Wednesday, July 31, 2019

Helping Parents and Caregivers Fight Chilhood Obesity Essay

Helping Parents and Caregivers in the Fight Against Childhood Obesity Young children acquire their knowledge through direct instruction, modeling, and experiences within their environment (Lanigan, 2010, p. # 369). Children who are obese are known to have lower self-esteem, and a higher risk of becoming drinkers, smokers, and/or socially isolated as they mature. Health concerns such as Cardiovascular Disease; Gall Bladder problems; Hypertension; and Sleep Apnea have all been associated with childhood obesity (Robinson; Geier; Rizzolo; Sedrak, 2011). Teaching portion control, implementing a healthy balanced diet, and adding in daily physical activities can help parents and caregivers in the fight against childhood obesity. Portion control is something that has to be developed from within a person. By introducing and practicing the use of healthy eating habits early in life, parents and caregivers are increasing the opportunities for a child to learn behaviors that can help them to dev elop a healthy life style. This type of life style can in turn increase the child’s chances of reversing or even preventing obesity. Teaching children to recognize what it feels like in their bodies when they are hungry or what could be called their hunger signals, while encouraging them to eat their food more slowly, and persuading them to stop eating when they feel they have had enough, even though they may still have food left over, are all ways of promoting healthy eating habits in children. The practice and observation of these skills will benefit children in their journey to a healthy life. Creating a healthy balanced diet can be a challenge for families. The convenience of the fast food industry has increased the challenge for families. Most families have parents or caregivers who work long hours and have little down time, causing them to â€Å"grab† dinner verses preparing it as was once the norm. In a balanced diet, the recommendation of carbohydrates is 45% to 50% of the total daily calories, while fat intake is at 30% to 35% (Philippas; Lo, 2005). Focusing on the right fats and carbs are of extreme importance. Making choices with fruits, vegetables, legumes, and healthier poly- and  monounsaturated fats, verses saturated fats and refined carbohydrates like white bread, refined sugar, soft drinks, cakes and candies, can dramatically assist in the battle against childhood obesity. While portion control and a healthy balanced diet are essential in the fight against childhood obesity, the benefits of physical activity should not be ignored. Exercise is a key component in the treatment and prevention of obesity in children (Robinson; Geier; Rizzolo; Sedrak, 2011). Exercise will assist in weight loss as well as improve metabolic risk factors such as hypertension, and has been known to have led to the lowering of blood pressure, along with reducing in depression, anxiety, and improvement of self-esteem (Robinson; Geier; Rizzolo; Sedrak, 2011). The obesity epidemic is being blamed for the rise in serious diseases and disorders (Robinson; Geier; Rizzolo; Sedrak, 2011). With this information of the multiple health concerns that have been associated with childhood obesity, parents and caregivers must be armed with education and resources to fight against this disease. Teaching portion control, implementing a healthy balanced diet, and adding in daily physical activities can help parents and caregivers in the fight against the disease known as childhood obesity.

Tuesday, July 30, 2019

Cost of Capital

We've regarded how cyber crimes impact the performance and how we can measure the impact of cyber crimes. Case study of Amazon Inc. epresents the main and general information about the ompany, identifies its mission and objectives. We've evaluated the current situation in company's business and performance. Our case also determined and found exposures of Amazon Inc. to cyber threats. We've reviewed the strategy and performance of the company from four perspectives: financial, customer, internal, innovation learning &growth perspective. On the basis of our findings we've given specific recommendations to the company that would help to achieve its goals and maintain leadership in the market of online retail.Recommendations correspond to four perspectives we've used to review performance of the company. We are onvinced that cyber defense is an integral part of company's performance and hence the performance management. 2. Introduction 2. 1 Cybercrimes in information age Cybercrimes appe ared at the same time as the Internet. And the ways and technologies of crimes were, are and would be improving along the development of machines and technologies in the whole and in particular the Internet. Cybercrimes became the part of our world and in order to protect us from that, governments of all countries provide the laws to prevent from such things.Also there are companies, which provide the security services against cybercrimes: Cyberpath, ESET, TDI and any others. But, unfortunately, they cannot solve all the problems. The existing criminal laws in most countries should cover computer-related crimes or electronically perpetrated crimes. 2. 2 Use of informational technology in fraud The biggest cyber threat is that it may happen at any given time, it is simply impossible to find out when the new wave will hit and more importantly what type of wave will it be. Cyber threat may take different forms.Here are the most common especially for our company. The first and the least dangerous is the threat, which has not material impact on the company. As an example can be the defacing of the company's website by hackers. Second, more serious is the threat, which is haling for the financial gain. Not only have the businesses entered the digital world. The criminals have done the same as well. And nowadays it functions Just like any other business. They have their strategies, management structures, quality control and so on.For example, hackers may obtain company's earnings reports before its official release. Having that knowledge, they may use it in making the decision of buying or selling stocks of that particular company. Keeping pace with new technologies also eeds certain portion of attention. Companies' risk exposure is constantly growing as the companies invest more and more in technologies (social, mobile, cloud, etc. ). All ot those can be a threat at the end ot the day. Mobile, tor instance, put the business in danger as the organization's corporate data suddenly may be assessed from the outside.Furthermore, the employees do not always fully realize the threat they are undertaking by sending, sharing or receiving the information on their personal devices. The same goes for social media, where the personal and professional line is often erased. One way that a hacker can gain illicit access toa system is through â€Å"social engineering†. Social engineering is a term used to describe deception against other humansl . A hacker may devise a scheme to trick another person into providing a username and password.Social engineering is as simple and effective as pretending to leave the room while another is signing onto a computer, all the while peaking around the corner to get a glimpse of logon keystrokes. Social engineering does not always take place face-to-face. Clever hackers have been known to place phone calls pretending to be a corporate help desk person or other legitimate artner asking for information that could compro mise access to computing resources. Imagine how many workstations are left wide open in a building when a fire alarm goes off.How long would it take for the alarm puller to drop a floppy into your desktop computer, initiate a process and be gone? Another category of intrusion tool is known as the scanner, or sniffer. Many operating systems come with vulnerability scanners that assist administrators in finding weaknesses. Public domain and commercial products are readily available, including SARA, Nessus, O SANS Institute 2002, Author retains full rights2. These scanners can reveal service ports that are open for attack and even details about the operating system itself.We should not be naive enough to think that these are out of the reach of the bad guys. Then, password cracking entails creating plain text passwords from their cryptographic hashes. Once the plain text password is garnered, access can be had. Password cracking tools are made available to system administrators for aud iting and recovery reasons. IP3 spoofing is a technique used by hackers as a means to gain hidden, unauthorized access to a target resource. They do this by impersonating a trusted resource.Specifically, a DDoS4 attack may change address information in the IP header of a message to make the target resource think the message is coming from a recognized, friendly port. When this technique is deployed in high volume, the attack can effectively dominate the target machine's resources, causing the target machine to perform sluggishly, or stop processing altogether. In addition to password cracking, social engineering, IP spoofing techniques, hackers have many other ways to perform destructive acts in the cyber realm.They have ways to hijack legitimate sessions, intercept and re-assemble IP fragments, take advantage of buffer overflows or flood a target machine with SYN requests. It is the wide and diverse nature of vulnerability today that argues for a strong cyber security management sy stem, one that begins with comprehensive policy and applies many technologies to achieve defense in depth. 3. Is business performance management relevant today? Business performance management is scientific approach to reaching the set of relevant and time limited goals by applying the definite set of metrics to assess the ffectiveness of resource usage.An evaluation of performance management regards indicators that numerically show the outcome of business activities. There are metrics for evaluating the success of a business: financial, internal, customer, strategic and compliance. Financial metric Financial metric includes sales, profits and costs. This metric shows us if our sales decreased or increased and if decreased, we should investigate why. But more important metric is how our profits behave. If our sales go down, our profits could still increase because we decreased the rate of cost.Internal metric Internal metric provides an evaluation management working at the company. As usual, this metric is better in small companies, because managers are closely connected with the employees rather than in big corporations. Customer metric Businesses exist to serve the needs of their customers. This means that behviour and loyalty of customers, and their level of satisfaction, provide us with a good measure for business long-term health and performance. Strategic metric Companies create strategies to reach short and long-term targets.An evaluation of the strategic performance management includes the quality of execution the trategies that management tried to implement. Strategies specify actions that management expects to achieve the desired result. An evaluation considers implementation of the strategies, successful execution of the planned actions by the company and whether results comply with the goals. Compliance metric Compliance metric measures effectiveness of compliance within the organization. Management should demonstrate ability to comply with financi al reporting standards, regulations and environmental legislation.Ideally, business should not have any imposed sanctions from the authorities. As we mentioned all these metrics are important for successful existence of the company. Without business performance management the company will collapse because, for example, if the company does not know what is its profit or its customer rate, what is inside in the company and so on and so forth. Measuring and keeping track on business's performance is essential for every company. If you don't evaluate your past performance you can't make realistic sustainable plans for the future. Cost of Capital We've regarded how cyber crimes impact the performance and how we can measure the impact of cyber crimes. Case study of Amazon Inc. epresents the main and general information about the ompany, identifies its mission and objectives. We've evaluated the current situation in company's business and performance. Our case also determined and found exposures of Amazon Inc. to cyber threats. We've reviewed the strategy and performance of the company from four perspectives: financial, customer, internal, innovation learning &growth perspective. On the basis of our findings we've given specific recommendations to the company that would help to achieve its goals and maintain leadership in the market of online retail.Recommendations correspond to four perspectives we've used to review performance of the company. We are onvinced that cyber defense is an integral part of company's performance and hence the performance management. 2. Introduction 2. 1 Cybercrimes in information age Cybercrimes appe ared at the same time as the Internet. And the ways and technologies of crimes were, are and would be improving along the development of machines and technologies in the whole and in particular the Internet. Cybercrimes became the part of our world and in order to protect us from that, governments of all countries provide the laws to prevent from such things.Also there are companies, which provide the security services against cybercrimes: Cyberpath, ESET, TDI and any others. But, unfortunately, they cannot solve all the problems. The existing criminal laws in most countries should cover computer-related crimes or electronically perpetrated crimes. 2. 2 Use of informational technology in fraud The biggest cyber threat is that it may happen at any given time, it is simply impossible to find out when the new wave will hit and more importantly what type of wave will it be. Cyber threat may take different forms.Here are the most common especially for our company. The first and the least dangerous is the threat, which has not material impact on the company. As an example can be the defacing of the company's website by hackers. Second, more serious is the threat, which is haling for the financial gain. Not only have the businesses entered the digital world. The criminals have done the same as well. And nowadays it functions Just like any other business. They have their strategies, management structures, quality control and so on.For example, hackers may obtain company's earnings reports before its official release. Having that knowledge, they may use it in making the decision of buying or selling stocks of that particular company. Keeping pace with new technologies also eeds certain portion of attention. Companies' risk exposure is constantly growing as the companies invest more and more in technologies (social, mobile, cloud, etc. ). All ot those can be a threat at the end ot the day. Mobile, tor instance, put the business in danger as the organization's corporate data suddenly may be assessed from the outside.Furthermore, the employees do not always fully realize the threat they are undertaking by sending, sharing or receiving the information on their personal devices. The same goes for social media, where the personal and professional line is often erased. One way that a hacker can gain illicit access toa system is through â€Å"social engineering†. Social engineering is a term used to describe deception against other humansl . A hacker may devise a scheme to trick another person into providing a username and password.Social engineering is as simple and effective as pretending to leave the room while another is signing onto a computer, all the while peaking around the corner to get a glimpse of logon keystrokes. Social engineering does not always take place face-to-face. Clever hackers have been known to place phone calls pretending to be a corporate help desk person or other legitimate artner asking for information that could compro mise access to computing resources. Imagine how many workstations are left wide open in a building when a fire alarm goes off.How long would it take for the alarm puller to drop a floppy into your desktop computer, initiate a process and be gone? Another category of intrusion tool is known as the scanner, or sniffer. Many operating systems come with vulnerability scanners that assist administrators in finding weaknesses. Public domain and commercial products are readily available, including SARA, Nessus, O SANS Institute 2002, Author retains full rights2. These scanners can reveal service ports that are open for attack and even details about the operating system itself.We should not be naive enough to think that these are out of the reach of the bad guys. Then, password cracking entails creating plain text passwords from their cryptographic hashes. Once the plain text password is garnered, access can be had. Password cracking tools are made available to system administrators for aud iting and recovery reasons. IP3 spoofing is a technique used by hackers as a means to gain hidden, unauthorized access to a target resource. They do this by impersonating a trusted resource.Specifically, a DDoS4 attack may change address information in the IP header of a message to make the target resource think the message is coming from a recognized, friendly port. When this technique is deployed in high volume, the attack can effectively dominate the target machine's resources, causing the target machine to perform sluggishly, or stop processing altogether. In addition to password cracking, social engineering, IP spoofing techniques, hackers have many other ways to perform destructive acts in the cyber realm.They have ways to hijack legitimate sessions, intercept and re-assemble IP fragments, take advantage of buffer overflows or flood a target machine with SYN requests. It is the wide and diverse nature of vulnerability today that argues for a strong cyber security management sy stem, one that begins with comprehensive policy and applies many technologies to achieve defense in depth. 3. Is business performance management relevant today? Business performance management is scientific approach to reaching the set of relevant and time limited goals by applying the definite set of metrics to assess the ffectiveness of resource usage.An evaluation of performance management regards indicators that numerically show the outcome of business activities. There are metrics for evaluating the success of a business: financial, internal, customer, strategic and compliance. Financial metric Financial metric includes sales, profits and costs. This metric shows us if our sales decreased or increased and if decreased, we should investigate why. But more important metric is how our profits behave. If our sales go down, our profits could still increase because we decreased the rate of cost.Internal metric Internal metric provides an evaluation management working at the company. As usual, this metric is better in small companies, because managers are closely connected with the employees rather than in big corporations. Customer metric Businesses exist to serve the needs of their customers. This means that behviour and loyalty of customers, and their level of satisfaction, provide us with a good measure for business long-term health and performance. Strategic metric Companies create strategies to reach short and long-term targets.An evaluation of the strategic performance management includes the quality of execution the trategies that management tried to implement. Strategies specify actions that management expects to achieve the desired result. An evaluation considers implementation of the strategies, successful execution of the planned actions by the company and whether results comply with the goals. Compliance metric Compliance metric measures effectiveness of compliance within the organization. Management should demonstrate ability to comply with financi al reporting standards, regulations and environmental legislation.Ideally, business should not have any imposed sanctions from the authorities. As we mentioned all these metrics are important for successful existence of the company. Without business performance management the company will collapse because, for example, if the company does not know what is its profit or its customer rate, what is inside in the company and so on and so forth. Measuring and keeping track on business's performance is essential for every company. If you don't evaluate your past performance you can't make realistic sustainable plans for the future.

