Saturday, August 31, 2019

External and Internal Environmental Analysis Essay

â€Å"Environmental scanning is the internal communication of external information about issues that may potentially influence an organization’s decision-making process† (Albright, 2004, p. 34). For organizations like Fresenius Medical Care, a worldwide company, the awareness of external environmental factors is vital to maintain competitive on the dialysis industry. Even though there are multiple external factors to analyze, in recent years the government works as an element of change on the medical industry with the biggest health reform in United States history. The health reform will affect the way Fresenius makes business because the company needs to adapt the new payments-per-service coverage and sustain quality of service as well as profitability. External Environmental Scan Remote Environment â€Å"The remote environment comprises five factors that originate beyond, and usually irrespective of, any single firm’s operating situation: economic, social, political, technological, and ecological factors† (Pearce II & Robinson, 2012, p. 87). The organization has no control or regulation over these factors. The remotes environmental factors influence the way Fresenius Medical Care offers dialysis services, especially the economic and political factors. The economic factor describes the organization awareness of the â€Å"general availability of credit, the level of disposable income, and the propensity of people to spend† (Pearce II & Robinson, 2012, p. 87). Fresenius target market is end-stage-renal-disease patients with health care insurance. The economic factor will affect Fresenius target and the ability to pay for dialysis treatment and medications. The â€Å"political factors define the legal and regulatory parameters within which firms must operate† (Pearce II & Robinson, 2012, p. 90). A good example of political factor is the Obama Care Law or Patient Protection and Affordable Care Act. The president Barak Obama signs the law in 2010 with the purpose of providing accessibility to affordable medical care to the Americans and to reduce the government expenses. For-profits entities like Fresenius Medical Care have to adapt the new regulations and create a strategic plan to avoid the potential reduction on profit. Industry Environment â€Å"Industry environment is the general conditions for competition that influence all businesses that provide similar products and services† (Pearce II & Robinson, 2012, p. 97). There are five forces that Michael E. Porter, a Harvard University professor, uses to describe the industry competition (Pearce II & Robinson, 2012). These forces are entry barriers, supplier power, buyer power, substitute availability, and competitive rivalry (Pearce II & Robinson, 2012). Fresenius Medical Care major competitor in the United States is Davita Dialysis Center. Fresenius recognizes and study the competitor’s strategies to strength the organization. The Obama Care law affects the dialysis industry by changing the medication coverage. Fresenius competitor owns pharmaceuticals with capability to serve the dialysis patients as soon the law becomes active in 2016. Fresenius identifies the threat of substitute of the competitor and create a program that provides medications to the patients and increase the company profitability even before the law is effective. The goal for Fresenius is to enroll a 100% of patients with Medicare in Fresenius Rx program by the end of 2013. So far Fresenius is at 20% of the goal in California. Operating Environment The external operating environment seems to be closer to the firm than the remote and the industry environments. Operating environment includes the following factors: competitors, creditors, customers, labor, and supplier (Pearce II & Robinson, 2012). The proximity of these factors implies that the company may have more interaction and more awareness of the environmental changes. For example, Fresenius study the effect of the new health reform on the main competitor, Davita Dialysis, the patients, the employees, the pharmaceutical suppliers, and medication distributors. Fresenius uses this information to create new strategies and reform the internal environment. Internal Environmental Scan Strengths â€Å"A strength is a resource or capability controlled by or available to a firm that gives it an advantage relative to its competitors in meeting the needs of the customers it serves† (Pearce II & Robinson, 2012, p. 151). Fresenius Medical Care is a German company with more than 70 years of experience in the dialysis industry. The company operates worldwide and has â€Å"more than 2,100 dialysis facilities in North America† (Fresenius Medical Care, n. d. , p. 1). In addition to the experience and knowledge, Fresenius is â€Å"the continent’s top producer of dialysis equipment, dialyzers and related disposable products and a major supplier of renal pharmaceuticals† (Fresenius Medical Care, n. d. , p. 1). Another important strength is the high quality standards on the services and products that the company provides. Weakness With the strength comes the weakness. â€Å"A weakness is a limitation or deficiency in one or more of a firm’s resources or capabilities relative to its competitors that create a disadvantage in effectively meeting customer needs† (Pearce II & Robinson, 2012, p. 151). The weakness that the company confronts with the new health care reform is the pharmaceutical capability. The pharmacy should be ready to serve â€Å"hundreds of thousands of people throughout the United States† (Fresenius Medical Care, n. d. , p. 1) by 2016. Fresenius has two pharmacies that provide services to more than 2,000 facilities. The prescription delivery time fluctuates between two days and two weeks, which gives advantage to the competitors. Another weakness that Fresenius has is the pressure putting into the employees to meet the project deadlines. This pressure may cause work accidents, employees’ exhaustion or the reason for knowledgeable employees to move and work with the competitors. Competitive Position and Possibilities Competitive advantage is the â€Å"company’s unique skills and resources working to implement strategies that competitors cannot implement as effectively† (Olsen, 2013, p. 1) Fresenius Medical Care (FMC) has a competitive advantage position because the company keeps the vanguard on dialysis product innovation and quality of service. FMC is the major product provider of the competitors in United States as well. A strategic alliance between FMC and the competitors may help the industry to survive the new health care reform and the implications to dialysis treatment payments. This alliance may reduce the cost of the medications and improve customer service by delivering medications the same day of the prescription order. If an alliance is impossible, the knowledge, and experience in strategic planning that characterize Fresenius, will lead the company to a new plan to keep profitability while doing business. Other possibilities may be open more pharmacies around the United States, and diversify the medications inventory. In this way Fresenius will be able to fill any medication prescription to the patients as well as improve delivery time. Organizational Structure and Performance â€Å"Organizational structure refers to the formalized arrangements of interaction between and responsibility for the tasks, people, and resources in an organization† (Pearce II & Robinson, 2012, p. 321). Fresenius Medical Care has a traditional matrix organizational structure â€Å"in which functional and staff personnel are assigned to both a basic functional area and to a project or product manager† (Pearce II & Robinson, 2012, p. 326). This type of structure helps large companies to concentrate in projects like the creation of strategic plan to meet the government health reform and meet the company’s goal. Conclusion The external and internal environmental analysis brings information to Fresenius Medical Care (FMC) that the company uses to strengthen the company and be aware of potential treats and opportunities. For example, the external remote environment factor that influences the company’s structure is the new government health care reform or the Obama Care Law by changing the amount of payment per dialysis treatment. The external industry and operating environments analysis provide information about the competitor’s strategies in relation to the new regulations. Davita Dialysis Center represents FMC biggest competitor. Fresenius strengths are experience, knowledge, innovation, biggest producer of dialysis materials, and high quality measures. Fresenius weaknesses are the pharmacy capability, deadlines, and pressure. Fresenius uses the strength to improve pharmacy services; decrease employees work pressure, and maintain competitive, and profitable in the dialysis industry. Fresenius organizational structure helps the company to meet the company’s goals, mission, and mission. The matrix structure permits functional employees to work in special projects, perform a functional work, and meet the company’s expectations. For example, Fresenius has the Registered Dietitians working on FMC Rx (Company’s pharmacy) enrollment project and performing regular dietitian job. The dietitian reports to the manager of operations as well as the Clinical Manager. References Albright, K. S. (2004, May/June). Environmental scanning: radar for success. Information Management, 38(3), 38. Retrieved from http://www. arma. org/ bookstore/files/Albright. pdf Fresenius medical care. (n. d. ). Retrieved from http://jobs. fmcna. com/ Olsen, E. (2013). About. com. Retrieved from http://homebusiness. about. com/od/growing/a/comp_advantage. htm Pearce II, J. A. , & Robinson, R. B. (2012). Strategic Management (13th ed. ). New York, NY: McGraw-Hill Higher Education.

