Thursday, August 27, 2020

Nuclear Proliferation essays

Atomic Proliferation papers Concerning Irans position on Nuclear Proliferation, it is contrasted with the situation of Iraq, which is a nation that has just marked the Nuclear Non-Proliferation Treaty yet needs Nuclear weapons. Iran is a covetous nation holding back to get the innovation to build up its Nuclear program and with ongoing turn of events and help by different nations, for example, China, North Korea, Russia, and Kazakhstan, it leaves the west stressed. CIA chief, Robert Gates, affirmed that Iran was looking for a Nuclear bomb and could have one continuously 2000 if the West doesn't forestall it. (Washington Post; NOV. 17, 1992). Since 1991 Iran has searched out the purchase atomic reactors to assist it with learning the innovation, for example, in 1992 when it bought reactors from previous Soviet republics and China Just one Middle East nation possesses atomic weapons and that is Israel, which assists Irans with packaging since that at that point makes a super force around there. As said by Iranian pioneers of Irans option to have atomic weapons and have recommended that Muslim countries ought to gain atomic weapons to coordinate Israels capacities. Alongside Iran, Iraq is additionally attempting to fabricate an atomic program and are significantly nearer than Iran is. Iran has marked the NPT yet doesn't concur with the substance. The bargain controls the fare of atomic innovation to forestall the spread of nuclear weapons. Iran doesn't follow this since they have been attempting to import data on the best way to make these weapons. Since Iran is attempting to manufacture an atomic rocket and is searching for data outside the nation, they don't concur with Non-Proliferation. Iran for quite a long time has attempted to pay data off of China on the most proficient method to construct an atomic reactor and just of late Russia. Ten private Russian organizations were purportedly helping Iran with atomic innovation. From that point forward the United States educated of Russian and Iranian collaboration and has forced endorses on those comp ... <!

Saturday, August 22, 2020

Through outsourcing and strategic alliances Free Essays

Toward the start of 1992, the PC equipment industry had gotten totally defenseless against commoditization. This brought about an awful value war which removed piece of the pie from premium estimated brands like Apple. Accordingly, the organization needed to define new methodologies so as to assemble and keep up a serious edge. We will compose a custom article test on Through redistributing and vital coalitions or on the other hand any comparative subject just for you Request Now In this regard, Apple remained in an extraordinary position since its degree of vertical and flat joining was coordinated distinctly by IBM’s and IBM was contending in an alternate market. One of the techniques that the administration attempted was to open its framework to different gauges and grow piece of the overall industry that way. This procedure was actualized through redistributing and key collusions. Through redistributing and vital coalitions, the organization had the option to limit costs as well as to separate its product offering so as to enlarge its market advance. Be that as it may, as referenced previously, Apple remained in a novel situation to practice a significant degree of effect on the business in the case of rivaling a shut framework or an open-finished one. Porter’s five powers before opening the framework At the point when Apple had first begun selling its PCs, the danger of new contestants had been negligible on the grounds that the organization was actualizing an exclusive innovation. Anyway when IBM entered the business with its open-finished frameworks, most makers could fabricate clones at a small amount of the expense. This expanded the danger of new participants. Since the danger of new contestants was high, the danger of substitute items was additionally high. In this specific situation, Apple started to lose piece of the pie in light of the fact that despite the fact that it was creating extensive incentive through bundling equipment and programming together, the way that it fabricated all the segments in-house implied that the organization had to sell its items at a top notch cost. This was an extreme weakness for the organization as contenders could offer a similar degree of highlights in their items at a small amount of the expense. In view of the high danger of new contestants and substitute items, the danger of rivalry was additionally extremely high. The serious methodologies that significant players in the business were actualizing at the time depended on both equipment and programming. In this regard, Apple’s graphical UI had increased extensive piece of the overall industry in view of its convenience. Anyway Microsoft had likewise been building up the Windows working framework which had contending highlights and which had the extra bit of leeway of more prominent market entrance. Serious techniques in the PC equipment industry in the mid 80s began to concentrate more on programming as equipment was turning out to be progressively commoditized. This implied the main route for equipment makers to build up an exceptional selling suggestion was to bundle more programming highlights into the equipment. The equipment makers couldn't join the Apple working framework since it was not perfect with any equipment determinations other than those fabricated at Apple. This brought about expanded market entrance for Microsoft’s working framework. Anyway on the grounds that Apple was building up an exclusive innovation, it couldn't exploit the quickly developing size of the market. Therefore, the organization had to limit its advertising and offering tasks to the current customers. Anyway the accessibility of low evaluated contender items implied that Apple was losing even its current clients to the clone makers. In this regard, the most gainful client bunch was that comprising of corporate customers. Anyway this fragment of the market was value delicate and accordingly organized cost contemplations in front of other item includes. This was the motivation behind why Apple had been encountering diminishing returns toward the start of the 90’s. Despite the idea of its association structure which empowered it to offer total arrangements, Apple started to experience the ill effects of its significant expenses. The way that there was a high danger of new contestants and substitute items brought about a high danger of bartering power from the clients. Clone makers like Dell didn't need to take part in broad innovative work exercises so as to make new items. Rather they made items dependent on guidelines spearheaded by IBM. Subsequently, cost of creation was impressively lower for these organizations than they were for organizations like IBM and Apple which needed to lead capital-concentrated innovative work exercises intermittently so as to bring out new product offerings. With Dell for instance, the upper hand lay in its novel dissemination structure which cut costs further. This empowered clone makers to offer a wide assortment of item contributions, in the process encouraging an extensive degree of dealing power for the purchasers. The dealing intensity of providers was medium in light of the fact that most equipment makers would in general keep up a joint endeavor system in building up their items. For instance, IBM had an association with Intel for sourcing the latter’s chip. This association implied that makers and their providers didn't need to arrange costs each time they built up another norm. Along these lines the business was well situated as far as the dealing intensity of providers for those producers who kept up open principles. The most effective method to refer to Through redistributing and vital unions, Papers

Friday, August 21, 2020

Blog Archive October 29, 2009 FREE Interview Preparation Seminars in NYC, SF, Chicago and LA

Blog Archive October 29, 2009 FREE Interview Preparation Seminars in NYC, SF, Chicago and LA What do I need to do to prepare for my business school interview? What types of questions will  my interviewer  ask? Is it better to interview with a member of the Admissions Committee or with an alumnus/alumna?   Via these  interactive interview preparation presentations, mbaMission Senior Consultants will offer advice on best practices to help you prepare for and succeed in your  admissions interviews.  Your  presenter  will explore different types of interviews, discuss what each Admissions Committee is looking for and reveal helpful time management tips.    Each host will  also be available for  a QA session after the presentation.   Join us  for a  valuable event  that will be an essential  part of  your interview preparation! All attendees of this exclusive event will receive the following: $100 off any nine-session ManhattanGMAT course Free access to a ManhattanGMAT computer-adaptive practice exam Free half-hour consultation with an mbaMission consultant Priority when registering for mbaMission mock-interview sessions Sign up for our FREE  New York,  Chicago, San Francisco and Los Angeles  events! Share ThisTweet Blogroll

