Friday, December 27, 2019

The Unspoken Captivity Retrospectives On Human Trafficking

The Unspoken Captivity: Retrospectives on Human Trafficking Brandon Howell, Kyounga McElroy, Susan Pawlak, Barbara Gardner Davenport University The Unspoken Captivity: Retrospectives on Human Trafficking Human trafficking is a method of modern day slavery which entails the illegal trade of persons for sexual exploitation or forced labor. Each year thousands of men, women and children are victims of this suppression. Countless countries including the United States are affected by trafficking. Habitually, traffickers tend to prey on a perceived vulnerability, whether it is through a promise of money, employment, or better opportunities not normally afforded to the victim. Ultimately, the victims later find themselves trapped and manipulated and held against his or her will for the price of profit or involuntary servitude. Several organizations and governments across the globe, have implemented approaches to eradicate human trafficking. Unfortunately, the attempts to abolish this crime against human rights seems impossible to stop due to the ever-growing demand. Discovery Human trafficking involves the selling of human beings for a profit through forced labor and the illegal movement of people. From the National Institute of Justice (2012) cited â€Å"The United Nations defines human trafficking as the recruitment, transportation, transfer, harboring, or receipt of persons by improper means (such as force, abduction, fraud, or coercion) for an improper purpose including

Thursday, December 19, 2019

Desiree s Free Enterprise And Ralph Ellison s Invisible Man

As observed throughout history and various societies, the notion of a â€Å"racial hierarchy† proves to be a superficial design which ultimately assigns value to a group of people based solely upon their skin color. As a result, certain groups are promptly associated with influence and supremacy, while others are disregarded in their â€Å"inherent† inferiority. Michelle Cliff’s Free Enterprise and Ralph Ellison’s Invisible Man approach this paradigm by facilitating their readers’ understandings regarding the debilitating ostracism associated with the social construct of â€Å"blackness,† as well as the metaphorical societal invisibility that is suffered as a result. In Free Enterprise, Cliff’s implementation of the motif of black invisibility is†¦show more content†¦This is most poignantly demonstrated through their enduring inquisition of whether â€Å"their names were called at holiday gatherings,† an unfulfilled cu riosity in regards to the simple recollection of their existences (Cliff 42). From an analytical standpoint, the colony is a metaphor for the dehumanization and erasure of black identity as a means of societal marginalization and disposal. Akin to Cliff’s work, Ellison’s Invisible Man approaches the nature of black identity through the novel’s discounted main character. A scene which ties into the concept of invisible â€Å"blackness† in the face of â€Å"whiteness† is one wherein the unnamed protagonist accidentally bumps into another man on the street, resulting in what one can assume to be a derogatory racial epithet directed towards him (Ellison 4). The invisible man demands an apology from the white perpetrator, a recognition of his humanity, but his black identity and the notion of white supremacy prevent it. Even in a position of considerable vulnerability, with â€Å"torn skin† and â€Å"lips frothy with blood,† the white man cannot bring himself to apologize, as this would be an acknowledgment of the black man’s existence, a disruption of the racial hierarchy (Ellison 4). The dehumanization resulting from the notion of â€Å"blackness† as inferio r results in the character’s societal confinement and fleeing from the outside world to his â€Å"hole in the ground,† an

Wednesday, December 11, 2019

Study of Software Industry Using Porters Five Forces Model free essay sample

Porter’s model supports analysis of the driving forces in an industry. Based on the information derived from the Five Forces Analysis, management can decide how to influence or to exploit particular characteristics of their industry. A strategic Business manager seeking to develop an edge over rivals can use this model to understand the industry context in which the firm operates. Software industry is a growing industry and there are many potential new entrants to the industry. A study of the Software industry using Porter’s five forces model provides key insights into the industry trends. The study provides key challenges faced by the industry, and throws up some great opportunities that are present in the industry. Overall, the studies done through this paper reveal that software industry is a great industry to get into, for those who have the capability to create opportunities out of challenges. Introduction Software Industry is considered to be a very profitable industry. This perception attracts many players to this field. Many of the new entrants to the industry do not do any scientific analysis before they get into the field. This some times result into failures and uncertainties in