Wednesday, May 20, 2020

A Marxist Approach to Jane Eyre - 1034 Words

A Marxist Approach to Jane Eyre Based on the ideas of Karl Marx, this theoretical approach asks us to consider how a literary work reflects the socioeconomic conditions of the time in which it was written. What does the text tell us about contemporary social classes and how does it reflect classism? Jane Eyre depicts the strict, hierarchical class system in England that required everyone to maintain carefully circumscribed class positions. Primarily through the character of Jane, it also accents the cracks in this system, the places where class differences were melding in Victorian England. For example, the novel questions the role of the governess: Should she be considered upper class, based on her superior education, or lower class,†¦show more content†¦Jane confirms her secondary status by referring to Rochester as master, and believing wealth, caste, custom, separate her from him. She fears he will treat her like an automaton because she is poor, obscure, plain and little, mistakenly believing the lowe r classes to be heartless and soulless. Claiming the aristocratic privilege of creating his own rules, Rochester redefines Jane s class status, by defining her as his equal and likeness. Before she can become Rochester s wife, Jane must prove her acceptability based on class. Does she have an upper-class sensibility, despite her inferior position at Thornfield? For example, when Bessie sees Jane at Lowood, she is impressed because Jane has become quite a lady; in fact, her accomplishments surpass that of her cousins, yet they are still considered her social superiors based solely on wealth. The conversation emphasizes the ambiguities of Jane s family s class status and of the class system in general: Should a lady be judged based on academic accomplishments, money, or family name? The novel critiques the behavior of most of the upper-class characters Jane meets: Blanche Ingram is haughty and superficial, John Reed is debauched, and Eliza Reed is inhumanely cold. Rochester is a primary example of upper-class debauchery, with his series of mistresses and his attempt to make Jane a member of the harem. In her final view of Thornfield, after Bertha has burned it down, Ja neShow MoreRelatedThe Binary Opposition Of Master And Servant In Jane Eyre1208 Words   |  5 Pagesin the relationship between John Reed and Jane. Although Jane is an apparent member of John’s foster family, she is often treated of a lower class because of her orphaned status and low wealth. John Reed shows a strong inferiority as he claims himself ‘master’ when he is yet a child of the household. This is best portrayed by a scene in chapter 1 when Jane asks John, â€Å"’What do you want?’†, whereupon John replies, â€Å"’Say, ‘What do you want master Reed?’’† Jane evidently shows a rejection to the claimRead MoreJane Eyre Essay3572 Words   |  15 PagesGleaden Word Count: 3238 Compare and contrast the ways in which Bronte and Rhys construct the adult selves of Jane and Antoinette and consider how this shapes their relationship with Rochester. Jane Eyre and Wide Sargasso Sea present the childhoods and later lives of two women, who similarly marry the complex character, Mr. Rochester. Both begin their lives as outsiders, Jane because of economic differences to the rest of her family and Antoinette because of racial distinctions to the restRead MoreEssay about The Introduction of Feminist Criticism1815 Words   |  8 PagesIt consists of two parts: the Anglo-American which is believed to be more practically minded, and the French which is more theoretical. Feminist approaches draw from at least four areas of contemporary critical thoughts: historical (including Marxist), psychoanalytic, reader-response, and deconstructive theory. Feminist criticism therefore gains much of its validity from a variety of other critical approaches. The main concern of feminist literary criticism is the feminist language. Elaine ShowalterRead MoreStatement of Purpose23848 Words   |  96 Pagesyour research interests, and ask them about the importance of the statement of purpose relative to other application materials. ï‚ · ï‚ · ï‚ · ï‚ · II. Content Compared to personal statements, statements of purpose require a more programmatic approach that includes, to a greater or lesser degree, the topics numbered below. Always follow, of course, the prompt provided by the school. Some schools may ask you to devote more or less space to one or more of these topics. For example, the prompt for

Wednesday, May 6, 2020

Literature Review - 1211 Words

