Monday, September 30, 2019

A Positive View on Social Media and Facebook Essay

Over one billion people worldwide use or have a profile on some sort of social media. Facebook is one form of social media that leads the charge. Facebook is a popular free social networking website that allows users to locate and reunite with old friends, join groups of members that share your same interests, do research, and entertain themselves through the use of a variety of applications embedded within the website. Every so often we feel the urge to locate old friends that we have not been in touch with in a long time. We just type in their name and see what comes up. One day my wife looked up an old friend of mine, Paul Z. and found a man about the right age. She thought at first it was someone else because with age we all look different. Looking back at her was an older man with grey hair and a beard, something that neither Paul nor I had the last time we had seen each other. So she started to go through pictures and started seeing familiar faces, pictures from the past that was our past too. She immediately requested that they become â€Å"friends† on Facebook knowing that this was our friend from years ago. The request was accepted and our friendship was reunited again. After Facebook and my wife reunited two old friends I started to look at Facebook for other ideas on who to try and communicate with. Old classmates came to mind and it just so happens that Facebook provides a tool fo r reuniting classmates on the website. After about ten minutes or so of answering a few simple questions about where I went to school and when, I logged off and went about my business. About two or three days later I started getting responses. At first I didn’t recognize anybody, but then after a little research, yearbooks mostly, I started to recognize some of the names and memories followed. I have since been in touch with a couple of classmates from as far back as second and third grade, an amazing feat since second and third grade was in 1966 and 1967. I now get invitations to class reunions and other events that I never had before. Although I haven’t attended one yet, maybe someday I will. Another part of Facebook that I thoroughly enjoy, are all the groups that are available to join and hang out with. The Navy is just one of the many groups that I belong to. There I get to chat and share the many memories I have from my time in the service. Some are really great, like the time I got to ride a camel in front of the main Pyramid in Egypt, except when it spit on me, that wasn’t fun. Or the time I rode a Gondola in Venice down the waterways. And some not so great, like 1991 in the Persian Gulf or rescuing refugees off the coast of Haiti. But all are memories I love to share with old shipmates and Facebook makes it possible. Genealogy is a subject that has interested me for years. One of the greatest challenges I have found, is how to quickly and accurately research the information I need on members of my family. I even subscribed to an online genealogy website. Where, for $30.00 per month, I could do all the research I wanted. This soon became more than I could fit into my budget, so I started to look for another way. I saw an advertisement on Facebook for a new application called â€Å"Family Tree†, an online web app that allows family members to input their own family information and merge it into an existing family tree. It also allows each family member to visit and update their own part of the tree as often as they like. I signed up and started to enter information about my own immediate family and forwarded requests for other members of my family to join. The response was amazing. To date my family has placed 1,288 entries into the family tree and it continues to grow every day. Although groups, family history research, locating long lost friends takes up a lot of time, I still try to find ways to amuse myself on the computer. Facebook can do that too. There are literally hundreds of games that you can play either by yourself or with family and friends. CityVille 2 is the one that I am currently involved in socially. I haven’t started any individual games yet, but I will eventually. Games are not the only forms of entertainment provided by Facebook. The posts that all of my friends place on the site can be hilarious. I am constantly looking at all of the photos and videos that have been posted and at times they can be pretty entertaining as well. All things considered, there are many ways to communicate with family, friends and classmates. Newer forms of social media, like Facebook give us a significantly more effective and in most cases, less expensive way to stay in touch with the people that mean the most to us. It can also provide tools for exploring new and exciting ways to entertain ourselves, research your family history by starting a family tree, or join a group that shares your interests. The opportunities are endless.

Sunday, September 29, 2019

Hart Rudman Commission Report Essay

The U.S. Commission on National Security/21st Century, frequently known as the Hart-Rudman Commission after its chairmen, issued its third and final report in January 2001. The bottom-line conclusion is that the primary national security challenge that the United States will face in the next 20 or 30 years will be an attack by an adversary on the American homeland which could produce thousands of casualties. To deal with this threat, the commission calls for a major reorganization of the U.S. national security apparatus. The changed security environment and the changed threat to American society suggest a fundamental rethinking of the organizations designed to achieve national security. Phase 1 – New World Coming: American Security in the 21st Century was the first report completed by the Commission (July 1998 – August 1999). This Report is dedicated to understanding how the world will likely evolve over the next 25 years. It describes global trends in scientific, technological, economic, socio-political and military security domains and the interplay of these developments on U.S. national security. Pro: The nation has a better understanding of the global effects that affecting America; therefore, it helps better preparation the nation to tackle any upcoming obstacles. Con: With the advanced technology development, more dangerous weapons are being developed. Phase 2: Seeking a National Strategy: A Concert for Preserving Security and Promoting Freedom (August 1999 – April 2000). This Report devised a U.S. national security strategy to deal with the world in 2025. The purpose of the Phase II Report is to define an American strategy based on U.S. interests and key objectives. It develops a strategy for America to secure the benefits of a more integrated world to expand freedom, security, and prosperity and to dampen the forces of instability. Pro: The development assisted in strengthens our security to safeguard our  nation. Con: In order to tighten our national security, the general public somewhat has to scarify levels of privacy. Phase 3 – Roadmap for National Security: Imperative for Change (April 2000 – February 2001). This Report recommended significant and comprehensive institutional and procedural changes throughout the Executive and Legislative Branches in order to meet the challenges of 2025. Pro: The creation of the Department of Homeland Security marks a significant step forward for the United States in addressing the threat posed by terrorism within its borders. Con: The recommendation of significant restructuring to re-align government offices, branches, and procedures with the global realities, we are giving more power to the government to change the structure of our nation; how one can be certain this will lead to positive outcome. Reference Lathrop, C., & Eaglen, M. M. The Institute of Land Warfare, (2001). The commission on national security/21st century: A hart-rudman commission primer (NSW 01-2)

Saturday, September 28, 2019

Basic Network Technology, Structure, and Protocols Essay - 2

Basic Network Technology, Structure, and Protocols - Essay Example These tutorials are meant to shed light on the networking topics covered by students in college. They can also be used for references purposes by engineers and computer scientists. The projects done by students are meant for visual demonstrations on what the tutorials cover. For instance, the client-server flash interactive animation covers protocols and computer networks in general. It is a project done in 2005 by Roman Margolis and Slav Podolsky. Animations are usually developed to show, visually, what might not be clear when just put into words alone. The 2005 animation project shows how communication happens over the internet. This normally happens via the client server architecture; as the tutorial explains. A client communicates with a server and the server responds with the information requested for by the client and sends that information. Servers are numerous and are situated at various locations around the globe. Servers can be within the same room as a client computer whil e others can be remote. The protocols described in the tutorial are: IP between client-server, address resolution DNS and ICMP. The internet communications flash animation is very interactive. This is very useful as it provides detailed information and explanations as well as graphical representations of the topic it describes. This tutorial is not only useful to computer science students but also lovers of technology and the curious computer user who may want to know how some things work on the internet. It explains how to go about surfing the internet for certain information. The computer is personified for humor purposes and it definitely does not fall short in that regard. The interactivity that the two above tutorials provide is the sole reason I choose to go through them and learn a thing or two. They are easy to understand – I believe anybody can understand them. As for the business purposes that the tutorials can be used for, animated

Friday, September 27, 2019

What were the cultural and social factors that created the conditions Essay

What were the cultural and social factors that created the conditions for the adoption of radio (wireless) by home users in the 1910s and 1920s - Essay Example The social changes that took place included the rise of mass entertainment in the form of radios as well consumer culture. Various social and cultural factors played a vital role in the adoption of radios by home users in the years 1910s and 1920s as the document discusses (Popular Science Monthly, 1917).   Broadcasting started acting as a crucial instrument in the political and social organization in early twentieth century. The aspect played a very crucial role in enhancing the adoption of radios by home users. At the peak of influence created by this factor, national leaders started making use of radio to address the entire nation. It was because the leaders had come to realize that radios had potential to reach large numbers of the citizens. The factor, therefore, created a necessity of the citizens to own and also adopt a radio so that they would remain updated on any update from leaders. The aspect hence caused many home users to adopt radios after recognizing how significant it was in communication (Hilmes, 2013).   The outbreak of First World War in Europe also triggered the necessity of understanding the activities that were taking place. The factor led to massive adoption of radio by domestic users. The main reason happened to be many people wanted to know the well about of their well about of their relatives in different places of the United States. Towards the final years of the nineteenth century and early twentieth century, radio broadcasting was under strict regulations from the government’s leaders. In 1910s, an Act that gave radio broadcasting freedom was enacted in the United States. One of the factors that got addressed in the Act was freedom of radio stations to be privately owned (Gernsback, 1924). The freedom gave helped the radio broadcasters to air diversified content in terms of news and entertainment. The factor created a sound condition for the adoption radio in homes. Much was available in the radios from

Thursday, September 26, 2019

Blogs Assignment Example | Topics and Well Written Essays - 500 words

Blogs - Assignment Example The blog is using facts and opinion with the numbers and statistical data on bullying and other forms of antisocial behavior highlighted. The blog is reflecting with how the past was structured and the difference that is seen in comparison to the present attributes of anti-social behavior. There is a photo of a young lady with a computer that appears disgusted or broken by a picture or a post that she has seen on her computer. The photo is social how the computer may influence a person if only it’s written badly and in the process lead to bullying and other forms of anti-social behavior. This article looks at the influence of social media on teens. In the blog the writer asserts that there are detrimental effects not only on their social behavior but also on their academic performance. The article is examining the difference that may be witnessed in future with more students in the current generation using the same platform for all their academic work. The blog is based on opinions that have been generated from deductive reasoning by the writer. The blog does not quote other writers but has deduced its argument from a single analogy and is projecting the same to be the case into the future. The last blog looks at the influence of social networking in children and uses the opinion by other cites and also factual information to conclude that it being affected badly. There are less face to face conversations and the children are going to grow with depleted connections with the other members of the society. The blog looks at the past and future effects of social media and does not see any form of better social behavior coming from the social media