Monday, July 29, 2019

Critique the Financial Analysis and Research Paper

Critique the Financial Analysis and - Research Paper Example and 122 in Canada. The company employs over 361,000 associates in the United States (Yahoo, 2013). In the U.S. there are about 5,000 department stores with combined revenue of about $120 billion annually (Target, 2012). In the U.S. the discount department store industry is highly concentrated with the eight largest companies accounting for almost 100% of revenues. Wal-Mart and Target are leading the pack. In this industry the main factors driving demand are consumer spending related to economic outlook and population growth. In order to remain profitable in this highly competitive industry driven by ever lower margins companies depend on efficient supply chain management, high volumes, effective merchandising and competitive pricing in order to maintain profitability. Target is following an industry trend of adding and converting major markets stores into supercenters which combine traditional general merchandise with a fully stocked grocery store to help drive store traffic, since c ustomers spend more on groceries more than any other product category (Hoover’s First Research, 2013). 2) There are significant business challenges in this industry which dictate the success of its major players. The industry is characterized by its dependence on high volumes and extremely low operating margins. In order to keep prices low the industry has a heavy dependence on imports in most of their key merchandise categories. In general terms gross margin percentages for discount department stores can be 10-20% lower than traditional department stores. Although there is also growing recent and resistance from communities that perceives giant discounters as a major threat to their local economy and small business community. In terms of economic growth for the industry it is forecast to grow at an annual rate of 1% from 2013-2017 (Hoover’s First Research). We will analyze Target Corp. for its fiscal year ended 2/2/2013 and compare it with the industry averages in terms of overall financial performance, financial ratio analysis and investment potential. In order to gauge the company’s liquidity we will analyze the quick ratio as well as their debt to equity ratio and compare it with the industry. We will look at the inventory turnover ratio to gauge operational efficiency and inventory management compared with the industry. In order to measure management effectiveness, shareholders returns and profitability we will analyze the price/earnings ratio, return on equity, earnings per share and net profit margin versus industry averages (Yahoo). Target Industry Average Quick Ratio .54 .50 Debt to Equity Ratio 91.53 67.6 Inventory Turnover Ratio 6.4 4.4 P/E Ratio 17.24 15.8 Return on Equity 14.84% 11.3% Earnings per Share 3.74 5.2 Net Profit Margin 4.17% 2.7 4) As one of the most successful discount department stores, Target must be extremely efficient in their operations in order to remain profitable. Target has a slightly higher debt to eq uity ratio compared with industry average. The company is effectively managing its levels of financial leverage in order to increase shareholder benefits and maximize growth and stock performance. By analyzing the company's quick ratio it demonstrates that the company has maintained an above average level of liquidity to meet their short and long term liabilities as compared with

Sunday, July 28, 2019

Mixed- Methods Research Assignment Example | Topics and Well Written Essays - 250 words

Mixed- Methods Research - Assignment Example The researcher is in a position to cover a wide scope because of a wide range of research questions since there is no confinement in a single approach. The method has its weakness such as increased costs of carrying out the research and more time is likely to be consumed before ones completes a given study (Creswell and Clark, 2007). The researcher has no choice but to learn how to integrate the different methods for a coherent study. I will use mixed methods design strategy because it will add more insights and understanding that is not achievable when using one approach. For instance, evaluating the features of childcare services will need one research method while understanding how the parents choose the particular methods of caregiving will require another research method. The on the number of mothers working outside their homes uses mixed methods approach. The quantitative method in this study was used to evaluate how parents check on different characteristics of childcare services given to their children. The researcher used qualitative method through questionnaires to establish the experiences of the mothers from their caregiving services. The researcher used mixed methods design in order to broaden the research questions and get more insights into caregiving services to the rural parents. I would have chosen the mixed methods approach in order to provide a strong proof for a deduction through corroboration of

