Featured Post

Moving Object Detection Video Images Using Matlab Computer Science Essay

Moving Object Detection Video Images Using Matlab Computer Science Essay Moving item discovery is a significant exploration subject of PC...

Tuesday, December 24, 2019

Implementing Health Care Reform For A State With High...

California rose to the challenge of implementing health care reform in a state with high needs and limited funds by expanding its Medicaid program (Medi-Cal) and establishing its own marketplace (Covered California). As a result, by June 2014 California s uninsured rate had dropped from 22% to 11%. However, thoughtful examination of the rollout process reveals avoidable bumps in the road that, if corrected, could , have provided a better enrollment experience and thus better access to coverage for our most vulnerable populations. In order to assess California s success in widening the doorway to Medicaid coverage this report reviews policy decisions that shaped efforts in reaching out to, enrolling, and retaining eligible low-income†¦show more content†¦Those successes and barriers identified by at least three of the six participating organizations were selected as key successes and barriers. Outreach: Key informants identified the outreach and education work of community-based organizations as an area of success in California’s efforts to usher eligible consumers to the Medi-Cal doorway. The outreach barriers identified included investments in funding outreach work, DHCS and Covered California communication with consumers, and the limited availability of enrollment data throughout during the first year of the expansion. Enrollment: Medi-Cal enrollment figures far surpassed the 1.2 million predictions. By October 30, 2014 2.7 million new residents were enrolled in Medi-Cal. Key informants unanimously identified this as a success and identified several enrollment policies and the in-person assistance doorway as important contributors to that outcome. Barriers included the availability of data, DHCS and Covered California communication with consumers, technology challenges, policy and protocol adherence, and staff training across service channels. Retention: Key informants agreed that delaying the annualShow MoreRelatedAssessment Of The Legislative Roles Of Health Policy911 Words   |  4 PagesAssessment of the Legislative Roles in Health Policy Introduction Implementing health policy in the United States combines powerful legal, ethical, and societal factors that can have lasting ramifications for everyone involved. Throughout history, various campaigns to insure the United States citizenry have faced defeat on numerous occasions. During the Truman era, the idea of national insurance gained momentum until Senator Taft likened it to communism and socialism, thus dooming it on all frontsRead MoreFinal Critical Analysis : Health Care Delivery1744 Words   |  7 PagesFinal Critical Analysis Health care delivery in the United States is a complex system that is conditionally changing. New policies, physician availability, insurance trends, technology, population growth, and cultural influences shape patient access (Shi Singh, 2013, p. 353). Health care reform is a highly debated topic in America today. By adding funds to the current system it is treating the symptoms and not addressing the cause of the delivery system problems (Moyers, 2009). There are manyRead MoreFinal Critical Analysis : Healthcare Delivery1730 Words   |  7 Pagesthe United States is complex system that is conditionally changing. New policies, physician availability, insurance trends, technology, population growth, and cultural influences shape patient access (Shi Singh, 2013, p. 353). Healthcare reform is a highly debated topic in America today. By adding funds to the current system it is treating the symptoms and not addressing the cause of the delivery system problems (Moyers, 2009). There ar e many aspects of the health system that need to be evaluatedRead MoreThe Patient Protection And Affordable Care Act1686 Words   |  7 PagesObama was the first to implement federal health care reform. The Patient Protection and Affordable Care Act (ACA), otherwise known as Obamacare, was signed into law on March 23, 2010, in efforts to abate healthcare costs and provide health insurance to all United States citizens and legal residents. The intent of Obamacare revolves around providing universal access to healthcare regardless of a pre-existing condition, setting reasonable prices for health care insurance, and providing government subsidiesRead MoreContraception Coverage Of The Affordable Health Care Act978 Words   |  4 PagesCoverage in the Affordable Health Care Act Angel N. Cawthon Kilgore College Author Note Not all of the following information came directly from me but will be cited for the research I have done. Abstract One of the biggest complaints in healthcare is the rising costs.2 In many articles, people complain the healthcare costs have increased significantly and feel that is a direct result of the Affordable Health Care Act. Also, they feel that the cost of implementing the Act itself is wayRead MoreImproving Veterans Access For Care1645 Words   |  7 PagesAccess to Care What is the problem? The Department of Veteran’s Affairs (VA) has been tasked with providing support and benefits to Veterans after they have completed their service. However, many Veterans are reporting difficulty accessing care due to systematic barriers within the VA’s Veterans Health Administration (Oliver, 2007). Complex eligibility requirements, long wait lists and lack of providers are a few of the issues Veterans are faced with when trying to access health and mental health careRead MoreThe Complex And Historical Problem Accessibility1306 Words   |  6 Pageshistory, culture, population and health needs, all of which require a specialized system. Furthermore, an ideal system addresses equally the three key aspects of healthcare: quality, affordability and availability. A system without even one of these aspects at its full potential is not providing the best care possible for the population. Arguably, accessibility is the most crucial and challenging aspect. This is still a tall hurdle for almost every state; even the most high-income countries that possesRead MoreHcs 440 Economics: the Financing of Healthcare1633 Words   |  7 Pagespublics healthcare needs are being paid for, the biggest economic healthcare challenge, why the challenge should be addressed, and how this challenge to be financed. The current level of national healthcare expenditures The National health expenditures is defined as any funds spent on and for healthcare services. Healthcare funding consists of individual, public, and private sectors as well as funding for research and the construction of healthcare facilities (Delaware Health, n.d). CurrentlyRead MoreAdvancements Of Medical And Technology Innovations Essay1597 Words   |  7 Pageshealthcare consulting firm Price Waterhouse Cooper Health Institute, patients have multitudinous innovations available due to recent healthcare reform and technological innovation, resulting in service delivery when and where patients want and need it. [1] The advancements come at a time when patients need detailed information to manage new, complex caregiving expenses. As a result, many clients rethink and improve how they managing retirements funds. This prudence will likely carry over into otherRead MoreComparison and Contrasts of the United States and Canadian Health Care Systems1624 Words   |  7 PagesContrast s of the United States and Canadian Health Care Systems The National healthcare debate is one that has been a continuing arguing point for the last decade. The goal is to provide healthcare to all Americans, regardless of whether they are able to afford insurance or not. In 2009, the U.S. National Health Care Act failed to come to be debated in the house. This Act would have called for the creation of a universal single-payer health care system. Under the policies

