Tuesday, December 31, 2019

Dissolving Salt in Water Chemical or Physical Change

When you dissolve table salt (sodium chloride, also known as NaCl) in water, are you producing a chemical change or a physical change? A physical change results in a change of the materials appearance, but no new chemical products result. A chemical change involves a chemical reaction, with new substances produced as a result of the change. Why Dissolving Salt Would Be a Chemical Change When you dissolve salt in water the sodium chloride dissociates in Na ions and Cl- ions, which may be written as a chemical equation: NaCl(s) → Na(aq) Cl-(aq) Therefore, dissolving salt in water is an example of a chemical change. The reactant (sodium chloride or NaCl) is different from the products (sodium cation and chlorine anion). Thus, any ionic compound that is soluble in water would experience a chemical change. In contrast, dissolving a covalent compound like sugar does not result in a chemical reaction. When sugar is dissolved, the molecules disperse throughout the water, but they dont change their chemical identity. Why Some People Consider  Dissolving Salt a Physical Change If you search online for the answer to this question, youll see about equal numbers of responses arguing that dissolving salt is a physical change as opposed to a chemical change. The confusion arises because one common test to help distinguish chemical and physical changes is whether or not the starting material in the change may be recovered using only physical processes. If you boil the water off of a salt solution, youll obtain salt.

Monday, December 23, 2019

The Music Industry And Mass Media - 2807 Words

The media has placed unfortunate stereotypes on many races, ethnicities, and cultures. This playlist that is being analyzed through a multiperspectival lens has an overall theme that women are objectified and mistreated in the music industry, especially in the hip-hop genre. In the readings and documentaries we have watched from class, there has been a common theme of mistreating women through music and this is important because it is becoming more and more acceptable in today’s society of accepting misogyny in music lyrics. The music industry and mass media confirms that being a woman in contemporary society means one needs to use their femininity to be successful in both the public and private spheres of life, therefore society is still looking through a patriarchal lens and does not extensively accept a successful women and female in the music industry in a positive way in our culture. Most of the time, when major label companies are looking for the next best thing in the music industry, they are not actually looking for someone who has real talent per se, but someone who is going to make them money, even if it means that misogyny, violence, or homophobia will be promoted and normalized in their music. For example, Tinashe, performs â€Å"2 On†, this was her first hit to reach the radio and the masses, this song launched her career surprisingly because she does sing about her own desires but no surprisingly her lyrics ultimately are driven to please men. Even though Tinashe’sShow MoreRelatedThe Issues Arising From File Sharing1728 Words   |  7 Pagesand businesses. The communication and media platforms were on the frontline in embracing the new technology. The internet is currently the largest source of music and video content. The availability of high-speed internet connections and a creation of inexpensive and easily distributable digital content s has facilitated to the high number of downloads. This has been attributed with both advantages and disadvantages. The creation of peer-to-peer (P2P) media sharing platforms led to a rise of theRead MoreGhost Production : The Dirty Little Secret1602 Words   |  7 PagesDylan Echevarria Professor Lesley Kamphaus English 105 11 November 2014 Ghost-Production: The â€Å"Dirty Little Secret† of The Music Industry The term â€Å"ghost production† has been coined as the â€Å"dirty little secret† of the electronic dance music scene. It is promoted as an opportunity for artists who want to break into the music business to receive help from someone who knows what sells and can ensure a popular hit. Ghost production also allows the ghost producers to use the same, â€Å"recycled†Read MoreBenchmarking1075 Words   |  5 PagesChapter 1 – Mass Communications: A Critical Approach Culture and the Evolution of Mass Communication * Culture * can be narrowly associated with art – forms of expression such as music or painting that provide enlightenment or insight * can also be viewed as a broader category that includes the entire spectrum of ways that people express themselves at particular historical times * including art, beliefs, customs, games, technologies, traditions, and institutions Read MoreGlobal Media1711 Words   |  7 PagesNowadays, people live in a global age and the pace of globalisation has accelerated as a result of the rapid development of technology and economy. Under the process of globalisation, both the local culture and the mass media are affected dramatically. The phenomenon of homogenisation and heterogenisation has been created and is considered as the most representative and symbolic impact. However, the topic of globalisation is highly controversial and needs to be analysed in depth. In history, threeRead MoreThe Music Distribution Model : Oliver Small1677 Words   |  7 PagesMusic Distribution In his article about the music distribution model, Oliver Small describes a paradox that has emerged in the music industry within the last ten years: â€Å"consumers are listening to music more than ever, yet profits from the sale of recorded music continue to decline† (42). The 2000s in the music industry was a rough time for labels and artists economically due to the various online file sharing and streaming services that have become available to the public. Now that consumers areRead MoreHow Women are Portrayed in the Mass Media Skinny. Sexy. Obedient. Ditzy. Perfect.800 Words   |  4 PagesHow Women are Portrayed in the Mass Media Skinny. Sexy. Obedient. Ditzy. Perfect. Submissive. This is how women are portrayed is this how women really are? Mass media is always sending out messages of how women should act, look, and think. Mass media portrays women in many fictitious ways. Women are frequently seen as sexual objects in order to sell things, attract others, for entertainment and a variety of other things. Many female celebrities such as models, actors, and singers are very slimRead MoreMass Media and Popular Culture1367 Words   |  6 PagesHow has mass media a created a relationship among popular culture, mass media and different forms of dissemination? Mass media is any form of communication used to reach a large group of people. There are different types of media; examples of media are magazines, movies, television, books, recording devices, radio and the internet. As time goes on, new and improved technology is developed in the mass media industry for communicating and entertainment purposes. As mass media continues to grow andRead MoreDialectic Of Enlightenment By Theodor Adorno1243 Words   |  5 PagesIn his wor k, Dialectic of Enlightenment, Theodor Adorno analyzes the nature of the culture industry. People everywhere are constantly being consumed by the culture industry, which is a term for the mass production of cultural goods such as films, magazines, and music. Adorno is concerned that the government uses the cultural industry as a way to deceive the masses and manipulate them into passivity. This idea remains true in today’s society. Young men and women are more interested in the releaseRead MoreThe Impact Of Digital Music On The Music Industry896 Words   |  4 Pagesdownloads. Threatening the survival of the music industry and introducing a unique set of challenges for the industry to overcome. To remain relevant in the new global market of digital music online, the music industry would have to evolve and change with the introduction of each new facet technology had to offer. The introduction of digitally compressed music files, so easily attainable for a small fee or down loaded legally (pirated) for free, made the music industry reevaluate how to make a profit andRead MoreStrategic Analysis Of Sonic Records Employee Compensation1545 Words   |  7 Pagescompensation system and their recently added online on-line music warehouse and distributor E-Sonic. By creating this strategic analysis there becomes a pathway to make informed decisions on employee compensation strategies at all levels of E-Sonic. Having this detailed concise report helps provide paramount information for E-Sonic to grow organically and achieve the ultimate company objective of dominant market leadership in the online music category. Having a better understanding of current state

