Thursday, October 31, 2019

Super Format and Rapid Development of TV Formats Essay

Super Format and Rapid Development of TV Formats - Essay Example Additionally, with the increase in demand, a lot of investors came up with new ideas that saw the production of programs to match the demands of the customers in the markets. On the other hand, exploiters came up with the idea of exploiting the novel entrepreneurs with the idea of coming up with interesting and catchy programs that would sell and attract the attention of many individuals in the market. Moran & Malbon (2006) indicate that, with the advent of the digital technology, the global TV market indicated developments in coming up with a digital TV channel, that was directed to the consumers; thus, massive profits were indicated by the investors in the industry. TV super formats According to the research conducted by Ward (2003), TV super formats can be referred to as the elements that are in various ways completely invariable, and in which other programs are derived from. This basically refers to the derivation of many programs from a singular element, as a result of manipulat ion of systems to come up with a new program. TV super formats are, therefore, concepts derived from an original program that are reproduced in another for a different audience. With the right documentation these TV formats can be sold internationally for the original concepts to be replicated in other countries. Right documentation, here, refers to trading licenses between the seller and the buyer of the formats (Ward, 2003). With a lot of competition being experienced in the TV and broadcasting industry, there was a dire need by the broadcasting markets to diversify the rules of governing the broadcasting markets. In the long run, trade in the TV broadcasting saw the inclusion of many more traders; thus many players in the industry (Chalaby, 2011). Rapid development of TV formats Private channels Many parts of the world have experienced an upward trend in the number of channels airing programs. Research by Holmes and Jermyn (2004) shows that in prior years, national channels domin ated the television sets in various countries, whereby viewers had no choice but to view whatever programs were aired. However, this trend took a dramatic change with the privatization of channels in many countries. In their quest to win over the viewers, these channels went looking for interesting and catchy programs to draw the interest of the viewers. The most viable way to do this was to concentrate on format programs. With time, privately owned television networks increased in number and completion for audiences was rife, with each trying its best to attract as many audiences as possible. In most cases, national broadcasters lagged behind in the completion for viewership, as they did not want to air programs that supported other nation’s talents and capabilities. The battle, therefore, was among the privately owned television channels. This completion fuelled the rise and spread of format TV. The investors and entrepreneurs in of these privately owned channels are, there fore, the catalysts for the rise in TV formats. Audience Audiences all over the globe have shown a particular liking to TV format programs over original ones. According to Holmes (2004) the concept of TV formats cannot be alienated from a discussion of the communication industry as far as television is concerned. Television formats are vital in the case of journalists and viewers of

Tuesday, October 29, 2019

Technology review Essay Example | Topics and Well Written Essays - 750 words - 3

Technology review - Essay Example Turnitin.com: turnitin.com is an effective plagiarism checker which means its work is to verify and check for any plagiarism that prevails in the paper. It is a very reliable website for instructors which aim to compare the work submitted to the teachers with works on the web in order to check the reliability and uniqueness of the work. It is easily available and online communities can be made through which the instructor can evaluate and access the work. K5learning.com: k5 learning again is an interactive platform for young learners who seek to develop their skills through fun. K5 is a website which accesses young learners and enhance their abilities. Online tests are taken, assessments are done and help is provided to those who need reinforcement so that an effective learning mechanism is generated. Freevideolectures.com: it is an online resource for many learners out there who can easily access online the lectures of reputable teachers regarding various topic of study. This site enables learners to gain knowledge regarding various subjects having lectures of almost 30 respectable universities. This websites offers a vast range of courses and lectures which students aid from to develop better understanding in a convenient and cost effective manner. Tutorphil.com: is an online site to overcome the workload and ease down the frustration level among students. It provides learning methodologies and gives advices and tips to overcome the problems while structuring an essay. It is an interactive site which helps to device proper essays with ease and convenience. At this point I would like to choose my three sites which according to me are the most reliable to generate effective learning. My three sites which I will focus on in my essay are lore.com, turnitin.com and freevideolectures.com. If these three sites are integrated then a very convenient mechanism can be generated which will aid in learning. The reason why I think