Friday, August 30, 2019

Analyzing Both Sides of the Conflict Theory Essay

Conflict theory was the first radical criminological theory proposed by the scholars in the 1960s (Barkan, p. 254). It particularly analyzes the role of conflicts in class, gender, and power in the incidences of crimes in a particular society. It tells that these conflicts are the reasons why people commit crimes.   This specific thought opposes the view of the consensus theory which perceives crime as â€Å"any behavior that violates criminal law† (Barkan, p. 14). To compare, Conflict theory believes that a crime is far more complex than the first definition, assuming that people do not share the same values, beliefs, and dispositions. Because of this, the conflict theory becomes one of the theories that are applicable for larger contextual conditions. In fact, the theory encompasses a wide range of areas which makes it divided into sub- categories, such as radical criminology, peacemaking criminology, radical feminism, and left realism. (Greek, 2005). These minorities—the poor, Blacks, Hispanics, to name a few—are being given focus and importance through the theory. Marx and Engels specified that justice is not attainable and is unfairly being administered to the minorities. Through the conflict theory, an explanation on why minorities get involved with crimes is provided. The theory explains that laws against crimes are made not for the interest of everyone but only for themselves. Laws are made to serve the interest of the powerful who knows that their illegal malpractices can only become legal if the laws will be made based on their needs.   This made conflict theory sounds more realistic with consensus theory. It has able to portray the problem with power struggles as a source of crime motives that other theories disregarded or missed to see. However, proponents of the conflict theory also got blinded and missed to see some of the criticisms regarding the conflict. First of all, it is said that the conflict theory is too generalized and assuming with its discussion on the implementation of laws in societies. Laws connected to the prevention of street crimes such as robbery and murder do not necessarily serve the purpose of the powerful and neglects the less powerful minorities. In fact, such kinds of laws are directed to serve the security of everyone, and not just a little percentage of the people. The theory seems to forget that although people are different in some aspects, they still posses the same characteristics and needs. In this particular situation, all people need security for their lives. The laws protecting people’s lives could not be considered as law protecting only the interests of those who are in power; it is also for the benefit of other people. In addition to this criticism, the theory of conflict also shows a weak spot in terms of labeling disparities. There has been inconsistency in the evidence of such gaps tackling how dominant groups use the law to support their personal interests. In this way, the theory, in some ways, lose slightly its credibility. Nevertheless, the greatest strength of the theory is its vast and radical way of exploring the reason behind crimes in societies. These crimes are deeply rooted in the skins of the people who commit them. Although committers of crime are being treated as lowly kind of persons, their condition is being protected by the conflict theory. The theory will simply said that instead of committers, the minorities are victims of a much bigger crime brought about by the powerful groups to them. The theory, instead of prosecuting them, is aiming to reason out their main reason why they have done such crimes. Conflict theory acts like a lawyer who defends a person who has valid reasons behind the crime he committed. The lawyer may lack reliable and consistent evidence to prove the innocence of his client, but still, he believes in the accountability of the person. References Barkan, S.E. (2005). Criminology:   Sociological Understanding.   New Jersey: Pearson Prentice Hall   Bartos, J.O.   Wehr, P.E. and Paul Wehr. ( 2002). Using Conflict Theory. New York: Cambridge University Press Greek, C.E. Criminological Theory.   November 2005. Retrieved on 4 June 2008. http://www.criminology.fsu.edu/crimtheory/conflict.htm Lenski, G.E. (1966). Power and Privilege: A Theory of Social Stratification. McGraw-Hill.   

Thursday, August 29, 2019

Business plan, Market, Analysis, Construction

The business is a family owned company. As a Managing consultant, I have been employed to assess the viabilities of these two proposals and to produce a business plan that could be presented at the bank to gain financial backing for the expansion. I was able to make an ASSESSMENT CRITERIA, which were listed below: †¢ Understanding and application of theories †¢ Correct use of terminology, techniques, etc. †¢ Relevance of examples and scenarios †¢ Quality of referencing and sourcing of material (evidence) †¢ Quality of presentation †¢ Correct structuring of the report Business Plan: Constructed â€Å"mega-projects† are readily recognizable for their form and function, and in many cases, are awe-inspiring.   Major buildings and bridges give identities to cities and nations and evoke a sense of pride in the people. â€Å"The construction industry is a vast system of engineers, architects, laborers, craftsmen, material, equipment and tool suppliers, and project owners responsible for building these structures (http://bcc.ecnext.com/)†.   The scope of the industry is all encompassing, including every type of facility imaginable.   Roads, bridges, mass transit, airports, schools, retail and commercial buildings, industrial and manufacturing facilities, drinking water systems, wastewater treatment facilities, dams and power generation, solid waste facilities, and hazardous waste treatment and disposal projects all benefit society and bolster our national security.   The construction industry seminar focused on projects and issues that have a pote ntial mobilization involvement. Executive Summary stated that, a home office in Yellowknife, NT will be established the first year of operations to reduce start up costs. The founder of the firm is a professional engineer with eighteen years of progressive and responsible experience. After the operation has started it was found out that the first year operation increased till up to 3rd year operation as well. Notice the sales amount in dollars increases as well as dollar profits together with the percent sales/profit. The firm will specialize in providing three dimensional modeling and visualization to our clients. State-of-the-art analysis and design tools will be an integral part of the business plan. Implementation of a quality control and assurance program will provide a focus for production work. The highlights of the executive summary shown in a bar graph presentation as analyzed in this manner, red bar represents which is increasing dollars from year 2000 to the year 2002. Also apple green color represents gross margin, which is also increasing order and while net profit increased in increasing order as well. Objectives were seen to have the following: Achieve 20% of market value at the end of the third year of operation. Increase gross margin to 80% by the third year of operations. Company has mission, as stated here: Our mission is to provide clients across Canada’s North with structural engineering services for all types of buildings, from concept planning through to completion, with a highly skilled professional team working together, using common sense and practical.   Key to success has developed experience as stated. Provide professional quality services on time and on budget. Develop a follow-up strategy to gauge performance with all clients. Implement and maintain a quality control and assurance policy. Company Summary: Structure All Ltd. is a new company, which provides professional engineering design services for clients that manage, maintain, and plan for residential, commercial, and industrial type buildings. Our focus will be the public sector market in remote communities across Canada’s North. Company Ownership will be, Structure All Ltd. will be created as a limited liability company. Philip D. Nolan will privately own the company. Leslie C. Goit will also be listed as a Director. Start up summary: Our start-up expenses amount to $13,000, which allows for initial legal expenses, licenses, permits, stationary, specialty software, office equipment, and furniture. In addition to these start-up costs, an initial balance of $7,000 will be placed in the company accounts. The software purchases include an allowance of $5,000 for AutoCAD ® 2000, $1,800 for National Master Specifications, and $200 for QuickBooks ® (accounting package). Total start-up expenses amounted to $13,000, which has the big values, compared to other expenses. Office equipment, other expenses and permits holder and legal service also has same amount, which is the least expenses incurred. For a company start-up summary goes this way, investments leads small amount while profit is big and the sales amount becomes big. Start-up expenses have the following: Professional Liability Insurance is $1,200, Professional Liability Insurance is $1,200, web site development is $600 and lastly business licenses are $500.So overall total an expense coincides with the total assets. Market Analysis Company Locations and Facilities We will establish a home office in Yellowknife, NT in order to reduce start-up costs. The office space is estimated to be 150 square feet. We will be installing a dedicated fax line as well as a high-speed Internet connection. An interactive website will also be developed which will serve as a marketing tool. Services Structure All Ltd. offers complete structural engineering services. We will focus on buildings with the following Use and Occupancies, like the company is project oriented where each project involves. It also offers Project Consulting, Forensic Investigations, Project Management, and Dispute Resolution. Further more it also caters Restoration Engineering, and Inspections. Describing offers services was noted to be Competitive in the sense that offers their clients superior service, implement a quality assurance and control program for all projects undertaken, systematic manner of sorting and retrieving a library of structural elements and assemblies will be implemented. The sales literature was describe to be a brochure system. Brochure inserts will be maintained as individual sheets to facilitate their assembly in any custom situation. Greatly market analysis will be describe as Structure All Ltd. will focus on traditional Architect/Engineering (A/E) contracts. The owner will usually contract the A/E to perform planning and design services. These design services include preparation of plans, specifications, and estimates. Types of project distributions were having guidelines to follow as *Architecture Design (65%). *Structural Design (10%). *Mechanical Design (15%). *Electrical design (10%) Knowing the Market Segmentation will describe as a manner the market for engineering services that is, established Architectural and Engineering firms, territorial and Federal Governmental Departments. Market analysis Pie can summarize accordingly; Service Business Analysis, Business Participants, which were describe in as much as the manner showed. The major clients within the Territorial Governments include: Department of Education, Department of Transportation, and Department of Education, Department of Transportation, Department of Municipal and Community Affairs and Department of Municipal and Community Affairs. Competition and Buying Patterns at which, pricing of projects and billing rates are surprisingly variable. In consulting at this level, it is easier to be priced too low than too high. Clients and potential clients expect to pay substantial fees for the best quality professional advice. The nature of the billing, however, is sensitive. Clients are much more likely to be offended when a job starts at $20K and ends up at $30K because of overruns, than if the same job started at $30K or even $35K. Main Competitors are Ferguson Simek Clark (FSC Group), A.D. Williams Engineering Ltd. (ADWEL), and Girvan and Associates. Conclusion: The company done a very good performance as the company executive summary showed a very remarkable achievement in the analysis. Business plan, Market, Analysis, Construction The business is a family owned company. As a Managing consultant, I have been employed to assess the viabilities of these two proposals and to produce a business plan that could be presented at the bank to gain financial backing for the expansion. I was able to make an ASSESSMENT CRITERIA, which were listed below: †¢ Understanding and application of theories †¢ Correct use of terminology, techniques, etc. †¢ Relevance of examples and scenarios †¢ Quality of referencing and sourcing of material (evidence) †¢ Quality of presentation †¢ Correct structuring of the report Business Plan: Constructed â€Å"mega-projects† are readily recognizable for their form and function, and in many cases, are awe-inspiring.   Major buildings and bridges give identities to cities and nations and evoke a sense of pride in the people. â€Å"The construction industry is a vast system of engineers, architects, laborers, craftsmen, material, equipment and tool suppliers, and project owners responsible for building these structures (http://bcc.ecnext.com/)†.   The scope of the industry is all encompassing, including every type of facility imaginable.   Roads, bridges, mass transit, airports, schools, retail and commercial buildings, industrial and manufacturing facilities, drinking water systems, wastewater treatment facilities, dams and power generation, solid waste facilities, and hazardous waste treatment and disposal projects all benefit society and bolster our national security.   The construction industry seminar focused on projects and issues that have a pote ntial mobilization involvement. Executive Summary stated that, a home office in Yellowknife, NT will be established the first year of operations to reduce start up costs. The founder of the firm is a professional engineer with eighteen years of progressive and responsible experience. After the operation has started it was found out that the first year operation increased till up to 3rd year operation as well. Notice the sales amount in dollars increases as well as dollar profits together with the percent sales/profit. The firm will specialize in providing three dimensional modeling and visualization to our clients. State-of-the-art analysis and design tools will be an integral part of the business plan. Implementation of a quality control and assurance program will provide a focus for production work. The highlights of the executive summary shown in a bar graph presentation as analyzed in this manner, red bar represents which is increasing dollars from year 2000 to the year 2002. Also apple green color represents gross margin, which is also increasing order and while net profit increased in increasing order as well. Objectives were seen to have the following: Achieve 20% of market value at the end of the third year of operation. Increase gross margin to 80% by the third year of operations. Company has mission, as stated here: Our mission is to provide clients across Canada’s North with structural engineering services for all types of buildings, from concept planning through to completion, with a highly skilled professional team working together, using common sense and practical.   Key to success has developed experience as stated. Provide professional quality services on time and on budget. Develop a follow-up strategy to gauge performance with all clients. Implement and maintain a quality control and assurance policy. Company Summary: Structure All Ltd. is a new company, which provides professional engineering design services for clients that manage, maintain, and plan for residential, commercial, and industrial type buildings. Our focus will be the public sector market in remote communities across Canada’s North. Company Ownership will be, Structure All Ltd. will be created as a limited liability company. Philip D. Nolan will privately own the company. Leslie C. Goit will also be listed as a Director. Start up summary: Our start-up expenses amount to $13,000, which allows for initial legal expenses, licenses, permits, stationary, specialty software, office equipment, and furniture. In addition to these start-up costs, an initial balance of $7,000 will be placed in the company accounts. The software purchases include an allowance of $5,000 for AutoCAD ® 2000, $1,800 for National Master Specifications, and $200 for QuickBooks ® (accounting package). Total start-up expenses amounted to $13,000, which has the big values, compared to other expenses. Office equipment, other expenses and permits holder and legal service also has same amount, which is the least expenses incurred. For a company start-up summary goes this way, investments leads small amount while profit is big and the sales amount becomes big. Start-up expenses have the following: Professional Liability Insurance is $1,200, Professional Liability Insurance is $1,200, web site development is $600 and lastly business licenses are $500.So overall total an expense coincides with the total assets. Market Analysis Company Locations and Facilities We will establish a home office in Yellowknife, NT in order to reduce start-up costs. The office space is estimated to be 150 square feet. We will be installing a dedicated fax line as well as a high-speed Internet connection. An interactive website will also be developed which will serve as a marketing tool. Services Structure All Ltd. offers complete structural engineering services. We will focus on buildings with the following Use and Occupancies, like the company is project oriented where each project involves. It also offers Project Consulting, Forensic Investigations, Project Management, and Dispute Resolution. Further more it also caters Restoration Engineering, and Inspections. Describing offers services was noted to be Competitive in the sense that offers their clients superior service, implement a quality assurance and control program for all projects undertaken, systematic manner of sorting and retrieving a library of structural elements and assemblies will be implemented. The sales literature was describe to be a brochure system. Brochure inserts will be maintained as individual sheets to facilitate their assembly in any custom situation. Greatly market analysis will be describe as Structure All Ltd. will focus on traditional Architect/Engineering (A/E) contracts. The owner will usually contract the A/E to perform planning and design services. These design services include preparation of plans, specifications, and estimates. Types of project distributions were having guidelines to follow as *Architecture Design (65%). *Structural Design (10%). *Mechanical Design (15%). *Electrical design (10%) Knowing the Market Segmentation will describe as a manner the market for engineering services that is, established Architectural and Engineering firms, territorial and Federal Governmental Departments. Market analysis Pie can summarize accordingly; Service Business Analysis, Business Participants, which were describe in as much as the manner showed. The major clients within the Territorial Governments include: Department of Education, Department of Transportation, and Department of Education, Department of Transportation, Department of Municipal and Community Affairs and Department of Municipal and Community Affairs. Competition and Buying Patterns at which, pricing of projects and billing rates are surprisingly variable. In consulting at this level, it is easier to be priced too low than too high. Clients and potential clients expect to pay substantial fees for the best quality professional advice. The nature of the billing, however, is sensitive. Clients are much more likely to be offended when a job starts at $20K and ends up at $30K because of overruns, than if the same job started at $30K or even $35K. Main Competitors are Ferguson Simek Clark (FSC Group), A.D. Williams Engineering Ltd. (ADWEL), and Girvan and Associates. Conclusion: The company done a very good performance as the company executive summary showed a very remarkable achievement in the analysis.