Monday, May 25, 2020

Women s Impact On Women Essay - 2266 Words

The 1800’s redefined who, what, and how women would continue to be represented in the United States. Prior to this era women’s roles in America were very limited; women had to abide by laws such as coverture. Men were the dominating force in social events, political events and in the economy. Nonetheless, women continued to fight these injustices and set multiple milestones during the 1800’s and the 1900’s. Several significant people and movements would attribute to these noteworthy milestones that women would overcome. For the duration of this time women were not staying silent about the inequalities regarding women and African Americans in America. Women like Clarina Irene Howard Nichols took an early stance on the injustice women faced during this time, focusing on the Temperance Movement and later moving in the direction of Women’s Suffrage as well as focusing on the injustice African Americans faced. In addition to Clarina Irene Howard Nichols, Elizabeth Cady Stanton and Lucretia Mott would continue to take a more radical stance and hold the first women’s convention in Seneca Falls, New York. These women are predominating figures in the impending movement for women. Women’s Suffrage and Temperance is often a bridge for the women’s movement of the time. In addition to focusing on women’s movements, these women were also movers and shakers in the anti-slavery issues. These types of crusades empowered women to fight for the injustice they experienced in addition to fightShow MoreRelatedWomen s Impact On Women1406 Words   |  6 Pagesprocreate. However, in the years before hospitals and physicians, women were forced to give birth within the confines of their homes with the help of midwives. Midwives were people who had been through what the soon-to-be mother has been through. This changed when midwives gave way to physicians who spent their lives studying all the ins and outs of childbirth. Physi cians were strictly men at the time, and it was recently that women became physicians as well. This caused much controversy because menRead MoreWomen s Impact On Women1305 Words   |  6 PagesFrom its beginning childbirth had been a thing between women. Childbirth as a social event created an impenetrable support system of women rooted in the common song between those who give birth. Before the medicalization of childbirth, women knew a more autonomous procedure. Why did men decide that childbirth needed them? Almost instinctually, I believe that men saw the power of a united female population and trembled in its wake. The same way that white men trembled in the eye of flourishing blackRead MoreWomen s Impact On Women1407 Words   |  6 Pagesdiscrepancy is due to women taking extensive time off due to caring for children. Ultimately, what this study shows is that men who have children do not earn any less because of it. Yet women who have children, who work in the same fields a s these men, do suffer. Research done in countries with paid maternity leave, and American companies who offer paid leave, show that when women have access to paid maternity leave, a year later they work more with higher earnings. Women who would like to workRead MoreWomen s Impact On Women1023 Words   |  5 Pageshistories progression in the 1970’s, women have had very limited chances, if any, through time towards their Intelligence worth and educations claim. Adrienne Rich’s delivered speech in 1977 at the assembly of Douglas College Entitled â€Å"Claiming an Education† aggressively approached towards female students by urging them to change their mindset, breaking free off taboo, sexist stereotypes, and the feminine inferiority mindset, even though her speech was geared towards women, any gender, especially formsRead MoreWomen s Impact On Women2986 Words   |  12 Pagesonly made history but have produced consequences that women today have to face in their day to day lives. Not only were women used and seen as properties and commodities, but society made some of their experiences to be remembered and carried on by other women throughout history in a negative way. Butler, Goldman, Perkins Gilman and Hartmann explore women in the areas of prostitution, disease, economic status and medical treatment to prove that women are being treated as property in both the role ofRead MoreWomen And Women s Impact On Society1417 Words   |  6 Pagesalso been instances in history where men and women embodied specific roles in their relationships and households. During in the 1800’s, women were expected to be the caretakers of the home, to produce children, to never really have professional jobs of their own, and to do as they were told by their husband. During this time men were the leading figure of â€Å"dominance† in the household due to their social and professional images. The freedoms that women have today were basically as far out of sightRead MoreWomen s Impact On Society1054 Words   |  5 Pages Women have been a key part in United States history since the beginning, whether that means in economics, politics, or the social sphere. Women have continually been put below men as the â€Å"second sex.† However, without women every aspect of American life would be different. Women play a crucial role in consumerism, reform, and culture, which are all main parts of United States domestic life. A lot of women unintentionally participate in consumer culture and economics daily. In early America, womenRead MoreWomen s Impact On Young Girls And Adult Women1438 Words   |  6 Pages Having insecurities and flaws impacts almost anyone and also commonly on young girls and adult women. Many people think that having insecurities is just a phase that every young teen goes through that will eventually turn into confidence, but that isn’t always the case. Many women struggle daily with the way their appearances and even try to seek for approval as a way to boost their confidence. In today’s society, majority of young adults especially women are constantly on social media, lookingRead MoreWomen s Impact On Society2931 Words   |  12 PagesMary Astell was primarily known for her impact on the role of women in society, her views on education, religious views, and her ideas of reason and the nature of man. During Astell’s time, men believed that women were infe rior; in addition they believed that women were only put on earth to bear her children and take care of the children while managing the household. Because women were considered inferior, they were not given the same jobs or life opportunities as men had received, and thereforeRead MoreWomen s Right s Movement And Its Impacts887 Words   |  4 PagesThe Women’s Right’s Movement and Its Impacts Susan B Anthony, one of the first women to participate in the women s right movement said â€Å"I declare to you that woman must not depend upon the protection of man, but must be taught to protect herself, and there I take my stand.† For a long time women were seen as inferior to men. They weren t capable of the things that men were. They were expected to stay in the household and tend to the children. They were subjects to their own oppression and for a

Thursday, May 14, 2020

Example Of Data Processing - 8068 Words

Data Processing Following the creation of the sample, I applied the KNN, SVM, CDA, and k-means pattern recognition algorithm treatment to every member of the sample of the CDAnalysis program and recorded whether the pattern recognition algorithm correctly identified the class of the exposure. If the pattern recognition algorithm determined the class of the exposure to be the same as the same class from which the Cyranose 320 sampled the exposure, then the classification for the exposure was correct. I recorded the correct and incorrect classifications for all exposures from the sample of two hundred exposures and calculated the proportion of the classifications that were correct. I kept this data in an excel sheet for every exposure of†¦show more content†¦The null hypotheses stated that there is no difference in the classification (or detection) of common indoor fungal contaminants for different electronic nose pattern recognition algorithms: Ï€1 = Ï€2 = Ï€3 = Ï€4. The alte rnative hypotheses stated that there is a difference in the classification (or detection) of common indoor fungal contaminants for different electronic nose pattern recognition algorithms: Ï€a ≠  Ï€b; 1 ≠¤ a, b ≠¤ 4. I established the significance level at the commonly accepted ÃŽ ± level of 0.05 and used three degrees of freedom when establishing the chi-squared statistic. The rejection of the null hypotheses would have resulted in the post hoc performance of six separate pairwise McNemar tests between combinations of two treatments to locate significant differences between the classification accuracies of specific pairs of treatments. The assumptions of McNemar tests included a dichotomous independent variable (two pattern recognition algorithms) or treatments and a dichotomous dependent variable (â€Å"correct† or â€Å"incorrect†) that were mutually exclusive (Laerd Statistics, n.d.). The McNemar test also assumed a randomized sample, which I covered in Cochran’s Q test. Assumptions Assumptions of studies were factors that were out of control but still justified by the researcher (Simon, 2011). A research assumption of this study required that the lab-grownShow MoreRelatedTps - a Transaction Processing System1462 Words   |  6 Pagesothers involve recording or retrieving data (making a booking, enrolling a student at university looking up results etc) Most individual transactions are relatively simple, but in most organisations, there are very large numbers of them - so speed and efficiency are important considerations. What is a TPS? A transaction is any business-related exchange such as a payment to an employee, a sale to a customer, and a payment to a supplier. - A Transaction Processing System (TPS) is an organized collectionRead MoreTerminal Data Capability Emv1475 Words   |  6 PagesTerminal Data Capability [What is it?] - Generally, It is a data element that stores information particularly on terminal that can be individually addressed by tag ID. Data element resident in the terminal shall be under control of one of the following parties: †¢ Terminal manufacturer: For example, IFD Serial Number †¢ Acquirer/Agent: For example, Merchant Category Code †¢ Merchant: For example, Local Date and Local Time (these may be controlled by either merchant or acquirer) Read MoreBig Data has gained massive importance in IT and Business today. A report recently published state700 Words   |  3 Pages Big Data has gained massive importance in IT and Business today. A report recently published state that use of big data by a retailer could increase its operating margin by more than 60 percent and it also states that US health care sector could make more than $300 billion profit with the use of big data. There are many other sectors that could profit largely by proper analysis and usage of big data. Although big data promises better margin’s, more revenue and improvised operations it also bringsRead MoreElectronic Data Processing Systems1527 Words   |  7 PagesElectronic Data Processing Systems Chapter  6 Learning  Objective  1 Describe  how  application controls  are  used  in  data processing  systems  to ensure  accuracy and  integrity. Manual  Input  System In some computerized accounting systems, inputs to the system are based on handwritten or typed source documents. These documents are then collected and forwarded to computer operations for error checking and processing. Preparation  and  Completion of  the  Source  Document Source documents, such as customerRead MoreAnalysis Of Big Data And Analytics Systems1576 Words   |  7 PagesBig Data and Analytics systems are fast emerging as one of the most critical system in an organization’s IT environment. But with such a huge amount of data, there come many performance challenges. If Big Data systems cannot be used to make or forecast critical business decisions, or provide insights into business values hidden under huge amounts of data at the right time, then these systems lose their relevance. This article talks about some of the critical performance considerations in a technologyRead MoreImpact Of Information On The Transport Sector Of Bangladesh Essay1296 Words   |  6 Pages30km faraway from port city Chittagong. The processing plant has all the key apparatuses and gears for Painting, Body Building, Inspecting and Testing of car. Difference between Data and Information Data is specific and it is organized for a purpose accurately and timely. Presented within a context, it gives its meaning and relevance. The uncertainty also gets minimized. Information is valuable because it can affect decision or an outcome. For example, if the manager is told about the company sRead MoreAutomated and Non-Automated Data: Essay515 Words   |  3 PagesData resources can be automated or non-automated and it holds all the data an organization may need to access. Some examples of non-automated data resources are staff paper piles, files in cabinets, and paper documents. Data resources can come from different departments of a company and from several locations. Now, the data resource infrastructure is becoming network driven. The best example of networked Data Resource is the Internet where the millions of web servers around the world are theRead MoreQuestions On Batch Processing And Online Processing1325 Words   |  6 Pagesdifference between batch processing and online processing. A. Batch Processing Online Processing 1. In this processing method all tasks are performed as a batch. Means all transactions are grouped and executed at one time. 2. Here in this type of processing records or reports of those transactions are available after processing the batch only. 3. All records are updated into master databases after batch processing. Before processing we will not get any reportsRead MoreData Analysis And Research On Data Processing Techniques Essay1330 Words   |  6 Pagesresult of increasing need for data analysis and the relative ease with which data can be procured nowadays, the size of data used for various kinds of analytics is increasing. The primary problem is that big data cannot be uploaded and made to run the aggregation exercise through full table scans as it takes prohibitive time. Big data needs to be pre-processed before it is uploaded to the analysis box. The aim of this project is to study and research various data pre-processing techniques used in practiceRead MoreArticle On Data Mining With Big Data1734 Words   |  7 Pages(Class ID: 46) Article: Data Mining with Big Data (Paper-1) This paper addresses the complications being faced by Big Data because of increase in the volume, complexity of data and due to multiple sources, which produces large number of data sets. With the increase of big data in different fields like medicine, media, social networking etc., there is a need for better processing model which can access the data at the rate at which the data increases. This paper proposed a processing model, HACE theorem

