Wednesday, October 30, 2019

How technology has effects on humans everyday Essay - 1

How technology has effects on humans everyday - Essay Example taking part in all spheres of human activities as the prime factor of people, knowledge is increasing due to many challenges encountered such as education, life expectancy, health care, communication, and wars, natural environmental activities among others. As the day goes necessities tend to spawn and most invention is ushered in with the need of the betterment present globalized world that we exist in a time of advanced technology has shifted to more advanced technology in almost every part of our daily live, everything is related in comparison with old gone days, nowadays we have better sophisticated facilities and even better comfort luxuries with the help of newly increased technology (Scardamalia, 1996). There are more impacts with the coming of improved technology in our daily life like the introduction of the mobile technology that is growing immensely as media for interacting and communicating with our relatives living far away. Secondly, when one wants to travel its easier with the help of aviation technology in order to reach distant places within the shortest time possible which used to take a century in older days. Through technology, social networking has made it able to share different ideas and views with people from other three continents (Scardamalia, 1996). Technology has also helped in agricultural fields through exchanging of food and commodities, meet food requirements of varied people all over the world with ease. Through cyberspace, people are able to do many new things, for example, when using the internet to learn distance courses in our colleges and one also takes online courses through the internet which has made the education life easier. Moreover, with the rise of internet technology the world knows one is able to carry business and trade has become very fast and easy and more reliable since it enables people to transact business with someone who is far. Lastly, with the creation of automobile vehicles that assists us to carry out