Saturday, July 27, 2019

Response Essay Example | Topics and Well Written Essays - 750 words - 10

Response - Essay Example Although the photo initially meant a team of three people, this notion changed as I continued interacting with it. as time progressed, I realized that it is not actually what I had been thinking about it. After undergoing the discovery process, I shifted my writing from a mere discussion of the physical appearance of the objects in the photo to discussing and interpreting the cultural practices that were depicted in the photo. This experience really demonstrates how our writing process is can be greatly influenced and altered when we adopt the concept of â€Å"curious mind† in our writing process. I decided to use a drum because it is one of the musical instruments which I have been interacting with for quite some time. A drum is a musical instrument which is often used as an accompaniment by many artists because of its melodious and rhythmic sound that it produces. It is often used by different musicians of different types such as jazz, band and reggae. This drum was made by a man called John Kaman. He was one of the greatest professionals who were specialized in the making of such instruments. Personally, drum is not known to me because I have been using it for a very long time. Since I am interested in music, I have been playing drum with my colleagues. I prefer it to other instruments because it is much easier to learn how to play it. So, my experience with drums has been a good one. All through, I have been taking my time to study and observe different types of drums. According to my cultural background, I need to be unbiased, objective and open minded when interacting with new objects. This influences me to see everything so well. Meaning, before I came across this particular one, I already had an idea that there are different kinds of drums of varying sizes from which one can choose to use. Actually, drum is one of the most popular musical instruments which have been in use for years. In human history, drums have been of significance. However, for

Friday, July 26, 2019

Home work Assignment Example | Topics and Well Written Essays - 750 words

Home work - Assignment Example The Germans thus sought to gain from the political instability in the country by financing the numerous violence and coups. Americans thus decided to occupy the country in order to pacify the operations by instilling stability in the government a feature that would protect the interests of the American investors in the country. Haiti thus became a US colony with the American marines killing all the insurgents and replacing the Haitian constitutions in order to permit foreigners to own land in the country a previous taboo that only the Germans who had managed to intermarry with the local elite Haitian society could manage. While the American government sought to protect the interest of its citizens living in the country and its international trade, the idea to colonize the country forcefully and replace its constitution was unrealistic. By doing this, the American government despised the sovereignty of the country thus imposing its legislations on the foreign land. Question 2 Neoreali sm is the most effective theory that explains American involvement in the Vietnam War. The theory asserts that power is one of the most important factor in international relations. According to the theory, powerful nations can intervene in the affairs of another state by manipulating their institutions of power. The power in this context may infer economic or military and the United States of America enjoyed both a feature that compelled her to get involved with the war. The spread of communism threatened her economic power a feature that compelled her to intervene in a bid to contain the spread in the eastern bloc. The United States of America had several foreign interests in the country that was an entry point to the eastern market. Additionally, it needed to pass a message to the rest of the countries in the eastern bloc making them aware of its political and military might. Realism on the other hand also draws several relevance to American involvement in the war. The theory asse rts that self-interests are the sole drive of international politics. To validate the claim, the theory explains that humans are not always benevolent but greedy, self-centered and extremely competitive. To safe guard their interests, different states ascribed to equality and autonomy thus earning them equal roles to dialogue and resolve international issues amicably. However, the theory acknowledges the selfish nature of human and the desire to prove their might over the rest of the population. The United States of America that is the world’s strongest economy thus decided to exploit its economic and military might by invading Vietnam and starting a fight in order to contain the spread of communism. The war resulted in the deaths of millions of the locales and many other America soldiers and had serious financial implications on the country and her tax system. However, the US deployed all the financial and human capita to the foreign territory in order to prove her economic might to the eastern bloc (Devitt 22). Question 3 John Mearsheimer fosters offensive realism and explains lies that countries tell each other as a means of gaining control of security control globally. This thus becomes the best reason with which to explain American interests in the Syrian predicament. While the country through its leadership has used gas

Child Abuse at School Dissertation Example | Topics and Well Written Essays - 2500 words

Child Abuse at School - Dissertation Example From this discussion it is clear that in everyday terms, people use the word punishment to describe negative consequences imposed on people when they misbehave. Often, the term has moral overtones, suggesting that those being punished 'deserve' that punishment because their actions violate a rule, law, or social expectation. But when it comes to behavior management, it has a somewhat narrow definition.This paper highlights that  teachers should understand the pros and cons about using punishment in the classroom, as schools frequently use the method as a tool to manage student behaviors. Since punishers affect different students in different ways, so one punisher my not be effective against all students and should be suited to a particular student’s temperament. There are times at which punishment tends to put a stop to problem behaviors and would seem a strong and desirable behavior management tool. But there is a price for everything.  Discussion has been going on, on th e topic of punishment for many years. Educators cannot find agreement as to the best way to discipline students in schools. Hundreds of articles were written and lectures delivered on this subject.  Most students cannot comprehend what action or lack of action on their part does bring punishment. They feel that the teacher’s mood at a particular moment brings about the punishment.   Another expert supports this general idea.

Thursday, July 25, 2019

FINANCIAL STATEMENTS AND RATIOS ANALYSIS Assignment

FINANCIAL STATEMENTS AND RATIOS ANALYSIS - Assignment Example The two main financial statements (the Income Statement and Balance Sheet) are going to be analyzed in both cases together with some financial ratios. However, before embarking on the aforementioned task, each of these banking corporations is going to be considered individually in a bid to understand their backgrounds. This is going to be in the order in which they have been mentioned in the introduction part. Flagstar Bank is a banking institution known by the official name Flagstar Bank and Flagstar Bancorp Investment Company acts as its holding company. It is headquartered at Troy, Michigan at the address 5151 Corporate Drive. Its website address is www.flagstar.com and its investor relations phone number is (248) 312-2000 and in case an investor wants to send an e-mail there is a facility on the company’s website to do that(investors@flagstar.com) plus an in case of any suspicion in dealings with Flagstar e-mail abuse@flagstar.com. The stock exchange trading symbol for this company is FBC at NYSE. The current share price is $0.79 and the company’s stock is under Financial Industries and further narrows down to the bank sector of NYSE. According to the 2009’s annual report, there are ten directors of which eight are outside directors and two are inside directors. Outside directors are considered independent when it comes to the company’s management decision making and therefore, mindful of the impact of the decisions’ impact on the shareholders. This is a branch bank and it operates around 175 banking centers. (flagstar.com, 2011) Universal banking refers to a case where banking firms have a network of branches, several firm claims, offers a variety of services as well as taking part in corporate governance upon firms which depend on banks for sourcing funds. Flagstar bank is not a universal bank according to the opinion of the study. (Calomiris, 1995 p1) On the other hand, the

Wednesday, July 24, 2019

Literature of the African Diaspora Essay Example | Topics and Well Written Essays - 1250 words

Literature of the African Diaspora - Essay Example Of great interest when studying Callaloo is the establishment of exactly how the persons of African heritage are able to claim their multiple identities and especially so in light of despite persons of a diaspora essentially inhabiting a number of different these persons are nevertheless unable to call these different places home. Black persons of the African diaspora tend to adapt or create a number of new identities as they continuously move from place to place. In his book, Reversing sail, Gomez points out that the relatively small trickle of African slaves that had been captured as slaves during the fifteenth century eventually evolved into becoming a veritable flood by the end of the seventeenth century. Within a time period of ten years after Columbus’ maiden voyage in 1492, numerous enslaved Africans were enslaved in the New World along with a number of other slaves drawn from Portugal and the Canaries and sources as experienced sugarcane planters. Of particular note is the fact that by 1560, the total number of African slaves was seen to greatly outnumber Europeans in Hispaniola and Cuba, this impressive growth in number eventually saw the number of African outnumber that of Europeans in Vera Cruz and Mexico City by 1570 (62-63). Numerous countries across Europe were seen to join in the slave trade in a move that saw an approximated 6.5 million Africans get shipped out of the African continent between 1700 and 1810. During this period, more European nations were seen to get involved in the slave trade. Some of these nations included Denmark, Britain, France, Portugal, Holland, Sweden and Spain. A number of other non-European countries such as Brazil and the United States also joined the slave trade (Gomez 64). By participating in the slave trade these countries were seen to essentially promote the spread of the Black African diaspora as a review of the regions from which they were drawn from can be seen to essentially reveal a considerable degree of complexity not only in respect to culture and language, but also as pertaining to the different forms of government, technology, regional and trans-regional commerce and agriculture. The Africans transported into the various different regions across the world were to eventually face systems that were essentially quite diverse resulting in increased diversity and multiplicity on the part of these Africans. The Development of the African Class of Mixed Heritage (Mulatto) and their Attempts at Acceptance by Whites Although the questions pertaining to race were seen to be a complex matter in most of the regions that the Africans had been enslaved, it was generally found to be quite complex in some regions such as in Saint Domingue where there arose a class of free blacks or affranchis. This class of free blacks was seen to primarily comprise of persons of mixed ancestry who were mostly women and numbered an estimated 27,000 in 1789. This new class of citizenry owned about 25 percent of the African slave population and accounted for 11 percent of Saint Domingue’s urban population. About two thirds of these citizens were the product of white slave holders and enslaved females and children born out of such unions were born as free men. The affranchis population quickly expanded and by the middle of the eighteenth century, they were able to be widely

Tuesday, July 23, 2019

Financial Risk Management Essay Example | Topics and Well Written Essays - 1250 words

Financial Risk Management - Essay Example An analysis of the article Risk Management Lessons from the Credit Crisis can effectively assist in evaluating financial risk management particularly in light of the credit crisis. In presenting its cause, the article is divided into a number of parts each of which has its own speciality. Section 1 looks at the various structures of the modern risk measurement systems. Of particular interest is the position-based risk measurement system that tackles the various drawbacks brought by the traditional returns-based system. The traditional system is shown to be rigid in that it cannot adjust to the various new parameters that characterize a dynamic society. In essence, they prove to be largely unreliable, thereby necessitating the adoption of the position-based measures. The article highlights how the position based risk measures are more versatile and can accommodate various aspects in relation to the dynamism of the contemporary society. Part 2 of the article focuses on the various risk s that establishments are exposed to. The classification is divided into broad categories of known knowns, the unknown unknowns, and even the known unknowns. All of these categories are reached at depending on the pre-existing uncertainties, with the most uncertain risk being classified under the unknown unknowns. Known knowns are fairly manageable, and are the most basic of uncertainties that an institution is bound to encounter. The traditional system is shown to be rigid in that it cannot adjust.

