in decision-making and fell comfortable to raise concern and ask questions. The company also establishes a work culture that inspires others to act with integrity. Other core responsibilities of the managers are to lead by example, discourage retaliation, and keep an open door. For the company to drive the culture of integrity, it requires every employee to demonstrate ethical behavior, respect, trust, and good business judgment (Visa Inc., 2016). The company also embrace the culture of corporate responsibility by promoting the conducive business environment, diversity and inclusion in the workplace, financial inclusion, and working to enhance lives around the globe. Organization heroes According to the report by Jamison et al. (2016), the APIs can be considered as the companys unsung heroes because they connect devices and apps to allow every user to pin, post, and buy anything from different locations. They work as a link between products and the applications (Jamison et al., 2016). These APIs are connectors that exchange date between application, devices, and products. Their function is consistent with the companys slogan, everywhere you want to be. The role of organizations culture As illustrated above, the Visas culture is defined by the actions such as act with integrity, corporate responsibility, continually innovates, inspire others, and value others. As a result, this culture has created a favorable environment for shareholders, employees, community, and other stakeholders to work together towards achieving the organizations goals. In addition, this has resulted in technology transformation within the company that has driven the growth of the companys technology capabilities. Role of innovation The company has developed a series of innovation centers globally and highlight new capabilities, reflect on the future, and co-create with their clients. This has resulted in a multi-year transformation that has led to significant progress. In 2016, the company opened the innovation centers in Singapore, Miami, and Dubai to enhance the development of new technologies (Visa Inc., 2016). Commitment to sustainability The company is committed to minimizing the environmental impact while lowering the costs and increasing efficiencies. The company seeks to restrict paper usage, source the electronics and supplies responsibly, minimize waste on landfills and enhance the culture of sustainability among their employees. The company has established specific initiatives such as reduction of energy through efficient controls and lighting and reduction of water through responsible landscaping and low-flow water fixtures (Visa Inc., 2017). Threats and opportunities Opportunities Customer trend to embrace the use of cashless option such as debit cards is increasing every year. The advancement of internet and mobile payment is enhancing online payment through debit and credit cards. Threats Regulatory issues in some countries are anticipated to minimize the transaction fees on the cashless platform. Innovation and technology have led to the entry of new competitors such as PayPal leading to the highly competitive environment.

