Tuesday, December 24, 2019

Vision Statement Ford Motor Companys Mission Statement

Corporation Vision, Mission, and Primary Stakeholder A mission statement addresses the actions that are needed to meet the organizational objectives of a business goal (Thompson, 2015). Ford Motor Company’s current mission statement is about the response to current challenges that company has experienced in dealing with new market risks, such as the American recession and the global financial crisis that started in the late 2000’s (Thompson, 2015a). Ford’s mission statement is â€Å"One Team, One Plan, One Goal (Thompson, 2015a). The company’s mission statement emphasizes teamwork to achieve synergy at Ford (Thompson, 2015a). It is important for Ford to unify all of their organizational stakeholders into one cohesive unit. Ford’s vision statement is â€Å"people working together as a lean, global enterprise for automotive leadership† (Thompson, 2015a). The vision statement emphasizes the company’s global leadership, which is how the firm wants to be recognized as one of the top contenders in the international automotive market (Thompson, 2015a). A company’s mission statement specifies how the firm intends to compete and serve their customers (Hitt, Ireland, Hoskisson, 2013, p.18). The vision and mission provide the foundation for an organization’s strategies (Hitt et al., 2013, p. 18). The company’s objectives should be inspiring and relevant to all their stakeholders (p.18). Ford’s vision statement addresses the concerns of their stakeholders and their ability to enhance the firm’sShow MoreRelatedFord Motor Company The Song Comes1637 Words   |  7 PagesWhen I think of Ford Motor Company the song comes in my mind, Mustang Sally, think you better slow your mustang down, you been running all over the town now, I guess I have to put your flat feet on the ground, all you want to do is ride around Sally, ride, Sally, ride. A good looking man is driven a red convertible mustang with a woman riding on the passenger side with a white scarf on her head as well as the lady is wearing a red satin t op along with having on plan make-up with candy apple red lipstickRead MoreCompany Overview Of Ford Motor Company1608 Words   |  7 PagesCompany Overview Ford Motor Company is a public corporation that began its operations in 1903. The company designs, develops, manufactures, and services cars and trucks across six continents. Furthermore, it divides its work between two main segments – an Automotive Segment and a Financial Services Segment. The Automotive Segment is in charge of marketing its products through worldwide retailers and distributors, as well as selling them to dealers or fleet customers. This sector also provides retailRead MoreCase Study : Ford Motor Company1340 Words   |  6 PagesHenry Ford opened his first factory, Ford Motor Company has been changing the automotive industry all across the world. What started out, as a small company with big ideas has become one of the largest and profitable companies in the world. Ford Motor Company, communally known as Ford stared out as a family own company and today is still run by the Ford family. Today, where companies are having to sell or partner with other companies , it is amazing to see a family company grow in the way Ford has sinceRead MoreMarketing Project : Ford Motor Company1489 Words   |  6 PagesThe Ford Motor Company enlivened an assembling transformation with its large scale manufacturing sequential construction systems in the early 1900 s. Ford is one of world s most surely understood car brands, consumer’s top choices were vehicles like the Ford Mustang, and F-Series tucks. Ford Co. is known as one of the biggest auto organizations on the planet. Company Description Ford works as an auto and portability organization around the world. Ford’s main core business incorporates Ford hasRead MoreExplain Strategy Management Process1522 Words   |  7 PagesTHE STRATEGIC MANAGEMENT PROCESS Ford Motor Company, facing huge losses and hemorrhaging market share to Toyota and Nissan, knew it needed a new strategic plan. Competition was fierce, Ford’s costs were higher than competitors’, and Ford’s unused plant capacity was draining profits. Ford’s managers devised â€Å"The Way Forward.† This new strategic plan entailed closing a dozen plants and terminating 20,000 employees. As at Ford, a strategic plan is the company’s plan for how it will match its internalRead MoreFord Motor Company Case Analysis1104 Words   |  5 PagesThe current situation of the Ford Motor Company, revenue of $44 billion, 6 percent above second quarter 2006. The company net income of $750 million, or 31 cents per share. Profit of $258 million, or 13 cents per share, from continuing operations excluding special items. There was a significant year-over-year improvement for all automotive operations. Ford Motor Credit pre-tax profit of $112 million. Cost reductions of $600 million; $1.1 billion through the first half of 2007. There was automotiveRead MoreThe World s Leading Consumer Company For Automotive Products And Services915 Words   |  4 PagesBACKGROUND Vision Statement â€Å"To become the world s leading Consumer Company for automotive products and services. (Homepage, 2015)† Mission Statement â€Å"One