Monday, December 16, 2019

Music and Its Effects on Behaviors in Teenagers and Young Adults Free Essays

Jorja M. Rea Professor Andre Yang English 1A 25 November 2012 Music and its effects on Behaviors in Teenagers and Young Adults Picture this: A young man is arrested for murder, twisting and cursing at the police as his mother watches from the sidewalk. It is light enough out that you can see, not far from him, lays the body of a young women. We will write a custom essay sample on Music and Its Effects on Behaviors in Teenagers and Young Adults or any similar topic only for you Order Now She was his girlfriend, whom he had beaten to death. This young man is just one of many young adults that are being arrested for committing vicious crimes in our society. Barongan and Nagayama Hall (1995) examined the effects of cognitive distortions in men had towards women. The men in this study viewed women in a sexually aggressive way. The men’s behavior was observed in a laboratory setting. Twenty-seven men listened to misogynous rap music and 27 men listened to neutral rap music. Participants then viewed neutral, sexually-violent, and assaultive film vignettes and chose the vignette that they found appealing. The results showed that â€Å"participants who viewed the sexual-violent stimuli indeed felt sexually violent towards women, even having thoughts of raping and abusing women†. That young man will spend the next 3 years of his teenage life in a jovial facility and then be relocated to prison once he turns 18. What happened that caused a young man with a 3. 0 GPA to go from good to bad? According to Ortiz (2004) it all has to do with the human brain. The human brain has been called the most complex mass in the known universe. This is a well-deserved reputation, for this organ contains billions of connections called neurons. Among its parts and governs countless actions, involuntary and voluntary, physical, mental and emotional. The largest part of the brain is the frontal lobe. A small area of the frontal lobe located behind the forehead, called the prefrontal cortex, controls the brain’s most advanced functions. This part often referred to as the â€Å"CEO† of the body, providing humans with advanced cognition. It allows us to prioritize thoughts, imagine, think in the abstract, anticipate consequences, plan, and control impulses. Along with everything else in the body, the brain changes significantly during adolescence. In the last five years, scientists, using new technologies, such as an MRI, have discovered that adolescent brain is far less developed han previously believed. Doctors of Harvard Medical School have studied the relation between these new findings and teen behavior and concluded that adolescents often rely on emotional parts of the brain, the Amygdala, rather than the frontal lobe, â€Å"one of the things that teenagers seem to do is to respond more strongly with gut response than they do with evaluating the consequences of what they’re doing. † Since this young man, and many countless others in his position, lacks a complete prefrontal cortex they are forced to use the Amygdala. Fight or Flight is all it tells us to do. Thus, without any clear knowledge these young people are forced to find role models who the feel â€Å"get them†. They turn to music for its lyrics and beat and this is where the trouble begins. Mahiri and Conner (2003) tested whether or not it is true that our African-American youth is more violent than other nationalities and why. Is it the rap music that they may listen to? The researchers assessed the perspective on violence of 41 middle school students attending a unique school in a low-income section of a large northern California city. The researchers probed ways that these students interpreted or reflected upon rap music and hip-hop culture, particularly its representation of violence, crime, and sex. A brief questionnaire was handed out to each of these participants, which consisted of scenario questions (what would you do if†¦). Based on the responses to the questions researchers were able to come to the conclusion that these particular students were â€Å"unfortunately looking up to these negative role models†. The constant talk of female assault, sex, and violence was being imbedded into these children’s minds†. And it doesn’t end there. Many other researchers have examined the effects of how musical genres have increased tendencies towards violet behaviors in teenagers and young adults. These studies have helped to uncover whether or not violent and aggressive music and music lyrics have had in fact, increased the rate of individuals that lash out in a violent, aggressive manne r. Although none of the researchers in this paper considered the lack of the prefrontal cortex as a results as to why these young adults are so effects by the images they see or the music they listen to, they did however find something else altogether; these studies were done to inform society on how music is affecting people’s moods. For example: Anderson et al. (2003) studied whether or not media violence influences youth. They randomly assigned youths to watch either a short violent or a short nonviolent music video and then observed how they interacted with other people after viewing the music video. After each participant watched the music video for approximately 15 minutes, both physical and verbal aggression towards others was assessed using a 10-point scale: with 1 showing nonviolent behaviors and 10 showing a lot of violent behaviors. A correlational analysis was used to see if there was a relationship between a participant watching the violent music video and acting violent, or watching the nonviolent music video and not acting violent. â€Å"The results showed that exposure to media violence had a statistically significant association with aggression and violence among youth†. This research clearly demonstrates that exposure to media violence heightens the chances that a youth will behave aggressively and have aggressive thoughts in the short run. Arlin (1996) examined the â€Å"influence of exposure to violent rock videos on participants’ appraisals of their own aggressiveness†. Participants were preselected based on their scores on a measure of locus of control. After completing a measure of Buss and Durkee’s Hostility Inventory, they were randomly assigned to view either a view or nonviolent music video. After viewing the video, participants once again completed the Hostility Inventory. The results revealed a main effect of locus of control, such that individuals with an external locus of control showed lower self-reported aggressiveness after viewing a music video than individuals with an internal locus of control. Johnson, Jackson and Gatto (1995) studied whether exposure to rap music could cause violent attitudes and delayed academic performance. Forty-six African-American males (ages 11 to 16 years) from an inner city boys club in Wilmington, North Carolina were recruited to participate in this study. Participants were randomly exposed to violent rap music videos, nonviolent rap music videos, or no music videos. They read two vignettes involving: (a) a violent act perpetrated against a man and a woman and (b) a young man who chose to engage in academic pursuits to achieve success, whereas his friend, who was unemployed, â€Å"mysteriously† obtained extravagant items (i. e. , a nice car, nice clothes). The results showed that participants who saw the violent rap music videos reported greater acceptance of violence. In addition, â€Å"participants who saw the violent rap videos reported higher probability of committing similar acts of violence and greater acceptance of the use of violence against women†. St. Lawrence and Joyner (1991) examined the effects of sexually violent rock videos on males’ acceptance or violence against women. The experimental manipulation involved exposure to sexually violent heavy-metal rock music, Christian heavy-metal rock music, or easy listening classical music. One month prior to the experimental manipulation, participants were administered several attitudinal scales about religious orientation, sex roles, rape myths, and interpersonal violence. The results indicated that â€Å"males without a religious background were more accepting of sexist and rape-supportive beliefs†. The researchers also came across an unexpected finding which was greater self-reported sexual arousal in response to classical music. Kalof (1999) examined the effects of gender and music video imagery on sexual attitudes. A group of 44 U. S. college students were randomly assigned to 1 of 2 groups that viewed either a video portraying stereotyped sexual imagery or a video that excluded all sexual images. A two-way scale revealed that exposure to traditional sexual imagery had a significant main effect on attitudes about adversarial sexual relationships. There seems to be some confirmation of a relation between sex and exposure to conventional sexual imagery on the acceptance of interpersonal violence. † Viemero and Paajanen (1992) examined whether or not viewing violent television actually does increase the aggressive behavior of those who viewed it. There were 391 eight-year old and ten-year old children participating in this study. â€Å"These children were tested on their aggression, their fear fantasies, and their dream and fantasies about these shows†. Two measurements of aggression were made: peer-nominated aggression and self-related aggression. TV viewing habits were measured by the amount of TV viewed during the week. Violence was depicted by how regularly violent TV shows were watched. They found that there was significant positive correlation for boys between TV viewing variables and aggression. There was also a significant positive correlation between the amount of TV and televised violence viewing and fear and aggressive fantasies about actual shows that were seen by the children. â€Å"These children seem to have been strongly impacted by the violence seen on television shows they were watching, and then acting in a more aggressive way after watching the violence†. Now that the It seems very obvious that there is a significant relationship between listening to violent music and watching aggressive/violent music videos and one getting into more fights, using inappropriate language, inappropriate gestures, and a tendency to think less of women. All of these researchers identified in this paper studied this exact relationship and found significant results. It is apparent that there is indeed a direct correlation between violent music and people’s aggressive behaviors. An operational definition of violent behavior is physically and verbally hurrying others, cursing, stealing, inappropriate gestures and negative views of women. Whether it is the lyrics, the beat, or watching the entertainers act violently, people in general who are viewing these music videos are behaving in an inappropriate and destructive way. Listening to violent music has an effect on aggression. This information is useful for parents of young children who are growing up watching these music videos. The studies completed by the researches mentioned in this paper reveal a serious problem. Our society as a whole should consider this a severe problem, especially with all of the school bombings, the high rates of angry- gang affiliated- weapon carrying young people, and the millions of dollars being spent on this violent and degrading (mostly to women) kind of music. When angry, violent, aggressive, vulgar videos were shown, participants portrayed a massive amount of hostility; their moods were changing as the video continued as did their behavior. They also answered the scenario questions with the most violent answer chose available. The participants who viewed nonviolent videos showed amazingly different answers to the questions, the majority of them answering the questions with the nonviolent or calmer answer choses. This clearly shows evidence that allowing teenagers and young adults to watch violent music videos (like Eminem or DMX) has and will have a strong effect on violent tendencies like beating a women to death. It can also be said that the reason the results were significant in the violent groups is because of the extreme difference between the two videos. The violent videos were extremely violent showing fighting, carjacking, yelling, cursing, and hitting women. Meanwhile, the nonviolent groups watched music videos that showed people dancing on the beach and having fun. The extreme differences between the two types of videos could be the reason for the significant results obtained by the researchers. It may be wise in the future research to use videos that are not so tremendously different. Bibliography Anderson, C. A, Berkowits, L. , Donnerstein, M. , Edward, K. , Huesmann, L. , Rowell, J. , Johnson, J. , Linz, D. , Malamuth, N. , Wartella, H. 2003). The influence of media violence on youth. Psychological Science in the Public Interest, 4, 81- 110. Arlin, B. , (1996). The influence of locus of control and aggressiveness of rock music on aggression. Journal of Social Behavior and Personality, 14, 491- 498. Barongan, C. , Nagayama Hall, G. C. (1995). The influence of misogynous rap music on sexual aggression against women. Psychology of Women Quarterly, 19, 195-207. Mahiri, J. , Conner, E. Black youth violence has a bad rap. Journal of Social Issues, 59, 121-140. Johnson, J. D, Jackson, L. A. , Gatto, L (1995). Violent attitudes and different academic aspirations: Deleterious effects of exposure to rap music. Basic and Applied Social Psychology, 16 (1-2), 27-41. Kalof, L. (1999). The effects of gender and music video imagery on sexual attitudes. Journal of Social Psychology, 139, 378- 385. St. Lawrence, J. S. , Joyner, D. J.. (1991). The effect of sexually violent rock music on males’ acceptance of violence against women. Psychology of Women Quarterly, 15, 49-63. Viemero, V. , Paajanen, S. (1992). The role of fantasies and dreams in the TV viewing-aggression relationship. Journal of Social Psychology, 18, 109-116. How to cite Music and Its Effects on Behaviors in Teenagers and Young Adults, Papers