Wednesday, December 18, 2019

Spanish War - 855 Words

1. Was the Spanish American War in fact a splendid little war? What was splendid about it? Yes it was in fact a â€Å"splendid little war†. There were a few things that made the Spanish American Was receive that nickname. The war lasted only 115 days and the death outcome was far less than any other war. The United States gained Puerto Rick as well as Guam and other islands in the pacific. In the book it stated that â€Å"If ever there were a good war, it was the Spanish-American war. The war ended with the signing of the Treaty of Paris. 2. What impact did the yellow press have on American opinion and expansion in the 1890s? The â€Å"yellow press† was sometimes called â€Å"The Newspaper War† because of the scandal stories that the Yellow†¦show more content†¦Their main goal was to end high tariffs, strict control over transportation. The farmer’s alliances endorsed laws that included the control of the railroads, and to put more money in circulation. The Populist Party wanted a greater role of the government. They supported the increase in the circulation of money and of progressive income tax. They also supported the eight hour week day. It was unsuccessful because higher farming prices meant higher food prices and lower tariffs meant more completion. 2. Discuss the response of the major parties and national leaders to public agitation over tariff, the trusts, and the railroads. The farmers felt desperate and felt that there was no way out for them. They were constantly competing with monopolies and trusts. The railroads where putting the famers into bankruptcy and was impossible for them to make any money. The charge to use the railroads cost far more than the farms made, which lead them to borrow money from the bank and put them on the verge of bankruptcy. Though many groups tried to help the farmers out like the â€Å"Granger Movement† but they were all unsuccessful because monopolies controlled the whole farm industry. Work Cited: Tindall, George Brown and Shi, David Emory. America: A Narrative History. Vol 2, 8th ed. WW Norton:New York, 2010.Show MoreRelatedSpanish American War1254 Words   |  5 PagesSpanish American War Essay Clara Barton: Her Opinion on the Spanish American War Clara Barton October 1st, 1901 Glen Elcho, Maryland Dear Teddy Roosevelt, I would like to congratulate and acknowledge you for you becoming President of the United States of America. You proved your worthiness and dedication when you made life-risking decisions on the battlefield for the Spanish American War. You volunteered as part of the cavalry and broughtRead More Spanish Civil War Essay982 Words   |  4 Pages Spanish Civil War (1936–39), military revolt against the Republican government of Spain, supported by conservative elements within the country. When an initial military coup failed to win control of the entire country, a bloody civil war ensued, fought with great ferocity on both sides. The Nationalists, as the rebels were called, received aid from fascist Italy and Nazi Germany. The Republicans received aid from the Soviet Union, as well as from International Brigades, composed of volunteers fromRead MoreThe Spanish American War in 18981256 Words   |  5 Pages The quote A Splendid little war by Secretary of State John Hay summarizes the Spanish American War in 1898. While this war could be seen as an act of aggression by the 20th century standards this war was beneficial to the United States of America while being deviating to the Kingdom of Spain for many reasons. There were many causes for the Spanish American War. The first long term cause was the Wilson Gordon Tariff. This tariff ultimately decreased tariff rates for may Europeans nations excludingRead MoreThe Outbreak of the Spanish Civil War1087 Words   |  5 Pagesdescribe the Republican and Nationalist forces as being evenly balanced at the outbreak of Civil War in 1936? The outbreak of Civil War, in July 1936, was due to the murder of Sotelo by a PSOE supporter on the 13th of July. Sotelo was murdered in retribution of the armed action taken against the Asturias rising in which 3,000 miners were killed and another 35,000 were taken prisoner. At the outbreak of war both the Republicans and the Nationalists were fairly evenly balanced, however taking into consideration:Read MoreThe Spanish American War of 1898 Essay1316 Words   |  6 PagesThe Spanish American War of 1898 One hundred years ago, in 1898, the United States was fighting the Spanish-American War. The victory over Spain made the United States a colonial power. The Spanish colonies of Cuba, Puerto Rico, Guam, and the Philippines, as well as the formerly independent nation of Hawaii, became American possessions. The excuse for entering the war was the rebellion by the Cubans against Spanish rule and the explosion of an American battleship U.S.S. Maine. The Spanish coloniesRead MoreThe Outbreak of the Spanish Civil War Essay1619 Words   |  7 PagesThe Outbreak of the Spanish Civil War To this day the Spanish Civil War is still remembered as the single most pivotal moment in the history of Spanish politics. The only way of understanding how 600,000 Spaniards were killed between 1936 and 1939 is to ask ourselves why the civil war broke out in Spain in 1936. There were a number of reasons which led to the civil war in Spain. The main and most significant being the increased political polarization betweenRead MoreTaking a Look at the Spanish American War Essay945 Words   |  4 Pages During his presidency William McKinley said, â€Å"War should never be entered upon until every agency of peace has failed.† His message never fully reached the American people because in the late 19th century the people were longing for an opportunity to keep up with other empires and they took the first chance they approached. They saw war with Spain as a quick way to prove supremacy and saw plenty of benefits. The Spanish American war was inevitable for America because the people had a strong driveRead MoreEssay on The Cause And Effect Of The Spanish American War953 Words   |  4 Pagesimperialism in 1898 was not a sudden abandonment of anti-colonial tradition but was a logical extension of commercial expansion, something the US had been doing throughout its history (SparkNotes: The Spanish American War, 1898-1901,: Effects of the Treaty). President McKinley was not interested in wars of conquest or of territorial aggression. His interest in expansion was to make the United States first in international commerce and as a means to implement its humanitarian and democratic goals (FaragherRead MoreThe War And The Spanish Civil War987 Words   |  4 PagesBoth conflicts show that civil war was not the limit of the atrocities people were willing to commit in order to stop the influence of opposing ideologies. In both the Cold War and the Spanish Civil War the most significant air operations were carried in order to stop the spread of Communism. One of the factors that prompted the U.S. into dropping the atomic bombs in Nagasaki and Hiroshima was to stop the war in Japan as soon as possible. Many of Truman’s advisers, such as James F. Byrnes supportedRead MoreEssay on Spanish Civil War: The White Terror3295 Words   |  14 Pagesafter the Spanish Civil War refers to the actions carried out by the Nationalist regime. Among these actions were politically motivated acts of violence, rape, and murder. Such brutality was used because the Nationalist Movement believed that they needed to cleanse the country of all leftist ideologies. Lfhe purge of the nation did not stop with the wars end because there were still those individuals who refused to change their beliefs and accept the Nationalist way of life. The post-war White Terror