the industry. A lot of new entrants fail to correctly assess and analyse the competitive strength and position of the firm in this industry. Michael Porter’s (1980) famous Five Forces of Competitive Position model provides a very effective way of doing this assessment for any industry, and can be used in the software industry too. This paper does a detailed study of the software industry using Porter’s model and the findings will help new entrepreneurs and existing ones to arrive at the right strategies for being unique and addressing the competition. This paper attempts to analyse the software industry based on Porter’s five forces model. Literature Review Porters Five Forces No organization is an island unto itself. Its ability to thrive is affected by many factors, including its competition. Michael Porter (1980), of the Harvard Business School, has developed the five forces model to describe and analyze these factors. Apart from Porters Book Competitive Strategy: Techniques for Analyzing Industries and Competitorsâ€Å" in 1980, there are very many internet resources and articles which provide insight into the model. Some of them are www. themanager. org , www. businessballs. com, www. quickmba. com etc In this model, there are five competitive forces that interactively shape the dynamic environment of any industry. Rivalry Among Existing Firms All companies strive to improve their position with respect to their rivals. Companies use a variety of tactics to secure advantage; for example, product innovation and differentiation, patents, pricing, distribution systems, and advertising. In many industries, the use of one or more of these tactics by one company provokes a response by its competitors. Over time, this action-reaction dilemma can damage both the companies and the industry at large. This happened in the semiconductor industry: when one company began to build up production capacity for RAM (random-access memory) chips, the others followed suit, and the resultant overcapacity gave buyers an inordinate amount of leverage, precipitating a crash in prices. There are other factors that promote rivalry and competition: †¢Large increases in production capacity †¢Many competitors or relatively balanced competition †¢High exit barriers †¢Slow industry growth †¢High fixed costs Low switching costs Industries in which the competition is intense are often referred to as cutthroat, warlike, and bitter. The soft-drink industry is a well-known example of this. The more competitive the industry, the more difficult it is to generate profits. Threat of Potential Entrants New competitors in an industry bring with them additional resources and production capacity and a desire to gain market share. Their entrance can result in a collapse in prices, loss of suppliers, and increased costs (for example, in more advertising or a bigger sales force)—all of which reduce profitability. This has happened repeatedly in the discount department store sector, beginning in the early 20th century when the first â€Å"five-and-ten-cent stores† began to compete with smaller specialty shops. The likelihood of new entrants depends on the barriers to entry that are inherent to the industry and on the responses of the existing competitors. There are five major barriers to entry: a) Economies of scale In industrial economies, the most efficient level of production is called the minimum efficient scale (MES), which is the production level needed to achieve the lowest production costs. All industries have an MES. The higher the MES, the more production capability a new entrant must build in order to enter without an initial cost disadvantage. New entrants must then capture a share of the market proportional to their capacity or they will be at a long-term disadvantage. The bigger the market share they need to capture, the higher this barrier to entry is. One example of where it is extremely high is the automobile industry. b) Access to distribution channels In some industries, the distribution channels are controlled by existing companies through distributor contracts and preferred relationships. This can be seen in the light bulb industry, where the biggest manufacturers have exclusive contracts with the biggest retailers. New entrants will have to break into the current distribution system or find other alternatives. Both choices may be expensive, creating a high barrier to entry. c) Capital requirements Entering a new market can involve creating new capacity, aggressive advertising, acquisition of licenses, and so on. All of these activities require investment capital. The higher the capital needs, the greater the barrier to entry. An extreme case here is the building of jet aircraft, where even an established company can spend over a billion dollars (U. S. ) to bring one new model into production. d) Switching costs In some cases, entry into a new market can be achieved by retooling existing production machinery at relatively low costs. It is also possible, however, that the retooling costs are substantial, hence, a greater barrier to entry. Oftentimes, highly specialized capacity for which there is no alternative use must be