Sunday, December 8, 2019

Computers And Automation Essay Example For Students

Computers And Automation Essay What is a computer? A Computer is an electronic device that can receive a set ofinstructions, or program, and then carry out this program by performingcalculations on numerical data or by compiling and correlating other forms ofinformation. Thesis Statement:- The modern world of high technology could nothave come about except for the development of the computer. Different types andsizes of computers find uses throughout society in the storage and handling ofdata, from secret governmental files to banking transactions to privatehousehold accounts. Computers have opened up a new era in manufacturing throughthe techniques of automation, and they have enhanced modern communicationsystems. They are essential tools in almost every field of research and appliedtechnology, from constructing models of the universe to producing tomorrowsweather reports, and their use has in itself opened up new areas of conjecture. Database services and computer networks make available a great variety ofinformation sources. The same advanced techniques also make possible invasionsof privacy and of restricted information sources, but computer crime has becomeone of the many risks that society must face if it would enjoy the benefits ofmodern technology. Imagine a world without computers. That would mean no propermeans of communicating, no Internet, no video games. Life would be extremelydifficult. Adults would have to store all their office work paper and thereforetake up an entire room. Teenagers would have to submit course-works and projectshand-written. All graphs and diagrams would have to be drawn neatly andcarefully. Youngsters would never have heard of video-games and will have tospend their free time either reading or playing outside with friends. But thanksto British mathematicians, Augusta Ada Byron and Charles Babbage, our lives aremade a lot easier. Later, on my investigation about the growth of comp uters overthe decades, I will be talking about types of computers, how and when computerswere first being developed, the progress it made, computers at present and plansfor the future. In types of computers, I will be talking about analogue anddigital computers and how they function. In the development of computers, I willbe mentioning about the very first electronic calculator and computer. Underprogress made, I will only be mentioning about circuits. For computers of thepresent, I will be talking about networking, telecommunications and games. Andfinally, as for planning for the future, I will mention about new and recentideas, research and development of new computers heard and talked about innewspapers and on television. I. MAIN TYPES OF COMPUTERS There are two maintypes of computers which are in use today, analog and digital computers,although the term computer is often used to mean only the digital type. Analogcomputers exploit the mathematical similarity between physicalinter relationships in certain problems, and employ electronic or hydrauliccircuits to simulate the physical problem. Digital computers solve problems byperforming sums and by dealing with each number digit by digit. Hybrid computersare those which contain elements of both analog and digital computers. They areusually used for problems in which large numbers of complex equations, known astime integrals, are to be computed. Data in analog form can also be fed into adigital computer by means of an analog- to-digital converter, and the same istrue of the reverse situation. a) What are analog computers and how do theywork? The analog computer is an electronic or hydraulic device that is designedto handle input in terms of, for example, voltage levels or hydraulic pressures,rather than numerical data. The simplest analog calculating device is the sliderule, which employs lengths of specially calibrated scales to facilitatemultiplication, division, and other functions. In a typical electronic a nalogcomputer, the inputs are converted into voltages that may be added or multipliedusing specially designed circuit elements. The answers are continuouslygenerated for display or for conversion to another desired form. b) What aredigital computers and how do they work? Everything that a digital computer doesis based on one operation: the ability to determine if a switch, orgate, is open or closed. That is, the computer can recognise onlytwo states in any of its microscopic circuits: on or off, high voltage or lowvoltage, or-in the case of numbers-0 or 1. The speed at which the computerperforms this simple act, however, is what makes it a marvel of moderntechnology. Computer speeds are measured in megahertz, or millions of cycles persecond. A computer with a clock speed of 10 MHz-a fairlyrepresentative speed for a microcomputer-is capable of executing 10 milliondiscrete operations each second. Business microcomputers can perform 15 to 40million operations per second, and supercompu ters used in research and defenceapplications attain speeds of billions of cycles per second. Digital computerspeed and calculating power are further enhanced by the amount of data handledduring each cycle. If a computer checks only one switch at a time, that switchcan represent only two commands or numbers; thus ON would symbolise oneoperation or number, and OFF would symbolise another. By checking groups ofswitches linked as a unit, however, the computer increases the number ofoperations it can recognise at each cycle. For example, a computer that checkstwo switches at one time can represent four numbers (0 to 3) or can execute oneof four instructions at each cycle, one for each of the following switchpatterns: OFF-OFF (0); OFF-ON (1); ON-OFF (2); or ON-ON (3). II. WHERE IT ALLBEGAN a) The Mother of all Calculators The first adding machine, a precursor ofthe digital computer, was devised in 1642 by the French philosopher BlaisePascal. This device employed a series of ten-toothed w heels, each toothrepresenting a digit from 0 to 9. The wheels were connected so that numberscould be added to each other by advancing the wheels by a correct number ofteeth. In the 1670s the German philosopher and mathematician Gottfried Wilhelmvon Leibniz improved on this machine by devising one that could also multiply. Leslie twiggy Hornby EssayThe pattern 11010010, for example, might be binary data-in this case, thedecimal number 210 (see NUMBER SYSTEMS)-or it might tell the computer to comparedata stored in its switches to data stored in a certain memory-chip location. The development of processors that can handle 16, 32, and 64 bits of data at atime has increased the speed of computers. The complete collection ofrecognizable patterns-the total list of operations-of which a computer iscapable is called its instruction set. Both factors-number of bits at a time,and size of instruction sets-continue to increase with the ongoing developmentof modern digital computers. IV. COMPUTERS OF THE 90S a) Computer NetworksMajor changes in the use of computers have developed since it was firstinvented. Computers have expanded, via telephone lines, into vast nation-wide,or world-wide, networks. At each extremity of the network is a terminal device,or even a large computer, which can send jobs over the wire to the centralcomputer at the hub of the network. The central computer performs thecomputation or data processing and sends the results over the wire to anyterminal in the network for printing. Some computer networks provide a servicecalled time sharing. This i s a technique in which software shifts the computerfrom one task to the another with such timing that it appears to each user at aterminal that he has exclusive use of the computer. b) TelecommunicationsCertain telecommunication methods have become standard in the telecommunicationsindustry as a whole, because if two devices use different standards they areunable to communicate properly. Standards are developed in two ways: (1) themethod is so widely used that it comes to dominate; (2) the method is publishedby a standard-setting organisation. The most important organisation in thisrespect is the International Telecommunication Union, a specialised agency ofthe United Nations, and one of its operational entities, the InternationalTelegraph and Telephone Consultative Committee (CCITT). Other organizations inthe area of standards are the American National Standards Institute, theInstitute of Electrical Engineers, and the Electronic Industries Association. One of the goals of these organizations is the full realisation of theIntegrated Services Digital Network (ISDN), which is projected to be capable oftransmitting through a variety of media and at very high speeds both voice andnon-voice data around the world in digital form. Other developments in theindustry are aimed at increasing the speed at which data can be transmitted. Improvements are being made continually in modems and in the communicationsnetworks. Some public data networks support transmission of 56,000 bits persecond (bps), and modems for home use are capable of as much as 56kbps. c) PCGames and Video CDs CDs have developed a lot over the past decade. At first,they were used only for music. Now, there are CDs from which we can play PCgames and watch movies. The games at present are usually 3D. This means that thegame seems almost life-like or virtual. One can spend hours playing a games onCD because they are addictive. This is one of the main disadvantage of computergames, because the person prevents themselves from doing anything educational orengaging themselves in any physical activities. Another common disadvantage isthat playing too much on the computer can cause bad eye-sight. But there are afew educational games for young children to help them learn and understandthings better. Games may not be all that good for an individual, but if s een howthey are programmed one will realise that it is not all easy to program a game. A few years ago, if one was bored, they would usually go to a video shop andrent a movie. Now one can rent Movie CDs and play them on the computer andspecial Movie CD players which are also installed in some new Hi-Fi Systems.