Tuesday, December 10, 2019

Companies Focused On Mitigation Of Risks â€Myassignmenthelp.Com

Question: Discuss About The Companies Focused On Mitigation Of Risks? Answer: Introduction As the computer industry has evolved so have the security measures used to safeguard data. To start with, there was computer security which involved limiting the level of access of ordinary users to the level that enabled them to only perform their tasks. Information security was the second aspect after users got personal computers and began innovating. The third term was cyber security was developed after the introduction of the digital era. Nowadays, there is cyber resilience that ensures that cyber security is implemented from the top level using the top down approach. Using this strategy, cyber security is not solely the task of the Information Technology (IT) department. Due to an increase cybercrime, companies ought to start embedding resilience protocols in their business models. This should be done through governance and management processes. This is aimed at protecting information in business processes such as product development which not only minimizes risk but also increases efficiency. According to a research carried out by Telstra, Australian companies are recognizing the significance of involving all stakeholders in cyber security (Telstra Cyber Security Report 2017, 2017). In addition, their research indicated that the Information Technology (IT) department was held responsible for the security breaches experienced in 2015 and 2016. However, their research also indicated that the blame has shifted towards top level managers due to an increase from 19 percent in 2015 to 61 percent in 2016 (Telstra Cyber Security Report 2017, 2017). Moreover, there is a rise in the involvement of executives in cyber security initiatives accounting. Methodology The research carried out involved secondary data retrieved from the internet. One of the sources was the Telstra Cyber Security report comprised of findings from a research carried out by Frost Sullivan. The online surveys conducted by Telstra gained 360 responses and 42 percent were from Australia. Additionally, Telstra used data gathered from its security products and partners. Majority of the results were derived from large organizations with more than five hundred employees globally (Telstra Cyber Security Report 2017, 2017). The research focused on the information technology sector, public sector and manufacturing and logistics respectively. The other secondary sources did not involve research findings. Threats Threats can be categories in various ways. First, cybercrime where the aim is to acquire financial rewards directly or indirectly. Second, cyber hackers that are motivated by a belief to achieve a certain goal. Third, cyber espionage which is aimed at getting a strategic or economic advantage. Fourth, business continuity management which includes natural disasters and consequences of human error (Cyber Resilience Best Practices, n.d.). The nature of threats varies depending on the forms of crimes and the tools used. For example, the forms may include, manipulation, blackmail, and theft. On the other hand, the tools used may be malware, spyware, ransomware, and devices (Telstra Cyber Security Report 2017, 2017). In some cases, such as ransomware there are companies that sell these services (Cybersecurity: Threats, Challenges, Opportunities, 2016). To begin with, there is the ransomware which occurs when one is denied access to a device until a ransom is paid. The most common is cryptoware which encrypts files and demands payment to unlock them such as Cryptolocker. Another type is Ranscam where the exhorters claim the file are encrypted while in reality they have been deleted (Cybersecurity: Threats, Challenges, Opportunities, 2016). In such cases, ransom is not supposed to be paid since companies have backups. However, companies choose to pay the ransom if the price is lower than the cost of implementing the backed-up files and resuming normal operation. In some cases, the files are not recovered after payment because they can be sold to third parties or they had been deleted. In Australia, these attacks are common as aforementioned. In 2016, 24 percent of the companies experienced this type of an attack and it took at most five hours to recover (Telstra Cyber Security Report 2017, 2017). A vendor research revealed that along the Asian region ransomware is the most downloaded tool of attack. This is because of the ease of availability on the internet. As a result, only 40 percent of the Australian companies in the research did not undergo such an attack. For those companies that paid the ransom, 33 percent failed to recover their files. Some companies choose to pay the ransom to maintain their reputation. Another form of threat is botnets. A bot is a device that is compromised, controlled remotely and connected to the user such as a webcam. A collection of bots makes up a botnet. With a large number of botnets, one can carry out a distributed denial of service attack such as the attack on the website of the Australian Bureau of Statistics Ecensus in 2016 (Cybersecurity: Threats, Challenges, Opportunities, 2016). Denial of service attacks occur when many messages are sent to a website making normal operation to halt. On the other hand, distributed denial of service attack occurs when many devices are used to deliver this attack (Cybersecurity: Threats, Challenges, Opportunities, 2016). Phishing is form of attack that occurs when a user clicks on a malicious link in an email that had posed as a trusted message and malware is downloaded and executed. An example is a fake shopping invoice phishing for credit card information. Spear phishing attack is when an email targets a certain member of an organization based on research carried out mainly through social media. Another term that is used is whaling which occurs when a phishing attack targets a top senior executive (Telstra Cyber Security Report 2017, 2017). Generally, these forms of attack are can be grouped as social engineering attacks operations (Cyber Resilience Best Practices, n.d.). Adoption of security protocols The findings revealed that most companies use various security measures such as access controls. They also use guidelines from the Australian Prudential Regulation Authority and Australian Cyber Security Center (Telstra Cyber Security Report 2017, 2017). Mainly, audits are conducted and assist in the formulation of policies on cyber security. There was also an increase in the number of board briefing meetings conducted by companies within a month. These board meetings checked on the effectiveness and efficiency of the security measures being used by the companies. This is proof that many companies are involving the top management in cyber security initiatives. However, there are vital security measures that majority of the companies do not implement. The findings revealed that majority of Australian companies do not conduct cyber drills (Telstra Cyber Security Report 2017, 2017). Cyber security drills are useful for testing the response and continuity plans in case an attack occurs. Further, most companies do not adopt the Payment Card Industry Security Standards which are required to avoid security breaches for those who accept credit cards. This was attributed to lack of awareness, outsourcing of this function and the lack of use by the majority. Finally, there was also a small percentage of companies that failed to check the authenticity of the information provided by their vendors. Framework Cyber