created. This is a potential switching cost and constitutes another barrier to entry. Integrated circuit manufacturing equipment, for instance, cannot be used for anything else, while the machines used to make hardware and small metal parts can be reconfigured fairly easily. e) Cost disadvantages independent of scale Some industries have unique features that create high barriers to entry. These include: †¢Proprietary knowledge and patents not available to entrants †¢Access to raw materials limited to or controlled by existing firms †¢Favorable locations already secured by existing firms †¢Government regulations or subsidies †¢A relatively long learning/experience curve Similarly, barriers to exit make it difficult for firms to leave an industry. In industries that are difficult to exit, existing firms will tend to put more into the competition for retaining their market share than if they had an easy-exit option. Low Barrier to Entry Standard technology Low capital investment Low switching costs Little government restriction Fragmented or open distributionHigh Barrier to Entry Critical patents High capital investment High switching costs Considerable government regulation Controlled distribution Low Barrier to Exit Separate SBUs Incidental to core strategy Assets easy to sell Common technologyHigh Barrier to Exit Interdependent SBUs Part of core strategy Assets difficult to sell Specialized technology not applicable to other industries The Power of Buyers In some circumstances, the buyers or customers in an industry contribute to its competitiveness. Customers in competitive industries are able to force down prices, bargain for higher quality or more services, and play competitors against each other. Customers can exert significant pressure on an industry when †¢They have full information. They consider the products they purchase to be standard or undifferentiated. †¢The products are a significant portion of the buyers’ costs. †¢The products are unimportant to the quality of the buyers’ products. †¢The industry faces low switching costs. An industry that is severely limited by the power of buyers is pharmaceuticals: insurance companies, health maintenance organizations, and even governments (e. g. , through Medicare) limit their profits on prescription medications. The Power of Suppliers Suppliers also influence the competitiveness of an industry. Powerful suppliers can raise prices, restrict access to supplies, and lower the quality of supplies and services. If competitors are unable to pass along increased costs to their customers, their profits decrease. Suppliers are powerful when: †¢They pose a threat of forward integration. †¢Their product is an important input to the final product. †¢The industry overall is not an important customer of the supplier. †¢They are few in number and are more concentrated than their customers. †¢There are no competing substitutes. Their products are differentiated and/or the customers have significant switching costs. Suppliers are extremely powerful in the oil business, where a company that operates refineries but does not own its own wells is completely dependent on the producers. The Threat of Substitutes Usually, the firms in one industry are, broadly speaking, also competing with industries that produce substitute products. Substitutes can place a ceiling on the prices an industry can charge, thus limiting its profit potential. The more favorable the price/performance ratio of alternatives, the stronger the ceiling. Identifying viable substitute products is a matter of searching for other products that can meet customer needs. Some examples are: †¢High fructose /low calorie sweetener for sugar †¢LEDs for incandescent lights †¢Cellular phones for landline phones †¢Real estate investing for equity investing †¢Public transportation for automobiles All of these factors together shape the dynamics of an industry. After establishing how attractive an industry sector is, companies can then determine the key industry success factors, the investment needed, and the potential for return on those investments. Methodology First, the requirements and the nature of software industry were studied. The industry experience of the author of this paper came in handy for the study. Discussions were held with various experts in the industry. Various stages of setting up and sustaining a software industry were evaluated. Extensive study of already existing research was carried out. Various research information were considered while arriving at conclusions. A number of secondary sources are used in this paper Results and Discussion What are the threats of entry in this industry? Let us look at this with reference to the five aspects of †¢Economies of scale †¢Access to distribution channels †¢Capital requirements †¢Switching costs †¢Cost disadvantages independent of scale Economies of Scale Gerard Jackson (June 1998) argues that the concept of economies of scale do not apply to soft ware industry, simply due to the very nature of the industry where once we have invested in the development of the product the production costs are virtually nil and hence the economies of scale concept cannot