Wednesday, August 28, 2019

Deferred Tax Essay Example | Topics and Well Written Essays - 500 words

Deferred Tax - Essay Example My decision was based on the weight of the present evidence. The matter was whether or not there would be ample taxable income generated in the coming years by the company for the realization of the anticipated tax benefit. The benefits of forthcoming deductible amounts may be realized when the anticipated future income may be at least the equivalent of the deferred deductions. Deductions frequently reduce taxes only when they reduce taxable income. However, the company was not in such a position, and it prompted my decision. However, as a noteworthy additional fact, the allowance ought to be occasionally re-assessed. Out of necessity, alter may be altered in accordance with tax laws that limit the future utilization of deductible provisional differences. The resulting effect of the valuation allowance may also affect the projected yearly effective tax rate. Having reviewed all the positive and negative evidence available, I deduced that the company needed to create value account allowance on deferred tax assets. For instance, the company has been recently operating losses. Moreover, the anticipated situations were likely to impact adversely on future operations. The management has failed, in the past years, to implement viable strategies that would improve the company’s performance. If the company had a sturdy history of profitable and sizable operations, that would be an indication of positive evidence. In such a case, the ample taxable income would lead to a realization of the deferred tax asset. In my capacity as the accountant, I firmly believe that the management was not capable of making any turnaround in the near future. There are many managerial actions that would be taken minimize or eradicate a valuation allowance if deferred tax assets are not to be realized that the company failed to make. The tax-planning tactics encompass any

Tuesday, August 27, 2019

Ancient History of Egyptian Medicines Essay Example | Topics and Well Written Essays - 1750 words

Ancient History of Egyptian Medicines - Essay Example Egyptians are considered to be one of the few dynasties to have lived healthy lifestyles. Their average life expectancies have been estimated to be thirty to thirty six years. A few outliers could be traced to have lived more than sixty years as well. A few prominent examples include Kings Pepy II and Ramesses II (Musso, 2005). Egyptians have for long relied on prayer, magic and a jewelry which they usually hung about the neck and thought to be a magical protection from diseases to find cure of any illness present. They have never really taken diet as a source of cure. Milk products were seldom consumed as was the seeds or oil. Moreover, their belief in magic has produced effective results not because of the magic itself but the belief that it could cure illness. Ingredients were chosen because they were devised from substance, plant or animals which resembled condition of the patient. Only because of this rationale that many patients were given strong drugs which affected their heal th in a negative direction. For instance, an ostrich egg is included in the treatment of a broken skull, and an amulet picturing a hedgehog which might be used against baldness.Egyptians doctors or more commonly known as doctor cum priest-physicians were known to specialize in treating different constituents of the body, which aligned believes about different Gods governing specific parts of the body. Usually, doctors were called as ‘sunu’, which was written with an arrow-shaped symbol.

Monday, August 26, 2019

The World According to Miranda July Research Paper

The World According to Miranda July - Research Paper Example While she attended U.C. Santa Cruz only for a few years, her subsequent move to Portland, Oregon began the catalyst that would push her career forward and convince her to pursue her creative impulses as a career, whether in film, writing, performance art or music (Durbin 2005). Â  Portland was an artist-friendly location where Ms. July could flourish and grow as a performance artist. In 1996, now an experimental filmmaker, she began a project called Joanie4Jackie as a way to inspire and showcase the works of female filmmakers, soliciting short films that would then be put on videotape and distributed as a cinematic chain letter (Wenclas 2010). She later created a second collection of submitted films called the Co-Star series. The Joanie4Jackie series would eventually find a larger audience through screenings at film festivals and DIY events. Her level of creative success and the productive nature of her portfolio would continue to grow. Â  Why the newly defined focus on filmmaking? For Ms. July, the move was a natural progression as she matured creatively and understood that the power of film allows the author a unique means of expression that other creative mediums may lack. As she told an interviewer for Believer Magazine: Â  I became really interested in how much I could show this hard-to-articulate, kind of magical or somewhat ephemeral things through really worldly, grounded ways. And it just seemed like this medium was good for that. (Horowitz 2005) Â  Artistically preoccupied with the human condition, primarily the weight of loneliness and our desire to relieve that burden through some type of personal connection, Ms. July breathes life into the mundane.

