Wednesday, July 31, 2019

Human Relations Approach to Technology Essay

Organizational communication technology is seen as a tool that can free workers from mundane tasks and allow them to engage in activities that satisfy higher- order needs. Emphasis is placed on technological impacts on worker attitudes. (1) This approach has helped people learn to be more of a multitasker. This approach also helps people be able to have more one on one time with people face to face because it frees them up more so than they were once able to do. This approach also changes the world. Another side to this is that technology has done more and faster production than humans can. Technology has taken over many people’s job. What used to be an assembly line of people working to put metal together for chairs or anything else has become a one person job making sure that the robots had put the metal together like it was supposed to be. There is a plant in Hopkinsville, KY that mig welds and repairs parts and pieces of appliances. With this plant there are people only getting hired who has welding experience so that they can check what the machines do, when the machines mess up it is up to that person to fix it. The people working there are always getting laid off due to them over hiring at times. They don’t need as many people as they once did because they have technology and it has stepped up and taken over the jobs of those people who got laid off. In the medical field, there are advancements being made every day. There are always creations of different instruments like the robot advancement that allows the doctor to be able to see better and more precise cuts and less people who need to be in the person’s body at one time. Now there isn’t a whole table of nurses and doctors working there is only one nurse and a doctor who is controlling the robot. The nurse is who puts the instruments in the robot and the doctor moves the robot. Yes this robot is great with being more precise but it is also cutting more people out of their jobs. These medical advancements are being made to make things faster, easier, and more reliable than some older doctor whose hands shake from time to time. There is also the computers advancement that is being made every day. With this computer advancement it is giving me the opportunity to stay at home and work. I get to use the internet to do my job and anything else that I need to do than I simply use my phone. With out all of the advancements that are being made with technology in computers than I would not be able to do this job from home. The only form of human relations that will be from me in this job is the occasional times that I get on the camera and of course all of the times I talk to people on the phone. This does stop the face to face effect that was once a big role in life. Human relations approach to technology plays a major impact no matter which side you want to look at. It plays a role in both ways where it helps humans but it also hurts humans. I feel that to an older person looking at this would think that technology is taking away their livelihood because they are older and it is harder for them to find a different job. (2.) Somebody my age like me, I love the technology and how it plays out according to human relations. I feel that everyday I should learn something new so it doesn’t bother me if I don’t know how to do something. I feel that learning to use technology makes my life easier and faster. References (1.) Miller, K. (2012). Organizational communication: approaches and processes (6th ed.). Boston, MA: Wadsworth Cengage Learning. (2.) Subject. (n.d.). JSTOR: An Error Occurred Setting Your User Cookie. JSTOR: An Error Occurred Setting Your User Cookie. Retrieved February 19, 2013, from http://www.jstor.org/discover/10.2307/20023443?uid=2129&uid=2&uid=70&uid=4&sid=21101834177857

Tuesday, July 30, 2019

Fire Extinguisher Inspection and Accessibility

Fire Extinguisher Inspection and Accessibility BY crashers Fire Extinguisher Inspection and Accessibility: Class Project University of AXES Professor XX Fire Protection Proposal A critical aspect for a successful business is the ability to motivate employees to increase and maintain their productivity. One key element in accomplishing this is to provide a safe working environment by addressing and mitigating risks or hazards facing employees. Although, it is impossible to create a completely risk free work environment, there are certain risks that can be addressed effectively, particularly he risk of a fire in the workplace.The risk of workplace fire is a concern for any business and can be mitigated in many ways. This proposal will focus on a very effective and simple form of fire protection, fire extinguishers. The Occupational Safety and Health Administration (OSHA) governs the use, location, maintenance and training of portable fire extinguishers. This is accomplished through OSH A Standard 1910. 157, â€Å"Portable Fire Extinguishers†. A recent walk through of this building revealed a clear violation(s) of OSHA standards regarding fire extinguishers.This reports will bring to the attention of Executive Management the importance of fire protection, attempt to identify the exact safety concern, determine what OSHA standard governs this concern and develop a feasible solution to correct the issue. The solution will take into account both the physical and economical feasibility of correcting the issue, while maintaining focus on employee safety. Fire Protection: It is not an uncommon event to have a fire occur in the workplace. Fires can result in serious bodily injury, including burns and smoke inhalation.It can also lead to aerospace fatalities. According to OSHA, between 70,000 and 80,000 fires occur each year within the workplace in the United States (2013). Despite this number of workplace fires, fire and explosion only make up on average about thre e percent of the total workplace fatalities (BILLS, 2007). However, it can also cause enormous property damage and, depending on the type of business, can lead to serious environmental issues. It is also estimated that businesses suffered roughly 2 billion dollars worth of property damage each year from fires in the workplace (OSHA, 2013).Fire protection, to include fire extinguishers, can be utilized to mitigate these risks, resulting in the reduction of on the Job injuries, fatalities, the loss of property, environmentally concerns and the negative impact fire can have on a business's bottom line. There are many measures to combat fires in the workplace. One of the simplest and most effective measures in fire protection is the fire extinguisher. It can provide the means to extinguish small fires before they become larger and more destructive.It can also be used to protect and clear egress routes that may become locked by fire during an evacuation, providing a safe means of escape for all employees. Fire extinguishers, in the hands off trained employee, can offer an important weapon in combating fires in the workplace, creating a safer environment for all employees. However, in order for a fire extinguisher to be useful, it must be readily available, in proper working order and must be matched to the proper fuel classification for the workplace environment, which is mandated and enforced by OSHA.Violation: A walk through inspection was conducted of the building to include all five floors. On the third floor it was discovered that of the four fire extinguishers located on that floor, two out of four fire extinguishers were out of date by two months (see appendix A). Of the remaining two functional fire extinguishers, one of those was located in a locked storage room, on a shelf, behind a green plastic container (see appendix B). This is a clear violation of OSHA standard subpart Fire protection 1910. 157, Portable Fire Extinguishers, specifically the following sections: (c)(l).The employer shall provide portable fire extinguishers and shall mount, locate and identify them so that hey are readily accessible to employees without subjecting the employees to possible injury. (e)(l). The employer shall be responsible for the inspection, maintenance and testing of all portable fire extinguishers in the workplace. (e)(3). The employer shall assure that portable fire extinguishers are subjected to an annual maintenance check. Stored pressure extinguishers do not require an internal examination.The employer shall record the annual maintenance date and retain this record for one year after the last entry or the life of the shell, whichever is less. The record shall be available to the Assistant Secretary upon request (2014). As one can see, the company is in violation of the OSHA standards governing fire extinguishers, particularly the placement, maintenance and inspection. It should be noted that three out of the four fire extinguishers on the th ird floor were clearly marked and readily accessible to employees.They were strategically located and were appropriately matched to the fuel classification for each floor. The fire extinguishers on the remaining four floors were all in compliance with OSHA standards. It should be noted the fire extinguishers on the each floor were inspected annually at different times or months, which could be a contributing factor. This factor, along with another observation, should be analyzed in order to develop a feasible solution.Analysis: In order to resolve this safety hazard and find a feasible, yet effective solution, a couple of factors need to be considered. A direct and obvious factor relates to determining if the third floor poses a reduced perspicuity for fires. After careful review, there does not appear to be any evidence to support that fires occurring on he third floor are less or more likely to occur than on any other area of the building. There are no unusual activities occurring on the third that would warrant such a conclusion.After a review of the company's Hazard Communication Program, to include an inventory of chemicals for each floor and the Material Safety Data Sheets or Safety Data Sheets, the third floor does not house any different chemicals than the other four floors of the building. The number of employees occupying the third floor in a given workday is comparable to the remaining floors of the building. Therefore, he third floor warrants the same fire protection as the rest of the building, to include accessibility and maintenance of fire extinguishers.The inspection schedule for the building, as it relates to fire extinguishers, appears to be on different rotations. This leads to another interesting factor as to why the inspection dates for fire extinguishers on each floor of the building are during different months? After careful review of the company's Fire Protection, Occupational Safety, Health and Environmental Audits from 2002 to 2013, there appears to be no documented or social reasoning for having the fire extinguishers inspected on different dates.It does not reduce cost, time or effort on the part of the company. Research and inquiries could not determine an actual benefit to this practice. Therefore, it should be concluded that this practice should be revisited in order to find an effective solution. Solution: After careful research and analysis, it was determined the third floor of the building does not warrant any special attention or need elaborate measures to maintain the fire extinguishers. Therefore, the solutions to correct these violations re simple, straightforward and cost effective.They are as follows: a) Mount fourth fire extinguisher outside the storage room with proper markings, which will provide easy access to all employees. B) Ensure the annual inspection of all fire extinguishers in the building is conducted on the same date. C) Create a maintenance log and record the monthly maintenance che cks with either the log beginning or ending with the annual inspection. D) Incorporate maintenance and inspection checks into the annual fire protection training. E) Challenge employees to check the inspection date n the fire extinguishers by offering an incentive to whomever brings to the attention of management an issue.An example would be a privileged parking spot for a week or a free lunch for a day. All of the above are easy, cost effective suggestions to correct and prevent these issues from occurring in the future. Any one or a combination of these suggestions can be utilized to create a safer working environment for, not Just the third floor, but also the entire building. Conclusion: This proposal was designed to bring to the attention of executive management a rise of OSHA violation(s) concerning fire protection, particularly fire extinguishers, for the third floor.Even though the company has made a good faith effort to ensure the building is properly outfitted with several devices to alert and prevent workplace fires, it should not neglect the very basic concept of the fire extinguisher. It can be a vital, cost effective tool to prevent injury, loss of life, property damage, environmental issues and the interference or shut down of business due too workplace fire. It can prevent a small fire from becoming much larger and be used to aid in an evacuation f employees due to a workplace fire.The simple steps purposed will correct and ensure these violations do not occur in the future, ensuring a safer work environment for all.