Literature review Definition of marketing strategy There are a lot of authors speak about the marketing strategy, the marketing strategy is very important in business, it can lead the firm towards attractively economic opportunities which are adapted to their imagination and know how to provide a potential to help the company grow and earn more profits (Lambin,1997). If we want to have good marketing strategy in the firm, we need to understand the strategic situation confronting in an organization, it is an essential starting point (Crvens, 1986). Strategic marketing can be seen like a process consisting of: analyzing environmental, other competitors, and business factors affecting to the firm and its business units, placing market†¦show more content†¦About the communications strategy, personal sale use advertising to approach the target customers by using internet, email, television, newspaper, and so on. They also use the public print and personal selling to deploy a sales force to convincing the target customer, urge them to buy the products of your company. Finally, price is another important factor of any marketing program, and is one of the most directed marketing elements in creation of value for shareholders (Doyle,2000). The company have to set up the price of the products in many different price and in different classes of the customer will pay and find out the profits or commissions to the wholesalers, retailers for moving the products to the users. 4. Result According to the previous study, there are many companies use their own marketing strategies to make them become successful, especially Victoria’s Secret, they use the marketing strategies very effective. Victoria’s Secret is facing to a lot of competitors, by using their own marketing strategies in business, they can earn a lot of success in their business. Victoria’s Secret become one of the top 10 most recognized brands in the world. In 2008, reported revenue reached $ 10.1 billion. According to Simon Warburton, sales are expected to increase between 2010 and 2012. It is estimated that recovery will lead toShow MoreRelatedEssay Literature Review1001 Words   |  5 PagesLiterature Review The purpose of this research project is for you to create a scholarly piece of graduate-level research and writing, which conforms to APA format. Competency in the APA format is required of all Business graduates of Liberty University, as set forth by policy of both the Graduate Faculty and the administration. You will research and write a literature review on a topic relevant to our course. What is a Literature Review? â€Å"A literature review discusses published informationRead MoreNarrative Literature Reviews1589 Words   |  7 PagesNarrative literature reviews Introduction n A literature review is a comprehensive study and interpretation of the work that has been published on a particular topic n A literature review should convey the knowledge and ideas that have been established on a topic and their strengths and limitations Why undertake a literature review? n To provide a review of the current knowledge in a particular field n Provide a description of research studies n Identify gaps in current knowledge n Identify emergingRead MoreImportance And Characteristics Of Literature Reviews1615 Words   |  7 PagesImportance and Characteristics of Literature Reviews A literature review examines existing research that is important to the work that you want to do. Literature reviews provide important background information and details about a specific research topic. Providing background information can help to demonstrate the importance of a topic, and can help to establish understanding of a subject or issue. An effective literature review also provides a space to elaborate on future work to be done on aRead MoreHrd Audit Literature Review683 Words   |  3 PagesLiterature Review If you believe everything you read, better not read. (Japanese Proverb) [pic] What is a literature review? A literature review is an account of what has been published on a topic in the past. Its purpose is to inform the reader what has been established about a topic and what the strengths and weaknesses are. A literature review must be defined by a guiding concept and should not be a list of all the material that you can find (Porter, S. 2008, p.49). What isRead MoreA Literature Review : The Walden University Library Essay1070 Words   |  5 PagesA literature review is an interpretation of arrays of circulating articles written by the scholar-authors’ of researchers related to several topics. A literature search for evidence-based research can be overpowering. The Walden University library illuminates on the superlative quality of evidence-based research and which databases to utilize with research searches. Filtered resources are the superlative quality of studies related to evidence-based practice and encompasses systemic reviews, criticallyRead MoreThe Impact Of Telemedicine On Health, A Systematic Literature Review1530 Words   |  7 PagesIntroduction To evaluate and study the impact of telemedicine in health, a systematic literature review