Monday, October 28, 2019

Benefits of Electric Vehicles Essay Example for Free

Benefits of Electric Vehicles Essay 1: Problem Statement The market for plug in vehicles is growing more competitive since variety of manufacturers are increasingly offering plug in hybrid and battery electrical vehicle. However, the initially adopted two key drivers, lower operating cost and zero emission driving, are not proving to be as effective as expected. The market for Electrical Vehicle is still struggling to expand towards more mass-market. The purpose of this research is to acquire knowledge and get a better understanding of the cost- benefit of plug in electrical vehicles as well as its’ impact on environmental and financial policies. Questions!! What are the cost and benefits of Electric Vehicles? What is the environmental impact of electric vehicles? How can environmental and financial policies influence on consumer support? 2: Popular sources [IF USED—THESE DON’T COUNT TOWARD THE FIVE SOURCE REQUIREMENT] Write a brief summary of the key information found from your bridge sources and popular source phase of the research. Source cited Give the key points and issue that have broadened you understanding into the problem you are researching 1. Green vehicle. http://en.wikipedia. org/wiki/Electric_vehicle An electric vehicle is any motor vehicle that uses one or more electric motors or traction motors as a driving force. There are three main types of electric vehicle exist, those that are directly powered from an external power station, those that are powered by stored electricity originally from an external power source, and those that are powered by an on-board electrical generator, such as an internal combustion engine (a hybrid electric vehicle) or a hydrogen fuel cell. These vehicles are environment friendly as they release almost no air pollutants at the place where they are operated. They also have less noise pollution than an internal combustion engine vehicle. EV gives the greater degree of energy resilience as electricity is a form of energy that remains within the region where it produced. 2. Green Cars and Todays Economy. http://www. consumerenergyreport. com/green-cars-and-todays-economy/ According to this article, plug-in hybrid electrical help the economy and personal expenses can determine which green car to buy. The article specifies the pros and cons of having an electric vehicle. Among the advantages are low insurance cost, low gas cost, job creation and better air quality. The disadvantages include maintenance, initial cost and battery life. 3. Negative Environmental Impacts of Hybrid Vehicles. http://greenliving. lovetoknow. com/Hybrid_Vehicles_Negative_Environmental_Impact This article describes the negative environmental impact Hybrid vehicles. It defines different kinds of hybrids. It questions the source of electrical power for hybrids. According to the article hybrid cars are not emission free. The batteries contain nickel in them and are considered toxic. Two other negative aspects that are covered include the negative impact of high voltage wiring and the initial cost associated with the green Car. 3: Scholarly sources List of sources broken down by discipline: Source cited Research process Qualitative/quantitative Framing or norm/post/critical Key insights/theories/points How does this understanding conflict with any other insight/theory or concur 1. Ecology a) R. Socolow, V. Thomas (2000). The Industrial Ecology of lead and electrical vehicle. Journal of Industrial Ecology. Volume 1, issue 1, Pages 13-36, January 2000 b) Title, author? Journal of Environmental Planning Management; Jan 2009, Vol. 52 Issue 1, P79-96. According to this paper, a common risk analysis of electric vehicles is misguided, because it treats lead batteries and lead additives in gasoline on the same footing and implies that the lead battery should be abandoned. The authors stated that â€Å"The use of lead additives in gasoline is a dissipative use where emissions cannot be confined: The goal of management should be and has been to phase out this use. The use of lead in batteries is a recyclable use, because the lead remains confined during cycles of discharge and recharge. † Clean recycling of the lead batteries should be the goal.. A management system closely approaching clean recycling should be achievable. The lead battery has the potential to become a hazardous product managed in the world. The tools of industrial ecology are helpful in identifying the key criteria that an ideal lead-battery recycling system must meet maximal recovery of batteries after use, minimal export of used batteries to countries where environmental controls are weak, minimal impact on the health of communities near lead-processing facilities, and maximal worker protection from lead exposure in these facilities. This research paper explores quantitatively Californians interest in hybrid electric vehicles (HEV) based on a statewide phone survey conducted in July 2004 by the Public Policy Institute of California. The paper develops factors that summarize beliefs about energy and the environment using principal component analysis. This study result concludes that the Californians concerned about the environment, energy efficiency, global warming and recent increases in the price of gasoline state a higher interest in hybrids. Another important reason for considering hybrid electric vehicles, however, is the possibility of using high occupancy vehicle (HOV) lanes while driving alone, especially for people with potentially long commutes to work. The findings also suggest that beliefs about energy and the environment should be included in vehicle type choice models. First article is emphasizing on the negative impact that electric vehicle has on the environment whereas the latter one highlights on the eco-friendliness and the popularity of the EVs. Source cited Research process Qualitative/quantitative Framing or norm/post/critical. Key insights/theories/points How does this understanding conflict with any other insight/theory or concur 2. Technology. c) Systems for hybrid cars. Otmar Bitsche et. al. Journal of power sources 127 (2004) 8-15. d) The state of the art of electric, hybrid, and fuel cell vehicles. C. C. Chan. Proceedings of the IEEE, Vol 95, No 4, April 2007. The Otmar article gives us a detailed understanding of what plug-in hybrid electrical are and how their drive trains offer a wide range of benefits such as multifaceted performance improvements, reduced emissions and reduced fuel consumption compared to the internal combustion engine. It demonstrates how important the battery is in different hybrid cars for the right specific automotive application. It describes the cost and safety aspects in terms of battery type and performance of such vehicles. Competition alongside with legislation is pushing hybrid technology towards the future. The paper describes different types of hybrid vehicles and their advantages. It should therefore be considered to have a positive perspective to the reader. However one weakness to the article is that is is relatively technical and may not be appeasing to the general reader in order to understand hybrid cars in a nutshell. Also, the kind of hybrid that would be considered the best in terms of performance is not mentioned. The most significant aspect of the article is it describes all the different modes of hybrid operation and how regenerative braking affects the performance of the battery hence the author develops an important concept. The