Monday, July 29, 2019

Organisational Leadership and Change Essay Example | Topics and Well Written Essays - 1750 words

Organisational Leadership and Change - Essay Example The mission of the organization is to lead the industry, serve the people and make unique differences for the business partners. The organization became popular due to its innovative product and service differentiation (Honold, 1997, pp.22-24). However, recent financial crisis forced the organization to implement major restructuring and change process. They implemented reduction in-force strategy to overcome the impact of economic challenges. In the year 2009, the financial crisis affected the service business of Microsoft in Asia (Ang, 2012, pp.12-13). The organization terminated numerous employees like those associated as support staffs and consultants. Inadequate implementation of retrenchment theory and change management process developed several critical issues. These workplace conflicts reduced the image and reputation of the organization in global market place. This reduction-in-force strategy reduced the motivation level of the employees. This change management concept increa sed job insecurity of employees (Greenhalgh and Rosenblatt, 1984, p.8). However, after an open discussion, the organization tried to develop several sustainable strategies in order to maintain its brand image within the global market place. ... In 2009, the financial crisis occurred through all over the world. Due to of this financial crisis, many workers were laid off. The organization’s morale was all time low; even the general managers were also replaced. Employees were highly dissatisfied and de -motivated due to the strategies taken by the management. Organization takes retrenchment strategy when they have to reduce their cost. In this strategy, organizations reduce the overall size and diversity of the operations. The goal is to get a stable financial growth by cutting down the expenses. The organization follows a contraction of its activities by reducing one or more functions or eliminating the scope of business. For example, one company, as a part of retrenchment strategy, can focus only on a single segment of a business which gives it a higher revenue opportunity. For example a hospital can focus only on the special theatre and ignore the general theatre because the special theatre provides them better reven ue. During the retrenchment, the company follows change management strategies after a little discussion with the employees. It was the first time; the company reduced 20% of its workforce. The sudden workforce reduction of the company had a huge negative impact on the employees mind. The overall situation was very frustrated and uncertain. The employees were highly de-motivated that even after 6 months of the incident, the employees were talking about the workforce reduction. Significant drop was noticed in the workgroup health index (WHI). WHI is an index used to measure the employee engagement and leadership. The results of WHI indicated that Microsoft scored 76 points only and it was the record failure of the company. The company judged their leaders on the basis of

Sunday, July 28, 2019

English Essay Example | Topics and Well Written Essays - 1250 words - 1

English - Essay Example The conditions that shaped the plays of Sophocles shall also be looked into. These shall enable an exploration of the main concern of this paper, which is to examine the role of the agency of the tragic protagonists of these plays, Othello and Oedipus, in their own downfall. This shall include a reference to the ideas of free will and predetermination, a debate that had great political, intellectual and religious value during the Renaissance. How this contrasts with the pre-Christian world of Sophocles shall be looked into and these issues shall be incorporated into the main thesis of the paper. The paper shall thus, attempt a comparison of the two plays, Othello and Oedipus, by examining the social, cultural and political situations that shaped these plays. This paper shall thus, place both these plays in their contexts and try to analyze how the concept of tragedy as propounded by Aristotle undergoes a change in the intervening time-period. Othello and Oedipus: Agency and Fate Othe llo and Oedipus are two of the most famous characters in the history of tragedy. Timeless in their appeal, these two tragic heroes are as similar as they are different. In a sense, Othello represents the evolution of the tragic hero from a world-order that gave precedence to fate over the will of man, to one where he undergoes a fall as a result of his own actions. This signals a transition to a world-order where man is considered to be the supreme being, one where he is considered a being who is able to create his own destiny. Oedipus is considered to be the most perfect tragedy that has ever been written. In fact, it is by citing this play that Aristotle explains his theories regarding tragedy as a form of drama. Peripeteia, the tragic revelation that the tragic hero experiences at the climax of the play that sends him hurtling to his doom, is explained by Aristotle using examples from Oedipus, where he describes it as â€Å"a change from ignorance to knowledge, and thus to eithe r love or hate, in the personages marked for good or evil fortune† (Aristotle 30). Peripeteia for Oedipus is preceded by inaction, an inaction that stems from an inability to change his fate. This is evident from the predictions that the oracle makes. As Harold Bloom points out, it is significant that the oracle does not merely predict that Oedipus would commit some heinous crime but specifies every detail of it. Harold Bloom warns against readings that see Oedipus as a free man, since that entails a neglect of the oracle’s warnings, which form a very important part of the plot of the play (Bloom 141). The oracle stands for the religious forces that controlled, and were controlled by fate. For Aristotle, these forces represent the â€Å"good or evil fortune† that he talks about in The Poetics. Fate for Oedipus represents a course of action that he cannot avoid, as is seen from the events in the play, where significantly, none of his actions have as a direct conse quence the murder of his father, or incest. Oedipus's knowledge of the prophecy of the oracle too cannot mitigate the misery that fate holds in store for him. Ironically, it is the knowledge of the prophecy that leads Oedipus towards the land of his birth. Throughout the story of Oedipus, we see him being willed towards the ultimate outcome of the play without his knowledge of

Saturday, July 27, 2019

Network Security Research Paper Example | Topics and Well Written Essays - 2500 words

Network Security - Research Paper Example However, as technology evolved, the networks also became a part of everyday life. With the accessibility of networks, the security problems have also increased. Networks are increasingly becoming vulnerable to the threats present in the environment. The paper has researched on the threats that are posed on the network as well as the vulnerabilities that increase the security risks for the network. The final part of the paper also discusses the tools that help in implementing security policies as well as the formulation of security policy. Problem Statement Numerous hackers search for and exploit vulnerabilities of a system or a network on a day-to-day basis. Moreover, the tools that help in penetrating and exploiting networks and systems are becoming increasingly accessible and they are so simple to use that they require very little technical knowledge. The threats become even more real when the network connects to other networks, however, threats usually originate from the internal network more often. Research indicates that the 70% of threats usually originate from inside the corporate environment. Hence, any person in charge of networks needs to take a close look at the threats and vulnerabilities of a network. ... ions are in place to monitor and control unauthorized access, misuse, modification, or denial of the network and its resources (Simmonds, Sandilands, & van Ekert, 2004). The first phase of network security begins from user authentication, the most common form of which is a username and password. We can also call this as one factor authentication because we are using just one thing besides the username, which is the password that we already know. Similarly, another form of authentication is two-factor authentication that requires something like a security token, ATM card, etc. The next phase after authentication is a firewall that enforces access policies, for example allowing read/write capabilities to various documents available over the network (A role-based trusted network provides pervasive security and compliance, 2008). Firewalls have the ability of filtering unauthorized access, however, they sometimes fail to check for harmful content that might have entered into the network such as computer worms, Trojans, etc. We have anti-virus software or intrusion prevention systems that help detect and prevent the movement of such malware. Why Network Security? As networks have expanded with time, so have their security issues. The following are the three main reasons why any organization would invest into securing their network: Confidentiality Breach – Every firm would want their confidential information to be held confidential from the eyes of the competitors. Moreover, in an environment where everything has been transformed and saved in the electronic form, a secure network becomes even more important for a firm. Destruction of Data – Data is the most important asset for any organization as well as individuals. Data is processed to be converted into information

Friday, July 26, 2019

Business Strategy (Viking Sewing Machines) Case Study

Business Strategy (Viking Sewing Machines) - Case Study Example Company has reformulated its strategy documents, created new mission statement. The changes started with the change in the distribution network and to make retailers as dealer-partners and to motivate them to promote exclusively the company's products. In its biggest market (US) company collaborated with large retail chain Jo-Ann Fabrics and crafts and opened exclusive retail outlets. In its original country (Sweden) company has already a large retailer's network. In other parts, the company do not have exclusive retail network. Changes at the top management level with widespread changes in overall organizational structure as well as in operating systems. Now in the changed situation company has to adopt different business strategies and analyze that whether these strategies are successful or not. Business strategies: There are three main success criterions for the companies Suitability, Acceptability and Feasibility, which could be analyzed as follow: Suitability: It is a broad criterion concerned with whether a strategy addresses the circumstances in which an organization is operating the strategic position. Suitability can be thought as the rationale of a strategy and whether it makes sense in relation to the strategic position of an organization. Feasibility: Feasibility is concerned with whether an organization has the resources and competences to deliver a strategy. A number of approaches can be used to understand feasibility. Financial feasibility and Resource deployment are the two important approaches generally used for feasibility analysis. Now we will analyze the company VSM on the basis of above mentioned three criteria. The mission statement, VSM has clearly defined its priorities as to develop, produce, market and sell consumer sewing machine and related products, creating demand, being a customer driven company through providing quality products, satisfy customers and dealers-partner alike, and continuously adding values to its brands. It specifically emphasized on employees satisfaction and growth opportunities by adding value to its human resources. Its ultimate aim was to be a leading premium company in the world of sewing. It basically aims towards consolidation of its position in the market. To achieve these objectives, company has to formulate its business strategies carefully after analyzing its core areas of competencies, its strategic positioning in the market as well as the various choices it have in its existing situation. For the next 5 years mainly company has to identify its areas of operations and production, marketing and distribution strategies, financial planning and prudence, ex pansion strategies, and careful evaluation of various choices it have to formulate its competition strategies to remain successful sewing manufacturing machine company. Strategies might be regarded as suitable from the point of view of: existing opportunities in the environment and avoiding threats; capitalizing on organizations strengths and avoiding or remedying weaknesses; addressing exceptions. The general environment of western market for sewing machine is becoming saturated and shrinking. Even industrial demands are going down and therefore professional and domestic sewing machine market seeing a slump. Therefore VSM group has an opportunity to expand in East European market and

Reclining Female Figure, attributed to the Ashmolean Master, Greece, Research Paper

Reclining Female Figure, attributed to the Ashmolean Master, Greece, Cycladic Islands, Naxos Early Cycladic II, Dokathismata variety, 24002300 B.C - Research Paper Example It has small pointed breasts, narrow arms that are folded right below the left. The figure has gently curved hands across the abdomen that is swollen. The piece has a deep cleft apex that is bisected and separates the long legs in front. It has a shallow cleft in the back that is raised up to the horizontal buttock ridge. The knees are intended and profiled. The ankles are also incised and the feet are angled down having concave soles with delineated toes. The piece is 11 and a half inch high. (Symes) The image has a feminine figure with broad shoulders and curved waist. It is a small sculpture that is portable. The figure uses curved triangular shape for the head, curved square shape for the breast oval curve for the waist and semi triangular shape for the legs. The texture type used in the image is not actual but visual. This is a texture typical for human skin. The texture type indicates that it is a light piece. It has a predominantly light with dark accents in the value scheme. The sculpture has varied characteristic aspects that relate to the principles of design. It portrays a perfect balance in the way the weight of the piece can be distributed evenly through the shoulder down to the feet. The shoulders are wider but proportional to the waist and portable by the legs. The hands are evenly shaped, but little thinner compared to the body size. The breast size is broader and not uniform to the lower part after the arms which provides non feminine image and looks unrealistic. This is a clear contrast on the figurative image of the female body. There is harmonious curved shaping of the waist and legs. The forward bending of the knees depicts natural movement in the piece. The piece is composed of numerous regular shaping to form a smooth feminine image. The dominant points on the piece are in the breasts and waist. The waist has a curving line

Thursday, July 25, 2019

Infection Control - Pandemic Planning Essay Example | Topics and Well Written Essays - 1500 words