was conducted. An electronic research through the University of Maryland library was done the articles selected dated from 2000 to 2014. A total of 12 articles was reviewed that dealt with clinical outcomes, efficacy, patient and provider satisfaction. Telemedicine as an emerging field can greatly improve the outcomes of healthcare thus resulting in decrease the delivery cost of healthcare. WhileRead MoreLiterature Review : The Class Collage By Jeff Sommers1503 Words   |  7 Pagesexploitation† by Matt Zwolinski is about the ethical questions that are raised about the moral claim of the conditions in sweatshop that are accepted by choice and exploited for gains. These two peered review articles both shows some common similarity and a minute different between the two Identification Both peer-review articles use MLA citation. They both have a lengthy work cited pages/ references at the end of the article. The citations are alphabetically put in order and the citation itself is shown byRead MoreReview Of Formative Fictions : Imaginative Literature And The Training Of The Capacities `` Essay2185 Words   |  9 PagesNayiri Khatchadourian HNRS 63W Prof. Bruce Stone 6 June 2017 The Consequence of Reading Fiction In his essay †Formative Fictions: Imaginative Literature and the Training of the Capacities†, Joshua Landy, professor at Stanford University, aims to explain the function of fiction and the reward of our engagement with literary works. Landy highlights three theories of the function of fiction: the exemplary branch, which invites the reader to consider characters as models for emulation or avoidance,Read MoreReview Of Literature Review On Literature Essay2370 Words   |  10 PagesChapter - 4. REVIEW OF LITERATURE Literature survey is undertaken to study and analyze the finding of other researcher in their studies that are related to the subject under consideration. A research literature review, as a process, is a systematic, explicit, and reproducible method for identifying, evaluating and synthesizing the existing body of completed and recorded work produced by researchers, scholars and practitioners (Fink, 2010). As a noun, literature review is an organizedRead MoreLiterature Review793 Words   |  4 PagesU02a1 Building Your Literature Review Plan: Part One - Sheila Darden The plan to collect and organize literature that explains the history of retention starts with the collections of scholarly, peer reviewed articles that provide insight to the history of retention. The literature will be organized alphabetically at first then to gain a better insight into the history of retention the collections of scholarly, peer review articles will be organized according to the date they were published. The

Computer Crime (1088 words) Essay Example For Students

Computer Crime (1088 words) Essay Computer CrimeIn todays society our most valuable commodity is not grain, steel or eventechnology; it is information. Because of computer networks, just about everyonecan now access an astounding range of information. The Internet isinternational, even though 80 percent of the Internet use occurs in the UnitedStates, and a staggering amount of information on every subject imaginable isavailable for free. Because so many people now have access, computer crimes havebecome more frequent. Everyone with a computer and a modem can commit a computercrime if so inclined. Anyone, conceivably, could become a white collarcomputer criminal. When the term white collar crime came into wide spreaduse several decades ago, it was thought that certain crimes were committed bypersons whom no one would normally suspect of criminal behavior: professional,white collar workers. In the late 1990s, however, the term whitecollar is somewhat inaccurate. The playing field has been leveled by thewidespread use o f computers. Now white collar crime tends to mean simplynon violent crime or economic crime. As technology becomesincreasingly accessible to more and more people, it also becomes a potentialtool for increasing numbers of criminals. Most computer crimes do not involveviolence but rather greed, pride, or play on some character weakness of thevictim. They are based on dishonesty and not force. For these reasons, computercrimes are considered white collar. Just as the term white collar crimedesignates several kinds of crime, the term computer crime also designatedseveral types of crime. It includes crimes that are committed with a computer,crimes that occur in cyber space, and crimes committed against a computer. Someof the crimes are completely new; while others are older crimes that merely usethe computer as a tool. The endless and constant growing variety of computercrimes makes it difficult to pass laws that adequately cover new computercrimes. Some crimes such as embezzlement, wire fraud, and forgery, are alreadycovered under existing