Wednesday, May 6, 2020

Role Of Primary Attending Healthcare Provider Essay

Introduction Having a patient on life support is a mentally challenging and exhausting time for the patient’s family members. It is an even more mentally exhausting for that patients attending healthcare provider. As Advanced practice nurse step more into the role of primary attending healthcare provider, they are faced with the dilemma of how and when to wean a patient from a ventilator without causing the patient any psychological distress. Many healthcare facilities have a written protocol on specific criteria that the patient needs to meet before terminal weaning is considered. Even if these criteria are met, a family can object to the wean and prevent it from happening. There is certain thing that the advanced practice nurse must think about before considering to discontinue life support. These include, patient’s quality of life, family of the patient and their concerns, hospital protocol, and most importantly, the wishes of the patient. Case Scenario Mary is a patient in the local hospitals Intensive Care Unit. Mary has a history of end stage COPD, lung cancer and renal failure. Mary is currently on life support via a ventilator. Knowing that her life would end due to her health complications, Mary had a living will and an Advance Directive written by an attorney in case that someday she would not be able to make her healthcare wishes be known. Mary did not name a Durable Power of Attorney in her living will. Mary’s family is aware of her wishes but thinksShow MoreRelatedA Web Based Communication Method1481 Words   |  6 PagesVoice-Over-Internet Protocol (VoIP) if there is no phone line. Even though participating on a web-based (webinar) seminar entirely is a new environment for me, I decided to register for one of the very few free of charge webinar seminars that related to the healthcare organization. After I had searched for a couple days, I found this website (https://hrsa.connectsolutions.com/hrsa-cdc/) and registered for the free enter as a guest and had gotten participant passcode. Beginning from the date I registered for theRead MoreRural Community And Health Care1399 Words   |  6 PagesIntroduction Rural Americans face an exclusive combination of issues that create disparities in health care that are not found in urban areas. Many complications met by healthcare providers and patients in rural arears are massively different than those located in urban areas. Financial factors, cultural and social variances, educational deficiencies, lack of acknowledgement by delegates and the absolute isolation of living in remote rural areas all combined to hinder rural Americans in their struggleRead MoreIssues And Trends Of The Nurse Practitioner1747 Words   |  7 PagesTrends Since the inception of the Nurse Practitioner (NP) role in the 1960s, NPs have thrived in the delivery of primary healthcare and nurse case management. Despite patient satisfaction with NPs style of care, nurses have been critical of NPs, while physicians have been threatened by NP encroachment on MD practice. Balancing assessment, diagnosis, and treatment with caring defines NPs success as primary care providers. Understand the role and Scope of Practice of NPs is sometimes difficult forRead MoreEvaluation Of A Teaching Hospital Team Of Caregivers766 Words   |  4 PagesIntroduction There are many healthcare fields that rely on the performance of certain variables, such as customer satisfaction, bedside manner, and trust between caregiver and patient. These factors are only a few constructs, but important ones, that can be measured to improve the many disciplines throughout the healthcare system (Gok, Sezen, 2013). In comparison to a teaching hospital team of caregivers versus teams of caregivers in a private practice setting, which is more effective to attain betterRead MorePractice Of Nursing1517 Words   |  7 Pages With the passage of time practice of nursing is constantly fetching vibrant and is projected to experience remarkable evolution and modification. Auspiciously, the revolution is going to bring lots of prospects that will be linked to a greater role that nurses have to play. This is not restricted to acute care settings like hospitals however is going to outspread to other settings. The author of this essay will confer the anticipated modifications in the practice of nursing in deference to theRead MoreMethods And Findings Based On Literature Review Essay1482 Words   |  6 Pages p 0.001)† (p. 1198). Pesut et al. (2015) utilized a mix-method convergent parallel design study to evaluate the outcomes of an educational intervention of 22 rural nurses and 13 healthcare workers (sample) in palliative care. A pre and post-test analysis was completed and it demonstrated that healthcare providers had a statistically significant knowledge gain in many areas of palliative care. For instance, there was an increase in seven of ten palliative care competence dimensions, includingRead MoreCare For Patients Health Care Providers840 Words   |  4 Pagescare providers must take into account key factors, such as: the patient’s current condition, medical history, risk factors, barriers to healthcare (availability, accessibility, affordability, appropriateness, accountability, adaptability, acceptability, awareness, attitudes, approachability, alternative practices, additional services availability), as well as the patient’s characteristics of vulnerabilities of predisposing, enablin g, and needs (Denisco Barker, 2016). All these play a role in howRead MoreTelemedicines Time Has Finally Come1325 Words   |  6 Pagesuser of these technological tools own. The telemedicine enables different types of interactions between doctor and patient. Giving each other better schedules and spaces for routine procedures that do not involve personal contact, or physically attending health institutions. Such as a physician can advise simultaneously several patients in short time, and devote their utmost to users of greater complexity. The technological innovation capabilities of telemedicine have created a demand for servicesRead MoreEffects Of Patient Education On Non Compliant Patients With Chronic Illnesses1246 Words   |  5 Pagescomply. In this instance, it is used to reference a â€Å"patient who elicits through their behavior— the inability of taking medication, following a diet, executing lifestyle changes—or not corresponding with agreed recommendations from a health care provider† (McIntyre, 2016). Non-compliant behavior is actually believed to be an epidemic and is likely one of the most common causes of treatment failure for chronic conditions as it hinders the doctor’s ability to provide optimal care† (McIntyre, 2016)Read MoreInformation System Application For Decision Making1289 Words   |  6 PagesSystem Application for Decision Making The primary aim of the healthcare system is to find proper and effective ways to improve the quality of care, minimize healthcare costs, and enhance patient safety. On top of the list of priorities that healthcare providers have to foster that attainment of the above-mentioned objective is the implementation of Electronic Health Record (EHR) Systems. Therefore, over the past decade, there has been a push for healthcare organizations and physicians to transition