Sunday, August 25, 2019

Operation management Case Study Example | Topics and Well Written Essays - 2750 words

Operation management - Case Study Example The input transformation output model reflects the transformational process where the inputs gained are transformed or converted into saleable outputs. The model reflects the feeding of inputs to a transformational box for being converted into outputs. An ideal Input-Output Transformational Model can be divided into different subparts such that each of the different subparts reflects on the different types of sub-operations that are being carried out to produce the final output (Mahadevan, 2009). Inputs generated are subjected to conversions such that they are transformed into effective outputs which are then marketed at a given rate. The input-output transformational model can be essentially reflected as under. The above model reflects on the different type of inputs that are fed into the transformational block to be converted into meaningful outputs. Each of the different grids reflect the different types of operational processes that are being carried out relating to the corresponding inputs to produce the desired output (Gupta & Starr, 2014). The application of the input-output transformational process related to the case study reflects that different inputs related to the raw materials pertaining to harvesting of lettuce in the fields of Lincolnshire and also the manpower involved in the harvesting, reaping, packing and sorting process. The operational activities relating to harvesting of lettuce is carried out in the fields such that the same is linked to a factory outlet where the employees operate to dress the raw materials and in making them ready to be packed and sold in the market. The transformational stage relating to the harvesting Lettuce in the fields of Lincolnshire operations pertain to the dressing of the lettuces and putting them into packets. A fraction of the manpower is involved relating to the creation of boxes or creates in which the harvested

Managment ourse Feedback Essay Example | Topics and Well Written Essays - 500 words

Managment ourse Feedback - Essay Example The altered line of attack that the leaders ultimately outline will be determined by their profundity of making an allowance for the wake-up calls. This was the leading example of reality during the change attempt; it can suggest the dissimilarity amongst an instantaneous, external alteration all along with the one that is careful, stubborn, and philosophical for one and all apprehensive. Next, we learned that there is a dire need for leaders to be extremely rational with reference for being able to create motivation amongst the team members. We learned the various leadership styles and their consequent effects on the individual and the overall organizational development. How imperative it is to create team cohesion, and motivation, in order to be able to put together a winning team at work was also one of the most important learning. Our professor was very descriptive while teaching us these significant concepts.   Ã‚  

Saturday, August 24, 2019

Explain how lean just-in-time has broader application to a range of Essay

Explain how lean just-in-time has broader application to a range of manufacturing and service operations - Essay Example In order to react quickly to the ever growing and changing customer demands, there is a need for efficient manufacturing system that are capable of expanding and re-configuring during their course of operation. It should also have the ability to accommodate new procedures in the assembly techniques in such a way that it does not make any investments for manufacturing obsolete products (Fliedner, 2011). The lean manufacturing concept is also applicable to the service operation. There have been huge changes in the service operation too from that of the past. The lean principle for the continuous improvement and respect for the employees are applied to every service. It includes the healthcare services, call centre services, higher education, public and professional services and also in the software development services. The Lean manufacturing approach in both the manufacturing and services operation highly depends on the workplace organization and the flexibility of the production syst em. Lean manufacturing can be defined as an outstanding initial point for the companies those who want to create a fresh and new look for their existing manufacturing system by introducing innovative methods of production. ... The environment is cautiously tuned in accordance with the demands of the manufacturers (McGiven, 2013). The manufacturing of the products are carried out once at a time, after getting confirmation from the customers and are not done in batches, which adds up to the stock of the companies if not sold. The main goal of the lean manufacturing is to produce what is needed and not more than that. As there is production of limited number of products, it is important to change the processes during the day. It is required so as to accommodate various parts of the products and employ maximum effort from the workers, proper utilisation of the equipments and the floor space so as to save the scarce resources (Wincel, 2004). The flexibility that is inbuilt in the manual assembly cells is preferable for the automated assemblies. Thus, there is a prerequisite for the utmost flexibility so as to create unique demands on lean work cells and also, for the mechanism that are used for making the lean work cells. However, it can be observed that the lean approach is not always a resolution for the manufacturing problems. It is realised that it offers unique flexibility to the solutions for the assembling of the complex products. The essay thus elaborates the principle and the techniques of the lean management along with examples (Toyota Production System). It also highlights the lean just-in-time practice that is exercised by the companies. The essay also highlights the assumption whether lean principles can be applied in the low volume high variety manufacturing. Lean Management Principles and Techniques (including Just-in-time) The lean concept originated from the Japanese manufacturing areas. Lean can be described as the group of tools

Friday, August 23, 2019

Family of the Hearts Essay Example | Topics and Well Written Essays - 500 words - 2

Family of the Hearts - Essay Example The family is definitely one of the most important parts of the life of any person without which a person feels very lonely and sad at times. One can create the definition of a family by many different ways but the real and authentic meaning for the family is to live with people having emotions and feelings for each other. A person living with his/her family is able to enjoy life more than a person living alone. Therefore, after completing my education if I will have to decide whether I should live alone in America or with my family, I will definitely vote to live with my family. Being the first born in a family of three, I sometimes do feel the guilt of not being around my siblings to show them the right thing to do in the absence of my parents. This is so because whenever I am with them and my parents are not around, I take the full responsibility of being a parent to them. Although being away from my family is not for a bad course, I do not get that full satisfaction I usually get when being around them. Staying away from them has made realize how important my family is and that distance plays an important role in strengthening a family as a unit. Â   My extended family plays an important role just like my nuclear family. Even though being away from them too, I cannot get enough of their calls and the precious gifts they send me often. They shower me with love that rivals that of my dad, mum, and siblings. This is a clear example of how a family should be, not even friends can rival that bond created by family members.

Thursday, August 22, 2019

Fashion Industry Essay Example for Free

Fashion Industry Essay This summer it is boho chic. Last summer, it was preppy sailor simplicity. In the late 90s it was the grunge look. Yellow is the new black. Jeans are the new business casual. And on. And on. Yes, I am writing of fashion trends. The latest look, style, and color floods the covers of magazines, the shelves of retailers from Saks to H M, the bodies of celebrities and television characters and, undoubtedly, is able to get enough of us to buy into it (literally and figuratively) to validate the whole cycle. So, while most of us are easily able to grasp this continuously perpetuating cycle of saturating the public with the latest, greatest duds, questions remain: how does a trend start? Who makes this decision? Why does it work? Well, to be perfectly honest, there is no definitive answer to the myth that is a fashion trend. But, while the exact formula is beyond the consumer, we can be sure that it takes the work of several different interdependent fashion industry professions to convince us that espadrilles, suspenders, and terry-cloth suits are worthy of our dollars and donning. Fashion designers gather their inspiration, whether it comes from popular culture, music, politics, a celebrity muse, or something else entirely. Then, they design usually a spring and fall collection. With a slew of inspired, perfectly crafted designs ready to hit the runway, they show their collections. It could possibly be said that the trend begins at the fashion show. Fashion writers, buyers, photographers and celebrities line the runways, waiting to take in, criticize and praise the designers work. Writers go back to their offices and verbally comment on the design they have seen. If a collection is deemed great, the editor may be persuaded to feature the clothing on the cover of the months issue. This is also influenced by fashion publicists professionals who are paid to get the designers duds in front of larger audiences. Thus, we read about the latest fashion trend. Photographers snap photos as the models parade down the runway and sell them to parties interested in the designers work. The photos show up in newspapers, industry magazines, fashion magazines and various other media outlets. Thus, we see the latest fashion trend. Buyers, if impressed, order pieces that their clientele will be willing to pay hundreds or thousands to own. Other designers, those focused on mass production of more affordable versions of the latest trend, gather their inspiration here too. Thus, we can purchase the latest fashion trend. So, as you can see, it is impossible to pinpoint exactly how a fashion becomes a trend. What you can know, with certainty, is that it took many professionals in the fashion industry to get you to the cash register with your bohemian-inspired peasant blouse.