law. Others, such as cyber vandalism, cyber terrorism,and cyber espionage, are relatively new. For these newer crimes, the letter ofthe existing law sometimes does not allow prosecution of what clearly iscriminal behavior. Employees and ex-employees of the victimized company commitmost white collar crimes. Likewise about 75 to 80 percent of prosecutedcomputer crimes are committed by current or former employees. There are manydifferent kinds of computer crimes ranging from identity theft to sexualharassment to otherwise ordinary white collar crimes that happen toinvolve a computer. The most common form is online theft and fraud. Phreaks,crackers, and sometimes hackers illegally access and use voice mail, e-mail, andnetwork access accounts-which constitute toll fraud or wire fraud. Long distanceaccess codes are in great demand by the hackers, crackers, phone phreaks andstreet criminal. Some cyber-criminals obtain the codes by shou lder surfingor looking over the shoulder of unwary people in phone booths. One reason thatthis is a common is a common form of crime among hackers and phone phreaks isbecause they tend to run up enormous phone bills pursuing their hobbies for 10? 12 hours a day. Others obtain the codes from pirate electronicbulletin boards, where they are posted in exchange for free software, creditcard numbers or other information. Software piracy is another growing andseemingly insurmountable problem. It is illegal under American Copyright Laws,but most software piracy actually takes place overseas. Federal copyright lawsare often insufficient even to prosecute United States citizens, as illustratedby the now famous case of David La Macchia. La Macchia, a student atMassachusetts Institute of Technology, distributed free software through abulletin board service on a M.I.T computer. After a FBI probe La Macchia wasindited on 1994 for conspiracy to committee fraud. The software he offeredreportedly h ad a total value of over one million dollars, but La Macchia arguedthat he had not distributed the software for financial gain and therefore couldnot have violated the federal copyright laws. The case was dismissed. One of themost freighting computer crimes is identity theft. This kind of fraud is mucheasier than it was once, because a wealth of personnel information is availableonline for free, and even more personal information is available for a smallfee. Now that drivers license numbers are also stored on computers, which a reusually part of a larger network, a persons physical characteristics-eye color,height, and persons physical characteristics-are also available. Magnetic stripson credit cards and ATM cards require computers to read them and to keep recordsof the millions of transactions made ever day. Like identity theft, some othercomputer crimes are not new, except that the perpetrator now uses computer tocommit them. For example, money laundering has been committed for m any decades. .ud8c730f86bd4f7bb40274e08969bf520 , .ud8c730f86bd4f7bb40274e08969bf520 .postImageUrl , .ud8c730f86bd4f7bb40274e08969bf520 .centered-text-area { min-height: 80px; position: relative; } .ud8c730f86bd4f7bb40274e08969bf520 , .ud8c730f86bd4f7bb40274e08969bf520:hover , .ud8c730f86bd4f7bb40274e08969bf520:visited , .ud8c730f86bd4f7bb40274e08969bf520:active { border:0!important; } .ud8c730f86bd4f7bb40274e08969bf520 .clearfix:after { content: ""; display: table; clear: both; } .ud8c730f86bd4f7bb40274e08969bf520 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .ud8c730f86bd4f7bb40274e08969bf520:active , .ud8c730f86bd4f7bb40274e08969bf520:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .ud8c730f86bd4f7bb40274e08969bf520 .centered-text-area { width: 100%; position: relative ; } .ud8c730f86bd4f7bb40274e08969bf520 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .ud8c730f86bd4f7bb40274e08969bf520 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .ud8c730f86bd4f7bb40274e08969bf520 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .ud8c730f86bd4f7bb40274e08969bf520:hover .ctaButton { background-color: #34495E!important; } .ud8c730f86bd4f7bb40274e08969bf520 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .ud8c730f86bd4f7bb40274e08969bf520 .ud8c730f86bd4f7bb40274e08969bf520-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .ud8c730f86bd4f7bb40274e08969bf520:after { content: ""; display: block; clear: both; } READ: Sex Education And The Classroom Essay But a money laundered using a computer is able to carry out the crime much morequickly6 and efficiently, just as computers enable legitimate workers to fortheir jobs more quickly and efficiently. There are several forms of computercriminals; the term hacker describes a person extremely adept and cleverat programming. The term later came to mean a person adept to cracking newsystems undetected. Hackers are merely curious but can unintentionally causeconsiderable