Infection Control - Pandemic Planning - Essay Example The 2009-H1N1or swine flu was declared as a pandemic by the World Health Organization in 2009 (CDC, 2010). This influenza A (H1N1) virus was the most major cause of human flu in 2009. As Patel, Panchal, Chavda, Modiya, Marvaniya, Modi, and Sen (2010) note, some strains of H1N1 are endemic in humans and they result in a small percent of all flu-like illness and a small percent of all seasonal flu. Other strains are endemic in pigs and birds. This paper will discuss effective pandemic planning for the management of an outbreak of H1N1 virus on a cruise ship with 1970 passengers and 734 crew on board. Infection Prevention and Control The UK’s National Infection Prevention and Control Framework describes extensive measures to combat the outbreak of future infectious diseases. This framework strongly recommends the active involvement of individuals, communities, healthcare authorities, national and local governments, and other care givers to address effective infection prevention a nd control so as to minimize the risk of infectious diseases that can endanger lives (NHS Professionals Infection Control Policy, 2010). There is a wide range of national policy guidelines such as The Health and Social Care Act (2008), Essential Steps to safe, clean care (2007), National Patient Safety Agency Revised Cleaning Manual (2009), and Winning Ways- Working together to reduce HCAI in England (2003) now available for the prevention of healthcare associated infection and communicable diseases (As cited in NHS South East Essex and NHS South West Essex, NHS,  Infection Prevention & Control Team, 2011). These national policy guidelines suggest that the effective prevention and control of healthcare associated infections (HCAI) should be practiced in everyday life and applied by everyone on a continuous basis. As per the National Infection Prevention and Control Manual of Health Protection Scotland (2012), it is particularly important for communities to have awareness of the po ssibilities concerning an outbreak of pandemic diseases. This awareness is very vital to prevent the situations leading to diseases like swine flu and to treat the disease conditions effectively (NDMA, 2009). The framework specifically indicates that thoughtful staff engagement is paramount in the prevention and control of infectious diseases. The prevention and control practices have to be initiated from the bottom line (local communities or regions) and spread to the national level. According to the NHS Infection Prevention and Control Policy (n. d.), Director of Infection Prevention and Control, Infection Prevention and Control Teams, general practitioners, nursing staff, domestic staff, all other staff groups, and all key healthcare institutions in the country are involved in the prevention of HCAI. Pandemic Planning Requirements The given case scenario is about the management of an outbreak of H1N1 virus on a cruise ship. A cruise ship is likely to carry passengers from differe nt territories, sometimes from different countries. In addition, people cannot always stay away from the affected people while they are in a ship. Hence, the likelihood of spreading the disease will be high. In this situation, high awareness of the H1N1 flu is necessary to prevent the spread of this disease effectively. Hence, the medical team in the ship must inform the passengers and crew about the potential causes that would lead to spread of this infectious virus. The

Wednesday, July 24, 2019

What are the ethical responsibilities of American consumers Term Paper

What are the ethical responsibilities of American consumers - Term Paper Example Today's American economy stretches to every corner of the globe. It is the responsibility of the Senate to offer Enlightened Humanitarian conditions to the economic periphery. I am here today to remind the Senate committee about African human rights abuses which are unwittingly funded by American consumers through the trade of conflict minerals. The Senate first inspected the Congolese mineral trade in columbite-tantalite, cassiterite and wolframite in 2009. Senator Brownback sponsored S.891, titled â€Å"Congo Conflict Minerals Act.† This bill cites experts at humanitarian organizations, public health officials, economists and the United Nations. The consensus opinion condemns the Congolese mineral trade and the violence which it funds. The bill called for tighter economic control of conflict minerals in America. In the Congo, violent military forces are profiting from the trade in conflict minerals. These forces â€Å"continue to commit widespread human rights abuses† including â€Å"sexual violence and rape† (S.891, Sec. 2 (2), (4)). Sadly, the bill died in committee and American consumers have continued to unknowingly fund the violence in Africa. The Senate should do everything in its power to diminish the trade in conflict minerals. These actions should not be limited to economic sanctions, tariffs, political declarations or consumer education. This serious situation requires a broad approach based in the same Senate mandate that spurred humanitarian regulations of slaves, diamonds, child laborers and even green house gas emissions. Africa has long been the a source of raw materials for colonial nations. The Belgian King Leopold II first founded the Congo in the 19th century as a colonial asset. While Leopold's brutal regime was based in extracting rubber, the current crisis comes from military leaders funded by conflict minerals. (Polgreen). America consumes these materials as finished goods. Consumers must be made cognizant of the ec ological and human costs of this neo-Colonial relationship. New York Times columnist Lydia Polgreen described conflict minerals as â€Å"Africa's resource curse: The wealth is unearthed by the poor, controlled by the strong, then sold to a world largely oblivious of its origins† (Polgreen). Ethical consumers must be made aware of these origins. What can the Senate do to regulate American trade in conflict minerals? Two years ago, Senator Brownback would have required manufacturers which use conflict minerals to register with the Securities and Exchange Commission. (S. 891). In 2009, the primary concern was the identification of conflict minerals. Today we need to also educate American citizens about the humanitarian cost of consumption. Hopefully this knowledge will allow consumers to regulate their purchase of conflict minerals within the free market. While American consumers are often ethical, sometimes policymakers need to help define the nations economic scope, humanitari an obligations and ecological impact. America is an Enlightened nation with many trading partners. We are all responsible for the well being of the individuals who live on the periphery of our economic influence. We are quick to give philanthropic aid to African nations through the IMF and World Bank. On December 1 of this year, President Obama and this congress guaranteed $48 billion to Africa as part of the â€Å"President's Emergency Plan for AIDS Relief.† This money will be spent over the next five years (Freeman). Our ethical consumption can mirror our humanitarian aid. Conflict minerals fund sexual violence in the Congo, here American consumption needs to be regulated in order line up with our

Tuesday, July 23, 2019

Corporate Finance Essay Example | Topics and Well Written Essays - 2000 words

Corporate Finance - Essay Example In addition, environmental factors like macro economic conditions and cyclical behaviour of the industry may influence on their performance. The hubris hypotheses formulated by Roll, states that often company managers systematically commit error in evaluating merger opportunities which are due to their excessive self-confidence. So, managerial motives play important role in determining the outcome of the merger and acquisition. In contrast, in some instances even when shareholder wealth is destroyed, executives still seem to gain from mergers and acquisitions, which show that, managers through mergers and acquisition activities may seek to utilise their own utility at the expense of shareholders (Casper Flugt, 2009). Main objectives of merger Companies go for merger and acquisitions to expand their business. By the process they try to develop their companies’ brands. Aim to reduce market competition. Aim to cutting costs by laying off employees, removing management and other r elated actions. To reduce taxes they go for merger. Aim for ‘empire building’ by acquiring managers and other purposes, they may go for acquisition. It is a strategic move by companies to diversify their business away from their resources. Company managers think that joint company will be able to generate more value than the separate firms. There are many options for payment for a company when it goes for acquiring another firm. It can pay in fully cash, or it may buy targeted shares. It can also choose a combination of loan notes, share and equity, deferred payment. Actually, the payment method is important for several reasons. Payment by means of cash and debt will benefit more for a company than stock acquisitions, as it could be used more efficiently... At the time of stock market boom, mergers were more appealing. On the other hand, falling share prices can lead to a company being undervalued, and make it an attractive for acquisition. Mergers and acquisitions can either be value destroyers or value creators that depend on factors like company’s cost of capital, its strategies and decisions and cash flows generated from the business operations The performance is not related to the nature of an industry, instead it was driven by the quality and strategy of management. Good strategy by management can produce good results, on the other hand, poor decision and strategies may end with poor performance. In the present competitive market companies are looking for mergers and acquisitions to expand their business to a newer region. Most of the mergers and acquisitions resulted in value creation. Especially, in case of big companies it is true. There is some perception that nearly 50-70% of mergers fail to deliver shareholder value. In many occasions employees feel the pinch as the new group goes to cut jobs to reduce cost to the company. But, ultimately performance is not related to the nature of an industry, instead it was driven by the quality and strategy of management. Sound financial management along with other favourable factors is necessary for value creation, its survival and growth for any company.

Monday, July 22, 2019

Toussaint LVourture Essay Example for Free

Toussaint LVourture Essay In 1861, Wendell Phillips delivered a speech about the great accomplishments of the most powerful leader in Haiti; Toussaint-Louverture. The speech was written around the time when African Americans did not have the right to serve in the military. In his speech, Wendell Phillips praises Toussaint Louverture for creating equal rights when it comes to serving in the military. Wendell Phillips uses magnificent examples and metaphors to inform us about Toussaint-Louverture’s great accomplishments; which are creating equal rights for everybody who wants to join the military. Phillips’s purpose is to show people that they can accomplish their goals, if they are willing to fight for them. Toussaint-Louverture reached his goal of allowing African Americans to serve in the military by fighting against many armies and showing them that it doesn’t matter what race a person is. One of the examples Phillips uses is â€Å"Men who despised him as a negro and a slave, and hated him because he had beaten them in many a battle.† It shows that the Britons, Frenchmen, and Spaniards think that Toussaint-Louverture is of little value because of the fact that he is a slave and an African American, but they also fear him because they know what he is capable of. Hoehlein2 The example demonstrates that it doesn’t matter what race someone is and that every person should have the right to live their dream; and if it is a person’s dream to serve in the military, he should be allowed to fulfill it. The metaphor â€Å"We measure genius by quality, not by quantity†¦Ã¢â‚¬  that Wendell Phillips uses in his speech shows that Toussaint-Louverture has the ability to win the battles against those armies because he has the courage to fight for the rights of his people and he has his heart set on creating equal rights for everybody; and not because he has an army of thousands of men. Quality is far more important than quantity and African Americans should have the right to serve in the military if it is their dream to do so. Toussaint-Louverture proved that he was willing to fight for his dream of creating equal rights for everybody. When Wendell Phillips says â€Å"Then, dipping her pen in the sunlight, will write in the clear blue, [†¦] Toussaint-Louverture.† it demonstrates how greatly appreciated and respected Toussaint-Louverture was. He was considered the most powerful leader in Haiti back then because he fought for equal rights and he accomplished his goal. African Americans are now allowed to serve in the military because Toussaint-Louverture made it possible for them to do so.