Team. People working together as a lean, global enterprise for automotive leadership, as measured by: †¢ Customer, Employee, Dealer, Investor, Supplier, Union/Council, and Community Satisfaction One Plan. †¢ Aggressively restructure to operate profitably at the current demand and changing model mix; †¢ Accelerate development of new productsRead MoreFord vs Chevy Essay1306 Words   |  6 Pagesï » ¿Ford vs Chevrolet Ford and Chevrolet (Chevy) are in the automotive industry and have been in completion for many years start back in 1908, both companies started in the state of Michigan and have been battling it out for profits, market share and hometown bragging rights. Ford was founded in the suburb of Dearborn, Michigan and Chevy was founded in Flint, Michigan. Ford and Chevy both are good-producing sectors, they both manufacture automobiles that are similar but different. They each haveRead MoreEthics629 Words   |  3 Pagesindividual views unethical behavior. Social responsibility is the company, management, and employees working and conducting themselves by following rules of society. Companies that include ethics and social responsibility into the companys mission and vision statement have a greater chance of succeeding. Ethics is based on an individuals actions. These individual actions affect the business. Adelphia, one of The United States largest cable company, failed because of poor leadership. LeadershipRead MoreEthics628 Words   |  3 Pagesindividual views unethical behavior. Social responsibility is the company, management, and employees working and conducting themselves by following rules of society. Companies that include ethics and social responsibility into the companys mission and vision statement have a greater chance of succeeding. Ethics is based on an individuals actions. These individual actions affect the business. Adelphia, one of The United States largest cable company, failed because of poor leadership. Leadership

Monday, December 16, 2019

Fashion -a Person Free Essays

Para -â€Å"Fashion† meaner the prevailing mode in such things as are subject to change in form or style, as in ornament and etiquette, and especially in dress in the dictionary. -It has spread in all the spheres of our life. -The craze for fashion is great among young people all over the world. We will write a custom essay sample on Fashion: -a Person or any similar topic only for you Order Now Para -l agree with the girl on the right. -A person should be dressed in clothes that suit him or her. – A person should not lose his or her personality, deny the comfort and waste money on these well- designed products of one’s imagination. Clothes are put on to help one look presentable. -People should not follow fashion blindly because it might not reflect our personality. -Moreover, the fashion designers created their clothes for certain people, so it cannot suit everyone. -Ones should choose the most comfortable clothing on their own, because only they know what is the most suitable and convenient for them. Para -Malaysia is a country without four seasons. -Malaysia’s weather is always hot. -Thick and woolen clothes are not suitable for our climate. We must choose our clothing properly because certain clothes are against our culture or tradition. -Some people may misunderstood and feel that we did not respect them. -We should not wear clothes that are too sexy. Para -Certain clothes are not suitable for the ordinary person because they are special designed for celebrities. -Certain clothes will look exaggerate on us. -Sometimes,we will even being laugh by others . Para 5 – Economically, fashion trends valued by high price. A person that follow fashion has to spend a lot of money buying new clothes as fashion changed everyday. – It is reasonless because for the same amount of one can buy a tremendous lot of clothes which are likely to help to express his personality. – Hence,a person should not pay such a high price to follow the fashion. Para -As a conclusion,we should wear clothes that suit oneself because it risk a lot as we will lost a lot of money and we will lose our own personality if we follow fashion blindly. Fashion: -a Person By Berries How to cite Fashion: -a Person, Essays

Sunday, December 8, 2019

Professional Skills for System Analysis International Business Machin

Question: Discuss about theProfessional Skills for System Analysis for International Business Machines Corporation. Answer: Introduction Willowbrook School is a small and private school in the Midwest United States. The IT Consultant of the school recommends implementing a new computer information system to handle both financial as well as administration works. It increases the enrollment applications of the programs. Due to increase in students application, coupling with increasing demand for the after school care leads to increase in high workload over the staffs as well as administrative staffs. For this reason, the Director, Victoria Owens discusses with the IT consultant about the possibility to set up a computer system to reduce the workload. The report is based on eight parts. It gives the justification of the system design architecture for Willowbrook School. The report reflects on physical as well as logical network