damage. But the quest for information and learning-not revenge ormaliciousness-is what drives most hackers to pursue their hobby so relentlessly. Crackers, on the other hand, are malicious hackers. They break intosystems to vandalize, plant viruses and worms, delete files, or wreak some otherkind of havoc. Embezzlement, fraud, or industrial espionage is just a few of thecrackers possible objectives. Cyber espionage exists between countries as wellas between companies, so it poses a danger to our national security. There is nodisputing that what crackers do is dangerous as well as illegal. Another form ofcomputer crime is perpetrated by phone phreaks. Instead of accessingcomputer systems phreaks explore the cyber world through phone lines. Phreakswere among the earliest forms of hackers, operating as early as the 1970s.Oneincident caused by phreaks, involved the New York City Police Department. Phreaks broke into the NYPDs phone system and changed the taped message thatgreeted callers. The new message said, officers are too busy eating doughnutsand drinking coffee to answer the phones. It directed callers to dial 119 inan emergency. The enormous range of computer crimes means that all of societyshould be concerned about computer security, regardless of our individual levelof computer expertise. World financial systems rely heavily on computers, as donational defenses, private businesses, and increasingly, personalcorrespondence. We are all users, in the words of Buck Bloonbecker,whether or not we actually use computers, because we all rely on them. We mustnot view computer crime as an exotic activity. To do so would prevent us fromseeing that it endangers each one of us.

Integrated Marketing Communication for Apple iPhone and Apple Mac

Question: Discuss about theIntegrated Marketing Communication for Apple iPhone and Apple Mac. Answer: Blog 1 Apple is one of the worlds largest companies that has been manufacturing gadgets. The company started with its humble beginning when its two founders Steve Jobs and Steve Wozniak founded the company in a garage in United States (Isaacson, 2012). Todays the company produces and manufactures some of the most sought after products in the gadgets genre like the Apple iPhone, Apple Mac, Apple TV which is recently launched and the latest craze the Apple watch. The company has been doing its marketing totally right which has led to such immense growth in such short time period. Of course there have been great contribution of the marketing and innovative ideas of Steve Jobs who is respected as one of the most respected marketing Gurus in modern times, however the company has a great team of marketing experts who has continued the growth of the company and did not allow some of the controversies to reduce the pace of the growth. The company in the very beginning when it was producing the mother boards had marketed its products very efficiently in whatever ways they could. The first major Apple product which turned the fortunes of the company called the McIntosh which was the first personal computer from the company, had been very successful because of the campaign that surrounded the product. People were waiting for it to come out (Thomke Feinberg, 2012). It was the year 1984 that McIntosh was first released and the product was aimed at reducing the complexity which was involved in operating a computer and it was successfully conveyed in the advertisements that Apple published in various mediums. One of the advertisement displayed a mouse with three buttons and people were excited to see this new product being launched. References: Isaacson, W. (2012). The real leadership lessons of Steve Jobs.Harvard business review,90(4), 92-102. Thomke, S. H., Feinberg, B. (2012).Design thinking and innovation at Apple. Harvard Business School Publishing. Blog 2 Apple, like many companies, devoted considerable effort to maintaining its corporate image. One tactic involved presenting writers with material on the company, like Jean Richardson and Rene White's 1980 "Apple Computer" corporate backgrounder. Another involved regulating press access to Apple employees, and vice versa: Barbara Krause'sInquiries from the Presssummarizes company policy. Apple was successful in introducing one of the first integrated marketing campaigns in the history by publishing in the newspapers, giving television advertisements and Steve Jobs personally appearing for interviews and talking about the new products. The Apple McIntosh computers aimed at bringing computers for normal people so that everyone could use it. The Graphic User Interface worked well in this regards. In the coming years it became a craze of the Apple fans to wait for Steve Jobs to appear before the crowd and introduce a new product. This trend is now continued by the present Apple CEO Tim Cook has continued the trend of appearing