Tuesday, May 5, 2020

E-Commerce Management and System-Free-Samples-Myassignmenthelp.com

Question: Discuss about the E-business Fundamentals and Systems. Answer: Introduction Making use of Web, intranet, internet, extranets or some combinations of some other contemporary mechanisms for conducting business is referred as the process of electronic business (E-business). The term e-business has been referred similar to the concept of e-commerce but one of the biggest difference is that e-business goes beyond the simple process of buying and selling of products and services through online medium. E-business is a much wide concept and includes the number of aspects, concepts and business processes such as supply chain management, customer relationship management and electronic order processing (Aboelmaged, Mohamed 2015, 606-631). These are some of the business practices that are required to be executed by the business corporations with greater efficiency and effectiveness. And e-business aids the business entities in the execution of the processes in a more effective manner. E-business is a broader concept and encompasses the varied range of other terms such a s e-tailing and e-commerce. As the business corporations are more into digitalization and modernization the concepts such as enterprise resource planning (ERP), customer relationship management (CRM) have gained the great level of significance. The below report has been executed on the concept of e-business technologies and impact of the same on the contemporary organizational business. Further, the report also comprises of the solutions provided for the suppliers for the risks and the threats associated with these technologies. Changes in modern organizational business operations due to e-technologies The Internet has been considered as one of the greatest and significant element and is also one of the biggest innovations of e-technologies (Ameur, Esma, Umar and Michael 2017). The Internet has changed the way does the business and the business corporations can take advantage of the technology for its personal benefits. E-business has been considered as the process of executing business operations and practices by means of internet and online means and the e-technologies are the tools e-tools or the medium utilized for the operating business. The process of e-business encompasses various practices such as exchanging data or information, placing and taking orders, internal communication (interacting with the staff members) etc. The e-business technologies are held liable for stimulating the organizational operations in positive and negative terms. The below presented are some of the positive impacts that will be observed in the organizational operations of a business entity: A sense of equality is developed: Working on fair and equal terms has been considered as one of the biggest factors for success and growth of an individual within a business entity (Bak, Ozlem 2018). And in case of e-business technologies, the operations are executed online. This will generate a sense of equality as the authority interacting with the staff will know the performance level of the concerned individual and the staff will be judged on the same basis. Hence, sense of equality will be developed and the employees will be motivated and the motivated staff will strive to work harder thus increasing efficiency and effectiveness of the delivery process (Benyoucef, Morad, Michael, and Hafedh 2015). And this shows that the organizational operations will be positively impacted. Enhanced quality of customer services: E-technologies provide the business entities with the number of tools and mechanisms so as to bring cost efficacy in the business operations. For instance, the e-technological tools will aid the entity by saving money in the operations associated with customer services. By making use of online applications and systems such as cloud computing the business entity can directly store the accounts and required details on the computer systems and can get access to the same any time they want. There will be no need of traveling again and again to the client. The traveling expenses and efforts will be minimized and also the stored data will be accurate and will provide better and improved outcomes (Bradley, Stephen, Stuar, and Changsu 2016). Thus this will enhance the quality of the organizational operations. Marketing: Internet is again one of the greatest media through which the business entity can execute transactions and operate the business on a broader level at a time. For instance, by making use of internet the organization is required to develop and design a web-based portal and through which they can make the availability of the products largely for the customers (Chaffey, Dave 2015). The Internet has been considered as one of the largest platform through which the business firm can make the availability of the products and services in a systematic manner and that too with an ease. Operational efficiency and effectiveness in the delivery of products and services will be observed and a greater level of satisfaction to a customer will be delivered. Digitalization of order entry transactions: Placing and taking orders and maintaining records and required essential data has been considered as one of the crucial task or business operation for any of the business organization (Chang and Barun, Dasgupta 2015, 26-36). By making use of any of the contemporary mechanism or internet based systems the business entity can bring a hike in the effectiveness and adequacy of the business operations. And thus this technological up-gradation has been considered as one of the greatest positive change that will be experienced in the organizational operations of the business organization. E-technologies facilitates strategic thinking: One of the biggest advantage that will be attained by the adoption of e-technologies in the organizational structure is that the business entity will be experiencing a boost in the ability of enhancing the firms competitive advantage in the market region by simplifying strategic thinking and transfer of data and knowledge (De, Hans, and Ernst 2018). Retrieving and leveraging social networks and also the subscription information bases has enabled the business entities with the ability to interpret assembling and transferring the data in the most effective manner. This also offers the business organizations with an unparalleled access to the customers and potential consumers and thus enabling the firm in delivering advanced and developed products and services. And thus the e-technologies provide the business entity with mechanisms and tools for evaluating the market and for implementing the strategies required for accomplishing competitive edge (Gollenia, Lars 2016). And all these can also be considered as other positive changes that will be experienced by the business entity in the organizational operations. Cost cutting and elimination of waste: The e-technologies seems costly at the initial stages when first implemented but further it becomes very much cost effective by restructuring a companys operational and managerial processes. Adoption of online training sessions and programs is one of the best examples of e-technologies through which the cost-cutting to a great extent is made possible and also the efforts initiated will be less (Hasani, Tahereh, Jamil, and Ali 2017, 655,675). This will save energy of the individuals for other tasks and thus enable them to contribute towards bringing an increase in productivity. Overcoming threats and risks associated with e-technologies Threats and risk to e-technologies are an everyday reality for most of the business corporations. These threats and risks are problematic situations that are required to be handled efficiently by the technology suppliers (Kadry, Seifedine, and Abdelkhalak 2017). The below presented are the practical implications that are required to be adhered by the technology suppliers for tackling and dealing with the associated threats and risks: Securing computer and other wireless systems Use of anti-spyware, anti-virus and firewalls for protecting the systems Regular and timely up-gradation of software systems Creating data back-ups Maintaining and securing passwords Training to the concerned staff should be provided (Monfort, Valrie and Karl-Heinz Krempels, 2015). Making them understand the legal norms and regulations There are more specific preventions that can be adopted by the suppliers of e-technology and the same is presented below: Developing a secure online presence: The online presence of a business entity has been considered as one of the supporting pillar in success and growth. And hence is one of the integral operations for any of the firm. Online presence is the brand equity of an enterprise in the digital world and hence is required to be secured and prevented from threats and risks (Tsuma, Victor, and Mark 2017, 164-176). Under this system, the business entity is required to assess the security of the web-based portals, websites, email accounts, online stored data and online banking accounts. There is the number of systems and applications that can be adopted by the technology suppliers for preventing the online presence of the enterprise. For instance, secure socket layer (SSL), is one of the technologies that can be installed for encrypting transactional data and for sending customer and card details to the bank that is the acquiring authority for authorization. Moreover, it should also be ensured that any web-hosting solution considered should be capable of supporting the SSL protocol. Induction programs and IT training for staff: Providing training sessions to the new staff regarding the It policies, procedures and regulations that are pursued within the business organization and this operation has been considered as one of the significant steps of the risk management strategies (Turban et al. 2015). These types of training sessions will cover the key business operations such as: Safe handling of infected emails and systems Maintaining and preventing the privacy of customer details Priority actions in an occurrence of an online security breach The supplier or the training head have some legal obligations while providing training to the staff (Veit et al. 2014, 45-53). Business insurance: It is not possible for a business entity and for a technology supplier to prevent or eliminate IT risks and threats. And hence ensuring the business has been considered as a crucial and integral task in the concept of securing the e-business from threats and risks and recovery planning (Zurawski, Richard 2016). There is the varied range of operations that are required to be executed for ensuring the firm such as regularly updating the insurance, especially in relation to the new or emerging risks and threats to the business. Such as excessive use of mobile personal cell phones for workplace practices. Conclusion In the limelight of the above-executed analysis, it has been concluded that e-business has been considered as one of the contemporary forms of executing business practices. In this form of business, the concept of e-technologies plays an integral role in operating the business in the present era. The above-presented report has been segmented majorly into two sections and from which the first part is concerned about the changes or the alterations that have been introduced by the emergence of the concept of e-technologies in the organizational operations. The second part is focused on the threats and the risks associated with the operations and also the solutions are provided for the technological suppliers in order to deal and tackle these issues. References Aboelmaged, Mohamed Gamal Shehata. "E-maintenance research: a multifaceted perspective." Journal of Manufacturing Technology Management 26, no. 5 (2015): 606-631. Ameur, Esma, Umar Ruhi, and Michael Weiss, eds. E-Technologies: Embracing the Internet of Things: 7th International Conference, MCETECH 2017, Ottawa, ON, Canada, May 17-19, 2017, Proceedings. Vol. 289. Springer, 2017. Bak, Ozlem. E-Business and Supply Chain Integration: Strategies and Case Studies from Industry. Kogan Page Publishers, 2018. Benyoucef, Morad, Michael Weiss, and Hafedh Mili. E-Technologies. Springer International Publishing:, 2015. Bradley, Stephen P., Stuart Madnick, and Changsu Kim. Digital Business. Chicago Business Press, 2016. Chaffey, Dave. Digital business and E-commerce management. Pearson Education Limited, 2015. Chang, J. L., and Barun Barun Dasgupta. "An investigation of the barriers to e-business implementation in small and medium-sized enterprises." International Journal of Economics and Management Engineering 2, no. 1 (2015): 26-36. De Bruijn, Hans, and Ernst Ten Heuvelhof. Management in networks. Routledge, 2018. Gollenia, Lars Alexander. Business transformation management methodology. Routledge, 2016. Hasani, Tahereh, Jamil Bojei, and Ali Dehghantanha. "Investigating the antecedents to the adoption of SCRM technologies by start-up companies." Telematics and Informatics 34, no. 5 (2017): 655-675. Kadry, Seifedine, and Abdelkhalak El Hami, eds. Innovations in E-systems for Business and Commerce. CRC Press, 2017. Monfort, Valrie, and Karl-Heinz Krempels, eds. Web Information Systems and Technologies: 10th International Conference, WEBIST 2014, Barcelona, Spain, April 3-5, 2014, Revised Selected Papers. Vol. 226. Springer, 2015. Tsuma, Victor Imbanga, and Mark Kanda. "Factors Affecting the Adoption of e-Procurement Systems among International Non-Governmental Organisations in Kenya." International Journal of Academic Research in Accounting, Finance and Management Sciences 7, no. 2 (2017): 164-176. Turban, Efraim, David King, Jae Kyu Lee, Ting-Peng Liang, and Deborrah C. Turban. Electronic commerce: A managerial and social networks perspective. Springer, 2015. Veit, Daniel, Eric Clemons, Alexander Benlian, Peter Buxmann, Thomas Hess, Dennis Kundisch, Jan Marco Leimeister, Peter Loos, and Martin Spann. "Business models." Business Information Systems Engineering 6, no. 1 (2014): 45-53. Zurawski, Richard. Integration technologies for industrial automated systems. CRC Press, 2016.

Friday, April 10, 2020

Criminal Justice Essays (474 words) - Searches And Seizures

Criminal Justice The two vehicle stops were made for different reasons. The first vehicle, the white Toyota Camry, was stopped because it fit the description of a vehicle that was just used in a bank robbery. This gives the police probable cause that the vehicle contains evidence of criminal activity. According to Carroll v. United States that is sufficient reasoning for a stop (211). The second vehicle had the driver's side brake light out. This is sufficient cause to pull the vehicle over because that is a traffic violation. "In Whren v. United States, the Supreme Court ruled that the true motivation of police officers in making traffic stops was irrelevant as long as they had probable cause to believe that a traffic law had been broken (211)." I feel that both stops were justified and neither violated the rights of the suspects. Fitting the description of suspects and being in the general vicinity of the crime is adequate evidence to pull a vehicle over and check out the situation. The second stop was made because the driver had violated a traffic code. Since the vehicle is breaking this law the police have the right to pull over that vehicle. The officers even took the vehicle to the station to obtain a search warrant when the suspect objected. Both stops were done in a legal manner. The warrant less search of the white Toyota Camry was justified because the suspect did not say no when the officer asked to search the vehicle. The officer did not come right out and ask if he could search the trunk, but the suspect never objected. Instead the suspect begins to not cooperate which leads to more suspicion. The behavior of the suspects and the fact that neither suspects objected to the search is reason enough to for a warrant less search. If the suspects in the white Toyota Camry had been advised of their Miranda rights before the search of their vehicle then the police would have had to obtain a search warrant. But by denying the police the right to search your vehicle is almost implying guilt in itself. I think the only difference getting a search warrant would have done is prolonged the police finding the evidence in the trunk. Either way I think the situation would result in the police finding the rifle and the suspects getting arrested. If the officers had opened the trunk and found no evidence of the robbery then I think they could only take the suspects in for questioning. Since this questioning would be in an accusatory manner then the suspects would need to be advised of their Miranda rights. If the suspects exercised their right to an attorney then they would be advised to keep their mouths shut. Without evidence to incriminate the suspects then the suspects would be released and probably questioned again later. With the only basis for charging being that the suspects and their vehicle fit the description of those in a robbery then in all likelihood the suspects would not be charged.

