Saturday, August 31, 2019

James Dean

A Rebel With A Cause â€Å"Wash the dishes, and clean your room. Be home by 7:00, don’t be late. Study, study, study. † We have all heard these words uttered from the authoritative lips of our parents sometime in our life, however, these days most teenagers aren’t afraid to disobey their parents by responding with, â€Å"no. † James Dean was one of the first people to defy the strict rules of parents, and he did so on screen for the entire nation. Some sources claim that he is a label; a label that is intended for the sole purpose of resisting authority.He is not a label, rather more of an icon used to show that in certain circumstances it is okay to disobey the various rules that society has unwillingly placed upon us. Whether it be in black and white, or vibrant colors, the emotions in this picture speak loud enough for color not to be an issue. People perceive Dean as â€Å"trapped,† and after gathering some background information about him and h is career, I can clearly see why he is portrayed as this. His career peaked for three years, and then abruptly came to an end. However, for those three years Dean had to be everything that America wanted to see and idolize.Cameras surrounded him 24/7, paparazzi always wanted a comment from him, and fans simply couldn’t get enough. In the photograph that I have attached, it is as if Dean is trying to keep a hold on himself and his emotions; trying not to get too caught up in the crazy world he had been thrown in to. The â€Å"Torn Sweater† series was taken by photographer Roy Schatt. Schatt told Dean to pose as if he was trying to escape something that comes from within, a feeling perhaps, that only he himself is aware of – hence the attempt at tearing his sweater off.It is ironic in a sense that he’s standing in front of a camera, completely alone with a solid background looking into the distance. Being in front of a camera he had grown completely accusto med to, but he was never alone, and the background of his life is more chaotic than just a solid color. Dean is pictured gazing into a vastness that only he could imagine, imagining his life on the complete opposite end of the spectrum that he ended up being on. Even with his fame and stage-presence, Dean was an average guy who struggled to trying to get by with life.It is possible I’m biased due to myself being a teenager, struggling to get through this crazy thing we call life that I am able to relate to him. This photo stands out to teenagers in the sense that not everyone is perfect, nor knows how to be. At this time period, for many American teenagers, it must have been difficult to stand up to parents, and disobey the overbearing rules they had set-in-stone. Dean gave inspiration to them to stick up for what they believe in, regardless of the fact that they are younger and seen as less knowledgeable.Some people may know Dean from various old-time movies. He starred in E ast of Eden, Giant, and is most recognized for his rebellious character in Rebel Without a Cause. He was considered a good actor in the 1950s for the diverse character roles he took part in, and of course for his legendary sex-appeal. For half a century, he has captured the world with his casual style, fearless look, and rebel attitude. James Dean has defied the essence of â€Å"cool† and â€Å"without-a-cause† for generations.Rebel Without a Cause may be one of the most famous due to the fact that Dean got into a fatal car accident on September 30 1955, one month before the release date. Dean wasn’t only a sexy symbol of rebellion, he represented an every-day teenager that goes through social issues without having a clear direction for his life. In Rebel Without a Cause, he was shown as a delinquent in an urban slum. It is the story of a rebellious teenager who arrives at a new school, falls for the girlfriend of a school jock, and disobeys his parents trying t o defy the meat-head’s bulling.The directors of the movie casted him as a rebel, realizing that his attractive, edgy self would appeal to many teens being as they can relate. Dean was a product of this 1950s ideology. Percieving Dean as a good guy, desperately wanting to do the right thing, yet constantly getting caught up in doing the wrong, was appealing to teenagers around the entire nation. Teens didn’t challenge their parents rules back then, they listened to their elders, and did as they were told. People who did backlash and resist the authority were considered outlaws, who would never be successful.Making this movie and being allowed to see the inside world of a â€Å"true† rebel was one of the first opportunities both teens and parents had to see the two sides of a story. Dean’s performance spoke powerfully on behalf of teenagers going through this type of scenario themselves, and gave them a hero they could admire and respect. In today’s society, arguing with parents, or going against the rules trying to break the idea of a norm isn’t unusual. Yet, in the era that this movie was made, it was extremely against anything society really knew.The case isn’t about whether teens should, or shouldn’t argue, it’s the fact of respecting elders so much. His movies, all three of them, show that it isn’t necessarily bad to stick up for what you believe in whether you’re younger than the opposing factors or not. Going against society in ways that not a lot of people were brave enough to endure was something that really stood out, and made him recognizable for decades to come. Being a super-star is something that ordinary people like myself can only dream about.Not necessarily dream as in wanting it so badly it hurts, but dreaming in the sense that living the life of a celebrity would be such an out-of-body experience. Dealing with cameras constantly on a day-to-day basis isn’t some thing that I could put up with. Sure, all the money and fame would be nice for maybe a year or so, by eventually a person reaches a point where privacy is more important than materialistic items. Getting to know someone through the media could possibly be the worst way to get the true story. In pictures, you only get to see one thing, one significant moment that happened to be captured by someone’s Kodak.Gathering background information and searching a little deeper into something that interests you is really beneficial not only for yourself, but also the someone who is getting perceived as a single story. One of his most famous quotes is â€Å"Dream as if you’ll life forever. Live as if you’ll die today. † That’s exactly what he succeeded in doing in his life. â€Å"James Dean lived fast – and died young. † (Gilmore 32. ) Although his life was cut short by an unexpected car crash that ended up being fatal, Dean established a name for himself within the few years that he was an actor.That is astonishing. He has an outrageous amount of fans, and still continues to become known throughout the world today. Works Cited Gilmore, John. ^ John GiLive Fast – Die Young: Remembering the Short Life of Ja. New York City: Thunder's Mouth, 1998. Print. Herndon, Venable. James Dean: a short life. Garden City, NY: Doubleday, 1974. Print. Hofstede, David. James Dean: a bio-bibliography. Westport, CT: Greenwood P, 1996. Print. Springer, Claudia. James Dean Transfigured: the Many Faces of Rebel Iconography. Austin: University of Texas, 2007. Print.

Horses by Edwin Muir Essay

This poem presents us with a post apocalyptic world in which evil triumphs over good –â€Å"and their great hulk were seraphim of gold/, Or mute ecstatic monster on the mould. † Or what a child might believe to be the Apocalypses –Perhaps some childish hour has come again. This is because in the first stanza he is only looking at regular horses but as he starts to watch the â€Å"through the blackening rain† they start to turn evil; but by the by the time the last stanza come about they start to fade away and the â€Å"black field and the still standing tree† return. He also constantly uses rhymes through the whole poem, it been such a basic poetry tool; it infancies the theory that it might be nothing more than a childhood memory. I think it’s common in the civilized West to associate this sort of revelation with childhood, as part of a natural inheritance we lose as we grow up. The last stanza makes me think of Housman’s land of lost content, yet Muir’s poem is clearly suggesting something more than what one might call the everyday magic of a child’s perspective. These horses are not simply magical, they’re elemental, totemic, numinous. If we take these presences to have been part of the common life of farming in Orkney in the late 19th century, then it should be borne in mind that Muir wasn’t cut off from this particular source by time alone, but by place and culture. He said that in moving from Orkney to Glasgow he aged about 150 years, and he was not being jocular.

Friday, August 30, 2019

Mitch Snyder

Mitch Snyder (1943-1990) is known mostly for his work advocating for the rights of homeless people and specifically as a leader of the Community For Creative Non-Violence (CCNV). CCNV began in the early 1970s as an anti-war group and evolved into an organization that provides food, clothing, shelter, and educational programs for the poor and homeless. Towards his goal of improving the lives of homeless people, Snyder employed non-violent confrontational protest tactics aimed at shocking the public and drawing media attention to this cause. These protest tactics included building occupation, construction of a tent city in Lafayette Park, vandalism, and hunger strikes. During his time in prison, Snyder converted to Christianity and fully embrace a radical Catholic form of social protest. Snyder served two years in federal prison, 1970-1972, for violating the Dyer Act. While in prison at the Danbury Correctional facility in Danbury Connecticut, he met the radical anti-war Catholic Priest Daniel Berrigan and like Berrigan, Snyder became an outspoken critic of the Vietnam War and the treatment of prisoners in federal correctional facilities. His protest methods included prisoner work strikes and hunger strikes. The political and spiritual conversion he experienced in prison shaped his life. Upon being released in 1973 Snyder came home to rejoin his family. Less than one year later he left his family again and joined the Community for Creative Non Violence (CCNV) in Washington, D. C. CCNV was at that time operating a medical clinic, a pretrial house, a soup kitchen, a thrift store and a halfway house. CCNV came out of a discussion group about the Vietnam War at George Washington University. CCNV was also very active in non-violent direct action in opposition to the Vietnam War. Snyder became the driving force of CCNV but worked with many deeply committed people including his life and professional partner, Carol Fennelly; Mary Ellen Hombs, with whom he co authored Homelessness in America: A Forced March to Nowhere; and Ed and Kathleen Guinan. Snyder dedicated himself to awakening the national conscience and challenging the political system. Starting in the late 1970s, he had begun organizing demonstrations designed to call attention to the unmet needs of homeless men and women in the streets of the nation's capital, often leeping on steam-heat exhaust grates located near federal buildings. Headline-grabbing protests that Snyder sparked — as a leader of a onetime anti-Vietnam War organization, the Community for Creative Nonviolence — included a December 1978 takeover of the National Visitors Center, near Union Station, by homeless people. The action forced t he city to provide more shelter space. In November 1981 — three months after the New York settlement — Snyder led a group of about 150 activists and homeless people in building and occupying a tent camp they called â€Å"Reaganville† in Lafayette Park, across from the White House. In naming the camp after President Reagan, the activists were trying to evoke the Great Depression, when the jobless and homeless built camps they called â€Å"Hoovervilles,† after President Herbert Hoover. The next year, Philadelphia enacted an ordinance that also guaranteed the right to shelter, and in 1984 Washington finally acted. Partly in response to Snyder's and other protests, Washington voters in 1984 passed the nation's first referendum measure guaranteeing â€Å"adequate overnight shelter† to homeless people — a statutory equivalent of the New York legal agreement. He and CCNV pushed and prodded the District of Columbia, the local churches and temples and mosques, as well as the federal government to open space at night for homeless people, and worked to staff the space that was made available. Through demonstrations, public funerals for people who had frozen to death on DC streets, breaking into public buildings, and fasting, CCNV forced the creation of shelters in Washington and made homelessness a national and international issue. In the 1980s Snyder, Fennelly, and other CCNV activists entered and occupied an abandoned federal building at 425 2nd Street N. W. now Mitch Snyder Place) and housed hundreds overnight while demanding that the government renovate the building. Under intense pressure, the Reagan administration agreed to lease the Federal property to CCNV for $1 a year. Later the Federal government transferred the property to DC. It remains the largest shelter in Washington to this day. Snyder fasted twice to force the Reagan adminis tration to renovate the building. The first fast ended on the eve of Reagan's second election when Reagan promised to execute necessary repairs. Reagan failed to follow through on this promise, and litigation ensued. An Oscar-nominated documentary, Promises to Keep, narrated by Martin Sheen, follows that story and tells why a second fast was conducted. Sheen also played Mitch Snyder in the made-for-TV movie, Samaritan: The Mitch Snyder Story. Angered that Holy Trinity Parish in Georgetown planned an expensive renovation of that historic church, and maintaining that the money involved should be given instead to the poor, Snyder stood in the middle of the congregation throughout the Sunday Mass for many weeks as a protest, while other congregants knelt or sat during the service as was customary.