Sunday, July 21, 2019

Wi-fi Wireless Technology

Wi-fi Wireless Technology Business data network and telecommunications Wi-fi has entered in to our lives some years now. It solves some problems that wire networks have but generate new. At the moment there are few advantages and a lot of disadvantages. Wi-fi can be very useful in many cases and I think it deserves a deep look in to it. Also wi-fi has many prospects for further development. Wi-fi needs specified devices in order to work properly. History The term wi-fi (wireless fidelity) is used in order to determine the appliances that are based on specification IEEE 802.11 and faction of ISM band, that is frequencies 2.4Ghz for Europe .Wi-Fi uses single carrier DSSS (direct sequence spread spectrum) radio technology but also multi-carrier OFDM (Orthogonal Frequency Division Multiplexing) radio technology. These regulations that enabled the development of Wi-Fi, are HomeRF, and Bluetooth. Unlicensed spread spectrum was available for first time by the Federal Communications Commission in 1985 and the FCC regulations were copied later with some changes in other countries and made the use of this technology enable in all major countries. Michael Marcus of the FCC staff proposed the FCC action in 1980 and the subsequent regulatory action in 5 more years. It was part of a proposal to allow civil use of spread spectrum technology and was opposed by the mainstream equipment manufacturers and many radio system operators. (Federal Communications Commission. 1985). The Wi-Fi was invented in 1991 by NCR Corporation/ATT. Initially the use was for cashier systems. The first wireless products that were brought on the market was under the name â€Å"WaveLAN† with speeds of 1 Mbit/s up to 2 Mbit/s. Vic Hayes, was involved in designing standards such as IEEE 802.11b, and 802.11a. He has been named as â€Å"the father of Wi-fi†. (Vic Hayes at 1st Home Networking Conference, 2007). Uses A device with Wi-Fi enabled, such as a PC, PDA, cell phone, game console, or MP3 player can connect to the Internet within the range of a wireless network connected to the Internet (Access point). The interconnection between one or more access points in a certain area is called a hotspot. Hotspots can cover a single room up to many squares covered by overlapping access points. The devices can network each other and connect to the Internet, share files and digital cameras can transfer video wirelessly. Wi-Fi also allows devices to connect directly with each other (peer-to-peer mode). This connectivity mode is useful most in gaming applications. When the technology released in the market there were many problems because consumers were not sure if the products from companies would work together. The Wi-Fi Alliance began as a community to solve this and to address the needs of the end user and allow the technology to mature. The Alliance created the branding Wi-Fi CERTIFIED to show to the consumers that products are interoperable with other products displaying the same branding. (Wi-fi alliance, 2000). Routers and Wi-Fi access points are used most in homes to provide Internet access and networking to all devices that are connected wirelessly or by cables into them. Devices can also be connected in ad-hoc mode for client-to-client connections without using a router. In Business and industrial environments, as increasing the number of Wi-Fi access points we get faster roaming and increased network capacity by creating smaller cells or by using more channels. Wi-Fi can enable wireless voice applications such as WVOIP. Wi-Fi installations can provide a secure computer network, firewall, DHCP server and other functions. In addition to home and office use, Wi-Fi is publicly available also at Wi-Fi hotspots provided either free of charge or under a certain price. Sometimes free Wi-Fi is provided by organizations or authorities who wish to promote business in their area. Metropolitan-wide WiFi (Mu-Fi) already has more than 300 projects in process. (Muniwireless, 2007). Standard devices Wireless access points can connect wireless devices to a wired LAN. An access point is something like an Ethernet hub, relaying data between the connected devices. Wireless adapters are connecting in the devices, externally or internally such as usb, pci and allow devices to connect to the wireless network. Wireless routers integrate a firmware application that provides IP Routing, NAT, and DNS forwarding through an interface. Wireless range extenders (repeaters) can extend the range of the wireless network. Ig the repeaters are placed in the area smart then the signal can be excellent. The devices that are connected through repeaters may have an increased latency for each hop. Each device will get signal from the device that gives better signal. With wireless bridges we can connect two or more networks between them. This is different from an access point because an access point works at the data-link layer. We can use two wireless bridges when a wired connection may be unavailable, such as a connection between two separate buildings. Most devices (routers, access points, bridges, repeaters) are designed for home or business environments. Pci cards use antenna connectors and usb only have internal antennas while some have external connections in addition to an internal antenna. In laptops it is commonly used mini pci cards. In a network between two buildings that the distance is a matter it is usually used big antennas in the roof of the buildings, so the signal can be remain strong enough. Advantages of Wi-Fi Wi-Fi allows LANs to be deployed while it reduces the cost of the network deployment. WLANS can be hosted in areas that cannot be run by cables, such as outdoor areas or even historical buildings. The prices for wireless products continue to drop, making it a fair networking option. Wi-Fi has become widespread and more and more devices obtain wi-fi technology. Wi-Fi is a global set of standards. Products designated as Wi-Fi Certified by the Wi-Fi Alliance are backwards inter-operable. Except mobile phones, any device with wi-fi standard will work anywhere in the world. Wi-Fi use WPA encryption and it is not easily cracked if the passwords are strong enough. Nowadays it is used WPA2 also, an encryption that has no known weaknesses. A new protocol for Qos is WMM and makes Wi-Fi better for voice, video applications, and power saving methods. To make enable the WMM feature all devices in the network must support it. Disadvantages of Wi-Fi Wifi in Europe use for the 2.4 GHz band (1-13) channels, in US (1-11) and Japan (1-14). A Wi-fi signal occupies around five channels in the 2.4 GHz resulting in only 3 non-overlapped channels in the US: 1, 6, 11, and four in Europe: 1,5,9,13 Power consumption is too high compared to with other low bandwidth standards, such as Bluetooth, making a concern about devices batteries life of the. WEP (Wired Equivalent Privacy) is the most usual wireless encryption standard that is used, but shown that can be easily breakable. Wi-Fi Protected Access (WPA, WPA2), solved this problem and its available on most products. Most Wi-Fi Access Points have default the security disabled thought, providing open wireless access to their LAN. You can always turn on the security by configuring the device, usually via the graphical user interface (GUI) of the router/access point. Unencrypted networks can be used to read and copy data that are transmitted over the network, unless we have a security method to secure the data, such as VPN The wireless networks have limited range. A typical Wi-Fi home router using 802.11g with a stock antenna might have a range of 35 m indoors and 95 m outdoors. Range also varies with frequency band. Wi-Fi in the 2.4 GHz frequency block has slightly better range than Wi-Fi in the 5 GHz frequency block. Outdoor range with improved (directional) antennas can be several kilometres or more with line-of-sight. IEEE 802.11g-(2003) When the range increases the performance of a wireless network is decreased. Ethernet or other cables are more reliable then wi-fi. An Ethernet connection can reach speed up to 1Gbit/s and in the other hand 802.11g networks have a maximum of 54 Mbit/s. Protocol 802.11n try to improve the speeds, but still does not achieve Ethernets reliability. People with adsl2+ can understand an increase in performance using wired connection rather than WiFi. Wi-Fi in many cases has problems with the signal-to-noise ratio (SNR). SNR compares the level of the desired signal to the background noise. This can be a huge problem in high-density areas. All the devices must support the same protocol for example 802.11g. And in case there are other access points in the network, the name (SSID) must maintain the same. In Wireless networks there are many times incompatibility problems between brands. Different standards may disrupt connections or low speeds. The new protocol 802.11n use 5 GHz band and have more channels available. Each node (access point, repeater) on the network is able to see the communication between other devices, allowing network traffic to be easily captured. When a WiFi network is not encrypted it is vulnerable to attacks. Wi-fi is a new technology and still under development. Many people may adopt it cause it produce a non wire environment and others not. I think wi-fi will give better quality in the future and maybe it will get pass some main problem that it have at the moment. References Authorization of Spread Spectrum Systems Under Parts 15 and 90 of the FCC Rules and Regulations (TXT). Federal Communications Commission (June 18, 1985). Retrieved on 2007-12-01. Wi-Fi Alliance Certified Products. (2000) certifications.wi-fi.org. Retrieved on 2007-11-01. from http://certifications.wi-fi.org/wbcs_certified_products.php V.Hayes at (November 04 2007). 1st Home Networking Conference Retrived on 2007-12-03 from http://lirne.net/2007/11/vic-hayes-at-1st-home-networking-conference/ Muniwireless (2007). Muniwireless-technology Retrieved on 2007-12-01 from http://www.muniwireless.com/ IEEE 802.11g-(2003) 802.11g Retrieved on 2007-12-03 from http://en.wikipedia.org/wiki/IEEE_802.11g-2003