Monday, March 9, 2020

Why We Sympathize with MacBeth

Why We Sympathize with MacBeth Free Online Research Papers Why We Sympathize with MacBeth MacBeth fits all of the characteristics of a tragic hero. He is an important character in the play, has a character flaw (his ambition), has one good quality (at the start of the play he was noble and respected), has someone to tempt or persuade him to commit a crime (Lady MacBeth and the witches), deserves his fate (MacBeth did not simply make a mistake, he committed a terrible crime – the murder of a king (and many others) is definitely frowned upon in Elizabethan times), and was punished for the crime (he was killed), which he has committed. MacBeth definitely is the tragic hero of MacBeth. By giving him a good quality, the author creates sympathy for MacBeth. Philosophers, such as Aristotle, believed that the audience must feel sympathy for the tragic hero; otherwise, it was not considered a good play because the audience could not empathize with the tragic hero. MacBeth has a very good quality: his courage. He says: â€Å"Ill fight till from my bones my flesh be hacked. Give me my armor.† 5, 3, 32-33 He says this even though he realizes he will die. The tragic hero and everyone associated with him must die. MacBeth should die because he has committed both treason and a religious crime – he is killed by MacDuff. Lady MacBeth commits suicide towards the end of the play, and MacBeths followers are killed in the last battle of the play. Furthermore, MacBeth causes pain and suffering to innocent parties, and, thus, fulfilling the very definition of a â€Å"tragic hero†. Readers feel sorry for MacBeth because of all the reasons that make a tragic hero. In the beginning of the play MacBeth was certainly a military hero who was worthy of the praises and rewards bestowed upon him. Shakespeare described him in terms such as these: â€Å"For brave MacBeth – well he deserves that name –† 1, 2,16 â€Å"O valiant cousin, worthy gentlemen.† 1, 2, 24 â€Å"What he hath lost, noble MacBeth hath won.† 1, 2, 67 MacBeth is portrayed as a brave and loyal soldier who fights for king and country. His only weakness is his ambition. When the witches prophesize that he is going to become Thane of Cawdor and afterwards king, MacBeth does not believe any of it. But when he later does become Thane of Cawdor he is hard put to ignore the prophecy as the first step in a seemingly unattainable goal has suddenly become within reach for him. Without the witches’ prophesy in his head it is very doubtful MacBeth would have acted the way that he did, the prophesy gives MacBeth the feeling that all the events are preordained and that even without any interference from him things would snowball to the end result anyway. Shakespeare makes you feel sorry for him in that MacBeth felt like he didn’t really have any choice in the matter; everything was out of his control. When MacBeth hears of the witches’ prophesy the thought of killing his king is abhorrent to him: â€Å"†¦Whose horrid image doth unfix my hair And make my seated heart knock at my ribs†¦Ã¢â‚¬  1, 3, 134-135 â€Å"†¦Present fears Are less than horrible imaginings.† 1, 3, 136-137 The play lets you see that MacBeth is very reluctant to take any action towards him becoming king but with the witches’ prophesy and Lady MacBeth’s urging, cajoling, insulting and threatening he is under a lot of pressure to act accordingly. Audiences feel sorry for MacBeth as he is tempted by the prospect of becoming king but at the price of murdering a man that had been very good and generous to him. MacBeth struggles with his morals and his conscience but in the end his ambition wins and he gives in to the evil urges. â€Å"First, as I am his kinsman and his subject, Strong both against the deed; then, as his host, Not bear the knife myself. Besides, this Duncan Hath borne his faculties so meek, hath been So clear in his great office, that his virtues Will plead like angels, trumpet-tongued against The deep damnation of his taking-off.† 1, 7, 13-20 â€Å"†¦ That tears shall drown the wind. I have no spur To prick the sides of my intent, but only Vaulting ambition which o’erleaps itself And falls on th’other – † 1, 7,25-28 MacBeth had even decided not to murder the king however his wife and the witches were too much for him to handle so finally he succumbed to their combined pressures. Even though MacBeth murdered four people Shakespeare paints MacBeth as a man deeply troubled and tormented by his bloody deeds. MacBeth sees Banquo’s ghost and is deeply shaken by the encounter: â€Å"Thou canst not say I did it; never shake Thy gory locks at me!† 3, 4, 50-51 His guilty conscience tortures him. When he became king, MacBeth does not even get to enjoy it, he was tormented by guilt and ghosts created by his mind and his becoming king only brought him pain and suffering – this is all shown in the play and that’s why readers feel such sorrow for MacBeth. He had done so much yet never had the chance to enjoy the fruits of his labor. In the end MacBeth loses everything; he loses what he coveted the most and did anything and everything to get: the kingship, but more tragically he also loses interest in life itself: â€Å"†¦ Better be with the dead Whom we, to gain our peace, have sent to peace, Than on the torture of the mind to lie In restless ecstasy. Duncan is in his grave. After life’s fitful fever, he sleeps well.† 3, 2, 19-23 He even envies the peace of death that Duncan enjoys. Lady MacBeth kills herself and it does not even matter anymore to MacBeth. The irony of it was that he had everything that he’d ever wanted yet his life had becoming meaningless. â€Å"Life’s but a walking shadow, a poor player †¦ It is a tale Told by an idiot, full of sound and fury Signifying nothing.† 5,5 23-26 The crux of the problem was the witches. Without the prophecies he would not have killed his king, he would not have ordered the murder of Banquo and MacDuff’s family and he would not have thought himself invincible and gone into battle only to get himself killed. It is not MacBeth’s actions that made him what he became but rather the actions of those around him i.e. Lady MacBeth. Throughout the whole play we are constantly reminded that MacBeth never made any decision by himself to do the things that he did. It is always the interference of someone else that had caused those things to happen. Readers feel the deepest sympathy for MacBeth who commits one horrific crime after another at the urgings of others when he would have been content to just being the Thane of Cawdor – and illustrious title in itself. â€Å"We will proceed no further in this business†¦Ã¢â‚¬  1, 1, 31 But most sad of all MacBeth is primarily the victim of his own ambition. Another reason Shakespeare gives for us to feel sympathy for MacBeth is the fact that they cannot have children. MacBeth says to Lady MacBeth: â€Å"Bring forth men-children only, †¦Nothing but males†¦Ã¢â‚¬  1, 7, 72-74 This shows how much MacBeth wants an heir. Yet Lady MacBeth is unable to give him any. This might be because of Lady MacBeth’s demand that the spirits â€Å"unsex† her so she is able to kill Duncan. Readers feel sorry for MacBeth about this because it is through no fault of his that he will not have any children. Although MacBeth is certainly a villainous, evil man based solely on his actions, a fuller examination of his characters portrayal leads to a more sympathetic view of him. The play does not portray MacBeth simply as a cold-blooded murderer, but rather as a tortured soul attempting to deal with the atrocities surrounding him. The main reason why readers would feel sorry for MacBeth would be that everything that had happened wasn’t really his fault. Lady MacBeth even kills herself because she couldn’t handle the guilt anymore – this is very sad for MacBeth, as they were very close in the play. Readers also feel sorry for him in that he lost the only person he trusted and was close to. At the conclusion of the play the cruelest blow yet is dealt to MacBeth. The witches had informed him that ‘no man born of woman’ could kill him. He was lulled into a false sense of security so feels confident in going out to battle. What he does not know and does not find out until right before his death is that Macduff was born by Cesarean section – in Elizabethan times this was not considered natural, therefore not ‘born to a woman’. Readers can pity this man who had once been a loyal and trusted soldier serving his liege but instead became a â€Å"tyrant† and â€Å"butcher† who with his â€Å"fiend-like queen† committed regicide and other horrific murders to become king but end up lose everything he had. Research Papers on Why We Sympathize with MacBethHonest Iagos Truth through DeceptionWhere Wild and West MeetCapital PunishmentHarry Potter and the Deathly Hallows EssayComparison: Letter from Birmingham and CritoThe Effects of Illegal ImmigrationThe Fifth HorsemanArguments for Physician-Assisted Suicide (PAS)Effects of Television Violence on ChildrenBringing Democracy to Africa

Saturday, February 22, 2020

Electronic Health Records in the UK Research Paper

Electronic Health Records in the UK - Research Paper Example This is in part informed on the fact policy debates are fueled by bogus, self-defeating attitudes. One of such thinking is that the United States is incapable of affording to cover the uninsured, when in real sense a synchronized monetary system is the chief instrument for cutting cost down, and there relatively inexpensive ways to do it. Even more, the biggest viewpoint, seized by many medical specialists, is that they would be unable to find more authority than they have before now under commercial managed care. Nevertheless, health care systems elsewhere grant medical specialists superior institutional muscle (James, 2005). In the fall of June 1941, a British civil servant, radio personality and educator Sir William Beveridge was requested to execute social modernization after World War II. He had previously worked as a civil servant whereby he interacted with the impoverished in the East of London. At this time, Beveridge observed the numerous paradoxical, biased programs for une mployment, housing, child support, amid other programs run by various departments under conflicting doctrines. As a result, Sir William Beveridge concluded that the only crucial approach was to deal with all the programs at once, in a manner that would form affiliations among the individual and state. The Beveridge account Social Insurance and Allied Services, advocated for all-inclusive health care as an element of a postwar government grand plan endorsing employment, housing, education and social security. However the Beveridge preparation provided just a preface and faltering sketch, it recognized an important vision and became an instant success. The Beveridge report for tax-based state health service as a communal good provided a rudimentary alternative to the existing Bismarck plan of National Health Service (Polly, 2003). Waiting records are a universal pressure valve in numerous systems that cut back on far too much spending. In the National Health System, the standard waiti ng time for discretionary hospital-based care is 46 days. The distinction by social status in seeking services, and admittance are nominal by international standards, though more affluent people are always adept at maneuvering any public service. The British system has been privileged to have private sector for the rich who want faster and plusher optional care. This quarter clinical value is not superior by a margin of 9 percent. The formulated policies favor a duplicative coverage for voluntary dealings for which medical professionals charge very abnormal fees. Private care is intense in the larger London quarter and other cities. Currently, all private admittance and day cases total more than 2%. The world and International Monetary Fund and the World Trade Organization have played a crucial role in the transformation of British Health sector (Scott, Randall & Vogt 2007). The existing design for the new NHS by the current British government is even more determined than the transf ormation shaped by Margaret Thatcher. The NHS was largely criticized as no longer affordable and or sustainable. Restraining it to an emergency and benefit service would have been glaringly politically practicable and would have been received well by the public-private joint venture premises of