Saturday, November 30, 2019

Mkt360 Exam 2 Review Essay Example

Mkt360 Exam 2 Review Essay Review Fall 2011 IMPORTANT CONCEPTS Chapter 5 1. Does cultural adaptation require that businesspeople give up their customs when working overseas? Depends 2. What are Cultural Imperatives? Cultural Electives? Cultural Exclusives? Imperatives: social relations, etc. Electives: optional customs Exclusives: customs only for locals, you do not participate. 3. What is Edward T. Hall’s theory of cultural context and linguistic communication? There are non verbal accents of communication that need to be paid attention to. 4. How does communication differ in high context from low context cultures? Low context information is explicit, with words carrying the entirety of the message and written formal specifications. Awards are competency based. IN a high context information is implicit, including non verbal cues. Awards are trust/recommendation based. 5. What are Edward T. Hall’s silent languages? What is m-time? What is p-time? The silent languages are of time, space, things, friendship and agreements. M-time (Monochronic) – divide time into small units and are concerned with promptness. Concentrate on singular tasks at a time. Low context P-Time (Polychronic) – simultaneous occurrence of many things. High context 6. What is the difference between bribery and extortion? Bribery is when the payment is offered voluntarily to an official to gain unlawful advantage, while extortion is when an official extracts payment from a person under duress for something which they are lawfully entitled to. 7. What is the difference between lubrication and subornation? Lubrication deals with small sums of money, given to low-ranking officials (which is not prohibited in some countries) while subornation deals with large sums of money given to officials (higher rank) in order to commit illegal acts. . What does the U. S. Foreign Corrupt Practices Act (FCPA) forbid and what does it allow? Forbids US companies from engaging in bribery of any kind in foreign countries, however it does allow lubrication. 9. What is the position of the FCPA on the use of agent’s fees to facilitate bribery? The use of agent’s fees as intermediaries to pay bribes is prohibited. Chapter 6 – The Politic al Environment 1. What is sovereignty? Under what conditions do nations give up part of their sovereignty? The power that a nation has to govern its people and territory without interference from the outside. . What is extraterritoriality? Name 2 U. S. laws that are extraterritorial. When a nation makes its laws to apply outside of a territory. Ex. Sherman Antitrust Act, IRS Tax Laws, Helms-Burton Act, Foreign Corrupt Practices Act. 3. What is the main political condition Multi-National Corporations (MNC’s) want when working overseas? Predictability and stability of government policies. 4. What is Confiscation? Expropriation? Domestication? Confiscation: Taking away; no payment. Expropriation: Take over the property but some reimbursement. We will write a custom essay sample on Mkt360 Exam 2 Review specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Mkt360 Exam 2 Review specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Mkt360 Exam 2 Review specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Domestication: transfer to national control. 5. When do countries use exchange controls and how are they applied? When a nation faces shortages of foreign exchange and/or substantial amount of capital is leaving the country. Multiple rates levied over all movements of capital to regulate trade in specific commodities and block repatriation of profits. 6. What is a local-content law? A certain percentage of the imported product must contain locally made parts. 7. What is an import license and when do countries require them? Permission to import a product. Required when trying to force foreign industry to purchase more supplies within the host country and thereby create markets for local industry. 8. When do countries use price controls and how are they applied? Done to control inflation. Applied as a limitation on the maximum price you can charge on a product. 9. What types of products are more at risk politically in a foreign country? Those which are â€Å"politically sensitive† or perceived to effect environment, exchange rates, security, welfare and health are subject to more debate. 10. What are some of the strategies that you can follow to lessen political risk overseas? -Joint VenturesInvestment Base Expansion Control of Marketing and DistributionLicensing Planned Domestication*Political Payoffs 11. What agencies provide political-risk insurance to U. S. companies working overseas? 1- Foreign Credit Insurance Association: insures against nonpayment risk caused by financial, economic or political uncertainties. 2-Agency fo r International Development: limited protection on certain projects and products. 3-Overseas Private Investment Corporation: provides risk insurance for companies investing in less developed countries. Chapter 7 – The International Legal Environment 1. What are the differences between the patent laws of the US and Japan? In the US patent protection is to protect the inventor, filing is secret, quick and provides long period of protection; Japan patents benefit society, public filing, long process with short time of protection. 2. What kind of product pricing strategy was Wal-Mart not allowed to use in Germany? They could not use their Loss-leader pricing because pricing certain products below cost was determined as dumping. 3. What is the law on many European countries on the use of comparative advertising? When a business says a product is better than their competitors. It is not allowed. 4. What is the basis for Common Law? In what countries is it presently used? Basis is tradition, past practices, legal precedents set by courts. Through interpretation of statutes, legal legislation and past rulings. US, England, Canada, English influenced countries. 5. How is ownership of intellectual property determined in Common Law? Ownership is determined by first to use. 6. What is the basis for Code Law? In what countries is it presently used? Comprehensive system of written rules or codes. Divide into 3 separate codes for various situations: Comercial/Code/Criminal. Found in majority of countries (70) 7. How is ownership of intellectual property determined in Code Law? Ownership is determined by first to register. 8. What is the basis of Islamic Law? In what countries is it presently used? Based on interpretation of the Quran and the teaching of Muhammad. Religious duties, obligations, secular aspect, social behavior, economic behavior. Found in 27 Islamic countries. 9. What is the basis for Socialist Law? Law is subordinate to economic conditions. 10. What is International Law? There is no â€Å"international† law; The rules and principles that states and nations consider binding unto themselves. 11. How is International Law created? Collection of treaties, conventions, and agreements between nations that have, more or less, the force of law. 12. What is the ISO and why do its standards have the effect of International Law? International Organization for Standardization. ISO9000 quality management. ISO14000 concerned with environment management. 13. What kind of standard is the ISO developing for the WTO and why is it needed? 14. What is the difference between a Patent, a Trademark, and a Copyright? Patent: a government grant of certain rights given to an inventor for a limited time in exchange for the disclosure of the invention. Trademark: that portion of a brand that is given legal protection-cannot be copied. Copyright: protects the writings of an author against copying. 15. What is the international Patent Protection System that covers the most countries? Protects inventions and prevents sale by others; simplify application procedures. 16. What Patent protection does the Paris Union give? 1 year protection to register in other member countries (US + 100 countries) 17. What Trademark protection does the Paris Union give? 6 months protection to register in other member countries. 18. What does the Berne Convention of 1886 protect? Protects literary and artistic works of authors. What is the minimum copyright protection it provides? Life +50 years however members may choose to provide longer. What is the length of copyright protection in the EU? In the USA? In the EU life +70 years. In the US Life+70 years for individual works. Life +75-95 years for corporate authorship. 19. What is the WTO agreement on TRIPs? What 2 intellectual property protection systems does it combine? Trade Regulated Intellectual Property Rights. Covers copyrights, patents, trademarks, trade secrets, industrial designs, geographical indicia, and integrated circuit layouts. Includes intellectual property pertection of Berne Convention Paris Union. 20. What is a â€Å"geographical indicia† and why is it important to marketers? The indication of a geographical origin of a product i. e. Champagne. Important because it is a part of the brand. 21. What does the Foreign Corrupt Practices Act prohibit? Prohibits bribery of any foreign official or person who will influence an official or party. 22. How does the Omnibus Trade Reconciliation Act modify the Foreign Corrupt Practices Act? What 2 affirmative defenses does it allow? Modifies to allow payment to expedite â€Å"routine governmental action† 2 defenses are the payment was lawful under the law of the foreign officials country and the payment was a reasonable expenditure directly related to the promotion of products or services. 23. How does the Sherman Act affect mergers or acquisitions in foreign countries? Prohibits monopolies or attempts to monopolize the activities of US companies overseas through mergers or acquisitions that would lessen competition back in the USA. 4. What law is an exception to the Sherman Act by allowing competing firms to collaborate in export activities? Webb Pomerane law. 25. What is jurisdiction in a legal dispute? What court will hear the case and have power over the parties in its decision. 26. How much power does a mediator have over the parties in a dispute being resolved by concili ation? Has the power of suggestion and nothing more. 27. How much power does an arbitrator have over the parties in a dispute being resolved by arbitration? parties agree to abide by the ruling of an arbitrator. Chapter 8 Marketing Research 1. What is the difference between a MIS and formal market research? MIS provides a continuous flow of information about company operations and environment while MR is project specific, systematic gathering of data in the search scanning mode. 2. What is the most difficult and yet the most important step in market research? 3. What is the difference between an independent and a dependent variable in a market research hypothesis? Independent variables affect the dependent while the dependent variable is what we want to measure. 4. What is a focus group? What is its main function in market research? A group of eight to twelve participants who are led by a moderator in an in-depth discussion on one particular or concept. Purpose is to identify potential areas of future inquiry. 5. What kind of a sample is a focus group? What statistical conclusions can you infer from the opinions of a focus group? A focus group is a non statistical sample. Cannot make statistical conclusions. 6. After you determine the costs of doing the research, what should be your next decision? Will you collect primary or secondary data sources. 7. How does the methodology differ in international market research from domestic market research? It is the same as domestic however more complex due to greater scope. 8. How much secondary data is available overseas as compared to the U. S.? There is much less data available and for many countries there is only periodic info on essential data. 9. How reliable is overseas secondary data as compared to the U. S.? It is not always reliable and should be skeptic on. Example: official gov. est. often overstate/optimistic, tax avoidance results in false reports. 10. What are some of the issues you should take into consideration when comparing secondary data from one country with data from another country? Understand there is greater variation from one country to another in dates of studies, bases and methodology. 11. How do you use â€Å"back translation† when developing a questionnaire for foreign use? You translate the questionnaire from the foreign language back into the primary language to see if it matches your original questionnaire. 12. How do social organization and values in foreign countries affect collection of primary data? Reluctance to interviewing, gender roles, issues collecting info, need use of locals. 13. What is: Measurement error? Non-response error? Frame error? Random error? 1-People lie. 2- Refusal to cooperate or be reached. 3- Sample drawn differs from the target population. 4- Selected sample imperfect representation of overall pop. Chapter 9 – Economic Development and the Americas 1. What are the 5 stages of economic development according to Walt Rostow? The traditional society(The Pre-Conditions for Take-off(The Take-off(The Drive to Maturity(The Age of High Mass Consumption. 2. What are the characteristics of a More-Developed Country (MDC)? High per capita incomes. Of a Less-Developed Country (LDC)? Industrially developing countries just entering world trade with relatively low per capita incomes. Of a Least-Developed Country (LLDC)? Industrially underdeveloped, rural populated, extremely low per capita incomes. 3. What are some of the factors that have contributed to the growth of Newly Industrialized Countries (NICs)? Political stability, economic reforms, factors of production, privatization. 4. What is the role of State Owned Enterprises in the development of NICs? The place a drain on national budgets and should be privatized during economic growth. 5. What is the role of infrastructure in economic development? The quality of an infrastructure directly affects a countries economic growth potential and the ability of an enterprise to engage effectively in business. 6. How does marketing change as countries develop? The more developed an economy, the greater the variety of marketing functions demanded, and the more sophisticated and specialized the institutions become to perform marketing functions. 7. What is â€Å"economic dualism? † Having two economies in one, where there is a very wealthy class and remaining lower class. 8. What are some of the important traits of Big Emerging Markets (BEMs)? -Physically large in area and population. Have strong rates of growth -Political importance within their regions, â€Å"regional economic drivers† 9. What are some of the reasons why the world’s emerging economies did well in 2005? They were not involved in many of the high risk investments many other industrialized nations financial systems were trading in. 10. What is the pres ent economic situation of emerging markets in the Americas? High demand for commodities, low bond interest rates, and reduced spending and inflation. Social unrest, financial crises, not enough infrastructure development, high unemployment, Chinese competition.