Sunday, December 15, 2019

Construction Planning and Scheduling Free Essays

Introduction Construction activities are often exposed to various weather conditions, and often construction productivity is dependent on these weather conditions. Weather conditions are local, seasonal, and sometimes unusual. Inclement weather conditions often result in project disruptions, delays, and disputes between the project parties. We will write a custom essay sample on Construction Planning and Scheduling or any similar topic only for you Order Now Many trades such as earthwork, concrete, roofing, and landscaping are often affected by severe weather, meanwhile other trades such as carpet installers or sheetrock installers may not be directly affected by the weather. Owners, general contractors, and subcontractors all face many risks associated with weather conditions. In order to mediate weather risks, all of the involved construction parties adopt various strategies; purchase insurance, and contract options. Typically project owners try and allocate the risks related with weather delays by adding weather clauses in the contract provisions. The goal of this paper is to discuss the impact of weather delays in construction projects. A construction schedule should include a developed plan to allow for adverse weather. The weather considerations should be addressed during contract negotiation. By accounting for weather integration in the contract and in the baseline schedule owners and the contractor can reduce the risk of disputes from weather impacts and avoiding the rejection of claims dealing with unforeseeable or unusually severe weather. Most contracts nowadays have integrated weather calendars in the schedule. Adverse Weather Adverse weather, commonly referred to as severe weather, is any weather condition, rain, snow, temperature that exceeds historical data gathered over a specific period of time to establish what could be reasonably expected over the course of the construction project. Establishing unusually severe weather can be a challenging task. The most common method is to compare the actual weather experienced on the project to a historical normal for the same location. By using historical data a normal or expected level of severe weather can be established for a given time period. (Long 2010) Normal Weather Severe weather conditions should be incorporated in all construction contracts and in the contract it should specify the difference between normally and abnormally severe weather conditions. In contracts today, it is normal for some owners and contractors to provide the anticipated number of weather days in today’s contracts. The contracts now specify the average number of adverse weather days for certain project locations. It is in the best interest of projects to identify weather statistics, and contracts should provide the number of anticipated weather delay days based on those statistics. Temperature Temperature is well defined in construction contracts. The standard specifications in a contract include the minimum and maximum temperatures for many construction materials. However, temperature directly affects the productivity of workers. Most construction materials have thresholds. However, temperature is a type of weather effect in which construction does not necessarily have to be delayed when exceeding these thresholds, as long as the project can absorb expenditures for controlled measures such as heated enclosures. Wind Wind can affect certain construction operations, but the effect of wind on temperatures is equally important. The combination of low temperatures and wind causes wind chill, which can reduce productivity and can even be dangerous to workers. Wind alone can force several construction activities to shut down, for example high winds can make cranes unstable, which could lead to accidents. High wind also may cause fresh concrete to dehydrate on the surface. Wind not only affects the temperature and construction activities such as crane work, but wind also affects materials and material processes. Soil Temperature Soil temperature does not directly affect labor productivity, but it does have an effect on operations and equipment. The biggest impact of soil temperature is on earthwork. Frozen ground magnifies the difficulty of movement and compaction of soils. Frozen soil conditions greatly reduce the equipment productivity. As cold weather affects the operator of the equipment, the soil conditions affect the effectiveness of the equipment. Weather Delay Day What type of weather qualifies as a weather delay day? A weather delay day is a day in which work must be completely stopped because efficient construction operations will be difficult to achieve with the weather conditions. Three key factors affecting weather delays and disruptions are; type of construction, on-site drying conditions, and the intensity of rainfall. The threshold values for adverse weather vary from location to location. The threshold values also depend on the trades working and various other social and natural factors. However, a weather day should be decided based on the combination of the threshold values, type of work affected, and common sense. Table 1 below shows a sample adverse weather day calendar. (Glavinich n. d. ) Table 1: Sample Adverse Weather Allowances MonthJANFEBMARAPRMAYJUNJULAUGSEPOCTNOVDEC Adverse Weather Days665452245544 Weather Calendars Once threshold values are determined, the adverse weather days can be incorporated into the plan. Normally many weather incorporation methods can be used to satisfy the contract requirements. In order to claim time for unusually severe weather, it is common practice that the documented adverse weather days in excess of the monthly allowances must affect the completion of critical path activities. A good way to track and plan for weather days and planning for the activities they impact is a scheduling model that incorporates adverse weather days into a weather calendar. The weather calendar is tied to the weather sensitive activities. This task typically involves: †¢Documentation of all activities in the schedule that are prone to adverse weather †¢Application of the weather calendar to activities subject to adverse weather †¢Development of a baseline schedule in accordance with the project scheduling specifications †¢Calculation of the new finish date (Sabol 2004) Type of Work The type of construction work greatly influences the impact weather has on a project. Certain activities are particularly sensitive to weather conditions; meanwhile other tasks are not as sensitive to weather. Others factors such as equipment being used, materials being used, and the activity durations for each activity influence the activities sensitivity to wind, temperature, and precipitation. The projects weather sensitivity also depends on the phase of construction. For example the initial phase of building construction is usually more sensitive to weather than when the building has an exterior shell up. Consequently the allocation of anticipated monthly weather delay in contracts is not sufficient. The scheduled activities and sequencing of activities should be known before the number of monthly weather delay days has been determined because the weather impact is strictly associated with the type of construction activities being performed. Lingering Days Severe weather can have impact on a construction project for many days after the actual severe weather has passed. These lingering days may extend past severe weather periods because of drying time for soils, and accumulated water on the site and before and after snowy conditions. These lingering days are also known as dry out or mud days. Even when trying to specify the number of adverse weather days, a contract is still ambiguous if it does not determine how to deal with lingering days. It is important to differentiate between lingering days caused by predictable and unpredictable weather conditions. Contracts should clearly spell out whether lingering days are included in the monthly normal weather days. For example in Tennessee, adverse weather may include dry out or mud days at a rate of no greater than one make up day for each day or consecutive days beyond the standard baseline that total 1. inch or more of rain. (Syzdik 2012) Lost Days Adverse weather can greatly reduce productivity. Working under adverse weather conditions causes the jobsite efficiency to decrease even though the work might not stop. The decreased productivity due to adverse weather can contribute to schedule delay. The adverse weather not only delays a project due to such direct lost days from a weather event, or dry out days, it also prolong s schedule activities due to lost productivity or inefficiency. This in turn, can delay the overall project schedule. In many circumstances, a contractor is not entitled to compensation incurred by lost labor productivity caused by unusually severe weather, usually only lost time that is associated with unusually adverse weather can be recovered. Personal Opinion If the contract does not specify what constitutes as normally severe weather and determines the weather thresholds for different work to be performed a consistent analysis of severe weather will be impossible. The contracts should specify monthly anticipated weather delay days. Contractors should account for these days when planning their work and planning their baseline schedules. These delay days should include anticipated lingering days based on the construction activities scheduled in the periods of anticipated severe weather. My experience working on a farm has taught me that weather delays happen frequently and these delays throw a wrench in all of the plans. For example during custom harvesting, a rainstorm will bring a halt to all combine harvesting. Often if it rains more that a few hundredths of an inch work is stopped for at least one full day. This becomes an issue when there is another customer waiting to have their crops harvested but we have to sit and wait in one location for the crops to dry out enough to be cut, before we can move to the next location. If the crops are not harvested soon there is a chance that the crops could be destroyed by a hailstorm, or the crop could lose value if it gets rained on because the coloring gets washed from the grains. This has taught me that proper planning and scheduling can help to minimize the losses associated with severe weather delays. Conclusion Adverse weather conditions and delays in construction are a source of costly claims and disputes in construction. Contracts should include monthly anticipated weather delay days, and a system to define or determine anticipated lingering days should be clearly defined in the contract along with threshold values for weather parameters. These weather threshold values play a critical role when determining if weather is unusually or usually severe. Finally contracts should address the requisites to request a time extension cause by inefficiency due to unusually severe weather conditions. Much of the litigation resulting from weather delay disputes is based on the lack of adequate terms in the contracts. Whether a day with adverse weather is workable or not depends on the weather thresholds. The bottom line is, plan as for normal adverse weather, and know what the contract requires for adverse weather. Records should be kept of adverse weather occurrences, and time extension request should be submitted as required by the contract. When a project experiences adverse weather, the best case scenario is that weather considerations are included within the contract and in the schedule as applicable standards with respect to approach and evaluation. If weather impacts become an issue and are not present in the contract, the project management team and scheduler should develop reasonable weather allowance. If it becomes necessary to implement a method mid project, it is very important that the weather allowance standards are acceptable to all the construction parties and that all the assumptions used in the risk analysis are consistent and accurate. Bibliography Glavinich, Thomas. Construction Planning and Scheduling. Edited by Second Edition. The Associated General Contractors of America. Long, Nguyen. Analysis of adverse weather for excusable delays. American Society of Civil Engineers. 5 26, 2010. ascelibrary. org/coo/resource/1/jcemd4/v136/i12/p1258_s1? iew=fulltext (accessed 4 4, 2012). Morosko, Nick, interview by Andrew Barthel. Project Manager Bozeman, MT, (4 2, 2012). Sabol, Kevin. Integrated Framework for Quantifying and Predicting Weather related delays. American Society of Civil Engineers. 8 16, 2004. ascelibrary. org/coo/resources/1/jcemd4/v136 (accessed 4 6, 2012). Syzdik, Brian. Weather Considerations for Construction Project Scheduling Models. Society of American Militar y Engineers. 10 12, 2012. militaryengineers. wordpress. com/2010/10/12 (accessed 3 24, 2012). How to cite Construction Planning and Scheduling, Essay examples