topology. A list of hardware for the designed network topologies is given to become familiar with the used hardware for the new information system. A system design specification document is analyzed to identify the goal and purpose of the system design report. An application development methodology is discussed for the Willowbrook School. Testing plan is given to test the systems requirements for the school. The training plan is given to training the staffs, teachers as well as volunteers based on the needs of the users groups. Data conversion as well as system changeover method is developed for successfully implement the system for the school. Architecture for Willowbrook School Proposed System Architecture Figure 1: System Architecture for Willowbrook School (Source: Chernyi 2015, pp-62) Justification on the System Architecture The architecture of the Willowbrook School information system is proposed as client based server architecture. The client server architecture of the school consists of a network architecture in which each of the computers on the network is either client or server. Using this server, the client computer can send resources request to the server over the network connection, when the resources are delivered to the client (Chernyi 2015). The client sets up a connection to the server over the local area network such as an internet. A three-tier architecture is suggested as the best option for the school. It has three tiers such as presentation, application, and data tier. Firstly, the presentation tier engages the top level as well as shows the information related to the service (Power, Sharda and Burstein 2015). It converses with the other layers by sending results to the browser. Secondly, the application tier controls the application functionality by performing a processing (Venkatesh, Thong and Xu 2012). Thirdly, the data tier houses the database servers where the information is stored. Data are kept independent of the application servers. Advantages and Disadvantages of the Proposed System Architecture Advantages Disadvantages Using the client server architecture, Willowbrook School will increase their productivity throughout the use of cost-effective user interfaces, enhancing the data storage as well as consistent application services (Devine, Shifrin and Shoulberg 2015). Due to a huge number of client's request, the servers are getting overloaded, and it forms traffic congestion. Use of SQL supports open access from the client, as well as gives transparency within the network services, represent that comparable data are shared among the users. As the client based server is centralized, therefore if the server fails then the client requests are not proficient (Dennis, Wixom and Tegarden 2015). Client server has better control access to make certain that only authorized person can access the data, as well as server updates, are to be controlled professionally (Chang et al. 2015). The server is quite expensive to purchase. The software, as well as hardware used for the server, is very critical. Specific hardware, as well as software, is used, and it results in increasing the cost. Cost Benefits Issues The issues regarding the cost benefit are to reduce the load on the network as well as make changes in the response time from the service provider side (Mithas et al. 2012). Willowbrook School needs an expansion in their information system network. Physical and logical topology Physical Topology Figure 2: Physical Bus Topology (Source: Oluwatosin 2014, pp-67) The physical bus topology consists of computers as well as servers that are associated to a single cable with the assist of interface connectors. The central cable is the backbone of the network (Oluwatosin 2014). Each of the workstations is communicated with other device by means of a bus. A signal from the source is broadcasted, and it travels to the workstations associated with the bus cable. A terminator is connected to prevent the bouncing of signals. Logical Topology Figure 3: Logical Bus Topology (Source: Oluwatosin 2014, pp-67) The LAN that eliminates a logical bus topology delivers the signal generated by the transmitter towards the attached devices (Oluwatosin 2014). Within this network topology, none of the end devices is required in order to regenerate signal for other attached devices in order to receive it. It is the method that the data are passed throughout the network from one of the devices to the other based on the physical interconnection of the devices. Ethernet is reflected as the logical bus topology for the particular proposed system. List of Hardware for Designing the Topologies Web Server Database Server CPU and RAM Router Access point to connect with the internet Application Server Network Hardware System Design Specification Document Project Scope The scope of the project is that the Willowbrook School includes the ability to increase the enrollment of the student without hiring of any extra staffs. The new information system tracks the enrollments, aftercare billing as well as payments. The proposed system monitors the process of tracking, reviewing the cost as well as reporting (Schwalbe 2015). The system can individually track the billing details of the individual