be applied here. There of course are costs associated with packaging, shipping and marketing the product, but they are so minimal compared to the overall cost that the argument appears logical. So for the big players this is not an advantage at all. Any small player can threaten the big players, if they have the right brains behind their products. I do not consider this to be a serious entry barrier for new entrants to this field. Access to Distribution Channels Access to distribution channel is a big threat of entry in the software industry. The internet is a virtually free distribution channel available for any one to pump their products into. Any new entrant can have the same access as the big players to the distributions channels. However this is easily said than done for large software products like middle ware or operating systems, or huge data base management systems. Overall, this is not a serious barrier for new entrants. Capital Requirements The Capital requirements in this industry are of a different nature. According to the Reserve Bank of India (India’s Apex Bank) Notification (August, 1998) the working capital requirements of the software industry are basically the development costs. To quote their report â€Å"These products are prepared to meet standard requirements of end-users and are sold as packaged units comprising software manual and other user aids (tutorials). The development of these products involve fairly large scale investment, the return on which can be realised only after the product is fully developed and sufficient demand is generated therefore. By and large, no payment by the buyers would be involved at any stage of development and the developer would be receiving payments only when the products are purchased by interested buyers. In such cases, working capital requirements would be mainly for meeting expenditure such as salaries and expenses of the professionals associated with the development of the products. The period required for development would vary and, in some cases, may extend up to 24 months. â€Å" Depending on the scale of the proposed product, the new entrants would need to muster this capital requirement, and take the risk of success or failure once the product is launched. Hence this could be a high barrier Switching Costs Switching cost could well be the most important entry barrier for new firms into the software industry. Steve Kahl (Spring 2004) has done some extensive study on the switching costs related with Software industry. The total cost of ownership to implement a software package typically is much higher than the purchase price of software, sometimes as high as twelve times the price. Integrating software with the pre-existing technical architecture, changing business processes, training new users on the system, and maintenance costs for the software make it difficult for customers to replace software products. These high switching costs can lock customers in and increase the value of the installed base. As a result, the size of the installed base is an important performance measure for the software industry. The installed base, in turn, impacts competitive strategy. A firm such as Microsoft with a significant installed base may deter entry from new firms. Cost Disadvantages Independent of Scale include proprietary product technology, favorable access to talent and raw material, favorable locations, learning or experience curve etc. In the context of the software industry this could be a low barrier, since the software as a product is a function of the human intelligence and really one cannot make it proprietary, and history proves this where start up companies became giants in this field. To what threats of substitutes are you vulnerable in this industry? The threats of substitutes could be of a different nature in the software industry. There is always the big fight between patents and open source. But the major threat for software industry in this account is the threat of piracy. All major software players struggle with this and a lot of efforts and money is spent on preventing , detecting and acting on piracy. I would say that the industry has still not figured out the right and fool proof way of preventing this threat. The proliferation of piracy requires us to constantly re-evaluate how people can ensure they are getting the real thing when they see the Microsoft name, says Jackie Carriker, group manager of anti-piracy efforts for Microsoft (Microsoft press release Feb 2000). It seems we are in a perpetual cat-and-mouse game with counterfeiters. But hopefully these features will make it more challenging for would-be pirates to make a quick buck while making it easier for customers and resellers to differentiate between genuine and counterfeit software. Microsoft published data confirms this problem. To Quote Microsoft â€Å"Software piracy, or the illegal copying and distribution of software, is both an individual and a worldwide problem that takes a toll on the global economy. In 1998, software piracy caused the loss of more $11 billion in revenue worldwide, according to the Business Software Alliance (BSA). That same year, software piracy