Thursday, August 29, 2019

Complex messages in large organizations will always be misinterpreted Essay

Complex messages in large organizations will always be misinterpreted. Discuss - Essay Example The ability of exchanging information is important for every individual and organisation as it is the main source of creating relationships with people and getting the work done in an effective manner. The success of all leading corporations such as Unilever, Microsoft, Colgate-Palmolive, HP, Dell and many more is because of the presence of an efficient and productive communication process. Many of these organisations have open door policies that allows a smooth and effective communication process to take place amongst the all the management levels in the organisation. Successful communication processes within organisations allow organisations to achieve their targets (Zainab, 2012). Every business organisation has to ensure that it has the best communication process which will ensure that all messages are communicated properly. Individuals in organisations are from different cultural, educational and social backgrounds. The difference in the backgrounds increases the risk of complex messages being misinterpreted. The way the various employees perceive messages would be different from employee to employee. It is very important for managers to ensure that the message is perceived in the right sense by all the concerned employees that will conduct the task so that maximum level of productivity is attained. It has been observed that complex messages in large organisations will always be misinterpreted as everyone perceives the message differently (Blundel & Ippolita, 2008). If there is lack of clarity about the purpose of a specific message, then there are more chances that an organisation will suffer huge losses in the long-run. As the communication process varies across the organisations, it is vital for the management team to develop and implement a system that will ensure that the employees are on the right trail and the desired message has been effectively communicated (Modaff, DeWine & Butler,

Wednesday, August 28, 2019

Film Noir Scorsese and fhe Gangster Film Movie Review

Film Noir Scorsese and fhe Gangster Film - Movie Review Example The Maltese Falcon is considered to be one of the key films cementing the genre in the respect of the public, as well as establishing its archetypes. The end result has been such quintessential crime films as Scar Face, The God Father, The Departed and the most recent American Gangster. These films are notorious for depicting East inner city life, and no director has become more known for this than Martin Scorsese. No New York director has more authentically imbedded New York ideals into popular culture than Martin Scorsese. Classified as a contemporary auteur he has carved a niche as a New York Hollywood director. The auteur theory protests that the director's films reflect the particular director's personal creative vision, as though he or she were the sole author of the work. The French word for author, many film producers have notably been credited for having auteur like influences on film projects. It has also had a major impact on film criticism, since it was erected by film director and critic Francois Truffaut in 1954. This is partly why Auteurism is most immediately connected with French New Wave. This of course, was a connection made most commonly in the mid 1950's to 60's before American filmmakers embodied the theory. Today, no contemporary American director more deserves the title of auteur than Martin Scorsese. He has presented his genuine Italian New York culture in such an auth entic way that, for so long, it is unclear whether his work is a reflection of the city, or the city is a reflection of his work. Martin Scorsese is the perfect example of an auteur because he uses the same thematic consistencies throughout all of his work. These entail Catholicism, virgin/whore conflict, redemption, ethnic pride, and of course crime culture. On top of this, he supports all of his plots with very eclectic soundtracks. The cinematography he uses is very similar in all of his films. He utilizes the fluid motion of the camera with each shot, while making the mis-en-scene of each frame valuable to the plot of the story. He is also know for using some of the same actors in his films, specifically Robert Deniro, Joe Pesci, and Harvey Keitel. Of his large body of work, Mean Street symbolizes the blue print to the archetype that has become his unique style (Raymond, 2002). It was his first film and it contains all of the key characteristics with which he modeled his style. Scorsese has a visual style that relies on the city of New York. Mean Street embodies the culture that comes with this location. In the film, the audience is subjected to getting to know characters who spend their time womanizing, hustling, fighting, and drinking. Centered on the struggles of four men in their mid-20's and all residents of Little Italy, who are working their way up the rungs of gangster culture, some are loan sharks, and some are just plain hoods. Tony (David Proval) is a big friendly guy who runs the neighborhood bar; Michael (Richard Romanus) is a small-time loan shark who tends to rip off Brooklyn adolescents. Johnny Boy (Robert De Niro) is an irresponsible hood who borrows money from loan sharks that he never intends to pay back, and Charlie (Harvey Keitel) is the nephew of the mafia boss Giovani (Cesar Danova). Charlie's only aspiration is to run his own restaurant. Mean

Tuesday, August 27, 2019

Cross Cultural Awareness for Business Essay Example | Topics and Well Written Essays - 2000 words

Cross Cultural Awareness for Business - Essay Example Essentially, culture refers to the traditions, set of values, and norms or practices that tend to influence the ways in which individuals behave, think, make a judgement and also their perceptions within a group setting. The perception that employees may have about an organization tends to influence the way in which they tend to complete organizational tasks that may not be in line with the deadlines. This brings about the idea of cultural competence that refers to the ability for individuals within an organization to interact in an effective manner with people from different cultures. This may draw from their worldviews and the understanding of other people’s culture’s and also being tolerant of them (French, 2010). Based on this overview, this essay will delve into the emic approach in understanding and managing people in the workplace that have cultural differences by referring to the works of two writers. The focus will be on the value of their contribution to cross-cultural managers and also refer to four countries in which this approach is applied. Ideally, the emic and etic approach is a form of field research performed with the aim of obtaining various viewpoints within a social group from with the observer’s perspective and also from that of the subject at hand. In much detail, the emic approach determines the way in which people from a locality think, they way that they perceive and explain things, the way they behave as per their rules and also the things that bring meaning to them. These approaches to to manage cross culture within the workplace were developed by Kenneth Pike in 1954 to which his suggestion was that when both of them integrate then this is likely to yield more positive results (Ritchey, 2011). The emic approach requires the examining of each culture in order to determine the way in which those applying this approach interpret certain observable facts. The emic approach is drawn from the phonemic term and the etic

Monday, August 26, 2019

Feasibility Memo Essay Example | Topics and Well Written Essays - 250 words

Feasibility Memo - Essay Example It is important to work with the current employees as they a familiar with some of the organization’s customers. The marketing strategies should be revised. The company should carry out intensive online marketing over social media in order to create the awareness of the products to people in different regions of the world. For improvement and undertaking the revision of the project, the organization needs more funds. The organization should seek loans from local banks. The organization saving should also be utilized in order to undertake the project. For expansion purpose, the organization needs more production machines and an additional vehicle for transportation. Ten computers are also needed for internet marketing, recording and storing the information. The organization needs to have a General Manager who will oversee the progress and performance of each department. The General Manager should be in possession of a Masters degree in Management and five years experience in management

Sunday, August 25, 2019

Johnson & Johnson healthy future 2015 Research Paper

Johnson & Johnson healthy future 2015 - Research Paper Example It is necessary to recycle and use alternative energy to cut CO2 emission by a great percentage. Health of people throughout the world has been compromised with diseases like Tuberculosis and HIV killing over one million annually. Johnson and Johnson are an environmental conservation and a noon-profit organisation that conservesthe environment, and improve people’s health. The organisation has been in existence for over 125 years working environmental conservation. The Johnson and Johnson have come up with a Health future project that is going to be implemented over a five year period. Health future 2015 has a long commitment to address global health issues. Their primary goal is to create a healthy world by improving both human, and planet health. This campaign is aimed at aggressively reducing Co2 emission, water usage, and waste disposal by introducing six new sustainable products. This project identified stays sustained by the eco- friendly products that are developed and later sold to consumers. The organisation has recruited many volunteers and partners that are willing to help in conserving the environment and reduce its pollution. The project is tremendously beneficial to the globe and every person that loves the environment and health would be involved. The concept that Johnson and Johnson family target’s almost everybody because it helps, and at the same time educates. A person can get involve by simply using their environment al friendly products. This campaign will target the manufacturers, the ordinary person buying a product and those that require health assistant including those in the developing nations. Johnson and Johnson aim to achieve its goals up to 100%. Johnson and Johnson family collaboratesthroughdoctors plus nurses to aid them care for their patients, and give them the joy of health. This is paramount to me as a nurse. The organisation has health initiatives that help

Saturday, August 24, 2019

Foreign Direct Investment Assignment Example | Topics and Well Written Essays - 2250 words

Foreign Direct Investment - Assignment Example From the discussion it is clear that  countries seek FDI due to the technological benefits that boost production mechanisms in several sectors across the economy. FDIs also create adequate employment opportunities, thereby enhancing the economic growth prospects of the host country. FDIs, nonetheless, increase the quality of products within the market, hence giving the consumers a wider range of products from which they can choose.This paper stresses that FDI is responsible for stimulating the economic development of a target country. Besides, the FDI enables companies to enjoy the benefits that accrue from larger markets in the global economy. Therefore, FDI ensures that industries capitalize on their sales through international presence. While at it, FDI creates new employment opportunities, thereby increasing the income and the purchasing power of people within an economy. This leads to economic growth. As stated earlier, FDI presents a boost in the human capital resources, thro ugh sharpening the knowledge and competence of the cross-border workforce. Many companies also benefit from the tax incentives in their respective business fields. Apart for the development of knowledge, FDI enables the transfer of resources in form of technology, skills and raw materials, hence limiting the disparities between the organizational revenues and costs.  FDI can hinder the domestic investment by offering excess competition. In addition, the risk of political instability threatens to destabilize the operations of foreign investments.