students. System Design The resources used to implement the new information system are Web Server, Database Server, CPU and RAM, Router, Access point to connect with the internet, Application Server and Network Hardware. The new information system is proposed as client based server architecture (Vaishnavi and Kuechler 2015). A three-tier architecture is suggested as the best option for the school. Component and Process Design At first, the user is identified when they give their ID login details. Only the registered user can login into the system (Reynolds 2015). The user can connect the client server and then the registered user can authenticate throughout the token. After getting proper username and password, the server allows the users to use the system for financial and administration tasks (Haimes 2015). The user should use an internet connection to access the system. As the system stores the data of the students, therefore it is required to use server authentication to prevent the data from any unauthorized use. SQL database is used that supports open access from the client, as well as gives transparency within the network services, represent that comparable data are shared amongst the users (Dingsoyr et al. 2012). Data Design The data are at first use the direct cutover method but due to some problems, it uses the phrased operation method for aftercare billing (Power, Sharda and Burstein 2015). User Displays The users conducted those are involved with the implementation of the system are administrative staffs, principal, vice principal, teachers, students, and parents. Prototype Description Prototype 1 It allows the staffs to log in to the Willowbrook School using a user name, employee number as well as password. An essential employee login will view all the information of the student. Prototype 2 It allows the parents to log in to the Willowbrook School using username, student number as well as the password (Hwang, Kettinger and Mun 2015). An essential employee login will view all the information of the student. After the login, the parent clicks on the information of the student; they can able to view the address as well as a phone number of the student. System Development and Project Management Schedules After the set up of the architectural design phase for the system, some of its system specifications areas are updated such as detailed design, prototype testing phrase (Olsson, Bosch and Alahyari 2013). Therefore, it requires more time to complete the implementation task of the new information system for Willowbrook School. Project Extensions It takes extra four weeks to complete the entire implementation process of the system. Application Development Methodology The application development methodology is used to plan as well as control the process of developing the new information system. For the Willowbrook School, Agile Software Development Methodology is used to minimize the risks within the school by developing new information system (Givoni et al. 2013). This method emphasizes real time communication as well as overwritten documents. Using this methodology, the school can build small client approved as well as deliver large application at the end of the implementation process. Advantages and Disadvantages of Various Application Development Methodologies Structured Approach Object Oriented Approach Agile Methodology Advantages Disadvantages Advantages Disadvantages Advantages Disadvantages It minimizes the complexity of the new proposed system (Valacich, George and Hoffer 2015). It takes a lot of time as well as finance to analyze the new information system. It reduces the maintenance cost. This approach is best suited for the interactive as well as dynamic environment (Park and Sabir 2015). The information system applications such as payroll, accounting are not benefited from this approach. The needs of the resources for this methodology are minimum. There are some issues regarding the maintenance of the system. It gives future direction towards the system. Changes within the system take more time to analyze (Chernyi 2015). It gives a high level of the flexible system as the objects are to be accessed dynamically. The development of the object oriented approach is not done by all the vendors (Nelson 2013). It delivers the development process within the estimated timeline in a proper manner (Dillon 2014). It requires documentation generation as it has a high level of dependency among the individuals. It focuses on the logical system to perform the task. Staffs are required to give training when there are any changes in the system. The objects are provided with a roadmap when the application is scalable. As this approach is using complex data types, therefore it is difficult to implement. It gives teamwork with proper training to the staffs to train about handing the information system. This methodology is not able to handle compound dependencies. Testing Plan for Suitable Data Set Types of testing Description of testing for suitable data set System Testing System Testing is done to verify the login, verify the close registration, and maintain the information of the student as well as a professor. It also verifies the view report, register for the courses and selection of