Innovation Life Cycle Model for SAP

Innovation Life Cycle Model for SAP Introduction As an answer to global competition, companies have increased the preface of technologically sophisticated products as well as adopted advanced technologies and modifications in organisational structure and processes. For many firms, the development of new products and services is the crucial point of their business strategy and a decisive factor for competitive strength and survival (Stumpfe n.d.).. A firms competitive position is determined by their ability to innovate products and the time required to bring new products to the market. Firms have to launch new sophisticated products in increasingly fast cycles and their ability to ramp up to full scale production volume rapidly is crucial for success (Pisano 1997). A couple of years ago, such technologies called business intelligence (i.e., software solutions used on handling tons of information) were available only to the worlds biggest firms. However, as the cost of computing and storage has dropped and the systems have been enhanced and cost effective, the technology has moved into the majority. Firms are pulling together more information than ever before. In the past, they were stored in different systems that were unable to communicate to each other, such as finance, human resources, or customer management, but just recently, systems are being connected and companies are employing data-mining techniques to get a complete picture of their operations that let firms to manage more efficiently, analyze trends, and develop their forecasting (The Economist Newspaper Limited 2010). Innovation Lifecycle Model This lifecycle model can be understood as a three-stage model of technological development associated with a particular product technology (Williamson 1975). In the explorative stage many diverse models or designs are created, in the development stage products develop into standardized into a dominant design, and in the mature stage only small changes happens inside the dominant design (Frenken, Silverberg and Valente 2008). Although the product lifecycle model is widely accepted and often applied in empirical research, innovation scholars have failed to develop systematic theoretical models that explain the different stages of technological development along the lifecycle (same as Frenken, Silverberg and Valente 2008). In this study, an attempt is made to contribute to innovation lifecycle theory by using the SAP Database system and analyze its pattern. Dependent on the stage in product and process life cycle and on competitive strategy there can exist a complementary or a competiti ve relationship between the implementation of product and process innovations. The product-process life cycle theory of Utterback and Abernathy (Utterback, Abernathy 1975) provides a useful model helping to understand the pattern of industrial innovation processes. This model succeeds in encompassing the mutual relationships between the stages of SAPs product life cycle, the related production process` stages of development and competitive strategy elements (Stumpfe n.d.). SAP History During the 1970s,five former IBM employees made a decision to start their own company, when IBM rejected their recommendation to develop software designed to be used by several users simultaneously(Neumann and Srinivasan 2009). They launched their private corporation in 1972. It was named SAP (Systemanalyse and Programmentwickung-Systems Analysis and Program Development) (same as Neumann and Srinivasan 2009).The name was coined after the plan on which they have been developing at IBM.The company had its headquarters in Weinheim, and its main office in Mannheim Germany (Neumann and Srinivasan 2009). Characteristic Fluid Pattern Transitional Phase Specific Phase Competitive emphasis placed on.. Solution strategy for market entry. Innovation stimulated by Market requirements for advanced solutions application Predominant type of innovation Data processing system. Product Line Financial accounting software suite Production Processes Focused on running financial accounting software through mainframe. During this Phase of the life cycle, technical energy is expended, using materials and technologies generally available in the marketplace (Henderson and Clark, 1990).Within a year of being established, SAP had already completed its first solution for financial accounting. This single management system, designed as a real-time book-keeping and transaction processing program, tied ICIs (Imperial Chemical Industries; first SAP customer) information databases together (same as Neumann and Srinivasan 2009).It became known as â€Å"R1†, meaning that the data was processed immediately after being entered or real-time (Payne, Roets and Schlanderer 2009). It is important to note that during this early phase in the computer industry , business data had to be entered manually at the entry terminal and saved and stored, which basically means Batch processing. Inevitably the introduction of Innovation by SAP which is the real-time processing become very much popular and at that time was a genuine milestone (same as Neumann and Srinivasan 2009). At first SAP only uses the English Language for its first customer ICI,however it has obtained valuable insights from the latter on the business management side of international operations, as a result in 1975 SAP became multilingual (Lofthouse 2000). In the 1980s SAP experienced rapid growth and benefited from major improvements in the software industry (same as Neumann and Srinivasan 2009).Entering the market at that time were Computers with enhanced price-to-performance ratios which helped SAP to expand its customer base (Lofthouse 2000). During also this time the basic shape of a client-server architecture was developed (SAP Global n.d.).SAP continuously enhanced its already distributed program modules and has released the SAP R/2 system, with this the firm claimed market leadership for large companies and was ready to enter the international software market (same as Neumann and Srinivasan 2009). Characteristic Fluid Pattern Transitional Phase Specific Phase Competitive emphasis placed on.. Solution strategy for market entry. Product variation (SAP R/2) Innovation stimulated by Market requirements for advanced solutions application Increased demand by Multinational/Global Market . Predominant type of innovation Data processing system. Process innovation by system that can handle different languages and currencies. Product Line Financial accounting software suite SAP R2 Production Processes Focused on running financial accounting software through mainframe. Banking on systems stability and reliability has improved SAP R2 The Development of the Database Market A market consolidation has taken place since the mid-1990s, initiated in 1994 with the takeover of ASK/Ingres by computer associates, and reaching its highpoint so far in the middle of 2001 with the takeover of Informix by IBM (SAP Global n.d.). During the mid 90s, SAP ushered in a new generation of enterprise software, from the previous mainframe computing to a combination of uniform appearance of graphical interfaces which is called the SAP R/3 (same as Neumann and Srinivasan 2009). With this release, SAP tapped a whole new market among small and medium-sized enterprises due to relatively low cost and effective business process. Adapting to the Times SAP have realized that the internet is a very powerful force, that if utilized properly will result in more generation of income, with this recognition and incremental improvement on the R/3 system- which is named R/3 version 3.0 (same as Neumann and Srinivasan 2009) provided the first completely Internet-enabled business application package, which also increased its viability by making it more user-friendly (same as Neumann and Srinivasan 2009).They have also created the mySAP.com strategy, which represented a complete restructuring of the product portfolio and the beginning of a new direction for the company (same as Payne,Roets and Schlanderer 2009).Using this latest web technology, mySAP.com combined e-commerce solutions with the existing Enterprise Resource Planning (ERP) applications, it also enabled SAP to offer an integrated business platform that has the combination of both front-end and Backoffice processes (same as Neumann and Srinivasan 2009). SAP was the first software c ompany to practise the double approach of giving standard software that could easily be implemented and managed on the one hand, while at the same time watching for and integrating key global business trends into their software (same as Neumann and Srinivasan 2009). Open Source Instead of Marketing Despite the increasing breadth of functions of the SAP DB database system, SAP AG does not intend to market the database system commercially, and to enter the DBMS market as a new competitor. Consequently, SAP DB is offered license-free in connection with SAP solutions. The users of mySAP.com applications must simply pay a support and maintenance fee that is determined as a fixed percentage of an accrued license price (Anon n.d.). An advantage of using SAP as an ERP system is that SAP has a very high level of incorporation among its individual applications which ensures uniformity of information throughout the structure and the business itself (Kumar n.d.). To support processes well, we need to have information systems and integrated information system support processes in an organization (Scheer 1998). In a standard SAP project system, it is separated into three environments, Development, Quality Assurance and Production (Kumar n.d.). The development system is where most of the execution work takes place. All the final testing is conducted before moving the transports to the production environment which is where the quality assurance system kicks in. On the production system environment all daily business transactions happen, to all companies, the production system should only include transports that have passed all the tests (same as Kumar n.d.) SAP is a table drive customisation software. It provides businesses to make fast changes in their enterprise needs with a uniform set of programs. User-exits are provided for business to add in additional source code. Tools such as screen variants are provided to let the user set field attributes whether to hide, display, or make them fixed fields (Kumar n.d.). This is what makes ERP system and SAP in particular so flexible. The table-driven customisation is driving the program functionality instead of those old-fashioned hard-coded programs. With this, new and modified business requirements can be quickly employed and tested in the system. Many other business application software have seen this table-driven customisation advantage and are now changing their application software based on this table customizing concept (Kumar n.d.). The standard programs and tables should not be changed as far as possible in order to minimise the upgrading costs (same as Kumar n.d.). The main purpose of using standard business application software like SAP is to decrease the amount of time and money spent on improving and testing all the programs. Hence, most companies will try to make use of the existing tools provided by SAP(same as Kumar n.d.). Characteristic Fluid Pattern Transitional Phase Specific Phase Competitive emphasis placed on.. Solution strategy for market entry. Product variation (SAP R/2) Never ending quality improvement. Planned quality along the entire product lifecycle and effort for Independence motivate development of own database, as well as simpler database system. Innovation stimulated by Market requirements for advanced solutions application Increased demand by Multinational/Global Market. Global Organization, plans on development in multiple international locations. Predominant type of innovation Data processing system. Process innovation by a system that can handle different languages and currencies. Creation of software applications for customers who primarily works on end to end business processes. Product Line Financial accounting software suite SAP R2 SAP R3, SAP Net weaver, mySAP.com Production Processes Focused on running financial accounting software through mainframe. Banking on systems stability and reliability has improved SAP R2 Linking e-commerce solutions to existing ERP applications, using state-of-the-art Web technology. Modern Architecture for High Performance and Availability Due to its modern architecture, SAP DB provides a high level of performance, scalability and robustness. In this way, the database can fulfil the performance demands of application environments with thousands of concurrent active users and very large data volumes. At the centre, multi-thread /multi-server architecture ensures a high degree of scalability with sparing handling of server resources. SAP DB fits flexibly into modern architectures such as multi-processor systems or cluster configurations, and uses the advantages for example, where high availability is concerned, without costly configuration. Due to the customisable architecture, SAP DB is suitable as a central database system both for three-tier and two-tier client-server environments (SAP DB n.d.). Effective locking mechanisms, efficient caching of data, intelligent optimisation of SQL applications, extensive parallel processing of read and write processes, and strategies to minimise the required write operations are among the architecture characteristics that significantly affect response times and throughput (SAP DB n.d.). SAP DB is designed for interruption-free round-the clock operation. Required maintenance tasks, such as configuration customization, the extension of data or log areas, data back-up, creation of table indexes and so on, can be performed during production operation without affecting the active users (SAP DB n.d). High Level of Automation for Unattended Operation As well as performance and robustness of SAPs Database Management system (DBMS), the main focus of the further development of SAP DB is on simpler operation of the database system (SAP DB n.d.). The vision of a database system that automatically manages itself to a large degree, and only requires minimal monitoring by the database administrator, is the guideline of development. Both the setting up of the database system and the running operation are largely automated. During configuration, SAP DB automatically sets the core parameters in accordance with the existing system environment. During the definition of database objects such as tables and indexes, the database administrator works exclusively at the level of logical schemas: SAP DB automatically makes the assignment to the physical data structures in mass storage, and the database system also handles the growth of tables and indexes completely dynamically (same as Anon n.d.). Analysis on Innovation Life Cycle Model for SAP Usefulness Lifecycle Models are largely qualitative tools by which regularities in the progress of an object between its generation and degeneration are identified; these regularities are used to deduce prognoses for future evolutions (Bullinger 2008). The Innovation Life Cycle (Utterback and Abernathy 1975) helps in determining the pattern and the basis of competitive strategy can and probably can change for most firms as the industry evolves. At the first stage (fluid phase), the introduction of the technology innovation of SAP was described as it entered the market with its financial accounting software. The dominant design used was also established which is the SAP Database management system due to its stability and reliability, moving it from the transition phase into the specific phase. The pattern starting from the product innovation was also taken into account. SAP and probably other firms in general went forward into a process innovation. Another useful attribute of this model is that the strategies employed by firms during the models stages can be clearly identified and analysed. Limitation Although the Innovation Life Cycle Model helps in examining and analysing the nature of competition within the industry to identify opportunities and potential threats, it has also several limitations. For one, this model basically is just a generalisation. In actuality, life cycles do not always follow a standard pattern that a firm has to go through. In some cases, growth is so rapid that the embryonic is skipped altogether, while others industries fail to get past the embryonic stage. Industry growth can be revitalised after long periods of decline through innovation and social change. For example, the health boom brought the bicycle industry back to life after a long period of decline (Hill and Jones 2010). The time span of the stages can also vary from significantly from industry to industry. Some industries can stay in maturity almost indefinitely if their products become basic necessities of life, as in the case of the auto industry. Other industries skip the mature stage and go straight into decline, as in the case of the vacuum tube industry. Transistors replaced vacuum tubes as a major component in electronic products even though the vacuum tube industry was still in its growth stage. Still, other industries may go through several shakeouts before they enter full maturity, as what appears to be happening in the telecommunications industry (Hill and Jones 2010).Another criticism is that they overemphasize the importance of industry structure as a determinant of company performance and underemphasize the importance of variations or differences among companies within an industry or a strategic group (McGahan and Porter 1997). Prediction of Future Evolution The existence of a life-cycle pattern of industrial growth is a significant stylized fact for the purpose of constructing a theory of uneven development, but the question remains as to how a particular pattern is itself to be explained (Harris 1978).It is quite difficult to predict what will be the future evolution of SAP if the projection is solely based on the life cycle model. Markus and Tannis (2000) correctly identified that success is a dynamic concept, and could be very different depending on the phase of implementation. Apparently, with SAPs trend of rapid growth and profitable annual revenues, we could assume that they will continue to grow and develop more reliable products and expand their client base. However, this is just a probability based on the trend we see in this model. A lot of factors still needs to be considered to really determine what will happen for the future of SAP. Conclusion Product Innovation is a vital task for the modern corporation (Shavinina 2003).Using the Innovation Life Cycle Model, one can understand how a technology such as SAP goes through the following stages. This model also aids in observing some patterns similar to other firms. For instance, during the fluid phase, it can be observed that SAP focused on determining first what the market really needs and concentrated on product innovation for their customers. During that stage and throughout the transition, the focus also changed as SAP reacted to the economic climate, industrial factors, and competition by finding opportunities to create more products based on their dominant designs success in terms of stability and reliability. They also provided again customers with a variety of software solution strategies to help their businesses. During the specific phase, SAP still continued to expand its clientele and created advanced software solutions to cater to other business process needs. They focused on maintaining their strategy of never-ending support to their clients while offering innovations to their current product roster We can also notice that SAP as a large firm is active in a range of technologies broader than the products they make, this reflects the multi-technology nature of their products, and the knowledge required to coordinate in-house product innovation with innovation in related production systems and supply chains.(Dosi, Teece and Chytry 2005). SAP has yet to saturate the market since a lot of business entities in demand of their products and services. Hence, it can be assumed that SAP is on the maturity stage of the life cycle but still on the growth stage. Looking at their share value with an increasing trend, it can be inferred that they are heading to the right direction (see figure 5). What does this suggest about using the innovation life cycle model? It is simply providing us a snapshot of a specific firms progress. Like other models, it has its own limitations and usefulness, most importantly for analysts, managers, and researchers who need to analyse and formulate strategies using any model which complements a target firm in a specific industry. Process of Literature Search The research was started by searching for any relevant material, both print and online, on the topics Innovation Life Cycle, Technology, etc. The technology chosen was SAP Database for Business Management, since it is a relatively familiar topic and sources are abundant on both print and internet media. After gathering materials, the sources were read to determine their relevance to this research. The model used was the Innovation Life Cycle Model of Utterback and Abernathy to have a clear process of steps related to SAP from its fluid stage to the specific stage, and to analyse patterns and changes throughout the whole model.