Friday, August 23, 2019

First Team LLC Business Plan Essay Example | Topics and Well Written Essays - 2000 words

First Team LLC Business Plan - Essay Example The company remains controlled by the one entrepreneur and a team of support staff (Folsom, 48) Goals of the company Ease supply of goods and materials to customers in a competent and reliable manner Networking with the surrounding suppliers and storage enterprises to facilitate smooth running and operation of the business Build branches in various parts of the country to facilitate growth of the institution Buy more vehicles to ensure that clients always get services they need on time and efficiently Recruit more staff to improve service delivery and facilitate expansion of the business Increase the revenue base yearly Establish efficient communication channels among the parties involved Fixing the correct programmes which can remain achieved conveniently Employing and maintaining highly qualified and trained staff Trying to precisely understand the client’s needs and help them achieve them (Folsom, 49) Company Description Logistics support company located at the outskirts of the capital city will offer transport and logistics organization solutions for enterprise customers within the region of its location and far. Starting with operations form within the city, the company will transport materials from distributors to manufacturers to wholesalers and retailers, acting in conjunction with supply canters, storage enterprises, and wholesalers. The logistics company remains started by two entrepreneurs who before worked like managers of storage enterprises for a reasonable period. The company will function in the logistics and transportation filed with many services. An extra source of income remains the growth of unique services. This can vary from computer arranging systems to supply services. Cross marketing remains arranged to be one of the key methods in this company, because the whole items remain focused to serve the same requirement and can cheaply remain merged. Synergy in marketing an item across company divisions remains probable to push income further higher. A firm concentration of this company will remain placed on the growth of unique and creative techniques for the clients that offer an important value. A wide variation of customized services will remain provided that will aid make use of the institution and worker potential. A core objective of this suggested business technique remains the growth of a unique corporate personality. Such personality will form client loyalty and aid achieve a competitive advantage. The particular choosing of services and requests provided will remain supervised regularly and differ depending on business requirements. This method offers a competitive border against various businesses in the surrounding and remains anticipated to cause an extra demand and the probability for a cost mark-up (Folsom, 52) Market Analysis This is a big industry with stiff competition from various transport and logistics companies in the region and outside the region. However, the company will battle out in th e market with the medium sized institutions of its kind. It will offer general transport and logistics services to its clients at favorable and affordable costs aiming at minimizing cost but making profits as well. Market Segmentation Raw material distributors They transport huge amounts of materials to big producers in the region. These materials wholly

Crime in International Context Essay Example | Topics and Well Written Essays - 2500 words

Crime in International Context - Essay Example The researcher states that application of the state-territorial principle is argued to give rise to a dualistic approach towards a particular crime because of the significant amount of differences between countries’ stance and legislation to tackle to various offenses. The exact nature and limitation of this principle will be discussed through the example of Raymond Davis and Aafia Siddiqui in later parts of the prose to help further understanding of the state-territorial principle and why criminologists need to look beyond it. The substance of this prose will systematically assess all aspects of transnational crimes and demonstrate both national and international contexts in which the crime is prosecuted and demonstrate it primarily through the scourge of human trafficking in the United States. The prose will also assess the strategies adopted by countries to help curb the problem. II. State-Territorial Principle The state-territorial principle dictates that sovereign states are able to prosecute crimes that are committed within their borders and hence, triggers a number of complications when it comes to dealing with crimes that require legislation beyond the country’s borders. The principle bars the country from exercising control and prosecuting the perpetrator outside its border. However, the principle stands null and void for those countries that possess universal jurisdiction or those who have been granted to exercise their control by other principles such as the â€Å"Principle of nationality†, â€Å"the passive personality principle† or the ‘protective principle†. The territorial principle is based on the premise that criminal jurisdiction is based on the place where the crime was perpetrated. Having defined the state territorial principle and the dynamics involved in its application on the prosecution and tackling of crimes, criminologists have often argued that criminology needs to move beyond the state-territor ial principle. It is a logical approach to decide the course of jurisdiction; however, there are several arguments for and against it. As the state-territorial principle bars research analysts from establishing theories to study international and transnational crimes. It is an undeniable fact that every country establishes legislation to tackle crimes according to the perception and gravity of the crime that depends upon the cultural stance of the country. Therefore, in order to pave way for the researcher and establish a more uniform approach to these crimes, it is important to move beyond the state –territorial principle. Furthermore, sometimes people may feel that the culprit of a transnational crime has not received a punishment that is proportional or equal to his or her offence; however, it is the country’s law and regulation that allow that punishment for the crime as a result in order to draw a verdict that is acceptable to the legal system of both countries. S tate territorial principle has been met with a highly dual approach by researchers and critics. Some critics have argued, â€Å"As a matter of convenience crimes should be dealt with by those states whose social order is most closely affected, and in general this will be the state on whose territories the crime are committed†¦

Thursday, August 22, 2019

Lemurs in Madagascar Assignment Essay Example for Free

Lemurs in Madagascar Assignment Essay What are Madagascar’s biomes? Discuss the major features of at least one of these biomes. Use the textbook for biome examples. Madagascar is a tropical rainforest, rain forest savanna and grasslands. The rain forest receives 120 inches of rain at least a year. It has very wet and dense vegetation within the trees. Anywhere from 70 plus percent of animal life lives in the trees. It is filled with lakes, river, swamps and a wide variety of different terrain. There is an overabundance of green plant life that strives on the heavy rains received each year. The forest floor is full of nutrients which the large tree strive on giving the canopy effects and which houses so much plant and animal life. 2. What changes happening in Madagascar are posing challenges for lemurs? Give details about the sources, time scale, and types of change. All the time the environment is changing by people moving in and getting more populated. As people come into a new area they may alter a Lemurs normal route or main food supply in the area by cutting down a certain tree such as bamboo. 3. Which types of lemurs are adapting to the changes? Which types of lemurs are not adapting well? Why? The less vulnerable lemurs are good at adapting to a secondary environment with people. The vulnerable or endangered lemurs are having hard time moving and settling into a new food source or habitat which is causing them to go  extinct faster. Ringtail lemurs can adapt and defiantly go to multiple environments. 4. What behavioral and physical traits are being favored in lemurs in the changing Madagascar environment? People are studying lemurs to find out if you can teach other lemurs certain straight so that can adapt to a new type of environment. Such as eating habitats and what they eat. How the move and migrate from place to place. 5. Why might lemurs not evolve to adapt to the changes in Madagascar? They may not never adapt due to the constant changes in the environment nonstop. Some lemurs can adapt with evolution over hundreds of year but with humans within a few years they can destroy an entire habitat along with food sources within a year. The constant changes always leave the lemurs on their toes. Constantly roaming from one place to another 6. Which biogeochemical cycles may be altered by anthropogenic activities on Madagascar, and how? Many things may be altered such as the soils and living organisms by people moving into the new areas in such a rapid rate. What toll does this take on the environments such as global warming and pollutants in that areas now? What do the changes in the smaller spectrum of things do to the overall climate? Reference â€Å"Lemurs in Madagascar: Surviving on an Island of Change.† Films Media Group, 2006. Films On Demand.