Wednesday, September 25, 2019

The Way Incentives Work and Types of Motivation Problems Research Paper

The Way Incentives Work and Types of Motivation Problems - Research Paper Example Every incentive program is based on a formula for enhancing motivation that engages four fundamental variables: effort, performance, outcomes, and satisfaction. The logic behind these programs goes something like this: employees at Property Management Company will put in the accurate quantity of effort to meet performance hopes if these part-time employees at the small privately owned property management company obtain the types of outcomes that include pay raises and promotions which will provide part-time employees satisfaction. (Hanlan Marc, 2004) In simpler words, the property management company should provide its employees what they want, and employees will work hard to get it. Conversely, the problem with most incentive programs like of Property management company is that they center exclusively on the submission of outcomes and overlook the three beliefs that are the key to making the motivation solution work: The first conviction compacts with the relationship between employee effort and performance. The second compacts with the relationship between performance and outcomes. And the third compacts with the relationship between outcomes and satisfaction. These three beliefs form the basis of the belief system of motivation and performance. Accepting that these beliefs are decisive preconditions for motivation helps to explain why incentive programs generally yield such lackluster results like in case of Property Management Company Since employees do not always hold these beliefs to be true, attempts to improve motivation by using incentives cannot make the grade, even when the incentives are highly desirable ones. (Thomas, 2004)

Tuesday, September 24, 2019

Criminology Essay Example | Topics and Well Written Essays - 1000 words - 8

Criminology - Essay Example erefore, the classical philosophers and other modern scholars of American criminology founded varied theories regarding the issue of crime as a social phenomenon. Understanding criminology theories depend on the relationships made in formulating them and each theory differ from one situation to another. Therefore, social learning theory is one of the criminology theories that explain the way people develop their behaviors through socialization. This theory argues  that  Ã¢â‚¬Å"as social creatures, our behavior is a product of our environment,† thus understanding social learning theory is imperative because it enables the policy makers to implement effective strategies for combating crime issues in the society. Social learning theory is one of the criminology theories that attempt to address the issue of the social environment and the way it influences crimes of all sorts. Understanding social learning theory in criminology can be simple or complex, but this depends on the relationships made by social scientists in formulating theories (Akers 56). However, this theory is significant because it enables criminal investigators to understand the way crime are committed and what influences them. This is vital because it enables the policy makers to implement effective ways of controlling such crimes that result through learning from social environments. This can be through providing mass education programs to the public on the consequences of involving in crime activities and encouraging people in the society to serve as role models to others. Social learning theory controls the behaviors of an individual in the society. Therefore, understanding this theory is essential because it enables one to understand the study of criminology. Learning refers to the habit or knowledge gained as a result of experiences within the surrounding environment. It is opposed to instinct, drives or genetic predispositions, thus enabling people to understand criminology study (Furst 96). The

Monday, September 23, 2019

HRM and the 'Employee Engagement' Essay Example | Topics and Well Written Essays - 2250 words

HRM and the 'Employee Engagement' - Essay Example Employee engagement is a modern concept in scientific management theories. According to Scarlett Surveys International (2011), â€Å"employee Engagement is a measurable degree of an employee's positive or negative emotional attachment to their job, colleagues and organization which profoundly influences their willingness to learn and perform at work† (Scarlett Surveys International, 2011). An organization may have thousands of employees; however, it is not necessary that all the employees may show same commitment to the organization. At least some of the employees may show some kind of negative attitude towards the organization and they may not deliver 100% of their productivity. â€Å"According to the Gallup Management Journal's Employee Engagement Index, 29% of employees are actively engaged in their jobs, 54% are not-engaged, and 17% are actively disengaged† (Employee Engagement - Excerpts from the Gallup Survey, 2011).The success and failure of an organization lies in its ability to increase the employee engagement statistics and reduce the instances of serious employee disengagement statistics. In other words, ‘Employee Engagement' is Central to an organization's success and HR professionals have a pivotal role in reducing employee disengagement or increasing employee engagement. ... There are many instances in which employees forced to accept certain jobs which are not their cup of tea. Since unemployment is a big problem all over the world, people accept jobs even if they are not comfortable with it. In other words, many people accept jobs because of circumstantial pressures. Such people will show disengagement in their profession which is not good for the organization. A right person at the right place is always a blessing to the organization whereas a wrong person at a critical position may always create problems to the organization. However, it is difficult for an organization to allot jobs always based on the interests of the employees. Modern organizational world may not be comfortable enough to specialists since the demand for all-rounders are growing day by day. Modern organizations ask their employees to work in various departments in order to utilize them effectively based on market fluctuations. For example, the demand for certain goods may vary time to time. It is nonproductive for an organization to keep a huge production workforce idle for longer periods when the demand for their goods becomes low. At the same time, it is unwise to appoint more sales staffs to increase sales when many of the production people remains idle. In such cases, the company may ask some of its production staffs to work in sales department. Production people may find difficulties while they work in sales department because of their lack of skills in canvassing sales. So they will try to show disengagement in their new assignment which is not good for the organization. In such cases, the organization should adopt

Sunday, September 22, 2019

Analysis of The Transcription of Kenyon Universitys Commencement Essay - 23

Analysis of The Transcription of Kenyon Universitys Commencement Address Article - Essay Example The example of fish and the story of ‘the atheist and the religious person’ are interesting narratives that emphatically put across the salient thoughts of the writer. He says that when students become responsible adults, they get so wrapped up in their own individual pursuit of their ambitions in life that they forget to apply their basic human trait that calls for understanding and compassion for others. In the speech, he says that the academic degree gives us the necessary skills to move forward in our professional and private life but unfortunately it does not teach us to be aware of small things that make us happy. ‘Education is not so much about filling you up with knowledge as it is about quote teaching you how to think’ is one of the most profound parts of the speech. Wallace has touched the core of the education system and has made a direct hit. He says that academia gives us knowledge and a knowledge-based capacity to think. But unfortunately, it does not give one confidence to justifiably apply the wider perspectives of those informed choices on our day to day life! We are afraid to look at the different perspectives because that may not conform with our present aims and objectives. We, therefore, end up with a hard paced robotic life where ‘my and mine’ becomes omnipotent. He exhorts the students to become more flexible in their outlook and look beyond the fast-paced life of professionalism. He says that like an atheist, who refuses to acknowledge the two Eskimos as answers to his prayers, we are also deluding ourselves with our make-believe successes and unrealistic goals.

Saturday, September 21, 2019

Kristens cookie company Essay Example for Free

Kristens cookie company Essay From the given data we can draw the following Process Flowchart The case analysis yields the following points 1. The time taken to fill rush order will depend on whether there are any orders that are being processed currently or not. Accordingly we will have two scenarios a). No order is being processed when the rush order is received. The time in this case will be equal to the sum of the time required for all the processes. Time = 6 + 2 + 1 + 9 + 5 + 2 + 1 = 26minute b). An order is being processed when the rush order is received. In the worst case, the cookies will have just been put in the oven. Thus oven will not be free before (1 + 9)= 10 minutes. By this time, the washing of the bowl and mixing of the dough for the rush order will be done. This will take 8 min. Since oven will not be free for 2 more minutes. Thus total time for this process will be 8 + 2 + 1+ 9 + 5 + 2 + 1 = 28 minutes Every additional order of a dozen cookies will take an additional 10 minutes to fulfill (as the time taken for baking is the only bottleneck involved) 2. If we are open for 4 hours (or 240 minutes), the number of orders that can be filled will be: Every order will take 10 minutes, since the baking time (ie 10min) is the bottleneck, except the first order which will take 6+ 2 =8min in the beginning and the last order which will take 5+2+1=8 more minutes. Thus, [240 (8+8)] / 10 = 22.4 orders can be filled in a day. That is 22 orders or 22*12 = 264 cookies in a day. 3. I am performing the process of washing, mixing and filling the dough in the tray, while the roommate is putting the tray in the oven, packing, and collecting the payment Thus for each order I spend: 6 + 2 = 8 minutes Roommate spends: 1 + 2 + 1 = 4 minutes A problem of idle time arises when more than one order is to be fulfilled, now if 2 simultaneous orders come, then I will have an idle time of 2 minutes and the roommate will have an idle time of 6 minutes. 4. If we order 2 dozen cookies or 3 dozen cookies, then my time will be reduced for washing and mixing, since the dough for 3 dozen cookies can be mixed together. That is my time will be reduced by 6 minutes for a 2 dozen order and 12 minutes for a 3 dozen order. My roommates time will be reduced by 1minute for 2dozen and 2 minute for 3 dozen. It is the time required for collecting payment since now she will collect payment only once for the whole order. However the total time for the process is still the same, since the baking process is the bottleneck and this will not affect the process of baking ,If this time that is saved, can be utilized for some productive work, which can earn more than the discounts we give, only then should we give discounts for 2 dozen or 3 dozen orders. 5. The business can be run smoothly using only one food processor, but the minimum number of trays that are required are 2 trays. This can be explained as follows The total time required for fulfilling an order is 26 minutes, now if another order is taken before the fulfillment of the first order then we will need another tray in which to place the ingredient mix and prepare it for baking. If we have further orders then the first tray can be used again since it will have come back after the cooling cycle. 6. To make cookies in lesser time we can use 3 ovens or use an oven with a larger capacity. With 3 ovens we can make 3 dozen cookies in just 31 minutes as compared to 48 minutes taken with just 1 oven. This amounts to an increase of 35% in sales due to time being saved. Addition of an extra oven can also help in this regard; with an extra oven we can fill 28 orders in a day instead of only 22 orders. Thus the additional rent that we can pay for an additional oven will be an amount lesser than the additional profit made by tending to 6 extra orders in a day. The additional oven will be very useful since the main Bottleneck encountered in this process is the time taken to bake the cookies. Additional analysis 1. If I were to do the whole process by myself it would take me 36 minutes to fill 2 orders which come back-to-back. The problem in this case would be that there can be no parallel processing. Thus after every 2 orders the process of baking has to start afresh, hence the total number of orders that can be filled per day will be X = (240*2)/36 = 13.333 Therefore only 13 orders can be filled everyday as compared to 22 that can be filled by 2 people. Hence working alone would have the same costs but sales would decrease by close to 50%. 2. There will be no effect on the time taken to manufacture the Crash priority order that has come up; both the new order and the order already in the oven can be delivered on time. The only problem here can arise if we have other orders in queue when this order arrives, then those orders will have to be kept waiting when we attend to this order. We can charge the customer a premium which will be equal to the number of orders whose delivery time will be extended beyond an hour due to this order. i.e. if we have 6 orders in queue and 3 of them are delayed due to the new order then Premium charged= No. of orders unfulfilled due to the new order * price; 3. The entire process time taken here is 26 minutes; every additional order will take an additional 10 minutes. Therefore we can service 4 orders in the first hour and 6 orders in every subsequent hour, this holds good if we have to deliver within an hour. If that restriction is relaxed, then delivery time we promise will be determined by the number of orders already in queue and any work-in-progress The formula that we can use for determining delivery time will be Time = (No. of orders in the queue*10 minutes) + (Work in progress* Time remaining in baking) + 10 minutes (Baking time of the new order) + 8 minutes (time till packing) i.e. if we have 3 orders in queue and another order which has to be baked for a further 5 minutes the delivery time we can promise will be Time = (3*10) + (5) +10+8 = 53 minutes. This is how we can promise delivery. 4. The major factors that should be considered at this stage of planning the business are what prices to charge, how many orders to accept and what can the profit be, the business has no extra costs apart from the input costs. But to safeguard against breakdown of equipment we must add a maintenance charge for the machine maintenance, the other costs that can come into picture are the opportunity costs, i.e. if our time was utilized in other tasks what could have been the profit we could have made. Hence these are the important factors that must be considered at this stage of planning. 5. If the product was a standard product then the following changes could be made * We can have 3 ovens, this will be useful because if the product is a standard one then we will always make 3 dozen cookies every time we prepare a mix, thus it would be useful for us to have 3 ovens as it would considerably reduce our time and give faster output * We can increase the number of orders that we can service each night * The order-taking system will be changed since now there is no customization so we will only be required to ask the customer as to how many dozens does he/she want These are the changes that should be made if the product is changed to a standardized one.