Saturday, December 7, 2019

Blod Bank free essay sample

It will explain the purpose and features of the system, the interfaces of the system, what the system will do, the constraints under which it must operate, specific requirements and other supporting information. This document is intended for both the stakeholders and the developers of the system. This document is intended for developers, project coordinator, project guide, users and testers. The developer can use the document to view the analysis and design part, to understand requirements specification. The project coordinator can use this document to review the idea of project whether it is innovative and usable or not. The project guide can use this document to analyze and manage the flow of project development. The tester can use this document to get clear idea about system, to understand the exact input domain of system and to generate respective test cases for the testing purpose. 1. 1 Purpose This Software Requirements Specification provides a complete description of all the functions and specifications of the Blood bank Management System software. We will write a custom essay sample on Blod Bank or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The purpose of this document is to present a detailed description of the Blood Bank System. This document is useful for Blood Bank employees who use this system on the daily basis. This document will also serve as a reference to incorporate any changes made in the system to the future. It will also prove to be useful to the managerial staff which is responsible for the smooth functioning of the counter transactions that are performed on daily basis. This document is primarily intended to provide a detailed specification of the functional requirements for developers of the product. It also provides an overview of the product for the users. It will explain the purpose and features of the system, what the systems do and the constraints under which it will operate. This SRS document contains the complete software requirement for Post Office Transaction System and describes the design decisions, architectural design and the detail design needed to implement the system. It provides the visibility in the design and provides information needed for software support. 1. 2 Scope This software is used by System Administrator, Supervisor, Assistant and Lab technicians. The system is designed to provide user authentication by maintaining the user database which contains all the details of user along with login details such as username and password. Each user has a different level of operation for the authentication purpose. The solution will provide a well-organized and coordinated system where the blood and donor records are managed more efficiently with better security. The major goal of the system is to provide synchronized and centralized donor and blood stock database to the blood bank. It also improves the efficiency of blood stock management by alerting the blood bank administrator. System will provides traceability of donor in case of emergency. It also provides performance evaluation using report generation. 1. 3 Definitions, Acronyms, and Abbreviations This subsection should provide the definitions of all terms, acronyms, and abbreviations required to properly interpret the SRS. This information may be provided by reference to one or more appendixes in the SRS or by reference to other documents. 1. 4 References 1. www. bharatbloodbank. com 2. www. bloodbankindia. com 1. 5 Overview This document contains a brief history and insight into the problem as well as what the system is designed to do, the scope of the solution. It gives a brief summary of whom the system is targeted at, its capabilities, and its positioning in the device development process. It also explains requirements of the system and also where exactly the user and stakeholders are placed in the scheme of things. It elaborates on security issues, hardware and software requirement and also the priorities of various functionalities. The document helps the user to understand the Blood Bank System. The first part of the document provides the purpose, objectives and scope of the proposed system. It includes important definition, the problem statement specify the needed details to avoid any kind of ambiguity from user’s perspective. The document also states the feature set and capabilities of the system. The document also highlights the feature of proposed system and the advantages over the existing system. The document also highlights the various issues, error handling and the modification to be done in the system. The document is helpful to the user as it gives them opportunities to state what they expect from the system. In addition, the hardware specification required for the system is also mentioned. The user can read the document and make sure that his machine is equipped to run the system to avoid any inconvenience The user should make use of the document to understand the system better. The rest of this document provides a full description of the project for the blood bank. It lists all the functions performed by the system. It gives the details of each of the system functions and actions in full for the software developer’s assistance. It also gives the overview of the problems currently faced by the system and provides solutions for the same. 2. General Description The project deals with the problem of automated management system that is keeping track of the actual amount of blood stock in the blood bank and to minimize human errors. The solution will provide a well-organized and coordinated system for blood bank where the blood and donor records are managed more efficiently with better security and added automation functions in alerting the administrator when the blood quantity is below par level and about the expired samples. In addition, the administrator can also trace back the donor responsible in case of reactive sample in blood transfusion and blood screening result. This system also creates a convenient and paperless environment for the blood bank in managing donors and processing blood stocks. The registration time for old donor is shortened as the records are retrievable from the system. Also the performance evaluation is possible using report generation facility. 2. 1 Product Perspective This system keep the track of all the actual amount of the blood stock in the blood bank to minimize the human errors. 2. 2 Product Functions 1. System will also maintain Blood Stock records and Discard register. 2. System will provide levels of operators for authentication purpose. 3. System will provide an authentication form where the users will fill the details. 4. System will process the request of login. 5. System will check for the entered details in the login database. 6. If the entered username and password are valid then the system will grant access to the user else will display an error message. 7. System will provide five interfaces such as Testing Interface, Blood Stock Interface, Issue Interface, Donor Registration Interface and Statistics Interface. 8. Donor Registration Interface will take all the personal and medical details of donor and generate a unique id for each donor. 9. If the donor already has an id then will retrieve its details. 10. In Testing Interface, if the results are positive then discard register is updated with sample details. 11. If the results are negative Blood Stock Repository is updated with sample details. 12. In Blood Stock Interface, system will generate unique bag numbers for each product. 13. It will generate alerts when the blood quantity is below par level and about the expired samples. 14. The System will move expired sample details to discard register and update blood stock repository. 15. In Issue Repository, system will check blood stock repository for availability. 16. If stocks are available then system will place an issue order. 7. It will generate a label which includes bag number and details of sample. 18. In Statistics analysis, system will generate various reports. 19. The whole transaction of the blood will be recorded in a system 20. The software will perform the stock management amp; bill generation. 21. All the transaction of the blood will be updated within a small period of t ime. 22. The software will generate all the annual record of the blood bank.. 23. It will also maintain the record of the blood donor. 24. It will also maintain the record of the rejected blood and the rejection for the blood rejection. 2. User Characteristics The user must have the basic knowledge of the computer system. It is not necessary that the user must have the knowledge of the computer hardware. System administrator, supervisor, assistant and lab technicians. 2. 4 General Constraints * Blood bank employees ,donors 2. 5 Assumptions and Dependencies * The System will not allow any user with invalid username and invalid password. * The system should not provide administrative privilege to any customer. 3. Specific Requirements The systems should satisfy the below given requirements. 1. Operating System: Windows XP Professional 2. Database Management System (DBMS): MySQL 5. 0 3. Peer to peer connection. This can be done by connecting both the systems using a cross cable and giving different IP addresses to them. 3. 1 External Interface Requirements System Interfaces The systems should satisfy the below given requirements. 4. Operating System: Windows XP Professional 5. Database Management System (DBMS): MySQL 5. 0 6. Peer to peer connection. This can be done by connecting both the systems using a cross cable and giving different IP addresses to them. User Interfaces User Type| Intended Interaction| 1. DONOR REGISTRATION a. New donor b. Regular donor| * The system will take all the personal and medical details of donor and generate an unique id for the donor. * The system will take donors id as input, validate it and retrieve all its details including last donations. | 2. Administrator Login | * This login page will take input as username and password from the administrator * The system will validate the inputs and provide access to the system with more privileges to system and administrator| Testing | * This will take the input as blood group, donor id, date of collection; test carried out and its result. If the test results are positive then sample details are moved to discard register otherwise to blood stock repository. | Blood stock| * It will take all the details of the samples including blood group, its product details, date of collection, date of preparation, date of expiry, result of testing and generate a bag number. * It will generate alerts when the blood quantity is below par level and about the expired samples. * The expired sample details are moved to discard register and removed from blood stock repository. | Issue| * It will take input as product name, quantity, blood group and validate it with blood stock repository. If the stock is available then issue order will be placed. * It will generate a label which includes bag number, details of sample etc. | Statistics Display Page| * The administrator has access to this page. It displays all statistical data regarding the various issue orders placed, blood stock repository and testing screening. * Report generation. | 3. 5 Non-Functional Requirements Goal To provide authentication to donors. Objective 1 – Create unique id for donor’s. a. Accept donor personal and medical information for new donors. b. Generate unique id for each donor. Objective 2 – Process authentication request. a. Accept donor id in case of regular donor. b. Retrieve donor’s profile. Goal To manage Blood Stocks. Objective 1 – Process blood stock details. a. Accept product details like collection date, expiry date, blood group etc. b. Generates a unique bag number. Objective 2 – Establish connection with Issue interface and testing interface. a. Validate stock details for issue. b. Update blood stock repository after testing is negative. Goal To generate reports and label. Objective 1 – To generate report. a. Generate product statistics b. Generate yearly, monthly reports and provide it to the administrator. Objective 1 – To generate labels for issue. a. Generate labels for the issue order placed. b. Provide it to the customer along with the date of delivery 3. 5 Non-Functional Requirements 7. 1. 1 Availability * For the customers, the services available are: Registration as a donor, placement of issue order. * For the administrator, the services available are: Manipulation of databases, change the functionalities provided by the system and monthly and yearly reports generation. . 1. 2 Security * This system maintains consistency and security as the blood stock details can’t be modified by the administrator or the other user. The system analyses the issue order placed by the customer and accordingly fulfills it. The system will also provide authentication by using username and password. * The donor’s database will have its own security to prevent unauthorized write/de lete access. The donor’s details will not be disclosed while issuing. 3. 8 Logical Database Requirements The databases used by the system are * Donor database Blood stock database * Discard database * Account database User database: The purpose of this database is to store the required information of the donors and their id’s. This database will be used for traceability of donor. The donors will fill their information while registration. Their credentials will be saved in this particular database. Blood Stock database: This database is used to maintain blood stock information. It maintains the details of valid samples. Discard database: This database is used to store details of blood samples which have to be discarded. This will contain information of expired samples and those samples which reacted positively in testing screening. Accounts database: The purpose of this database is to store the account details regarding issue of blood sample and to maintain the history of all the previous transactions. This database will be used by the administrator so that he can calculate the total cost of the issue orders placed. Accessing capabilities: 1. Only administrator can set the role of users and their access capabilities 2. No user can access anything outside its accessing capability .