Wednesday, August 21, 2019

Concepts in Differential Privacy

Concepts in Differential Privacy Abstract Stored data in search log is insecure process to the search engine. Search log contains extremely sensitive data, as evidenced by the AOL incident. To Store information in the search log is identify the behavior of user. To maintain this sensitive data is risky process, because some security methods containing the drawbacks. Search engine companies provide security for search logs, in some cases intruder identifies the stored data then loss occurred. This paper provides security methods for the search data against the intruder. To store the data in the search log based on the keywords, clicks, queries etc. Anonymization is the method provides security for data but it loss the granularity. And another method is â‚ ¬-differential privacy provide utility for the problem. (â‚ ¬,∂)-probabilistic privacy used to calculate the noise distribution. ZEALOUS algorithm propose in this paper provide effective results with (â‚ ¬1,∂1)-indistingushability. This paper concludes w ith the comparable utility with the k-anonymity, â‚ ¬-differential privacy. To this algorithm produce the effective result. Keywords: Security, Privacy, Data Anonymity, Information Protection, Differential Privacy, Histogram INTRODUCTION To publish the search query logs are useful to know the behavior of a user. To interact users into search engine information stored in the form of search log. This stores the information based on the following schema {User_id, Query, Time, Clicks} Here User_id identifies the particular user. Query identifies the group of keywords to be searched by the user in search engine. User search the keyword in search engine like â€Å"Java† then relevant information related to Java will be occurred in the browser. User clicks on the particular link it will store in the search log as number counts. And also store the time of the click on the user. Single user consists of a user history or search history by the search entities. User history partitioned into sessions by the similar queries. Queries can be grouped into form a query pair, this used for the preparation of data in the search log. Query pairs can be divided into sessions and each session contains the subsequent query. Generally keywords can be divided into two ways. Those are 1. Frequent 2. Infrequent 1. Frequent Keyword: Previous methods only introduce these keywords. Because of this keywords are produce easily with search logs compare to the infrequent. Users search the keyword in the search engine based on that criteria identify the frequent keywords. 2. Infrequent Keywords: Proposed method for this paper is to publish search log with infrequent keywords. To publish this keyword is to loss the utility and produce less results compare to frequent keywords. In the previous method k-anonymity the main aim of this method is to define effective anonymization models for query log data along with techniques to achieve such anonymiation. Publishing of user query search logs has become a sensitive issue. To develop anonymization methods to publish the searc log data without breaching privacy or reduce utility. Drawback of this method is to identify the data to the external linked attributes. Introduce Quasi-identifier to the identification of an individual by combining to the external data. Following is an example data set User Registration Search_log Fig 1: Anonymization of the data In the above tables explains that the user registration contains all the user details of the user history. Search_log table contains the data of the user searched data. These two tables are externally linked to each other with this data loss occurred. Putting these searches together may easily reveal the identity of the user. The idea behind this k-anonymity is provide guarantee to each and every individual and hidden the group of size k with respect to the quasi-identifiers. To produce the search logs with â‚ ¬-differential privacy provide good utility, but problem with the search logs is noise added to the search logs. Several methods are used to produce random noise in the differential privacy. According to this paper classify them as two categories Data-independent noise Data-dependent noise Adding noise to the data this data-independent noise is most basic one. Laplace noise addition belongs to this category. Compare to the data-dependent noise is most complex, but usually they lead to less distortion being introduced. But this paper focus on the data-independent noise, which is most frequently uses in data sets. To produce effective results with â‚ ¬-differential privacy add laplace distribution to the result. Zealous algorithm consists a two phase framework for the purpose of identify the frequent items in the search log. And set two threshold values to publish the search logs with more privacy. Search engine companies apply this algorithm to generate statics with (â‚ ¬,∂)-probabilistic differentially private to retaining good utility for the applications. Beyond publishing search logs this paper believe that findings are of interest when publishing frequent item sets. This algorithm protects privacy against much stronger attackers than those compare the previous methods. RELATED WORK Search Log Anonymization In the previous incident occur in the AOL search log, it reveals the data of a user. Adar propose a method it appears at least t times before it can be decoded, which may potentially remove too many unused queries. And another method tokenize each query and hashes the corresponding log identifiers proposed by Kumar at el.[21]. This method improve the frequency of the search and leaks the data through hidden tokens. To overcome the problems in previous method introduce the anonymization models have been developed for search log release. Hong et al. [17] and Liu at al.[23] anonymized search logs based on k-anonymization which is not accurate as differential privacy. Xiong at el. [15] presents the query log analysis applications and various granularities of releasing log information and their associated privacy threats. Korolova et al. [20] release first applied the accurate privacy notion to release the search log based on differential privacy by adding Laplace noise. To add the Laplace noise to the counts of selected queries and urls is straightforward directly maximize the output utility with optimization models. Publish the frequent keywords, queries and clicks in search logs and comparison for two relaxations of â‚ ¬-differential privacy. This paper works related to framework for collecting, storing, and mining search logs in a distributed manner. Differential Privacy Dwork at al. [7,8] propose the definition of differential privacy. A randomized algorithm is differential private if for any pair of neighboring inputs, the probability of generating the same output. This means that two data sets are close to each other, a differential privacy algorithm behave same on the two data sets. This process provide sufficient privacy protection for user data. And also introduce the data publishing techniques which ensure â‚ ¬-differential privacy while providing accurate result. Search queries contain sensitive information it can lead to re-identification, approaches include query results, user-id to prevent re-identification of individuals from the search queries. This approach differs from the above it interact access framework that does not directly depend on anonymization for privacy, it differs from the semantic policies and differential privacy.

Tuesday, August 20, 2019

Strategies of Value Creation

Strategies of Value Creation Value Creation The idea of value creation is to capitalise on what, as an organisation, you already possess. The organisation may be a business, a school, a corporation, a government department – anywhere, in fact, where the main asset of the company is the people within it. Establishing value creation as a way of life for both managers and workers can help define the role of each more precisely, whilst simultaneously making both feel more integrated and involved within the day to day running of a place of work. Making everyone within an organisation feel that they are more than just ‘cogs in a wheel’ establishes a new feeling of unity and cooperation in organisations and can be a great asset in moving a company or other organisation forward because if everyone feels that they are part of the decision-making process then carrying out the aftermath of those decisions is more likely to be successful. In the modern business world, then, it makes sense to learn how value creation can be implemented. So What is ‘Value Creation’? Value creation, aligned with value based management, is the amalgamation of established organisational principles such as planning, performance, management and communication, with the fundamental principle that all members of an organisation have an important role to play in all aspects of the running of the organisation. Of course, this must be handled extremely carefully because management techniques are not dispensed with in the implementation of value creation, they are adapted to it. Therefore, the first thing to look at when considering the implementation of a policy of value creation, which has proved itself to be both financially and personally beneficial, is to consider how this alters the role of the manager. Implementing Value Creation It has been established that in order to implement successful value creation, senior management has to be fully committed to the project. This means that the role of the manager in the implementation of value creation is crucial. The successful manager as defined within the terms of value creation needs to possess the following qualities: They must show themselves to be committed to the idea of value creation in both words and actions They must communicate clearly and comprehensively how they envisage the entire organisation assimilating the concept of value creation They must demonstrate flexibility in order to accommodate value creation but must also maintain a strong focus for the workforce They must show how they see value creation as beneficial to the entire organisation. Tip: When implementing value creation, ensure not only that the entire management team is committed to the idea of value creation but that they are seen to be so. Integrating value creation requires that a new approach be adopted by management in key areas such as: Budgeting Planning Performance measurement Training When implementing value management, all of the above need to be rethought so that the workforce is engaged in the process from top to bottom. What you are aiming to do in all of these key areas is to shift the emphasis from ‘manager’ to ‘owner’ as conceptualised throughout the organisation: in short, everyone needs to feel that they are an important, valid and vital member of the team. Tip: Value creation succeeds or fails on the idea that every single member of an organisation is involved with it. Therefore, the main thrust when initiating value creation is to convey the idea that separation is an outmoded idea. Making Value Creation Permanent After the initial enthusiasm, especially by senior management, towards value creation as an ethos, research has shown that it is all too easy for organisations to slip back into previous ‘management versus workforce’ divisions. This destroys any progress made during the implementation process and also any accompanying successes achieved at that time. Even if there is only a partial retrenchment, the cracks will quickly spread and the whole edifice collapse, perhaps creating more fragmentation than before the implementation of a policy of value creation. This means that once implemented, value creation must be maintained. Everyone within the company thus needs to be aware of the importance of their role within it and how they can make any worries or concerns known as value creation becomes a way of life as natural as breathing. Tip: Make each person aware that their role in value creation is ongoing and that if they feel the organisation is regressing, they have channels via which they can make their feelings known. Some Final Points on Value Creation Make it plain from the start that senior management is committed to the idea of value creation for the good of the whole organisation. Ensure that management make their commitment obvious to the workforce by deeds as well as words. Ensure that the ethos of value creation is reflected in the key organisational principles of the company, such as budgeting, planning, performance measurement and training: it must come to seem to be a way of life. Make sure that once implemented, value creation remains constant and that each and every member of the company feels involved at every single stage. Try to ensure that the idea of value creation is fully embraced by each and every member of the team and that everyone feels like an owner not a worker. Embrace the idea of value creation not just as a way of getting more from employees in terms of profit but also in terms of morale. When a person feels valued, it is a proven fact that they are a greater asset to the organisation of which they are a part. When this is extended, via the ethos of value creation, to involve the individual members of a team with the decision making and goals of the team as a whole, the success of the organisation increases too. Thus, the successful organisation of the future needs to embrace the idea of value creation with enthusiasm.