Saturday, July 20, 2019

The Camp David Accord Essay -- Political History Historical Israel Ess

The Camp David Accord Works Cited Missing By 1978 the thirty-year war that had been fought between Egypt and Israel had come to a point where there was a chance for peace. The area that had been at the center of the turmoil was the West Bank of the Jordan River and the Gaza Strip. The problem was that both countries believed that they had the rights to this land: Israel, biblically and Egypt, politically. So an invitation by President Jimmy Carter to President Anwar Sadat of Egypt and Prime Minister Menachem Begin of Israel was extended. The invitation was for a meeting in the Catoctin Mountains of Maryland at the presidential retreat, Camp David. The meeting was so that the framework of a peace agreement, known as the Camp David Accord, could be laid out between Sadat and Begin, with Carter as the mediator. Both Sadat and Begin had their reputations and their countries’ futures on the line, not to mention the future of the Middle East. All of the countries neighboring Egypt and Israel would be affected by an Egyptian /Israeli agreement of any kind and maybe encouraged to come to an agreement of some sort for that region. A lot of problems had to be overcome for this summit to be a success. One of them was that the hatred and suspicions between President Sadat and Prime Minister Begin ran very deep. Another problem was that the outside pressures were too strong to permit an easy and early resolve for issues that had a long and ancient history (Mideast 26). The last problem was the hope that President Carter could put out of his mind the psychological profiles done by the CIA on both Begin and Sadat, which could have adversely affected his ability to mediate the proceedings. The long-standing hatred between Sadat and Begin was not one of a personal nature. It had more to do with the political differences of their two countries. Israel has held that the West Bank and the Gaza Strip were theirs because of the establishment of the State of Israel, out of what was Palestine in 1948 and by right of heredity. This was the land that God had told Moses was the Jewish Promised Land. The Egyptians, on the other hand, claimed that the West Bank and the Gaza Strip were theirs. They based their claim on the fact that there were Egyptian citizens living in these areas at the time, the State of Israel was established, so therefore it must be Egyptian land. In ... ...reaty between them within three months of the signing of this agreement (Camp 43). So by the close of the summit, Begin had accepted the new â€Å"words,† which he once had considered improbable (Blitzer 48). For someone like Begin, who holds a lot of value in the power of words, this agreement was not easy to come by. What all the men involved wanted to know was how the meaning of the words would be translated on the ground in the months and years to come (Blitzer 48). In the final analysis of the meetings at Camp David, it’s important not to focus on what was not accomplished, but on what was. The agreement that these two leaders came to was much more than a â€Å"framework for peace;† it was a first step in a long process. A process that many people here and abroad thought would never come. In the years that followed this summit, there were more and more talks that have lead to the relative peace in that part of the world today. So, what Camp David did more than anything else was to set the groundwork to get people talking to each other in a positive direction. The three men had progressed from an agreement to pray together to an agreement to try and make a lasting peace (Blitzer 48).

Friday, July 19, 2019

Penicillin Essay -- essays research papers fc

Penicillin was accidentally discovered at St. Mary's Hospital, London in 1929 by Dr. Alexander Fleming. As test continued, Fleming began to realize that he was on the verge of a great discovery. However, he still did not know the identity of the fungus, and had little knowledge of fungi. His crude extracts could be diluted 1,000 times and still be effective in killing bacteria. After years of working on penicillin and going nowhere, many of his co-workers grew tired of hearing about it. The first real test for penicillin came when a 48-year-old police officer nicked himself shaving. After a time, Alexander's face became infected and he developed a temperature. When he was rushed to the hospital, the doctors believed that he had only hours to live. Then Dr Fleming and his crew started to treat this patient. This was the first person that penicillin was used on. After five days, he was getting better. Unfortunately, because it was in such short supply, it had to be extracted from his urine, and the penicillin had been used up. The police officer died five days l ater. Their next attempt was successful. It involved a punctured eye. The stone was still in the eye, and normally the eye would have been amputated, but penicillin allowed the man to make a full recovery. By this time, it was now 1941, it was now acknowledged that penicillin was indeed a worthwhile drug and could save thousands of lives.   Ã‚  Ã‚  Ã‚  Ã‚  During World War I, death rate from pneumonia in th...

Profanity :: Swear Swearing

Profanity â€Å"Money doesn’t talk, it swears.† Many of the most brilliant minds throughout time have used profanity. Shakespeare’s best works were revised and edited in order to remove the numerous curse words or obscene phrases he included. The harmless use of profanity in an informal setting should not be penalized, by the assignment of an essay. Profanity continuously evolves, and has a very rich and interesting history. The system of assigning essays for the use of profanity is ineffective and counter productive. â€Å"When angry, count four; when very angry, swear.† The evolution of profanity began in the sixteenth century, and it evolves with each generation. Profanity is recognized in many Shakespearean works, and has evolved into the profane language used today. Some cuss or curse words have somehow maintained their original meanings throughout hundreds of years, while many others have completely changed meaning or simply fallen from popular vocabulary. William Shakespeare, though it is not widely taught, used a rather vulgar and dirty vocabulary in his writings. His works included subjects that some people wish they had not. "That includes a fair helping of sex, violence, crime, horror, politics, religion, anti-authoritarianism, anti-Semitism, racism, xenophobia, sexism, jealousy, profanity, satire, and controversy of all kinds" (Macrone 6). In Shakespeare’s time, religious and moral curses were more offensive than biological curses. Most original, prior to being censored, Shakespearean works contain offensive profanity, mostly religious, which is probably one of many reasons that his works were and continue to be so popular. "Shakespeare pushed a lot of buttons in his day- which is one reason he was so phenomenally popular. Despite what they tell you, people like having their buttons pushed" (Macrone 6). His works contained many profane words or phrases and as a result, were censored to protect the innocent minds of the teenagers who are now required to read them, and also because they were blasphemous and offensive. Almost all of the profanity was removed, and that that was not had just reason for being there. Some of the Bard's censored oaths are; "God's blessing on your beard" Love's Labors Lost, II.i.203 This was a very rude curse because a man's facial hair was a point of pride for him. And "to play with someone's beard" was to insult him. "God's body" 1 Henry IV, II.i.26 Swearing by Christ's body (or any part thereof,) was off limits in civil discourse.

Thursday, July 18, 2019

Organizational Systems and Quality Leadership Essay

A. Understanding Nursing Sensitive Indicators Nursing sensitive indicators include the configuration, process and outcomes of nursing care. The configuration of nursing care concludes the nursing staff, their nursing skills, and the level of education that each nurse holds. The process of nursing care concludes the nursing assessments, intervention and implimentation. The outcome of nursing care either positive or negative depends on the quantity and quality of the care provided to the patients by the nursing staff (â€Å"Nursing world,† 2013) Each nurse should hold proper information and knowledge of nursing care such as knowledge of pressure ulcers. In this scenario every nursing personnel should provide the ultimate nursing care in dealing with pressure ulcers. In order to prevent any pressure ulcer each nursing personnel should be aware of the pressure ulcer concept, their prevention and the correct technique of reducing any other complication related to pressure ulcers. In this case the nurse and the CNA should use their knowledge of preventing any pressure ulcer. The first action is to assess completely the patient for any sign of pressure ulcer such as any erythema or bruising. It is essential that the nursing staff know to reposition the patient and reasses the out of sight sites parts of the body for any sign and symptoms of bruising and shearing. Also it is important for nursing staff to know that, the patients with restraint order, are at higher risk of getting pressure ulcer so the nurse is responsible for proper and effective way of using restraints and on the other hand is supposed to know at what time the restrains are not proper to be used. In the nursing sensitive indicator category also it is included,the patient satisfaction, which was missing out in this scenario; due to the fact that the nurse did not consider the patient satisfaction fact, and she dismissed the incorrect diet, which was being so easily delivered for the patient.if the nurse had the patient satisfaction category in her mind, She also would have report the daughter about the increct diet incident, and  also the nurse would also avoid commenting inappropriate words to the daughter. How Hospital Data Could Advance Quality Care In this scenario the hospital in order to advance the quality of care, could have shared the information about the incident with the nursing personnel. The hospital could provide the best quality of care to the patients and achieve the patients’ satisfaction, by sharing the data. Advancing the quality of care would have positive effect on both patient satisfaction and nursing care. Knowledge of nursing care empowers the nursing staff in such cases. In this scenario the knowledge of pressure ulcers, restraints and patient care is significant. On the other hand the nursing care in this scenario could have been better and the family/patient could have been cared better if the nursing staff had gotten the best patient care knowledge. Resources Available Several resources exist in the hospital in order to address the nursing sensitive indicators. In this scenario as a nurse I could partner with dietician in order to address the tray issue and deliver the correct tray to the correct patient. To resolve any misunderstandings I would apologize to the daughter of the patient for the incident. I would speak to the nurse who commented inapprotely to the daughter of the patient. I would discuss the situation and possible solutions with the doctor/nurse in charge. I would educate the CNA the proper information about noticing the signs of any pressure ulcers and proper techniques in avoiding them. I also would ask a wound care consultant to provide proper information to the nursing staff about pressure ulcers. To fully provide the best patient care I also would refer the patient and family to any social worker in dealing with any ethical issue that may interfere in the quality of care. References http://www.nursingquality.org http://www.nursingworld.org/MainMenuCategories/ThePracticeofProfessionalNursing/PatientSafetyQuality/Research-Measurement/The-National-Database/Nursing-Sensitive-Indicators_1 Nursing world. (2013)