Friday, November 29, 2019

Achilles and Socrates free essay sample

Ancient history is well known for the astonishing number of real and fictional heroes; and for those who seek to explore the relevance and the impacts of the real-life heroism in depth, ancient history offers unlimited opportunities for understanding the essence of historical heroism in its true colors. Achilles and Socrates are fairly regarded as the two of the few most prominent ancient heroes. Although Achilles was well-known for his physical power, and Socrates exemplified the force of philosophic thought, both have produced irreversibly positive impacts on the following generations and their fellow countrymen and have revealed the unlimited potential of the human physical and spiritual nature. For historians and literature professionals, Achilles is considered one of the central cult figures for many epic narratives and numerous mythological episodes. Unfortunately, The Iliad appears the only one to have survived the long historical battles and the only one representing a complex picture of Achilles’ heroic character. We will write a custom essay sample on Achilles and Socrates or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The Iliad positions Achilles as a man with unlimited physical power, whose close relationships with gods and whose spiritual integrity shaped the basis for his continuous heroic success. It is difficult to disagree to Michalakis (2007) who writes that Achilles’ â€Å"centrality to the poem is marked by his physical ability and his absence from the battlefield and by his reasoning and his strong emotions†. Nevertheless, where Achilles undertakes additional heroic responsibilities and acts as a true literary hero, the motives of his heroism do not go beyond a simple search for glory. Moreover, Achilles readily displays his human flaws and does not conceal his true desire for a revenge which brightly contrasts his genuinely humane image: â€Å"but the heart of Achilles was set on meeting Hector son of Priam, for it was his blood that he longed above all things else to glut the stubborn lord to the battle† (Homer, 1910). In this context, his motives and his heroism stand out as dramatically different from those displayed and pursued by Socrates in his pursuit of the revolutionary philosophic thought. True, in distinction from physical heroism for which Achilles was well-known, Socrates’ heroism is expressed through his desire to look deeper into the essence of the human life. His philosophy and real-life revelations expressed in Apology shape an undoubtedly heroic picture of Socrates. Moreover, where Achilles seems to be moved by the earthy considerations of pride and glory, Socrates seems to be motivated by his sincere desire to produce a new kind of positive doctrine which the following generations would use to take strategic philosophic decisions. Socrates does not try to deny the realities of life and the limitedness of the human against the forces of nature and gods. His heroism stems from his desire to recognize that â€Å"you too, my friends, must face death with good hope, convinced of the truth of this one thing, that no evil can ever happen to a good man either in life or in death, nor are his fortunes neglected by the gods† (Guthrie, 1971). What seems to be similar between Achilles and Socrates is that both sought to leave their trace in the human history and both sought to produce irreversibly positive impacts on the generations that followed. Moreover, as Achilles’ deeds proved the relevance of physical force in the battle against the enemy, Socrates’ achievements proved the relevance of the mental work and the training of mind as the instrument of spiritual refraction. In general, Achilles and Socrates shape a balanced image of an ideal personality. For Socrates as well as for Achilles living a good life on earth was the primary task (Guthrie, 1971); that is why they both can be equally considered the most prominent heroic personalities in ancient history. Conclusion Achilles and Socrates teach us that living a good life is the primary individual’s obligation. Moreover, whether in physical battle or in the process of training one’s mind, individuals are responsible for balancing their mental and physical abilities in ways that would help them pursue the principles of humanity, virtue, justice, and fairness over the life span. References Guthrie, W.K.C. (1971). Socrates. Cambridge University Press. Retrieved April 21, 2009 from http://books.google.com/books?id=a-h35nyFR7ICprintsec=frontcoverdq=socratesas_brr=3hl=ru Homer. (1910). The Iliad. Plain Label Books. Retrieved April 21, 2009 from http://books.google.com/books?id=37DatKTx9FUCprintsec=frontcoverdq=iliadas_brr=3hl=ru Michelakis, P. (2007). Achilles in Greek tragedy. Cambridge University Press. Retrieved April 21, 2009 from http://books.google.com/books?id=F3H2g9ZDGfICprintsec=frontcoverdq=achillesas_brr=3hl=ru

Monday, November 25, 2019

Alzheizmers Disease essays

Alzheizmers Disease essays Alzheimer's Disease is a scarcely understood, but exceedingly devastating disease. We need to learn more about it in order to eradicate it. I knew someone with the disease and he really couldn't go outside alone or do much without his wife by his side. He had to stay home most of the time thinking about vain imaginings and remembering the same life occurrences over and over again. His memory gradually was lost and he began to lose control of basic functions, including the ability to feed himself and communicate with others. He finally died after many years of painful suffering. The Andrew Pollack article examines this, and a hopeful solution to the problem. The article focuses on a clinical trial that produced evidence that gene therapy may slow the mental deterioration that defines Alzheimer's disease. The study included eight patients with early-stage Alzheimer's, the first of its kind to use gene therapy for the treatment of the disease. Six successfully received the gene transfer, all of whom showed a slower rate of cognitive decline in the 22 months following treatment than they had in the 14 months before. Dr. Mark H. Tuszynski of the University of California, assisted I the writing of the article. Dr. Tuszynski and his assistants stated in the paper that they thought it might be better to use the gene to induce cells in the brain to produce their own growth factor just where it was needed. They also point out that the long-term goal of this research is the same as that of any other genetic research, which is the possibility that science could o ne day alter our genetic make-up. While gene therapy is far from certain, there are those who believe in its potential. Genetic research is currently playing a major role in the study of other diseases, including diagnostic and predictive test for SAD. However, many industry pioneers have withdrawn from gene therapy, due to its inconsistent results. Still, some venture c...