cost 109,000 jobs in the U. S. lone. There are currently approximately 2 million auction and warez sites pushing pirated or counterfeit goods, compared to 100,000 in 1997, according to BSA estimates. In short, software piracy is a problem for everyone at every level of the distribution channel from honest resellers to consumers. As per Douglas Heingartner (January, 2004) internet pirac y is the latest threat in software piracy, and organisations are struggling to bring this under control. To what pressures from suppliers are you vulnerable in this industry? This is probably an industry which is not too dependent on â€Å"suppliers† in the conventional manner. However, the right skill sets in employees could be treated as a major supply source. Sourcing the right employees and having strategies and policies which attract them to stay on, is a major challenge that every software industry player . The war of talent as it is called is all too well known. According to Steve Schifferes (January 2007) ,Nasscom, the Indian software industry association, estimates that by 2010, the Indian outsourcing industry could have $60bn worth of global sales, up from $23bn in 2006 and that would still only be 10% of the potential market. But if the industry is to triple its revenues, urgent action is needed now to increase the supply of skilled labour, Nasscom says. According to Mary Hayes Weier (February 2007) Accenture plans to increase its India staff this year by 8,000 people to 35,000, surpassing its U. S. employee base. IBM s India staff has jumped from 43,000 to 53,000 in six months, and it expects to continue growing at that pace. Both Infosys and Tata Consultancy Services are hiring about 2,000 people a month. At that pace, thats more than 35,000 new hires for these four companies alone the next six months, and dozens of other tech companies are rushing to add staff in India. So where will all this talent come from? Thats a question businesses should be asking their suppliers of India-based IT and business process services. The country still offers the best talent-to-price ratio of any place in the world, but suppliers admit its getting increasingly difficult to find and keep the right peopleespecially at the management level. To what pressures from customers are you vulnerable in this industry? Customers or clients as they are called currently in our industry, have a great power as they always have had. They have choices, they continue to ask for better quality at lower costs. More importantly they are asking the software vendors to add business value to their business. It is no more a sell and walk out policy. According to the Software 2006 Industry report put together by McKinsey Company, in collaboration with the Sand Hill Group, the entire eco system of software business is undergoing major changes and customers are driving that change aggressively. The report says, â€Å"Two major business models are vying for an growing share of software spend: Software as a Service and Open Source. Software as a Service (SaaS) has become increasingly relevant to both Enterprise and SMB customers and has the potential to impact the entire IT landscape. Although the market size for SaaS was relatively small ~$6 billion in 2005, it is poised to grow more than 20 percent annually. Several factors are driving this large shift in preferred model: vendors are seeking attractive annuity revenue streams, customers are pushing for more affordable and lower TCO alternatives to packaged software, and critical technology enablers like broadband wireless and universal access are coming online. SaaS has already gained traction in number of application areas – such as payroll, human capital management, CRM, conferencing, procurement, logistics, information services, and e-commerce) – and should make gains across a much broader cross-section of applications over the next 3 years.

Tuesday, December 3, 2019

Watergate Was The Name Of The Biggest Political Scandal In United Stat Essay Example For Students

Watergate Was The Name Of The Biggest Political Scandal In United Stat Essay es history. It included various illegal activities designed to help President Richard M. Nixon win reelection in 1972. Watergate resulted in Nixons resignation from the presidency in 1974. Watergate differed from most previous political scandals because personal greed apparently did not play an important role. Instead, Watergate represented an attack on one of the chief features of a democracyfree and open elections. The Watergate activities included burglary, wiretapping, violations of campaign financing laws, and sabotage and the attempted use of government agencies to harm political opponents. The scandal also involved a cover-up of many of those actions. About 40 people were charged with crimes in the scandal and with related crimes. Most of these people were convicted by juries or pleaded guilty. We will write a custom essay on Watergate Was The Name Of The Biggest Political Scandal In United Stat specifically for you for only $16.38 $13.9/page Order now Watergate involved more high-level government officials than any previous political scandal. It led to