author approaches the subject matter through a unique method in which he describes stop-start hybrids followed by mild hybrids and full hybrids before focusing on purely electrical cars. The author argues while safety comes first, it is the cost that determines the most important factor to buying a hybrid. In contrast, the Chan paper describes the different state of the art hybrid vehicles in particular. These include Toyota Prius, Honda Civic, Ford Escape, Saturn vue, ISE transient buses and Honda FCX. Chan describes a detailed history of Evs, HEVs and FCVs which the Otmar paper tends to lack. The article describes the differences among Electric vehicles, hybrid electric vehicles and fuel cell vehicles and points out the advantages and disadvantages of each. The paper describes how a better understanding of control theory is essential for the future development of these vehicles. This article is useful in order to choose the right green car for ones individual needs. It describes the hybrid system car by car and is therefore very useful for understanding what is available in the auto market and what to expect from each individual model. The paper is more geared towards the general reader and offers a positive perspective. The most significant aspect of the article is that it is focused on individual car model. It is also in agreement with other sources on hybrid vehicles. The author makes a informative comparison in the form of a table where he compare and contrasts battery electric vehicles, hybrid electric vehicles and fuel cell electric vehicles in terms of propulsion, energy system, energy source and infrastructure, characteristics and major issues. These factors may arise to a debate on which type of green car is superior in overall performance. Source cited Research process Qualitative/quantitative Framing or norm/post/critical Key insights/theories/points. How does this understanding conflict with any other insight/theory or concur Economics. e) Fredrik Carlsson (2003) Costs and Benefits of electric Vehicles. A 2010 perspective. . Journal of Transport Economics and Policy, volume 37, part 1, January 2003, pp. 1-28. f) Consumer support for environmental policies: An application to purchases of plug-in hybrid electrical vehicle. Alex Coad et. al. Ecological Economics 68 (2009), 2078-2086. The Fredrick paper describes a social cost-benefit analysis with respect to the increase in electric vehicle number within the Swedish transport sector by the year 2010. According to the paper electric cars are socially unprofitable in spite of having a lower life cycle cost compared to their gasoline counterparts. This is due to government subsidies on electric cars which outweigh the benefits related to low fuel consumption. Despite the environmental advantages, electric vehicles are not very common and different means of financially supporting them is often subject to debate. The paper uses a cost benefit model to determine consumer welfare or utility and can be looked upon as having a normative perspective. The weakness of the paper is that it assumes too many assumptions which is not always realistic. It is a technical paper and therefore the mathematical section is not suitable for the general public. The most significant aspect of this research is to answer the question as to whether governments should subsidize electric vehicles and the conclusion is negative. In his conclusion the author states that due to too many uncertainties the case for public subsidies becomes uncertain. In contrast, the Alex paper describes how consumer motivation can be used to encourage the adoption of cleaner technologies. According to the author intrinsic motivation such as energy labels for cars and extrinsic motivation such as subsidies or fines can be used to encourage the adoption of cleaner technologies. The paper analyzes a survey data set of Swiss households. The results of this survey are of particular interest to policy makers who are keen on guiding consumers towards cleaner technology. This paper gives us a better understanding of intrinsic motivation which is the kind of motivation that comes from within ourselves and not from an outside source that rewards money or grades. Extrinsic motivation is guided by some type of external subject or reward. The paper analyzes to what extent consumers are willing to support public policies in order to promote energy efficient cars. The nature of the article is of normative perspective. The weakness of the article is that the survey was conducted on 1500 Swiss households. Nothing about the age or nature of these households are mentioned in the serve. The most significant aspect of the paper is that it gives one a better understanding of different motivation to get a job done. Although both these papers discuss about the economic perspective of plug-in hybrid electrical, they do so in very different way. While the former article is a cost benefit description of electric vehicles by utilizing an economic model, the latter can be considered as an article that describes the motivation that drives consumer support towards the purchase of a green car. 4: Disciplinary Overlapping: In all sources except for the Cost and benefits article it is mentioned that plug-in hybrid electrical are more cost effective than their gasoline counterpart. However, Fredrik Carlsson in his article mentions that electrical vehicles are socially unprofitable in spite of having a lower private life cycle cost and external cost compared to petrol cars. All six articles do however agree that plug-in hybrid electrical are more fuel efficient and environmentally friendlier than gasoline cars. give us a better understanding on what plug-in hybrid electrical are like and how they have evolved with time. mentions the different systems in hybrid vehicles while describes specific models helping us to choose which green car to buy. The cost benefits of buying a green car is discussed in, however, the source is based on many assumptions and the paper itself is very technical. focuses on intrinsic and extrinsic motivation that leads to support of environmental policies. The articles in general give us a better understanding of the problem statement. However one aspect that was overlooked by all the sources involves the environmental effect of different kind of battery systems, their waste and disposal. Category /Element Criteria Range: (Na)(No)(A)(M) Purposefulness (20) identifies a clear research problem and explains it; Readings chosen are relevant to the problem as defined (10-12),(13-15), (16-18),(19-20) 15 Grounding (40) identifies and adequately summarizes the constituent elements of each source: insights, theories or concepts, methodologies, sources of evidence; connects each source to a part of the problem that it helps illuminate (10-12),(13-15), (16-18),(19-20) 0 The selection of sources gives appropriate â€Å"coverage† of the problem (10-12),(13-15), (16-18),(19-20) 17 Critical Awareness (20). Student recognizes and explains how the different elements of each source affect the findings—methods, theories, concepts, assumptions; Student identifies meaningful conflicts or commonalities among different sources (10-12),(13-15), (16-18),(19-20) 17 Integration (20) Student makes intelligent comparisons between insights, theories, methods or data across disciplinary lines to support an improved understanding or cognitive advancement; explains how different ideas could be applied to an improved understanding (10-12),(13-15), (16-18),(19-20) 16 Total: 65.