Friday, November 22, 2019

Personality Traits and PTSD Resilience Research Paper

Personality Traits and PTSD Resilience - Research Paper Example The TR in DSM-IV-TR refers to† text revision†s. Numeroff et al. (2009), a reprint of the work of Numeroff et al. (2006), reviewed the state of science in posttraumatic stress disorder (PTSD). The authors pointed out five key points. First, PTSD is frequent among women than among men. Second, the presence of group C symptoms after exposure to trauma can predict the development of PTSD. Third, increases in corticotrophin-releasing factor or CRF concentration associated with PTSD â€Å"may be reversed† with paroxetine treatment. Fourth, â€Å"hippocampal volume appears to be selectively decreased and hippocampal function impaired among PTSD patients.† Fifth, prolonged exposure therapy is effective in modifying negative cognitions that are frequent among PTSD patients. Note that in Numeroff et al. (2009) or state of science on the PTSD, there was no mention on the role of personality traits and resilience. In the 2000 guidelines of 50 pages for treating PTSD wri tten by Foa et al., there was no mention on the role of personality traits in hastening or slowing down the treatment or management of PTSDs. The treatment guidelines were developed under the auspices of the PTSD Treatment Guidelines Task Force organized by the Board of Directors of the International Society for Trauma Stress Studies (ISTSS) in November 1997 (Foa et al., 2000, p. 539). The treatment guidelines described PTSD as a serious psychological condition resulting from an exposure to a traumatic event (Foa et al., 2000, p. 539). The 2000 guidelines mentioned that the symptoms associated with PTSDs are â€Å"reliving the traumatic events or frightening elements of it; avoidance of thoughts, memories, people, and places associated with the event; emotional numbing; and symptoms of elevated arousal† (Foa et al., 2000, p. 539). The treatment guidelines pointed out that PTSDs are â€Å"often accompanied by other psychological disorders† (Foa et al., 2000, p. 539). Fu rther, the treatment guidelines elaborated that the â€Å"PTSD is a complex condition that can be associated with significant morbidity, disability, and impairment of life functions† (Foa et al., 2000, p. 539). The fourth edition of the Diagnostic and Statistical Manual of Mental Disorders (DSM-IV) of the American Psychiatric Association (1994) guided the guidelines. The guidelines recognized that research that shaped the guidelines came largely from western industrialized nations and little is known about the treatment of the PTSD in non-industrialized countries (Foa et al, 2000, p. 540). The guidelines also noted that there are limitations in the scientific literature on the PTSDs because most studies have used inclusion and exclusion criteria and, thus, each study may not fully represent the complete â€Å"spectrum† of patients (Foa et al., 2000, p. 541). In particular, it is customary in the studies of PTSD treatment to â€Å"exclude patients with active substance dependence, acute suicidal ideation, neuropsychological deficits, retardation, or cardiovascular disease† such that generalization of the findings to all populations may not be appropriate (Foa et al., 2000 p. 541). However, like Numeroff et al. (2009), Foa et al. (2000) did not mention anything on the association

Wednesday, November 20, 2019

Fill out chap 11-12 Essay Example | Topics and Well Written Essays - 750 words

Fill out chap 11-12 - Essay Example In addition to this, food plays a crucial role in contributing to stress levels as people undergo two types of hunger. One is physical hunger while other is emotional hunger. Emotional hunger is there as an output of stress and requires one to have a certain craving of selected foods that contain elevated sugar and fat levels. Some foods that are required for emotional hunger can exacerbate stress condition. Directions: For a period of one month, starting today, keep track of all those purchases you make. This includes not only objects you buy—necessities and luxuries-- but also splurges for meals and social activities. After you have accumulated your list, go through the items one at a time and ask yourself in retrospect, with strict objectivity, which of these purchases you wish you could cancel. Which ones represented an impulsive decision? Circle those items on your list. The clothes that I bought contained certain items such as trousers and shirts that were not required or necessary currently because I was able to deal without them. I also got additional pair of socks that could be shifted to two months ahead for the purchase. I also consumed a lot of fast foods that I consider as additional expenses. I also got a cushion that I liked but did not need. Therefore, I could cancel two of the clothes items, two additional pair of socks, some fast food expenditures and the cushion. If I would have saved the money that I used on all these items, I could have obtained some intensely needed product after two months or so. Saving is in itself rewarding so that action would have merited me. Directions: Analyze how your dietary patterns for three days by using the following table provided. Examine it and write a summary about it. Is what you eat conducive to handling much stress and improving health? Look at the frequency and amount of food you eat. I usually skip morning breakfast that

Monday, November 18, 2019

Direct, Interactive & Digital Marketing Essay Example | Topics and Well Written Essays - 2000 words

Direct, Interactive & Digital Marketing - Essay Example Direct marketing is highly contributing to the growth of digital marketing and social media in the following ways. First, direct marketing is leading many firms to move from the monopolistic nature of marketing to the competitive type of market. Most firms are doing so in order to reach many clients across the world. In addition, they agree into the competitive market to be flexible in terms of their production to meet the customers demand. For instance, Tesco offers its clients with variety of products in its various branches across the world. It enables its clients to buy products online thus making it more competitive market. Moreover, direct marketing leads to the development of information environment within the society. That is; it opened transmission between individuals. Moreover, direct marketing made socialization and the society possible. The transformation of information networks is another significant role of direct marketing in the development of digital marketing and social media. Direct marketing is highly transforming information into the market place therefore giving clear understanding between the individuals. For example, Tesco club card is offering more discounting to the employees depending on how the client will agree with company management. In addition, one will also receive a voucher depending on the frequency of using the Tesco Club card. Moreover, the information, will aid to remove old barriers in the marketing industry and thus reducing inconvenience in the marketing industry. The message sent will not be distorted. That is the message you sent will ever be saved because of the backup from the sent items from the sending company. In addition, direct marketing is a faster way that can enable an individual to reach the audience quickly and without many difficulties. In addition, the technique allows the firm to have personal communication with the clients hence getting better understanding of the customers’