before the audience once a year and introduce the new Apple products especially the new IPhone that is launched every year (Hunter et al., 2012). The marketing strategy of Apple has been to involve people in a way that they feel to be a part of the new products launches and that they wait for new products to be launched and Tim Cook has continued it (Richtel Chen, 2014). Every year Apple Inc. launches its new version of iPhone, this can be hardly matched by any other company, to launch a single series of product every year with new features and expecting people to buy it. Integrated marketing communication has worked wonder for Apple in this regards and the loyal Apple iPhone customers do not hesitate to buy new phones paying a hefty price, this is beca use the aura Apple has created around its products through its marketing campaigns. References: Hunter, S. T., Cushenbery, L., Fairchild, J., Boatman, J. (2012). Partnerships in leading for innovation: A dyadic model of collective leadership.Industrial and Organizational Psychology,5(4), 424-428. Richtel, M., Chen, B. X. (2014). Tim Cook-Making Apple His Own.New York Times, Technology,15. Blog 3 Death of Steve Jobs due to prolonged illness had a big impact on Apple, as Steve Jobs himself was a factor who could draw half of the crowd without any marketing, such was his personal charisma. He has been viewed as one of the most prominent innovators and leaders both in the field of marketing and in the field of technological innovations. He introduced the system of launching new products and marketing them in a integrated manner. The integrated marketing communication around Apple watch was one of the most prominent and innovative integrated marketing communication campaign that has been ever taken up by any technological company. The launch of Apple watch was announced from months before and people were waiting for the product to be launched and then on the launch date there big advertisements in the newspapers, the internet was full of Apple watch advertisements, all the blogs that dealt with tech news has one single point agenda to talk about, the Apple watch. In the big malls and departmental stores the Apple watch was there for people to try and experience firsthand (Rawassizadeh Price Petre, 2015). The existing iPhone users were all updated and notified again and again to buy the latest Apple watch. Apple introduced the world to several category-defining products, the Mac, iPod, iPhone and iPad, said Tim Cook, Apples CEO. And once again Apple is poised to captivate the world with a revolutionary product that can enrich peoples lives. Its the most personal product weve ever made. (Apple.com, 2016) With Apple Watch, weve developed multiple technologies and an entirely new user interface specifically for a device thats designed to be worn. It blurs the boundary between physical object and user interface, said Jony Ive, Apples senior vice president of Design. Weve created an entire range of products that enable unparalleled personalization. (Apple.com, 2016) It is evident that how the people directly responsible for the products and who came from the topmost rung of the company were personally engaged in marketing the products. References: Apple.com. (2016).Apple Unveils Apple WatchApples Most Personal Device Ever.Apple Newsroom. Retrieved 24 March 2018, from https://www.apple.com/in/newsroom/2014/09/09Apple-Unveils-Apple-Watch-Apples-Most-Personal-Device-Ever/ Rawassizadeh, R., Price, B. A., Petre, M. (2015). Wearables: Has the age of smartwatches finally arrived?.Communications of the ACM,58(1), 45-47. Blog 4 The launch of the first iPhone has been characterized by great public attention and people wanting to understand what it felt like using a mobile phone that was more innovative and user friendly than any other device made till date. Former Apple CEO Steve Jobs had again and again confirmed that how much importance the company gave to the factor simplicity. According to Jobs one of the main driving forces and characteristic features that has helped Apple to grow in such a small time was its simplicity, both in terms of design and in terms of usage (Isaacson, 2012). The products were aimed to be very easy to use but give maximum optimization capabilities. Now the problem was how this was to be conveyed to the potential customers all over the world. Here comes into play the factor of marketing strategy. Steve Jobs himself steered the initial marketing endeavors of Apple Inc. which became so successful that 74 days after its introduction the company announced that it has sold the One mil lionth iPhone. This was almost unimaginable in terms of volume. Apple had applied several marketing communication strategies in order to gain such success in terms of business and to increase the goodwill of the company (Boone Kurtz, 2013). Advertising, events, and