Sunday, October 27, 2019

Alibaba Is A Business To Business Company Marketing Essay

Alibaba Is A Business To Business Company Marketing Essay Alibaba.com is regarded as a dominant player and a high-growth company due to its large membership base and its phenomenal growth. Its total registered user base grew from 6.0 million in 2004 to 19.6 million in 2006. In the same vein, it registered a cumulative annual growth rate of 94.8% in 2006 alone. One of its major competitors in the international marketplace B2B giant Global Sources, which has an online directory of many other B2B services it offered, such as print business directories and exhibitions, (Farhoomand, 2008, p. 7). However, Alibaba.com has various strengths which served as its competitive advantages over Global Sources and other competitors. Indeed, Alibaba.com should continue in being a dominant player in the B2B eCommerce industry. Among all the upcoming B2B in china, Alibaba.com has received much despite not been listed in NASDAQ .In 2001 the company was featured by Forbes as its cover story also selected as the only firm on the Forbes Best of the Web:B2B list founded in china (Doebele,2000).By 2002 the Alibaba.com was selected and featured by Forbes again as its only Best of the Web:B2B in the month of September.(Qin Hu et al.,2004). 1. 0 Background 1.1 What is Alibaba.com Alibaba.com was founded in June 1999 by Jack Ma and eighteen other founders (Farhoomand, 2008, p. 3). It is a business-to-business portal which allows suppliers of everything from 176 countries to connect with buyers around the world. (Bi, 2002). The Companys founder Jack Ma was nominated as one of the 100 Global Leaders for Tomorrow by the World Economic Forum and was honored as a recipient in the Asian Business Association Business Leadership Award in 2001, on the 27 December 2001 with the registered 1,000,000 Alibaba.com member, which became the only B2B Webster with 1,000,000 registered business members from 202 countries. (Qin Hu et al., 2004) Since inaugurating its website in simplified Chinese to serve the Chinese mainland market in 1999 (Farhoomand, 2008, p. 3), it has now become worlds largest online business-to-business global trading marketplace, with 2.5 million and 14 million registered users in its international and Chinese domestic marketplaces respectively , (Alibaba.com: A Smiling Community with a Dream, undated). Based on the number of registered users and market share by revenue at the end of the second quarter of 2007, Alihaba.com was considered as the largest online B2B company in China. The international marketplace was served through its English language website which caters to global importers and exporters (Farhoomand, 2008, p. 4). On the other hand, the China marketplace was served by its Chinese language website, Alibaba.com which caters to domestic suppliers and buyers (Farhoomand, 2008, p. 4).Alibaba.com online transaction basically has six levels as describe CTO,John Wu which are information exchange, negotiation, price bargaining, shipping, insurance, inspection and customs processing and payment. As its lowest level that Alibaba.com operates. In other words it only provides an information platform on which the buyers and sellers meet and post business information.(Qin Hu et al 2004). Farhoomand (2008, p. 4) explains that the business model of Alibaba.com centers on the use of the marketplace by suppliers and buyers who would establish their presence online, identify potential trading partners and conduct business with each other. Farhoomand (2008, p. 4) describes the manner by which the Alibaba.com interface is used by suppliers and buyers in China and around the world in their trading activities: , Suppliers and some buyers would use the marketplaces to host their company profiles and catalogues in standardised formats known as storefronts and post listings such as products, services and trade leads. Users could view storefronts and listings in over 30 industry categories and nearly 5,000 product categories by either searching for keywords or browsing through the online industry directory. (Farhoomand 2008, p. 4). Figure 1 presents the value proposition of Alibaba.com and the manner by which it effectively facilitates the conduct of trade within the context of B2B commerce. Figure 1 Alibaba.coms Value Proposition Source: Farhoomand (2008, p. 17) Figure 2 below shows the typical process of trade in Alibaba.com. Suppliers and buyers were able to successfully establish large online comminutes in Alibaba.com which features active listings, enquiry exchanges, instant messaging, discussion forums and other user-friendly community features, (Farhoomand, 2008, p. 4). Figure 2 A Typical Trading Process in Alibaba.com Source: Farhoomand (2008, p. 17) Although Alibaba.com offers free basic services to its all its registered members, it generates is revues from the services purchased by suppliers which include membership packages that provided priority placement of storefronts and listings in the industry directory and search results, (Farhoomand, 2008, p. 5). These suppliers are charged from their subscription to value-added services which include: (1) purchase of additional keywords which help improve their search result rankings; and (2) premium placement on Alibaba.coms web pages (Farhoomand, 2008, p. 5). 1.2 Why Should Alibaba.com be Considered a High Growth Company? Alibaba.com should be considered as a high-growth company due to its large membership base and its phenomenal growth. Its total registered user base grew from 6.0 million in 2004 to 19.6 million in 2006. In the same vein, the total number of its paying members grew from 77,922 in 2004 to 219, 098 in 2006. Figures 3 and 4 below show the growth in the number of Alibaba.coms registered users and paying members, respectively. . Figure 3 Growth in the Number of Alibaba.coms Registered Users from 2004 to 2006. Source: Farhoomand (2008, p. 5). Figure 4 Growth in the Number of Alibaba.coms Paying Members from 2004 to 2006. By the end of 2007, Alibaba.com has already successfully captured 50% of the market share of Chinas online e-commerce revenue (Farhoomand, 2008, p. 19). Figure 5 below presents the market share of Chinas online e-Commerce Market by Revenue. Basically the pie chart demonstrated how successful Alibaba.com has been able to stay above its major competitors by seizing half of the market share. Figure 5 Market Share of Chinas Online E-Commerce Market by Revenue Source: Farhoomand (2008, p. 19). Moreover, its phenomenal growth in the B2B industry is buttressed by its impressive financial standing. By the end of 2004, its annual revenues totaled US$48.3 million, (Farhoomand, 2008, p. 5). With a cumulative annual growth rate of 94.8%, its annual revenues amounted to US$183.2 million at the end of 2006. Figure 6 below presents the financial data of Alibaba.com from 2004-2007. Figure 6 Financial Data of Alibaba.com from 2004-2007 Source: Farhoomand (2008, p. 5) 1.3 Who is Jack Ma? Jack Ma is the founder and chairman of Alibaba.com and is a native of Hangzhou, which is situated approximately 100 miles southwest of Shanghai, where the companys headquarters resided (Farhoomand, 2008, p. 3). Jack Ma is one of the first entrepreneurs to develop e-commerce in China, (Alibaba.com: A Smiling Community with a Dream, undated). He, together with his partners have successfully established the following: (1) first internet commercial website in China; (2) a B2B marketplace platform for suppliers and buyers around the word; (3) the worlds first on-line credit platform for companies, called the Trust Pass (Alibaba.com: A Smiling Community with a Dream, undated). Jack Ma grew up during Chinas Cultural Revolution and became fascinated in learning English at the tender age of 12, (Farhoomand, 2008, pp. 3-4; Fannin, 2008). For eight years, he rode 40 minutes every morning on his bicycle to a hotel near the West Lake and practised his English by giving free tour guides to foreigners, (Farhoomand, 2008, p. 4). Later, when he decided to pursue a degree in education out of his desire to teach English to high school students, he flunked his admission exam twice for a University, prior top being accepted at Hangzhou Teachers University, (Fannin, 2008). After graduating, he was offered a teaching job with a rate of 100 to 120 renminbi, which is equivalent to USD $12 to $15 per month, (Fannin, 2008). Then in 1995, he was employed by the Chinese government to settle a dispute between a Chinese firm and its US partner, (Farhoomand, 2008, p. 4). The US partner held Ma captive at gunpoint for two days before he regained his freedom by agreeing to become a p artner in an internet startup in China, even though he had no concept of the internet at all, (Farhoomand, 2008, p. 4). During the same year, Ma joined a trade delegation in Seattle as an interpreter wherein a friend showed him a computer with an internet connection (Fannin, 2008; Farhoomand, 2008). There, he was surprised to find out that nothing turned up in the search results when he searched for the word China. This prompted Ma and his friend to set-up a website and name it China Pages ((Fannin, 2008). Upon his return to China, he borrowed $2,000 to establish China Pages which shared a strikingly similar ideology with Alibaba.com: to list Chinese companies on the internet and help foreigners find their websites, (Farhoomand, 2008, p. 4). However, China Telecom bought out his stake which eventually forced him to return to civil service. In 1998, he started to resume work on his vision of connecting Chinese companies to the world through the internet. Then, in December of that same year, Ma finally realised his vision with the establishment of Alibaba.com, (Farhoomand, 2008, p. 4; Fannin, 2008). Indeed, Ma had the makings of a successful business leader. Under his leadership, Alibaba.com became a leading B2B marketplace which have successfully attracted more than 17million registered members in 220 countries globally, with daily postings exceeding 35 million, making Alibaba.com the most active Internet marketplace and B2B community worldwide, (Alibaba.com: A Smiling Community with a Dream, undated). 1.4 What is the Basis for the Report? This report is primarily based on secondary data obtained from the case study undertaken by Farhoomand (2008) and from other relevant online and offline sources. This study did not use any primary research methods such as interviews in gathering information about Alibaba.com. 2.0 The beginning of Alibaba.com Jack Ma officially launched Alibaba.com online in December 1998, (Farhoomand, 2008, p. 3). Alibaba.com originally served as a bulletin board service for businesses to post buy and sell trade leads. Jack Ma and 18 other founders established the Alibaba group in June, 1999, which is the parent company. It first served clients domestically (Farhoomand, 2008,p.3). 2.1 The Opportunity In 1995, while in Seattle, Jack Ma made his first contact with the computer and internet and was shocked to find out that no search results could be found for the keyword China. Together with a friend, Ma decided to set up an online company and name it China pages. In 1998, upon his return to China, he launched China Pages which featured a list of companies on the internet and help foreigners find their websites, (Farhoomand, 2008, p. 4). After three months, Ma and his team established Alibaba China which was a major operating subsidiary in China and which served to carry out the business of operating B2B marketplaces, ((Farhoomand, 2008, p. 4). After three more months, three more sites were set up by the team, which include: (1) an English site for international users; (2) a Korean site for Korean users; and (3) a traditional Chinese site for Chinese users outside China ((Farhoomand, 2008, p. 4). 2.2 Competitive Environment Even during its infancy, Alibaba.com has already been faced with stiff competition from rivals based domestically and internationally, (Farhoomand, 2008, p. 7). One of its major competitors in the international marketplace B2B giant Global Sources, which has an online directory of many other B2B services it offered, such as print business directories and exhibitions, (Farhoomand, 2008, p. 7). Global Sources was first established in Hong Kong in 1971 as a monthly trade magazine for consumer products made in Asia for export to Western markets , (Farhoomand, 2008, p. 7). As of the end of September 2007, Global Sources already has a community of over 647,000 buyers and 160,000 suppliers (Farhoomand, 2008, p. 7).Moreover, Global Sources has successfully : (1) enabled suppliers to sell to hard-to-reach buyers in over 230 countries; (2) delivered information on two million products annually; (3) operated 14 online marketplaces that delivered more than 23 million sales leads annually; (4) pu blished 13 monthly magazines and over 100 sourcing research reports per year; and (5) organised nine trade-specific exhibitions that ran 22 times a year across seven cities, (Farhoomand, 2008, p. 7). Farhoomand (2008, p. 7) explains that Global Sources could be considered as a serious threat to Alibaba.com because its revenue source was shifting online, as evidenced by its 2006 annual report demonstrating that online businesses generated over 40% of total revenue. Figure 7 below shows the contributors to Global Sources revenues for 2006. Figure 7 Contributors to Global Sources 2006 Revenues Source: Farhoomand (2008, p. 8) 2.3 Strategic Review of the External Situation at Start up Ma only had to carry out very little analysis before launching Alibaba.com due to the structure of the B2B marketplace subsector at that time, which is characterised by a high national internet penetration rate and a robust growth of the Chinese online shopping market; the Chinese B2B eCommerce Market, the Chinese SME and usage of third party eCommerce among Chinese SMEs (Farhoomand, 2008). 2.4 What Competences were Required There were numerous competencies required in the establishment of Alibaba.com. First, it needs to posses the capacity to make its online marketplaces more effective for SMEs around the world, (Farhoomand, 2008, p. 6). To do this, Alibaba.com needed to employ people with the necessary technical skills . Moreover, it needed to have people who could help it : (1) expand of it user base and active listing; and (2) enhance community experiences to further improve user loyalty and activity through continued development and introduction of new features and tools (Farhoomand, p. 7). 2.5 Summary of Alibaba.coms Early Years Alibaba.com was officially launched online in December 1998. On July 9, 1999, and September 9, 1999, Alibaba (China) Technology Co., Ltd was founded in Hong Kong and Hangzhou, respectively (Alibaba.com: A Smiling Community with a Dream, undated). In October 1999, Goldman Sachs invested USD 5 million in Alibaba. (Alibaba.com: A Smiling Community with a Dream, undated). In October 2000, Alibaba launched the Gold Supplier membership scheme to serve Chinese exporters, followed in August 2001 by the launch of International TrustPass, a membership service catering to exporters outside China. China TrustPass was launched in March 2002 to serve SMEs engaged in domestic trade, (Farhoomand, 2008, p. 3). 3.0 Alibaba.coms Development from 2002 2007 3.1 Evolution of Alibaba.com On March 2002, Alibaba China launched its TrustPass plan initiative, which made Alibaba the worlds first on-line credit business community, (Alibaba.com: A Smiling Community with a Dream, undated). By the end of that same year, Alibaba.com has successfully started making profits (Alibaba.com: A Smiling Community with a Dream, undated). After several years, in November 2007, Alibaba.com debuted on the Hong Kong Stock Exchange, raising US$1.5 billion to become the worlds biggest internet offering since Googles initial public offering (IPO) in 2004, (Farhoomand, 2008, p. 1). According to Qin Hu et al.,(2004) many other businesses owner believe that alibaba.com growth and impact will only become more prevailing in the future.Over the years the sale of goods on the internet by American firms is assumed to reach US$ 1.3 million by 2003.By 2004 the European online business to business sales is expected to be US$1.6 million compare to China largest population in the world. However some compa nies in euro are still probing this new source of revenue. 3.2 Understanding the Market and Their Target Customer Alibaba.com operates in a business environment whose structure is largely shaped by the following: (1) National internet penetration rate ; (2) Chinese online shopping market; (3) the Chinese B2B eCommerce Market; (4) the Chinese SME; and (5) usage of third party eCommerce among Chinese SMEs (Farhoomand, 2008). In terms of the national internet penetration rate, in 2007, China registered an internet penetration rate of 12.3% trailing after the US, Japan and South Korea, whose penetration rates were above 65% (Farhoomand, 2008, p. 2). However, Chinas internet penetration rate has been documented to grow at approximately three percentage points annually. Figure 8 shows Chinas internet penetration rate from 2002 to 2007. Figure 8 Chinas Internet Penetration Rate from 2002 to 2007 Source: Farhoomand (2008, p. 10). In the same vein, Chinas online shopping market has also showed a rapid trend of growth (see Figure 9 below). Figure 9 Chinas Online Shopping Market from 2006 to 2007. Source: Farhoomand (2008, p. 10). 4.0 The Future for Alibaba.com Just one after the IPO in 2007, Alibaba.com has already considered a venture with Softbank. Although the Japanese telecom giant disclosed no details regarding the venture, it was likely that Alibaba.com would expand its service to mobile users in Japan, a market that had been impenetrable to the Chinese e-commerce company, (Farhoomand, 2008, p. 9). In China, Alibaba.com toppled EachNet, an older rival backed by global leader eBay, (Farhoomand, 2008, p. 1). The future of Alibaba.com seems bright due to a combination of the positive influence of its competitive strengths and effective strategies. According to Farhoomand (2008), Alibaba.com has numerous strengths which serve as its competitive advantages over its rivals. These strengths include the following: (1) it had effectively built a premier brand in the e-commerce domain, boasting the highest traffic among all online B2B marketplaces; (2) it focused exclusively on the highly lucrative SME sector; and provided tools and solutions tailored to SMEs, Alibaba.com was confident in the value proposition of their service offerings ; and (3) its sales force and customer service support in attracting and retaining users, especially those who paid for subscriptions, were excellent. 5.0 Conclusions The results of the critical examination of the various information regarding Alibaba.com, including its strengths and achievements only indicate that Alibaba.com should remain a dominant player in the B2B marketplace category of eCommerce. Its solid financial standing would help it whether the uncertainties of the future which is largely brought about by the stiff competition in the industry. Moreover, its sound and innovative business model is rather hard to copy, making it difficult for new entrants to compete with Alibaba.com. With respect to its key competitor, Global Sources, Alibaba.com only needs to continue to innovate and diversify its businesses in order to gain competitive advantage over Global Sources and other international rivals.