Saturday, November 16, 2019

Using Computer Forensics to Investigate Employee Data Theft

Using Computer Forensics to Investigate Employee Data Theft Introduction Over 25 percent of employees steal proprietary data when departing a company or organization.[1] To that end, our experience shows that departing employees have a sense of ownership over the data that they copy. Intellectual property commonly stolen includes customer lists, secret formulas, source code, strategy documents and other trade secrets. The information is often used against the organization when the former employee goes to work for a competitor or decides to start a new company.   Ã‚   When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft of IP analysis in order to preserve electronic data and uncover important evidence. Using specialized software, the expert can reveal digital footprints such as: USB activity Files recently opened Cloud storage usage Files sent to personal email accounts Recently printed documents The results of the analysis can provide the foundation for legal action such as a temporary restraining order, permanent injunction, subpoena of personal devices, or other litigation to prevent the misappropriation of company data. When Employee Data Theft Is Suspected Employee data theft occurs most frequently just prior to, or immediately after, an individuals termination or resignation from an organization. Telltale signs that an investigation is warranted include unusual activity by the employee, such as: Plugging a personal USB thumb drive or hard drive into a computer Coming into work at odd hours or establishing remote desktop connections during off-hours Transferring large amounts of data on the company network Visiting file sharing sites like Dropbox or Google Drive Sending emails with attachments to personal accounts If there are concerns that a departing employee has stolen proprietary data, then it is important to take steps not to delete important electronic evidence located on his or her computer. If the computer is powered on, then leave it on, because important evidence may be stored on the computers random access memory and could be deleted if the computer is powered off. Also, ensure the computer cannot be accessed remotely by disconnecting it from the network. If the computer is already turned off, then place it in secure storage. Furthermore, confirm the employees login credentials are disabled or have been changed, but do not let the IT staff reinstall the operating system or reassign the computer to another employee. Such actions could destroy or overwrite any evidence of wrongdoing. Finally, resist the temptation to take a peek at what is stored on the computer by turning it on and accessing files because this could alter the data, thereby making the investigation more complex. If the suspected employee had a company-issued cell phone, then place it in secure storage as well. Smartphones hold an abundance of useful information such as text messages, emails, call logs, internet activity and more. The simple act of resetting the phone, however, can permanently destroy this data. IP Theft Investigations Preserving and Analyzing Electronic Evidence The first step in a theft of IP investigation is to forensically preserve the data on the employees device(s). The computer forensics expert will create chain of custody documentation, photograph the hardware, and verify the integrity of the preserved data, among other things. These steps ensure that the electronic evidence will be admissible in court. Once the data is preserved, the next step in the investigation is to perform an analysis to identify software and artifacts that may be indicative of IP theft. These areas on a typical Windows installation include: USB activity Files recently opened or deleted Cloud storage Personal email accounts Internet history report Printed documents USB Activity Analysis Many of todays USB devices, such as thumb drives and external hard drives, have enough storage capacity to save an entire copy of a users hard drive. As such, they are one of the most common tools used to steal data. The good news is that using a USB device leaves behind a trail of digital evidence that can prove invaluable to an investigation. Analyzing a users USB activity can reveal several key facts regarding what was connected to the computer and when. In most cases, forensic experts can determine the serial number and/or brand of the USB device, as well as the first and last time the device was connected to the computer. In some instances, they may also be able to verify each time a specific USB device was connected. Oftentimes, the analysis will reveal that an external USB hard drive or flash drive was connected for the first time during an employees last week of employment. While most analyses reveal a new USB connection, it is also possible that a device used throughout the duration of the suspects employment was never returned. A device such as this would likely contain numerous documents and files that were related to the employees day-to-day activities and could contain value to a competitor. If it is a requirement that employees return company-owned USB drives at the end of their employment, forensic experts have the ability to verify whether or not that policy was upheld. Files Recently Opened While confirming that a USB device was connected to a computer is significant, it is even more important to know what files were accessed and potentially transferred to the device. The Microsoft Windows operating system creates various artifacts when a user opens a file or folder. These artifacts indicate what was opened, when it was opened and where it was opened from. A classic red flag is if the employee was opening files during the last week of employment that were not related to the work being performing during that time. Another consideration is the organizations data access policy. If data access restrictions are not in place, then the employee may be able to access company files unrelated to current work that are stored on the network. The existence of these artifacts when combined with a USB activity timeline can indicate a high probability that data was copied off the system. Lastly, the artifacts can also contain specific information about where the file existed. If a file was opened from a USB drive, the artifact will indicate this, providing factual evidence that the suspect is in possession of a USB drive that contains specific files. For example, combining a USB analysis and files recently opened analysis could show that on October 7, 2016, at 7:22:08 a.m., a non-company-issued SanDisk thumb drive with serial number 851450 was plugged into the computer for the first time and a file titled Client Contact List.xlsx was opened. Cloud Storage If the analysis shows that certain files were accessed but no USB activity was detected, the next step in the investigation is to identify evidence that a cloud storage provider such as Dropbox, Google Drive or Microsoft OneDrive was accessed. The purpose of these applications is to share and sync data across multiple computers. For example, Dropbox may have been surreptitiously installed on the employees work computer as well as his or her home computer. Consequently, the simple act of syncing a company file to Dropbox will instantaneously also make that file available on the employees home computer. The good news is that cloud storage applications often have corresponding log files and databases that record what files the user accesses and what activities are performed. These logs can signify files have been uploaded to the cloud in the past even if they have already been deleted from the shared folder. Some of these applications even save deleted data in a separate hidden folder on the computer itself that users typically are not aware of. As a result, a theft of IP analysis may show that Dropbox was installed on the users work computer and that early in the morning on October 7, 2016, fifty files were deleted and the hidden folder reveals these were company files. Personal Email Accounts Some individuals may use their company email to send attachments to their personal email account such as Yahoo or Gmail. In these cases, forensic experts are able to perform a preservation of the employees work email to identify and document the evidence of misconduct. Internet History Report An Internet history report can be generated that shows, inter alia, recent Internet searches, web sites and pages visited, cookies from websites, and Internet downloads that occurred. Such information is helpful in establishing what an individual thought was important or even their state of mind. For example, analysts have discovered that individuals have searched on how to delete data or copy data surreptitiously and that they reviewed websites that were in essence how to manuals to perform certain deleterious acts. Paper Documents Finally, individuals who are a little less aware of more modern techniques to copy data will simply print the documents they wish to take out the door. In these cases, forensic experts are able determine the last known print date of Microsoft Office documents. Deliverables and Project Timeframe The turnaround time for a theft of IP analysis performed by an analyst is typically one week. Deliverables provided will be easy to understand in the form of spreadsheets, html reports, and written reports containing the findings of the analysis. A forensic expert should also spend time with the client either over the phone or in person to discuss the reports in detail so that they know exactly what a report contains and the assumptions and opinions of the forensic expert. If necessary, an expert will also provide depositions or expert witness testimony regarding the authenticity of the evidence and their findings. Authors Timothy M. Opsitnick, President, JURINNOV, LLC, Joseph M. Anguilano, Director of Operations, and Trevor B. Tucker, Forensic Analyst. JURINNOV, LLC, a wholly-owned subsidiary of Technology Concepts Design, Inc. (TCDI), is a technology company that provides cybersecurity and eDiscovery services. Cybersecurity consulting includes investigating accidental or malicious data breaches as well as providing security strategies and assessments to prevent such occurrences. eDiscovery consulting includes computer forensic investigations and ASP ESI hosting. JurInnov news and information is available at www.jurinnov.com. For over 25 years, TCDI has been providing technology solutions through partnerships with large corporations and law firms. These solutions include advanced litigation support software and services for electronic discovery, hosted review and production, and large-scale litigation case file management. TCDI news and information is available at www.tcdi.com. [1] Biscom, Employee Departure Creates Gaping Security Hole Says New Data, December 23, 2015; https://www.biscom.com/employee-departure-creates-gaping-security-hole-says-new-data/.