Monday, August 19, 2019

Dependent Personality Disorder Essay -- essays research papers

A Psychological Aspect of Susan Smith: Dependent Personality Disorder   Ã‚  Ã‚  Ã‚  Ã‚  On October 25, 1994, Susan Smith drowned her two sons, Michael and Alex, in the John D. Long Lake in Union County, South Carolina. For nine days she lied about knowing where the boys were. On November 3, she confessed to the killings and would soon go to trial. Susan’s defense team hired a psychiatrist to conduct a psychiatric evaluation of her. She was diagnosed as having dependent personality disorder. He described her as a person who â€Å"feels she can’t do anything on her own†. â€Å"She constantly needs affection and becomes terrified that she’ll be left alone† She was only depressed when she was alone. The psychiatrist studied her family history and concluded that based on her family history and his interviews with her, Susan had a tendency toward depression that began in her childhood. Susan’s attorney argued that his client was psychologically destabilized by a lifetime of betrayal. A father who killed himself when she was just six, a stepfather who sexually molested her as a child, a husband who cheated on her and a boyfriend who toyed with her affections (Pergament).   Ã‚  Ã‚  Ã‚  Ã‚  Her boyfriend testified that â€Å"the pleasure she got from sex was not physical pleasure, it was just in being close and being loved†. The psychiatrist testified that Susan had sex with four different men during the six-week period leading up to the murders and she had begun to drink heavily during this time (Pergament). Alcoholism is a component of dependent personality disorder.   Ã‚  Ã‚  Ã‚  Ã‚  After only four days of testimony, the defense rested its case. Susan was charged with two counts of murder and sentenced to life in prison with the chance of parole in 30 years, the year 2025.   Ã‚  Ã‚  Ã‚  Ã‚  Dependent personality disorder is an inability to function without significant reliance on a forceful or dominant person providing direction. Individuals diagnosed with dependent personality disorder are usually quiet, and needy for attention, valuation, and social contact. Lack of self-confidence and relying on others are typical. Threatened with solitude or separation, a dependent disorder person may panic  Ã‚  Ã‚  Ã‚  Ã‚  with feelings of profound helplessness (Gillihan). The person may be convinced that he/she is incapable... ...ost effective in treatment (Gillihan).   Ã‚  Ã‚  Ã‚  Ã‚  In conclusion, The National Mental Health Association suggests that: There are many types of help available for different personality disorders. Treatment may include individual, group, or family psychotherapy. Medications prescribed by the patient’s physician may also be helpful in relieving some of the symptoms of personality disorders including problems with anxiety and depression. References American Psychiatric Association (1994). Diagnostic and Statistical Manual of Mental Disorders: DSM-IV. (4th ed.). Washington, DC: Author Bornstein, Robert F. (1993). The Dependent Personality. New York: Guilford Press Gillihan, Lori. (n.d). Dependent Personality Disorder. Retrieved March 1, 2002, from http://cstl-coe.semo.edu National Mental Health Association. (n.d.). Personality Disorders. Retrieved from http://www.nmha.org Pergament, Rachel. (n.d.). Susan Smith: Child Murderer or Victim? Retrieved March 1, 2002 from http://www.crimelibrary.com Rey, Joseph M. (1996) Antecedents of Personality Disorders in Young Adults. Psychiatric Times, 13 (2). Retrieved March 1, 2002, from http://www.mhsource.com

Sunday, August 18, 2019

Personal Goals :: essays research papers

My background in technology is not as deep as most people, but I do have some. My first experience with computer technology was when I was in eighth grade and the Atari VCS came out. My sister and I begged our parents for one for what seemed like eternity. Finally, that Christmas, there it was under the tree. After that, I remember computer class in school. Later when I joined the military, I had a small experience with a word processor, when I worked with the Staff Chaplain. After I separated from the military, I got a job at McDonalds as a manager and had to frequently use a computer for numerous tasks, reports, and so forth, and that was my first experience with it in the workplace. Later on I became a truck driver and thought I would not use it very much, but little did I know. The transportation industry is full of technology, from dispatch and the main office, to the trucks themselves. Dispatch is using computers to take orders track them and dispatch them. When a customer calls in and places an order or asks for a pick-up, the first thing a dispatcher does is input the information into a database and finds out if this customer has worked with them before. After they have determined either this they are entering this customer into the database, or they are entering a new program. This new program is how they enter the order into a new database. There are many different programs but they all do the same thing. They track the customers order form where it is originating from to the final destination and every stop in between, they track the mileage and fuel consumption on the individual truck and even how much down time the driver is taking. This program is lin ked to the individual truck, where the driver is in charge of upkeep. On the drivers end he/she is sending messages to dispatch telling them everything they need to know. Such as I am empty, where do I need to go, from I am broke down send help. These devices are called Qualcomms, but that is just a brand name. They are satellite links and mini computers all in one. These computers can do many things, they help the driver plot the shortest route to a delivery, track his fuel consumption, and most importantly his time records. Personal Goals :: essays research papers My background in technology is not as deep as most people, but I do have some. My first experience with computer technology was when I was in eighth grade and the Atari VCS came out. My sister and I begged our parents for one for what seemed like eternity. Finally, that Christmas, there it was under the tree. After that, I remember computer class in school. Later when I joined the military, I had a small experience with a word processor, when I worked with the Staff Chaplain. After I separated from the military, I got a job at McDonalds as a manager and had to frequently use a computer for numerous tasks, reports, and so forth, and that was my first experience with it in the workplace. Later on I became a truck driver and thought I would not use it very much, but little did I know. The transportation industry is full of technology, from dispatch and the main office, to the trucks themselves. Dispatch is using computers to take orders track them and dispatch them. When a customer calls in and places an order or asks for a pick-up, the first thing a dispatcher does is input the information into a database and finds out if this customer has worked with them before. After they have determined either this they are entering this customer into the database, or they are entering a new program. This new program is how they enter the order into a new database. There are many different programs but they all do the same thing. They track the customers order form where it is originating from to the final destination and every stop in between, they track the mileage and fuel consumption on the individual truck and even how much down time the driver is taking. This program is lin ked to the individual truck, where the driver is in charge of upkeep. On the drivers end he/she is sending messages to dispatch telling them everything they need to know. Such as I am empty, where do I need to go, from I am broke down send help. These devices are called Qualcomms, but that is just a brand name. They are satellite links and mini computers all in one. These computers can do many things, they help the driver plot the shortest route to a delivery, track his fuel consumption, and most importantly his time records.

Saturday, August 17, 2019

The Usage Of A Bandgap Reference Voltage Engineering Essay

A bandgap mention electromotive force is an indispensable constituent of an parallel to digital converter.It is frequently used to provide a mention electromotive force which is compared with others voltages.The bandgap mention used in diverse applications is based on the thought of Hilbiler in 1964 [ 1 ] aˆ‚A bandgap mention electromotive force with low sensitiveness to temperature and supply electromotive force is normally required in parallel or digital circuits. Low electromotive force and low power are two of import design standards in both parallel and digital systems.It been expected that the whole electronics system will be operated down to a individual 1-V supply in near future.The bandgap mention ( BGR ) generators which can be operated under 1-V supply have been widely used in DRAM, falsh memories, analog-digital convertor ( ADC ) and assorted parallel devices.So far many techniques have been proposed to develop electromotive force or current mentions, which can be about independent to temperature and power supply voltage.The bandgap mention is the major design to supply a preciseness electromotive force mention with low sensitiveness to the temperature and the power supply.when CMOS engineerings enter the nano-scale epoch, The demand for battery operated portable equipments will increase.the supply electromotive force has been scaled down from 1.8V ( in 0.18 µm engineering ) to 1.2V ( in 0.13 µm engineering ) , and will drop to merely 0.9V in the following coevals engineering [ 2 ] .In CMOS engineering, the parasitic perpendicular bipolar junction ( BJT ) had been normally used to implement P-N junction of the bandgap reference.But the traditional CMOS bandgap mention circuits did non work in sub 1-V supply voltage.the ground, that the minimal supply electromotive force can non be lower than 1V is constrained by two factors, which is the bandgap electromotive force of around 1.25V in Si, which is exceeds 1V supply.The others factor is the low-tension design of the relative to absolute temperature current coevals cringle is limited by input common-mode electromotive force of the amplifier.These two limitions can be solved by utilizing the resistive subdivision methods, low threshold electromotive force ( or indigen ) device, BiCMOS procedure or DTMOS device.However, those attacks frequently require specialised procedure and word picture which addition fiction cost and procedure stairss. Reference electromotive force generators are required to be stabilized over procedure, electromotive force and temperature fluctuations and besides implemented without alteration of fiction process.The bandgap mention ( BGR ) is one of the most popular mention electromotive force generators that successfully achieve the requirements.regarding the generators, the demand for the low power and low electromotive force operation is strongly increasing the spread of the battery-operated portable applications.A bandgap mention electromotive force is an indispensable constituent of an analog-to-digital converterIt is frequently used to provide a mention electromotive force which is compared with others voltage. A bandgap mention electromotive force with low sensitiveness to temperature and supply electromotive force is normally required in parallel or digital circuits.there are several methods to recognize a temperature independent voltage.the base emitter junction used as a nucleus constitu ent of the bandgap mention is the most popular approach.the general bandgap mention electromotive force mention electromotive force is described by a additive combination of base-emitter electromotive force. Bandgap mention circuit is widely used to supply stable current and electromotive force mentions in parallel circuits every bit good as in assorted signal CMOS circuits.A stable mention circuit should be robust against temperature, power supply and procedure variations.Sub-1-V mention coevals has got importance due to scaling ensuing in shrinking of MOS dimensions and decrease of power supply to minimise power ingestion. owing to follow Moore ‘s Law, it has become needfully of import to diminish the power in the chip.This puts the restraint on the power dissipation of mention generators.the design of this bandgap besides see for low power operation..In traditional BGR circuit, bipolar transistors and one or more resistances are used.BJTs that are used in BGR are in parasitic signifier in CMOS.resistor occupy big country on the bit and hence addition the cost.on bit tolerance of resistances vary from 20 % to 30 % .So, we have to replaced these constituents with MOS transistors t o better public presentation of BGR and to salvage bit area.The combination of different runing parts like subthreshold, additive and impregnation of MOS suppresses the temperature dependance of electromotive force mention.Aims:To set up a dc electromotive force or current that is independent of the supply and procedure and has a chiseled behaviour with temperature. To plan the BGR that independently to temperature and low noise and low electromotive force To plan bandgap mention that can be successfully operated with sub 1-V supply in standard 0.35 CMOS procedure without particular procedure engineering.Problem statementWhen CMOS technologies enter the nano-scales epoch, the demand for battery-operated portable equipments will increase.The supply electromotive force has been scaled down from 1.8V ( in 0.18 m engineering ) to 1.2V ( in 0.13 engineering ) and will drop to merely 0.9V in the following engineering [ 2 ] .in CMOS engineering, the parasitic perpendicular bipolar junction transistor ( BJT ) had been used to implement the high preciseness bandgap electromotive force references.However, the convential BGR generates a 1.25V mention voltage.Its fixed end product electromotive force limited the supply electromotive force and non suited for sub 1-V supply volateg operation.The ground why the conventional CMOS bandgap mention did non work in close 1-V supply voltage.One is that the bandgap end product electromotive force is about 1 .25V [ 3 ] , which exceeds 1-V supply.The others is that the low temperature electromotive force design of the relative to absolute temperature current coevals cringle is limited by the input common-mode electromotive force of the amplifier.These two restrictions can be solved by utilizing the resistive subdivision method [ 4 ] , low threshold electromotive force device [ 5 ] , BiCMOS procedure or DTMOST [ 6 ] . But, those attacks frequently require specialised procedure and word picture which can increase fiction cost and procedure step.However, the bandgap mention working in low supply electromotive force has a higher temperature coeeficient than that of traditional bandgap reference.This resulted in the development of new temperature compensated techniques such as quadratic temperature compensation [ 7 ] , exponential temperature compensation [ 8 ] , piecewise additive curvature rectification [ 9 ] and resistance temperature compensation [ 10 ] .To implement these advanced mathem atical maps with high truth, the development of the low electromotive force bandgap construction requires precision matching of current mirrors or a pre-regulated supply electromotive force, cascade current mirror [ 11 ] , and pre-regulated circuit are good methods to work out this problem.but the minimal supply electromotive force is tradeoff.Scope of work:A typical CMOS execution of a bandgap mention is shown in Fig. 1. The end product mention electromotive force VREF of the traditional bandgap mention circuit can be written as: Equation 1 trad bgr.bmp Figure 1: Traditional/conventional BGR circuit in CMOS engineering where A1 and A2 is the emitter countries of Q1 and Q2, and VT is thermic electromotive force. The 2nd term in ( 1 ) is relative to the absolute temperature ( PTAT ) , which is used to call off the negative temperature coefficient of VEB. Hence, if a proper ration of resistances is kept, an end product electromotive force with lowsensitivity to the temperature can be obtained. In general, the VREF is about 1.25 V, so that the conventional bandgap mention circuit can non be used in low electromotive force application, such as 1 V. Mention electromotive forces and/or currents with small dependance to temperature turn out utile in many parallel circuits. As many procedure parametric quantities vary with temperature, if a mention is temperature-independent, it is normally processindependent every bit good. If two measures with opposite temperature coefficient are added with proper weighting, the attendant measure theoretically exhibits zero temperature coefficient. The construct of the new proposed bandgap mention is that the two electromotive forces ( which are relative to VEB and VT ) are generated by merely one feedback cringle. The two-stage operational amplifier with p-channel input is used in thisnew proposed bandgap mention. The new proposed bandgap mention is shown in Fig. 2, which uses the resistive subdivision R1a, R1b, R2a and R2b to cut down the input common-mode electromotive force of the amplifier.The dimensions of PMOS devices M1 and M2 are the same.The opposition of R1a and R2a is the same, and th e resistanceof R1b and R2b is the same. Following the KCL at the nodesof V1 and V2 in Fig. 2, the mention electromotive force can be expressed as New Picture.bmp Equation 2 Where and.According to equation below: ) /R4 We can expressed equation 2.The point of Vref-conv is indistinguishable to the conventional mention electromotive force in equation ( 1 ) .In order to accomplish sub 1-V operation, the ratio of R1b/ ( R1a+R1b ) is used to scale down the mention electromotive force level.Therefore, the minimal supply electromotive force of the new proposed BGR can be efficaciously reduced to merely. The new proposed BGR mentions can operated under bomber 1V.The whole complete circuit to recognize the proposed bomber 1V BGR is shown below: New Picture ( 1 ) .bmp Figure 2: Complete circuit for new proposed Sub1V So, from the comparing above, I can clearly cognize what I will make on my ain undertaking, what my range of work.From this, i ‘ll go on the new proposed BGR design that already done but I will seek to minimise the supply electromotive force, temperature independent and noise consequence as possible so the BGR will successfully operated in sub 1-V.