Friday, October 25, 2019

Social Context of The Fire Next Time :: The Fire Next Time

Social Context of The Fire Next Time The Fire Next Time was published in a time of great chaos. A civil rights revolution was sweeping the country. Many of the institutions of American life were being challenged, including religion. Author James Baldwin saw power as a key to African-American success in the civil rights movement. In 1955, Rosa Parks refused to sit in the Negro section of a bus in Montgomery, Alabama. Dr. Martin Luther King transformed a racial protest into a massive resistance movement in the late 1950s. In the early 1960s, the sit-in tactic was launched in Greensboro, North Carolina, when black college students insisted on service at a local lunch counter. "Freedom Riders" were sent to the South in 1961 by the Congress of Racial Equality (CORE) to test and break down segregation laws. In a few years, there would be a sexual revolution, as well as a trend toward peace and love. For the time being, however, hatred and misunderstanding were widespread. Baldwin realized the importance of these events and movements and answered them with The Fire Next Time. As Baldwin became a teenager in Harlem, he began to realize the presence of temptations such as sex and drugs. In order to fight these evils, he fled to the church. Eventually Baldwin realized that the church didn't preach love to everyone, but only to the ones who believed as they did. Despite this bad experience in the church, Baldwin never forgot the positive elements of religion. According to Kenneth Kinnamon, Baldwin realized that Christians had kept blacks down through history, but he still understood the need for religion. "However much he may revile the historical role of Christianity in the enslavement of black people, The Fire Next Time attests that [Baldwin] has never forgotten the compensatory values of his [adolescent] religious experience," he writes (3). After a meeting with Elijah Muhammad, Baldwin realized that Christianity wasn't the only flawed religion. Baldwin saw that both Islam and Christianity needed to compromise their strong beliefs for a unified black movement to have any real power. Baldwin knew the acquisition of power would have to play a key role if blacks were to achieve full civil rights. Baldwin writes, "The only thing white people have that black people need, or should want, is power--and no one holds power forever" (96). He recognizes that whites would be reluctant to relinquish the power they had over blacks.

Thursday, October 24, 2019

Data Security and Integrity: Software and Physical Restrictions

Table of Contents Page # Introduction Introduction Maintenance of data security and integrity in reference to: Software Access Restrictions These are inserted for the purposes of protecting computer software. A few forms of software access restrictions are as follows: Passwords Definition: -A string of characters that allows access to a computer, interface or system. How does it assist in securing data and maintaining its integrity? When a person creates a password for access to a computer, folder, program etc. they are creating a code that must be implemented every time they wish to access the software. This means that if any unknown or unauthorized personnel were to attempt to view the material and were unaware of the password then they would be unable to do so, thus securing the data.The integrity of the data is also highly protected when using a password because if any unknown or unauthorized personnel attempt to access any data that is password protected without knowing the pass word, they will be denied access. Thus the data cannot be altered in any way and its trustworthiness would remain the same. * Data Encryption Definition: -This is the encryption (encoding) of data for security purposes. How does it assist in securing data and maintaining its integrity? By encrypting, we change the original plaintext version of data into ciphertext, which is an unreadable format that will protect against unauthorized parties.Only those who possess the key to trigger the algorithm that will decrypt the data, hence making it readable, can access it. A higher bit encryption is much more secure than a lower bit encryption, for example a 256 bit encryption is much more secure than a 128 bit encryption because a hacker will need to try out more possibilities when trying to breach the encryption. Once data is encrypted the integrity of it is safeguarded just as long as it isn’t breached by a hacker or accessed by any unauthorized party who somehow got the key to the algorithm, and was able to decrypt the data. Virus Protection Definition: -This is the protecting of a system from a file that replicates itself without the consent of the user. How does it assist in securing data and maintaining its integrity? Typical anti-virus software protects a computer system from viruses, Trojan horses, worms etc. by means of routinely or manually scanning files and programs to check for the aforementioned malware and if any malicious content is found, it either notifies the user of its presence and suggests steps that can be taken to remove it, or automatically starts doing so by itself.Any malware that is located early enough by anti-virus software can usually be removed before it can cause any irreversible damage to data. Though there are viruses that can take effect almost immediately and corrupt data very quickly before the virus protection can take action or even notice it. In this case having better virus protection software is necessary. * Firewall De finition: -This is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.How does it assist in securing data and maintaining its integrity? A firewall protects a computer system or network from any malicious activity from the internet, for e. g. hackers, viruses and Trojan horses. They do so by filtering any incoming packets of data to decide which data will be let through the firewall and which will be discarded. This means that data already on the computer or network will be better protected against hackers, viruses etc. and any incoming data will be ‘clean’ i. e. without any malicious software attached.Firewalls assist in maintaining data integrity by its ability to filter data. As long as the firewall prevents malware from entering a computer system or network the data will not be adversely affected thus maintaining its trustworthiness. Physical Access Restrictions These consist of biometric s ystems as well as other forms of physical access restrictions that are used to protect data. A few forms of physical access restrictions are: * Voice Recognition Definition: -This is a device used for the identifying of individuals by the sound of their voice.How does it assist in securing data and maintaining its integrity? Voice Recognition is a biometric system i. e. it identifies individuals by a unique human characteristic, their voice. The way this aids in protecting data is as follows: if someone wishes to gain access to something, in this case data, they would need to verify to a computer that they are permitted to view or manipulate the data by speaking. If they are not registered to gain access to the data then the computer would deny them the ability to view or interact with it, thereby maintaining its integrity.If the speaker is registered with the voice recognition, then it would grant the speaker access. This allows data to be viewed by authorized personnel only. Voice recognition is considered to be more secure than passwords because of the fact that, instead of depending on a secret string of characters to gain entry to the data, it identifies them by their voice hence removing the possibility of guessing. * Retinal Scan Definition: -This is the biometrical identification of individuals by scanning the retina of the eye.How does it assist in securing data and maintaining its integrity? A retinal scan operates similarly to voice recognition, this is because they are both biometric systems. The way this assists in securing data is as follows: The retina of the eye, which is unique to everyone, is scanned. The computer can identify people by the use of camera technology which can differentiate individuals from one another because of the subtle differences in their retina. If the person is recognized as authorized personnel, then they are allowed to view the data.If however, they are not authorized to view the data, they will be denied access from doing so as well as from manipulating it, this allows for the safekeeping of data and the maintenance of its integrity. * Fingerprint Recognition Definition: -This is the automated method of verifying a match between two human fingerprints. How does it assist in securing data and maintaining its integrity? This is another biometric system, and the most popular one at that. Fingerprint recognition is widely used for the protection of data because of its accuracy and dependability in identification.Just as there are no two people who share the exact same voice or retina, there are no two people who share the exact same fingerprints. Because of this, fingerprint recognition can be used to allow someone access to data once the person accessing the data places his finger onto the scanning device. If his fingerprints match those that are registered then he/she is allowed access to the data, otherwise access will be denied. * Fireproof Cabinets Definition: -A fire resistant cupboard/box wh ich can house computer hardware that contains data. How does it assist in securing data and maintaining its integrity?Data is located inside software, however software cannot function without hardware. Therefore, in order to protect the software which houses data, we must also protect the hardware which houses the software. Fireproof cabinets are an excellent way of doing so. They assist in securing the hardware by allowing it a special area so that it is not lost or misplaced. Also, if there is a fire which could potentially be disastrous, the fire resistant cabinets will protect the hardware from being destroyed while also indirectly protecting the data. Summary Bibliography

Wednesday, October 23, 2019

Company Policy for S-S Technology

Recruitment Policy Purpose To ensure that required staffs are appointed at required interval for S-S Technology. Responsibility Relevant department manager shall responsible to submit staff requisition form upon staff requirement. HER manager shall review and arrange for recruitment as per requested Information. Procedure When staff requirement request from concerned department manager who shall complete the staff requisition form and submit to HER. HER shall review and take approval from management for initiating recruitment process.HER shall make vacancy announcement as appropriate ways such as Journals, newspaper, notices, etc and collect applicant's C.V.. HER manager shall review collected C.V. and inform to applicants as appropriate ways for Interview. Interviewee or candidate shall fill application Issued by their selves. HER shall conduct the Interview and make decision for appointment for interview. HER. Related manager and GM shall make interview for selected candidates. HER shall submit to management to get approval of new appointment. After selected candidate, HER shall fill record, personal data, and agreement on S-S Technology rules.HER shall explain to new staff the S-S Technology rules detail and other requirements. Provisional period shall be defined as three months but It can be varied based on the assessment of department manager. If the performance of staff is found to be satisfactory after provisional period, department manager shall inform to HER for permanently appointment by appropriate way. HER manager shall issue permanent appointment letter after getting approval from management and inform to finance. HER staff shall keep all records of Taft in personnel data files.References ; Employee Requisition, Application Form, Interview Assessment Form, Request for Medical Test Form, Appointment Letter, Evaluation of New Employee's Job Performance, Permanent Letter, Personal data(C.V.),.. Etc. Performance Appraisal Policy The purpose is to give each employee to know how their performance, behavior and potential are evaluated by manager to improve confidence, to provide improvement of work performance. Responsibility Department manager Is responsible for analyzing competency of responsible staff heir performance in yearly basis.MD/GM is responsible to make performance evaluation for managers. Requirements For manager level – MD/GM shall conduct performance evaluation of managers and above level. – For below manger level – Department manger shall conduct performance evaluation and submit appraisal form to HER. – HER manager shall review and compile proposed comments from appraisal and discuss with MM/ Managers to proceed for improvement. HER manager is responsible to review appraisal outcomes in order to provide necessary training program or provision or resources. –HER manager and related manager shall discuss to upgrade skills of employee and to determine training needs including resource requirements on yearly basis. References Performance Appraisal, Master Skills Matrix. Training Policy To ensure staff are competent to perform their task and ensure to provide necessary training at requested interval. Responsibility HER is responsible to prepare and arrange the training plan after getting approval from management. Department manager is responsible to evaluate their staff competency and communicate with HER for arranging required training.Procedure HER manager shall prepare the training plan based on training requests from department managers and take approval from management. Upon requirement of training, department manager shall fill the nominations for training course and submit to HER. HER shall submit to management for getting approval from management. HER manager and related manager shall arrange the training requirements at requested time. After training is completed, HER manager shall keep the training records such as nomination, record list, course register , evaluations.Trainee and trainer evaluation shall be made to training to get effectiveness of training evaluation as reference. The related manager shall provide the provisional or on Job training defined by managers. Training certificate, if applicable and personal training record shall be updated by HER staff and keep in each relevant personal file. References : Training Request Form, Training Plan Form, Training Record List, Training Course Register, Training Evaluation (trainer), Training Evaluation (trainee), Personal Training Record.