courses to teach (Paroni, Geremia and Valeri 2016). The system error results into logged off the system. Therefore, the fatal system errors result in shutdown of the system. User Interface Testing It verifies the navigation through a sample set of screens that conforms to GUI standards. The system can easy to use as well as accurate for the target market of the students as well as teachers (Devine, Shifrin and Shoulberg 2013). Performance Testing It verifies the response time in order to access the finance system and for submittal of registration for courses. Security and Access Control Testing It verifies the login from the local PC and verifies the username as well as password mechanism. Configuration Testing It checks for the configuration that if the client component of the system is configured properly with the network (Artzi et al. 2013). As the integrated system is functional, therefore the proposed system is to be tested based on its new operating system, network as well as PCs. Training Plan and Procedures Based on users Group Needs After the testing of the new information system, the staffs, teachers as well as other management members required training so that they can handle the system properly. The following are the user groups those are required to train on the new system as follows: Teachers of the Willowbrook School: The teachers are required to train as they teach the students and play a vital role in the school. The training topics those are required to consider are startup and shutdown the information system (Oluwatosin 2014). The teachers are required to use the system, as they require functioning the system. Therefore, they are also trained to fix the issue as well as troubleshooting. Staffs of Administrative Department: The principal of the Willowbrook School, Kathy and the vice principal, Susan requires to train on the entire system. They are the essential administrative staffs for the school (Chang et al. 2015). If they are trained on the system, then they can give best customer support before they call to get the service support. The training topics those are covered include preparation of documents and administrative reports; enter the details of the teachers and staffs, requesting enhancement as well as user training. Volunteers: The school requires volunteers so that they can work on the event of fundraising. Therefore, they are trained to fundraise for the system. The topic includes how to motivate the individuals to give fund for the school, how to convince the individuals, what to say and how to collect the fund (Devine, Shifrin and Shoulberg 2015). Those volunteers are trained by both the essential staffs of the school such as principal as well as vice principal. Data Conversion and System Changeover Method Data Conversion for Willowbrook School System In the existing process of data entry, the Willowbrook School uses a spreadsheet as well as word to enter the data. After the implementation of the proposed system, the data are required to export into the new information system (Sinha and Isaac 2015). At first, the data of the students such as the name of the student, their contact details, etc., and then the monthly billing of the student is done. After entering the billing, data for the parents, block as well as total attendance of the student is done. The following is the data conversion table to store the data of the students: Data Entry Order 1 2 3 4 5 Information of the Student Name of the Student Student ID Address of the house Contact Details of the student Total course fee of the student Billing System Name of the Student Student ID Number of days late Date of paying the fee Bill dates Information of the parent and address Information of the student Name of the parents Address of the house Contact Number Block Information of the student Year Student Number Total attendance of the particular student Name of the Student Student ID Block ID Total number of days present Total number of days absent System Changeover Method According to the billing process of Willowbrook School, their fixed fee billing process should complete within the month of April, and a new session will begin in the month of July. However, their aftercare billing process does not end up in the second week of the month of June. Within this period, the systems are required to install such as within a month or half of it. The school takes the decision to use the direct cutover method around their academic year. Using the direct cutover method, the old system of the school is cut as well as it is overwriting by a new information system (Dennis, Wixom and Tegarden 2015). It causes the changeover from the old system to a new system when the new system becomes operational. However, the school identifies that this method involves a high risk of loss of data. With the use of this method, the company is unable to change the old system as a backup option. Due to this reason, the IT Consultant recommends the phased operation to us. Phased operation process is working into various phrases. The implementation of the new system is done into modules. The entire system is provided to the some of the authorized users. As the previous approach faces risks, therefore the phrased operation reduces