Charles Dickens’ “A Tale of Two Cities” Essay

Charles Dickens’ novel, A Tale of Two Cites, is a very rich text. The characters, plot, and writing style are all complex and multifaceted. However, one of the least studied and important part of this novel is the chapter titles and even the proposed novel titles. These titles reveal and expose more about the text, like symbolism and irony that would have otherwise been missed. Dickens’ chapter and proposed novel titles are instrumental in revealing symbolism and irony in the book. Dickens’ chapter titles reveal underlying symbolism in the novel. One of most symbolic of all the chapter titles is that of Book II, chapter five: â€Å"The Jackal.† The â€Å"jackal† is the nickname given to Sydney Carton, and it holds a great symbolic meaning. The jackal is a loner, a scavenger, a low-life in the hierarchy. Yet, the jackal is an incredibly adept at what it does; it is an excellent scavenger and hunter. Carton fits the chapter title perfectly. When we first see Carton, he is in the courtroom staring idly at the ceiling. He is unattached, just as he is later unattached from the Revolution and the rift between the Manettes and the Defarges, his manner in court is said to be â€Å"so careless as to be almost insolent.† Carton is continually a man set apart, just like the lonesome jackal. Carton, it must be noted, is one of the only main characters to not have a connection with the Revolution in some way. The ‘jackal’ and chapter title are a direct double of the ‘lion’, or Mr. Stryver. Stryver, though he lacks â€Å"that faculty of extracting the essence from a heap of statements†, is a highly successful man. Dickens notes that â€Å"easy and strong custom† is what prevents the â€Å"thought of emerging from the state of the lion’s jackal.† A second chapter title that exhibits symbolism is that of Book II, chapter fifteen: â€Å"Knitting.† In a literal sense, Madam Defarge knits a registry of those  marked to be killed in the revolution. When one of the Jacques questions the registry of stitches, M. Defarge assures him that â€Å"it will always be as plain to her as the sun.† At this point in the novel, it is clear that Madame Defarge possesses an anger and fury that knows no boundary. The knitting symbolizes the Defarge’s and the entirety of the Revolution’s hatred of aristocracy. Dickens tells the reader that the â€Å"fingers of the knitting women were vicious.† Additionally, we are also told that â€Å"if the bony fingers had been still, the stomachs would have more famine-pinched.† Thus, Dickens turns a casual and seemingly harmless pastime into a sinister and menacing symbol of hatred. Dickens turns this chapter title into a recurring symbol in Book III, chapter fourteen: â€Å"The Knitting Done,† in which Darnay is waiting to die, and Madame Defarge herself is killed by Mrs. Pross, bringing an end to her knitting. A third and final symbolic chapter title is that of Book III, chapter three: â€Å"The Shadow.† The symbol presented by this chapter title is somewhat similar to the ‘knitting’ symbol. However, while ‘knitting’ represent the hatred of French aristocracy, the ‘shadow’ represents the power that Madame Defarge and the revolution wield. When, Madame Defarge visits Lucie, the shadow she casts upon her and her child is said to be â€Å"so threatening and dark† that Lucie â€Å"instinctively kneeled on the ground beside her, and held her to her breast.† For Dickens, the shadow is the fierceness and the inescapable momentum that the revolution has. Hence, Madame Defarge, in the same chapter, mocks Lucie by asking if â€Å"the trouble of one wife and mother would be much to us now?† Dickens’ chapter titles exude symbolism. Dickens’ chapter titles are also very ironic. In Book II, chapter four: â€Å"Congratulatory,† Darnay has just won his treason case. Doctor Manatte, Lucie, Lorry, and Stryver all congratulate Darnay on the successful trial. After the group disperses, Carton invites Darnay, his look-alike, for a drink at the bar. At the bar, Carton asks Darnay if Darnay thinks that Carton likes him. When Darnay is unsure, Carton tells him: â€Å"I don’t think I do.† It is ironic that the title of the chapter is â€Å"Congratulatory†, yet Carton spends a large part of the chapter expelling the reasons why he doesn’t like Darnay, revealing Dicken’s ironic humor. In Book II, chapter twelve: â€Å"The Fellow of No Delicacy,† Stryver tries to win Lucie’s hand in  marriage. This chapter is ironic because Stryver has no delicacy at all, contrary to what the chapter title might have you thinking. The chapter reveals that Stryver is arrogant and dimwitted. Stryver decides to marry to place a â€Å"magnanimous bestowal of good fortune† upon Lucie, revealing his arrogant ways. Later, Stryver, speaking to Lorry, says â€Å"the young lady at present in question is a mincing fool,† insulting Lucie. Simply put, Stryver has no delicacy at all, illuminating Dickens’ tongue in cheek humor. A third and final chapter title that exhibits irony is the Book II, chapter 14: â€Å"The Honest Tradesman.† This chapter centers on Jerry Cruncher and his activities as a self-labeled â€Å"Resurrection Man.† Obviously, the irony is between the â€Å"honest tradesman† and Jerry’s midnight excursions in which he digs up buried bodies. Dickens’ chapter titles disclose a very ironic and satirical humor. While Dickens’ chapter titles are very appealing to examine, his proposed titles for the novel are very interesting to study, as well. One such title was â€Å"Buried Alive.† This proposed title definitely carries symbolic value. Buried alive, or solitary confinement, is certainly one of the major themes in the novel. Dr. Manett spends eighteen years in solitary confinement, and Darnay spends four years imprisoned in the Bastille, too. Dickens gives a frightening account of being buried alive. As the Defarges enter the Bastille, the tumult comes to them â€Å"in a dull, subdued way,† the sky could only â€Å"by stooping low and looking up.† Perhaps Dickens’ near obsession with imprisonment could be due to the child labor he faced as he grew up, working in various factories to try to repay his father’s debt. A second proposed title was â€Å"Memory Carton.† Memory plays a fascinating and symbolic role in this novel. When Dr. Manette learns Darnay’s true name, the memory sends him into shock once again. Reflecting on his nine-day, shoemaking fit: the doctor says, â€Å"Remembrance that was the first cause of the malady. Some intense associations of a most distressing nature were vividly recalled, I think.† Later on in the novel, memory plays a big role in Carton. The memory of his love for Lucie, his promise to â€Å"give my life to keep a life you love beside you,† causes him to make the ultimate sacrifice. Dickens’ proposed novel titles reveal are very symbolic. Dickens’ chapter titles and proposed novel titles reveal many underlying parts of the novel. Both symbolism and ironic humor are concealed within his clever and witty titles. Dickens’ tongue in cheek humor might have derived from all the hardships that he faced in life, from the child labor to the divorces and family issues. Either way, he is a fascinating author, and A Tale of Two Cities is a great piece of literature. Works Consulted: Dickens, Charles. A Tale of Two Cities. Edited and with an introduction and notes by Richard Maxwell. London: Penguin Classics (2003) ISBN 978-0-141-43960-0 Orwell, George. â€Å"Charles Dickens†. In A Collection of Essays. New York: Harcourt Brace Jovanovich (1946) ISBN 0-15-618600-4