Wednesday, August 21, 2019

Attack Tree Of Computer Security

Attack Tree Of Computer Security This report is introduces about the possible attack for company and it represent by the attack tree diagram. In the company have six computer and internal server. Each computer is using Microsoft window 7. They are using the DVD to store the backup and the router is default setting. Each employee has the email address. Firstly, I will attack the workstation, try to obtain the password illegally and attack the security such as install virus, Trojan, worm and DOS attack. After that, I will attack the dvd to get the dvd and do some malicious action. Obtain the DVD can through the employee, such as bribe or threaten. Malicious action will install the threats into the DVD and spread to other computer when they are using the backup. Then, we will attack the router which is change the WEP or filter the mac address to cause the computer cannot connect to the network. We also can using threats through the router to install into the system, e.g plashing, pharming, DNS cache poisoning and spoof ing. However, I will attack the server using the internal threats and external threats, such as ask a person to disguise a customer to get the information from company, or ask the temporarily customer to be a spy to do some malicious action. Moreover, attack the email using the security threats like phishing, email spam, virus and spam. Then, obtain the email password from the target. Finally, attack the window 7 using hacking tools to destroy the host file from the system and using physical attack to the system and obtain the important data or change the data to make a big lose for the company. All of these attacks will discuss in this report. Introduction and scope Attack tree helps one to understand security issue better, from the stand point of an attacker. Attack trees are a graphical and mathematical construct used to identify most of the attack that will cause the greatest risk to the defender, determine effective strategies decrease the risk in a acceptable level for the defender, describe the potential attack between the adversary and the defender, provide a communication mechanism for security analysts, capture what is known and believed about the system and its adversaries, and store the information in a diagram that can be understood for the subsequently defenders. Although it is very hard to identify the entire possible factor that leads to intuition, it is based on the experiences and the ability to extrapolate how the experiences apply on the new situation.  For example, the effectiveness of internet security, network security, banking system security, installation and personnel security may all be modelled using attack trees. Th e ideal of attack tree is that an equipment, software, process could have vulnerabilities that when successful, they could compromise the entire system. Scope There are six computers and one internal server and each computer encompasses Microsoft Window 7 and Microsoft Office 2007. Each workstation has been patched with all updates of March 25, 2010. They are using ADSL 2+ connection. The server and workstation backup is store in a DVD. All the employees have email addresses and there share the document through a D-Link DNS-323 NAS. The router is utilising default settings and consists of a D-Link DSL G604t. Each workstation is utilising Microsoft Windows Malicious Software Removal Tool. Assumptions -The room houses the server is not locked or well protected with access key. -The router is not updated with the latest patches and set the default setting. -The workstations are not created with user login account. -No legal antivirus software is installed. Attack tree for compromising availability Spyware Trojan Virus Worm DOS attack Security attack Attack workstation Description: Due do the workstation do not have any legal antivirus software, so the security of the workstation is weak. We can use different threats to attack the workstation. We will install spyware to the workstation through email, when the employee clicks on the email. Spyware will collect some information from there without their knowledge. It is hard to detect, unless the user install the anti spyware software. We also use the same way to install the Trojan, virus and worm into the workstation. Trojan will format the hard drive when the user runs it. Virus will spread from one device to another, when they are connecting to another computer or device. Most of the virus will destroy the data or cause the computer keep reboot. Worm will use up the computer resources and possibly shutting down the system. Install the DOS (Denial of service) attack to prevent the user to access information or service, such as access email, website, etc. Attack workstation Steal Get password from employee Bribe Threaten Find written password Obtain login password illegally Use widely known password Learn password Guess password Description: The other way to attack the workstation is obtain the administrator login password illegally. First of all, we can try to guess the password or use the widely known password, because most of the users usually use the password to easy memories. After that, we also can learn the password such as find the written password from the user. We also can get the password from the employee. There are many ways to get from them. Firstly, we can threaten the employee, like find out some secret from the employees. However, we can bribe the employees to give them some advantages, such as money or something they like. Finally, we can steal from the employee, like install remote password stealer computer and receive the password through email. Blackmail Bribe Employee Copy Steal Exchange DVD Obtain DVD Attack backup Description: The backup of company is store in a DVD, so there are many possible ways to obtain the DVD. Firstly, we can use another DVD to exchange with the DVD backup, so they cannot find out any problem before they use the DVD. After that, we also can steal the DVD or copy the DVD. Finally, we can bribe the employee or blackmail the employee to let him get the DVD. Attack backup Malicious action Spyware Virus Trojan Destroy DVD Description: Another way to attack the backup is do malicious action. We can destroy DVD, like burn or break it. We also can put the threats through email or employee to the workstation, so after they backup the threats also in the DVD. When they use the backup DVD, the Trojan will install in the system, and format the hard drive of the system. Virus will spread into the system to destroy the data or make the system error. Spyware will install into the system and collects some information from the system, so we can know what is the user doing in the system. Filter the mac address Set the WEP Get in the router Attack router Change router login password Block the website Description: Because of the router is using the default setting, so they do not change the login password. So we can get in the router using the default password. After that, we can change the login password and set a WEP to ignore the employee using the wireless. However, we can filter the mac address to disable employees computer to connect internet. Furthermore, we also can block some URL about the company, so the employee cannot access the website. Phlashing Pharming DNS cache poisoning Spoofing Attack router Security attack Description: There is some security attack to the router. We can use the spoofing attack to masquerades as another program to falsifying data and gaining some advantages. Furthermore, DNS cache poisoning will corrupts the DNS table and cache, so the domain name will assign with a malicious IP address. When the employee use the malicious IP address, the computer will infected by worm, viruses or spyware. Moreover, we also can use pharming to attack the router. Pharming is redirecting the website traffic to a bogus website. When the employee get in the website, pharming will conducted to change the hosts file or exploitation the vulnerability in DNS server software. Finally, phlashing will exploit vulnerability in network based firmware update, it will permanently disable the hardware by loading corrupted BIOS onto the hardware. Attack server Trojan Worm Virus Check for the security protection Install remote access Disguise Eavesdrop Security attack Espionage Temporarily employee Customer Internal threats Description: There are two internal threats to attack the server. Due to the room of server is do not lock properly, so the temporarily employee can easily get in the room. Temporarily employee maybe is espionage to get the information from the server. They will install remote access to control the server, such as delete the data or destroy the server. They also will attack the security and install virus, worm and Trojan to exploit the server and cause the server crash. Attacker also will disguise be a customer, so they can go to the company easily. They can be eavesdrop in the company, and they can check for the security protection of the company, find out the vulnerability, so they can easily get into the company when nobody inside. Attack server Internal threats Across to the computer room power Across to the power switch Turn off security protection Rename server Turn the power off Steal data Employee Description: Another internal threat is employee. We can bribe the employee, because employees already work in the company for a long time, so we can ask them to steal important data or some secret data of the company. However, we also can ask them to turn off the power of the server room, so some document have not save will missing. Employees can across the power switch or across to the computer room power to turn off the power. Then, turn off the security protection in the server, so we can easily to hack into the server. Finally, rename the server and cause all computer cannot connect to the server. Obtain password from target Threats Trojan Viruses Email spam Phishing Security attack Attack email Description: Email will attack by the threats and obtain the password illegally from the target. We can threaten or blackmail the target to get the email password, so we can send email for others and provide wrong information to them. There are four types of threats send to the email and bluff the employee to click it, so the threats will install into the system. First, phishing will send by the email and come out well known website, then the employee go to the website and key in the username and password, their information will obtain by attacker. Moreover, the email spam will send the message to numerous recipients by email, and it is unsolicited. However, viruses are dangerous because they often deliver extremely destructive payloads, destroying data, and bringing down entire mail systems. Finally, use email installs Trojan to obtain confidential information or gain control of the server. Attack Microsoft Window 7 Change the document Destroy host file Spyware Malware Hacking tools Turn off power supply Disguise Cleaner Destroy computer Description: Microsoft window 7 is the widely operating system in the world, so there are many hacking tools to hack into the system. Attacker can pretend be a cleaner, and using the tools to hack into the system, after that install the malware to destroy the host file or change the important document, effects the company process. Then, install the spyware to spy the user work in the system and obtain the login password. Furthermore, we also can destroy the computer such as use water or burn it. Finally, turn off the power supply and cause the system lost the data before the user save it. Attack Microsoft Window 7 Physical attack Security attack Teardrop Remote access trojan Worm Virus Crash Win 7 Description: Microsoft window 7 also can attack physically. Because of the window 7 is widely use, so attacker are found many security vulnerability. Teardrop attack is a form of denial of service (DOS) attack, it will exploit the system when the internet protocol requires that a packet too big for the next router to handle has to split into fragments. In the teardrop attack, attackers IP puts an odd and confusing offset value in the second fragment or in a fragment thereafter. If the operating system under the teardrop attacks, the system will crash. Another is security attack, we can ask the employee or using the email to install virus, worm and spread all of these threats to the entire computer in the company on the network, and make the system down. Another threat is using remote access Trojan to control the system. This type of Trojan creates a backdoor into the system. We can use the client to control the server, this can allow to almost completing control over the victims system. Attack Microsoft Office 2007 Confidential loss Threats of document Integrity loss Altered data Corrupt data Sell data Broadcast data Description The method of attack the Microsoft Office 2007 is threats the document. Firstly, we can get the document from employee or using the Trojan or virus through email send to the system to obtain the document. Then, it will cause the integrity loss and confidential loss. In the integrity loss, we will altered the data and corrupt the data. In the confidential loss, we will broadcast the data or sell the data to another company, so the secret of the company will know by everyone. These two type of method will cause big loss for the company. Conclusion As you can seem that from the diagram, there are many attack come from many different ways such as internal threats, external threats. Internal threats are cause by the employee, customer and the worker in the company. External threats are cause by the attacker using different method to hack into the system to do malicious action. But comparatively, the attacking from internal is easier, because the employee is know more about the company and can get the data easily, but that is dangerous, if the company found that, they will get catch. In the other hand, the attacking from external is difficult but safe, because they do not know where is the data and also need to avoid the security protection, but if the company found that, they is hard to track the attacker. All of the diagram above is some of the possible attack, there are still have many possible attack. Indeed, with the technological advancements, it is likely that the computer threats will emerge in endlessly, so the possible a ttack will come out more and more in the future. Glossary Virus- A hidden, self-replicating section of computer software, usually malicious logic, that propagates by infecting i.e., inserting a copy of itself into and becoming part of another program. A virus cannot run by itself; it requires that its host program be run to make the virus active. Trojan- A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program. Worm- A computer program that can run independently, can propagate a complete working version of itself onto other hosts on a network, and may consume computer resources destructively. Spyware- Spyware is a type of malware that can be installed on computers and collects little bits of information at a time about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the users personal computer. Spam-Electronic junk mail or junk newsgroup postings. Spoofing-Attempt by an unauthorized entity to gain access to a system by posing as an authorized user. Pharming-This is a more sophisticated form of MITM attack. A users session is redirected to a masquerading website. This can be achieved by corrupting a DNS server on the Internet and pointing a URL to the masquerading websites IP. Almost all users use a URL like www.worldbank.com instead of the real IP (192.86.99.140) of the website. Changing the pointers on a DNS server, the URL can be redirected to send traffic to the IP of the pseudo website. At the pseudo website, transactions can be mimicked and information like login credentials can be gathered. With this the attacker can access the real www.worldbank.com site and conduct transactions using the credentials of a valid user on that website. Phishing-The use of e-mails that appear to originate from a trusted source to trick a user into entering valid credentials at a fake website. Typically the e-mail and the web site looks like they are part of a bank the user is doing business with. Denial of service-The prevention of authorized access to a system resource or the delaying of system operations and functions. Malware-A generic term for a number of different types of malicious code. DNS cache poisoning-DNS poisoning is also called DNS cache poisoning, and refers to the corruption of DNS tables and caches so that a domain name points to a malicious IP address. Once the user is re-directed to the malicious IP address his/her computer can be infected with worms, viruses, spy ware etc. Phlashing- Phlashing is a permanent denial of service (DoS) attack that exploits a vulnerability in network-based firmware updates. Such an attack is currently theoretical but if carried out could render the target device inoperable. Teardrop-Teardrop is a program that sends IP fragments to a machine connected to the Internet or a network. Teardrop exploits an overlapping IP fragment bug present in Windows 95, Windows NT and Windows 3.1 machines. The bug causes the TCP/IP fragmentation re-assembly code to improperly handle overlapping IP fragments. This attack has not been shown to cause any significant damage to systems, and a simple reboot is the preferred remedy. It should be noted, though, that while this attack is considered to be non-destructive, it could cause problems if there is unsaved data in open applications at the time that the machine is attacked. The primary problem with this is a loss of data.