resilience is used to ensure the company is able to continue meeting its objectives. This means that the measures employed must be aligned to the objectives. The framework outlined is in the Cyber Resilience Best Practices and is based on the ITIL service management lifecycle (Cyber Resilience Best Practices, n.d.). This approach was developed in 1989 and has continued to deliver effective IT services. This framework can also be used by companies that do not use ITIL in IT service management. The elements of this cyber resilience are clear ownership and responsibility for it by the board and tailored training for the employees. as a result, the companys critical assets and key threats are identified and communicated. The company is also able to assess its cyber resilience strategy. There are also control measures that a company must employ to maintain balance in cyber resilience. The first are preventive controls which are used to prevent incidences that lead to attacks. The second are detective controls that are used to indicate when such incidences occur. The third are corrective controls that respond and correct such incidences. The selection of the right balance depends on the ability of the company to deliver services, maintain customer convenience and mitigate risks. The design and implementation of these controls is done based on the management system the company uses. For example, there is the strategy, design, transition, operation and continued improvement used by ITIL (Cyber Resilience Best Practices, n.d.). The first stage of the cycle is the strategy. Here, the objectives of the company are clearly defined and understood so all the activities that follow are based on them. Then, the critical assets that are information, systems and services are identified. These assets include those that are essential to the stakeholders. The threats and risks that these assets face are also outlined. The second stage is the design. The design is done based on the strategy that was set up. The selection of the appropriate controls, training, and procedures is done. Moreover, the levels of authority for different personnel is identified so everyone knows who has the power to do what (Cyber Resilience Best Practices, n.d.). The third stage is transition where the operation of the controls is tested. This is where the detection occurs since the company through testing knows when an asset is not right through an accident or malicious action. There is also detection of where the attack came from that is internal or external. The fourth stage is operation where controls are operated (Cyber Resilience Best Practices, n.d.). It involves continual testing of the controls, the readiness of a company to respond to attack, minimize the effects and provide the solution within the required time span. The last stage is continual improvement where the strategy must evolve as technology evolves. It must also redefine the whole process once an attack occurs so as to learn from it. Recommendations In order to achieve cyber resilience, the company must identify the types of information it holds and determine what types need to be protected depending on how important the information is. There is sensitive information in every company that must remain confidential such as commercial agreements. For other companies, the integrity of the information is what matters most. Therefore, companies should not aim to protect all information with the same level of security measures. In such cases, there may be some compromises to be made. The decision- making process should involve all stakeholders not only the IT department. In fact, there should be a system where the ownership of information assets is given to those departments that heavily rely on the information. For example, customers personal informations security measures are best identified by the sales and marketing department (Cyber Resilience Best Practices, n.d.). Cyber resilience requires the active participation of other departments. This requires the involvement of the board to oversee this transitioning. In addition, the risk management process but be aligned with the control measures implemented in the cyber resilience practices (Cyber Resilience Best Practices, n.d.). For an effective cyber resilience practice, all stakeholders such as customers, suppliers, and partners must be involved. For example, to implement controls, the procurement department must cooperate to determining the cyber resilience requirements for different suppliers. Similarly, the handling of client information requires the cooperation of the sales and marketing department especially when the information is shared with suppliers. Cyber resilience can also be implemented through sharing of information among organizations. For example, companies can unite and share information about common security threats and attacks (Cyber Resilience Best Practices, n.d.). This can assist those companies that have not been affected to update their security measures. The information shared can also provide the solution on how to detect and remedy such incidences. It can also provide a forum where businesses can acquire training on state of the art technology to handle cybercrime. The government can also formulate standardized policies that must be met to enhance security. Cyber resilience depends on people, processes and technology. The company must provide training to create awareness among employees, suppliers, partners, and customers. This is to ensure security is maintained for all types of information. In the design and implementation of the company, the culture of the company must be considered (Cyber Resilience Best Practices, n.d.). This is because the processes of an organization are governed using clear set rules or loose guidance. The designs chosen should not affect the performance of the company. In regards to technology, the technology and security measures used should cut across different departments and stakeholders. To maintain resilience the company should not only employ various detection and response technologies but also invest in conducting cyber drills. In fact, if those strategies are not tested they are bound to fail. Testing is beneficial for the organization since it needs to use some resources to cater for a threat that has occurred while ensuring all other resources are geared towards providing products and services as before. Therefore, the continuity plans of the organization are vital in case of an attack. If the company uses credit and debit card information it must comply with the PCI security standards (Telstra Cyber Security Report 2017, 2017). Conclusion Conclusively, generally, the policies and frameworks adopted must meet the companys requirements and be aligned with the objectives. As aforementioned, sensitive information is being shared between the business and its partners. This has necessitated the need to include all stakeholders in the cyber resilience practices to achieve efficiency and effectiveness. Companies need to work together with the government to create policies that enhance cyber resilience. Finally, the company should reinvent its business practices to keep up with technological advances and cyber resilience practices. References Cyber Resilience business Practices. (n.d.). [ebook] pp.4-19. Available at: https://www.tsoshop.co.uk/gempdf/RESILIA_Cyber_Resilience_Best_Practices.pdf [Accessed 9 Sep. 2017]. Cybersecurity: Threats, Challenges, Opportunities. (2016). Australian Cyber Security, management. Telstra Cyber Security Report 2017. (2017). Telstra Corporation Limited, pp.4-30.