Friday, August 16, 2019

Comparing Ancient and Classical Art Essay

Ancient and classical art comes in all different shapes and sizes of visual experience. In this paper we explore into the making and design of two unique architectural buildings, Stonehenge and The Great Stupa at Sanchi. These two fascinating buildings were built in different eras from BCE to CE and yet have many similarities, and as well carry distinct differences between the cultural values and the purpose they were intended. This paper will also focus on the area’s region and the functions these two artifacts carry in our culture in the present day. The Stonehenge is located in Wiltshire, England. The Stonehenge is made up of many different size stones. The heal stone alone is 16ft tall, weighing 35 tons. When the sun sets, this stone casts a shadow towards the main circle of stones. There are two smaller stones known as the â€Å"Avenue†, which are lined up and these also cast a shadow in the direction of the circle. There are 2 stones that follow the â€Å"Avenue†, that stand next to each other, almost like an entrance to the outer circle of stones. The two stones are known as the â€Å"slaughter stone†. The slaughter stones were believed to be a place of human sacrifice. The main circle of stones are known as â€Å"The Sarsen Circle†. These stones are set in a circle and supported by tenon joints. The circles of stones are also circled by the outer bank, which is a 330ft in diameter and is the oldest construction in the area. In the middle of the circle consists of five trilithons. These stand 22ft above ground and are 8ft below ground level. The weight of these stones is 50 tons. In the inner circle is also the â€Å"Altar Stone†, this is made of smooth, green sand stone, which is known as one of the most recognizable stones at Stonehenge. The main circle of stones, have smaller stones inside, which also form an inner circle and these are known as â€Å"Bluestone Circle†. The Stonehenge was believe to be built in 2750-1500 BCE. The stupa sits on a hilltop in central India. The stupa consists of four gateways and each gateway has decorations that tell a story in regards to the life of Buddha. The shape of the stupa is dome shaped and is surrounded by a fence to limit distractions during the meditation period. The dome has an upper and lower pathway. The lower path represents the path of life and the upper representing enlightenment. The top of the dome has an umbrella, which is a tower of three discs, smaller at the top and bigger at the bottom. All three discs represent something different, from top to bottom, Buddha, his teachings and the community of Buddhist. The Stupa was built over 400 years, but most of its completion was in 15CE. The Stonehenge World Heritage spans ten miles around the famous site of Stonehenge. The region is also known as the Salisbury Plains as the location is grassy and flat. This Neolithic artwork in the United Kingdom is a famous destination for many individuals around the world. Unlike the region in which Stonehenge is located, the Great Stupa at Sanchi rests upon a hilltop in central India. Sanchi, which stands for small village is located in the Raisen district of the Madhya Pradesh (â€Å"Sanchi City Travel Guide†, n.d.). The surroundings of the Stupa is calm and restful and it is surrounded by hills, trees, and other types of vegetation. Many individuals still visit this religious site along with other temples and stupas located in this region. Scientists believe that it took over 600 individuals to create the famous Stonehenge monuments. This was because some of the rocks weighted some 50 tons. Great teamwork by the Neolithic people of Britain is attributed to the creation of Stonehenge. The great emperor Ashoka of Maurya is the creator of the Great Stupa at Sanchi although this site was rediscovered in 1818 by a British officer. It was then that the site was reconstructed to the condition that is in today. It is believed that that Ashoka created this and many other stupa in the area to divide relics of Buddha after his passing (â€Å"Stupa†, 2013). Their designs are circular, which is the first thing that viewers notice. With the huge stones used to build the Stonehenge and the complexity of The Great  Stupa at Sanchi, it definitely would have taken teamwork to get the jobs done. As the Closer Look states, â€Å"The stupa was built over a period of 400 years† (Closer look n.d.) and the Stonehenge took hundreds of people’s cooperation to build. These many groups of people probably valued socialism and teamwork in their cultures. With their hard work they completed something bigger than themselves which probably made the activity that more valua ble and special. The Closer look suggests that the Stonehenge was a burial ground due to the discoveries of human remains. According to Mike Parker-Pearson, â€Å"Villagers would have transported their dead down an avenue leading to the River Avon, then journeyed downstream, in a ritual symbolizing the passage to the afterlife, finally arriving at an avenue leading up to Stonehenge from the river.† (Closer Look n.d.) As for The Great Stupa at Sanchi, it represented Buddha’s life and was also a place for meditation. The Stonehenge and The Great Stupa at Sanchi have one obvious similarity; they both are made of stone and they took many of years to complete. These two works of art are very different from one another. The Stonehenge purpose is unknown still to this day. There are guesses and assumptions but there is no known fact about what it was used for. The Great Stupa at Sanchi was used for meditation purposes and where pilgrims would try to achieve harmony with Buddha and his life pat h. The Stonehenge was seen a great place to socialize but on the other hand, The Great Stupa at Sanchi was used by people to be peaceful, quiet, and calm. This great place is a relic of Buddha, and is used to worship him, as well as other Buddhist Gods. These two historical places, architecture could not be any more different. The Stonehenge is made of many separate stone setups that make up a circle and The Great Stupa at Sanchi is a dome shape to represent the earth. These two works of art, Great Stupa at Sanchi and the Stonehenge, both still have a function in today’s culture. They both are not physically used by everyone like they once were, but people are still able to see them in person. They are now tourist attractions which help others understand what they are, how they were, utilized, and more about each culture in that era. In conclusion, when we compare the architectural values and the visual description of each artwork, we find that they both hold a special meaning to the time and era of its  making. It can range from religious interpretation to the never ending mysteries that these attractions hold. It is all in the eye of the beholder. Whatever their original designs were meant for, whether it is human sacrifice or to leave a piece of art that would last through the ages, it is undoubtedly part of the power that ancient and classical art hold. So knowing the designer, the builders, and geographic locations of these pieces all play a part in their signature, it still leaves the world debating on whether it is even human design or that of a much more advanced race. References Closer look. (n.d.). Retrieved from http://closerlook.pearsoncmg.com/view.php?type=closerlook&id=653# Sanchi City Travel Guide. (n.d.). Retrieved from http://www.hoparoundindia.com/madhya- pradesh/city-guides/sanchi.aspx Stupa. (2013). Retrieved from http://www.ancient.eu/stupa/ University of Phoenix.(2010). A World of Art, Ch.17. Retrieved from University of Phoenix, ARTS230 website.

Thursday, August 15, 2019

Experiment Essay

The primary focus of experiment 4 was to teach a student the basic solubility rules of salts in aqueous solutions. After developing and using a scheme for the qualitative analysis of three cations in an aqueous mixture, a student would use a centrifuge to identify, precipitate, and separate the three ions in the mixture. After becoming familiar with all three cations, the student would use the scheme again to identify at least two of the cations in an unknown solution. In order to begin the separation process, HCl is added to the mixture of cations to form the precipitates and separate the chlorides of Ag+, Pb2+, and HG22+. It is important not to add too much HCl because an excess would form the soluble complexes of AgCl and PbCl2. After the HCl is added, it is centrifuged to form a solid precipitate that contains all three cations and separate them from the supernatant liquid. Finally, another drop of HCl is added to test for completeness of precipitation and centrifuged again if the solution remains incomplete. To separate the lead (II) ion from the sample of solution, it must be separated from the insoluble Hg2Cl2 and AgCL salts by dissolving it in hot water. Once it has been dissolved from the other two cations, it is centrifuged and the liquid is decanted into another test tube. Once in the other test tube, a drop of 6.0 M acetic acid and two drops of 1.0 M K2CrO4 is added to the saved liquid. If the lead (II) cation is present, a yellow precipitate forms and ensures the presence of that cation. When testing my unknown solution, the lead (II) ion was not present in my solution. To further separate the cations, 1.0 mL of 6 M NH3 is added to the saved precipitate. After adding the ammonia, the mixture is centrifuged and the liquid is once again decanted into another test tube. If a gray or black precipitate forms, this proves the presence of Hg22+. The mercury (I) ion was present in my unknown. Finally, separating the silver ions from the sample solution mixture is accomplished in the prior step when the mercury ion is centrifuged. In order to test for the presence of silver ions, 1 mL of 6M HNO3 is added to the solution from the prior step. The silver precipitates in this acidic solution. If a white precipitate appears, silver is present in the solution. The presence of a white precipitate in the solution proves that there were silver ions in my unknown. By following the scheme for the qualitative analysis, it was simple to separate and test for the presence of the target cations. It was critical to correctly label every one of the liquids to ensure the correct reactions. No other difficulties prevented success in the experiment, but performing the experiment several times would further reinforce the outcome of the experiment.