the conviction on criminal charges in 1975 of former Attorney General John N. Mitchell and two of Nixons top aides, John D. Ehrlichman and H. R. Haldeman. Also in 1975, former Secretary of Commerce Maurice H. Stans, a leader of Nixons reelection campaign, pleaded guilty to Watergate criminal charges and was fined $5,000. Watergate also had resulted in the resignation of Attorney General Richard G. Kleindienst in 1973. The break-in and cover-up. The scandal took its name from the Watergate complex of apartment and office buildings in Washington, D.C. On June 17, 1972, police arrested five men for breaking into the Democratic Partys national headquarters there. One of the burglars was James W. McCord, Jr., the security coordinator of the Committee for the Re-election of the President (CRP). The five menalong with G. Gordon Liddy, another CRP aide; and E. Howard Hunt, Jr., a White House consultantwere indicted for a number of crimes, including burglary and wiretapping. In January 1973, five of the seven, including Hunt, pleaded guilty. The other twoLiddy and McCordwere found guilty by a jury. Nixons press secretary had said repeatedly that the scandal involved no member of the White House staff. But the press found evidence that White House aides had helped finance sabotage and spying operations against candidates for the 1972 Democratic presidential nomination. Reporters Carl Bernstein and Bob Woodward of The Washington Post led the investigation. Early in 1973, evidence was uncovered that tied several top White House aides to plans for the Watergate break-in or to concealment of evidence that implicated members of the Nixon Administration. The evidence indicated that White House officials had tried to involve the Central Intelligence Agency and the Federal Bureau of Investigation in the cover-up. These officials falsely claimed that national security was involved. On April 30, 1973, Nixon stated that he had no part in either planning the Watergate break-in or covering it up. He promised that the Department of Justice would appoint a special prosecutor to handle the case. In May, Archibald Cox, a Harvard Law School professor, was named to that position. Also in May, the Senate Select Committee on Presidential Campaign Activities began hearings on Watergate. Senator Sam J. Ervin, Jr., of North Carolina headed the committee. Former Presidential Counsel John W. Dean III became the chief witness against Nixon in the hearings. Dean admitted that he had played a major role in a White House cover-up and charged that Nixon knew of his activities. Dean also revealed Administration plans to use the Internal Revenue Service and other government agencies to punish opponents whom the White House had placed on so-called enemies lists. Dean was later sentenced to a prison term of 1 to 4 years. After serving four months, his sentence was reduced to that time a nd he was released. .u3b6bd708e6516f603dcb54cd7d37adca , .u3b6bd708e6516f603dcb54cd7d37adca .postImageUrl , .u3b6bd708e6516f603dcb54cd7d37adca .centered-text-area { min-height: 80px; position: relative; } .u3b6bd708e6516f603dcb54cd7d37adca , .u3b6bd708e6516f603dcb54cd7d37adca:hover , .u3b6bd708e6516f603dcb54cd7d37adca:visited , .u3b6bd708e6516f603dcb54cd7d37adca:active { border:0!important; } .u3b6bd708e6516f603dcb54cd7d37adca .clearfix:after { content: ""; display: table; clear: both; } .u3b6bd708e6516f603dcb54cd7d37adca { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u3b6bd708e6516f603dcb54cd7d37adca:active , .u3b6bd708e6516f603dcb54cd7d37adca:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u3b6bd708e6516f603dcb54cd7d37adca .centered-text-area { width: 100%; position: relative ; } .u3b6bd708e6516f603dcb54cd7d37adca .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u3b6bd708e6516f603dcb54cd7d37adca .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u3b6bd708e6516f603dcb54cd7d37adca .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u3b6bd708e6516f603dcb54cd7d37adca:hover .ctaButton { background-color: #34495E!important; } .u3b6bd708e6516f603dcb54cd7d37adca .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u3b6bd708e6516f603dcb54cd7d37adca .u3b6bd708e6516f603dcb54cd7d37adca-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u3b6bd708e6516f603dcb54cd7d37adca:after { content: ""; display: block; clear: both; } READ: Creation stories EssayThe tape controversy. In July, the Senate committee learned that Nixon had secretly made tape recordings of conversations in his White House offices since 1971. The committee and Cox believed the tapes could answer key questions raised in their investigations. They asked Nixon to supply them with certain tapes, but he refused to do so. Nixon argued that, as President, he had a constitutional right to keep the tapes confidential. In August, Cox and the committee sued Nixon to obtain the tapes. U.S. District Court Judge John J. Sirica decided to review the tapes himself and ordered Nixon to give them to him. Nixon appealed the order, but a U.S. court of appeals supported Sirica. In October, Nixon offered to provide summaries of the tapes. But Cox declared that summaries would be unacceptable as evidence