Tuesday, August 20, 2019

Role of Weak Attractions in Macromolecular Structure

Role of Weak Attractions in Macromolecular Structure Weak attractions in aqueous system?  Hydrogen bonding in water. Crucial role of weak attractions in macromolecular structure  and function. Muhammad Sanain Javed Group A Water is also known as universal solvent because it is the only solvent which mostly use in almost every reaction. There are many types of weak attractions which are present in aqueous system. The weak attractions which are present in the aqueous system are: Hydrogen Bonding Hydrophobic forces of attractions van der Waals forces of attractions Electrostatic forces of attractions Hydrogen Bonding: First of all we will discuss about hydrogen bonding which is present in the aqueous system. Oxygen is more electronegative element as compared to the hydrogen atom, so in this way we can say that the water is a polar molecule. So that there will be dipole-dipole attractions present between partial positively charged hydrogen atom and partial negatively charged oxygen atom. So that we can say that the hydrogen bonding is something more than that of simple dipole-dipole forces. The oxygen atom has two lone pairs. While on the other hand hydrogen has sufficient partial positive charge. In this way both the hydrogen atoms present in the water molecules produce strong electric field due to its small sizes. So that the other oxygen atoms, may be of other molecules, will get link to the hydrogen atoms by means of coordinate covalent bond, using one of its lone pair of electrons. Thus the loose bond is formed, in the result, which is definitely stronger than that of simple dipole -dipole attractions. Because of the small size of hydrogen atom it can take part in this type of bonding. This bonding acts as a bridge between two electronegative oxygen atoms. So that we can say that the hydrogen bonding is the electrostatic force of attraction between a highly electronegative atom and partial positively charged hydrogen atom. Hydrogen bonding plays very important role in the water. We can say that it is the blessing of Allah. As the molecule of water have tetrahedral structure. Two lone pairs of electrons on oxygen atoms occupy two corners of the tetrahedron. In case of liquid state the molecules of water are extensively bonded with each other but these associations are break, just minute to minute because the mobility of molecules of water. When the temperature of the water decreases up to a limited extent then the ice is formed and the and the molecules of water become more and more regular and the regularity of water molecules extends through-out the whole structure of water. So in this way the empty space are created between in the whole structure. When the water freezes it occupies 9% more space as compared to the original water. So in this way its density decreases and ice floats on the surface of the water. The structure is just like to the structure of diamond because each atom of carbon in diamon d is at the center of tetrahedron just like the atoms of oxygen of water molecule present in the ice. The lower density of ice at the temperature of 0 degree helps the water to float on the surface of water from upward to downward direction. When the water attains the temperature of 4C by the fall of temperature in the surrounding it starts to freezes. As the temperature of the surrounding more falls, the water at its surface become less dense. In this way the water on the surface will freezes and animals underlying he surface of the ice will survive. Hydrophobic Attractions: Another important attraction present in the aqueous system is the hydrophobic attraction which is in fact the self association attraction present in the non polar molecules sometimes the hydrophobic attractions are incorrectly referred as hydrophobic bonds. Hydrophobic forces of attractions can easily be described as the interaction between the water and the hydrophobes. This can be explained as low water soluble molecules so in this way we can say that these are the non polar molecules having long chain carbon atoms and some alkyl groups which do not react with the water molecules. Electrostatic forces of attractions: Electrostatic forces of attractions are also present in the aqueous system. This force of attraction is present between the atoms or molecules having opposite charges. These types of forces are only exist in the aqueous solutions so sometimes these are also known as salt bridge. Salt bridge is referred as the electrostatic forces of attractions which are present between oppositely charged groups present within or between the bio-molecules. The strength of the salt bridge can be compared with the strength of the hydrogen bonding but act over larger distance. In this way they also facilitate the attractions of charged particles with the nucleic acids in aqueous system. Van der Waals forces: Van der Waals forces of attractions are also present in the aqueous system. This type of weak forces arises due to attraction between transient dipoles which are produce by the rapid movement of free electrons present in the atom or a molecule. These forces are much weaker than that of hydrogen bonding but on the other hand they are numerous, van der Waals force of attraction decreases as the sixth power of the distance separating atoms. So that due to this reason and due to weak force the van der Waals forces act over very short distance may be up to 2 to 4 aungstrom. Van der Waals forces contain two components one of them is the attractive forces which are commonly known as London dispersion forces. These attractive forces depend on the polarizability of the molecule or an atom. While on the other hand repulsive forces are also present which are commonly known as steric repulsion. This force of repulsion depends on the size of the atom. The force of attractions dominates almost at the longer distance. It is almost about 0.4 nm to 0.7 nm while on the other hand the repulsion dominates at very shorter distance. Van der Waals forces are very weak force and it can easily be broke. We can also say that this is a universal type of attractive force because it can be generated easily between two molecules which are near to each other due to the rapid movement of their electrons. Crucial role of weak attractions in macromolecules: Weak attractions are crucial to macromolecular structure and functions because all the non covalent interactions such as hydrophobic attractions, ionic attractions and van-der Waals attractions are much weaker than that of the covalent attractions. Hydrophobic attractions are also much weaker than that of covalent attractions although they are highly strengthened by a highly polar solvent while on the other hand the hydrogen bonding may be compare able with the covalent bonding but the hydrogen bonding is always less stronger than that of the covalent bonding. All these four types of bonding such as hydrophobic attractions, ionic attractions, hydrogen bonding and van-der Waals forces of attractions are present in the aqueous system. The combined effect of all these four attractions play very important role in the formation of structure of the macromolecule. For example if we look upon the structure of the proteins, DNA and RNA then we can easily see that these bonding specially hydrogen bonding plays very important role in the formation of structure of the macromolecules. More these weak attractions present in the macromolecule hence the more will be the stability of the macromolecule. This shows the combine effect of the weak attractions in the structure of macromolecule. In case of proteins or even in case of nucleotides all the base pairs are attached with the help of these weak attractions such as hydrogen binding. If we see the attachment of adenine and thymine then we can easily observed that these are combined with each other with t he help of two hydrogen bonds while on the other hand if we observe the attachment of guanine with cytosine then easily observe that these are also combined with the help of three hydrogen bonds. While in case of proteins two polypeptides are also combined with each other by the help of hydrogen bonding but only at specific sites. In case of antigen antibody complex formation hydrogen bonding also plays very important role because antigen binds with the antibody with the help of hydrogen bond formation. Other weak attractions are also present in the macromolecules. In case of the enzyme catalytic reactions, when the substrate binds with the catalytic site of enzyme then the energy produced in this reaction is used the catalysis of the bio molecule. The substrate binds with the active sites of enzyme is also due to the formation of weak forces of attractions in the aqueous system. The binding of hormone or a neurotransmitter with the cellular receptor is also due to these weak forces of attractions. When we see the structure of the protein such as hemoglobin then we can easily see that there are many water molecules which are tightly bounded and they look as the part of that protein. Same is true for the DNA or RNA so that in this way we can see that water it self and there related weak attractions play very important role in the stability of the macromolecule. In this way we can say that the weak forces of attractions plays very important role in the stability of the macromolecules. So we can say that without these weak attractions in aqueous system the stability of the macromolecule must be impossible.