Tuesday, November 26, 2019

Technological Generations of Mobile Communications

Technological Generations of Mobile Communications Introduction The distinct life of the mobile communications has taken different phases. This can be traced from the 1G to the most rest 4G. G, 2G, 3G and 4G are a wireless phone or a cellular phone standard way of classification based on generations/ cellular phone evolution. This paper is a critical comparison of all these technological generations with an aim of tracking the trend that is followed in the developments.Advertising We will write a custom essay sample on Technological Generations of Mobile Communications specifically for you for only $16.05 $11/page Learn More Grandpa and Grandma 1G Grandpa and Grandma 1G was the very first generation of wireless technology that originated around 1980’s. The cellular phones of this time were big in size (handbag phones) and used a high power voltage. Communication in the first generation cellular phones was enhanced by use of analog radio waves/ signals; use of radio antennas (a radio transmitter on one end and receiver on the other end. Analogue technology could only accommodate voice communication the passing of analogue signals. While this was the best technological developments at the time, it had a couple of limitations. The first generation wireless technology covered a relatively small area. Communication was only possible between parties of the same nation/within a nation’s boundary’s/ within the grounds of a particular nation (Fendelman). This first generation wireless technology supports only one way communication at a time. For instance the intended recipient has to be calm till the sender finishes talking then he/she can begin answering incase he/she speaks before then, his/her message won’t be delivered. All the above services are possible through a technology that interprets voice calls called circuit switching -Circuit switching is easily distorted by a simple physical noise thus destroying the quality of a conversation. All these limitations le ad the players in the industry to look for more advanced technology which could fill the loopholes in communication (News from Rohde and Schwarz, 2002). 2G – The second generation of the wireless digital technology 1G was later thrown out/replaced by 2G that came with greater and better technological benefits like the additional data services. At this level people could send text messages on top of the voice communication they initially had. The radio signals were digital and the conversations digitally encrypted unlike the initial analog. This therefore allowed the mobile phone services to be passed over a wider area (great service penetration levels).The wireless digital network use brings more voice clarity to the conversation being carried out.Advertising Looking for essay on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More This enhanced intercontinental communications, more privacy in communication as well as storage of communication. The messages sent through this technology could easily be referred to later. The second generation phones are however, costly compared to the first generation wireless cellular phones. Unlike the first wireless technology where communications were only possible within a nation, 2G ventures into a wide area in terms of service coverage area due to the additional roaming facility. 3G – The third wireless telephone / cellular phone generation The second generation is however overthrown by this third cellular phone evolution which uses a wide band width. This big band width in turn came with a more clear voice communication that is almost perfect (very minimal distractions and cases of eavesdropping- a situation where the signals sent are lost to the surrounding environment). Communication in this case is possible through a technology packet switching; a situation where data is addressed like the IP addressing then sent over and on reaching it s destination, its again recollects in the order sent then decoded/ interconnected to have the conversation (News from Rohde and Schwarz, 2002).. 3G wireless services are widely spread and now almost in all parts of the world. 3G has an added advantage of the global roaming facility which allows communication across the world. One can send text messages, video conference, and chat, download 3dimentional games, and talk to any one and anywhere in this world without distractions like they are having real conversation (News from Rohde and Schwarz , 2002). 3G uses a higher band width also a wide band voice channel compared to the 1G and 2G generations which greatly attributes to high voice clarity and people can talk without any disturbance or with very minimal distractions. There is an additional multimedia facility brought about by this third generation cellular phones like very fast communication (conversations and text messaging), video conferencing (hold video meetings with people in different locations), internet (surfing/browsing/online chatting), mobile television (watch television’s favorite programs on phone), video calls (like Skye), multi media messaging service (MMS) (sharing of photos and music), etc are now available on 3G phones (Arshad, Farooq, Shah, 2010)Advertising We will write a custom essay sample on Technological Generations of Mobile Communications specifically for you for only $16.05 $11/page Learn More The 3G phones are costly compared to the first and second wireless cellular phone generation. Currently 3G is widely in use. Almost everyone is moving or has moved to 3G technology for its interesting features and high speed wireless service. Despite the numerous advantages to using this kind of phone and very interesting features, 3G wireless telephones however have short battery life compared to the second and first generation phones. Thus the use of this technology is dependent on the proximity to power s upply. In remote areas thus, persons are forced to use less advanced technologies to avoid frustrations. However, some wireless technology users use both technologies concurrently (Arshad, Farooq, Shah, 2010). 3G technology is usually common for users who depend on the wireless communication in internetworking. Most of the service providers carry out promotional advertisements encouraging users to use the technology based on its speed and coverage. 4G The fourth generation wireless telephones / cellular phone service also known as a complete 3G replacement. 4G operates more like 3G much as it is a step up from 3G. It appears to operate in a hopeful state, like providing its clients with very speedy wireless services. Being the new born baby this fourth generation wireless technology is availed in limited places/areas. It’s not widely spread and only in use in very few regions like Japan. 4G is anticipated and designed to deliver very high speed internet and generally high wi reless services. Also a high network capacity-allowing more people to operate/ access its resources simultaneously (Fendelman,). They too have the multimedia added feature but with very clear voice and video output compared to the initial generations just like the normal television. The fourth generation cellular phones are damn expensive (high cost) compared to the previous generations. The costs mentioned here are the installation costs. However, the technological requires less maintenance costs. Similarities All the above mentioned technologies are wireless technologies. They all are able to pass/enhance analog communication. They all can pass voice communications. The first and Second generation covers a relatively small area in terms of geographical boundaries. Each of the technological development has come with increased area coverage than the preceding development.Advertising Looking for essay on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More Both the first and Second generation use a narrow band width, while the third and fourth generation uses wide band width. Both 1G and 2G deal/ are good in voice calls and in the process need to utilize the maximum bandwidth provided (Ashiho, 2003) Conclusion The technological development in the wireless communication has grown from one phase to another. As each phase is introduced, it leads to changes in other industries that depend on this technology for communication and other purposes. It is paramount to note that each of the above technologies has its own specifications. Thus, there is always a need for any firm to have a technician who shall introduce the members of the institutions on how to operate the different technological developments. The ability of a firm to use the most modern technology is for its advantage as this leads to less maintenance costs. The only additional costs in the generational growth are the initial installation costs (Ashiho, 2003). The developments t hat have been discussed in this paper have been enhanced by various firms and individuals. The need for the improvements has always rendered the players in the wireless communication busy with efforts of improving each of the development. While the current technology is viewed by many as perfect, it is expected that a need will arise for the provision of services that it does not offer. Thus, it is arguable to conclude that the development in the wireless communication cannot be optimum. References Arshad, j., Farooq, A., Shah, A., (2010) Evolution and Development Towards 4th Generation (4G) Mobile Communication Systems. Web. Ashiho, L. S. (2003). Mobile Technology: Evolution from 1G to 4G. Web. Fendelman, A. (n.d). Cell Phone Glossary: What is 1G vs. 2G vs. 2.5G vs. 3G vs. 4G? Web. News from Rohde and Schwarz (2002). Measuring the Acoustic Characteristics of 3G Mobile Phones. Web. Peter, K. (n.d). Analysis and Comparison of 1G, 2G, 3G, 4G and 5G Telecom Services. Web.