Wednesday, November 13, 2019

The Persian Gulf War Was NOT Iraqs Fault :: essays research papers fc

At 2:00 A.M. (local time) on August second 1990, Saddam Hussein sent the Iraqi military across the border into Kuwait, and sparked a war whose repercussions are still being felt. Today what eventually became known as the Persian Gulf War, featured the largest air operation in history; and a senseless destruction paralleled only to Danzig or Hiroshima. Even though Saddam was the one who physically invaded Kuwait, is balking at United Nations resolutions, and is generally known as a tyrant. He should not be destroyed . The Gulf War was nothing more than the United States attempting to establish, as former President Bush so aptly termed, the â€Å"New Order†. The United States supported Saddam Hussein and the Ba’ath regime prior to the Kuwaiti invasion. They even gave Saddam a â€Å"Green Light† to go ahead and invade. If Saddam were to leave power Iraq would either be plunged into a Lebanon style civil war or face another ruler no better than Saddam himself. The United States is contemplating another invasion of Iraq, however it is having a difficult time of gaining support of the Arab countries. While many people in this country believe Saddam Hussein should be destroyed, that he is a totalitarian dictator and gross human rights violator. He is, in fact, a stabilizing force in his country and the Middle-East, standing up to the only remaining superpower. The consensus currently prevalent in this country is that Saddam Hussein, the leader of Iraq, is a totalitarian dictator, thirsty for blood and prestige, who seems dedicated to disobeying the United States. It would seem Iraq is intent on keeping United Nation inspectors out of its own country, although technically â€Å"Iraq barred only American members of the inspection teams from carrying on their work†(Nelan 54). The Iraqi â€Å"Dictator† seems to have decided he would rather be bombed than inspected. He apparently has no regard for the international community, and yet still wants them to lift sanctions. Also the Iraqi: â€Å"government stopped Ritter from investigating sensitive sites, calling him a spy and complaining that his team was too ‘Anglo-American’... the Iraqis also revealed Ritter was looking for evidence Iraq tested chemical and biological weapons on humans - charge Baghdad called ‘a shear lie’† (Watson 34). Those reports of human testing are obviously false. â€Å"[E]ven Saddams strongest foes, including the C.I.A. seems to doubt them(Watson 34)†. In fact, the only testing done by Iraq was on dogs. There were no inspectors around when the U.S. committed the crimes at Tuskegee, or when hundreds of servicemen were exposed to radiation during the atomic tests in the sixties. The Iraqi â€Å"dictator† has stayed in power for some 6 years since sanctions were imposed.

Monday, November 11, 2019

Cross-Border Strategic Alliances and Foreign Market Entry Essay

Introduction It is indisputable that as the world gets globalized, virtually all companies are compelled to expand their market to the international or foreign nations. Expansion into the foreign countries is perceived to be associated with many positive impacts. However, it has been shown that some entry modes are detrimental to the performance of the company or the firm. This implies that before any firm decides to expand, it has to weigh different international entry modes and determine the best mode to use.   This paper discusses one of the modern entry modes, called cross-border strategic alliance. The paper will achieve this by reviewing one of the detailed article cross-border strategic alliances. Analysis The article entitled â€Å"Cross-Border Strategic Alliances and Foreign Market Entry† by Larry Qiu analyzes how firms are motivated to form cross-border strategic alliances when entering into new markets. The goal of the article trying to answer the question as to why most firms are forming cross-border strategic alliances and also identifying the economic factors that facilitate the formation of such alliances. Utilizing a two-country, multi-firm and three-stage economic model, the author reveals astonishing findings on the manner in which companies enter into international market (Qiu, 2006). The article reveals that the company can enter into an international market in different ways. Some of the ways include export and foreign direct investments. Cross-border mergers and acquisition, according to the article is the modern way in which a country can penetrate other countries. There are other traditional forms such as export and green-field foreign direct investment (FDI). The article analyzes based on the thesis statement that multinationals are shifting from the traditional forms such as FDI to modern forms such as cross-border mergers and acquisitions and cross-border strategic alliances. The factors that are considered to influence the choice of the entry mode include such aspects as variable costs such as trade and transport costs and fixed costs. The author argues that a company may set up just one plant in its own country and uses it to serve both the domestic and foreign markets. According to the article, search firm will be entering into foreign and international countries through export. Alternatively the same firm may opt to set up two plants, one plant in the domestic country and the other in the foreign country. In such a case, the firm will be entering into foreign country through foreign direct investment. The invention of cross-border strategic alliances, according to the article, has compelled most countries to switch from export to FDI. This is because the cross-border strategic alliance is associated with numerous benefits compared with the export strategies (Qiu, 2006). For example it creates different synergies in the domestic and foreign markets. In addition, it promotes production alliances, which help each of the allied firms to reduce production costs both in their domestic plants as well as their foreign plants. As far as distribution costs is concerned, the article argues that the cross-border marketing, which is a product of the cross-border strategic alliance, reduces the allied firms’ distribution costs in their foreign market (Qiu, 2006). Conclusion The foregoing analysis has shown why cross-border strategic alliance is becoming the most preferred mode of entry as far as international trade is concerned. Compared to other entry mode methods, cross-border strategic alliances create different synergies in the domestic and foreign markets (Qiu, 2006). Some of the synergies include production cost synergies and distribution costs synergies. These synergies helps the company reduce the production and distribution costs and hence get profits. References Qiu, L. D. (2006). Cross-Border Strategic   Alliances and Foreign Market Entry. Hong Kong   Ã‚  Ã‚  Ã‚   University of Science and Technology. Retrieved from:   Ã‚   http://www.etsg.org/ETSG2006/papers/Qiu.pdf   

Saturday, November 9, 2019

Personal and Imaginative – Scarred for Life

This was it. My legs were lead; my head throbbed violently. It felt as if the energy within me had slowly oozed away. I dragged my feet like I was being held down by iron chains. Gathering every ounce of my might, I heaved myself towards the bench- and collapsed upon it. Where was I? No clue. That was all I'd been saying to myself since the taxi left. And how long ago was that? Two hours†¦three hours†¦four hours? Still no clue. I hated myself for being so thick. If it wasn't for my ‘thick' brain, I would have been home by now. Home. I felt useless. â€Å"What the hell you doin' ere?† I looked up so fast it made my neck click; my anger rose. It was a brown haired boy who I guessed was trying to pass the time. I found him annoying. I wasn't in the mood of talking to anyone-I hardly ever was. â€Å"You tell me.† I replied stiffly. â€Å"Ain't seen you around this place.† I felt like punching him. I hated this about some people, butting in when they were least wanted. â€Å"That's 'cause I ain't from dis place.† I grumbled, glancing at him, thinking how much longer is he going to stay? There was a pause. Then, just as soon as I expected him to leave, he demanded, â€Å"Where you from then?† â€Å"Look yeh, I don't know you an' I ain't in da mood. So move.† I stated through gritted teeth, giving him the dirtiest look I could muster. He finally got the message and went off, gruffly. I didn't understand myself; I never used to be like this. My mood switched within seconds and I knew that many people found it hard around me. Even my own mates kept their distance from me at times. But they understood that I had a past. Life had changed a lot for me, and since that change, I was never the same person. I cast my eyes around, taking in my surroundings. Even though the street lamps were alight, the road seemed unusually dark. I squinted and could just make out the scenes of every day life before me. Here and there figures would move about; some closing their shops, others walking hastily, making their way home. I gazed blankly at the movements, not bothering to move from my seat. Eventually, the very last of the people edged away towards the end of the street, their silhouettes disappearing from under the very last street lamp. Silence followed. Almost radically, a harsh wind had begun to bluster, causing my numb face to sting. Fed up with my position, I pulled up my hood, got up from the rigid bench and stepped on to the road. The sound of my trainers hitting against the pavement seemed to echo into the night, leaving behind a lethal dead-like silence like that of graveyard. Trying to block out this atmosphere, I began to recount the event that occurred on the taxi†¦ I couldn't believe my stupidity. Losing my mobile was one thing- but losing my purse-on the same day†¦a bit extreme huh? And to make matters worse, being the idiot that I am, I tried to get home in a taxi when I was totally broke! The reaction the driver had when he realised I wasn't going pay was severe to say the least. I knew people had strange solutions but leaving me in the middle of God-knows-where was a bit too strange. Sad or what? Well, what was done was done and I knew there was no way in changing it. Thinking about it wasn't going to get me anywhere. My main priority was to see how to get home. I inhaled deeply as the bleak air rushed in to my blood. What was the point in living when surviving was so hard? Upon reaching the end of the street, I became aware of the bend which had not been visible to me from the bench. It was murky and even at this distance I could not make out what lay on its other side. As I began to make my way through it, my stomach gave a discomforting squirm. I didn't know why that was? Was it the darkness that had just fallen over me? Or the strengthening of the silence which had now reached its peak? Being able to distinguish traces of a light, I became relieved to know that I had entered just another street. This time there were no shops, but instead stood half a dozen or so houses, which I could tell were grand as well as ancient. They were positioned with a great deal of space and on either side of the road which lay in front of me. At the far end, I could discriminate the park which stood out due to its rusty iron gate. As my vision became clearer, I noticed a dark profile standing within the shadow of the great oak tree. Who would be out at this time of night? Or was it a trick of light? Sensing movement, I knew for sure that it wasn't just a fragment of my imagination. My heart began to beat loudly, vibrating heavily in my throat. Now I knew I wasn't alone. It ambled out from under the tree; light shining upon its limp body. Slowly, it began dragging its body in an oddly held manner. It – he was hurt. A slow moaning uttered from his mouth, and my fear turned into grief on seeing the pain radiating from him. On realising that his direction was headed my way, I heaved my body behind the nearest bush, afraid of being seen. From his gnawed, wrinkly hands, I realised he was well aged. His face was entirely hidden, due to the hood of his festering coat. He had now reached a house opposite me, one which I had not noticed due to its miniscule size. It was dilapidated and it showed no sign of warmth. Was this his house? I heard keys dropping, breaking the silence, and watched as he bent to pick them up. As he did so, his hood fell from his face. I screamed†¦ Everything was indistinct, the face flashed in front of me again, yet this time it looked younger by a few years. I could hear loud terrible screaming from within my own head. So loud that I thought that my head would explode. The screaming went on, never ending. The pain searing in the shrill cries was too much to take in. The screaming didn't come from the face, yet I recognised it. But it couldn't be! I tried to cry for help but nothing came out. Slowly, the picture blurred and my vision became focused†¦ My inhalation was hard, my heart aching endlessly. I tried to hold my breath, trembling from head to toe. Cold sweat trickled down my face and my clothes were soaked, clinging to my skin. How much time had passed? A door slammed shut, its reverberation hanging in the atmosphere. I turned my head towards the house- had the man just gone in? It had been ten years. Ten long, painful years since I had heard my brother's voice, shrieking with agonising pain just the same as on that night. The night that I last saw him alive. Was it just a coincidence that I had just seen the convict? All I remembered was the assassin's terribly scarred face, which had appeared there on the day my brother had fought eagerly for his life, aiming viciously at his face. This man was marked – scarred for life. Since then, I had promised myself to find the man who had finished my little brother off- and now that I had found him, there was no way I was going to let him escape. Not this time. No way†¦