Monday, August 19, 2019

Analysis of Act Three Scene Five of William Shakespeares Romeo and Jul

Analysis of Act Three Scene Five of William Shakespeare's Romeo and Juliet William Shakespeare's 'Romeo and Juliet' is a dramatic tragedy, and was first performed in 1595. The novel is about two young lovers, Romeo & Juliet and the struggle with their relationship. Romeo and Juliet are from opposing families, the Montagues and the Capulets. The conflict between their two families causes problems for their love of one another. Shakespeare's main themes throughout the play are of love, conflict and of youth versus age. The scene that we are analysing, Act 3 Scene 5 is one of the most important scenes in the novel. This is mainly because; the character of Juliet is developed tremendously. Juliet's feelings and thoughts are shown more in this scene than in any other. Other reasons why the scene is important are that we get to the see the huge gap in the relationship of Juliet and her mother, and also we get to see other sides of the characters. One other way of getting across Romeo and Juliet's struggle is the way Shakespeare uses fate. Everything seems to happen to them because of something they did earlier. For example, because Romeo killed Tybalt, Juliet's parents want her to marry Paris. The audience feels more sorrow for the young couple because everything seems to be happening to them, although all they want is top be in love. Shakespeare's use of dramatic irony is very prominent in Act 3 Scene 5, and also throughout the play. When Lady Capulet tells her daughter Juliet "Shall happily make thee there a joyful bride," she is telling her that she is going to marry Paris. The dramatic irony in this is that the audience knows that she cannot marry Paris because she is already married to Romeo. This ... ...es of the play because Shakespeare uses contrast a lot to keep the audience interested. Another way in which Shakespeare uses contrast is with the character of the nurse. She shifts her opinion on Romeo very quickly. Here she is talking about Paris "A lovely gentleman." She also says that Romeo could never compare to him. Like Lord Capulet her mood changes very quickly. In Act 2 Scene 5, it was the nurse who organised Juliet's marriage and honeymoon. Then now she decides she does not like Romeo. This shows how the nurse's mood changes very quickly. She does not seem to understand Juliet's love for Romeo. This makes the audience feel bad for Juliet; it makes them more involved in the atmosphere of the scene. The strongest contrast in this scene is between the idyllic and loveliness of Romeo and Juliet's world and the angry world of her parents. Analysis of Act Three Scene Five of William Shakespeare's Romeo and Jul Analysis of Act Three Scene Five of William Shakespeare's Romeo and Juliet William Shakespeare's 'Romeo and Juliet' is a dramatic tragedy, and was first performed in 1595. The novel is about two young lovers, Romeo & Juliet and the struggle with their relationship. Romeo and Juliet are from opposing families, the Montagues and the Capulets. The conflict between their two families causes problems for their love of one another. Shakespeare's main themes throughout the play are of love, conflict and of youth versus age. The scene that we are analysing, Act 3 Scene 5 is one of the most important scenes in the novel. This is mainly because; the character of Juliet is developed tremendously. Juliet's feelings and thoughts are shown more in this scene than in any other. Other reasons why the scene is important are that we get to the see the huge gap in the relationship of Juliet and her mother, and also we get to see other sides of the characters. One other way of getting across Romeo and Juliet's struggle is the way Shakespeare uses fate. Everything seems to happen to them because of something they did earlier. For example, because Romeo killed Tybalt, Juliet's parents want her to marry Paris. The audience feels more sorrow for the young couple because everything seems to be happening to them, although all they want is top be in love. Shakespeare's use of dramatic irony is very prominent in Act 3 Scene 5, and also throughout the play. When Lady Capulet tells her daughter Juliet "Shall happily make thee there a joyful bride," she is telling her that she is going to marry Paris. The dramatic irony in this is that the audience knows that she cannot marry Paris because she is already married to Romeo. This ... ...es of the play because Shakespeare uses contrast a lot to keep the audience interested. Another way in which Shakespeare uses contrast is with the character of the nurse. She shifts her opinion on Romeo very quickly. Here she is talking about Paris "A lovely gentleman." She also says that Romeo could never compare to him. Like Lord Capulet her mood changes very quickly. In Act 2 Scene 5, it was the nurse who organised Juliet's marriage and honeymoon. Then now she decides she does not like Romeo. This shows how the nurse's mood changes very quickly. She does not seem to understand Juliet's love for Romeo. This makes the audience feel bad for Juliet; it makes them more involved in the atmosphere of the scene. The strongest contrast in this scene is between the idyllic and loveliness of Romeo and Juliet's world and the angry world of her parents.

The Glen Ridge Rape :: essays research papers

Bernard Lefkowitz’s Our Guys raises a lot of issues, all of which have been discussed throughout this semester.   Ã‚  Ã‚  Ã‚  Ã‚  Just a few pages into the book, words had already begun to jump out at me, capturing my attention. â€Å"The kids in Newark, black and brown, speaking Spanglish, hoods over their heads, wheeling their stolen cars over to the local chop shop -- they were aliens in America. Strange, forever separate and separated from the American ideal. But these Glen Ridge kids, they were pure gold, every mother’s dream, every father’s pride. They were not only Glen Ridge’s finest, but in their perfection they belonged to all of us. They were Our Guys (page 7).† This is a story about White Privilege, I thought. After reading the next two pages, I changed my mind. â€Å"...I wanted to understand how their status as young athlete celebrities in Glen Ridge influenced their treatment of girls and women, particularly those of their age.....I was especially curious about what license they were permitted as a clique of admired athletes and how that magnified the sense of superiority they felt as individuals (pages 8-9).† Oh! This is a story about jock culture, I thought.   Ã‚  Ã‚  Ã‚  Ã‚  I had only touched the surface. Later on, I realized Our Guys was about jock culture and white privilege...as well as rape cultures and patriarchy, male privilege and compulsory heterosexuality, pornography, accountability and â€Å"blame the victim.† All of these issues were part of this, a real life story, a real rape.   Ã‚  Ã‚  Ã‚  Ã‚  Reading the story of the Glen Ridge Rape, I was able to make observations and draw conclusions that Ridgers who lived inside their glass bubbles weren’t able to make. They didn't realize what type of things they were teaching their children. Morals and values are instilled into a person at a very early age. It can start at birth. Males of Glen Ridge were taught that they had power and were expected to do certain things. â€Å"In their youth sons were permitted and even expected to raise a little hell. ‘There was a boys-will-be-boys attitude that went back to the nineteen fifties’....Boys were supposed to be vigorous, assertive, competitive; they were expected to test the boundaries of behavior within clearly established limits† (page 63). This is what boys learned at such an early age. Many of them grew up in male dominant families. Patriarchy was practiced in many homes. Male influence made it difficult for most of them to establish str ong relationships with or learn to appreciate members of the opposite sex.

Sunday, August 18, 2019

Appalachian Stereotypes Essay -- Appalachia

"Excuse me miss, but you have the cutest little accent," the pizza delivery guy said. "Well, thank you," I replied. "If you don't mind me asking, where are you from? I know that you aren't from around this area with an accent like that." "I am from a little town called Hazard," I replied reluctantly, realizing exactly where this conversation was headed. "Oh, is that where the Dukes of Hazzard are from?" he asks chuckling. "No, that place is Hazzard, Georgia. I live in a little town in southeastern Kentucky." "I bet you all have a lot of barefoot, pregnant people there don't you?" he asks with a discriminating smile. "Well actually we don...." "Huh, I bet you all don't even have paved roads or indoor plumbing," he persisted. "You know what? I don't feel very hungry anymore. Why don't you take that pizza back?" I asked. "Oh, miss, I was just joking with you." This conversation actually took place during my first semester of college. However, being quite accustomed to the questions that I am frequently asked about the place I call home, this conversation somehow made me more upset than usual. This conversation made me realize just how blind society can be towards other groups in society. Different stereotypes are placed on groups for various reasons-race, sex, occupations, and geographical locations-just to name a few. The last of these four different classifications is the one that distinguishes me from most of society. Growing up in Appalachia has made me a minority (different from the rest of society), and also plagued me with many stereotypes. Everyone in society has heard the stereotypes. However, I would like to focus on the how's and why's of them. How they came to be. Why society does perceive... ...ut trying to find your place within society as a minority is even harder. When you go for a job interview and see the person you are being interviewed by shake their head when they hear your accent, you know that you are in trouble. It's the education that is lacking in America. We are known to be this great melting pot. But it isn't until the stereotypes that plague so many Americans come to an end, that we will truly be united as one. Works Cited Asfahani, Magdoline. "Time to Look and Listen." Newsweek Dec. 1996: 18. Billings, Dwight B. "The Road to Poverty: The Making of Wealth and Hardship in Appalachia." Booklist 36 (1999): 38. Norman, Gurney. Kinfolks: The Wilgus Stories. Frankfort: Gnomom Press, 1977. Waller, Altina. "Two Words in the Tennessee Mountains: Exploring the Origins of Appalachian Stereotypes." Journal of Social History 32 (1999): 963.