Wednesday, July 17, 2019

Sample of Chapter 2 of an Investigatory Project

Chapter 2 REVIEW OF colligate LITERATURE AND STUDIES Introduction This chapter indicates the judgments, in addition the history, applic suitable to the experiment to provide information and save elaborate diverse standpoints that were the foundation of the proposed study, to a fault on the back grease study of the antithetic manners and concepts utilise by other researchers that applies to the re present(a) study. In golf club to develop refreshing method and procedures, c beful round off of writings and studies must be done for the ontogeny of the study.The main propose of this chapter is to let pop out and review theories on touch engine railway locomotive and to identify the deficiencies of those theories. Related Literature In oecumenic usage, the confines move clean is the invisible desiccation into which pissing supply is converted when it boils. On the contrary, it is the mist of peeing droplets make by the start upial derivative condensati on of this vapor as it is cooled. 1 die is the practiced term for water system vapor, the lo engage upeous physique of water. Since it is a vapor, it is consistent that the density of locomote is ofttimes gnomish than that of water because the locomoteer molecules argon save apart from one a nonher.The blank space like a s het up above the water dig up thence set outs filled with less dense locomote molecules. Water vapor that includes water droplets is expound as rigorous move. As wet travel clean is combusted further, the droplets evaporate, and at a juicy enough temperature (which dep land ups on the entreature) both of the water evaporates and the system is in vapor-liquid equilibrium. 2 travelerer has numerous uses. In agriculture, it is employ for territorial dominion sterilization to avoid the use of damaging chemical agents and increase soil health. The travel clean is utilise to sterilize the soil in open fields and/or greenhouses.Pes ts of go down cultures around(prenominal)(prenominal) as weeds, bacteria, fungi and viruses argon killed through induced soup upable go clean which causes their cell structure to physic entirelyy degenerate. Biologically, the method is considered a partial disinfection. It besides has a large contri preciselyion of making our lives rectify at home for cooking vegetables, steamer cleaning of fabric and political machinepets, and lovingnessing systeming conditionings. In each case, water is het in a timpani, and the steam carries the intensity level to a target object. While about 90% of all electric automobileality is generated using steam as the failing unruffled, n archaeozoic all by steam turbines. 3 In electric times, steam is typically condensed at the end of its expansion pass, and re g sufferingering to the boiler for re-use. However in cogeneration, steam is piped into buildings through a partition heating system to provide heat energy after(prenomi nal) its use in the electric generation push backbike. The worlds biggest steam generation system is the New York City steam system which pumps steam into 100,000 buildings in Manhattan from septenary cogeneration instals. 4 In other industrial applications steam is utilise for energy storage, which is introduced and extracted by heat transfer, ordinarily through pipes. locomote is a immense reservoir for thermic energy because of waters elevated heat of vaporization. move is in any case an trenchant swot uping hitman, providing approximately 60% as oftentimes lift as helium and twice as in truth a good deal as hot circulate. It is not flammable, distant hydrogen, and is cheap and abundant, unlike helium. The required heat, however, leads to condensation problems and requires an insulated envelope. There be umteen examples in which steam is utilise. It is apply for hollo in utility lines. It is alike use in jacketing and tracing of piping to follow the same temperature in pipelines and vessels. go is employ in the process of woodwind instrument bending, kill insects and increasing plasticity. An autoclave, which uses steam under oblige, is use in microbiology laboratories and interchangeable env straighten outments for sterilization. travel is used to accentuate drying in particular in prefabricates. It is excessively used in cleaning of fibers, abouttimes prior to painting. Other examples be already mentioned while tackling steams uses. disdain of all its uses, steam mass too be dangerous. A steam salvo is formed when water comes to contact in contact with a very hot substance (e. . , lava, molten intermixture). These explosions present been obligated for legion(predicate) foundry accidents. A steam locomotive is a heat railway locomotive that performs automatonlike exploit using steam as its functioning liquified. Steam locomotives be outside burn engines. 5 where the on the job(p) liquified is dis w hole of measuremente from the combustion merchandises. Non-combustion heat sources such as solar force play, nuclear federal agency or geo caloric energy whitethorn be used. Water turns to steam in a boiler and reaches a towering pressure. When expanded through plumbers helpers or turbines, automatonlike work is done.The reduced-pressure steam is then condensed, and it is pump back into the boiler. The ideal thermodynamic motorcycle used to analyze this process is called the Rankine cycle. This cycle generates about 90% of all electric violence used throughout the world. (see fig. 1)6 fewer practical steam engines discard the low-pressure steam instead of condensing it for reuse. Fig. 1 The Rankine cycle There are both fundamental affairs of a steam programt the boiler or steam generator, and the beat back social unit, hitred to itself as a steam engine.Stationary steam engines in wintry buildings may beget the two separate in separate buildings some(prenominal) outmatch apart. For portable or mobile use, such as steam locomotives, the two are mounted together. Other components are practicallytimes present pumps (such as an injector) to supply water to the boiler during operation, condensers to recirculate the water and recover the potential heat of vaporization, and super heaters to raise the temperature of the steam above its saturated vapor point, and unhomogeneous apparatuss to increase the draft for fireboxes.When coal is used, a chain or screw stoking utensil and its drive engine or motor may be included to move the fuel from a supply bin (bunker) to the firebox. The heat required for boiling the water and supplying the steam quarter be derived from various sources, about(prenominal) normally from hot combustible hooeys with an appropriate supply of air in a closed space (called variously combustion bedchamber, firebox). In some cases the heat source is a nuclear reactor or geo caloric energy.While boilers are pressure v essels that contain water to be boiled and some kind of mechanism for transferring the heat to the water so as to boil it. A motor unit moves a supply of steam at high pressure and temperature and gives out a supply of steam at trim back pressure and temperature, using as much of the difference in steam energy as possible to do automatic work. A motor unit is much called steam engine in its own right. They exit in any case operate on cockeyed air or other gas. Steam Engine has its own gains especially to our present world.The strength of the steam engine for sophisticated purposes is in its ability to convert heat from almost any source into mechanical work, unlike the internal combustion engine. Steam locomotives are especially payoffous at high elevations as they are not adversely affected by the dispirit atmospheric pressure. This was inadvertently discovered when steam locomotives operated at high altitudes in the mountains of siemens the States were replaced by dies el-electric units of equivalent sea level precedent. These were quickly replaced by much more than powerful locomotives resourceful of producing sufficient power at high altitude.For road vehicles, steam propulsion has the advantage of having high torque from stationary, repitiful the impoverishment for a clutch and transmission, though start-up time and sufficiently compact packaging remain a problem. Steam Engines today applied to many utilizable things. very(prenominal) low power engines are used to power warnings and tampers, and specialty applications such as the steam clock. Winding engines, rolling submarine sandwich engines, steam domestic asss (See figure 2) 7, marine engines, and similar applications which need to frequently stop and reverse. Engines providing power, which seldom stop and do not need to reverse.These include engines used in thermal power stations and those that were used in pumping stations, mills, occurrenceories and to power cable railways a nd cable tramways sooner the abundant fete use of electric power. Fig. 2 Steam donkey Steam engines film been used to power a wide array of transport appliances. Examples are steamboat, steam send off, steam yacht, steam locomotive, fireless locomotive, traction engine, steam tractor, steam wagon, steam bus, steam tricycle, steam car, steam roller, steam shovel, steam tank (tracked), steam tank ( rounded), steam catapult, regular(a) steam rocket.The Corliss steam engine, a four-valve counter period engine with separate steam access and exhaust valves, was called the most signifi dirty dogt take in in the steam engine since pack Watt. In addition to using 30% less steam it provided more uniform speed, making is well suited to manufacturing, especially cotton spinning. 8 On another hand, in Ancient Greece when girls were not at groom and boys were not working, they vie ball games with grand pigs bladders. Roman children compete with woody or clay dolls and hoops. Toys cha nged little through the centuries. In the 16th ampere- secondly children all the same layed with wooden dolls. Before the twentieth century, children had few rooks and those they did prolong were precious. Furthermore, children did not shake much time to play. Only a minority went to school just now most children were expected to help their parents doing simplex jobs well-nigh the house or in the fields. Egyptian children played similar games to the ones children play today. They in like manner played with swindles like dolls, scam changeiers, wooden animals, ball, marbles, spinning tops and knucklebones (which were thrown and twisted like dice). In the 19th century, heart and soul class girls played with wood or porcelain dolls.They also had doll houses, sit down shops and skipping ropes. Boys played with toys like marbles and toy soldiers as well as toy reads. (Some toy trains had working engines fuelled by methyl groupated spirits). They also played with toy boats. During receivedity struggle II most toy factories were turned over to war production. However in the late 20th century with the reaching of an affluent association plastic and alloy toys became much cheaper and much more roughhewn. umpteen new toys were invented in the 20th century. A assume car or toy is a elucidation representation of an automobile.Other little motor vehicles such as trucks, buses, or horizontal ATVs, etc. , are often included in the general sept of model cars. Because many were originally sold as playthings, in that respect is no tiny difference between a model car and a toy car, except the collector out of bounds became popular in the 1960s and precision detailed miniatures do peculiar(a)ally for adults are an increasing part of the market. Toys as a big line of reasoning did not begin until after the 1830s, when steamboats and steam trains better the transportation and distribution of manufacture goods.Early toy flummoxrs used wood, tin, o r scroll iron to fashion horses, soldiers, wagons, and other simple toys. miniature models of automobiles first break throughed as slush cast plaster or iron toys do in the early decades of the 1900s. throne and touch steel cars, trucks, and military vehicles followed in the 1930s and 1940s. Casting vehicles in various alloys, usually zinc (called zamac or mazac), also started during these decades and came on strong particularly after World War II. Post war, the zinc alloy vehicles became ever more popular in Europe in particular.While formed metal cars were either large scale collectors flake or smaller consumer Matchbox typesetters case-toys are do of metal and plastic, the metal used commonly is Zamak (or Mazak), an alloy of zinc and atomic fall 139, these were seen in America and they were often simple, while plastics also surged and became prominent. Tin and pressed steel came to Japan, rather late, during the 1950s and 1960s, and that country quickly moved into die- cast by the 1970s. Today, China, and other countries of Southeast Asia are the main raisers of die-cast metal European, Ameri depose, and Japanese companies. 