Friday, September 20, 2019

The Geometric Arrangement Of Computer Systems

The Geometric Arrangement Of Computer Systems A network often simply referred to as computer network, is a collection of computers and devices connected by communications channels. Computers on a network are sometimes called nodes. In information technology network is series of points or nodes interconnected by communication paths. These communication channels facilitate communications among users and allow users to share resources with other users. Networks may be classified according to a wide variety of characteristics. Topology : The geometric arrangement of a computer system. The most common topology or general configurations of networks include the: Bus topology Star topology Token ring topology Networks can also be characterized in terms of spatial distance: A group of two or more computer systems linked together. There are many types of computer networks, including: Local-area networks (LANs): In this type of network the computers linked within the organization. Wide-area networks (WANs) : The computers are farther apart and are connected by different communication channels. Metropolitan-area networks MANs): A data network designed for a town or city. Campus-area networks (CANs): The computers are within a limited geographic area. Egg: campus Home-area networks (HANs): A network contained within a users home that connects a persons digital devices. Internet Protocols: Before going to Internet protocols first we have to know about the protocol. Protocol : The protocol defines a common set of rules and signals that computers on the network use to communicate. The Internet Protocol (IP) is a protocol used for communicating data across a packet-switched internetwork using the Internet Protocol Suite, also referred to as TCP/IP. The Internet Protocol is responsible for addressing hosts and routing datagram (packets) from a source host to the destination host across one or more IP networks. The sending of packets from source to destination is performed based on two types of networks: These networks include: Wired network: A wired network is a physical system that allows multiple computers communicate with each other. Wired networking is usually accomplished by using cables and other hardware to connect one computer to another. Once a wired home network has been installed, users within the network can share computer files and documents as well as printers and scanners. In This network the packets are transferred by using TCP/IP. Wireless network: Connecting one computer to another computer is called network. We are connecting these computers to transfer packets from source to destination. But we are using wireless network, instead of cables we are using radio waves to transfer these packets by using UDP (User Datagram packet). TCP/IP Architecture: Internet protocol suite which standardized for the entire networking environment describes specific rule guidelines for communication strategy. This protocol architecture deals with communication between source and destination which means how the data should be formatted, how the packets should identify the address of the receiver and how the packets are transmitted from source to destination. In this TCP/IP architecture the data should be transferred in the form of packets from source to destination. The transmission of packets starts from source and these packets transmits through different types of layers and finally it reaches the destination. In this architecture there are 4different layers, each layer performs its own functionality to reach destination. In this architecture each layer sends the information to the lower layer to process the functionality of that layer, after completion of processing the information passed to lower layer and so on. This process repeats till the packet should reach the destination. The 4 different layers of TCP/IP protocol architecture and each layer is described below: Application Layer: This layer provides the some functionality to perform different services of the lower layers. And this layer provides different protocols for the purpose of exchanging data between different layers. The protocols which are defined by application layer are known as application protocols and these are used to exchange the information: There are different protocols used in application layer are described as follows: The Hypertext Transfer Protocol (HTTP): This protocol used in application layer which is used to perform the transmission of files among the network. The File Transfer Protocol (FTP): It is also one protocol used in application layer to perform the transmission of interactive files. The Simple Mail Transfer Protocol (SMTP) by using this protocol the transmission of mail messages and file attachments are done. The functionality of application layer similar to the functionalities of OSI Application, Presentation Layer and Session Layer. Transport Layer This is the second layer of TCP/IP protocol architecture. This Transport layer deals with Transmission Control Protocol (TCP).This protocol is used to know the status of packet transmission whether it reached the exact destination or not. Before reaching the destination it performs the error checking which means it is in the right order or not. Network Layer This is the one of the important layer of TCP/IP protocol architecture. In this layer it deals with the Internet protocol (IP).The communication of these layers should be done by using this protocol. Network Access Layer The network access layer is the combination of Data link layer and physical layer. The Data link layer deals with the transmission of data packets across the architecture. This Data link layer provides different functionalities like formatting the data in packets, error detection and the flow of data from source to destination. And coming to physical layer deals with the physical medium such as voltage levels, connector types and handshake procedures. TCP/IP Protocol Layers Chapter 2 In chapter 1, I have mainly discussed about the VoIP and brief structure of dissertation. This chapter helps in understanding the VoIP system, key components, and protocols. It is good to understand the concepts and the technology when working on a new system. 2.1 Overview The generations have changed, so the way of communicating to your family, friends has changed. Not only quality is a concern but low cost is also an important factor for making calls. These are the few things which brought a lot of research work for Voice over internet protocol (VoIP). VoIP is a way sending voice packet over the internet. VoIP not only provides cheap calls but also provides better quality than before. 2.2 What is VoIP? VoIP is one of greatest invention in human kind; it basically allows transmission of human voice in the form of digital packet over a network. It is in demand due to lower call rates, implementation on a existing network, better quality than before. Many people, organisations have been consistently working on this technology to get a better performance of the service. This technology could be also implemented in a local area network. The process involves compressing and digitization of voice and transforming into Internet Protocol packets and sending the format over network. This is the process which is known as Voice over Internet Protocol (VoIP). [4] 2.3 VoIP History Computer to Computer calling begin in Israel in 1995 by vocaltech Software by name internet phone. This software was designed and used to make Voice calls [8]. The whole system consists of basic things such as speakers, modem, and sound cards. The voice signals were digitized, turned into voice packets, so that they could be travelled over the network and in the end, packets would be shifted back into voice signals. The overall quality was not at all good and not even near traditional phone calls. But still it is considered as a major milestone as it was birth of new technology. The designed software had to be installed on both systems (caller and receiver) to process the voice call. Therefore it was the birth of first IP phone. Later after few years in 1998, number of private companies, organisation started working and using this technology more effectively. It is valuable assets as it is due to provide cheap long distance calls, avoid high charges with traditional phone system. These companies were able to design and organize VoIP doors on the internet, which would allow cheaper calls through Computer to Computer and also from regular phone to phone. This enhancement brought more awareness of the technology, market profits among private organisation and investors. However on the other side general people were unknown with the technology due non availability of high speed internet connection in most of the areas. This was one of the main reasons that it couldnt get popular quickly. Enterprises, small organisation already started using the benefits of VoIP; communication with voice across the networks was deployed and used. As time passed more standards and protocols were introduced for better quality as VoI P in beginning stages was not a good quality [4]. In initially stages when it was introduced, it was not considered as a potential technology. In some parts of North America it was offered free, which allowed free phone calls using regular phone. Though it was not considered potential technology, it was slowly getting popular and accepted in various areas such as enterprises, general public. Finally it was a well known model by 1998, where VoIP was used about 1% of voice traffic and in just two years of time by the year 2000, it was used over 3 % of traffic. This growth was mainly due improvement in the system. [10]. VoIP is rapidly growing year by year. It is likely to reach around 300 million users of VoIP around the world. 2.4 Protocols A protocol can be defined as a combination or set of rules. These are necessary for data transmission by two or more computers over a network. These protocols determine data compression, acknowledgements, and error checking methods. [12] 2.4.1 Internet Protocol Internet protocol is the primary network protocol used across the network. By using this protocol the packets are sent across the network.It is a connectionless protocol which means each packet is travelling in the network is independent and is not related to any other unit. The connection oriented protocol transmission control protocol (TCP) handles all the packets. 2.4.2 H.323 The H.323 is one of the two important protocols used in VoIP. H.323 protocol is a standard designed by international telecommunications union (ITU), which sets rules for multimedia applications across the network. It is used for sending audio, data packets, and video over IP network, which basically means providing real time multimedia applications. It behaves as real time protocol and also non real time protocol. [6]. Most of the ITU-T terminal recommendations provide only terminals. However H.323 provides various components along with terminals on a network [13]. They are gateway, gatekeepers, and multiple control units. These components provide point to point/multipoint multimedia communications, when connected together. Below is the figure of H.323 architecture Figure: 1 H.323 architecture Ref [13] 2.4.2.1 H.323 terminal The H.323 terminal is also known as client; usually it is a computer or internet phone with H.323 client. The H.323 terminal gives real time bidirectional video, voice, data interactions. H.225.0 is used to specify call signalling, packetization, synchronizations. On the other side H.245 is used to specify messages for opening and closing logical connections beside other commands [14]. 2.4.2.2 Gate keeper Gatekeeper supports address translation and other access control for H.323 standards. H.323 is the standard that points the system; this protocol provides different types of services such as voice, video and packet transmission. A gatekeeper acts as routing manager, which is responsible for all end nodes in a particular area. [11] 2.4.2.3 Gateway Gateway is a part of the VoIP system, which is used to modify audio and fax call in real time. Mainly it works between internet and plain old telephone system as a converter. This IP telephony gateway converts analogy signal into internet data packets and sends data as a regular data packet over a network. Once the packet is received on the receiver end, it is re converted into analogy voice signal. It allows regular telephone calls to be achieved through the internet and provides communication between Private Branch Exchange (PBX) and internet.[15] 2.4.2.4 Multi Point Control Units Multipoint Control Unit (MCU) acts as a multipoint conference to establish a connection among three or more devices and gateways. It is usually integrated with a client , gateway. There are two elements associated to MCU, one is multipoint controller and second is multipoint processor. In this multipoint conferencing, two types of stages involved, centralized and decentralized. Centralized multipoint mode provides direct communication of H.323 devices to MCU in P2P method. Multipoint controller is used in a point to point call way and moreover it is also used to check if it has to multi cast or uncast the information such as audio and video. In the other mode decentralized multipoint, multicast method is used to transfer all data to other devices. The multi point control unit checks the readiness of all devices and sends different data streams [16]. 2.4.3 SIP It is a protocol used for modifying, terminating, establishing sessions over a network. It is also called as signalling protocol and mainly used for internet telephony VoIP calls. It is designed by the internet engineering task force (IETF) for real time transmission. There are different components in SIP.SIP is less weight than H.323 and moreover when it comes to flexibility, it is more flexible [17]. It can also used for video, audio, multimedia sessions. It is more popular and being adopted more due to more flexibility than H.323. The structure of SIP is same as of Hyper Text Transport Protocol (HTTP); it follows the client server model [18] 2.4.3.1 Main Components involved in SIP User Agent User Agent works as logical entity at SIP end station software. It acts as client when initialising session requests and acts as server when replying to a session request. It has the capabilities of initiating and answering calls. It also has the ability to save and manage call state that is why it is known as intelligent [4]. Proxy Server They are used as computers and requests are forwarded by them on the behalf of other computers. They are one kind of intermediate server, forwarding requests from the user to SIP server [4]. Figure: 2 an example of proxy server Ref [4] Redirect Server It is a second type of intermediate server. The main responsibilities of this server is to give name resolution and user location. It simply gives the information needed to start the originating client. Once it has been done, it is no more involved in the process [4] Registrar Server Registrar Server is a server that is used to register the location information from the user agent and saves the registration information. This sort of concept creates a directory for all logged and also specifies their location.