in court and rejected the offer. Nixon ordered Attorney General Elliot L. Richardson to fire Cox, but Richardson refused to do so and resigned. Deputy Attorney General William D. Ruckelshaus also resigned after being ordered to dismiss Cox. Nixon then named Solicitor General Robert H. Bork acting attorney general, and Bork fired Cox. Leon Jaworski, a noted Texas attorney, later succeeded Cox. The Presidents actions angered many Americans. In October, a number of members of the House of Representatives began steps to impeach him. Later in 1973, Nixon agreed to supply the tapes to Sirica. Then it was discovered that three key conversations were missing. The White House said that the tape-recording system failed to work properly during two of the talks and that the third had been accidentally erased. In April 1974, Jaworski served Nixon with a subpoena (legal order) to furnish tape recordings and documents relating to 64 White House conversations. Jaworski said the materials contained evidence in the cover-up case. At the end of April, Nixon released 1,254 pages of edited transcripts of White House conversations. He said they told the full Watergate story. Jaworski, however, insisted on receiving the original tapes and documents that he had requested. Nixon again claimed he had a constitutional right to protect confidential documents. Jaworski then sued the President in federal court. In July, the Supreme Court of the United States ordered Nixon to give Jaworski the materials. The Supreme Court ruled unanimously that a President cannot withhold evidence in a criminal case. The cover-up trial. In March 1974, seven former officials of Nixons Administration or his 1972 reelection committee were indicted on charges of conspiracy in covering up the Watergate break-in. Among them were Domestic Council Chief Ehrlichman, White House Chief of Staff Haldeman, and Attorney General Mitchell. The trial lasted from October 1974 to January 1975. Ehrlichman, Haldeman, and Mitchell were each convicted of conspiracy, obstruction of justice, and perjury, and sentenced to a prison term of from 21/2 to 8 years. The sentences were later reduced to 1 to 4 years. The resignation of Nixon. The President suffered another major setback in July 1974, when the House Judiciary Committee recommended that he be impeached. The committee adopted three articles of impeachment for consideration by the full House of Representatives. The first article accused Nixon of obstructing justice in the scandal. The other two articles accused him of abusing presidential powers and illegally withholding evidence from the judiciary committee. Nixons chief defenders continued to argue that the President had committed no impeachable offense. But on August 5, Nixon released additional transcripts of taped White House conversations. The transcripts convinced most Americans that Nixon had authorized the Watergate cover-up at least as early as June 23, 1972six days after the break-in. Nixon immediately lost almost all his remaining support in Congress. He resigned on August 9, and Vice President Gerald R. Ford took office as President that day. On September 8, Ford pardoned Nixon for all federal crimes that Nixon might have committed while serving as President. .u5145f9f954fbabbe4aca2d645295d387 , .u5145f9f954fbabbe4aca2d645295d387 .postImageUrl , .u5145f9f954fbabbe4aca2d645295d387 .centered-text-area { min-height: 80px; position: relative; } .u5145f9f954fbabbe4aca2d645295d387 , .u5145f9f954fbabbe4aca2d645295d387:hover , .u5145f9f954fbabbe4aca2d645295d387:visited , .u5145f9f954fbabbe4aca2d645295d387:active { border:0!important; } .u5145f9f954fbabbe4aca2d645295d387 .clearfix:after { content: ""; display: table; clear: both; } .u5145f9f954fbabbe4aca2d645295d387 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u5145f9f954fbabbe4aca2d645295d387:active , .u5145f9f954fbabbe4aca2d645295d387:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u5145f9f954fbabbe4aca2d645295d387 .centered-text-area { width: 100%; position: relative ; } .u5145f9f954fbabbe4aca2d645295d387 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u5145f9f954fbabbe4aca2d645295d387 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u5145f9f954fbabbe4aca2d645295d387 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u5145f9f954fbabbe4aca2d645295d387:hover .ctaButton { background-color: #34495E!important; } .u5145f9f954fbabbe4aca2d645295d387 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u5145f9f954fbabbe4aca2d645295d387 .u5145f9f954fbabbe4aca2d645295d387-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u5145f9f954fbabbe4aca2d645295d387:after { content: ""; display: block; clear: both; } READ: Introduction For Antigone EssayOther effects of Watergate. In 1974, Congress approved reforms in the financing of federal election campaigns. Some reforms limit the amount of money contributors may give to candidates for President, Vice President, and Congress. Other financial reforms require detailed reporting of both contributions and expenses. Many state legislatures limited contributions and spending in state election campaigns and adopted codes of ethics for all government employees.