Thursday, February 6, 2020

Group Research Project Essay Example | Topics and Well Written Essays - 1500 words

Group Research Project - Essay Example Jack Treynor introduced the concept of the capital asset pricing model to build on diversification and modern portfolio theory introduced by Harry Markowitz (Levy, 2011). Capital asset pricing model is simple to use; this has made it possible to retain popularity despite the modern approaches to asset pricing and portfolio selection. This financial project aims at analyzing a given equally weighted portfolio, which constitutes five types of stocks listed in the Australian Stock Exchange. The project will measure the rate of return on securities of Woolside Petroleum, Santos, Oil Search, Aurora Oil & Gas and Beach Petroleum. The systematic risk will be determined using Beta as the basis of measurement. The project will also evaluate the performance of the selected stock using the capital asset pricing model. The result from the analysis is beneficial to both current and prospective investors when making investment decisions. The analysis will also enable investors to decide whether to add their investment assets to the existing portfolio by finding non-diversifiable risk in the investments. The project will consider thirty-six observations consisting of monthly rates of return between January 2010 and December 2012. This will act as a representative sample for estimating the risks involved in each class of stock. Prior to estimating the capital asset pricing for the selected portfolio, the model will be tested for each stock. The Background of Companies Woodside Petroleum Woodside Petroleum Limited explores and produces petroleum in Australia (Roth, 2011). Woodside is Australia’s largest independent and dedicated oil and gas company with headquarters in Perth, Western Australia. The company is listed on the Australian Securities Exchange. Woodside focuses on the exploration, assessment, development, processing and supplying relative products and services. Santos Limited Santos limited produces and supplies oil and gas to its Australian and Asian customers . The origin of Santos is traced back to Cooper Basin since the year 1964 (Roth, 2011). The company is one of the largest suppliers of oil and gas to the domestic and foreign markets. Presently, Santos has an exploration-led Asian portfolio focusing on three countries including Papua New Guinea, Indonesia and Vietnam. Santos focuses on explorations, exploiting, processing, transportation and marketing of hydrocarbons. The company has over 3,000 employees in Australia and Asia. The foundations of Santos are based on sustainable operations and collaborating with host communities, business partners and shareholders. Oil Search Limited Oil Search Limited is Papua New Guinea’s largest oil and gas producer, which was incorporated in the year 1929. The company has a 29% interest in the world scale Papua New Guinea (PNG) LNG project (Roth, 2011). Oil Search Limited is a public listed company on the Port Moresby and Australian stock exchanges. The Independent State of Papua New Guinea holds 15% of the company’s interest, and this is the largest shareholder in the company. Oil Search Limited has launched exploration activities in Papua New Guinea, Kurdistan, Tunisia and Yemen. Aurora Oil & Gas Aurora Oil & Gas Limited, founded in 2005, is an Australia based oil and gas exploration and production

Tuesday, January 28, 2020

The Simple Gift Essay Example for Free

The Simple Gift Essay It’s about Billy, who leaves home aboard a freight train heading interstate. Billy finds himself in Bendarat, living in a disused train carriage, where he meets a homeless man called Old Bill. Old Bill drinks away his past while Billy tries to find a future. The other main character is Caitlin, a girl Billy meets in Bendarat. All three characters are searching for something to give their lives substance. Steve Herricks poetry novel tells the story of a homeless boys quest to find somewhere to belong. After he runs away from an abusive father, Billy lives in an abandoned railway carriage. There he meets another homeless man, Old Bill and starts to understand the nature of belonging. Caitlin, a lonely girl from a rich family, helps him along the way. http://www.stevenherrick.com.au/notes.htm Why did you write the simple gift? I wanted to explore the relationship between a young man and an old man. As adults, we seem to believe that the idea of being an influence works only one way we adults can influence young people for the better. In the book, I wanted to show it working the other way that is, young Billy really being the positive influence, in fact, the catalyst, for Old Bill rejoining the world. I know my two teenage sons are a wonderful positive influence on my own life. It seems to me that the world of young people is becoming increasingly marginalized by mainstream media. As adults, we need to accept, encourage, and indeed, embrace the world of young people. Let’s see the relationship as a priceless two-way street. What is the theme of the simple gift? At the time of writing this book, I was listening to a wonderful folk CD by Bruce Springsteen titled the ghost of Tom Joad. On this CD, there are a few songs about middle-aged men who are searching for something to give their life meaning. The word redemption kept rolling around my head when listening to the songs, and writing this book. That word certainly came into play in how I created the character of Old Bill. The other thing I kept thinking about while writing was the whole notion of gifts what is valuable in our life? How do we measure what is valuable? The notion of the spiritual versus  the material is something that informs a lot of my writing. Anything else you want to tell us about gift One reviewer called Billy an atypical hero, which I thought was interesting. That got me thinking about what is heroic, and how it relates to some of the characters in my other books. I reckon Billy from gift, within the story they do something of great value, that is a little thing give friendship and hope to an old hobo; these simple little things are what I think of as heroic. They are done by ordinary people, in a quiet unobtrusive way, and to commit these acts it requires compassion and love and respect. And they are far more heroic and necessary than any world-record sporting achievement. And they cannot be measured in dollars and cents. the wind and rain hits you in the face with the force of a fathers punch. That was a relatively easy image to think of because Billy was escaping the violence of his home life. Yeah, thats fine, but what about BELONGING!!!!  I think a closer understanding of the notion of each characters search for an identity and for a place in the community theyve constructed would be worthwhile. I also think its fair to say that a search for an identity can be related to the idea of wanting to belong to oneself. That is, the search for a conscience you can live with/inhabit. The use of interior monologues throughout gift can be seen as keeping your own community the conversation with yourself (which is the essence of an interior monologue) is an attempt to understand how you belong both in this world, but more importantly, to your sense of self. The Simple Gift, Stephen Herricks narrative poem demonstrates elements of belonging and acceptance through the pain and suffering of rejection, homelessness and dealing with death by the characters Billy, Caitlin and Old Bill. The protagonist Billy Luckett sixteen years of age ventures into the world; leaving home on his own decision. Billy reveals himself as a  reject, a thief; and a troubled character who rejected a restrictive regimented irrelevant education system. The cause of his alienation appears to be physical and psychological abuse from his father, lack of caring from his school and his run down neglected neighborhood with its â€Å"truck still on blocks† â€Å"unmown grass†, â€Å"broken windows† and which he derisively refers to as â€Å"each deadbeat no hoper sh-thole lonely downtrodden house in Longlands Rd, Nowheresville†. All the symbols pointing to a decaying, decrepit, depressing environment. The school also receives a blast from Billy ’s poisonous pen. Why 4:30? Most schools would have emptied two hours earlier, however the rest of the stanza rings true as Billy sets the scene on a windy rainy day with the Principal’s run down car blowing smoke, the rubbish strewn oval, Mr Cheetam (Cheater?) notes on Japan to 26 bored students and Billy self-described as â€Å"one lucky bastard† admitting to have ‘stolen’ the lipstick used for his graffiti. He leaves an elliptical epithet: Billy Luckett rhymes with revealing his frustration through a loss of words Another evocative portrait is reminiscences in the poem sport in chapter one. The pain and suffering’ of soulless tyranny endured by him from the old bastard his father. This technique of expletive language is used to depict the poor relationship he shared with his father he gave me one backhander I felt the blood† and his attitude toward the world hes living in. Whilst catching a train, uncertain where the train will take him, bad weather, wind and rain recalls the violent significant memory of his father with the forces of a fathers punch. The metaphoric terms further reveal Billys harsh living environment he is seeking to escape. Herrick induces us to feel empathy rather than antagonism to the protagonist. This is accomplished through the intimate use of language, changing perspectives and personal anecdotes. Ernies train whistle symbolises the beginning of Billys new life contrasted favourably by Ernie’s ‘not bossing you around’. His next positive role model is Irene, Bendarat’s Librarian, who welcomes him and encourages him to borrow books. Billy faces many obstacles or challenges in his new environment, such as lack of accommodation and food, because he has no income. An old train carriage becomes the protagonists new accommodation while he feeds off scraps of leftover food at McDonalds where he catches the attention of Caitlin. Another self imposed exile is, Old Bill, who suffers trauma due to  the loss of his daughter Jessie, after an incident of Jessie falling out of a tree. This led Old Bill to ‘homelessness’ as his home reminds him too much of his daughter, which eventually brings him to the streets turning to alcohol to relieve the pain. After this loss, Old Bills pain and suffering that he endured means he doesnt care much about life. Billy and Old Bill developed a friendship and sense of camaraderie as he treats Old Bill as his father figure. I like the kidI like his company contrasts the lack of love and relationship between Billy and his real father. Old Bill’s emotive language as he explained to Billy and I fell with her, and Ive been falling ever since emphasizes hes still not over it. The bond of friendship is important, it emphasizes the strength in ones relationship, yet it doesnt grieve nor boast but helps one another through rough tough times, which is portrayed as Old Bill becomes less alcoholic, and slowly recovers from the loss of his daughter as he experiences life that we planned. Growth in maturity is shown as both of the two protagonists show signs of growth as they help each other. Billys growth is demonstrated as he becomes a different individual from the beginning of the narrative poem showing positive thinking â€Å"sure theres hope in the worldeven for hobos like us. Whilst Old Bills relationship with Billy and Caitlin, Old Bill’s view of the world slowly starts to change, as the protagonist reduces his consumption of alcohol and ventures to achieve plans that were made with Jessie. While Old Bill demonstrates the symbolism of A Simple Gift when he gave his keys to his old home to Caitlin and Billy. Caitlin also feels as a misfit in her affluent society. She feels discomfort in her uniform, her school, and her luxurious home due to a whispering in her heart that it is all false, superficial, affected and pretentious, so she escapes by slumming it, looking for real values to replace the artificial ones in her world. She is attracted to Billy because of his self assurance and his genuine intelligence. It is the interaction between these three characters and the sharing of gifts, coffee and food, that unites them against a cold, callous and uncaring society. As St Francis of Assisi says â€Å"For it is in giving that we receive†. This narrative novel/poem/drama (?) is very successful and appeals to young people. In a recent poll it was voted the best drama in Australia despite the fact that is generally categorised as a narrative poem. It is fairly realistic and  credible though there are parts that stretch the imagination. Caitlin comes across a bit contrived but her portrayal is plausible. There are many reasons for individuals to venture into the world as the text The Simple Gift shows to achieve self-reliance and independence, even so, many individuals personality in life may change as they experience parts of life first hand. Many would like to experience their own mistakes, which is dealt with in texts like â€Å"Ten Things I Hate about You,† Looking for Alibrandi and the Simple Gift yet to find eventually that their perspective was completely opposite. Like most clichà ©s dont judge a book by its cover. The Simple Gift illustrates that gain acceptance from others by uncritically accepting them.