Tuesday, October 22, 2019

Letter to Hamlet Essays

Letter to Hamlet Essays Letter to Hamlet Essay Letter to Hamlet Essay Essay Topic: Hamlet Dear Hamlet, I cannot hide my thoughts and emotions. I cannot bear this torment longer; I must let out the beast within me. This world, this mad, sad world, it has driven me close to insanity. Its like a blade, folds of a thousand and each fold only make it stronger, like the madness I am fueling on. Every day as I live, I tell myself that I should smile and go along with the commands of my father, brother, and you. Your orders Hamlet, I have gone according to every wish you have asked. But why? Why should I go around following and letting the likes of you order me around? All men are the same. You, father, brother, everyone in this sad world! Oh, Yes lord this, Yes Lord that, Yes Lord everything! Why? Is it because I am a woman you can order me around as you wish!? I am disgusted by what everyone think of me. You men frustrate me every time. Oh, Hamlet, do you think I am your slave? A maid? A simple object you can use and toss around with? All you typical men speak to me with disrespect and corruption. â€Å"Or, if thou wilt needs marry, marry a fool, for wise men know well enough what monsters you make of them†. Really? Marry a fool? Cheat on them? You really think I’m that of a monster to do any of that? You probably think us women are just prostitutes, a sex object you can come to and please yourself. Well, we’re not, and without us you probably can’t even cook, clean, or do anything by yourself. Just because your whore of a mother married your uncle without a split second to think about her marriage, doesn’t give you the right to believe that I will do the same. Every one of you hopeless men can’t do anything without us, yet you still mistreat and use us for your greed. Oh, I only wish I were to liv e in a society where both men and women are equal and where free speech is allowed. I live each day with no such freedom, only to be forced to obey all commands of your kind. You might thought I would defy any such orders. No, such action would bring severe punishments. This society, nothing will stop you men from using us as tools. The harsh social inequality affects me like a burn, oh, how do I live in such world. It’s like I’m underwater, unable to breathe. All this ruthless chaos in the air, how can I live on with such peaceful mind. Right after your uncle became king, you’ve become a lunatic I tell you. You weren’t like this before. You were so loving and caring, and most of all happy. But when you came into my room that day, grabbing my arm and looked deep into my eyes, I knew something wasn’t right. That ugly image of you dirty and foul smell, it has left a mark on my head forever remembering that sad scene. Has the fallen king driven you so deep into madness that you can’t even see your foolish actions have affected the surrounding people? Well, it has. Especially when you cold-heartedly killed my beloved father, oh my father whom I loved wholeheartedly loved so dear much. Oh the sadness and agony, how do you still walk on this land not feeling guilt or shame? Have you ever thought about how your actions could affect my brother and I? My well being? My mentality? I’m sure you knew who was behind the curtains, but your madness wouldn’t allowed such second thoughts. Oh, why Hamlet? Why do you do these hideous actions? What has my father ever done to you or your family? We’ve been loyal to the King, Queen, and you, yet you act like God and have sentenced our fate to hell. With such loyalty and respect, is this what we receive in return? Why? Why? Why, Hamlet, Why? The thought of you and the death of my father overwhelms me with horrifying sadness. Oh, the sadness of losing you, both physically and mentally. Oh, my dear Hamlet, I still love you, but it is you who have pushed me away, casted me out and branded me as damaged goods. You left with my heart broken, filled with sadness, pain, and grief. My fragile heart, oh, my fragile heart . It is almost like the world is turning against on me along with my thoughts and actions. Even now if you turn back to normal, I wont go with you. Your hands are dirty and stained with my father’s blood. With my mind almost gone, I don’t believe we can ever meet again the same as we use to. Hell, I can hardly speak to you either. Your mind has already been corrupt. I still think of the day when you visit me and stayed. But that’s the past, and I can’t stop thinking about it even though I want to. I guess, I still love you somewhere in me. If I find the strength of Hercules to live in this vile world, what do I get in return? Nothing. Nothing will happen if I kept chasing you, who has abandoned me for god knows what reason it was. The world is unfair to not only me but others as well. If I stay, what will happen? This society is corrupt; no one gives a damn anymore. The rich only greeds and gains more than they should, and the poor begs for only what they need to survive. All you men use gender inequality as a weapon against us woman. Oh, shall I stay any longer will I continue to suffer? I shall perish into the night and rise as the sun rises, but only as nothing but spirit. To leave this empty world full of chaos will it liberate my grief and despair, and give me an opportunity to start fresh. Yes, it all makes sense now. Death is the only way to escape. Goodbye Hamlet. Goodbye world. Farewell, Ophelia

Monday, October 21, 2019

Digitization and convergence of music industry

Digitization and convergence of music industry Traditional record industry business model Sacha Wunsch-Vincent and Graham Vickery note that the relationship between the artist and the record company is usually contractual which normally last for a limited period of time or number of records depending on the specification of the contract.1 Record companies converts the artistic creation into consumer products alongside investing in artists to expand and market their works.2 Advertising We will write a custom essay sample on Digitization and convergence of music industry specifically for you for only $16.05 $11/page Learn More A record industry can be said to be doing extremely good if one in ten of the total artist investment in turn out profitable. Noteworthy, most artist often never sell enough to recover the incurred overall cost. Record companies sponsor novice artists from profits, catalogues sales and new releases. Artist must achieve a specified number of copies sold to break even. The customary re cording industry revenue is collected from recordings while the turnover from T-shirt sales, concerts and so forth, normally grow to the artist. Once a music piece has become popular, the music industry package industry in diverse bundles to sell the same consumer the same piece multiple times.1 In times of increasing revenue from sponsorship, merchandised, live touring and declining sales of CDs the industry has experience a shrinking share in the general 1Sacha Wunsch-Vincent and Graham Vickery, ‘Digital Broadband Content: Music’, Working Party on the Information Economy: Directorate for science, technology and industry committee for information, computer and communications policy, 2004, p. 39. 2Barney Wragg, Vice President, eLabs, Universal Music International (UMI) and Ms. Sara John, Government Affairs Head, EMI Music during the OECD Digital Broadband Content Panel (OECD, 2004b).Advertising Looking for essay on art and design? Let's see if we can help you! G et your first paper with 15% OFF Learn More music revenue. With regard to declining CD sale, the negative outcome of the changing record label approach on the artist’s returns had to be revisited in terms of digital music sales also which may shift artists’ returns. 1 Digital rights management (DRM) Effective DRM technologies have been embraced as the business enablers has for the digital delivery of music as well as for the numerous business models that meet the consumers expectations. In spite of their drawbacks, they may be a significant technical device for protecting the IPRs and have potential of becoming persistent across the overall digital distribution chain. Through their capacity to secure content, they may motivate the content rightholders to avail content for digitization and ensuing digital sales. By virtue of their ability to offer diverse access schemes to content the, DRMs may afford content aids that are conform to consumer needs incl uding the right to buy time-limited admittance to songs and thereby increasing consumers choice and expectation. Many problems are associated with DRMs. To begin with the key problems with DRM’s appear to have had difficulty in curbing unauthorized access. DRM programmes and technologies should be substantially robust to guarantee the protection of digital content to piracy. Means of harnessing technology to secure intellectual property have been developed and have taken effect. 3European Commission, ‘communication on The Management of Copyright and Related Rights in the Internal Market’. To address this issue, various governments have pledge to develop a sufficient legal protection and useful legal solutions against the circumvention of technological security interventions such as DRMs. These lawful protections are prerequisite for DRMs to function as expected. 1 Second, the expanding adaption of DRM technologies has posed question that the latter may potentiall y restrict usage rights. Indeed this concern has become a policy basis presumably for consumer association and is apparent in relevant forums. Based on some academics, limits place to private copies can turn out bothersome when they swing the equilibrium between the expectations of copyright holders as well as the public.Advertising We will write a custom essay sample on Digitization and convergence of music industry specifically for you for only $16.05 $11/page Learn More DRMs have seldom been known to block legitimate access of content and services, unlike the CD-Rom copy-protection technologies. Nevertheless, designers of DRM, users of DRM-protected product must be equally concerned to ensure suitable usage rights, and players in the market adapting DRM, transparency, privacy, and ease reliability of access.1 Bibliography European Commission, ‘communication on The Management of Copyright and Related Rights in the Internal Market’, 2004, pp. 11 Wragg B, John S, ‘EMI Music during the OECD Digital Broadband Content Panel’ (OECD, 2004b). Wunsch-Vincent, S Vickery G, ‘Digital Broadband Content: Music’, Working Party on the Information Economy, Directorate for science, technology and  industry committee for information, computer and communications policy, 2004, p. 39.