[4] 2.5 QOS QOS is Quality of Service refers to the capability of a network to provide better service to selected network traffic over various technologies, including Frame Relay, Asynchronous Transfer Mode (ATM), Ethernet and 802.1 networks, SONET, and IP-routed networks that may use any or all of these underlying technologies. The primary goal of Qos is to provide priority including dedicated bandwidth of service is most important part for any multimedia application. It is more considered in a private network such as connection of multiple offices than on worldwide internet. Initially, internet was known for sending email and file. However it is more than just sending files, now it has real time applications such as video, gaming, internet telephony. As the VoIP technology has evolved so much, there is more need for better Qos. Below table provides a list of Qos parameters [19]: For a successful VoIP deployment, Qos is an important tool. Bandwidth is one of important factor in VoIP, if enough bandwidth is provided; the voice quality will be more than just satisfied. This is the reason services in organisation doesnt need planned QOS as they have enough bandwidth. A successful VoIP deployment requires a careful examination and network assessment, as well as a system to measure and monitor the system in order to benefit from the cost savings, flexibility and functionality VoIP offers. There are five areas to consider when planning a VoIP deployment: Make sure the network can handle VoIP. Keep the deployment simple. Create network service maps and update service-level agreements. Consider QoE. Quality of experience (QoE) . Review, reassess and repeat. However as the network grows such as internet, more complications, issues arise as there are multiple services to be handled, several areas are to be covered, security is concerned. The aim is quite simple, IP telephony must meet the requirements of a user, which means voice quality should be similar to that of PSTN in such a way to retain same standards and satisfy the user expectations. When the voice signals are transmitted over the network, the data is divided into packets and transmitted across the network through network elements such as routers, switches. In this process to achieve better results, Qos is to be followed which would give importance to real time application over non real time applications.[20]. The main factors network analysis are mainly delay, jitter (variation in delay), and packet loss. Packet Loss: One of the very important factors in VoIP Qos is packet loss. This generally occurs when the packet is dropped during peak loads and congestion. This happens as VoIP packets are very sensitive of voice transmission. The main reason or largest cause of a packet loss is a packed being dropped due to overload in the network. This is the main factor which can significantly affect VoIP quality [22] Delay Delay is the key performance of QoS , which is needed to be reduced . End to end delay is the duration taken by a analog signal to transmit from the sender to receiver. Delay does not produce noise , however it affects the quality of conversation. When the delay reaches about 250ms, the telephonic conversation observes its impact. Between 300 ms and 500 ms the talk gets slightly difficult. Finally if it reaches above 500 ms makes an impossible communication. In VoIP the delay could be anywhere between 50 to 100 ms , however in POTS , the delay is generally under 10 ms.[22] Jitter Delay Variation sometimes also known as Jitter is the variation in packet delay. It is mainly the difference value between the delay of two consequent voice packets. In the internet terminology they can explained in a simple manner , if the packet n has delayed highly then chances are high for the packet n+1 also[21]. To reduce the delay between two queuing packets, a jitter buffer is used. This buffer stores arriving packets temporarily in order to reduce the difference value between two packets. For some reason, if the packets are delayed then it simply discards the packet. The acceptable value considered for jitter is between 0ms and 50ms and anything above this is not acceptable [18] done Techniques for jitter absorption 1. same playout time is set for all packets for whole session or for the duration of one session. 2. The second technique involves adaptive adjustment of the playout time during silence period related to present network. This technique is also called as talkspurts adjustment. 3. This technique is also known as within talkspurts adjustment. In this method constantly adapting the playout time for each packet, which needs the scaling of voice packets [15] 2.6 Initial VoIP Study and Design There are various real time applications running on internet, such as calling over PC, Video and voice. When deploying these services across networks, there are many difficulties and issues are faced. Some of them are directly related to QoS ; is the network capable of handling the new application and whether there will be any negative impact on existing services in the network. For real time application such as VoIP, which uses UDP as transport layer protocol, QoS is not guaranteed. Researchers are always working on these issues depending upon the real time application. In order to achieve good results, a good policy , QoS should be implemented. There are many things to be considered to give a high standard service. To begin packetization , delay , network design are few things to establish QoS.[7] However other things are signalling protocol , security, bandwidth, power failures. Certainly there are numerous methods available to achieve QoS. But it is really important to understand and estimate the requirement of this QoS by a particular system. Sometimes it is noticed by the engineers that spending on the network parameters is less than on QoS. As a result, it is important thing to consider before deploying, whether to design a QoS or not. 2.7 Components of VoIP Below figure gives an end to end VoIP system Components from sending point to receiving point. As seen in the figure the different components involved are encoder, packetizer, playback buffer, depacketizer , decoder. Voice is in the form of analog , which moves along the time , which usually is limited within 4kHz. Bandwidth [18]. The analog or audio signal is first converted into samples , which is a digital signal , which is then transmitted across the network [17]. Next to encoder it is packetizer , which encapsulates the digital samples into packets along with real time protocol (RTP),User Datagram Protocol(UDP),IP and Ethernet headers. Finally the digital packet moves into the network and passes through playback buffer. Playback buffer mainly used to absorb any kind of changes, delay. In final stages the packet enters depacketizer and then decoder which convert the digital signal into analog signal. Fig 3: source Assessing the Quality of Voice Communications Over Internet Backbones [17 ]. 2.8 CODEC A codec is software that converts analog signal into digital bits and transmits them as data across the network. These Codecs use high level methods for coding [12]. Table 2 : 2.9 Performance related QoS parameters. One of the most important metrics for QoS in VoIP is bandwidth. It plays an important role as the voice channels rely on the present bandwidth. Apart from this constraint, there are other important factors which also decide the quality of calls; they are loss of packets, delay and other variations. End to End delay It can be explained as the duration taken by the information to pass from the speaker or caller to the receiver. VoIP requires real time traffic transmission across the network and this transmission end-to-end delay is most important factor to decide QoS. ITU-T suggests that end-to-end delay should be less than 150ms for a high quality conversation [12] Bandwidth The bandwidth required to make a single call in one way is 64kbps. If the call is using G.711, the codec samples 20ms of voice for each packet. We need 50 packets to send per second. In addition to this packet, other headers of protocols are also added. They are real time protocol, user datagram protocol, internet protocol and Ethernet. In the end 226 bytes must be transmitted 50 times per sec. This value is only for one way. The total required bandwidth for each call is 100pps for both directions [19]. Call Distribution One of the very important factor before planning or designing is the calculation of internal and external calls. The call usage statistics plays an important role in VoIP deployment. The statistics would give a clear picture of nature of call, time, duration, peak time. In order to achieve best QoS , always a worst scenario should be considered. Like, busiest call transmitting time should be considered of the month. This would make sure that all other calls are provided with well planned QoS. 2.10 Advantages and Disadvantages There are many advantages associated with VoIP, especially when compared to PSTN it gives various benefits. The good thing about this technology is that it is not only beneficial to small and large enterprises but also for residential users. Low cost Most of the VoIP companies provide low calling cost for distant places, which are almost same as local call. Only condition is that the user must have broadband connection to use the VoIP service. Now a days most of the places such as homes, offices are equipped with internet connection. This is the main advantage with VoIP technology, as it does not need a completely new system to make cheaper calls. In some situations the calling cost will be absolutely free, even though the call will be an international call. Lets take the scenario where the user is using his or her computer connected with internet. In this process the user just needs software installed on the computer and also at the receiver end, software must be installed. The entire conversation between these two computers is free of cost. Multimedia Applications Apart from regular international calls VoIP service also provides unified messaging, real time applications such as audio and video conferencing, e-learning and other entertainment applications. VoIP has brought number of new things in the internet world. Corporate benefits VoIP, or Voice over Internet Protocol, is rapidly becoming a top choice for people wishing to avoid costly telephone service. For this reason it became more popular. The following are three top reasons for using VoIP. The reasons are Huge savings Options Its Not Going Anywhere VoIP calling can significantly remove all international charges for companies making distant calls overseas. These savings can be also included when calls are made within the organisations. But when it comes to international calling more savings are achieved. Especially for companies with data networks have an edge over the technology. With recent improvement in VoIP quality, call can be compared to PSTN and used as regular method of calling. Disadvantages However, there are still some disadvantages of VOIP especially when it comes to using the technology for functions beyond the one caller to one caller scenario. one of the disadvantage is If multiple users need to make VOIP calls, it can be difficult for the company to know exactly how much bandwidth to provide especially if internet access, video conferencing or other data transmission services are using the same path. Broadband connection A high speed internet service is necessary to run VoIP service; it is applicable for both enterprises and residential. If the internet speed is low, then quality of VoIP may degrade. Power outage One of the major drawbacks of VoIP is disconnection of service in power outage. Whereas PSTN works even when there is power outage. Comparatively PSTN is more reliable in such situation. However this situation can be controlled in VoIP by using generators to provide power. Chapter -3 Literature Review Related Work In order to provide more security the usage of VOIP network deployment is increased. Because of low price calls most of the enterprises uses network, it causes network congestion. To avoid network congestion we preferred VOIP network deployment system. After many researches, VOIP is issued in both wire and wireless. The demand of VOIP service has increased because of its security, performance, quality of service (QOS) and network infrastructure enhancement. This chapter mainly focused on research papers on VOIP deployment and present reviews of performance and quality of service (QOS) measurements. 3.1 VoIP Network Securities In general there are always problem with network attacks like denial of service, worms, network attacks which can be made by man and etc. similarly VOIP system can also faces the attacking problems and degrade the performance of voice services. Here we need to prefer intruder detection system which can handle the network oriented attacks efficiently. Even we will get attacks like spams on the mailing system. The main aim of denial of service is to interrupt the services from resources by making them unavailable to the user. Multi-Layered VoIP Security Because of threats attacks the quality of voice will be degrade, it causes the service useless. Denial of service and distributed denial of service attaches degrades the quality of voice. VoIP service introducing the greatest achievement by providing security in communication by control (signaling) and content (voice) parallel channels which together form the VoIP service. The attacks damage the whole service useless. 3.2 VoIP network Performance In communication world , a lot of research work is going on to evaluate VoIP performance by analyzing different inputs such as traffic, packet delivery time, receiving time, jitter and network congestion. In the reference [4], the author designed a network model using computer simulation. This research explains the network performance in respect to various available links and network. The VoIP performance review shows the loss patterns in terms of packet loss, delay time and network congestion, it measures the delay and loss characteristics. Kostas [5] deliberated the VoIP performance on different networks and they discuss the delay and loss measurement characteristics, they discuss founded on round trip delay measurements. The quality results can be seen with the delay and packet loss. 3.3 VoIP Quality of Services VoIP services are gradually adapting in to new level of services and used by different sectors. Currently there are some challenges for this technology. Anyone providing VoIP services should be able to achieve certain standards and quality of the service should satisfy the user. The availability of QoS is an important factor for the end users. Therefore understanding the issues related to QoS is one of the important factor , QoS parameters should be properly analysed and if any loop hole is found , it should be accordingly rectified. Cole et al. [6] propose a quality measurement method by studying the review on E-Model [7] by measuring the quintiles of delay and loss. Markopoulou et al. [8] employs subject quality measures to review internet backbone ability, this work is based on packet tracer which are able to present overall quality of VoIP. In this