Saturday, October 26, 2019

Essay on Toni Morrisons Beloved - How We Define Ourselves

How We Define Ourselves in Beloved  Ã‚     Ã‚   The idea of how we define ourselves is a topic that has much force in the novel Beloved by Toni Morrison.   Two of the characters in the novel have strongly opposite ideas of defining their own â€Å"selves†.   Baby Suggs displays a very healthy sense of self, completely based on only who she is as a person, and not relying on any other person to assist her in her definition.   She is an independent person and loves her own â€Å"self† greatly.   Sethe, on the other hand, has an unhealthy sense of self because who she is is strongly dependent on her interactions and relationships with her children. The above is excerpt is provided to indicate the focus of the essay. The complete essay begins below: The journey towards finding one’s â€Å"self† is a long and arduous one, twisting and turning in every direction.   The destination is a personal identity -- a definition of who one is, independent of anyone else. Some people find a straight path that leads them directly to the discovery of their â€Å"selves†.   Other people take the road that has many switch-backs and obstacles to overcome, but eventually these people make it to the destination of â€Å"self† as well.   There are still others who get lost along the way.   Ã‚  Ã‚  Ã‚   The process of finding one’s â€Å"self† is strongly reliant upon our interactions with other people.   From the beginning, as infants, to when we are still small children, we have no idea who we are or what our relationship to the world is.   Our perceptions of the world are through the eyes of our parents or guardians and other adults who try to teach us and show us the world.   They instill in us their own ideas of right and wrong, good and bad.   As we grow, our peers have much influence over h... ...t our own sense of "self".   We never stop learning and experiencing new things, so our definitions of "self" are constantly being challenged and sometimes altered.   However, when we begin to rely solely upon other people to know who we are, our "self" is no longer our own.   A true sense of "self" is responsive to one's interactions and relationships with people, but defined only by one's own mind and heart, independent of others.   The road towards personal identity is long.   Several people may help us out along the way, hydrating us as needed; carrying us as needed.   But, in the end, we hopefully cross the finish line on our own. Works Cited 1.   Kubitcheck, M.D.   Toni Morrison: A Critical Companion.   London: Greenwood Press, 1998. 2.   Morrison, Toni.   Beloved.   New York: Plume, 1987. 3.   One Flew Over the Cuckoo’s Nest. 4.   Secrets and Lies.      