Sunday, October 20, 2019

8 Benefits of Time Management in College

8 Benefits of Time Management in College Yes, there are benefits to learning how to manage your time everyone seems to know that. But what exactly do the benefits of time management look like to college students in particular? Is good time management really worth all of the time and effort? 8 Benefits of Good Time Management in College You wont miss important life deadlines. Life deadlines and projects are those things that keep your life on track. It may include turning in your FAFSA on time, getting your form in early so you have guaranteed on-campus housing next year, remembering to get your moms birthday present in the mail so it arrives on time. When your time management is bad, life can get ugly in an instant.You wont miss important academic deadlines. Paper coming up? Lab report due? Group assignment on the horizon? Missing academic deadlines means you may miss out on being able to stay in school. Having good time management, on the other hand, means you get your assignments in on time and get a little sleep the night before theyre due.You have more time to sleep well, eat right, and exercise regularly. Good time management means you have more time in general. And the better you treat your body, the better it treats you. Putting a little energy into time management now means youll have more energy to get th rough your days (and workload) later. Youll have less stress. Good time management means that horrible paper you have to write gets done in a reasonable amount of time with relatively little stress. Its a much better approach than facing a panic attack the night before a deadline.Youll have more time to just relax and enjoy your time in school. Lets be honest: Even if you do decide to throw caution to the wind and just hang out with some friends in the quad, that research paper youre avoiding is still fluttering around in the back of your brain. When youre good at managing your time, you can really let yourself relax, knowing that the time youll need to rock that paper has already been allocated in your schedule.Youll have more flexibility and spontaneity. When youre always behind and late on projects, you dont have the time or mental ability to just relax and enjoy, say, the spontaneous gathering in your residence hall or your roommates surprise birthday party.Things will be easier for your friends and family. You kno w what its like to have a friend who is always late: things can become trying after a while. Finally getting on top of your time management and turning into an independent adult who can run his or her own life will make things incredibly easier on your friends and family (not to mention yourself). Good time management skills will help you in your post-college life. Think your always-late, always-behind pattern is going to change once you graduate? Think again. Taking the time to learn and make permanent strong time management skills will serve you well in your life after college. After all, how can you go out and change the world if youre always running behind and late?

Saturday, October 19, 2019

Intercultural Communication Essay Example | Topics and Well Written Essays - 750 words - 1

Intercultural Communication - Essay Example Cultural Patterns includes the common beliefs, norms, values, and social practices of a particular community of persons (Lustig & Koester, 2013). The cultural pattern of the Egyptian Muslim group is different from the cultural patterns of Emily’s Roman Catholic group. Mediated communication brings people of diverse cultures, like me and Emily, together (Durant, 2009). In terms of culture, the value of my Muslim and Egyptian group is clearly different from the values of the Roman Catholic Portuguese group. Muslims pray differently from the Roman Catholic devotees. Values, including religious and cultural values, can be described as what one group believes as right or wrong. For example, the Muslims espouse Mohammad is Allah’s messenger and Jesus is a Prophet. However, the Roman Catholics insist that Jesus Christ is a God. Muslims do not celebrate Christmas whereas Roman Catholics celebrate Christmas, the day Mother Mary gave birth to the Christian’s savior, Jesus Christ. Likewise, the Muslims visit Mecca once in their lifetime, when finances allow. On the other hand, the Roman Catholics can visit Jerusalem, the Holiest place of the Roman Catholics, Protestants, Jews, and other Christian groups to celebrate how the God Jesus Christ took the form of a man to save mankind from Satan’s evil embrace and bring the Christians to Paradise (Durant, 2009). Further, it is basically similar to clarity of language communication messages within my culture group and within the other person’s culture. Both Muslim and Roman Catholic groups use similar body language to show how one feels. Both groups comfortably communicate information within their own group. Muslims use the Koran during their religious discussions. On the other hand, the Roman Catholics use the Holy Bible as the center of their Christian beliefs (Durant, 2009). Furthermore, the member of one group can increase knowledge on the other group’s culture (Lustig & Koester, 201 3). Understanding the other group’s culture is a big step towards ensuring cooperation and camaraderie between the two different groups. Next, the members of the two different groups shall have the motivation to enhance understanding and cooperation between the two groups. Communication includes understanding (Tanova, 2010). Also, culture influences how communication is understood (Tanova, 2010). Members of both religious groups must accept the different culture of the other religious group. Instead of forcing one’s religion on the other group, one group must learn to accept the other group’s religious preferences. Forcing one’s beliefs on others equates to discrimination. Part II. Communication can be described as the transfer of messages from one person to another (Lustig & Koester, 2013). The Egyptian person uses English language to communicate with the Portuguese correspondent. The Egyptians inherit the Egyptian culture and language from their parents and grandparents. Likewise, the Portuguese person inherits the Portuguese culture from one’s own parents and grandparents. Further, language communication includes two types (Lustig & Koester, 2013). The first type is spoken communication. Most Egyptian immigrants to the United States, like me, use the English spoken language to discuss topics to the Portuguese friend. The Portuguese frien

Friday, October 18, 2019

Corporate strategy paper exam Essay Example | Topics and Well Written Essays - 2250 words

Corporate strategy paper exam - Essay Example The other companies make greater use of the vegetable oil, which result in the better shelf life of their product. 4) The other key issue is that the company's chocolates are seasoned. For example the box chocolates show the sales of almost 35% during the period of 10 weeks before the Christmas, a further 10% are for the Easter, including three million Easter eggs. Typically the company sells almost 10m in last 72 hours of Christmas. 5) Chocolates of the company are hand made this makes the process of automated packing difficult for the boxed chocolate. The other companies on the other hand like Cadburys make moulded chocolates, which makes the automated packing easier. 6) Thornton's long-term strategy included vertical integration and product differentiation. This means the top person in the company belonged to a particular family. The product differentiation apart from the taste of the chocolate was also marked by the freshness of the chocolate. the company that has made such a huge selling of their product. Also freshness has been receiving the top priority. It is these factors, which laid strong foundation stone of the company for it future growth and expansion. of Thorntons'chocolates. ... 2) Strong network of retailing stores: For any manufacturing company the most crucial requirement is the excellent network of franchisee. Thornton' has its own retailing outlets, hence there is much more lesser dependency on external marketing strategy or the franchisee. 3) Freshness of the chocolate: Freshness of the product is the distinctive feature of Thorntons'chocolates. However, since the demand of company's chocolates is seasonal this puts extra pressure on requirement of the manpower during the peak season. The requirement of casual staff for packing purposes increases which leads to reduction in efficiency. Also the sales during peak season become almost ten fold hence there is requirement of extra staff at the retail stores also during the peak season. This makes the company more dependent on the casual staff. The casual staffs are quite expensive and it is not easily available. As it is the requirement of the casual staff in general in the market is more during the festive seasons. Also the casual staff is untrained, hence it has to be trained, which requires some of the resources of the company. The casual staffs have lower speed of working thus reducing the efficiency. The other critical issue is that the chocolates have lower shelf life, this makes it difficult for the company to sale the chocolates through alternative retail outlets like the garages, super markets and small shops. This reduces the market of the company, which could help the company during off peak periods. 4) Company's chocolates are seasonal: The maximum sale of the chocolates manufactured by the company is during seasons like Christmas and Easter. Now the company has a huge manufacturing infrastructure. It also has wide

Strengthening Desirable Behavior Essay Example | Topics and Well Written Essays - 500 words

Strengthening Desirable Behavior - Essay Example First of all, it calls positive attention to students for meeting behavior expectations. This shows that the teacher is noticing when students do and do not conform to the expectation, and that a reinforcement will be offered to those who meet it. Also, verbal praise is immediate in nature. Students do not have to wait days to learn what the teacher appreciated about their contribution. Next, verbal praise is highly adaptive and specific. It can be used in a variety of academic and behavioral situations, and tailored to a precise individual student (Marzano, Pickering, Arredondo, Blackburn, Brand, and Moffett, 1992, p. 8). 2. Students who arrive to class on time may receive an activity reinforcer to strengthen their positive behavior. For example, all students in the 5th grade who are complete a whole term with no tardies can get a simple reward, such as a 20-minute mixer in a common area, inside the school or outside, where they can have a cookie, some juice, and some relaxing conversation for a short time as a reward for the diligence in getting to class on time. 3. Encouraging students to turn in assignments on time can be accomplished by using public display of good work. Teachers can group students within a class, or track the progress of one class against others, using a graphic display that shows how successful each class is in getting its assignments in on time. 4.

Thursday, October 17, 2019

1) Unit of work for listening and speaking skills for ESL primary Essay

1) Unit of work for listening and speaking skills for ESL primary Enlish classroom. 2) An stating the rationale, theoretical principles, reflection for th - Essay Example Not all aspects of the text chat and face-to-face environments are similar. In text chat, it is possible for several participants to participate simultaneously. This unit is designed for the pupils of primary level around the age of 10 years. This unit contains some dialogues, narratives and some interesting and absorbing exercises for enhancing listening and speaking capabilities of pupils. The topic of unit is quite interesting. The unit revolves round the unlucky Friday 13th. It focuses on the superstitious aspect of western culture. The topic of unit not teaches language skills but it also introduces non-native pupils to the culture of the western society. The unit theme is quite absorbing and motivating. Pupils would automatically try to speak about the unfortunate incidents took place in the life Emily on that unlucky Friday. A lesson plan is a comprehensive and predetermined schedule of every activity of teacher in classroom for achieving optimal results. A lesson plan can be of many forms and types. It usually depends on time span, style of educator and type of subject to be taught. But the basic and main objective of any type of lesson plan is to provide teacher a pre-planned line of action for presenting materials and interacting with learners. The lesson plan should not be merely a action plan but it should provide a useful link between objectives of curriculum and material to be taught. Motivate students by telling them about the poor Emily who faced lot of hardships on unlucky Friday. Tell the students background of Friday 13th that is considered unlucky. Tell them how much hardships she faced on that particular day but how boldly she faced them. Encourage students to be bold if such situation may arise in their daily routine. It will create intimacy with the character. Tell the students the how important is listening for correct speaking. Tell them