Thursday, September 19, 2019

Paediatric palliative care Essay -- Health, Nurses, Health Care Provid

Paediatric palliative care is a taboo topic in today’s society. Paediatric palliative care is a topic that society avoided and does not want to deal with. The World Health Organization (WHO) defines paediatric palliative care as palliative care is the attempt to improve the quality of life in patients who are facing life-threatening illnesses and family members through the prevention and relief of suffering with early detection and treatment of pain, physical, psychosocial, or spiritual (Liben, Wolfe & Papadatou, 2008, p. 852). Some of the current issues surrounding paediatric palliative care is that health care providers, mainly nurses are feeling the burnout and frustrations of caring for a dying child. Many nurses have claimed to have moral and ethical distress which in turn, can lead to feelings of helplessness and anger (Morgan, 2009, p. 88). Health care providers may also feel personal pain during the care of a dying child (Morgan, 2009, p. 88). Many health care providers and families feel like there is a lack of communication about the disease and treatments the child is receiving, as well as the patients often feel like they do not have a voice about treatments (Hsiao, Evan & Zeltzer, 2007, p.361). The lack of education and knowledge about paediatric palliative care leads to society treating the subject of paediatric palliative as taboo and forbidden to talk about because no one wants to admit that children unfortunately die (Morgan, 2009, p. 87). Research has shown that many patients will benefit from paediatric palliative care programs and education, but studies have shown that out of 3,000 hospitals in the United States, less than ten percent have programs for end-of life care based toward children (Morgan, 2009, ... ...are of paediatric palliative child. Online resources would be beneficial for families who are in rural areas or who do not have access to many places because of the limitations on travel due to their child’s illness because everyone wants information about what is happening during this difficult time to ease some of the concerns. Inservices, IPPC, simulations, ACNs and communication are all needed in order for the health care providers to maintain and provide a therapeutic relationship with the patient and their families. With better education about paediatric palliative care, knowledge of the effects of caring for paediatric palliative care on the health care providers, communication between families, patients and health care providers about paediatric palliative care, can provide a therapeutic relationship with families and patients during a very difficult time.

Wednesday, September 18, 2019

Comparing the South Beach Diet and Food Pyramid Recommendations :: Health Nutrition Diet Exercise Essays

Comparing the South Beach Diet and Food Pyramid Recommendations   Ã‚     Ã‚  Ã‚  Recently, new ideas for diet and weight loss, such as the South Beach low carbohydrate diet, have been replacing the previously chosen ideas, particularly, the Food Pyramid. Both eating patterns recommend consuming larger quantities of some food groups than others, although which groups varies between the diets. The former emphasis on diet and exercise is also beginning to shift with the new diet choices.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  In previous years to lose weight a person was told to eat â€Å"healthier†, lower caloric intake, and exercise more. Many of these advocates promoted the food pyramid. The food pyramid, completed by the U.S. Department of Agriculture, recommends 6-11 servings from the â€Å"bread, cereal, rice, and pasta† group, 3-5 servings from the â€Å"vegetable† group, 2-4 servings from the â€Å"fruit† group, 2-3 servings from both the â€Å"milk, yogurt, and cheese† group and the â€Å"meat, poultry, fish, beans, eggs, and nuts group,† and â€Å"fats, oils, and sugars† are to be consumed â€Å"sparingly.† Serving sizes can be found on the label of most food products under the Nutrition Facts. Obviously, with the food pyramid, it is recommended that the group with the highest consumption per day should be from the bread, cereal, rice and pasta group, or the foods with the highest portion of carbohydrates.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The South Beach diet does not recommend specific quantities of any one group. The diet consists of three phases. Phase one is the strictest phase with a very low intake of carbohydrates. Bread, cereal, rice, and pasta are completely excluded from the diet for two weeks. Instead, the initial two weeks consists mostly of eating meat, poultry, fish, eggs, cheese, and nuts. Phase two begins by reintroducing â€Å"good† carbs back into the diet. Good carbs include fruits and sparing consumption of whole wheat/grain bread and cereal. Phase two lasts until a person reaches their goal weight. Phase three is a maintenance phase in which a person takes everything they have learned and makes it a lifestyle change. Arthur Agatston, the cardiologist credited with the South Beach diet says that if you crave something in phase three you