Thursday, October 24, 2019

Africa Since 1940

The colonization of the African nation has played an important part on the world and how blacks were treated. What they endured as a people, showed the high element of inequality and injustice brought on by a group of people on to another. This period in time brought a change in a nation rocked with pain and anguish. Intervention and invasion from other countries saw the decline in the wealth that Africa once possessed. The notion that Africans were uncivilized was the mindset of the Europeans as they made their presence known. What they did was to manipulate the minds of the African people to gain what they set out to attain. Their goal has always been to rob them of their livelihood, to destroy and steal what were rightly the Africans. Ignorance and defiance became the downfall of many, as they trusted the words of the whites. The destruction and atrocities that Africans faced was indicative of the cruel way in which European invaded the nation and took control in the name of colonization. Many books made note of the colonizing of the African nation. Three of those great books are: African Since 1940 The Past of the present by Frederick Cooper, The Nigerian Civil war by John de ST. Jorre and African Perspectives on Colonialism by A. ADU Boahen. However, of the three books Boahen provides more supplemental materials that support my thesis. The most important economic change that occurred in Africa was during the period 1880-1960. This period marked the colonization and the scramble for African colonies. Boahen writes â€Å"The first and the most important of the economic changes that had occurred in Africa by 1880 were the abolition and suppression of that most inhuman and abominable of all trading activities- namely, the slave trade-and its replacement by trade in natural products, which has become known in typical Euro- centric terms as legitimate trade† (Boahen pg. 1). Slave trade exemplified the harsh cruelty that Africans faced. They were sold into slavery and beaten and many die during that time. The middle passage journey of slaves that were sold across the world to work on plantations proved to be the worst journey in history. Slave trade only profited the European as slaves were an aspect of making money for their masters. Not only were the African people forced to leave most of the power countries’ economies weak and on the brink of collapse. They needed new ways to generated money which they did by overflowing Africa and retaining most of the Natural resource such as ivory, diamond, and gold. The scramble for Africa open door to a new way of thinking: the county did not just change economically but socially. According to Cooper by the 1700s the era in, â€Å"Pan- Africanist was at its highest point of mobilization in African political history†. (Cooper 24) . For the first time westerners such as Marcus Garvey from African decedent who was captives of slavery, began to challenge imperialism. They launch organizations: International African Service Bureau based out of London. Regional linkages were established between countries and hybrid culture was form. People of western African coast began referring to themselves as nations. Black influential understood the gravity of slavery and knew that the change has to begin with them. The 1880 was a better time period in Africa because Slavery was abolished and therefore, the old African country way of life have been abolish to some degree in that now people were no longer under bondage. These individuals were free to live a life in less fear and with a more renew sense of hope for the future. It was good that a new Africa was emerging because this means that individuals will be more incline to want to strive for a better life for themselves and their families and to make a better future for their children. Moreover, after the abolition of slavery the formation of legitimate trade means that individuals could have a source of gaining employment to help to support their family. Boahen mentioned that in the 1880 (African had become more deeply integrated into the capitalist world-economy than before, a development which the ensuing colonial system was to intensify,) which exemplify the fact that Africa was become more stabilize as an economy in of itself where job can be provided for its citizen. (Boahen pg 5). The economy development of Africa in the 1880 meant that the qualities of life for the people were going to improve over time. With the economy improving this would open up individual access to job opportunities. The invasion of European forces into Africa brought a division among the African people. Elements that were formulated such as governmental, educational and their religious system were imposed in a cruel manner as many Africans throughout that time in history were brutally harmed by the Europeans. This abuse was due to the fact Different language religion and other aspects of life were enforced by the Europeans colonization. So, with the abolishment of slavery individuals learn both the language of their ormer ruling countries and the original language of their ancestors through parents teaching of their children. Language plays a crucial part in an individual culture as it is the mean through which communication took place. Cooper mentioned that â€Å"At any one moment, Africa appears as a mixture of diverse languages and diverse culture; indeed, linguistically alone, it is the most varied continent on earth† (Cooper pg11). This mean linguistically speaking Africa came out of the slave trade become a more diverse country. This diversity is obvious in more than one language that which is spoken by individuals from the continent of Africa. The African people depended on their cultural languages to bind them together. This help them to confuse their colonizers in their intent and goal of enforcing slavery. African understood the importance of language and how they could use it to their advantage. Additionally, the 1880 was a period in which the Christian missionary was also experiencing dramatic change. The change in the Christian missionary mean that individuals where having a renew view of religion and how