The Affordable Care Act (frequently known as Obamacare) Essay

The Affordable Care Act (frequently known as Obamacare) - Essay Example The Affordable Act provides improved opportunities for the already insured citizens and offers affordable plans and healthcare services for those who have been uninsured up till now. Extension of Medicaid services in conjunction with the Child Health Insurance Plan (CHIP) and addition of new reforms improves the availability of health services to families and for individuals. Medicaid is a health program that provides health coverage to children, pregnant women, parents, seniors and disabled individuals. The Affordable Act reaches out to treat the States of America equally and simplifying the enrolment for the families and individuals. Under the Title II, Subtitle B, Section 2101, 2102 â€Å"Enhanced Support for the Children’s Health Insurance Program† is focused in improving the federal budget for the health services provided to the children (U.S Department of Health & Human Services). This includes the increase in federal financial participation for the Child Health Insurance Program and technical corrections. The Affordable Act also focuses on the simplification of the CHIP enrolment plan through Medicaid according to the Title II, Subtitle C, Section 2201, 2202 (U.S Department of Health & Human Services). This reform allows the hospitals to make presumptive eligibility determinations for ass Medicaid eligible populations and simplifies the enrolment and coordination with the State Health Insurance Exchanges (U.S Department of Health & Human Services). The extension of Child Health Insurance Plan allows a new group of children to become eligible for the health care services which is a good source of preventive medicine and public health support for the children. The health plan provides the services of vaccinations, routine check-ups, emergency room visits, dental care, laboratory and X-ray facilities and inpatient and outpatient hospital care. The Affordable Act introduced by

Wednesday, October 16, 2019

Dangerous Virus of the 21st Century Dissertation

Dangerous Virus of the 21st Century - Dissertation Example It has also to be appreciated that the virus is even a health risk to the researchers and this may account for the seemingly almost absence research on finding either its cure or treatment. All in all, it can be said that even though the disease is fairly widely known among the medical community, the general public appears not to have enough information and this was clear during the recent outbreak. Going forward, it will be interesting to note the efforts that will be directed towards the disease in the coming months and years given that the latest Ebola outbreak appears to have come under control. The outbreak of Ebola virus in parts of West Africa, and specifically Liberia, Sierra Leone and Guinea surprised the world and filled people with fear. This is because, for the first time, the scale of the outbreak was simply unprecedented (Bradford, 2014, Close, 1995). Many people like never before were affected and killed by the virus, and within days, it had captured the attention of the world. According to several studies, Ebola virus can first be traced to an outbreak in 1976 which affected Sudan and former Zaire (now the Democratic Republic of Congo or simply DRC) (CDC, 2015, Bradford, 2014 and Cohen, 2001). The name Ebola came from the Ebola River which is found in the DRC (Cohen, 2001). Ebola is a viral disease, popularly known as Ebola Hemorrhagic Fever. It is fatal if left untreated, and fatalities can reach up to 90 percent of the cases (Close, 1995). The most important fact is that Ebola has no known cure and can only be managed by ensuring that the patient is hydrated as it involves a lot of loss of the body fluids. Ebola outbreaks in the past have mainly been confined to rural areas where populations are mostly sparse. This is perhaps why the previous outbreaks were easily contained after a few deaths (Centre for Health Protection, 2014).

The Affordable Care Act (frequently known as Obamacare) Essay

The Affordable Care Act (frequently known as Obamacare) - Essay Example The Affordable Act provides improved opportunities for the already insured citizens and offers affordable plans and healthcare services for those who have been uninsured up till now. Extension of Medicaid services in conjunction with the Child Health Insurance Plan (CHIP) and addition of new reforms improves the availability of health services to families and for individuals. Medicaid is a health program that provides health coverage to children, pregnant women, parents, seniors and disabled individuals. The Affordable Act reaches out to treat the States of America equally and simplifying the enrolment for the families and individuals. Under the Title II, Subtitle B, Section 2101, 2102 â€Å"Enhanced Support for the Children’s Health Insurance Program† is focused in improving the federal budget for the health services provided to the children (U.S Department of Health & Human Services). This includes the increase in federal financial participation for the Child Health Insurance Program and technical corrections. The Affordable Act also focuses on the simplification of the CHIP enrolment plan through Medicaid according to the Title II, Subtitle C, Section 2201, 2202 (U.S Department of Health & Human Services). This reform allows the hospitals to make presumptive eligibility determinations for ass Medicaid eligible populations and simplifies the enrolment and coordination with the State Health Insurance Exchanges (U.S Department of Health & Human Services). The extension of Child Health Insurance Plan allows a new group of children to become eligible for the health care services which is a good source of preventive medicine and public health support for the children. The health plan provides the services of vaccinations, routine check-ups, emergency room visits, dental care, laboratory and X-ray facilities and inpatient and outpatient hospital care. The Affordable Act introduced by

Tuesday, October 15, 2019

Nuclear Technology and Countries of the Persian Gulf Essay Example for Free

Nuclear Technology and Countries of the Persian Gulf Essay Nuclear energy has been used widely only for thirty years . In sixtieth it was an exotic source of power, researched by scientists, and widely discussed in press. Nowadays, as Ilan Lipper Jon Stone state in their article about nuclear powers and society, it is the second largest energy source in the U. S. There are more than 110 nuclear plants throughout the U. S, and they produce more energy than hydropower, oil or gas, researchers write. For the U. S nuclear energy became a cheap and relatively safe source of energy, and many countries decided to adopt American experience in this field. Today most European and Asian countries have nuclear plants that provide them with energy. Nevertheless, a question emerges which is whether it is safe to grant access to nuclear powers to countries of the Persian Gulf, like Iran, who are known for being aggressive and searching for the means to get weapons. Politicians and usual people all over the world are discussing this question. Their main fears are that nuclear power in wrong hands may be transformed into weapon, and thus harm the ecology severely. Discussions take place all over the world about the influence of nuclear power plants on the ecology. Some say that they are not safe, even when nuclear powers are used only as a source of energy, and not as a weapon. The thing is that nuclear power plants use radioactive materials like uranium and plutonium to produce energy, and there are toxic wastes left, the authors of encyclopedia entry on renewable energy source on NationMaster, a large statistical data source claim. They add that the results of one significant radiation leakage accident on Yucca Mountain were disastrous; so people should be really very careful when using nuclear energy as the source of electricity. In the same time, Ilan Lipper Jon Stone prove that the dangers of using nuclear power are overestimated. They state that unlike the wastes that stay after burning of coal, which stay toxic forever, nuclear wastes toxicity reduces with each passing day, as its elements are not stable. They prove that the amount of toxic wastes thrown into the air each year is less in the countries where nuclear plants are the main source of electricity, than in the countries where there are few or no nuclear plants. It is clearly seen that nuclear power is a very effective source of energy, and the damage it does to ecology in normal conditions is less than that of burning coal, or other means of getting electricity. Nevertheless human factor should not be forgotten. One serious human mistake is enough to let the effective and relatively safe nuclear power lead to disastrous consequences. In case an uncontrollable chain reaction emerges on the nuclear power plant, thousands of acres of lands and thousands of tons of water would be polluted, and the health of thousands of people would be damaged. The problem with nuclear power is that it is too powerful. When used correctly it can let governments save billions of dollars, as the energy produced by nuclear power plants is relatively cheap, and protect the environment from negative influence of toxic wastes other methods of getting electricity produce, but one mistake with nuclear power can lead to unpredictable and very serious consequences. Another serious problem with using nuclear power for producing energy is that the elements used for it can also be used for creating nuclear weapon. Human beings have always been at war with each other, and since prehistoric times they have been inventing more and more accomplished methods of murdering each other. On the present moment nuclear weapon is one of the most effective ones, along with bacteriological weapon. Nuclear weapon was used only two times in history, on Japanese cities Hiroshima and Nagasaki in 1945. It slaughtered all the dwellers of these cities, and polluted the area so that people could not live there. More than sixty years passed, and still no one lives in these places. The consequences of using nuclear weapon were so disastrous and cruel that humans finally understood they had to stop. Most countries signed various agreements stating that they would not use and produce nuclear weapons. Still many countries have nuclear powers, either officially on non-officially, but no one comes to the scratch to use them. Everyone understands that the first bomb dropped will became the end of the world we all live in. Nuclear weapon is so powerful that dozen bombs dropped can slaughter several millions of people, depending on bombs’ sizes. The country which became the target of the nuclear attack will fight back with nuclear weapon murdering people and making land unfit to live on. That is why the issue of giving nuclear power to aggressive countries like those of the Persian Gulf is so debatable. The leaders of these countries state they need nuclear power in order to make the life of their people better, enhance their economy and protect ecology. For example, Iranian scientists prove that the oil and gas resources Iran has are not enough for satisfying the countries need of electricity, as the plants that recycle them to get electricity are out dated, with tons of equipment broken. The article published in Herald Tribune states that the demand on electricity is getting bigger with each passing year, and using non-renewable resources like oil for satisfying it is not rational, and, moreover, dangerous for the country’s ecology. They add that 57 of 60 oil fields need major repairs and modernization in order to produce enough oil to satisfy the demand in electricity. In general their viewpoint is easy to understand, as they want to use the cheap and relatively safe method of getting electricity most European and American countries use. In the same time Iranian aggressive politics towards other countries makes everyone suspect that they can use nuclear powers in purposes other than producing electricity. Giacomo Luciani, the Director of Gulf Research Center, states in his article â€Å"The Gulf Countries and Nuclear Energy† that the resources of oil are scarce in Bahrain, Kuwait and Oman. He proves that soon there will not be enough of oil there to satisfy the existing demand in electricity. He adds that the restrictions USA and its allies impose on Persian Gulf countries in the issue of nuclear energy put their industries from adequate development. Luciani reminds that there are some industries within these countries, like aluminium smelting and water desalination that are of crucial importance to this region, and to other countries. His viewpoint is that given that Persian Gulf countries are gradually becoming industrial ones it is not rational to deprive them of the means to get cheap electricity, which is essential for all industrial fields. â€Å"The key to success is exactly in viewing nuclear technology as an economic, not a political or security choice. † – says Luciani. Nevertheless, given the political situation in this region the question of granting access to nuclear power cannot be viewed as an economic issue only. Some of the leaders of these countries are too ambitious to be satisfied with current situation. Of course most people who vote for creating nuclear power plants in Iran, Dahrain and other countries of this region in fact want to provide electricity. Their goal is to help develop industry in this region, in order to provide well-being to its dwellers. Meanwhile one person in power who desires control would be enough to create nuclear power plants to security threat. There are no warranties that the leaders of these countries will not be able to access nuclear power plants, as their powers in their countries are almost unlimited. In addition, terroristic groups functioning in Persian Gulf region should not be forgotten. Terrorists are people who are ready for anything to reach their goals; murdering thousands of people is not an ethical problem for them; again, there is no warranty they will not be able to access elements used for nuclear reactions on plants producing electricity. Nuclear energy is a relatively safe and cheap source of electricity nowadays. Most American and European countries use it. Some economists see nuclear plants as a universal solution for satisfying the demand in electricity. Meanwhile there are aspects about nuclear energy that have to be considered when using it. Using nuclear power may be dangerous, as an uncontrollable chain reaction may occur, and lead to nuclear explosion. In the same time the danger exists that nuclear powers may be used to create nuclear weapons. This fear is one of the main obstacles for giving Iran and other countries of the Persian Gulf access to nuclear powers. Researchers prove it would be beneficial for their economy, but, given the current political situation in that region, the decision cannot be the purely economical one. At the moment giving nuclear powers to Persian Gulf countries is too dangerous for the well-being of all the people in the world. References 1. Lipper, I. , Stone, J. (1998). Nuclear Energy Society. Earth and Society Interaction Project. Retrieved January 3, 2008 from http://www. umich. edu/~gs265/society/nuclear. htm 2. Luciani, G. (2007). The Gulf Countries and Nuclear Energy. Gulf Monitor, 6(20-23). Retrieved January 3, 2008 from http://www. grc. ae/data/contents/uploads/Gulf_Monitor_no_6_3450. pdf 3. Renewable Energy Source. (2005). Nation Master Encyclopedia. Retrieved January 3, 2008 from http://www. nationmaster. com/encyclopedia/Renewable-energy-source#Is_nuclear_energy_renewable. 3F 4. Sahimi, M. , Mojtahed-Zadeh, P. , Afrasiabi, K. L. (2003, October 14). Energy : Iran needs nuclear power. International Herald Tribune. Retrieved January 3, 2008 from http://www. iht. com/articles/2003/10/14/edsahimi_ed3_. php