Tuesday, September 17, 2019

Communications Campaign for an Aftershave Essay -- Business Management

Communications Campaign for an Aftershave I have been requested to produce a communications campaign for my aftershave called Blizz, created by Lacoste, with a budget of  £300,000. The things I need to include are an explanation of the importance of advertising and public relations to a business, an explanation of advertising media and their advantages and disadvantages, discussion of the reason businesses use public relations and the tools used in the public relations and a list of the consists on a communication campaign. My target audience for my blizz fragrance are businessmen aged 30 and on words. There interests are in business investments and buying posh expensive goods. The Blizz fragrance will be campaigned on national television and at department stores such as House of Frasier, Beatties and Debenhams. Young women going around the store giving testers out to the public will advertise the fragrance. I’m going to make my advert interesting and classy so it will appeals to the all business men, the advert will show all ranges of business men buying the Blizz fragrance form house of Frasier. The language in the advert will be in posh English and every body will be wearing suits, the women in the advert will fall in love with the men once they brought the fragrance. The colours used in my advert are going to suttle and eye catching. Research shows that advertising in men’s â€Å"grooming† books and magazine, the idea of virility and masculinity is something very different today. More attention is paid to the body and sensuality is considered and asset, not something to be hidden. Men’s fashions have also changed, becoming more colourful, varied and seductive, all factor which explain the boom in men’s fragrances, which now represents an astonishing one third of the turnover of the various fragrance companies. The male market is here to stay – and the experimental fragrances, such as Davidoff’s Cool Water (fruity, floral notes), and New West by ARAMs (salty, refreshing notes) have capitalized on this new openness in male fragrances. When I searched the web for "commercial production", lots of names came up and I wasn't really sure which to trust and which I couldn't trust. After a lot of clicking the main results, I decided to switch over to the sponsored results, which on Google appear on the right side of the page in little boxes. I found that the fi... ...newspapers prompting a certain product or a business. Sponsorship- sponsorship is when an organisation uses their product to sponsor someone or something for example when ITV uses Cadburys chocolates to sponsor Coronation Street. In house magazine- this is when an organisation uses a magazine to promote their product thin in their company. Corporate image – this is when an organisation sets out an image to attract a certain type of consumers for their product. Local Environment Projects- this is when the organisation promotes their product in their local environment to see what the public thinks about their product.  · The reason businesses use public relations is to-:  · Create strong community relations  · Be aware of there social responsibility  · Persuading customers to by there products or services  · Explain customerÂ’s legal rights. The tools that I would use for public relations are: - Press releases- I would get the press to promote my Blizz fragrance in a newspaper for example the Daily Mail. Local environment projects- I would use this project by going to the markets and giving out free samples of my fragrance to the members of the public to see what they think of it.

Monday, September 16, 2019

Effects of Mobile Phones on Studies Essay

Abstract: Mobile phones are rapidly growing technology all over the world. According to new United Nations report 60% of the world has mobile phones. People of any age using it for interaction and other purposes especially the students. They use it for interaction and entertainment etc. as mobile phones have advantages it also have disadvantages and its effecting the students’ education. This study was conducted to determine the impact of mobiles on the education of students. The methodology of questionnaire was used to collect data. A small sample size of 100 students was taken from different colleges and universities of Lahore with the technique of simple random sample. And then the collected sample was analyzed on SPSS 20. Most of the students claimed that they uses the mobile phones to interact with friends and even teachers, they use it for entertainment whenever they get bored and even they use the mobile phone during their lecture also. Keywords: Mobile Phones; Education; school environment; University; Pakistan Introduction: Mobile Phones are widely growing technology all around the world especially in developing countries, and are becoming a social symbol as well. According to the new United Nations report, now 60% of the world has mobile phones and in 2002 only 14% of the world had any kind of mobile phones. People especially our youth are doing its extensive use, they are using it for entertainment, interaction with friends and family, learning purposes, and for internet etc. too. Mobile phones are removing distances among people now they are no need of landlines or any other kind of communicating source (fax, latter, e-mail etc.). Mobiles are becoming a part of life now a day. As technology changing rapidly, the technology of mobile is also changing. The new mobiles with new advance technology have many new and attractive features for its users. Mobile phones have many advantages and disadvantages as well. Our youth uses the mobile phones as messenger and spend their whole day in messaging and calls. Read more:  Effects of Cell Phone Addiction The so much use of mobile phone also causes of many diseases and other problems as well like economical, educational, political, social and in professional life and it has been proved from the previous researches about the effects of mobile phones. There are already many researches have been conducted about the effects of mobile phone. In our research we will try to find out how mobile phones are affecting one’s educational life, either it’s because of its advance technology or its extensive use. Students use so much of mobile phones that it effects their grades as they cannot completely concentrate on their studies. Mobile phones are also effecting school’s environment as students spend their time in making short message service (SMS) taking photos even without knowing the friends and sometimes also of the faculty. Even the school/college administrator thinks that the mobile should be bane in school. Mobile also have advantages as parents have security about their children if anybody in college/university gets late they can inform their parents. This study was conducted to determine how much mobiles are effecting our students’ education and how we can overcome from this problem. Mobile companies are giving them different calls and messages packages then how can we aware our students not to spoil their time on mobile as this is the time when they can make their future. Literature Review: There are many studies which suggest that mobile phones are effecting our youth’s education and their grades badly. Mobiles are not even effecting the youth’s education it also affecting the school’s environment. In an essay on internet sakazaki4693 (2009) [ HYPERLINK â€Å"† l â€Å"sakazaki4693† 1 ] suggests that mobile phone should be banned in schools as students always seems to look busy in short message service (SMS) multimedia message service (MMS) taking photographs of friends and faculty even without knowing them and many more. It wastes so much of their time. In an research paper Olofinniyi OE et al. (2012) [ HYPERLINK â€Å"† l â€Å"OEO12† 1 ] prpposed that mobiles phones are effecting secondary schools’ Academic performance and they concluded that mobiles are not effecting their performance but also introducing some negative habits in studs like use mobile during lecture or in library which lacking their performance , so parents and administration should discourage thm to use mobile phone. Research Methodology: This study was conducted with an aim to find the aspects of mobile phone usage among Pakistani users. The purpose of this study was to find that how mobile phones are effecting the grades and education of students. The methodology of questionnaire was used to collect the responses. The students of universities and colleges were taken as population with the technique of simple random sampling. From the selected population 100 students were selected as sample out of which 80 students responded back thus the response rate of this research is 80%. And then SPSS 20 was used to analyse the collected data. References: |Bibliography | | |x | | |Bibliography | | |x | | |[1] | | |sakazaki4693. (2009, February) www.studymode.com. [Online]. HYPERLINK | | |†http://www.studymode.com/essays/Schools-Should-Ban-The-Use-Of-192766.html| | |† | | |http://www.studymode.com/essays/Schools-Should-Ban-The-Use-Of-192766.html | | | | | |[2] | | |Olofinniyi OE, Fashiku Co, Fashiku BC, and Owombo Pt, â€Å"Access to GSM and | | |Students’ Academic performance in Secondary School of Osun State,

Sunday, September 15, 2019

Roger Federer

Roger Federer's fundamental needs, values, and orientation towards life are symbolized by the four astrological elements. Each person has their own unique balance of these four basic energies: fire (warmth, inspiration, enthusiasm), earth (practicality, realism, material interests), air (social and intellectual qualities), and water (emotional needs and feelings). Federer's â€Å"elemental make-up† is described below.Remember that most people are â€Å"unbalanced† or lopsided, and if Roger is lacking or deficient in a certain element (or elements), it simply means that he needs to consciously develop that particular aspect in order to appreciate and/or work harder in that dimension of life. Sometimes we overestimate the element that we are least endowed with, sensing it as a lack within ourselves, but more often we neglect or ignore it. The qualities described below will be reiterated and explained in more detail in the following pages.His life is likely to be full of e motional extremes, turbulence, joy and sorrow stemming from his own passionate nature and unpredictability. Roger Federer is impulsive and temperamental. For Roger, everything is intensely personal and colored by emotion. He may have difficulty viewing a situation from a detached, impartial or rational perspective, and he has little inclination to structure and order his life. However, fostering self-discipline, organization and focus is essential.Otherwise Roger Federer will be prone to extreme moodiness, alternating between lofty inspiration and despondency. At times, Roger Federer feels a great deal of internal pressure due to two of his dominant impulses which tend to conflict with one another. The desire for independence and freedom, the need for self-expression and ego recognition, and the urge to leave the past behind in order to propel himself into new experiences may clash with other, equally powerful needs – namely attachments to people and to the familiar, a compel ling urge for emotional closeness, and a desire for security.Balancing these two drives is a significant challenge for Federer. Even though his life may be less balanced and perhaps less stable than that of others, it is unlikely that Roger Federer would change it because he is very vibrant, sensitive and responsive to the ever-changing, dynamic quality of life. However, as you will read in the next chapter, Roger Federer has a sense of practical orientation and a certain down-to-earth approach, which helps to ground him somewhat.