errors as well as failures to the implemented module. This phrased operation is also less expensive. The phased operation for the Willowbrook School consists of two phases such as billing and system. In the billing phase, the financial works are done. It starts at the month of April; it is installed within one, and half months before the aftercare billing process is completed. The system phase allows a timeframe of one and half month to do the functional billing, testing of the entire system, etc. Conclusion It is concluded that the IT Consultant of the Willowbrook School recommends the requirement of client server architecture for their school. The architecture should be three-tier so that it can easily handle the administrative as well as financial functions. The new information system tracks the enrollments, aftercare billing as well as payments. The proposed system monitors the process of tracking, reviewing the cost as well as reporting. As an application development methodology, Agile methodology is used as it delivers the development process within the estimated timeline in a proper manner. As the changeover process, phase operation is used in order to install the new information system for the school. Various types of testing are done such as system, user-interface, performance, security and access control as well as configuration testing to completely implement the system for the school. After the testing of the system, the staffs of the administrative department, teachers as well as volunteers are required to train so that they can handle the entire system efficiently. Data conversion is required as previously the administrative department uses a spreadsheet as well as word to enter the details of the students. References Artzi, S., Dolby, J., Pistoia, M., Tip, F. and Tripp, O., International Business Machines Corporation, 2013.Detecting and localizing security vulnerabilities in client-server application. U.S. Patent 8,516,449. Chang, J., Faraboschi, P. and Ranganathan, P., Chang and Jichuan, 2015.Vertically-Tiered Client-Server Architecture. U.S. Patent 20,150,350,381. Chernyi, S., 2015. The implementation of technology of multi-user client-server applications for systems of decision making support.Metallurgical and Mining Industry,3, pp.60-65. Dennis, A., Wixom, B.H. and Tegarden, D., 2015.Systems analysis and design: An object-oriented approach with UML. John Wiley Sons. Devine, C.Y., Shifrin, G.A. and Shoulberg, R.W., Verizon Business Global Llc, 2013.Secure server architecture for web based data management. U.S. Patent 8,495,724. Devine, C.Y., Shifrin, G.A. and Shoulberg, R.W., Verizon Patent and Licensing Inc., 2015.Secure server architecture for web based data management. U.S. Patent 8,935,772. Dillon, D.M., Dillon Software Services, Llc, 2014.Data store interface that facilitates distribution of application functionality across a multi-tier client-server architecture. U.S. Patent 8,676,808. Dingsoyr, T., Nerur, S., Balijepally, V. and Moe, N.B., 2012. A decade of agile methodologies: Towards explaining agile software development.Journal of Systems and Software,85(6), pp.1213-1221. Givoni, E., Ravitz, N., Ravitz, Z., Nguyen, T.Q. and Nguyen, T., Smartesoft, Inc., 2013.Automated software testing and validation system. U.S. Patent 8,347,267. Haimes, Y.Y. ed., 2015.Risk modeling, assessment, and management. John Wiley Sons. Hwang, Y., Kettinger, W.J. and Mun, Y.Y., 2015. Personal information management effectiveness of knowledge workers: conceptual development and empirical validation.European Journal of Information Systems,24(6), pp.588-606. Mithas, S., Tafti, A.R., Bardhan, I. and Goh, J.M., 2012. Information technology and firm profitability: mechanisms and empirical evidence.Mis Quarterly,36(1), pp.205-224. Nelson, D., 2013. Next gen web architecture for the cloud era.Saturn. Olsson, H.H., Bosch, J. and Alahyari, H., 2013. Towards RD as innovation experiment systems: A framework for moving beyond Agile software development. InProceedings of the IASTED(pp. 798-805). Oluwatosin, H.S., 2014. Client-server model.IOSR Journal of Computer Engineering (IOSR-JCE),16(1), p.67. Park, Y. and Sabir, K.S., International Business Machines Corporation, 2015.Stream processing using a client-server architecture. U.S. Patent 9,043,382. Paroni, A., Geremia, P. and Valeri, S., 2016. Introducing a new Client-Server framework for large CFD models. Power, D.J., Sharda, R. and Burstein, F., 2015.Decision support systems. John Wiley Sons, Ltd. Reynolds, G., 2015.Information technology for managers. Nelson Education. Schwalbe, K., 2015.Information technology project management. Cengage Learning. Sinha, A. and Isaac, R.K., 2015. A Compressed Technique to Optimize the Processing of Real Time Data in Centralized and Client-Server Data Base Systems.International Journal of Computer Applications,115(9). Vaishnavi, V.K. and Kuechler, W., 2015.Design science research methods and patterns: innovating information and communication technology. Crc Press. Valacich, J.S., George, J.F. and Hoffer, J.A., 2015.Essentials of systems analysis and design. Pearson Education. Venkatesh, V., Thong, J.Y. and Xu, X., 2012. Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology.MIS quarterly,36(1), pp.157-178.