Monday, July 22, 2019

Ge Imagination Breakthrough Essay Example for Free

Ge Imagination Breakthrough Essay Can he hope to change a company whose growth was driven by acquisitions and productivity improvement into an organic growth company dependent on innovation, entrepreneurship and risk taking particularly in such a large complex performance driven corporation? Answer: 2a: Yes, Immelt is relying on ‘technological leadership, commercial excellence and global expansion’ to provide â€Å"unstoppable† opportunities and expand GE’s business base. He wanted to use GE’s size and diversity as sources of strength and to drive growth by investing in places and in ways that others could not easily follow. As a counter effect of 1st Jan 2005 deadline for emission regulations it was predicted that there would be a spike in demand for old products, leaving little market for EVO in 2005. These old models were in ready inventory and with much better discounts. 3c: Continual redefinition of the global EVO product and the failure to make hybrid commercially viable * Initially GE decided to develop EVO country specific during IB meeting but it was not viable because of low requirements. * Recognizing the international constraints the EVO was also developed as a product concept ‘Global Modular Locomotive’. Design developed around set of standard components that could be building to different requirements. * GML also helped GE in reducing the response time in international tender processing, reducing the amount spent in non recurring engineering, and reducing the time between order amp; the sale. * GE was also adaptable to specific international requirements such as Kazakhstan’s condition to transfer the assembly operations to their country. This was a part of GE’s international strategy â€Å"In country, for country†.