Wednesday, August 14, 2019

Causes and Effects of Cancer

In the human body, cells are constantly going through the cell cycle. An Important step of the cell cycle Is called mitosis, In which the cell (referred to as the parent cell) undergoes a series of steps that lead to the formation of two daughter cells. This process only occurs In somatic cells, which are any nongamete cells. Gametes are haploid (containing only half of a full chromosome set, 23 chromosomes vs. a diploid's 46) cells in the form of sperm (males) or ovum (females).Some areas of the body undergo very little mitotic division at all, such as muscles and nervous tissue. Other areas undergo mitotic division in response to a growth factor, which is a signal to cells of a specific area to begin mitosis. This growth factor is released into the extracellular fluid in certain portions of the body in response to four basic stimuli: growth, repair, asexual reproduction, and regeneration. In humans, growth and repair are the prevalent stimuli. Growth dictates the maturation of an o rganism during a specific period of time†known as puberty in humans.Repair, on the other and, occurs when an organism sustains an injury such as a laceration, in which mitotic division occurs to create a blood clot to seal the wound, and epithelial cells undergo the process as well to recreate the skin cells that were destroyed. To control the rate ot mitotic cell division, the body uses growth signals and antigrowth signals. cancerous cells are those that Ignore antgrowth signals, and can continue to replicate without growth factors. After a certain amount of rnltotlc dlvlslons, the telomeres In cells shorten until there Is none, and programmed apoptosis†cell death †occurs.Cancer cells elongate their telomeres, and so can also replicate almost indefinitely. When these cells start to build up, they form a mass called a tumor. Tumors can either be benign or malignant. Benign tumors on the skin have hair growth and clean edges, whereas malignant tumors do not and are cancerous. The condition can worsen if any cells from a malignant tumor detach and travel to other parts of the body through the circulatory or lymphatic systems. The tumor will then begin growing in the location where the cell ends up. nd can be fatal In certain organs like the liver or the brain, What makes these cells especially dangerous is ngiogenesis, in which the blood vessels near a tumor grow to increase the blood supply to that area, providing necessary nutrients and oxygen to the cancerous cells and depriving nearby healthy cells. Cancerous cells also divide more frequently because the length of time a cell spends in Interphase†the â€Å"inactive† phase†is shortened. This becomes even more dangerous when considering that less time is spent on replicating the DNA so the daughter cells are more likely to have chromosomal disorders. 3.The article presents new evidence and viewpoints regarding the formauon of malignant tumors and cells. At first, In the 90 s, It was elieved that cancer was â€Å"the result of cumulative mutations that alter specific locations In a cell's DNA and thus change the particular proteins encoded by cancer- related genes at those spots. † Of course It Is already clear that certain substances, such as tobacco, asbestos, and UV radiation, are common cancer-causers (carcinogens). wnat Is Delng aeoatea, nowever, Is wnat erect tnese suostances nave on cells that cause malignancy in the first place†or†What makes these substances carcinogens?In regards to the DNA mutation theory, evidence stemmed from observations of tumor suppressors and oncogenes. These two genes inhibit a cells' ability to divide, and stimulate growth respectively. DNA mutations would either disable tumor suppressors, or â€Å"permanently lock oncogenes into an active state. † While still supported by a few in the field, disagree. â€Å"No one questions that cancer is ultimately a disease of the DNA. † There are, however, a substantial amount of other factors that have been observed to vary between normal and cancerous genes.Opponents of the dogma feel that â€Å"Cancer is a consequence of a chaotic process, a combination of Murphys Law and Darwin's law; anything that can go wrong will, and n a competitive environment, the best adapted survive and prosper. † Age is a significant risk factor for cancer, as it is for most diseases. The older you are, the more likely you are to be diagnosed with cancer. On hypothesis that differs from the cumulative-mutations theory says that there are five or six regulation systems that need to be affected in order for a cell to be malignant.These six â€Å"special abilities† are: growth in the absence of growth signals, continued growth despite anti-growth signals, evasions apoptosis, ability to coopt blood vessels to branch off towards the mass, near-indefinite replications, and metastasis. Of the six, it is metastasis that provides the most di fficult aspect to counteract, as different drugs and treatment methods have to be utilized based on the region in which cancer is preset. For instance, chemotherapy is not very effective for bone cancer.Very few cells in a tumor have the ability to metastasize, however, once detected it is usually too late. â€Å"The prominent paradigm for 25 years has been that tumors grow in spurts of mutation and expansion. † Mutations affect genetic material in such a way that usual regulatory proteins are unable to be synthesized properly, or at all. Once mutated, cells then expand and replicate much faster than normal cells (explained in the background section). It is, however, much easier to permanently activate an oncogene than it is to suppress the tumor alleles (one mutation rather than two).It is, however, now believed that cancer is not Just caused from mutations to a few specific genes. If â€Å"Just a small fraction of the cells in a tumor are responsible for its growth and met astasis,† the â€Å"cure† for cancer is much more easily attainable. Seeing as mitosis produces two genetically identical daughter cells, DNA mutations present in the arent cells should also be observable in both daughter cells. Most tumors are not actually masses of identical clones; instead, there is an â€Å"amazing genetic diversity among their cells. While there are some commonly-mutated genes from cancer cell to cancer cell (like p53), â€Å"most other cancer genes are changed in only a small fraction of cancer types†¦ † Aneuploidy is a term describing abnormalities in chromosomes. â€Å"If you look at most solid tumors in adults, it looks like someone set Offa bomb in the nucleus†¦ there are big pieces of chromosomes hooked together and duplications or osses of whole chromosomes. † The issue though, is that most cancer cells's genomes are unstable as wells as aneuploid, and so the new introduced problem is whether mutations or aneuploidy occurs first in a cancerous cell.One of the three plausible answers is the modified dogma. This states that some external or internal factor disables the genes needed for synthesizing and repairing DNA, resulting in an ty to correct mutatlons tnat occur. Anotner optlon Is â€Å"early InstaDlllty,† statlng that there are specific master genes required for a cell to divide, and these are silenced. Thus, when chromosomes replicate and mistakes occur, the daughter cells fail to get the correct number of type of chromosomes. As replication continues, so do the â€Å"results† worsen.The last theory is the â€Å"all-aneuploidy' theory, in which a cellular division error produced aneuploid daughter cells that have varying amounts of different genes. The specific genes that code for enzymes which correct DNA mutations are unable to be synthesized, and thus the DNA begins to fail and kill the aneuploid cells with it. 4. While on the longer side of the spectrum, Gibbs' article i s well-written, detailed, and incredibly informative. Above all, the article is also relevant†both to our current unit in AP Biology, and in the medical field.The article is about ten years old at this point, however, much, if not all, of the information described and provided is still highly accurate and in question today. While there have been numerous developments in the biotechnology fields specializing in treatment and detection of cancer, not many advancements have taken place in regards to identifying the reasons why certain substances are carcinogenic. Mitosis and meiosis are subjects that go hand in hand with cancer, as it is literally an ncontrolled amount of mitotic division, making the article easy to relate too.New terms such as oncogenes and tumor suppressors are well explained, and numerous links to previous material (such as protein synthesis and chromosomal disorders) can be made by any knowledgeable AP Biology student. Comprehension was not an issue whatsoeve r, and the article was wonderfully written as well as fascinating. That said, I would highly recommend the article to anyone†AP Biology student or otherwise, as it is informative in layman's terms, as well as important in modern society.

Tuesday, August 13, 2019

Conflict Identification and Resolution Essay Example | Topics and Well Written Essays - 1000 words

Conflict Identification and Resolution - Essay Example The clinic has been sold to a new owner who decided to improve business efficiency and to increase sales. The newly appointed CEO has set the sales targets for the company and informed about these targets two categories of employees: sales and marketing department and doctors. Both sales department and doctors were expected to achieve the new sales targets, while doctors had to sell themselves, and marketers had to sell the clinic’s products and visits to doctors. The crux of the conflict was in an increasing confrontation between the sales department and doctors. On the one hand, doctors were blaming sales and marketing (S&M) department that they do not cope with their work as their work is to sell. On the other hand, marketing and sales department believed that doctors should be actively involved in sales process, as they were people who had direct access to the patients and the power of word of mouth was a good practice in healthcare sector. On the weekly meetings held by t he CEO and devoted to discussions and analysis of the sales progress the conflict between two parties (doctors and S&M) has been growing in result of mutual accusations and insults. It is also important to take into consideration the specific tough character of majority of doctors who often are tough people in result of the nature of their work. Doctors are special category of employees as they are used to make serious decisions quickly in order to save human live. Therefore, they don’t like when management or other employees do not make efficient decisions. The conflict described above is the intergroup conflict between S&M department and clinical department (doctors) (Deutsch & Coleman 2000). The major source of the conflict is obvious – lack of proper communication between different departments. Effective communication is especially critical during quite a challenging time of changes (new owner and newly appointed CEO) in

Monday, August 12, 2019

Oil Exploration And Development Essay Example | Topics and Well Written Essays - 2000 words

Oil Exploration And Development - Essay Example Political, legal and economic conditions need to be researched in depth before deciding whether or not to join forces with the oil industry. Ruritania, considered a developing country, has been under the same dictatorship for over thirty years and their internal political asylum is very stable. However, neighboring countries that have Ruritania land-locked from large bodies of water, are not so predictable. Known as ‘the axis of evil’ by several peaceful governments, Urbania and Translavia border both sides of Ruritania, blocking export opportunities for the inland country. Creative negotiations will have to take place with one or both of these countries in order to work out land rights if a pipeline were considered. Intense study of oil exploration is a first step in realizing the right conditions for an oil trap. The right source rock and reservoir rock entrapment can only be done by an experienced team of geologists. The project/asset lifecycle that normally includes Field Development Planning, Conceptual/Feasibility, FEED, Detailed Design, Procurement, Construction Support and Commissioning can run into the tens or hundreds of billions of Dollars. Actual costs depend on such factors as the location of possible oil reserves, how large the oil field is expected to be, how detailed the exploration information must be and the type and structure of the rock below the ground.