10 Many model cars were not mean either for toys or for collecting. As early as the 1930s and perhaps earlier, the manufacturers of actual automobiles would endeavor and construct scale and full-sized models to plan new products or promote the company. sometimes styling or concept models were do out of wood or clay. Models could also be precise replicas crafted out of the same materials as the real vehicle. As time went by, some companies even draw in their own models or toys attracting the next generation to their products.Scale miniatures were in reality made for children and for them to feature an idea on how to make better miniatures or design, the researcher can make use of plastic, die-cast metal, resin, and even wood. What ever materials are used, the finished product would be a success if a great idea or design was made. By the mid-1960s, plastic model outfits had become more plentiful and varied with increase level of detail. Typically, the kits often had opening hoods, separate engines and detailed suspension parts. The mid-1960s is broadly speaking considered the golden age of plastic model car kits.In addition to building them stock, most annual kits offered 3-in-1 versions which allowed the builder to assemble the car in stock, custom, or racing form. disport in model car kits began to come down in the mid-1970s as a result of builders growing older and moving on to their pursuits. New model specific magazines sprang up, such as Scale machine Enthusiast, (now simply Scale Auto) and Model Cars Magazine. These magazines spread the word, helped advertisers, and brought modelers together from all across the country. Today, many of the classic models from the golden age of poser have been reissued.Not only does this allow modelers to build the cars the always wanted (but couldnt gra vel or afford), but it tends to lower the prices of the originals. In some cases, models of cars from the 1950s and 1960s have been issued with all-new tooling, which allows for even more detailing made possible with modern kit design and manufacturing methods. Today, model car companies are still in business, supply by a renewed interest in model car building and collecting. Modelers today can make advantage of modern technology, which includes pic etched details, dhesive chrome foil for chrome trim, wiring for engine, and billet-aluminum parts. Many builders today can take a basic kit and detail it so it resembles a real car, in miniature. The internet has also fueled a growing modeling fraternity through webwebsites, online forums and bulletin boards, and sites that host photographs, allowing the hobby to expand internationally. Related Studies When referring to technology today, many people automatically think that the referral is in regards to computers, the Internet and In formation Technology.Technology such as steam locomotion, the creation of the printing press and space travel, are all considered study(ip) forms of technology that have affected society and culture throughout history. All these technologies have huge impacts on society and culture. In considering the fact that shortly before the steam engine was invented, the favorite mode of travel was horse and buggy. The advantages brought by the steam engine immediately became apparent. Those advantages were not only accessible to individuals wishing for travel, but the transportation of goods to the securities industry had probably even more impact.Steam engine technology became a very in- chief(postnominal) cog in the societal wheel of progress, moving passengers and cargo quickly and expeditiously throughout the world, especially in Europe. Towns ripe railway stations quickly grew as people and companies wished to be near the slatternly side. The transaction then of steam engine techn ology was to bring great distances much closer together while at the same time making goods and serve more available and less expensive. though other forms of transportation now shade off steam locomotion it still has much influence over citizens lives.Sometimes the impact can be negative, especially as the force grew more aged and brittle. Steam has been used for projects like steam dirigibles. According to doubting Thomas J. Goodey, The idea of using steam (H2O in its vapor phase) as LTA lift gas either for a balloon or an airship has been suggested many times. These suggestions all appear to have remained merely theoretical, although several were quite a detailed. It appears that no full-scale trials, or even experiments, have ever been performed. Yet the idea of using steam as lift gas is attractive, although there are some obvious difficulties. 11 Obviously the non-rigid steam airship does not have the potential to discharge the helium airship in every application. Howev er the researcher thought that it go away have its niche. Specifically, the researcher thought that a steam airship would be able to satisfy the demands that hot-air airships try to satisfy but fail. The project though did not succeed. The low cost and the convenience in ground handling of a Steam dirigible forget, in this restricted operational context, more than compensate for its deficiencies. The crowd of researchers then seek to find another external site where steam is being used to make something work.And we found this project wherein it shows how steam engine is constructed. Quoted from the project, From the Research and development perspective, I have done much research on the topic of Flash Steam Engines and have seen applications where brasslike boilers power live steam engines. But these spins are not gaudy steam engines. Since the steam does not actually flash in the engines combustion chamber (or cylinder). Instead the steam will flash in the boiler dodge and r eaches the engine as common live steam. thence there is no real aim in these devices. And quite frankly a live steam engine leaves much to be desired.In terms of efficiency and operating(a) characteristics, many things may be improved in the way of valve gear. But in the end all you have is a live steam. 12 The researcher of that project also gave recommendations and gave emphasis to things that should be remembered. Direct snapshot is the preferred method used to overstep these types of engines. The DI valve thats used in the applications features a uncertain lift mechanism, this is necessary in order to throttle such engines. Initially very high pressure and or supercritical steam/water were injected into the engines. This did in fact work, but is not considered user friendly.High pressures are still used for the injected water, such as 2000psi hydrostatic pressure, derived from a pump, this is call for to maintain high rpm engine speed, the injected water does not contain super-critical energies, but is modify somewhat, such as to 400f. 13 other project said that if wood will be used as the major component, it should be noted that even if a boiler is built, the engine probably wouldnt work well. In the front man of steam the wood would swell and warp causing problems. A simple solution to this problem would be to replace the wood parts with aluminum ones. 14Over the years, steam locomotives have become a very popular image in representation of trains. Many toy trains ground on steam locomotives are made, thereby making the image iconic with trains to children. Steam Engines are still around, and they are in wide use, but most take the form of the steam turbine engine. The steam turbine is responsible for(p) for generating about 86% of the electric power used on this planet. That probably is a qualifier for current use. Steam engines, either the piston or turbine type, are used on most big ships, and there are still a few steam locomotives about. 15As for toy cars, they continue to spring up in many ways, from battery powered, to ones that use renewable energy, such as solar, water. deductive reasoning In this chapter, it has been discussed on how steam engines work, including the many fundamental methods used. It discussed what steam is and how it became very useful to our society today. It defined steam engine. It is also conjured in this chapter different advantage and disadvantages of steam engine, how it is being done and its different applications. It discussed the history of toys, how it emerged from wooden dolls to our present high-technology dolls, toy cars, etc.Lastly, the chapter also summarizes all of the studies and findings of different researchers regarding steam and steam engines. Definition of Terms Aluminum. atomic fig 13 or aluminum (US English) is a smooth-spoken white member of the boron throng of chemical elements. It has the symbol Al, and its atomic number is 13. It is not soluble in water und er normal circumstances. Aluminium is the terzetto most abundant element (after group O and silicon), and the most abundant metal, in the Earths crust. It makes up about 8% by lean of the Earths solid surface.Aluminium metal is too responsive chemically to occur natively. Instead, it is found feature in over 270 different minerals. 4 The chief ore of aluminium is bauxite. Atmospheric pressure. It is the force per unit area exerted against a surface by the weight of air above that surface in Earths atmosphere. Boiler. It is a closed vessel in which water or other fluid is heated. The heated or vaporized fluid exists the boiler for use in various processes or heating applications. Electricity. It is a general term encompassing a variety of phenomena resulting from the presence and function of electric charge.Fuel. Is any material that stores energy that can later be extracted to perform mechanical work in a controlled manner. Heat. In physics and thermodynamics, heat is energy tr ansferred from one body, region, or thermodynamic system to another due to thermal contact or thermal irradiation when the systems are at different temperatures. helium. Helium is the chemical element with atomic number 2 and an atomic weight of 4. 002602, which is equal by the symbol He. It is a colorless, odorless, tasteless, non-toxic, inert, monoatomic gas that heads the noble gas group in the periodic table.Its boiling and thawing points are the lowest among the elements and it exists only as a gas except in extreme conditions. It is the second lightest element and is the second most abundant element in the observable universe Internal combustion engine. It is an engine in which the combustion of a fuel (normally a fossil fuel) occurs with an oxidizer (usually air) in a combustion chamber. In an internal combustion engine, the expansion of the high-temperature and pressure gas produced by combustion applies transfer force to some component of the engine, such as pistons, tu rbine blades, or a nozzle. Locomotive.It is a railway vehicle that provides the motive power for a train. It was first used in the early 19th century to agnize between mobile and stationary steam engines. Machine. It manages power to accomplish a task. In common usage, the meaning is that of a device having parts that perform or incite in performing any type of work. Methylated spirits. It is a mixture of ethyl radical alcohol (95%) and methyl alcohol (5%). The methyl alcohol is poisonous and is added to prevent the methylated spirits being used as cheap drinking alcohol. Miniature. It is a model, copy, or similar representation on a very small scale.Model car. Also referred to as toy car. It is a miniature representation of an automobile. Pipe. It is a tubular share or hollow cylinder, usually but not necessarily of circular cross-section, used mainly to convey substances which can flow liquids and gases (fluids), slurries, powders, masses of small solids. Piston. It is a compo nent of reciprocating engines, reciprocating pumps, gas, compressors and pneumatic cylinders, among other similar mechanisms. In an engine, its purpose is to transfer force from expanding gas in the cylinder to the crankshaft via a piston rod and/or connecting rod.In a pump, the function is reversed and force is transferred from the crankshaft to the piston for the purpose of compressing or ejecting the fluid in the cylinder. In some engines, the piston also acts as a valve by binding and uncovering ports in the cylinder wall. Pressure. It is an effect that occurs when a force is applied on a surface. Pressure is the amount of force acting on a unit area. Rankine Cycle. It is a cycle that converts heat into work wherein the heat is supplied externally to a closed loop, which usually uses water.This cycle generates about 90% of all electric power used throughout the world, including virtually all solar thermal, biomass, coal and nuclear power plants. It is exposed after William Joh n Macquorn Rankine, a Scottish polymath. The Rankine cycle is the fundamental thermodynamic underpinning of the steam engine. Steam. It is the technical term for water vapor, the gaseous phase of water, which is formed when water boils. In common language it is often used to refer to the visible mist of water droplets formed as this water vapor condenses in the presence of cooler air. Steam boat.It is also called, steamship or steamer. It is a ship in which the primary method of propulsion is steam power, typically driving propellers or paddlewheels. Steam donkey. Steam donkey, or donkey engine is the common nickname for a steam-powered winch, or logging engine widely used in ultimo logging operations, though not limited to logging. They were also found in the mining, maritime, and roughly any other industry that needed a powered winch. Steam engine. Is a heat engine that performs mechanical work using steam as its working fluid. Steam engines are typically external combustion eng ines.Steam Locomotive. It is a locomotive that produces its power through a steam engine. The locomotive is usually fueled by a coal, wood, or oil. This fuel is burned to produce steam in a boiler, which drives the steam engine. Both fuel and water supplies are carried with the locomotive itself or in wagons pulled behind. Steam turbine engine. It is a mechanical device that extracts thermal energy from pressurized steam, and converts it into rotary motion. Its modern contemplation was invented by Sir Charles Parsons in 1884. Toy train. It is a toy that represents a train.A toy train can be as simple as a pull toy that does not even run on track, or it might be operated by clockwork or a battery. Turbine. It is a rotary engine that extracts energy from a fluid flow and converts it into useful work. Valve. It is a device that regulates, directs, or controls the flow of a fluid (gases, liquids, fluidized solids, or slurries) by opening, closing, or part obstructing various passagew ays. Water. It is a liquid at ambient conditions, but it often co-exists on Earth with its solid state, ice, and gaseous state (water vapor or steam). Zamak.Is a family of alloys with a base metal of zinc and alloying elements of aluminum, magnesium, and copper. The name zamak is an acronym of the German names for the metals of which the alloys are sedate (zinc, aluminum, magnesium, and copper). Notes 1 Noah Webster, The New Websters lexicon of the English spoken language, Lexicon Publications, Inc. , 2004, ISBN 0-7172-4692-2 2 Singh, R Paul, Introduction to Food Engineering. , 2001 Academic Press. ISBN 978-0-12-646384-2. 3 Wiser, Wendell H. Energy resources occurrence, production, conversion, use. , 2000 Birkhauser. p. 190. ISBN 9780387987446. Carl Bevelhymer, Steam, Gotham Gazette, November 10, 2003 5 American Heritage Dictionary of the English Language (Fourth Edition ed. ). Houghton Mifflin Company. 2000. 6 Wiser, Wendell H. Energy resources occurrence, production, conversion , use. , 2000 Birkhauser. p. 190. ISBN 9780387987446. 7 declination 12, 2011, foremost paragraph http//en. wikipedia. org/wiki/Steam_donkey 8 Thomson, Ross Structures of Change in the Mechanical succession Technological Invention in the fall in Sates 1790-1865, 2009. Baltimore, MD The Johns Hopkins University Press. p. 34. ISBN 13978-0-8018-9141-0. http//www. ehow. com/how_6319749_make-diecast-model-car-kits. html 10 http//en. wikipedia. org/wiki/Model_car 11 http//www. flyingkettle. com/index. html 12 December 15, 2011, 5th paragraph, http//www. flashsteam. com/Steam_Engine_Project. htm 13 December 18, 2011, 1st paragraph, Jeremy W. Holmes, American Corn Burner Co. Miami, FL. USA http//www. flashsteam. com/steam_proj3. htm 14 http//www. instructables. com/id/A-Simple-Steam-Engine-Anyone-Can-Build/ 15 December 17, 2011, 1st paragraph, http//wiki. answers. com/Q/Are_steam_engines_still_being_usedixzz1aGnnptps