Friday, November 22, 2019

How to Make Thermite With Aluminum from an Etch-a-Sketch

How to Make Thermite With Aluminum from an Etch-a-Sketch You may have learned about exothermic reactions in chemistry class. In an exothermic reaction, chemicals interact and release heat and often light. Burning wood is an exothermic reaction. So is rusting of iron, although the reaction is so slow you dont notice much going on. You can react iron much more quickly and spectacularly using the thermite reaction, which burns aluminum. The classic method of performing the reaction involves iron oxide, aluminum powder, and magnesium, but you can make do with household materials: 50 grams of finely powdered rust (Fe2O3)15 grams of aluminum powder (Al) Iron Oxide Collect rust from a rusted iron object, such as rust from a wet steel wool pad. Alternatively, you can use magnesite as your iron compound, which may be collected by running a magnet through beach sand. Aluminum This is where your Etch-a-Sketch comes into play. The powder inside an Etch-a-Sketch is aluminum. If you crack open the Etch-a-Sketch, you have the perfect complement to the iron oxide from the previous step. However, if you cant find an Etch-a-Sketch, you can grind aluminum foil in a spice mill. No matter how you get it, wear a mask when dealing with aluminum powder because you dont want to breathe it in. Wash your hands and everything after working with the stuff. Etch-a-Sketch Thermite Reaction This is insanely easy. Just be sure to choose a location away from anything flammable. Use eye protection when viewing the reaction, since a lot of light is emitted. Mix together the iron oxide and aluminum.Use a sparkler to light the mixture.Move away from the reaction and let it burn to completion before cleaning it up. Once it is cool, you can pick up the molten metal and examine it. You can use a propane torch instead of a sparkler to initiate the reaction, but try to maintain your distance as much as possible.

Wednesday, November 20, 2019

Leader Centric Approaches versus Group-Centric Approaches Essay

Leader Centric Approaches versus Group-Centric Approaches - Essay Example Employees expect corporate company leaders to be people of superior character and serve as role models to their employees. Trust and commitment are very important in ethical leadership. Ethical standards of leaders should not be diverse from those of the followers. Ethical behavior â€Å"†¦means that which is morally right, as opposed to that which is legally or procedurally right† (Kanungo, 2001, p. 258). Despite nurturing leaders out of morally imperfect humans, we still expect them to perform in an exemplary manner despite the challenges they face in their managerial endeavors. Appreciating the moral characteristics and challenges of leaders is elemental in understanding the nature of leaders. It is thus important to understand the ethical failures of leaders in order to understand the development of leadership. Based on ethical values, motives, and assumptions, transformational and transactional leadership behaviors are considered ethical. Transformational leaders have moral philanthropic motives grounded in a deontological perspective. Transactional leaders, on the other hand, have atomistic mutually altruistic intentions based on a teleological perspective. Basically, â€Å"Transformational leadership appears to be most closely connected to deontology, while transactional leadership would seem to be related more to teleological ethics†.... Transactional leaders, on the other hand, have atomistic mutually altruistic intentions based on a teleological perspective (Burnes & By 2012; Kanungo, 2001). Basically, â€Å"Transformational leadership appears to be most closely connected to deontology, while transactional leadership would seem to be related more to teleological ethics† (Aronson, 2001, p. 245). Certain leadership traits are important for effective leadership, most leaders, particularly American leaders, lack them. These traits include the ability to inspire; vision, supportiveness, self-sacrifice, genuineness, personal responsibility; being non-egalitarian, not discriminatory, honest, and selfless. These traits are crucial and require societal acceptance for the development of effective leadership (Bertsch, 2012). Leadership Ethics Leaders tend to act as if they have a different code of ethics from that of their followers. According to Guillen and Gonzalez (2001), â€Å"Leadership goes beyond the scope of f ormal power and involves a continuous exchange of influence and free acceptance.† Leaders tend to justify their actions and make it appear as if the rightfulness or the wrongfulness of an action is dependent on the person doing the action (Bertsch, 2012, p.176). The main difference between the leader-centric approach and the group-centric approach lies in considering leaders as special in the leader-centric approaches and considering them as equal with their followers in the group-centric approach. Leader-centric ethics approaches tend to justify the actions of the leaders since they consider leaders as special entities who deserve special treatment on moral issues (Ciulla, 2001).On the other hand,

Tuesday, November 19, 2019

Financial Modelling and forecasting Essay Example | Topics and Well Written Essays - 1000 words

Financial Modelling and forecasting - Essay Example They are used for propose of measuring the performance of the firm and also to measure hoe stable is a firm financially. They are also used for future planning, determining whether a firm is able to borrow loans and service them, and also evaluating the performance of the firm under different models. Most models are based on sales volume This paper will seek to analyze the financial statement of JB Hi-Fi by use of historical data to predict the future.I will therefore forecast the years 2013, 2014 and 2015 using the year 2012 as my base year. Ratio analysis of relevant sales ratios will be used for the analysis. Financial statement analysis is the use balance sheet and income statement data to come up with values for financial interpretation and identification of the strengths and weaknesses of an organization (Stickney et al., 2006). Various techniques of financial statement analysis are: trend analysis, comparative statements, common size percentages, ratio and fund analysis as well as changes in working capital changes (Libby et al., 2004). For the purpose of analyzing JB Hi-Fi, relevant sales ratio analysis will be undertaken. For a successful financial analysis, comparison has to be made using consistent percentages through the years of analysis. The use of the sales ratios to analyze the years will reveal their similarities, trends, as well as differences in the company (Palepu & Healy, 2007). As Gregory (2008) notes, the stakeholders of the information contained in a financial statement include, potential investors, creditors, managers, shareholders, the government and creditors and they require the information for different reasons. Use of historical data is a major limitation of ratio analysis as it is therefore assumed that it reflects on the future trends whereas no one could be certain of the future (Palepu & Healy, 2007). Resvine et al (2004) explains that another limitation of using financial statements in analysis is that GAAP allows

Saturday, November 16, 2019

Critical success factors Essay Example for Free

Critical success factors Essay Broad market coverage due to its abilityto handle difficult cases at the intersectionOf laws and digital technology. * Human resources competencies-highly skilledstaffs had background in computing, investigative * Or law enforcement.| * Growth without direction-officeheads did not understand the purpose of new strategic plans, they were confused with their roles and responsibilities(overcommitted and uncertainty) * Loss of corporate direction los of corporate control. * Inappropriate organisational structure and control system.| * Rapid growth and expansion- They needed to work rapidly and accurately, any delay could lead to corrupted data. * Data challenge-Complexity of the internet clouds and data privacy laws. * Demand for both digital forensics and * e-discovery services reflected unanticipated occurrence of a data breach. * Increase in competitors due to identified value creation.| Did the acquisition of Docuity provide Stroz Friedberg with a competitive advantage? Acquisition of docuity provided added competitive advantage on effective search tools, improved reliability and service and there by better branding and recognition in the market. Docuity’s patent pending technology and rule based processing ensured better cost controls and quality throughout the process, accounted for approximately 27% of total billings. What steps have been taken to overcome the firm’s growing pains?How do you assess the steps? The rapid growth of the firm was successful but challenging. Throughthe review of firms cultural systems,structure,and process had resulted in a significant set of changes. Organisational review raised several significant issues. They were collectively described as growing pains. Following are the challenges faced, steps taken to tackle it and advantages of each steps. They introduced new systems and structures that clarified roles and responsibilities, instilled greater accountability and improved discipline and planning. CHALLENGE ON ORGANISATIONAL AND CULTURE: * Communication * confused with roles and resposiblities * Cordintaion and decision making mechanisms * Tension between legal and technical staffs.CHALLENGES ON STRUCTURE AND PROCESS * Operational and Business processAbsence of annual financial planning process * Poor organisational structure| STEPS * Firm invested in knowledge management systems.eg:share point,JIRA and salesforce.com. * Training and orientation to staff * Implemented annual financial processand involving them in planning process.Introduced internal financial statements. * Created organisational chart| Advantages/Assessments * These system provided transparency in RD and software projects ,and also more systematization and predictability.staff felt part of firm’s growth and activities. * More clear picture on annual revenue targets and expected growth rate. * Made responsibility more clearer and instilled accountablity| What should Stroz and Friedberg do about the disagreement over 2010 financial targets? Stroz and Friedberg should have better communicated what make it possible to achieve aggressive targets. strong client relationship, branding and name recognition in new and existing markets, working smarter are the key factors for generating revenue.