Monday, January 20, 2020

A Midsummers Nights Dream by William Shakespeare Essay -- Papers

A Midsummer's Nights Dream by William Shakespeare William Shakespeare wrote a midsummer's night dream in 1595. He wrote this comedy to celebrate the marriage of a noble man. An important guest at the wedding was Elizabeth 1st. The play describes the adventures of two sets of lovers as they pass through the forest outside Athens, they are misused by immortals Oberon the fairy king and puck his messenger. To get revenge on his wife Titania, Oberon misuses Bottom a labourer. The love tangles are all resolved at the end of the play when love rules all end married and happy. Shakespeare wishes his audience to enjoy the falling in and out of love of the characters. His message is that true love never runs smoothly. The theme of love is involved with all of the characters from the quarrel of Oberon and Titania, to the play Pyramus and Thisbe performed by the labourers for the wedding celebrations of Theseus and Hippolyta. Oberon has power over all the elements. He can change weather and seasons. "These are the forgeries of jealousyà ¢Ã¢â€š ¬Ã‚ ¦ But with thy brawls thou hast disturbed our sportà ¢Ã¢â€š ¬Ã‚ ¦ The seasons alterà ¢Ã¢â€š ¬Ã‚ ¦ The spring, the summer, the childing autumn, angry winter, changeà ¢Ã¢â€š ¬Ã‚ ¦" This speech of titanias shows us that the seasons and all the growth of nature are changed because of their jealousy arguments and disagreements. This is because Oberon and Titania are king and queen of immortals and have control over them and all nature. Their argument causes evil to occur. Later in the play when they are reconciled they bring blessing to the mortal world. He therefore decided to teach his wife a lesson when she refuses to .. ...eron's "bed and company" we see how determined Oberon is to have the little Indian boy, his wife refuses. While angry with his wife Oberon feels sorry for Helena when he hears Demetrias treats her badly. How strange that Oberon intends to use the flower juice on his own wife to misuse and embarrass her. The swing of the emotion is typical to mood swings through the play. It is Oberon that controls the lives of the other characters and brings changes of mood and atmosphere. It is he who moves he story to a happy end. When Titania agreed to give Oberon the little Indian boy he takes the juice of her eyes. The lover's muddles are sorted out and they are happy. This is a very different Oberon from which we see at the start of the play, he is a much better person. In the same way he acts like a spoilt child.

Sunday, January 12, 2020

A Personal Perspective: Personal Reflections on Followership and Leadership Essay

I will discuss personal follower and leader interactions with two individuals that I have worked with over the last five to seven years. I selected these individuals because of my relationship with them and their leadership capabilities. Secondly, I admire and model after both of them. Finally, I selected these individuals because they believe in me and have invested in my professional and personal development. I will discuss their leadership style in context with course materials and illustrate how I am able to be an effective follower under their leadership. I will also discuss the leadership qualities that make them highly effective leaders. A Personal Perspective: Personal Reflections on Followership and Leadership Trust is the most important factor in most relationships, professional and personal. It is very easy to follow someone that you trust, even when there are differences of opinion. I have worked under the leadership of two dynamic leaders for the last five to seven years. The first is my boss, Karen Schrock, President & CEO of Adult Well-Being Services. The second individual I selected is my Pastor, James Minnick. I selected Karen and James because of my relationship with them. They are both highly effective leaders that I admire for their ability to lead under pressure, manage difficult people and situations, accomplish what needs to be accomplish and remain positive. They believe in me and have invested in my professional and personal development. I strongly concur with the statement leaders are only as good as the people who follow (Johnson, 2011). Bjudstads defines followership as the ability to effectively follow the directives and support the efforts of a leader to maximize the organization (Bjudstad, 2006). An effective follower is one who is enthusiastic, self-reliant, and fulfills their duties with enthusiasm (Kelly, 1998). Courageous, honesty, credibility, competence, and focus are  also qualities of a good follower. It is easy to follow when you are lead by leaders who are competent, passionate, exhibit compassion, and are able to communicate the vision, goals and objectives. I have worked with Karen for seven years, first as her Administrative Assistant and now as the Manager of Executive Office Operations and Stapleton Operations. I worked as a project manager with my previous employer and the skills I developed in that position enabled me to transition to the position of Administrative Assistant for the President & CEO of an organization with ease. They refer to us as the dynamic duo because we work so well together. Karen is very organized, a detailed planner, and clearly communicates her expectations. I am very organized and a detailed planner. We meet at the beginning of each week. We both prepare a list of priorities (often they contain the same items). We differ in communication style. I prefer emails. She prefers face to face or phone communication. A good follower adapts to the style of the leader when necessary. So, I’ve adapted my style somewhat. When managing contacts for her, I will make the call or contact in person. Leaders and foll owers have to be flexible. I am able to approach her and discuss my view when we disagree because of our relationship and her leadership style. She always takes the time to make sure I understand even high level decisions. She shares information so that I am able to make better decisions and work more effectively as a follower. I follow her because I trust that she has my best interest, as well as the best interest of the organization, in her perspective as she leads us. Another quality that allows me to be an effective follower is Karen allows me to do my work. I cannot imagine how frustrating it is to be micromanaged. I don’t require a lot of supervision. I know her expectations. I know the organization. I ask questions and for help when necessary. I am also proactive. It is not necessary for her to tell me what needs to be done in every instance. After working with her for so long, I often know what is expected and accomplish it before it is requested. I advise her of ongoing projects and issues that require her attention. It is my responsibility as a follower to ensure she is informed. Johnson states followers have a responsibility to give good information (Johnson, 2011). Good information i s not necessarily pleasant. I am able  to tell her things others often sugar coat. If something is not working, she needs to know. I also present her with possible solutions when presenting problems. I am comfortable making decisions and informing her of the problem and my resolution. If I make a bad decision, she uses that as a learning opportunity. This is empowering, and has built my confidence and helped me develop as a manager. My relationship with James Minnick started many years ago. We grew up in our local church and I have known him for over thirty five years. I did not work closely with him until he became our Pastor. Shortly after becoming Pastor, he asked me to serve as a Trustee. I am now the Assistant Financial Secretary. It is in this capacity that I have grown to respect him as an effective leader. I am able to exhibit the same qualities of a follower as a Trustee that I exhibit when working with Karen. The environment is different; however, I am who I am. I am just as efficient at a Trustee a nd Assistant Financial Secretary as I am as an employee of Adult Well-Being Services. Good stewardship is required in both environments. Good leaders are able to identify the talents and abilities of their followers to fulfill the vision and mission of the organization in business and non-business environments. I have the same commitment to the Church and its leader as I have to the organization that I work for. I follow James because I trust him and his ability to lead membership. It is easy to follow him because he allows each of us to first recognize, and then use our gifts to support the ministry. I have grown tremendously under the leadership of both of the individuals I’ve discussed. I am able to use my skills, talents and abilities at both organizations and use the resources of both organizations for the common good. I have learned from experiences at Adult Well-Being Services that have helped me as a Trustee and Financial Secretary at the church. They have assigned me projects that I did not believe I was capable of managing but with their encouragement, I accomplished them. James is also the Director of Transportation for Detroit Public Schools. I volunteered to head a project at work to use his expertise to improve our transportation operations. I have watched Karen develop collaborations and relationships to benefit the organization, and used this as a model to develop opportunities and relationships that benefit the organization and church. Goleman (2000) identified six leadership styles: coercive, reflective, affiliative, democratic, pacesetting and coaching. Goleman and Gupta explain good leaders use all of the leadership styles; however, they consistently use only four of the leadership styles. Not all of the styles produce positive results and a positive work climate (Goleman, 82). I was able to visualize how Karen and James use the styles presented and their impact on the organizations they lead. On a more personal note, I was able to see how the styles have impacted my relationship with them and my ability to be an effective follower. The four leadership styles that produce positive results and create a positive work environment are: 1. Authoritative (Mobilizes people toward a vision, encourages others to be a part); 2. Democratic (Works towards consensus, seeks the input of others); 3. Affliliative (Builds harmony and emotional bonds, people come first); and 4. Coaching (Develops people for the future, encourages new ideas/actions). These four styles, as well as the coercive and pacesetting, are demonstrated in the follower and leader interactions I have with James and Karen. I have to admit there are times when I say to them â€Å"Hold-up. You’re taking me too fast.† But I later appreciate that they trust my ability to do what they are asking me to do (even when I don’t). There are also times when they have to pull rank and say â€Å"just do it† because I am resistant and may not want to comply with what I’m being asked to do. I’m learning that there are times when they just want things accomplished. While it may not be my responsibility, it would prolong their desire to have the task accomplished if I don’t do it. Most of the time their leadership styles exhibit the characteristics of leadership apparent in the democratic, coaching, authoritative, and affliliative leadership styles. Not only are these leadership styles beneficial to me, they benefit the organizations the lead. Under their leadership, stressful and chaotic situations become less stressful and chaotic. No one can ever say that they don’t know what’s expected of them because the goals and objectives are always communicated clearly. Karen and James possess values that enable me to follow without reservation. Honesty is first and foremost. They also value people as individuals, recognizing individual strengths and weaknesses. Bjugstad theorizes that organizations can maximize the strengths and minimize the weaknesses of leader-follower relationships by matching the styles of leaders and followers (Bjugstad, 2006). I did not seek leaders from the delegating leadership quadrant. The selected me and  have allowed me to develop into an exemplary follower. I also model their leadership styles and am growing as a leader. Exemplary leaders make it easy for others to be exemplary followers. References Bjugstad, K., Thach, E. C., Thompson, K. J., & Morris, A. (2006). A fresh look at followership: A model for matching followership and leadership styles. Journal of Behavioral & Applied Management, 7(3), 304–319. Goleman, D. (2000). Leadership that gets results. Harvard Business Review, 78(2), 78-90. Retrieved March 25, 2014, from the Business Source Complete database. Gupta, S. (2011, July). Leadership that delivers results. Siliconindia, 14(7), 34-35. Retrieved March 26, 2014, from Business Source Complete. Retrieved from the Walden University library database. Johnson, B. (2011, September). Good followership. Training Journal, 32–36. Retrieved March 15, 2014, from the Walden Library databases. Kelley, R. E. (1988). In praise of followers. Harvard Business Review, 66(6), 142–148. Retrieved March 15m 2014, from the Walden Library databases. Walumbwa, F. O., Lawler, J. J., & Avolio. B. J. (2007). Leadership, individual differences, and work-related attitudes: A cr oss cultural investigation. Applied Psychology: An International Review, 56(2), 212-230. Retrieved March 25, 2014, from the Business Source Complete database.