Wednesday, November 6, 2019

Their Were Watching God essays

Their Were Watching God essays Isnt it ironic how two different characters have a lot of similarities and differences? Janie and Claire are a great example. What makes these characters connection so special is that Janie is a main character from the novel, Their Eyes Were Watching God and Claire is one also, but from the successful television show, The Cosby Show. Claire plays a mother of five and a successful lawyer. While the author, Zora Neale Hurston, uses Janie as a middle-aged woman who had married three times and had found what true love was like. Even though these characters appear to sound different, they really have the same characteristics. Happiness is one of the many similarities that Janie and Claire can relate to. Unlike many people, wealth and rank doesnt fulfill their conditions of supreme well-being and good spirits. They showed their contentment in other ways. Janie showed hers by remarrying a man with less money and rank than Joe Starks, her old husband, who had deceased. Tea Cake, the individual that married Janie, was unwealthy and only cared about having a good time and having fun. Janie liked that about him and was attracted to that. It was so crazy digging worms by lamp light and setting out for Lake Sabelia after midnight that she felt like a child breaking rules. Thats what made Janie like it.(Chapter 6, pg.98). She didnt care about the money and her social class. Going from marrying a rich and high ranked man to a man with less money than she had proved it. Claire was the same way, but her way of expressing happiness went through her family. She loved watching her children grow up right before her eyes. She loves every minute with her husband. She enjoyed caring for her family. That was the only fun in her busy day. When it come to gender roles, Janie and Claire are not alike. Janie had been married three times. In all o...

Monday, November 4, 2019

Development and the Environment- Human interventions in forest Essay

Development and the Environment- Human interventions in forest environments - Essay Example This paper will discuss various human activities that currently contribute to the tropical rainforest deforestation and the intensity of their effects specifically in Latin American and Asian regions. The activities that lead to deforestation According to the United Nations Framework Convention on Climate Change (UNFCCC) secretariat, the main reason behind deforestation is agriculture. While subsistence farming causes 48% of the destruction, cash crop cultivation or commercial cultivation leads to 32% loss followed by logging and fuel wood with 14% and 5% each. Geist, & Lambin (2002) also report four reasons behind 96% of deforestation; they are permanent cropping, cattle ranching, shifting cultivation and colonization. Shifted cultivators In fact, shifted cultivators are considered the biggest threat to tropical forests and they are the reason behind 48% of the total forest loss. The main reason that forces these people into forests is the unequal distribution of land. For example, in Brazil, 42% of the total cultivated land is owned by 1% of the population. In addition, according to World Rainforest Movement (n.d.), half of Brazil’s total population is landless farmers. ... Logging The role of logging in deforestation cannot be neglected. Big logging companies cut down trees for their commercial uses. However, it is not only the selected trees that are destroyed; the vines, epiphytes and lianas are all destroyed along with the tree which will take many hundreds of years to regenerate. In addition, for the removal of the wood, they construct new roads and the area gets heavily compacted by machinery leading to a further decline in the quality of the land. Furthermore, the roads constructed by these loggers are used by the farmers around the forests to get access to the deep forests. When these farmers start slash and burn to grow food, the impact of the issue grows manifold. Cattle ranching and cash crops Another serious issue is the modern day agricultural practices. The first among them is the monoculture plantations which are solely aimed at making quick money. However, the impact of this agricultural practice is unimaginable. In addition, a lot of ma chinery, fertilizers and pesticides are used to make maximum profit in the shortest possible time. This intensive farming leads to a rapid fall in the quality of the soil in a few years. The severity of cattle ranching practices is more or less the same. Cattle ranching leads to the destruction of more and more land and the land so damaged will not support any plant or animals for a long time. Fuel wood A per reports, about 2 billion people worldwide still depend on wood for cooking and heating. Considering the huge number of the people, one can easily imagine the magnitude of the issue. In addition, according to United Nation’s Food and Agriculture Organization, 75% of these people

Saturday, November 2, 2019

Job analysis Assignment Example | Topics and Well Written Essays - 500 words

Job analysis - Assignment Example hen a certain task is given to a custom agent, it is upon him to see that the task is accomplished precisely, rather than assuming that some other sailor will do it. In addition, a custom employee should not drift through his time while in the job. Each one of them must pay attention to all details no matter how small the matter may be. According to their guiding principles, attention to any detail may signify the difference between failure or success of a given task, and between life and death (Young 15). A custom employee is not expected to play favorites or put into effect the rules without considering honesty and neutrality. Permitting some custom officers to ignore other rules will bring challenges in the field. Integrity at the border and port also requires that a custom worker hold on to his or her responsibility no matter what comes on his or her way. This is the reason why their regulations provide that no custom officer should quit in simple tasks. With this in mind, a custom officer can never give up, even when he sees a likelihood of death, while carrying on his duties. A good custom officer is ethically responsible. He knows what is wrong and what is not, so he tries to do only what is acceptable. He performs all duties in a timely and correct human way possible without any worries of the inconveniences or personal gain. A custom officer does not entertain immature self-seekers who prioritize his or her best efforts solely when there is a personal reward. A custom officer should not be stubborn, resentful, self-important individual who turns down orders. The laid down rules and regulations guide the daily operation of the customs department, and if followed by all custom employees, life in the field can be so easy and enjoyable for everyone (Young 23). In the customs department, a team is much greater than an individual is. Given that, every team has leaders and simple members, every custom employee is part of a team, and he should respect and work