promotional offers were later introduced. Today Apple have tied up with several telecom companies in order to increase its business, two of which are Airtel and Vodafone. Apple has introduced promotional offers like easy EMI options and cashback offers. The company has tied up with Airtel in several countries and theey are giving customers several benefits like lower tariff rates and discounts in mobile bills. References: Boone, L. E., Kurtz, D. L. (2013).Contemporary marketing. Cengage learning. Isaacson, W. (2012). The real leadership lessons of Steve Jobs.Harvard business review,90(4), 92-102. Blog 5 The latest product of Apple is its iPhone X. Our vision has always been to create an iPhone that is entirely screen. One so immersive the device itself disappears into the experience. And so intelligent it can respond to a tap, your voice and even a glance. With iPhoneX, that vision is now a reality. Say hello to thefuture. This is the official statement of Apple in its website about the iPhone X (Apple.com, 2018). The marketing strategy was to induce the urge in the potential customers to make it impossible for them not to buy the product. The iPhone X is branded as a product of the future. It has some of the features that is not found in other phones in the planet. The marketing strategy that has been taken including the promotional videos of the phone in YouTube and the experience that it gives it is termed as not just a phone but a phenomenon in itself. It is an experience, that one must use to understand. Technological experts have concluded that the product is more of a status symbol than a gadget that will assist its users to ease their daily problems. Apple presented the product in a way that people who are interested in technology and gadgets not only they will buy the products, but people who do not understand technology well but are interested in high ends lifestyle products to match their status symbol will also tend to buy it. Apple took up a very different but innovative strategy during its launch, it allowed access of the iPhone X to some popular tech gurus in YouTube. They reviewed the product in a very short time that did not allow them to understand the flaws well, and as launch date was near the product was already a hit and people waiting anxiously for it to launch. References: Apple.com. (2018).iPhone X.Apple.com. Retrieved 24 March 2018, from https://www.apple.com/in/iphone-x/?muid=528C4450-05E0-421C-A64E-89560ABA0900mtid=20925st142673aosid=p238cid=wwa-in-kwgo-iphone-slid-mnid=sIugfsdnO-dc_mtid_20925st142673_pcrid_230229655339_ Blog 6 Apple previously never used the reviews and comments of any other entity in its press release. However, this time Apple had changed some aspects of its integrated marketing communication strategy and included the reviews from popular tech reviewers, newspapers and media giants in its press release. The best iPhone yet, Like Magic, This feels like the future were some of the reviews from trusted sources which themselves had goodwill in the market. Apple also adopted a policy of slow roll out of products and encouraged waiting from the part of the customers. The less time given to the reviewers had already made a situation where much flaws could not be detected, and now slow launch of the product had helped in maintaining the quality. When these strategies were already in place the company had continued to advertise the product all over the place including the internet. All the social media platforms were filled with advertisements and reviews about the iPhone X. The newspapers had large advertisements and the hoardings in the big cities featured the product in gigantic sizes. Apple understood that the people were already aware of the technological specifications of Apple, it was a waste to again reemphasize on the fact that Apple X had highly advanced technological specifications. Therefore, Apple this time highlighted the entertainment quotient of the product and the launch videos and the various other advertisements talked a bout the screen of the phone, the sound, the experience of the users in gaming, clicking photos or shooting videos (Forbes.com, 2018). Apple encouraged short documentary film makers to use iPhone for their shooting. Therefore, the product was more of a high end multimedia gadget rather than a tool to connect. The integrated marketing communication strategy was very successful in this case and the product continues to be sold in large numbers all around the world. References: Forbes.com (2018). Apple iPhone X: The Mid-Term Review. Ten Things To Love Or Hate. (2017).Forbes.com. Retrieved 24 March 2018, from https://www.forbes.com/forbes/welcome/?toURL=https://www.forbes.com/sites/davidphelan/2017/12/10/apple-iphone-x-the-mid-term-review-ten-things-to-love-or-hate/refURL=https://www.google.co.in/referrer=https://www.google.co.in/