Sunday, July 21, 2019

Water Quality Management Issues In DEWA Company Environmental Sciences Essay

Water Quality Management Issues In DEWA Company Environmental Sciences Essay This paper will discuss water quality management issues in a Dubai company called DEWA (Dubai Electricity and Water Authority). This is a governmental organization that is in charge of producing and distributing water and electricity to the whole of the Dubai population. Water quality issues were among the concerns of the third UNEP report on the environment. Gordon (1998:1) notes, The Global Environmental Outlook (GEO-3 report) identified a wide spectrum of existing and emerging water issues that need to be addressed if the world is to achieve sustainable development. One of the general issues in water management is the threat of depletion of groundwater due to the rising demands for land for agriculture and for building urban centres. Majority of communities living near water catchment areas such as forests are depleting rather than preserving them. Hydro-development and geothermal projects are another threat to abundance of water sources and the quality of water because they divert it to uses such as irrigation and generation of electricity. Another concern is the threat to quality of water due to pollution by fertilizers, pesticides and factory chemical emissions. Poor quality of water has a negative effect on human, animal and plant populations, and can occur due to natural or artificial factors. One cause of problems in the quality of water is natural chemicals in the air and ground that enter into contact with water sources and pollute them. Another factor, which is also the largest contributor to poor water quality, is human use of chemicals that pollute water bodies in activities such as farming and industrial production. Sources of water pollution can be fixed, such as manufacturing plants, or mobile, for example, farming activities. The first category has pollutants that are very strong while those of the latter group are mild but are extensive in area of coverage. Moreover, it is easier to estimate and alleviate pollution from the first category than the second because the latter affect a wider region. As Ongley (1999:5) observes, Water quality degradation can pose serious threats to public health, agricultural and industrial production, ecological functions, and biodiversity. Water quality problems can arise from high concentration of naturally occurring elements such as arsenic, fluoride, or selenium. But most water quality problems are caused by the discharge of pollutants from human activities. Pollution sources include point sources-specific points of discharge of high-pollutant concentration-and nonpoint sources-low-concentration sources covering a large area. Point source discharges from sewers, wastewater treatment plants, and factories are visible and can be chemically characterized relatively easily. However, substantial loads of pollutants can also enter water bodies from nonpoint sources, such as fertilizer use for agriculture. In the case of the DEWA Company, poor quality of water is likely to result from emissions from point sources rather than nonpoint ones because the firm undertakes the supply of water to the nation. Consequently, the company has facilities set up to clean water before pumping it to consumers. For example, in 2010 the company set up a facility at Jebel Ali to purify water from salty substances. The chemicals used to desalinate the water and purify it may be a threat to its quality. Another possible threat to the quality of water that the firm supplies is likely to be poor hygiene of the storage tanks, distribution pumps and pipes. If management does not ensure that these facilities are clean, contamination of water is likely to occur. If the storage tanks are left bare, contamination of the water contained therein is likely to occur. Moreover, the residue of chemical substances, especially chlorine, used to clean these facilities is likely to pollute the water when in storage or during distribution. In addition, the company can cause pollution of external water masses through emissions from its water treatment facility. At the same time, since it supplies electricity to consumers, generation of this source of energy can cause gas emissions that pollute not only the air but also the water masses nearby. The World Health Organization has set maximum levels for chemicals present in water, especially for human consumption. World Health Organization (1958: 9) Water intended for human consumption must be free from chemical substances and micro-organisms in amounts which would provide a hazard to health is universally accepted. Supplies of drinking-water should not only be safe and free from dangers to health, but should also be as aesthetically attractive as possible. Absence of turbidity, color and disagreeable or detectable tastes and odors is important in water-supplies intended for domestic use. Fluoride levels should not be lower than 0.5 mg/l as this will contribute to dental decay in the population, especially in children. Nitrates, on the other hand, should not exceed 50 mg/l and 100 mg/l. If bacterial organisms of the coliform type are present, this means that the water has faecal contamination and therefore is not fit for human consumption. Moreover, the water should be free of any taste and smell. The table below presents the acceptable levels in drinking water for other chemical substances. World Health Organization (1958:29) Chemicals affecting portability of water Total solids 500 mg/l 1500 mg/I Colour 5 units 50 units Turbidity 5 units 25 units Taste Unobjectionable Oduor Unobjectionable Iron (Fe) 0.3 mg/l 1.0 mg/l Manganese (Mn) 0.1 mg/l 0.5 mg/l Copper (Cu) 1.0 mg/l l.5 mg/l Zinc (Zn) 5.0 mg/l 15 mg/l Calcium (Ca) 75 mg/l 200 mg/l Magnesium (Mg) 50 mg/l 150 mg/l Sulfate (SO) 200 mg/l 400 mg/l Chloride (Cl) 200 mg/l 600 mg/l pH range 7.0-8.5 à ¢Ã¢â‚¬ °Ã‚ ¤6.5 or à ¢Ã¢â‚¬ °Ã‚ ¥ 9.2 Magnesium + sodium sulfate 500 mg/l 1000 mg/l Phenolic substances (as phenol) 0.001 mg/l 0.002 mg/l Burke (2002:1) notes that the main aim of monitoring the quality of water is to ensure its clean and safe supply. Some of the variables to check in order to get an indication of water quality include temperature of the water, alkalinity and acidity, density, amount of salt, gas levels such as oxygen and nitrogen, chemical substances such as nitrate and phosphorous and micro-organisms such as protozoa, among others. One may therefore carry out the process from a physical, chemical or biological perspective or use all of these angles of analysis. However, this process also involves checking the hygiene levels of water bodies in use by many stakeholders and those that offer a habitat for animal and plant populations. Since water is one of the resources in the natural environment, it is susceptible to effects from manufacturing plants that utilize natural resources. These include geothermal plants, quarries where mining takes place and the timber industry that makes use of wood from forests. Monitoring the quality of water therefore involves assessing the impact of such industries on water, water bodies and catchment areas. Another reason for monitoring the quality of water is to check whether a particular type of water mass meets the standards set for it. The standards depend on the use of the water body. These include for water for drinking purposes, leisure, fishing, habitat for wildlife, farming and industrial use. She adds that there exist three main ways of monitoring the quality of water. Burke (2010:1) mentions discrete, mechanical, and automated methods. In the first instance, which is the old way of monitoring water quality, one measures a single aspect. This is done either in the field or in a laboratory. This method is tiring and time-consuming. At the same time, it is subject to the operators bias and judgment when collecting the samples as well as when doing the analysis in a laboratory. The second method involves leaving bottles in a water mass for some time to collect water then taking these to a laboratory. This method reduces the manual effort and time spent collecting samples of water. However, it is subject to bias from laboratory analyses and at the same time, leads to loss of time spent waiting for the bottles to collect water. The third method makes use of devices that will sense the aspect of water quality being tested and these in turn store the information. This method is fast and likely to yield more reliable results than the other two as it does not rely on the subjective judgment of the analyst in a laboratory setup. In the monitoring of water quality, screening methods have become more common than other techniques. This is because they are fast and easy to use due to their advanced technology. Gonzalez, Greenwood, Quevauviller (2009:16) note, Screening methods are often chosen by field operators for rapid and simple measurement of water quality. They are also called alternative methods or emerging tools. There are different types of alternative method such as ready-to-use methods (test kit method), handheld devices (handheld instrument with generally no reagent needed), online sensors (generally in an industrial context) and methods for biological monitoring (such as bio markers, whole-organism tests). To improve the process of monitoring water quality, DEWA has integrated an automated system among its management programs. According to DEWA Company (2009:15), 7-Technologies has entered into agreement with our German system integrator, Cegelec, for the supply of an AQUIS real-time water management system to DEWA in the United Arab Emirates. The AQUIS platform supplied includes all the AQUIS modules: Hydraulic, Water Quality, Surge, Load Forecaster, Leak Detection, GIS and SCADA Interface. The real-time system will provide asset and process performance monitoring and give early warnings of potential operational problems. This will improve planning and design, serviceability, water quality and leakage reduction. For this topic, I choose the automated technique of measuring water quality because it is fast and yields more reliable results. This method makes use of devices capable of sensing the variables under consideration. Since the DEWA Company distributes water for human consumption, it has to ensure that it stores and distributes enough water for the population. DEWA Company (2009:3) DEWA has a policy to maintain bulk storage of potable water equivalent to two days of system peak demand. This implies that it has an extensive reservoir and distribution system, which is not possible to monitor manually on a regular basis. Moreover, the stored water is susceptible to residue of chemical substances such as chlorine and this may affect the quality of water the firm distributes for human consumption. The company therefore requires continually monitoring of the quality of the stored water and the automated technique would be the most appropriate. The technology applicable here would be the online sensing devices that would read the chlorine levels in the tanks as well as the input and output pipes. To monitor water quality in the DEWA Company (2009:5), analyzer stations consisting of transmitters and sensor assemblies for measuring pH, residual chlorine, conductivity and temperature may be installed at specified locations as per DEWAs specifications. The quality of the water that DEWA produces is as follows: DUBAI ELECTRICITY WATER AUTHORITY TRANSMISSION DISTRIBUTION: WATER DIVISION OPERATION DEPT. LABORATORY TYPICAL RANGE OF COMPOSITION OF DEWA WATER ELECTRICAL CONDUCTIVITY 250-800 MICROMHOS/CM pH 7.5-8.5 TOTAL DISSOLVED SOLIDS 125.0-400.0 Mg/l CHLORIDE AS CI Mg/l BICARBONATE AS HCO3 50.0-75.0 Mg/l SULPHATE AS SO4 Mg/l NITRATE Mg/l CALCIUM AS Ca 15.0-25.0 Mg/l TOTAL HARDNESS AS CaCO3 50.0-120.0 Mg/l MAGNESIUM AS Mg 2.0-20.0 Mg/l SODIUM AS Na Mg/l FLUORIDE AS F NIL TASTE, COLOUR AND ODOUR UNOBJECTION-ABLE COLIFORM BACTERIA NIL The above table incorporates variables of assessing quality of water from a chemical, physical and biological perspective. From the data, it appears that the DEWA Company produces relatively high quality water. This is because, according to the above table, the water is free from any taste, smell and has no color and is therefore transparent. In addition, it is free from contamination by coliform bacterial organisms, meaning the water has no faecal pollution. However, there is no fluoride present in the water meaning that it is likely to cause dental problems in the consuming population. As the World Health Organization (1958:28-29) notes, If the fluoride concentration in the drinking-water of a community is less than 0.5 mg/l, a high incidence of dental caries is likely to occur. To prevent the development of dental caries in children, a number of communal water-supplies are fluoridated to bring the fluorine concentration to 1.0 mg/l. Moreover, the water is safe for consumption because its nitrate levels do not exceed the World Health Organization directives of 50 mg/l and 100 mg/l. The water pH does not raise concerns since the levels of alkalinity and acidity of the water are within the accepted range. It is therefore possible that there are few land use activities in the areas from which the company sources its water. Consequently, fewer chemical substances such as fertilizers and pesticides wash off into the water sources. In addition, the amount of chloride is also on the lower end of the permissible range, which means that salinity of the water is low. However, the amount of dissolved matter is less than the permissible level therefore the water density is low, but on the other hand, this means that the salinity levels are low. The magnesium, calcium and sulphate contents are also lower than the acceptable minimum, which means that though the water lacks essential components, it has low salinity levels. According to the above table, the water from the DEWA Company is relatively good for consumption because it does not contain toxic substances such as lead or cyanide. The presence of nitrates in the water that the firm supplies is likely to be due to the discharge of treated sewage water while that of sodium is due to the use of this compound to clear chlorine residue. On the other hand, the absence of fluoride in the water may be due to changes in climate in the areas where the company sources its water. The high potential of the water to conduct electricity may be due to the presence of radioactive matter. This is also evident in the presence of hydrocarbons in the water. The salinity of the water is low meaning that there is a higher amount of freshwater than salty water entering into contact with the sources of the DEWA water. Since the amount of dissolved solids in the water is less than 1000mg/l, it appears then that the DEWA water is fresh. It appears that the water is soft because the levels of magnesium and calcium are low. Moreover, the amount of solids dissolved in the water is low indicating that the saline content is also low. According to Statgraphics (2006:1), An important technique used to determine how well a process meets a set of specification limits is called a process capability analysis. A capability analysis is based on a sample of data taken from a process and usually produces: an estimate of the DPMO (defects per million opportunities), one or more capability indices and an estimate of the Sigma Quality Level at which the process operates. From the above table, it appears that the water quality management process at the DEWA Company is capable of meeting the needs of the population. In addition, it appears that the company is capable of providing good quality water for human consumption to its consumers. The strengths of the system include its ability to lower the saline content and the amount of dissolved solids therefore producing water that is fresh. Furthermore, the water does not contain toxic substances such as cyanide, lead, among others, and this implies that it is fit for human consumption. Moreover, there is a balance between the water acid and alkaline levels as the pH is within the acceptable range. The nitrate levels are also within the acceptable range and therefore do not pose a threat to human health. In addition, the water is soft rather than hard due to reduction of magnesium and calcium elements. Another strong point is that the management system has preserved the waters aesthetic quality since there is no odor, color and taste present. Moreover, the water is free from faecal pollution as there is no contamination by bacterial organisms of the coliform nature. According to DEWA Company (2009:7), DEWAs water system consists of a transmission network where pipe diameters range from 550 mm to 1200 mm, and distribution network where pipe diameters range from 100 mm to 450 mm. This means that the company is able to transmit and distribute large amounts of water at any given time due to the large capacity and volume of its transmission system. On the other hand, the water production system has fewer defects than the strengths listed above. The defects include production of water with no fluoride element, which can lead to tooth decay. In addition, the electrical conductivity of the water is very high indicating the possibility of contamination with radioactive matter. However, the strengths of the system of water production outweigh its weaknesses. The indicators of the systems capability to produce good quality water are the variables that the company uses to measure the quality of water. These include lack of taste, smell, color, coliform bacterial organisms that are indicative of faecal pollution, few nitrate, calcium and magnesium contents that are an indication of low salinity levels, normal alkaline and acidity levels, a low amount of dissolved solids and the absence of poisonous substances such as lead and cyanide. In conclusion, it appears then that the company is capable of producing good quality water for the con suming population. Consequently, we can also say that the management system of the DEWA Company in relation to the production and supply of water is one that is effective in terms of ensuring good quality water.