it should be practice. Boahen also mentioned that change in the religion in African societies resulted in stratification, which means that there were different groups of individuals in the African society; therefore, the further stratification of African societies into a relatively small Christian educated elite, particularly in western and southern Africa, and a large traditional and illiterate group† (Boahen, 17). So, it is obvious that as people were becoming more educated they were more able to view religion from a different perspective. The 1880 was also a period in which there was changing political trends that were towards a sense of greater centralization. Boahen mentioned that even though there was a change in some of the empires in terms of disintegration such as empires such as Asante and Oye empires some empires became even stronger (Boahen, 2008). So, there were the emerging of new empires such as the Sokoto empire and the Tukulor empire of Masina that were in much larger existence especially in certain area state as the century in West Africa begins to emerge. New political change in Africa was evident in Nigeria such as constitutional experimentation (Boahen, pg 12). So, the constitution help to lay out the foundation for how individuals in the new African, societies wanted to be treatment by their government in making sure those individuals in the societies was educate. So, with modernization there came a renew way of engaging in political activities as it will benefit the country of Africa. However the prosperity and flourishing of the countries of economy depended on the mobilization of African leaders yet this did not come forth. Cooper writes â€Å"The development effort of late colonial regimes never did provide the basis for a strong national economy; economies remained externally originated and the state’s economic power remained concentrated at the gate† (Cooper 5). He was also concern about where the blame for the wars lie cooper writes â€Å"By looking at the post-war era as a whole, one can begin to explain the succession of crises that colonial and postcolonial states faced, without getting into a sterile debate over whether a colonial legacy or the incompetence of African governments is to blame† (Cooper 6). The African nation had many crises to deal with mainly poverty that resulted from the war. Colonization of the African people drove them deeper into poverty many regions had to sell their labor. Cooper writes â€Å"In parts of African, colonization drove rural dwellers into deepening poverty, sometimes as a deliberate policy to create labor reserves where people had little alternative to selling their labor cheaply, sometimes as a result of actions which made difficult ecosystems worse† (21). Poverty is one of the worst elements of people’s lives and this epidemic led the African people to seek for help. War is the most dreaded and the resulting effect of break-down of laws and orders in a civilized society. The Nigerian civil war which is known as the â€Å"Biafra War† took place on July 16th 1967 to January 15th 1970, political conflict was caused by the attempted secession of the southern providence of Nigeria as the self-proclaimed republic of Biafra. The conflicts accrued when Great Britain invaded Africa and divided up the some of it colonies causing a great separation among the African people; where people in the north were Muslims and in the south were Christian. However due to the division it ended in economic, ethnic, cultural and religious tension among the various peoples of Nigeria. During the war millions died and many were displaced leaving the colony in a state of distress. Due to the war hunger and starvation arose in Biafra many young children died; soldiers were out raged and they decided to take matters into the own hands St. Jorre writes â€Å"hungry soldiers tried to hijack a food convoy, and he beat them to a pulp† (St. Jorre pg. 251) this provided the severity and level of starvation that was felt in Biafra that even those responsible for aintaining the law put their needs above the people. Starvation does not respect anyone and during this period it evident that hunger claimed many lives. The depth and continuance of the war resulted in more deaths as starvation continued and no help was evident. As the Biafra’s people would look for help from the western world it was eminent that something needed to be done. The starvation was not ending and if they could only receive a little help it could go a long way this could be attain by pricking the conscience of the western world. ST.  Jorre writes â€Å"By striking at the heart of the Western world’s moral conscience with the real threat of millions starving to death if the war continued, backed up the imagined one of genocide if they surrendered, they succeeded where all their other tactics intensive lobbying, signing the oil away repeated appeals to the religious, ideological and the political sensibilities of the outside world had failed† (ST. Jorre pg. 241). This sad way of life was the start of new recognition for other African countries that had to deal with the epidemic of starvation. ST. Jorre writes â€Å"The immediate benefits of such concern were useful enough, especially the money, the lobbying publicity and public support that followed each new starvation newspaper story or television film† (ST. Jorre pg. 242). Even in such distraught moment in history something good came of it as the Western nation would become aware of it and help to prevent an occurrence elsewhere. African people endured the worst life possible due to greed from their European colonizers. Their lands were invaded and lives were destroyed as many were taken as slaves to work on plantations to make money for them. What the Europeans did not only hurt the African people physically but emotionally too they have never recovered. This led to war on the Continent as poverty took over and the means of survival was as the height in the minds of all Africans. Many aspect of their lives were taken away their culture, their language and their believe were destroyed. The European brainwashed the African people and took over and kill many in the process.