How duration affects the rate of electrolysis in a Voltaic Cell Essay

Design and Conduct an experiment to investigate the effect of ONE FACTOR on redox reactions. Introduction:- The two main components of redox reactions are reduction and oxidation. Reduction is a gain in electrons and the decrease in oxidation number whereas oxidation is the loss of electrons and the increase in oxidation number. Voltaic cells, also known as galvanic cells generate their own electricity. The redox reaction in a Voltaic cell is a spontaneous reaction. For this reason, voltaic cells are commonly used as batteries. Voltaic cell reactions supply energy which is used to perform work. The energy is harnessed by situating the oxidation and reduction reactions in separate containers, joined by an apparatus (known as the salt bridge which primarily completes a circuit and maintains electrical neutrality) that allows electrons to flow. The functions of a voltaic cell are quite simple. There happens to be an anode and a cathode. The positive ions go the negative electrode (anode) whereas the negative ions go to the positive electrode (cathode). Electrons always flow from the anode (where oxidation takes place) to the cathode (where reduction takes place). Electrons flow across wires whereas ions flow across the electrolyte and the salt bridge. Aim:- The objective of this experiment is to see how the time affects the mass of the zinc electrode (anode) and the copper electrode (cathode) in a voltaic cell. Variables:- Variable Type of variable How it will be controlled Time (s) Independent (The one you change) Values from 5 to 35 minutes will be used Mass of anode & cathode (g) Dependent (The one you measure) Electrodes will be measured after each time interval Current (A) Controlled Measure the current with the help on an ammeter Initial mass of cathode and anode (g) Controlled Weigh out the electrodes using top pan balance from the beginning of the experiment Charge on ion Controlled Use the same solution for all the trials. The charge on the copper ion should be 2+ since the copper 2+ is being converted to copper metal. The charge on the zinc ion should be 0 because Zn is being converted to Zn 2+ Concentration of electrolyte Controlled Use the same solution for all the trials. The solution primarily should be 1 mol dm-3 (just like standard conditions) Area of electrodes (cm2) Controlled Measure the electrodes to ensure they have the same dimensions (9Ãâ€"2.5cm). Use the same electrodes for all the trials. Volume of electrolyte (cm3) Controlled Use a measuring cylinder to measure out the electrolyte’s volume Atmosphere which we are working under Controlled Primarily we are working under standard room temperature of 298 K Apparatus:- * 1Ãâ€"22.5cm2 copper electrode * 1Ãâ€"22.5cm2 zinc electrode * 100cm3 1mol dm-3 Zinc sulphate solution * 100cm3 1mol dm-3 copper (II) sulphate solution * Filter paper (required to create a salt bridge) * 100cm3 of potassium nitrate solution (the spectator ion which I will require for creating the salt bridge which will complete the circuit and maintain electrical neutrality) * 2x200cm3 beakers * Stopwatch (à ¯Ã‚ ¿Ã‚ ½0.01s) * 1x100cm3 measuring cylinder (à ¯Ã‚ ¿Ã‚ ½1.0cm3) * Voltmeter * 2 connecting wires * Top pan balance (à ¯Ã‚ ¿Ã‚ ½0.01g) Method:- 1) Set up the voltaic cell. Use a measuring cylinder to measure out 100cm3 of copper sulphate solution. Pour it into the 200 cmà ¯Ã‚ ¿Ã‚ ½ beaker. 2) Next do the same for zinc sulphate. Use a measuring cylinder to help measure out 100cm3 of zinc sulphate solution. Pour it into a different 200 cmà ¯Ã‚ ¿Ã‚ ½ beaker. 3) Weigh the masses of the electrodes separately using a top pan balance. Record the initial masses. 4) Connect the wires to the outlets in the zinc and copper electrode. Place them in the corresponding outlets of the voltmeter. 5) After that we cut out some filter paper and dip that into our spectator ion (potassium nitrate) in order to build a salt bridge. The salt bridge will primarily complete the circuit, allow flow of ions and maintain electrical neutrality. The salt bridge will be placed in such a way that the ends of the salt bridge will be touching separate solutions of zinc sulphate and copper sulphate. The overall circuit should resemble the diagram in Figure.1. 6) Place the zinc electrode into the beaker with the zinc sulphate solution and the copper electrode into the beaker with the copper sulphate solution and at the same time, start the stopwatch. Keep the stopwatch running until 200 seconds elapse. *Note- we will be recording the time every 5 minutes because 1 or 2 minutes simply isn’t enough for the change to take place 7) Take the cathode out of the solution and measure its mass (remember, before doing so, shake it a couple of times in order to remove any moisture). Record the mass. Do the same for the zinc electrode 8) Place the electrodes into their respective solutions once again and start timing. Repeat steps 5 to 6 9) Repeat the same steps until we get mass readings for up to 60 minutes of experimenting. Data Collection and Processing Raw data:- – Initial mass of anode (zinc electrode): 31.29 à ¯Ã‚ ¿Ã‚ ½0.01g – Initial mass of cathode (copper electrode): 32.05 à ¯Ã‚ ¿Ã‚ ½0.01g Table 1 – Mass of anode and cathode obtained from different time intervals Duration of electrolysis (à ¯Ã‚ ¿Ã‚ ½0.21s) Mass of anode (zinc electrode) (à ¯Ã‚ ¿Ã‚ ½0.01g) Mass of cathode (copper electrode) (à ¯Ã‚ ¿Ã‚ ½0.01g) 300.00 (5 minutes) 31.27 32.08 600.00 (10 minutes) 31.14 32.16 900.00 (15 minutes) 31.08 32.27 1200.00 (20 minutes) 31.00 32.42 1500.00 (25 minutes) 30.83 32.49 1800.00 (30 minutes) 30.61 32.80 2100.00 (35 minutes) 30.25 33.08 Qualitative observations:- – We can see that the copper is deposited at the cathode where the cathode begins to get more pink/ brownish colour. – Blue colour of copper sulphate solution begins to get paler. – Zinc electrode begins to corrode a bit. Most corrosion can be observed at 35 minutes time interval. Note* – Uncertainties: The average reaction time was à ¯Ã‚ ¿Ã‚ ½0.5s even though it did alter from interval to interval. Note that there is also a à ¯Ã‚ ¿Ã‚ ½0.01s time uncertainty in the stopwatch itself. The uncertainty for mass is inscribed on the top pan balance as well. Data Processing: We must now calculate the mass changes which have taken place due to experimenting with different time intervals. (Different time intervals would result in a different mass change) This can be calculated simply by doing the following: Mass change = final mass – initial mass Due note however that this formula can only be used for calculating the mass change taking place at the cathode (copper electrode where reduction takes place). This is because copper 2+ is being converted to copper metal and is being deposited at the cathode. Obviously this would result in a mass gain at the cathode. Therefore, it would be better for us to use the formula ‘Mass change = final mass – initial mass’ so that it gives us a positive value for the mass change taking place at the cathode. Example 1 Mass change = final mass – initial mass => 32.08 – 32.05 => 0.03g Example 2 Now to calculate the mass change taking place at the anode (zinc electrode), we use the following formula, Mass change = initial mass- final mass. In this case we use this formula because we know that the zinc is being oxidized to zinc 2+ leading the zinc electrode to corrode. This therefore results in a decrease in mass of the anode (zinc electrode). Thus, it would be better for us to use the formula ‘Mass change = initial mass – final mass’ so that it gives us a positive value for the mass change taking place at the anode. Mass change = initial mass – final mass = > 31.29 – 31.27 = > 0.02 Table 2 -Mass changes of anode and cathode for each time interval Time (à ¯Ã‚ ¿Ã‚ ½0.21s) Mass change of Anode (Zinc electrode)(à ¯Ã‚ ¿Ã‚ ½0.01g) Mass change of cathode (copper electrode) (à ¯Ã‚ ¿Ã‚ ½0.01g) 300.00 (5 minutes) 0.02 0.03 600.00 (10 minutes) 0.15 0.11 900.00 (15 minutes) 0.21 0.22 1200.00 (20 minutes) 0.29 0.37 1500.00 (25 minutes) 0.46 0.44 1800.00 (30 minutes) 0.68 0.75 2100.00 (35 minutes) 1.04 1.03 Graph 1:- Graph 2:- To derive the equation for the two separate reactions, the number of electrons gained or lost during the process has to be deduced. The mass change per minute can be deduced from the gradient. Therefore we first calculate the gradient of graph 1 (mass changes for zinc electrode). For calculating the gradient, find two points which perfectly fits in the grid. In this case, the points (0.04. 100) and (0.08, 200) Gradient= (Y2 – Y1) à ¯Ã‚ ¿Ã‚ ½ (X2 – X1) = (0.08- 0.04) à ¯Ã‚ ¿Ã‚ ½ (200 – 100) = (0.04) à ¯Ã‚ ¿Ã‚ ½ (100) = 0.0004 Therefore, the gradient of the first graph is 0.0002. So the mass change per minute for the anode is 0.0004. Next, we calculate the gradient of graph 2 (mass changes for copper electrode). To find the gradient, we work with the points (0.20. 500) and (0.24, 700) Gradient= (Y2 – Y1) à ¯Ã‚ ¿Ã‚ ½ (X2 – X1) = (700 – 500) à ¯Ã‚ ¿Ã‚ ½ (0.24- 0.20) = (200) à ¯Ã‚ ¿Ã‚ ½ (0.04) = 0.0002 Therefore, the gradient of the first graph is 0.0002. So the mass change per minute for the cathode is 0.0002. The uncertainties also need to be propagated through the summation of the fractional uncertainties. Uncertainties regarding zinc electrode:- Fractional uncertainty of mass = absolute uncertainty à ¯Ã‚ ¿Ã‚ ½ actual value = 0.01 à ¯Ã‚ ¿Ã‚ ½ 0.02 = 0.500 Fractional uncertainty of time = absolute uncertainty à ¯Ã‚ ¿Ã‚ ½ actual value = 0.21 à ¯Ã‚ ¿Ã‚ ½ 300 = > 0.0007 = 0.001 Total uncertainty = 0.001 + 0.500 = 0.501 to 3 decimal places Therefore the rate of change is 0.004 à ¯Ã‚ ¿Ã‚ ½ 0.501 g/s Table 3 – Rate of change for each time interval for anode (zinc electrode) Time (à ¯Ã‚ ¿Ã‚ ½0.21s) Rate of change of anode (zinc electrode) (g/s) 60.00 0.004à ¯Ã‚ ¿Ã‚ ½0.501 120.00 0.004à ¯Ã‚ ¿Ã‚ ½0.067 180.00 0.004à ¯Ã‚ ¿Ã‚ ½0.048 240.00 0.004à ¯Ã‚ ¿Ã‚ ½0.035 300.00 0.004à ¯Ã‚ ¿Ã‚ ½0.022 360.00 0.004à ¯Ã‚ ¿Ã‚ ½0.015 420.00 0.004à ¯Ã‚ ¿Ã‚ ½0.001 To calculate the number of electrons in zinc electrode, the following equation may be used:- Number of electrons = molar mass à ¯Ã‚ ¿Ã‚ ½ mass of electrode (mass of one of the samples) = 65.37 à ¯Ã‚ ¿Ã‚ ½ 31.27 = 2.09 Therefore, this would be the half-equation which would occur at the cathode: Zn–> Zn2.09+ + 2.09e- Due to the loss in a bit more electrons compared to the theoretical formula, it would be a stronger reducing agent therefore the electrode potential would be lower (more negative) than that of the original value. Nevertheless, the electrode potential cannot be determined. Uncertainties regarding copper electrode:- Fractional uncertainty of mass = absolute uncertainty à ¯Ã‚ ¿Ã‚ ½ actual value = 0.01 à ¯Ã‚ ¿Ã‚ ½ 0.03 = 0.333 Fractional uncertainty of time = absolute uncertainty à ¯Ã‚ ¿Ã‚ ½ actual value = 0.21 à ¯Ã‚ ¿Ã‚ ½ 300 = > 0.0007 = 0.001 Total uncertainty = 0.001 + 0.333= 0.334 to 3 decimal places Therefore the rate of change is 0.002 à ¯Ã‚ ¿Ã‚ ½ 0.334 g/s Table 3 – Rate of change for each time interval for cathode (copper electrode) Time (à ¯Ã‚ ¿Ã‚ ½0.21s) Rate of change of cathode (copper electrode) (g/s) 60.00 0.002à ¯Ã‚ ¿Ã‚ ½0.334 120.00 0.002à ¯Ã‚ ¿Ã‚ ½0.091 180.00 0.002à ¯Ã‚ ¿Ã‚ ½0.046 240.00 0.002à ¯Ã‚ ¿Ã‚ ½0.027 300.00 0.002à ¯Ã‚ ¿Ã‚ ½0.023 360.00 0.002à ¯Ã‚ ¿Ã‚ ½0.013 420.00 0.002à ¯Ã‚ ¿Ã‚ ½0.010 To calculate the number of electrons in copper electrode, the following equation may be used:- Number of electrons = molar mass à ¯Ã‚ ¿Ã‚ ½ mass of electrode (mass of one of the samples) = 65.50 à ¯Ã‚ ¿Ã‚ ½ 32.08 = 2.04 Therefore, this would be the half-equation which would occur at the cathode: Cu2.04+ + 2.04e- –> Cu Due to the gain of a bit more electrons compared to the theoretical formula, it would be a slightly weaker oxidizing agent therefore the electrode potential would be slightly lower than that of the original value. Nevertheless, the electrode potential cannot be determined. Conclusion My results show that as the duration/ time intervals increase, the mass of the anode (zinc electrode) decreases and the mass of the cathode (copper electrode) increases. We can see that there is a strong positive correlation between the time it takes for both electrodes to change in masses. If the duration is longer, then more electrons flow from the zinc electrode to the copper electrode (anode to cathode) through the electrical wires, while ions flow through the salt bridge to complete. As we know, in a voltaic cell/ galvanic cell, oxidation occurs at the anode (negative electrode) where as reduction occurs at the cathode (positive electrode). Primarily, zinc is oxidized at the anode and converted to zinc 2+. This causes corrosion at the zinc electrode due to the metal being converted to ions thus the mass of the zinc electrode (anode) decreases. On the other hand, copper undergoes reduction at the cathode and the copper 2+ ions get converted to copper metal. This causes the copper metal to be deposited at the cathode thus leading to the copper electrode (cathode) to increase in mass as the duration is increased. The following anodic reaction takes place at the zinc electrode (this is the theoretical equation):- Zn (s) –> Zn2+ (aq) + 2e- However the equation we found experimentally is:- Zn–> Zn2.09+ + 2.09e- Hence, this suggests that since the former zinc sample has more electrons to lose, it is an even stronger oxidizing agent compared to the theoretical equation and is slightly higher in the electrochemical series than the latter zinc samples. According to the results that have been gathered, there is a positive correlation between the time it takes to electrolyse an aqueous solution and the rate of electrolysis. The rate of electrolysis was measured using the mass of cathode. If the duration of electrolysis is longer, then more electrons will flow through the circuit and more ions will flow from the anode to the cathode. Oxidation occurs at the anode whereas reduction occurs at the cathode. The cathode gains electrons therefore the mass decreases. The following reaction has taken place (although this is the theoretical equation): Cu2+ (aq) + 2e- –> Cu (s) However, the experimental equation is: Cu1.75+ + 1.75e- –> Cu Therefore this implies that since the former copper sample has more electrons to gain, it is a stronger oxidizing agent and it is lower in the electrochemical series than the latter copper sample. The value of the electrode potential hasn’t been calculated, however, the number of electrons is 25% off there that shows that there is a great difference between the literature value and the experimental value. According to the graph in the previous page, there is a very strong positive correlation between the mass change and duration of electrolysis as can be deduced from the high R squared value. The change in mass over a certain period of time is very gradual because of the size of the electrons. Although a lot of electrons are able to flow through the electrolyte, there is not such a drastic change. By looking at the graph, almost all the error bars for the points touch the line of best fit which means the data is fairly accurate. The theoretical mass of a copper electrode would be 31.75g. From the results that have been tabulated, the mass of a copper electrode is 36.21g. The percentage error can be calculated using the following formula: Percentage error = difference x 100 theoretical value = 4.46 x 100 31.75 = 14.04% This shows that although there is not such a big difference between the theoretical value and the experimental value. Evaluation Limitation Type of error Improvement The mass of the anode was not measured therefore the rate of electron transfer between the two electrodes could not be determined. This could have increased or decreased the mass of the cathode. Random Measure the mass of the anode The power pack has internal resistance therefore not all the current was emitted. This could have decreased the current, thus decreasing the number of electrons produced. Random Use a resistor to accurately measure the current The top pan balance had a zero offset error. This could have increased the mass of the cathode. Systematic Use the top pan balance with the 0.001 uncertainty to obtain more accurate values. a