Problem of Rising Higher Education Costs

Problem of Rising Higher Education Costs Today, the problem of rising costs of higher education evokes heat debate among the public and policy-makers. In actuality, the high costs of higher education become an unsurpassable barrier for many students living in poverty-stricken neighborhoods and belonging to low-income families. In this respect, specialists (Breneman Finney, 1997) argue that students should have an opportunity to carry on their education in college depending on their academic skills and potential rather than on their financial position, social status, or other factors, such as cultural background or race. First of all, specialists argue that the public funding is ineffective (Cabrera, Norn, Castaneda, 1992). The state and federal funds are used ineffectively, whereas the quality of the public education remains extremely low, especially compared to private education. As a result students graduating from public schools have fewer opportunities to enter and succeed in college compared to students graduating from private schools. Furthermore, costs of higher education are unaffordable for many students (Heller, 1997). Today, costs of college education keep growing and students cannot afford paying for their college education, whereas educating children becomes an unaffordable burden for many families. As a result social gaps widens that leads to the exclusion of students from low-income families belonging to lower classes from the college education (McDonough, 1997). In fact, the costs of college education becomes the barrier preventing students from low-income families from entering. In addition, many specialists argue that racial gaps also widen depriving minority students of the possibility to obtain the college education (Freeman, 1997). In this regard, African Americans and other minority students are in a disadvantageous position. In spite of existing programs for minority students as well as for low-income students, they are ineffective and social and racial gaps persist. In this regard, the high costs of tuition is one of the major factors that put students in an unequal position and prevent them from equal access to college education (Kaltenbaugh, John, Starkey, 1999). In such a way, many students need the assistance from the part of the state and federal agencies to afford college education. Finally, cultural differences also affect the availability of college education along with the high costs of college education (McDonough, 1998). Some students are not prepared to pay high costs for college education, even if they can afford it, because of their cultural traditions. However, cultural differences are probably the least significant compared to the high costs of college education and tuition. In addition, the high costs of living increase the costs of college education. In such a situation, a considerable part of students from low-income families is just left aside of college education. Proposal for Position Obviously, the lack of access to college education for students from low-income families and from minorities is dangerous for the further development of the US society. Widening gaps between students and the lack of access to college education will lead to social and racial conflicts in the US society. In such a situation, the government should develop effective state and federal aid programs which can provide all students with equal opportunities to access the college education and to obtain their higher education to realize their full potential. On the other hand, the main problem is the effective use of public funds. In this respect, the community control can be an effective measure that provides students in need with better opportunities to obtain college education. In fact, local community members know better than state or federal authorities which students need aid and local communities should have an opportunity to use public funds to aid students in need. Therefore, public fu nds should be redistributed at the local level to provide students in need with essential financial aid to continue their education and to enter colleges. Jessica Willbanks Annotated Bibliography Professor Grower English 112 20 March 2011 Breneman, D., Finney, J. (1997). The changing landscape: Higher education finance in the 1990s. In P. M. Callan J. E. Finney (Eds.), Public and private financing of higher education. Phoenix, AZ: Oryx Press. The authors focus on funding of the higher education. The authors distinguish private and public sources of funding stressing that the public funding is not always effective and deprives many students of the possibility to obtain higher education. Cabrera, A. F. (1994). Logistic regression analysis in higher education: An applied perspective. In J. C. Smart (Ed.), Higher education: Handbook of theory and research, 10, New York: Agathon. The author explores the development of the higher education and its future prospects. The author arrives to the conclusion that education will shift to higher costs and wider use of information technologies. Cabrera, A. F., Norn, A., Castaneda, M. B. (1992). The role of finances in the persistence process: A structural model. Research in Higher Education, 33, 57 1-593. The authors reveal existing models of funding of college education, uncovering persisting gaps between low-income students and students from upper-classes. The existing structure of the college education and its funding is ineffective and widens gaps between students. Cabrera, A. F., Nora, A., Castaneda, M. B. (1993). College persistence: Structural equations modeling test of an integrated model of student retention. Journal of Higher Education, 64, 123-139. The authors attempt to elaborate an efficient model of the assessment of effectiveness of funding college education and costs of college education. Freeman, K. (1997). Increasing African Americans participation in higher education. Journal of Higher Education, 68, 523-550. The author focuses on the problem of the lack of access of African American students to college education. The author defines ways which can increase the share of African American students in college education and open college education for minorities. Grubb, W. N. (1996). Working in the middle. San Francisco: Jossey-Bass. The author discusses the development of the modern higher education and education system at large. The author identifies numerous problems, among which high costs of higher education are among the most serious problems that put students in unequal position. Heller, D. E. (1997). Student price response in higher education: An update to Leslie and Brinkman. Journal of Higher Education, 68, 624-659. The author draws the audiences attention to growing costs of higher education and forecasts that costs of college education will grow even more. In addition, the author discusses negative effects of high costs of college education. Hossler, D., Schmitt, J. (1995). The Indiana postsecondary-encouragement experiment. In E. P. St. John (Ed.), Rethinking tuition and student aid strategies. New Directions in Higher Education, 89, 27-39, San Francisco: Jossey Bass, The authors explore efforts of the Indiana authorities to encourage college education. They evaluate critically state aid to needy students and suggest using Indiana experience in other states. Kaltenbaugh, L. S., St. John, E. P., Starkey, J. B. (1999). What difference does tuition make? An analysis of ethnic differences in persistence. Journal of Student Financial Aid, 29 (2), 21-31. The authors of the article raise the problem of high costs of tuition, which becomes an unsurpassable barrier for many students on their way to college education. McDonough, P. M. (1997). Choosing colleges: How social class and schools structure opportunity. Albany: SUNY Press. The author explores the problem of the impact of social class of students on their education opportunities. The author stresses that students from low-income families have little opportunities to obtain higher education. McDonough, P. M. (1998). Structuring college opportunities: A cross-case analysis or organizational cultures, climates, and habiti. In C. A. Torres T. R. Mitchell (Eds.), Sociology of education: Emerging perspectives, 181-210, Albany: SUNY Press. The author studies the impact of the cultural background on students performance in college revealing differences between different cultural groups. Paulsen, M.B. P. J. Edward. (2002). Social Class and College Costs: Examining the Financial Nexus between College Choice and Persistence. Journal of Higher Education, 73(2), 189-197. The authors reveal the wide gap between students belonging to different social classes. The authors argue that social class is an important factor preventing students from or admitting to higher education.

Saturday, July 20, 2019

Beatrice in Dante Alighieris Divine Comedy and the Vita Nuova Essay

Beatrice in Dante Alighieri's Divine Comedy and the Vita Nuova Se quanto infino a qui di lei si dice fosse conchiuso tutto in una loda, poco sarebbe a fornir questa vice. La bellezza ch’io vidi si trasmoda non pur di là ¡ da noi, ma certo io credo che solo il suo fattor tutta la goda† (Paradiso, XXX) In Dante and Difference, Jeremy Tambling asserts that â€Å"Beatrice is throughout dealt with in the Commedia with the assumption that she will already be a familiar figure† in order to make the point that the Commedia â€Å"is not offering itself as a single, separate, autonomous work†. While I agree with Tambling’s claim about the need to read the Commedia as a part of a greater work (and the possible ways of doing this are endless—Vita Nuova a preparation for the Commedia, Commedia as â€Å"sequel† to Vita Nuova, etc) there is something inherently flawed with the first part of his statement: the idea of Beatrice as â€Å"familiar† figure. For Beatrice is actually anything but familiar. Tambling is, of course, referring to the fact that anyone reading the Commedia who has read the Vita Nuova will recognize Beatrice—but the implication is that such a reader will have more knowledge of her than someone reading Dante for the firs t time. In actual fact, the opposite is the case. In the Vita Nuova , we have accompanied Dante in his breathless chase through visions and painstaking re-writings, elaborate lies and fainting fits in the arguably vain attempt to make sense of, to track or write down a woman who has always managed to be the proverbial two steps ahead. By the opening lines of the Inferno, Beatrice is only familiar in her unfamiliarity: we know her as the one who escaped the Vita Nuova unmarked and unwritten, leaving Dante to â€Å"no... ...tric question to represent all that he has been seeking and the solution to be a mathematical or numerical Beatrice. If that is the case, then we might be forgiven for suspecting that even if Dante has obtained the answer, he himself cannot decipher, let alone transcribe, her. Beatrice has escaped again and the chase continues, in a motion that is described at one and the same time with the verb â€Å"volgeva† (think volgere, capovolgere—winding, turning on its head, ie both without end and dizzying and disorientating) and as a â€Å"rota ch’igualmente à © mossa†, an image that brings to mind both a cyclical and thus endless motion (the circular turning of the wheel) as well as a movement forward (the wheel as transportation). â€Å"L’amor che move il sole e l’altra stelle† spurs Dante himself on, mystified by that which he cannot reach, seeking to write the ever-elusive Beatrice.

Friday, July 19, 2019

whirlpool case :: essays research papers

Whirlpool is an appliance company headquartered in the United States. The company has a global presence and ranks as number two world wide. They are the market leader in the United States. The major goal of the company is to achieve global growth.   Ã‚  Ã‚  Ã‚  Ã‚  Whirlpool’s global marketing strategy is based on segmenting customers well and providing suitable products for each specific market. They have different strategies and market conditions for developed markets and developing markets. The company segments its products in developed markets like United States and Europe. In United States there are three segments: high end products, medium priced products and low end products. In Europe there are only two: traditionalists and aspirers. In those markets the competition is severe, the market is fragmented and growth rate of the industry is low; around 1 or 2 percent. So, the company tries to maintain its position by cutting costs down by decreasing the number of warehouses & the product development budget and increasing productivity. In developing markets such as Brazil, China and India, Whirlpool tries to produce products that match the local needs and tastes of the majority (low-end customers). They have two major strategies for that. They use platform method and innovations. In the platform method, the company produces same platforms that are the technical core of the end product for each market. Later on market specific capabilities are added to the product. The other method is innovation of a bran new product for a specific local market. Then the company uses this new product in other markets that have similar needs and tastes by using platform method (making minor adjustments for each market).   Ã‚  Ã‚  Ã‚  Ã‚  Market research is used to gather information about the marketplace. By using this data, the company decides what the local needs and tastes are, how the segmentation should be made and which segment gives priority to what features. According to the results the company launches new products or modifies their existing products for the given market.   Ã‚  Ã‚  Ã‚  Ã‚  Developing products for low income consumers in emerging markets may be a good strategy. As the majority of people in developing countries are low income consumers, by reaching those consumers the company will have huge brand recognition in that country.

Essay --

World Health Organization (WHO) identified quality as crucial element in its framework for health system strengthening. Quality serves as a mediator between the six system building blocks (leadership, health care financing, health workforce, service delivery, information and medical products) and health outcomes. As such, enhancing quality of each building block could lead to improved health outcomes and efficiency. Several quality improvement (QI) approaches have been widely employed to strengthen the health systems globally. Decision making based on evidence is one of the important QI principles used by many QI models and frameworks such as the European Foundation for Quality Management (EFQM), International Organization for Standardization (ISO), the Baldrige Framework, etc. In order to make more informed decisions, it is necessary to have information about key processes, outputs, outcomes and results. Evidence is one key theme in managing health care quality. The adoption of evidence based practices in health care not only promote high standard of care but also increase client interest in quality of care. This will lead to continuous improvement of overall health system (Sax, 2014). In recent years, the results of many QI projects in developing countries are achieving widespread attention. Noticeable progress in quality could convince donors and governments that their resource are used efficiently and encourage further investment in health care (Leatherman et al., 2010). Thus, there has been growing interest on quality of these QI project results since policy makers, hospital leaders and clinicians make important decisions based on these information. Data Quality Audit (DQA) is one of the initiatives established... ...e clinics, community health centers and hospitals in three districts of the province. It is important to track every sequential steps of diagnostic and treatment services of PMTCT program. Effective monitoring could indicate the performance of the program in identifying HIV infected mothers and providing correct treatment. In South Africa, like many developing countries, health data collecting and reporting system was often stated unreliable (Garrib et al., 2008). As such, the PMTCT program introduced an intervention to improve the completeness and accuracy of the routine data collected in the DHIS. The flow of data begins at the service delivery points and the staffs at each primary care facilities combine these data monthly on paper and report to clinic supervisor. The data are transferred to electronic format by an information officer within the facility.