Thursday, November 14, 2019

A Golden Age for Athens? :: World History Essays

A "Golden Age" for Athens? The 5th century BCE was a period of great development in Ancient Greece, and specifically in Athens. The development of so many cultural achievements within Athens and the Athenian Empire has led scholars to deem this period a "Golden Age." It is true that his period had many achievements, but in the light of the Athenians treatment of women, metics (non-Athenians living in Athens), and slaves it is given to question whether or not the period can truly be called "Golden." The 5th century and the Athenian Empire gave birth to an amazing amount of accomplishments. One such accomplishment was the minting of standard Athenian coins that were used throughout the Athenian holdings as valid for trade. The use of standard Athenian-minted coins helped the Athenians establish and maintain control over their empire by helping to control trade and the economy of the area to the Athenians' benefit. Since Athens regularly received tribute from the states it controlled, Pericles, the leader of Athens, began a building project in Athens that was legendary. Athens had been sacked by the Persians during the Persian Wars and Pericles set out to rebuild the city. The city's walls had already been rebuilt right after the end of the second Persian War so Pericles rebuilt temples, public grounds, and other impressive structures. One of the most famous structures to result from Pericles' building project was the Parthenon. The Parthenon and other such structures re-established Athens's glory and while some Athenians criticized the projects as too lavish, most Athenians enjoyed the benefits of the program. A major benefit to the Athenian people was that there was an abundance of work in the polis. The 5th century BCE was also an important time for Athenian thought. "Sophists," paid teachers, taught rhetoric amongst other subjects to wealthy Athenian citizens. The Sophists were criticized by Athenians who thought that Sophists were destroying Greek tradition by emphasizing rationalism over a belief in superstition, however it was this rationalism that became so important to Greek philosophers such as Socrates and Plato, both who belonged to the 5th century BCE. The Sophists high regard for rhetoric was later of great use to citizen addressing the Assembly in the developing Athenian democracy. Athenian democracy is perhaps considered the crowning achievement of the 5th century BCE. Democracy grew out of the status that poorer Athenians were gaining as rowers for the ships of the large Athenian fleet. Since these poorer Athenians now played a large part in the Athenian military, they ga8ined more say in the Athenian government. This led to a

Monday, November 11, 2019

Stefan’s Diaries: The Craving Chapter 15

The night before the wedding, I stood staring out the window of my bedroom. A beautiful quarter-moon shown through the ornately paned glass. It felt like the entire nighttime world was teasing me, calling out: Come play. Come hunt. Come disappear into the darkness. My skin prickled whenever a hint of the night air breezed through, and my nostrils flared at the thousand and one scents it carried. I am not meant to stay captive inside at night†¦. I had thought I was miserable in the park hunting squirrels, but here I was trapped by my word, by my guilt, by these stupid walls, by a family of humans under a spell, by my brother. Mrs. Sutherland came in earlier that evening. She didn't say much, just patted my hand and pinched my cheek, telling me not to worry, the wedding would soon be over and then we all – we all – could get back to the normal happy business of being a family. Little did she know that after Damon was through with them, the Sutherlands would never be able to be normal or happy again. A knock at the door interrupted my thoughts. I turned and tightened the nice silk smoking jacket Winfield had loaned me, wondering if Mrs. Sutherland had left something behind. But then the door cracked open and a pink, mischievous face poked through. â€Å"Bridget,† I half-groaned. I looked around me desperately, as if some sort of exit would suddenly appear that I could escape through. She giggled and suddenly shoved her way in, slamming the door behind her, leaning against it like she had just shut out an invading army. â€Å"Stefan,† Bridget said in what she probably thought was a sexy, dulcet tone. She was dressed in a chiffon robe with giant chenille cabbage roses. Underneath, instead of a simple nightgown, she wore a complicated corseted dress made of bright pink silk with a rose-red sash that left her shoulders and neck bare. â€Å"Bridget,† I said warningly, backing up. My head hit one of the beams of the four-poster bed. â€Å"I thought maybe we could start the honeymoon early,† she whispered, pushing herself into my arms. â€Å"Uh – † I stammered. Her cheeks were red and her eyes were heavy-lidded. Despite Damon's compulsions, she was also under the sway of her own emotions, stirred to amorous feelings for the man she was about to marry. She pushed me – with remarkably strong arms – down on to the bed and fell upon me, crushing me under wave after wave of silk. Her breasts heaved over the corset, and I could feel her warm skin through my robe. I had a perfect view of her bare white neck. Her heart pumped quickly, giving her skin a hot, rosy glow and filling my senses with her blood. I could smell it all over her, salty and warm and human. A shiver went through my body as her chest pressed against mine, and I could feel the pain begin along my jaw. Such a sweet pain – and it had been such a long time since I had had human blood†¦. It couldn't hurt, part of me said. She wouldn't mind me biting her, even without compulsion. It didn't have to be painful, and she might even enjoy it. Before I knew what I was doing I had pressed my lips to her shoulder, just to feel the skin, to take a little lick†¦ She felt me moving beneath her and misinterpreted it, kissing me harder and getting into a more comfortable position, entwining her legs in mine. â€Å"No!† I managed to get control of myself and shoved her off me. I didn't mean to do it so forcefully, but even in my weakened state I was still several times stronger than a human. She fell to the end of the bed, against one of the posts, looking shocked. And then she began to cry. â€Å"You†¦ don't want me†¦Ã¢â‚¬  she wailed, fat droplets of tears rolling down her cheeks. â€Å"Bridget, no, I†¦Ã¢â‚¬  My fangs retracted and I was aching with the pain and my need for blood. â€Å"It's just†¦ we're getting married tomorrow, Bridget. Just one more day. If we wait until it's†¦ uh†¦ proper, it will be even more special. Just think, we'll have completed a†¦ beautiful day†¦ with you in your beautiful, uh†¦Ã¢â‚¬  â€Å"Cream brocade with Flemish lace on the sleeves and bodice and an ivory satin sash with a veil of matching ivory silk flowers,† she sniffled. â€Å"Right.† I touched her elbow delicately and tilted her chin up so she had to look at me. She wiped the tears off her face with a piece of her robe. â€Å"Let my first night with you be with that image of you in my mind, my blushing bride.† She nodded, sniffing again, giving me a faint smile. â€Å"All right.† Then she giggled again, back to her old self, and flounced off the bed and to the door. â€Å"Good night†¦ lover,† she cooed before exiting. As soon as she was gone I fell back on the bed, muffling a groan in my pillow. It did nothing to abate my frustration. I stood, pacing from the window to the door, wanting to leave, to escape, to hunt, to do something. But I had no choice, no option. I was trapped in this room, in this situation, in the terrible in-betweenness of being neither a human nor a monster. I ripped the pillow straight in two, feathers exploding around the room like a white powder keg. Damn you, Damon, I thought violently, for putting me in this position. And damn you, too, Katherine, for beginning all this.

Saturday, November 9, 2019

Life-changing Moments through Learning Experiences Essay

As each one of us may agree, life brings us a lot of experiences†¦ Experiences that could influence our next moves and actions in the future†¦ and eventually, these actions can impact changes into our lives†¦ It is a common knowledge that change is the only constant thing in this world. Nevertheless, aside from change, I can say that learning is also a constant and ever-evolving aspect in each individual’s life. It is because of the fact that whatever we do can eventually bring about new learning insights that will cause us to integrate and implement changes within ourselves. As for me, I have been truly aware of the changes that were made possible by the essays I have done for this course. In this regard, this paper aims to exemplify the changes in my outlook and disposition in life. Further, the essence of this paper shall revolve around my very own theme, which says, â€Å"life-changing moments through learning experiences†. The image below (which I especially made for this essay) depicts the theme of this paper, which is engraved in a colorful background. The different colors signify the various circumstances and experiences that we encounter in our lives. Those circumstances may be in green or yellow, red or blue, or perhaps, just plain black or white— life’s experiences can categorically bring about changes into us†¦ Indeed, we will never be the same again†¦

Thursday, November 7, 2019

Facts About Soft Coral (Octocorals)