Saturday, September 14, 2019

Article on a Person I Admire Essay

Depressed bulimic is a role model However inadequate to being a role model a depressed person struggling with bulimia might seem, our history holds an unquestionably notable one. Married to The Prince of Wales, Diana Frances became the first high-profile celebrity to be photographed touching an HIV-infected child and at once the most loved Princess of all times. Her life and activities had a significant impact on changing people’s attitudes and making the world a better place, for which I admire her greatly. The first Englishwomen married into the Royal Family had it not downhill, but no sooner had she been allowed to speak for herself irrespective of the Palace opinions than she became immersed in numerous charitable causes including getting involved in the AIDS research, which was strongly disapproved of by the Royals. Despite all criticism Lady Di continued throughout her marriage to patronise over one hundred nonprofit organisations. Increasing public awareness of the land mines issue and its dreadful consequences is also an achievement we should ascribe to The Princess of Wales. Doing all the charity stuff is, one may say, one thing and changing people’s lives is another, but still we have to give credit where credit is due, and the „Queen of Hearts† sure deserves one. Having problems as serious and discomforting to talk about as the rest of the nation (loveless marriage, bulimia, depression) and openly talking about them brought her closer to people than any other prominent figure has ever been. Her strength and confidence while overcoming seemingly insurmountable obstacles inspired others and encouraged them to make the best of a bad job. Although it has been over a decade since her death, Princess Diana is still looked up to and thought of as a women who was at once a royal personage and a compassionate friend. She would use all the media attention she was being given due to her position, status and fame to help those in need, especially the victims of diseases, poverty and social intolerance. (337)

Friday, September 13, 2019

Globalization or denationalization summary Essay

Globalization or denationalization summary - Essay Example There an increasing pressure for the IMF and US government for the implementation of both monetary and fiscal policies that comprise of global markets. 1. The subnational: a site for globalization Study of globalization entails both focusing global in scale and also locally scaled processes and conditions that are articulated within the global dynamics. It is essential to focus on the multiple cross-border connections that are aided by the reoccurrence of numerous conditions across localities. For instance, the global capital markets consist of both electronic markets that are global and locally conditions like financial centers that provide the infrastructure and trust systems for the global capital markets to function (Sassen p 1).Focusing on sub-national practices and globalization requires theories and methodologies that engage in both global scale and sub-national scale. Study of globalization under sub-national processes offers some advantages, but is challenging since it entai ls the use of both quantitative and qualitative research techniques. However, its provides the basis for utilization of sub-national and national data, but the studies must occur within the conceptual architectures of the researchers of such techniques and data sets since such data and conceptual framework was not geared to study of globalization. ... issue is the circuits that constitute political and economic globalization since a focus of places leads to demonstration of globalization in terms of several cross-border circuits depending on location of the place. Global cities are sub-national places whereby multiple global activities take place thus positioning such cities as structured cross-border geographies. For instance, circuits connecting Sao Paulo to global networks are different from those of other global cities like Frankfurt and Bombay. Increased economic transactions in older hegemonic cities like New York, Mexico City as well as emerging geographies like Shanghai that has a increasing cross-border transactions usually deviates from the concept of globalisation that is based on international trade, global markets and international institutions (Sassen p 4). The second aspect is the role of technology since firms and financial institutions use new technologies attain a global span. Surprisingly, resource-deficient fir ms can use new technology to become a microenvironment with a global presence thus dispelling the notion that physical proximity is a characteristic of local or nation. In deed, a reconceptualization of local is the notion that local scales form part of a nested hierarchy of scale from local to regional and finally international must be rejected. The third issue that arises is the interaction of the global dynamics and various aspects of national states since global is partially embedded in to national. The above three issues attest the fact that nationalism is inadequate due to transboundary dynamics some specific structuring of global within national requires special denationalization of some aspects of the national (Sassen p 5). 2. The devastating of older hierarchies of scale Some