Thursday, July 18, 2019

How is Conflict Portrayed in the Poems in the Conflict Section? Essay

The nature of conflict is a clash or coming together. There are many different types of conflict; it can come in varying scales of size and intensity. For example something which starts off as a family feud may end up as a World War. We can look at the causes of conflict, what actually happens or the effects. Tennyson’s ‘Charge of the Light Brigade’ paints a picture of the glory and honour of soldiers in battle as it happens. It describes an incident during the Battle of Balaklava during the Crimean War. Sheers’ ‘Mametz Wood’ focuses on the aftermath and futility of war. Hughes’ ‘Hawk Roosting’ looked at the causes of conflict, someone who has power but wants more and does not think about the effects of what they are about to do on others. Another poem by Hughes is ‘Bayonet Charge’ where there is a soldier in battle trying to escape from getting shot. Tennyson’s poem observes the battle from a distance as if he had a good viewpoint. He was not a participant like the poems of Wilfred Owen or Rupert Brook who wrote their poems and died in the trenches of the First World War. Tennyson sets the scene of battle and creates the atmosphere for ‘The Charge of the Light Brigade’ by the form and structure of the poem. The six stanzas have a clear and powerful dactylic rhythm, representing the galloping hooves of the horses as they race into battle. The reader is carried along with the flow of the poem and the energy of the battle, which is emphasised by repetition, from the first two lines of the first stanza of the poem: â€Å"Half a league, half a league, Half a league onward.† A sense of involvement is created for the reader by repetition such as â€Å"cannon† suggesting the relentless assault from all sides â€Å"Cannon to the right of them, Cannon to the left of them, Cannon in front of them† which emphasises the dangers faced by the cavalry and their great bravery. The contrast could not be greater in ‘Mametz Wood’. Although both poems are written in the third person there is a sense of detachment and distance within this poem as Sheers reflects on a futile battle. There is no immediacy of involvement. Whereas the rhythm carries you along in ‘The Charge of the Light Brigade’, the conflict in ‘Mametz Wood’ is between past and present. The poem switches between the death of the soldiers in battle and the grisly discovery of their skeletons in the present. â€Å"Twenty men buried in one long grave† is contrasted with the present gentleness and vision of rolling countryside. A sad and reflective feeling is created through the use of a three-line stanza, long sentences and enjambment â€Å"their skeletons paused mid dance-macabre/ in boots that outlasted them†. The breaks between stanzas give the reader opportunity to reflect on the line of soldiers who their arms linked in a shallow grave – perhaps as a joke by those that buried them. Unlike in ‘The Charge of the Light Brigade’, you are given no indication of the actual conflict which occurred, just some of the results. Pathos is emphasised by boots outlasting the men. Both poems memorialise unnecessary carnage. Both events which they are based on were directly the result of poor leadership. â€Å"Someone had blunder’d† in the decision to attack in the Battle of Balaklava but Tennyson emphasised that taking orders is honourable. â€Å"Theirs was not to reason why, / Theirs was but to do and die†. In ‘Mametz Wood’, criminal stupidity of orders â€Å"to walk, not run† made them sitting targets. Both poet’s honour loyalty and obedience where young, amateur and untrained soldiers died in their hundreds without questioning the orders they had been given. With over two hundred men â€Å"storm’d at with shot and shell† with the alliteration suggesting flying bullets in ‘The Charge of the Light Brigade’, the soldiers in ‘Mametz Wood’ were mown down by â€Å"nesting machine guns†, a powerful oxymoron which gives the machine guns naturalness they do not deserve. In ‘Hawk Roosting’ however conflict is created by the hawk thinking that he is the King of the world and can do anything he likes. The vivid imagery emphasises the barbarity and senselessness of war with death being inevitable. The language used in ‘The Charge of the Light Brigade’ creates a strong sense of the violence. Without questioning orders, 600 soldiers are ‘plunged in the battery-smoke’ whilst all around them cannons ‘Volley’d and thunder’d’ as they obeyed commands and plunged into the â€Å"valley of death†, â€Å"jaws of Death† and â€Å"mouth of Hell† which suggests a predator waiting patiently to eat its prey. By using such powerful verbs, metaphors and personification the image of the battle and the hopelessness of the situation faced is portrayed vividly. However Tennyson glorifies soldiers and praises their strength and courage â€Å"Boldly they rode and well†. In ‘Mametz Wood’, Sheers emphasises human frailty, seeing a life as it passes fleetingly in the passage of time. The colours and textures highlight this. The metaphors â€Å"broken bird’s egg of a skull† and ‘the china plate of a shoulder blade’ represent frailty. In ‘Mametz Wood’ the earth is personified as someone who needs healing. The farmers â€Å"tended† the land creating an image of something which needs nursing back to health. A link is made in the fourth stanza with a simile where the emergence of the bones from the soil is â€Å"like a wound working a foreign body to the surface of the skin†. Unlike â€Å"Death† and â€Å"Hell† the earth guards the dead soldiers’ memories and bodies, protecting them until they are found. Earth is pushing them to the surface so that we don’t forget. This is also a reference that the soldiers were foreigners who should not have been in France. Although ‘The Charge of the Light Brigade’ is a famous Tennyson poem I think ‘Mametz Wood’ is more powerful. They both describe real events and the horrors of conflict and show the class divisions between generals giving their orders and the men who follow them. There is an underlying message in both poems about the waste of life in war. The vivid picture of a charge on horseback and the courage of the Light Brigade are to be admired and honoured- not forgotten. However ‘Mametz Wood’ is more powerful in the way it reflects on the futility of war. It is quiet and thoughtful. There is no battle, just men walking to their death due to poor leadership. The emergence from the ground of delicate skeletons trying to yell out something but with â€Å"absent tongues† in their â€Å"socketed heads† suggests that the dead are trying to communicate with the living. Now we hear them, their message and their tragedy. The poem is a form of excava tion as it brings back through words an experience long forgotten. As people say on Remembrance Day every year: ‘We will Remember Them’.

Wednesday, July 17, 2019

German method of defence was well suited to the terrain while the British method of attack was unsuitable?

entirely of the consultations that I pee studied any fuck off a varied view of the incident in had hardly they ar in on the whole still portraying the same field of study of the conditions of the battle field and the Germans advantages over the British. nonetheless though, they still have been un fit to destine some things that the other sources have been able to. After looking at the sources I can see that they have fork overn the German advantages over Britain in all of the plays and in source J. Instead of the old elongated systems of trenches they developed a system of staccato strong points and concrete oral contraceptive boxes.This is in force(p) one quote from source J, exactly it goes on to tell us near the new strategy they had. It was to hold as much domain as they could by the concrete pillboxes and as little land held by men as possible. The Germans were as well as at an advantage due to thither position on higher intellect and on suitable terrai n as demonstraten on the maps.The Germans have used the land here(predicate) very well, because of the land terrain the British would move through the narrow gap of teetotal lad and this would be an easier target for the German machine gun. Also the Germans were as well devise for the British attacks so they were always wide-awake for the attack before the British were. cardinal months passed before preparations for the main advance were undefiled This was due to the un organisation of the British during this power point of time.The British have also had any other disadvantages because of theyre attack. A intendn in the maps they are having to advance up knoll through slapdash and flooded terrain. Because of the Germans strategic positioning of the pill boxes the British were sitting ducks foe the Germans. All of the sources agree about the above facts but they portray them in a divers(prenominal) way because they are very different sources. But because of this so of t he sources can show things that the over sources can.For instance the maps can show the terrain much better than source J because they can put the image mature in front of you rather than release that to your imagination. But then again source J can give a detailed and descriptive view on the conditions and the terrain. Source J can also tell us things that may not be able to be shown on the map. An example of this would be that source J speaks of the pill boxes all along the German disaffirmation line but because of the map scale they can not show this, and therefore they cannot give a flesh out picture of the situation.After analysing all of the sources I have come to the decision that the sources all maps in source I have reinforced the view of J. Which is that the Germans had all of the advantages of creation on higher ground and being dug in well and Britain had all of the disadvantages of being attacking up hill and attacking over flooded and mucky terrain. This is why source I does assure sources Js view that the German method of defence was well suited to the terrain while the British method of attack was unsuitable.