Monday, October 14, 2019

Relationship Between Goals and Objectives

Relationship Between Goals and Objectives Goals and the objectives are included as parts of the process. What a company expects to accomplish throughout the year is described by goals and objectives. These goals and objectives are essential to the company as a whole, departments, employees and customers. Once the company reach certain goals, it is typically struggle for even loftier goals. Goals and objectives pressures to get a communication in the company, so all the staffs in the company can work in synch in achieving them. Goals are realistic,specific and measureable. Business policies are usually show the ways which facilitate the ability of a company or organization to reach predetermined objectives formulated by top-level management. Business policies are the endpoints related with plans designed to reach company goals. Both policies and business objectives maybe added into plans as determined by a business organisation. The objective is the end to a plan and policy is served as a mode and manner used to reach each ob jectives. Those are the relationship between goals, objectives and policies. Referring to the case study, the Scotia Airways objective is to introduce the flight to major European tourist destinations and goals is to expand the major business centres in Eastern Europe and the Middle and Far East. In order to accomplish those goals and objectives, Scotia Airways try to change its policy which can make Scotia Airway to successfully expand and compete in a challenging market. To effective managerial performance, keep moving the Scotia Airway with this present managing system and need to be more formal and precise than the present. The main principle of Open System Theory The main principles of the open system is that many environmental changes and influences that impacted the efficiency of organisation. It means the newfound belief that all organisation are perfect in part because of the unique environment in which they operate and that they should be structured to accommodate unique problems and opportunities. All in all Open system is try to live in or struggle to the effect or sudden change of the surrounding or environment. In this case study, Scotia Airway going to expand into international Airlines from domestic markets, thus the current managing system will be changed soon and the requirements of skillful new workers who can control the international airlines and the current staffs might be fired or replaced their seats by them. This is the effect on the change of the organisation. The another example is that the government of EU and UK government relax their control over the licensing of airline provision. When the situation is changed or it comes like a huge chance or Scotia Airways, the airline decided to expand their destinations from covering eight destinations. This can be called the change according to the change of situation or environment. The main differences between the formal and informal organisation within Scotia Airways The differences between the formal organisation and informal organisation can be seen obviously. The formal organisation consists of the formally recognized and established statues of the members. The relationship between the members is more a status relationship than a personal relationship. The informal organisation consists of role rather than statuses. The relationship between the members is more a personal relationship or role relationship than the status relationship. There is authority in formal organisations hence there is super ordination ad subordination. Individuals are valuable because of their status and prestige. A leadership can be found in formal organisation hence dominance and submission can be found. The roles and esteem of individuals are valuable. Formal organisation may have long history of their own. Informal organisations are not comparatively more inflexible. It is not easy to bring change in them for example it is difficult to bring change or amendment in th e constitution. Informal organisations are more flexible. There is no rigidity there. Changes can be bought forth easily. It require only the change in attitudes of the members. Referring to the case study, Scotia Airway is planning to expand and new staffs are going to be appointed. There will be informal organisation and informal organisation during the change. If the old staff afraid to do new tasks, they are going to be left behind and all the old staffs might be in a group and will be formed as an informal group. In the other hand, the new staffs combine and together and finally a formal group will be found. Four primary stakeholders of Scotia Airways The primary stakeholders of the Scotia Airways are shareholders, suppliers, government and competitors. They do interest in and influence on the organisation. à ¯Ã¢â‚¬Å¡Ã‚ · Shareholders Shareholders have authority in the organisation and they interested every single action of the orginisation does because when the organisation gain a profit, the shareholders can earn moneys and verse versa they invest a lot of money into the organisation. So the shareholders need to know whethere the organisation get profit or facing with failure and get loss. à ¯Ã¢â‚¬Å¡Ã‚ · Suppliers For the suppliers, they also take part in a list who interested company the most. Scotia Airway use the aeroplanes provided by suppliers. They need to know whether the company still using their products planes or using the others. Although they interested in the organistation, they don’t have any authority on the organisation. à ¯Ã¢â‚¬Å¡Ã‚ · Government Government is placed at the top of the list which is the collection of people who interested in to theorganisation. The government do interest the company because he is the most powerful person who has authority and even he can shut down the company or to make improve. If the organization earns profits, he can collect tasks from the organistion. à ¯Ã¢â‚¬Å¡Ã‚ · Competitors The competitors also tracing and listening the news of one of its competitors, the Scotia Airway. They need to focusing on the Scotia Airways about its news such as promotions, services etc. They don’t have any authority to the Scotia Airways. Control Strategy After drawing up preliminary plans for the expansion, the management team of Scotia Airways is needed to track whether the desired result will be come out or not. Strategic controls help analyzing the Scotia Airways and its ability, strengths and opportunities. The four kinds of strategic controls are premise control, implementation control and special alert control. à ¯Ã¢â‚¬Å¡Ã‚ · Premise control It is based on an assumed premise of how things will take place in the future. It allows the Scotia Airways to inspect whether this assumption still holds true when the plans are being built as action. That may be influenced by environmental factors such as inflation, interest rates, social changes or by industry factors of competitors, suppliers and barriers. These controls can adapt the strategy accordingly when changes of premise occurred. à ¯Ã¢â‚¬Å¡Ã‚ · Implementation control Not to do the adjustment to the strategy, implementation control has to be used. The two basic forms of implementation control are monitoring strategic trusts and doing milestone overviews. The former can be used in order to gain market share from planning and the latter for conducting a full-scale assessment of Scotia Airways. à ¯Ã¢â‚¬Å¡Ã‚ · Special alert control The mechanisms are required in place to assess the position of Scotia Airways in the case of sudden events such as natural disasters. It allows to reconsider the relevancy of the plan or strategy in light of new event. Bibliography Carpenter, M., Bauer, T., Erdogan, B. (n.d.). The nature of goals and objectives. Retrieved from 1. http://www.catalog.flatworldknowledge.com/bookhub/5?e=carpenter-ch06_s01 Organisation theory. (n.d.). Retrieved from 2. http://www.referenceforbusiness.com/small/Op-Qu/Organisation-Theory.html Williams, J. (n.d.). Control Strategy. Retrieved from http://www.yourbusiness.azcentral.com/four-types-strategic-control-24352.html MULLINS, L. (2010). MANAGEMENT ORGANISATIONAL BEHAVIOUR (NINTH ed.). PEARSON.

Sunday, October 13, 2019

Roll of Thunder, Hear my Cry :: Roll of Thunder Hear My Cry Essays

Roll of Thunder, Hear my Cry An important idea in the novel "Roll of Thunder, Hear my Cry" written by Mildred D Taylor is racism. This idea is important because it tells us how life was in the 1930s for a little black girl who matures with racial conflict around her. "Roll of Thunder, Hear my Cry" is about a young, black girl, Cassie Logan who tries to understand with her family, why the blacks are different to the whites. Cassie, the narrator leads us through all the disaster and trouble that her and her family have been through in relation with the white folks in Mississippi. The first example that shows racial conflict between the blacks and whites is the Jefferson Davis School bus, which is full of white children. Blacks do not have a bus so Cassie and her brothers have to walk to school. However, each morning the children would be threatened by this bus, "a bus bore down on him spewing clouds of red dust like a huge yellow dragon breathing fire". This is surely because of racism. The whites in the bus seem to find it amusing with "laughing with faces" to see the black children run for their lives. Another example is the incident Cassie takes a trip to Strawberry to the market. There she is made to apologize to Lillian Jean Simms (a white girl) for bumping into her. Cassie does not like to get pushed around and she stands up for herself. She says, "I ain't nasty, and if you're so afraid of getting bumped, walk down there yourself" to Lillian Jean after she is told to "get down in the road". This example tells us how the whites can tell the black people to do whatever they want them to do. In return, the black person would do what they are told but Cassie is strong and stubborn, and she refuses until her Big Ma tells her to apologize. Overall, life in the 1930s for the black people was very difficult as they were pressured and pushed around as if they were animals.