Wednesday, October 23, 2019

Hartley’s novel Essay

Although appearing to have a cynical view of love in the poem Larkin does in fact not doubt love, but the expectations that we have of it. In the words of Andrew Swarbrick, Larkin expresses not feelings of bitterness or pessimism but â€Å"of pathos, of a tender sympathy for the widow who recalls dreams knowing they are best forgotten. † Though sometimes pleasurable reminiscing can reveal hopes that were unfulfilled, dreams never lived out, good times we can never experience again. Therefore what we perceive to be pessimism in Larkin is, in this instance, simply realism, an understanding of the illusions contained in the world, making him â€Å"less deceived† as a result. He once remarked, â€Å"Poetry is an affair of sanity, of seeing things as they really are† it was for him a way of being honest, not overestimating the value of things. Nonetheless, in the final poem of The Whitsun Weddings, An Arundel Tomb, Larkin hints at his belief in love. Despite not having a successful love life himself he still implies that he has faith in its existence, the ultimate word of the anthology being the abstract noun, â€Å"love†. This line is a testament to its endurance and strength, â€Å"What will survive of us is love. † John Saunders likens these lines containing the â€Å"prove/love† rhyme to Shakespeare’s attempt to define true love in Sonnet 73, Larkin’s concluding line echoing the rhyming couplet, â€Å"If this be error, and upon me proved I never wrote, nor no man ever loved. † An Arundel Tomb concentrates on the historical aspect of the past. The persona in the poem, which is in fact Larkin, examines the concept of artifacts, how something set in stone can withstand the test of time regardless of whether it actually existed in the first place. Visiting a Sussex churchyard Larkin sees an example of love that both moves and intrigues him, had it not been for the incongruity of two linked hands displayed on the tomb he would have walked by. It is a gesture small yet touching but the cynic in Larkin questions its validity presuming it to be a case of â€Å"a sculptor’s sweet commissioned grace† rather than a symbol of a long and devoted marriage. Together in death the couples’ â€Å"faces blurred† but the husband is still â€Å"holding her hand†. Over time their features have been weathered but their effigy remains as a reminder of their lives, a monument to their love. Archaic language is used to complement the subject matter of the poem, capturing a bygone time so unlike today’s â€Å"unarmorial age†. Further manipulation of syntax is evident with the effective juxtaposition of the adjectives â€Å"sharp† and â€Å"tender†, conveying simply but perfectly Larkin’s confused and mixed reaction to the union of the stone hands. There is debate over Larkin’s true feelings towards the real meaning of the â€Å"faithfulness in effigy†. Whether or not he again intended the pun with the use of the verb â€Å"lie† just as lovers were â€Å"lying together† in bed is unclear. As Brother Anthony (An Sonjae) points out in his paper Without Metaphysics there is a huge diversity in the interpretations of Larkin’s intended meaning in his work, it is up to the reader to determine their own response â€Å"which is good for the reader, but a challenge too†. Does the poet believe that â€Å"love survives† not only in stone? Or as Andrew Swarbrick quite rightly points out does he â€Å"almost† believe it as the penultimate line suggests? â€Å"Our almost-instinct almost true† therefore cancels out the optimism of the following statement. Here we witness Larkin lowering his defenses, allowing himself to hope for the best, to want love to be â€Å"that much mentioned brilliance† but he cannot do so completely for fear of it being an illusion. Although hinting at what he truly believes it is as though he will not allow himself to trust it in case he is mistaken. Yet whether love survives or not it lives on in Arundel where â€Å"only an attitude remains†. This is also true of Larkin’s poetry, and in fact to the whole genre. Whereas fictional characters and places from novels are lost, forgotten, poetry allows thoughts to survive as art long after the death of the artist. Larkin wrote of this inspiring philosophy in 1955, contained in a statement to D. J. Enright he explained, â€Å"I write poems to preserve things I have seen/thought/felt†¦ I think the impulse to preserve lies at the bottom of all art. † Yet as mentioned previously the meaning of Larkin’s literature is not always clear, just like he could only assume the significance of the joined hands we can only guess at the thoughts of Philip Larkin which are contained and live on in his verse. The poem Dockery and Son relates the events and emotions that occur when Philip Larkin revisits his old college, steps back into the past only to be disappointed with what he finds there. An outsider there, he no longer belongs and finds himself a stranger in his own past, as well as physically being unable to enter his past residence â€Å"the door of where (he) used to live† is also â€Å"locked† metaphorically. However, the most disturbing thing for Larkin is the news that one of his peers now has at son at Oxford: Dockery unlike Larkin with â€Å"no son, no wife, no house or land† is a success story. The door to fatherhood is therefore also â€Å"locked† for Larkin. By starting with dialogue the poem is made more authentic as it adds an injection of reality to the verse. It also alerts Larkin to the fact that he is no longer part of that world, of public school boys and ranks, he, unlike Dockery, has no reason to revisit that part of his life. He feels â€Å"ignored†. As in The Whitsun Weddings Larkin philosophizes whilst on a train which is not only a vehicle in the normal sense of the noun but a vehicle for his thoughts and also a metaphor for direction, moving forward in life. The simplistic repetition in the third stanza â€Å"How much†¦ How little†¦ † conveys Larkin’s disappointment in himself as he contemplates his own achievements in comparison with those of Dockery. Whereas Leo Colston benefited from his nostalgic visit to the past it has been a negative experience for Larkin who should never have returned. Both Larkin and Hartley present philosophies on the past in two contrasting but equally effective genres, which themselves give insight into the pasts of the authors. The past is, as both pieces of literature show, inevitably significant to us all. How we are affected by it however, either negatively or positively, is to some extent in our own hands. â€Å"Even a god cannot change the past† (Agathon 445 BC) yet we can move on, learn from our experiences and in the future be â€Å"less deceived†. L. P. Hartley’s novel is a message to us all that we should not dwell on what has come before, but concentrate on living the present, Leo recognized that he â€Å"should not be sitting alone† before it was too late. In reality the past does not fully exist; in the words of Larkin it is a â€Å"love song† that can never sound the same, a â€Å"locked† door which we can never be reopened, â€Å"only an attitude† that lives on in our minds. We may try to capture moments and emotions in stone, or in verse yet the only place where they truly exist is in our memory. We have the ability to dictate the significance the past holds for us. And so whilst we cannot change our pasts, we have the ability to change our future; Shakespeare declared that â€Å"What’s past is prologue† yet we can determine what is contained in the epilogue.