Monday, December 2, 2019

Metaphors Essays - Love, Emotions, Philosophy Of Love, Romance

Parallel Paths The poem ?Parallel Paths? by Kevin Clark is a metaphorical account of a marriage and the challenges it encounters. It is difficult to follow this story of love and how communication should bring a relationship closer. When considering the title of the poem ?Parallel Paths?, the lines never get closer; they stay separated. There are several metaphors to examine in the poem in order to understand the message. In the first few metaphors, the speaker sets the tone (lines 1-3). ?Today you?re lucky in love with your wife for the first time in weeks, both of you out for a walk in the overgrown garden?. This indicates the relationship has fallen onto hard times and there are difficulties in the marriage. It soon becomes clear that love is not the only thing needed for a long lasting relationship. It takes communication, reasoning and a bit of flexibility from both people in the relationship in order to get through the complexities of a marriage. Relationships and marriage bring something different for everyone, with their own set of issues and problems. Understanding the situation is critical and the one most important thing that brings people together is love so it is very important never to lose the remembrance of the feeling of being in love. The speaker speaks of a park that has not been taken care of which relates this to a marriage that has not been doing well (2-3), ?both of you out for a walk in the overgrown park?. If they do not constantly work to grow the relationship, it can potentially split apart. It is not always easy but if both parties in the relationship open the lines of communication, they will be able to make it through and make it work. When talking about relationships and marriage, if communication is absent then there is little hope that some issues can be resolved as neither person knows the other?s thoughts. The best way to remedy most issues is to spend time communicating and constructively sharing ones true feelings. As the speaker continues, he relays the woman in the relationship is stepping away from trying to work things out because there is no communication and both parties have given up on each other (19-22) ?Now the woman feigns confidence, stepping gracefully away, Two lives irrevocably?. This shows sometimes in a relationship people choose not to work issues out and give up on one another. In the last quarter of the poem the speaker then turns the poem around (31-40) ?Or right now: how all these thoughts have occurred to you in a flash. When you look up, your wife?s vanished, But really she?s there, of course, off the path, among the ancient waist-high grasses, holding out to you a single mutable wildflower burning in its own ochre light. From here to that flower exist no guarantees. Best to get on with it?. It showed that there was still time to save the marriage, when it seemed the relationship was all but over and would not be able to recover. The couple then decided to communicate and work on their relationship and their marriage. It can be said if there is a little bit of fire in the marriage left from both partners, then there is good chance they will be able rekindle their lost love for one another and try to work things out through communication. When the speaker uses the metaphor ?a single mutable wildflower? (37), he is inferring that it is unknown that this relationship will last, but they will at least give it all their effort in communication and remember the love they feel for one another. Being negative about fixing issues in a relationship, or being unwilling to work things out almost guarantees it will not be a lasting relationship. Approaching issues optimistically and showing genuine concern to fix them validates the commitment to the relationship. The speaker took this poem ?Parallel Paths? from one extreme to the other by starting out in a place of no hope, going to the possibility of saving the marriage if they can communicate with one another. It seems in conclusion that people can sometimes go their separate ways in a relationship, but