Facts About Soft Coral (Octocorals) Soft corals refer to the organisms in the class Octocorallia, which includes gorgonians, sea fans, sea pens, sea feathers, and blue corals. These corals have a flexible, sometimes leathery, appearance. Although many resemble plants, they are actually animals. Soft corals are colonial organisms, which means they are formed of colonies of polyps. The polyps of soft corals have eight feathery tentacles, which is why they are also known as octocorals. One way to tell the difference between soft corals and hard (stony) corals is that the polyps of hard corals have six tentacles, which are not feathery. Here are some stony coral characteristics, with some of the key differences with soft corals identified: They have polyps that secrete a cup (calyx or calice) in which they live. The polyps of soft corals usually have feathery tentacles.They may harbor zooxanthellae, algae that live within coral polyps and can produce brilliant colors. Others may be colored by bright pink, blue or purple pigmentation.They may contain spikes called sclerites, which are made of calcium carbonate and protein, and are located within a jelly-like tissue called coenenchyme. This tissue lies between the polyps and contains canals called solenia, which transport fluids between the polyps. In addition to providing structure to the coral and protection from predators, the shape and orientation of the sclerites can be used to identify coral species.They have an inner core made out of a protein called gorgonin.They may have a variety of shapes, including fan-like, whip-like or feather-like, or even leathery or encrusting. Classification Kingdom: AnimaliaPhylum: CnidariaClass: AnthozoaSubclass: OctocoralliaOrders:Alcyonacea (the horny corals, also known as the gorgonians, sea fans and sea feathers)Helioporacea (blue corals)Pennatulacea (sea pens) Habitat and Distribution Soft corals are found worldwide, primarily in tropical or subtropical waters. Soft corals do not produce reefs but may live on them. They may also be found in the deep sea. Feeding and Diet Soft corals may feed during the night or day. They use their nematocysts (stinging cells) to sting passing plankton or other small organisms, which they pass to their mouth. Reproduction Soft corals can reproduce both sexually and asexually. Asexual reproduction occurs by budding when a new polyp grows out of an existing polyp. Sexual reproduction occurs either when sperm and eggs are released in a mass spawning event, or by brooding, when only sperm are released, and these are captured by female polyps with eggs. Once the egg is fertilized, a larva is produced and eventually settles to the bottom. Conservation and Human Uses Soft corals may be harvested for use in aquariums. Wild soft corals may also attract tourism in the form of dive and snorkeling operations. Compounds within the tissues of soft corals may be used for medicines. Threats include human disturbance (through humans stepping on corals or dropping anchors on them), overharvesting, pollution, and habitat destruction. Examples of Soft Corals Soft coral species include: Dead Mans Fingers (Alcyonium digitatum)Sea FansSea Pens Sources and Further Reading GBR Explorer. Soft Corals. ReefED.NOAA. Coral Anatomy and Structure. NOAA Coral Reef Conservation Program.Simpson, A. 2009. Reproduction in Octocorals (Subclass Octocorallia): A Review of Published Literature. Version 16 July 2009. In Deep-Sea Corals Portal.South Carolina Department of Natural Resources. Octocoral Morphology.Tan, Ria. 2008. Soft Corals. Wild Fact Sheets.Wet Web Media. The Soft Corals, Order Alcyonacea; Use In Marine Aquariums.

Tuesday, November 5, 2019

Asian Essay Research Paper After nearly thirty

Asiatic Essay, Research Paper After about 30 old ages of great economic growing many Asiatic states are in recession due to many bad concern determinations. The Asiatic fiscal crisis caused the value of Asiatic currency fall 50-60 per centum, stock markets to worsen by 40 per centum, belongings values to drop, and Bankss to shut. The Asiatic fiscal crisis began in mid 1997 because of currency devaluation, bad banking patterns, high foreign debt, and corruptness ; has lead to a diminution in the currency and stock markets of all Asiatic states. As the fiscal crisis continued it shortly turned into an economic and societal crisis every bit good. At the base of the fiscal crisis is 1000000s of dollars in bad bank loans. Many of the Bankss suffered from limited institutional development and a deficiency of regulating Torahs. Credit tended to flux towards borrowers with authorities relationships or private bank proprietors and to prefer sectors instead that on the footing of projected hard currency flows, realistic sensitiveness analysis, and recoverable collateral values. The fiscal crisis began in Thailand in May of 1997 when investors became disquieted about Thailand s political instability, decelerating economic system and inordinate debt. As they invested their money in more stable markets and pulled out of Thailand the value of the tical fell aggressively. Due to the inter-linked economic systems of Asia Indonesia, the Philippines, and Malayan economic systems were shortly crippled by the autumn of the tical value. Indonesia s economic system shortly fell after when the rupiah lost 80 per centum of its value against the U.S. dollar. The state was plagued with more than $ 70 billion worth of bad debts due to a corrupt and inefficient authorities. Indonesia and Thailand were besides enduring from being to ambitious with the enlargement of their substructures due to the immense inflow of money from optimistic foreign investors. Two major economic systems that were besides effected were China and Japan. Chinese Bankss may hold been transporting up to $ 1 trillion dollars in bad bank loans. Much of this came from authorities corruptness and lending 66 per centum of China s investing capital to state-run industries that produce merely 12 per centum of Chinas industrial end product. Japan was crippled by more than $ 300 billion in bad bank loans due relaxed banking regulations and corruptness. Besides their exportation decreased, as other states were able to bring forth high-end electronics for cheaper. Both the Nipponese hankering and stock market declined in value as a consequence doing Japan to travel into a recession. Korea was besides greatly effected since its export growing has tended to mirror alterations in the yen-dollar exchange rate. They were besides enduring from immense foreign debt that they were no longer able to pay off. As Asiatic economic systems slowed down many households felt the consequence of the crisis. The demand for labour has dropped dramatically since edifice and enlargement undertakings have come to a arrest. Because of this and drought many urban and rural households are now unemployed. Due to interchange rate devaluation monetary values for basic necessities such as nutrient and medical specialty, have risen drastically. Spending has besides slowed down since households don Ts have adequate money to buy more than that which is necessary. Due to Asia s big function in the universe economic system other states economic systems have suffered because of the crisis. As Asiatic currency devaluated and economic systems declined so has the demand for importing goods from other states. The devaluated currency besides has made Asiatic merchandises seem cheaper which has led to increased degree of exporting to other states. The International Monetary Fund has implemented a program and loaned one million millions of dollars in order to assist Asiatic states pull out of this fiscal crisis. The program calls for an increased intrest rate and to fasten money supplies in order to decelerate down enlargement. The restructuring of pudding stones and better supervising of Bankss to cut down on the type of corruptness that was really common in the past. Opening of the international market to convey back foreign investing and promote investors to purchase off failed companies. They besides want to increase revenue enhancements to make a authorities excess so Asiatic states can break command their economic systems. So far the IMF has loaned $ 18 billion to Thailand, $ 47 billion to Korea, and $ 57 billion to Korea in hopes of carry throughing its program. Right now it looks as though the IMF program is working. Many Asiatic economic systems are sing growing after the market bottomed out last twelvemonth. Many authoritiess are doing tougher banking Torahs and the increased involvement rate has curved the rapid growing that helped take to the fiscal crisis. The Asiatic states are get downing to open their doors to more foreign investing and ownership. Many people are disquieted that this is a impermanent solution and that Asia will fall into a worse economic crisis. If the Asiatic economic systems fall even further, in a desire to raise hard currency, they might sell the 100s of billion dollars in U.S. exchequers they now own. This along with an increased trade shortage, coming from more importing and less exporting will take to higher involvement rates and an American recession.

Saturday, November 2, 2019

A thematic analysis of 4 interviews with lesbian prostitutes Essay

A thematic analysis of 4 interviews with lesbian prostitutes - Essay Example All of the women I spoke to were between the ages of 22 and 26; Margaret had been in the business the longest and was 26. Katie was 22, Lenore 23 and Irene was 24. I am not sure whether these were their real names or the names they go by when they go on a job. All for ladies were dressed well and no one would have noticed that they were prostitutes necessarily. They were very clean and well kept and they took their jobs seriously. All four had a clientele of men as well as women saying that it was better to have both "because you wont get paid enough just with women". Each woman had a different idea of this but essentially it was because of the money. My questions consisted of 20 questions that I asked each woman and then there were other questions for clarification (Ive listed questions at the end of this paper). As I went through the transcripts of these women I was struck by how casual and nonchalant they were about the business. I can see that because it is legal in the UK these women may not feel the constraints or the fears that some women would feel in other countries. None of them seemed to be upset with the questions I asked nor did they seem worried that someone would find out about them as we talked. I spent time getting to know each woman so she would feel comfortable talking with me. Each interview was unique and one of the women identified herself as bisexual, though she saw many more women clients than she saw men. Katie was 22 years old and started her career as a prostitute when she was eighteen. She started because she needed to pay for university and had to earn her rent. She was one of the most outspoken in the group. She saw her work as a normal job and she felt that people who understand this are better able to understand her. She had a great sense of humour about it all. Katie identifies her self as a lesbian and she is in a romantic relationship with a woman