Sunday, December 1, 2019

Policies In Vietnam Essays - Politics Of Vietnam, Asia, Vietnam

Policies In Vietnam Lyndon B. Johnson had a vision of A Great Society for the American people and fellow men everywhere. In his first years of office, he obtained one of the most extensive legislative programs in the history of the Nation. Maintaining collective security, he carried on the increasing struggle to fight Communist encroachment in Vietnam. During President Johnson's term, two crises had been gaining momentum since 1965. The first was the unrest and rioting in black ghettos that troubled the nation. The second crisis was trying to prevent North Vietnam from taking over South Vietnam, preventing the spread of communism. The United States and Vietnam have had relationships (not always direct, but through the French) since the early 1940's. A brief background of US involvement in Vietnam will be given in order to understand how Johnson got involved in Vietnam, but first a look at the geography of Vietnam. Geography Vietnam covers an area of 329, 600 square kilometers and stretches around 100,000 square kilometers from North to South. The Annamite Mountain Range connects the North and South. To the north of Vietnam is China; to the west is Cambodia and Laos. The location made the United States be very careful when using military because it did not want to start a World War III with China who was supporting the North Vietnamese. Vietnam is a little smaller than the newly united Germany. History of United States Involvement The French used to have a colony rule over Indochina, which consisted of Vietnam, Cambodia, and Laos. During World War II, France fell to the Germans and in return, the Asian French colony was turned over to Japan. At this time, the Vietnamese turned from being anti-French to anti-Japan. The United States started aiding various groups in Vietnam, so that they could battle the Japanese. The United States even aided the nationalist group, led by communist Ho Chi Minh. After World War II, the French returned to take over its colony, but in December 1946, found itself battling the Vietminh. France requested aid from the United States, so that it could win the battle against the Vietminh. The United States was not too sure at first, until Intelligence proved that the Communist Ho Chi Minh was becoming very popular. The United States immediately increased its aid to France to try to prevent the communist from spreading. The French were to set up a regime with Bao Dei, from the Vietnamese royal family. The United States sided with Bao Dei's claim as the regime, especially after the fall of China. Around 1954, the United States was paying 80% of the French military cost in Vietnam. The French decided to use a fortress to try and get the communist to use a large number of it's troops to attack the fortress, but it was easily over come by the communist and the French surrendered. May 1954 was the end of the French role in Indochina. May-June 1954 was the Geneva Accords where the major powers were to come to an agreement on Indochina. The agreement was a temporary one that divided Vietnam at the seventeenth parallel with a demilitarized zone between the two areas. The North would be the Vietminh or the communist and the South would be the Bao Dei regime. No side could come to agreements involving foreign policy nor accept foreign troops on their soil, until after two years when elections were to be held, scheduled for July 1956. At this time, the permanent government of Vietnam would be determined. Ngo Dinh Diem became a political leader in the South and was pro-Western. Diem announced that the division of Vietnam into two nations would remain and there would be no elections. In rigged elections, Diem emerged victorious over Bao Dei. The United States backed Diem because he promised to make reforms. Diem in the end had no plans of ever having free elections again. Although Diem never made any of his promised reforms, President Eisenhower backed Diem's regime. Eisenhower sent 1,500 advisors to South Vietnam by the end of his administration in order to help make sure South Vietnam was safe. At this time, Ho Chi Minh came to an economic agreement with the