Saturday, October 12, 2019

Breakwater Essay -- Marine Infrastructures

Conventional breakwaters are massive in size and generally associated with large scales in construction materials, effort and cost. The development of large breakwater schemes with poor design and management may trigger a number of adverse effects on neighbouring coastal environment, e.g. large amount of wave reflection, alteration of beach morphology, water quality deterioration and change of marine ecosystem. To alleviate the above problems, various ingenious designs of light-weight breakwaters have been proposed, tested and constructed in the past as alternatives to the conventional breakwaters, one of which is the free surface breakwaters. Free surface breakwaters are essentially barriers located near the water surface where the energy flux is maximal. The total height of such barriers is usually far smaller than the water depth which helps water circulation around the structures. These barriers can be constructed on a group of piles driven into sea floor, or held floating as floating breakwaters. Wave reflection and dissipation are the primary energy damping mechanisms inherited by these barriers. Free surface breakwaters are most suitable to be built at semi-protected sites where the soil condition is poor. The present investigation is motivated by the construction of bottom-mounted semicircular breakwaters in Miyazaki Port (Japan), Tianjin Port (China) and Yangtze River Estuary (China) for sea defence. Extensive studies on such breakwaters were undertaken by several researchers from Japan, China and India, e.g. Tanimoto et al. (1989), Sasajima et al. (1994), Xie (1999), Dhinakaran et al. (2002), Yuan and Tao (2003) and Zhang et al. (2005). Although a number of studies have been reported in the literature associated with... ...hat comprise a large number of discrete constituents for energy dissipation. Examples of such breakwaters are multiple-layer breakwater (Wang et al., 2006) and porous-pile breakwater (Hsiao et al., 2008). These structures are usually highly porous to water flow, resulting in relatively small wave reflection and the horizontal wave forces on the structures. One of the major concerns in the design of marine infrastructures is the navigation safety adjacent to the breakwaters. In many cases, it is important to keep the amount of wave reflection in front of the breakwater to the minimal. The majority of the abovementioned breakwaters mainly serve as wave reflectors. It is hoped that the free surface semicircular breakwater considered for the present research would yield better performance characteristics by producing low reflection and desirable wave attenuation.

Friday, October 11, 2019

Ida Jean Orlando Essay

Ida Jean Orland was a first- generation American of Italian decent, born 1926. She received her diploma in nursing at New York Medical College in 1947, Bachelor of Science in Public health from St. Johns University in Brooklyn, New York in 1951 and her Master of Arts Degree in Mental Health Nursing from Columbia University. Orlando was an associate Professor at Yale School of Nursing, and while there she served as the Director of the Graduate Program in Mental Health Psychiatric Nursing. She was the project investigator of a National Institute of Mental Health grant entitled Integration of Mental Health Concepts in Basic Nursing Curriculum. In 1961, Orlando published her theory, The Dynamic Nurse- Patient Relationship and in 1972 The Discipline and Teaching of Nursing Process. She has served as a board member of Harvard Community Health Plan. Her theory is explanatory and straightforward, she believes that the role of the nurse is to find out and meet the patients immediate need for help. She describes nursing as it is, the nurse is responsible for gathering all the information directly from the patient and making decisions based on this information. We as nurses are the Care Plan that we develop, however, we must always be aware that situations change and we must be able to adapt to the change immediately and come up with other ways of treatment without allowing it to interfere with the quality of care that the patient is receiving. She directly states definition of nursing that can summarize the theory provided by Ida Jean Orlando. â€Å"All patients behavior can be a cry for help, both verbal and non-verbal. It is up to the nurse to interpret their behavior and determine the needs of the patient†. Nursing differs from medicine according to this theory because based on Orlando’s theory; everything we need to know to provide the best care to the patient is received directly from the patient. Usually with medicine, we use textbook information and trial and error, however, according to the theory  of Orlando, it is the nurse’s job to collect all the information directly from the patient and interpret it on our own to provide quality care. Orlando’s theory definitely relies on the content/knowledge of nursing. It is clearly stated that it is the nurse’s job to use their perception, thoughts about the perception or the feeling engendered from their thought to explore with patients the meaning of their behavior. This process helps the nurses find out the nature of the distress and what help the patient needs. It is the knowledge of the nurse that is being relied on for the best care. Ida Jean Orlando theory Deliberative Nursing Process was developed in the late 1950’s from an observation she witnessed involving nurse and patient interaction. Orlando’s Deliberative Nursing Process is based on and involves the patient’s behavior and nurse’s reaction. In most cases the patient will exhibit certain behaviors both verbal and nonverbal as a plea for help . The role of the nurse is to find out and meet the patient’s immediate need for help. The four major concepts of the metaparadigm, the person, environment, health and nursing collectively are one with Orlando’s Theory Stages Assessment, diagnosis, implementation, and the goal. Together they provide the nurse with the data needed to accurately assess and serve the patient. Ida Jean Orlando uses an assessment as a tool when collecting subjective and objective data in relation to the person/patient hence allowing the nurse to notably assess the disease process. The assessment stage enhances the nurse ability to analyze and interpret the behavior and determine the needs of the patient. The assessment is done without reason. The health of the individual is closely evaluated to determine the patient needs. During the diagnosis stage the diagnosis can be confirmed using links to classify the characteristics, related factors, and risk factors found in the person/patients assessment .The behavior of the person as well as the disease is well thought-out in this process. The nurse then uses clinical judgment regarding health dilemmas, tackling each one individually. The environment is an important part of this process. It influences the  individuals external as well as the internal aspect of life and well-being. After gathering the diagnosis, interventions can be implemented to help accomplish the goals. In this stage we put everything into action allowing us to carry out the care plan that was created using Orlando’s theory. The nurse is now able to assess whether the person have achieved their goals. Often times the complete set of goals are not met, however Orlando’s theory is adjustable. Orlando’s theory is universal allowing the nurse to be flexible. It’s also easily adapted when providing service to different person/patients with different diagnosis. With the mutual aid of the person/patient and the deliberate actions of the nurse, the goal put in place by the nurse is attained. Every deed of a nurse has significance. Ida Jean Orlando Theory focuses on the Dynamic Nurse-Patient relationship. Even though the theory focuses on the communication between the nurse-patient relationships, it makes it clear that the nurse is to assume that the patient’s communication is a plea for help and must be taken as is. This dictates that the primary focus is on the dynamic relationship but does give a secondary focus on the nurse as the modifiable component. The theory in itself is clear and simple. It describes the interaction between the nurse and patient in a certain time and place and follows a sequence until the patient’s problem is resolved. The sequencing of events results in its clarity. All of the primary duties of a nurse involve interacting with the patient, meaning that Ida Jean Orlando’s Dynamic Nurse-Patient Relationship Theory can applied in almost any setting. Whenever a patient interacts with nurse, the theoretical model can be applied. It does not need any special tools nor does it require a specific setting. It is derived from the patient, as a whole, interacting with a nurse as a whole. It stages the interaction to happen in a specific sequence. It places special emphasis on the nurses’ role on perceiving the patient behavior and interpreting it beyond its superficial affect. It deals with the immediate context and attempts to find the most complete resolution of the situation. It theory is built on the examination of over 2000 Nurse-Patient interactions. Her theory has led to deliberative consequences for nurses. It sets principles that have become ingrained in nursing education. It is the principle set on how a nurse’s role should be active rather than passive in a nurse’s interaction with a patient. It is set to give structure to a nurse’s role of performing ongoing assessments with validated results, to treat a person as a whole with feedback as reassurances of her actions and to achieve role and problem clarity so that the patient understands his or her own problems that may have been hidden from his or her own perception. Ida Jean Orlando’s theoretical is ingrained in all aspects of nursing interaction. It has also been codified in some fields as a standard of practice. When giving medication to a patient, we nurses must explain the medication, its expected effect, purpose, and its possible side effects. It is then standard practice to make note of its actual effect and react to that effect. It is logical, active, and directly follows the model. It is most important with pain medication. The patient may over exaggerate, misplace direct cause, or maybe misinterpret the pain. To the patient, pain is simply pain. It is the nurse’s role to accept the patient’s complaint and internally analyze it. Using the nursing discipline, decipher the superficial plea in order to see any underlying cause, react appropriately until the underlying cause is exposed and treated. Her theory serves as the basis for any interaction with a patient, arguably, for every health professional. As an emergency room nurse, we are encouraged to process patients efficiently and with haste. Patient interaction is, however, valued for its quality. We are expected to treat the patient’s most immediate concerns while looking for underlying agitators so that treatment can be administered efficiently. Unfortunately, in a fast pace environment, there may be no time to interpret and internally analyze a patient’s behavior or get their reaction to a certain treatment. Stabilizing and to processing a patient with an unfortunate consequence of diminished patient interaction quality as a frequent casualty. Without Orlando’s theoretic model, patients become numbers, treated by their symptoms rather than being treated like a person, without it we would end up dehumanizing patients. References Alligood, M. R., & Tomey, A. M. (2010). Nursing Theorist and Their Work seventh edition. Maryland Heights, MO: Mosby. Ida Jean Orlando- Nursing theorist. (2011). Retrieved October 12, 2013, from Nursing- theory.org website: http://nursing-theory.org/nursing-theorists/Ida-Jean-Orlando.php Nursing theories a companion to nursing theories and models. (2013, September 9). Retrieved October 6, 2013, from Current nursing website: http://currentnursing.com/nursing_theory/Orlando_nursing_process.html Orlando, I. J. (1972). The discipline and teaching of nursing process: An evaluative study. New York: G. P Putnam. Orlando, I. J. (1990). The dynamic nurse-patient relationship: Function, process, and principles. New York: National League of Nursing. Orlando’s Nursing Process Theory. (2013, September 9). Retrieved October 12, 2013, from currentnursing.com website: http://currentnursing.com/nursing_theory/Orlando_nursing_process.html Parker, M. E. (2005). Nursing Theories and Nursing Practice second edition. Philadelphia, PA: F.A. Davis Company.