Saturday, January 4, 2020

Efforts to Fight Cyber Bullying - 1182 Words

Mice in the bubonic plague cause the extinction of vast populations, the mouse now has a new definition and it has connected human being in ways that we still can not being to understand. At the same time the modern day mouse also has been use applied in ways that mimic its treacherous definitional predecessors. The click of a mouse has cause youthful individuals to commit suicide and live lifestyles that are indulged in depression. Cyber bullying is a fairly new type of violence and this is why it is so hard to counter. One of the most prominent forms of counter-cyber bullying that the United States implements is through legislations, which have resulted in mixed results. Psychologist and Sociologist agree that the negative reinforcement approach doesn’t really teach the adolescents the affects that it has on the victims and why it is wrong (Kanazawa). The new legislation actually has caused the young individuals to use more cunning methods in trying to hurt people; like usin g anonymous chartrooms (Bullying Statistics). The more systematic approach is actually showing the kids the problem behind bullying, so that they can use these technological mediums for good instead for action with violent intentions. Cyber bullying is a very serious issue in the world we live in; we live in an era where space and time have become illusion in the face of technological advances we are now experiencing. Cyber bullying is a broad umbrella term for verbal or digital violation of aShow MoreRelatedCyber Bullying Essay1473 Words   |  6 PagesStutzky suggests that cyber bullying is the use of modern communication technologies to embarrass, humiliate, threaten, or intimidate an individual in the attempt to gain power and control over them. Bullying has been around since the beginning of time. These days however, bullying isn’t just happening on the playground, it’s happening on the internet and mobile phones, making it possible to bully a child 24 hours a da y. Cyber bullying follows children around the clock and into the safety of theirRead MoreCyber Bullying : A Deep Seated Psychological Problem1359 Words   |  6 Pages Cyber Bullying Introduction Cyber bullying among teen occur when the teenagers harms or harass their peers over the information technology network. Cyber refers to any form of information technology and is not limited to social networks such as Facebook, blogs, twitter, SMS. It is important to note that an action can only be considered as bullying if it is repeated and conducted deliberatelyRead MoreCyber Bullying And Its Effect On Society1536 Words   |  7 PagesBullying has been an extreme issue all around the world for hundreds of years, and since modern technology has advanced, so has cyber bullying. â€Å"‘Gimme’ your lunch money† has turned into texting and posting gruesome threats and embarrassing material all over social media. Millions of kids all over the world have taken their own lives due to the harmful effects of cyber bullying. Problems that cannot be resolved independently are brought to court, and the government has become increasingly involvedRead MorePersu asive Essay On Cyber Bullying1453 Words   |  6 PagesTake a Stand Against Cyber-bullying Imagine someone you love and care about is being bullied and no one took a stand in defending or uplifting them. This horrific form of bullying takes place all around the nation through the use of cellphones, computers, and social media, that generates fear and doubt among individuals that do not have the confidence to speak up for themselves. School officials should take a stand for kids who are victims of cyber-bullying and for those who are too frightened toRead MoreBullying Is An Emotionally Draining Issue Prominent Across The World Today1111 Words   |  5 PagesSenior English 18 January 2017 Rough Draft Bullying is an emotionally draining issue prominent across the world today. Bullying is unacceptable, and there are many, if not several movements in an effort to end bullying once and for all. Throughout the course of this essay, I am going to discuss the issue of bullying, and formulate an argument towards the issue at hand. In this argument, I will show my support in the fight against bullying. A lot of things have changed throughout the courseRead MoreDifferent Modes And Types Of Bullying1298 Words   |  6 Pagesespecially our youth, is bullying. Bullying is a continuous growing field that is being examined constantly due to its complexity. An important and well known website named stopbullying.com unleashed factual information that helps, as well educates families on this topic: â€Å"In 2014, the Centers for Disease Control and Department of Education released the first federal uniform definition of bullying for research and surveillance †¦ there are many different mod es and types of bullying. The current definitionRead MoreCyber Bullying Is A Serious Problem1569 Words   |  7 Pagessocial media, entertainment, and study purposes. What is behind the internet that we do not realize? Bullying comes in many different forms whether getting targeted on the playground, at work, or even on the internet. Bullying is a violent and harmful act. This violence has been around for as long as schools have been around, but bullying has increased elsewhere. The act of cyberbullying, which is bullying that takes place on any form of technology, is expanding abundantly, with â€Å"more than one out ofRead MoreCurrent Bullying Laws Not Working1100 Words   |  5 Pages Current Bullying Laws Not Working Bullying is something that has been going on in schools and communities for centuries. There are however, laws that have been put into place to help prevent bullying. These laws were first started in 1964. However, â€Å"under Title VI of the Civil Rights Act of 1964 does not directly cover religion, often religious based harassments are based on shared ancestry of ethnic characteristics which is covered.†(FederalRead MoreInternet Violence And Cyber Bullying3649 Words   |  15 Pagesharmful activities anonymously (Davison Stein, 2014). Internet-related abuses and cyber bullying has long been a concern of schools and universities, the government and the whole community. Efforts have been put forward to combat cyber bullying that includes prevention programs at the community, school, and family levels. Nowadays, it is not strange to hear or encounter incidences of internet abuses and cyber bullying. Spending too much time, inappropriate use of the internet and wi th the introductionRead MoreThe Issue Of Cyber Bullying1772 Words   |  8 Pages Cyber Bullying Social media is a way a person can stay connected to the world by a click of a button. But with the privilege to have access to such advanced technology comes responsibility and those people who abuse the right and take advantage of others via social media. In today’s society cyber bullying is discussed in the realm of the action taking place and the effect that it has on a victim and how people can step in and make a change in the fight against bullying. Cyber bullying is using