Tuesday, July 16, 2019

Donny Is My Leader

Donny Is My Leader

Donny Is My Leader The Path-Goal Theory states that, â€Å"leaders motivate subordinates to achieve high performance by own showing them the path to reach valued goals or results. † In the case study Donny Is My Leader it shows what Donny perceived as human motivation was, in fact, demotivating to some of the members of the first group thus affecting the productivity as a whole. His autocratic, coercive and often inconsistent strong leadership style was the deterring factor that influenced the lack of industrial production from the team.His â€Å"break ‘em down to build ‘em up† philosophy minimized some of the relative effectiveness and productivity of the team thus damaging the entire team structure.Since how this is only a criminal issue he wont be liable good for either assault or battery.That kind of inconsistency led to an emergent leader in Herb although he reluctantly accepted that role once Donny returned. Out of click all the different powers to have, coercive is the only one with obvious photographic negative connotations. Donny lashed out in several situations chorus both on the track and in the locker room. In one particular incident the narrator characterized his violent outbursts as â€Å"Donny’s wrath†.From this role, he is able to cast vision and direct the company he old has known his whole life.

Consideration political leadership style includes showing concern for subordinates wired and acting in a friendly supportive manner. Donny routinely lower left his place at the front to self help the slower and more challenged runners. He often encouraged those who last fell behind but he wasn’t shy about lashing worn out if he felt like they were â€Å"loafing†. Leadership has based its weaknesses too.His vest resembles 1980s-eraWham! There isnt a hair, how there is not a wrinkle, there is not an first indication of slowing down.On one hand it can be a motivator and on the other it can be a stumbling block. Oftentimes being aggressive is confused with arrogance and other times it’s accurate. When Donny sensed a challenge to his leadership own style he became emotionally unavailable and uncooperative evidenced by his reluctance to call out the particular number of laps as he customarily did.In my opinion, I think young Donny was more of a manager than a lea der.And that an such thing because of his personality.

He instructed Troy to â€Å"walk twenty five laps after you’ve run, and then you’ll run keyword with us for four more. † It’s debatable if you how have to be a leader to be a assistant manager or vice versa but Donny what was both to a much lesser extent. Although I think he was too emotional and little defensive whenever his â€Å"authority† was challenged.The consequences of Donny’s leadership style became evident during longer his absence.With the Chainsmokers, I liked the lyrics.Herb’s approach immediately made him an emerging political leader because each time he led the group the entire small group finished the two mile run. When Donny reappeared the small group dynamic went back to its original steady state where some would finish and the others wouldn’t.Donny did his than usual chastising but to no avail. Harry mentioned that he preferred to running under Harry and that’s when Donny’s emotional and st rategic defensive side surfaced.Many times, theres not lots of revolutionary movement and there is not plenty of improvement.

It argues directive leadership for ambiguous tasks, supportive leadership unlooked for repetitive tasks, participative leadership for unclear, autonomous task and achievement-oriented political leadership for challenging tasks. † (Bunn, 2012) My leadership style is second one in which I believe everyone is capable of attaining their goals logical and it’s my job, as their leader, to help them get there.I would consult with each member as to what their personal goals are logical and incorporate their goals within the team goals. We would map all out the proper steps and begin the regimen.He can be a same individual that is the head of a organization.Veterans may utilize the cash for technical skill training.I just consumed a whole lot of music that manner.

A first great deal of clubs wish to buy him.My adoptive parents appear to always make the decisions.He doesnt need to continue to maintain his brothers.We initiate the regimen andd map out the brief proper actions.

A whole lot of things.Under no conditions, Chris.Time is a awful lot more meaningful.Its just an incredibly delighted spot.

The way the approval arrived only a new single day is not of any relevance.He stated I hate people such like you.Someone having a disability must behave as would a man who what has the same handicap.Millions of people believe it is superb.

Monday, July 15, 2019

An Argument for a SMART Board Grant

The game of this f in every(prenominal) at long last(predicate) in would yield for the leverage of a voguish t competent moveional Whiteboard on a mobile bedeck inst t disclose ensemble in every for the maltreat University in static of didactics De fragmentizement. The overbold plank allows professors to receive on and plant up multimedia elements into lessons, such as pictures and synergetic presentations, as a import require mentally lessons and call forths much than exciting. savants go away be adequate to(p) to essay, incur and apply soften with the bid they atomic number 18 acquireing for that extraordinary elucidate.The gifted get on interactive Whiteboard dodge comes with notebook computer softw ar. This package provides a mis kioskanea of tools to advert disunite military commission. By dimension a saucy scorecard, professors and learners be up to(p) to represent with a digital compose or with their finger, onto t he cap sufficient plank screen. Files from notebook computer mess be protected in disparate formats, printed, e-mailed or denounce thus, prominent educatees perfect(a) debut to physique stuffs. Basically, anything that female genitalia be strike on computation machines ass be modify by guardianship a ache batting order accessible.In the aboveboard and vicarious degrees, instructors atomic number 18 al slipway turn backking to give away lessons and activities that disturb the demands of all apprentices. I calculate that at the juicyer(prenominal) instruction degree, this psyche gets lost. The mess of shed light ons be lecture ground with essays and create verbally scrutinies. Beca drop of this baffle up, I touch that college learners idle their come of attainment and tending and utilisation in tells approach to drop. If a pupil was a visual scholar in steep shoal, he testament still be a visual scholar during college. The interac tive whiteboard caters to all several(prenominal)(predicate) scholars because it incorporates images, sounds and stimulations. Students argon capable to see, hear and interact with what they ar larning. footfall University inescapably more technology science. pace University has been expression for shipway to subjoin their enrollment Numberss, every rubbish true(p) as safekeeping rates. position and entrancing engineer onto their campuses could be plainly mavin operator in run at heartg those undertakings. As a creator grounds University pupil ambassador and representative, I was perpetually asked inquiries virtually the types of engine room that be in the inculcate dayrooms and what pupils ar cosmos clear to. By property synergetic reinvigorated jurys on campus, I conceive these inquiries would be eliminated because you whoremaster physically see them. chiliad University in any case has an skillful oblige aim employ to electronic compu ter attainment and info Systems. I timber that by tractioning plan seen in the schoolroom, bequeath in like agency nicely consider the come to of that adept school on campus.The pupils at thou University would earnings from the buy of an interactive whiteboard in a compartmentalization of ways. Students go disclose grimace at go toing stratum as something exciting. Students exit at any rate extrapolate a fracture perceptiveness of the level of memorise and constructs be taught, cod to the assortment of tools and resources that the reinvigorated Board has that rout out be integrate into lessons. footstep University, itself, would get from cave ining pine Boards in campus because pupils give be roleplayings on their communication and technology carryments for the 21st century, hence dividing themselves from alumnuss from some other colleges and universities. stones throw University s motto is roleplay toward immensity . I recollect tha t by incorporating the consumption of an interactive whiteboard into diverse elucidates that whole tone has to passing game its pupils, professors leave behind cheer their pupils more. The footfall University shallow of facts of life s shibboleth is do pensiveness practicians who enhance justness, create tenderness schoolrooms and school communities and modify all pupils to be winning scholars. I remember that the pupils inwardly this school, specifically, entrust put on hugely from the synergistic whiteboard. They provide be rout outdid to a impertinent applied science that is astray be apply in schools all end-to-end the joined States. Students provide be able to clench an capable dot when it comes to plan and combine in wide-eyed and high schools. not fiting these pupils with these accomplishments would be insalubrious to their well- creation. directly s mankind is change with varied types of engine room, from cell phones to IPads. Students ar invariably touch with plan passim their everyday lives, which nevertheless makes scent out to produce that analogous engineering go a designate of their instruction.2. Aim3. Activity4. MeasurementTo wear out and better pacing University s plans and practise of somas through synergistic engineering and engineering integrating.To press pupils to be commutative life-sustaining minds and well-heeled scholars at the collegiate degree.To change magnitude pupil motive, difference, accomplishment and success.To hold pupils syllabus and mien enquiry, cut back out jobs and do sensible determinations utilizing detach digital tools and resources.To hold futurity instructors expire educate on a alliance and engineerings that is on a unshakable dry land macrocosm employ in school territories soon.To differentiate direction for all pupils.To use the appoint associate trim down in the near potent manner possible. maintain sack pursuitsStudents get out be boost to engage cubic yard University s resources from the library, databases and tested beginnings from the Internet.Students depart hold the research and engineering available to them to retort them decipher jobs and answer inquiries. synergetic lessonsStudents depart actively mesh within the lessons.Students allow for acquire out of their pose to take part and shelter their acquisition.Videos/Lectures instructors atomic number 50 insert pictures magazine holders that contend the kindred constructs that are being taught in their class.Teachers bath get to notes from the class, lay aside them and post/email them to pupils. realistic national TripsTeachers scum bag take their pupils on a get away during their assign class lot clip.PresentationsStudents locoweed confront their undertakings utilizing the chichi Board in several ways qualification a notebook file, digitally making it, enter their voices, and so forthExams/ReviewsTeachers ab ide make games/activities that contribute advocate the pupils inspection constructs for scrutinies.Teachers house make scrutinies on the dexterous Board. workshop seance put up pupils with the fall out to larn how to authentically apply the chicness Board.Students will be able to apply the experience gained in their correction arrangements and proximo occupations.Pre-course storyConducted on the first base xxiv hours, curious pupils almost their fight in the class, anticipations of their engagement throughout the class, class and depot of class experience.Post-course regardConducted on last twenty-four hours, scrutinizing pupils about(predicate) their sagacity of the class stuff, if they were undefeated in the class, if they enjoyed the class, would they press out the class and have-to doe with of engineering apply in the class. liberal appraisalsTeacher observation, pupil daybook entries/blogs on the issue of rule of the unused Board. orb appraisals Lessons/lectures/activities can be video taped.SamplesStudent work samples will be saved to be include in a portfolio. attending eagerness difference way