Saturday, August 17, 2019

Leadership in a Global Environment

Management vs. Leadership Management Leadership – Vision & strategy – Keeping an eye on the horizon – Creating shared values – Helping others grow – Reducing boundaries – Focusing on people – Based on personal power – Acting as a coach – Emotional connections – Open mind – Listening – Nonconformity – Insight into self – Creates change and a culture of integrity Source: Daft (2008), p. 15 Leadership Direction: Planning & budgeting – Keeping an eye on the bottom line – Organizing & staffing – Directing & controlling – Creating boundaries – Focusing on products – Based on position power – Acting as boss – Emotional distance – Expert mind – Talking – Conformity – Insight into organization Alignment: Relationships: Personal Qualities: Outcomes: – Maintains stability – Creates culture of efficienc y Definition of culture Internet in Leadership Germany Members of a group or a society sharing a distinct way of life with common values, attitudes and behaviors that are transmitted over time in a gradual, yet dynamic process.Source: Harris, J. E. / Moran, R. T. (1979). International Context Culture Bbehavior Values Attitudes Source: Adler (2002) p. 17. Values – attitudes – behavior Internet in Leadership Germany Values => explicit or implicit desirable to an individual or group => influences the selection from available modes, mearns and ends of action International Context => can be both consciously and unconsciously Attitudes => expresses values and disposes a person to act or react in a certain way to something Bbehavior => any form of human action Source: Adler ( 2002), p. 18. Linking values to behavior Internet in Leadership GermanyBbehavior Value Sample Countries/Areas China/Thailand Australia/United States 1 2 Use of understatement Asking people to call you by your first name Taking off from work to attend the funeral of an aunt Not helping the person next to you on an exam Disagreeing openly with someone at a meeting Not laying off an older worker whose performance is weak H Indirectness F Informality Centrality of family Self-reliance 3 B Venezuela/Korea International Context 4 5 6 I Switzerland/Canada Germany/England A Directness E Respect for age Japan/Pakistan 7 At a meeting agreeing with a suggestion you think is wrong D Saving faceAsia generally 8 Inviting the teaboy to eat lunch with you in your office J Egalitarianism Cambodia/Vietnam 9 Asking the headmaster's opinion about something you're an expert on G Defence to authority India/Brazil 10 Accepting, without question that something can't be changed C External Control Saudi Arabia/Turkey Source: www. uop. edu/sis/culture. Culture: The hidden dimension Culture has observable aspects and suspected, imagined, or intuited. Internet in Leadership Germany Holiday customs Facial expre ssions Paintings Food Music Eating habits Literature Concept of personal space Work ethic GesturesInternational Context Rules of social etiquete Religious beliefs Concept of beauty Childraising beliefs Importance of time Values Concept of leadership Concept of fairness Concept of self General world view Nature of friendship Source: www. uop. edu/sis/culture. Cultural dimensions by Hofstede Internet in Leadership Germany – based on the first and most detailed cross-cultural research study – national culture explained more of the differences in work-related values and attitudes than did position, profession, age or gender International Context 1. Power distance . Individualism 3. Masculinity 4. Uncertainty avoidance 5. Long term orientation Source: www. geert-hofstede. com. Power distance Internet in Leadership Germany 1. Power distance = degree of equality, or inequality, between people in the country's society. International Context High Power Distance – Core va lue: respect for status – Core distinction: powerful/dependant – Key element: centralization Low Power Distance – Core value: people‘s equality – Core distinction: whether or not responsible for a certain task – Key element: decentralization Individualism 2.

Friday, August 16, 2019

Four Theoretical Approaches to Metaphysics Essay

There are four theoretical approaches to the metaphysics and they include Dualism and the theory that what exists on can do so on two levels the physical or the mental. The next approach is Materialism which theorizes that everything exists on a physical level. Then there is the Idealism approach which states that everything that exists is mental or spiritual. Finally, there is Alternative Views which theorizes that what exists in neither mental nor spiritual but believed that what exists is both, which means that what exists is neutral. In the Materialism theory of metaphysics it is said that everything is made of some kind of structure that are now called atoms. These atoms are governed entirely by physical laws and are thought to make up everything that we know and see. There were and are still many men in the scientific community that feel this way, but the most pronounced one was named Thomas Hobbes. Hobbes implied â€Å"clearly that all things are made of material particles and that all change reduces to motion. † (cite) His theory states that everything is matter in motion to include an individual’s thought process. Hobbes goes into detail about how this process works and called it perception or sense. His way of describing it is the fact that things have different properties and that the properties do not really exist. The properties of an object are based on what we perceive them to be. We perceive a rose to be beautiful, smell nice, and have red pedals. Those properties according to Hobbes are all based on perception and the rose does not actually have any of these traits. â€Å"The things that really are in the world outside us are those motions by which these seemings are caused. † (cite) Hobbes describes perception as motion from the outside effects the motion of the inside of a person. The motion on the outside affected the motion on the inside and leaves a lasting effect after the motion is complete or dispersed then the motion that remains behind on the inside is left as a memory. The motion that is still on the inside is a perception and in turn is the root cause for thinking, imagination, and memory. As humans we describe this reaction by assigning words to these perceptions and Hobbes labeled that as reasoning. The way that people reason is nothing sort of â€Å"adding and subtracting of the consequences of general names. † (cite) The easiest way that this can be explained would be to refer it to a computer. The hard drive is considered as the movement on the inside and the keyboard and mouse as the outside. The hard drive is made up of a disk and magnet and works by taking the disc and spinning is around at a rapid pace. Next the magnet is moved around to encode the data to the hard drive. This whole process is done through movement and if stationary there is nothing that can be done to retrieve or store information. First to store or retrieve information an external source of movement needs to happen. Movement from the outside was represented as a keyboard and mouse. The keyboard and mouse which is movement from the outside affects the hard drive which is the movement from the inside and vice versa. Now that movement has been represented the reasoning of information needs to be considered. Now we understand what movement effect movement means we can now address the fact of reasoning and perception. All of the information that the computer takes in needs to go somewhere and needs to be retrieved again. The computer makes sense of all the data by assigning numbers to all of the data so that it can be retrieved again. This aspect would be considered our perception which is reasoning which as Hobbes stated before is our thinking, memory, and imagination. Now some people would argue that Hobbes theory does not take into accounts decision making and other voluntary actions, but he does go into detail about how that process works. Hobbes addresses the finer points of the decision process by stating that every decision or movement starts of as an â€Å"endeavor† which was caused by perception. He then breaks it down even into two groups consisting of desire and aversion. When the endeavor is toward something then it is considered a desire and when it is away it is considered an aversion. We associate desire and aversion with words like love and hate or good and bad. So according to Hobbes the basic principle of our decision making is like a magnet. Let’s look at the magnet that is in the computer and affects the hard drive. Sometimes data can be corrupted and the information will not take to the hard drive. The process of corrupt data being entered from the outside can be considered as an aversion. Now any information that the system lets in can be considers as desire. If that did not make sense then lets look at a magnet in general. A magnet has a positive and a negative side. Anything that is attracted to the positive side can be considered a desire and anything that is repelled by the negative side can be considered an aversion. In the recent years there has been some advancements in technology that allows us to uncover the mysteries of the universe. Scientists have found matter that is smaller than atoms and they are calling them subatomic particles. It has been discovered that these particles make up every aspect of the universe and are comprised of some type of energy that is connected with everything else. After this discovery a lot of scientists are rattled about their theory and if Materialism is really the right type of metaphysical theory to go with. However, this does not completely rule this theory out it just seems like that needs to some changes or tweaks to the way that we think about Materialism.

Thursday, August 15, 2019

The Bhopal Gas Tragedy Case

The Bhopal Gas Tragedy of December 3, 1984 is one of the most hazardous industrial accidents in history. The exposure of around 500,000 people to 42 tonnes of toxic methyl isocyanate gas was a nightmare come true for all resulting in deaths in numbers that could never have been imagined from industrial accidents. All this and the after-effects could have been prevented if proper precautionary measures had been taken beforehand. Despite of an accident on such a large scale, initially the company was in a denial mode about the whole matter and later compared the whole thing just to be a ‘tear gas like’ situation. Moreover they failed to provide any immediate antidote for the poisonous gases which had spread all over Bhopal affecting many more than initially imagined. The blame lies as to why no measures were taken regarding huge amounts of water entering tank 610? Why wasn’t there a person to look over the pressure and temperature statistics and control the pressure inside the container once the water had entered? The container should have been designed keeping in mind the sudden increase of pressure due to any such situation. Some margin must have been there to account for sudden such rises. But the industry never had such precautionary steps in mind which eventually led to this. Moreover, the industry should have practiced drills and should have been prepared for such an incident beforehand. They should’ve been aware of methods to control the spread of the toxic gas once it had leaked from the main container. Such a control measure would have restricted the spread. The tank’s alarm had not been working for the past 4 years. A timely check on all such measures would have been helpful for its prevention. The steam boiler used to clean the pipes that caused this leakage had been out of order since a long time. The responsible authorities should have been vigilant on such important issues. Timely cleaning of these pipes would have never caused such a major leakage. Water jets should have been set up in such an industry dealing with hazardous materials so that any toxic leakage’s concentration would have been reduced by spraying water at a high speed while it was still confined within the industry. Carbon steel valves were used in spite of the fact that they easily corrode when exposed to acids. If such a realization had been there amongst the authorities and the valves would have been replaced before, such a tragedy could’ve been prevented. The very fact that the industry was located very close to a densely populated area directs towards ill-planning. The prevention of danger to the civilians should have the utmost priority of the planning authorities. The approving of such a plan by the state is also to blame. Even when the authorities had realized the leakage, they should’ve started working on evacuation plans. This would have prevented the mass suffocation. The police authorities should have been informed at the earliest so that they could have carried on evacuation in the residential areas. But they were kept in the dark for a long time. Also the meteorological data was not monitored properly. Due to the absence of strong winds, the lakes in Bhopal influenced the local circulation significantly and caused northwesterly flow near the surface. The modified flow pattern resulted in the transport of the toxic gas directly into the city area of Bhopal. If proper planning from the meteorological point had been done and the location had been determined such that the flow of toxins was in a different direction, away from the residential areas, then its affect on such a massive scale could’ve been prevented. Tragedies of the scale like the Bhopal Gas Tragedy can only be prevented if the concerned authorities fulfill their duties to the best of their abilities. Being prepared with the preventive measures to all the imaginable problems beforehand is always helpful in controlling accidents to transform to disastrous levels like this one. Proper check of all the safety devices and monitoring all equipment on a regular basis is essential if such accidents have to be prevented in future. A lax by even a single official can prove to be fatal to many. The police and government officials in such areas must approve the plans only after thoroughly checking all equipments and plans and must remain vigilant at all times. Surprise checks must be conducted at these industries to monitor whether the working is being carried out according to the approved methods. It must be ensured that no scope is left for error of any kind which can lead to a disaster.