Tuesday, October 22, 2019

The Evils of Drug Addiction

The Evils of Drug Addiction Free Online Research Papers Drug addition is one of biggest problems in our society today. It is not only a personal problem that dramatically affects individuals’ lives, but it is a major problem that affects society as whole. Therefore, it is necessary for us to think of the reasons people take to drug addiction, how it affects us, and the method to solve it. Why does man take to drugs? Some think it adds to pleasure; some others think that it take away physical weariness. Still others take it to forget their worries, while others take it to please the company they keep. In cold country, they take it to keep themselves warm. While in very small doses drug act as medicines, they can only bring harm in large doses. They have a doping effect and hence, at the spur of the moment, the person may act vigorously but only find him weaker later. Sustained consumption of them in large quantities will lead us to dependency and addiction. Drug addiction is really harmful for our society. Once one becomes addicted, he cannot control himself. He can do anything to have drugs when his addiction comes. When he doesn’t have enough money to buy drugs, he might rob or even murder to have money. Thus, it is easy to understand that drug addiction leads to crime. Drug addition also damages the economy of our society because drugs are very expensive. The rich will become poor, and the poor will become homeless if they are addicted. Using drugs makes people lose their morality. They are no longer who they were before. All they want and think about is how to satisfy their addiction. They don’t care about their families. They give up their responsibilities. They don’t care about anything in the world, and all they care about is drugs. If all of people become addicted, what will our society be? Drug addiction is also harmful for their health. They may have diseases or die when overusing drugs. People bring troubles to themselves when they use drugs. In order to forget worries, they take drugs, but that is not the answer to one’s worry. Drug addition brings moral degradation. The addict himself knows it, so he consumes them only in secret and no addict openly say he is an addict. Socially, an addict is looked down upon and people would try to avoid a drug addict. He would be a nuisance wherever he is at home or in company. He would bring untold misery to his people and those around him. Except in the company of addicts, he would be looked upon as a leper. His family will also share the ignominy because people will point the accusing finger at such a family. Financially it ruins the addict. He will be bankrupt no matter how rich he is because of spending money to buy drugs. Considered wisely, people should avoid drugs and never try to take drugs even once because it is very difficult to quit using them. It is really unfortunate if they don’t realize the harmful effect. Certainly, the drugs will not and cannot add or bring pleasure. If anyone thinks in that way, it is an illusion. For God’s sake, one should never tempted by them. Research Papers on The Evils of Drug AddictionThe Effects of Illegal ImmigrationThe Relationship Between Delinquency and Drug UseCapital Punishment19 Century Society: A Deeply Divided EraMind TravelGenetic EngineeringEffects of Television Violence on ChildrenArguments for Physician-Assisted Suicide (PAS)Relationship between Media Coverage and Social andInfluences of Socio-Economic Status of Married Males

Monday, October 21, 2019

The Five Sexes, Revisited Essay Essays

The Five Sexes, Revisited Essay Essays The Five Sexes, Revisited Essay Paper The Five Sexes, Revisited Essay Paper Essay Topic: The Visit The reading The Five Sexes. Revisited was about the deceit of today’s two-sex system in society. The cardinal issue Anne Fausto-Sterling addresses is that there are people born outside of dimorphism and most people do non understand this ( pg. 122 ) . The most of import point or cardinal statement is that the two-sexes. male and female should no longer be accepted. Alternatively. five-sexes should be accepted: male. female. â€Å"herms† . â€Å"merms† . and ferms† ( pg. 121 ) . An of import fact the writer makes is. â€Å"†¦we calculated that for every 1. 000 kids born. 17 are intersexual in some form† ( pg. 122 ) . This spot of information proves that there are babies born between the sexes male and female. It is of import for people to recognize that assorted babes are in being. Anne Fausto-Sterling besides portions a narrative of a born intersexual. â€Å"Consider for case. the life of Max Beck: Born intersexual. Max was surgically assigned as a female and systematically raised as such. Had her medical squad followed her into her early mid-twentiess. they would hold deemed her assignment a success because she was married to a adult male. Within a few old ages. nevertheless. Beck had come out as a dike lesbian† ( pg. 124 ) . It all comes down to society and this narrative proves it. If the universe were more unfastened to these sex issues. so we would non hold these issues in the first topographic point. In Max’s instance. being born intersexual would non hold been an issue in Max’s life. Alternatively. the physicians chose Max’s gender without any consent from Max. Another interesting fact that Anne Fausto-Sterling uses to endorse up her statement is â€Å"The logical construction of the commonly used footings â€Å"true intersex. † â€Å"male pseudohermaphrodite† and â€Å"female pseudohermaphrodite† indicates that merely the alleged true intersex is a echt mix of male and female†¦Because true intersexs are rare – perchance merely one in 100. 000 – such a categorization system supports the thought that human existences are an perfectly dimorphous species† ( pg. 124 ) . The writer makes her argument stronger with this fact because she is connoting that those who have hidden male and female parts are non â€Å"true† mixes ; hence. the little per centum of â€Å"true† intersexs is so infinitesimal that the lone sexes that should be considered are male and female. The issue is. nevertheless. is that there are still many people with concealed parts inside them that the society does non take into consideration. which is take downing to those â€Å"merms† and â€Å"herms. † The Five Sexes. Revisted aids do it apparent that gender is non an issue if society would non do it an issue. The writer makes it clear that gender is socially constructed. construing the differences between sexes. ranking males higher ; nevertheless. there are adult females merely every bit masculine as some work forces. It is true that many extremely masculine people are in fact adult females. and some of the most feminine people are work forces. There are many misconceptions with the sexes and the stereotypes associated with them. The boundaries dividing work forces and adult females are non easy to specify. which implies that work forces should non be considered overmastering or have more privileges than adult females.

Sunday, October 20, 2019

Get your financial life in order before the new year

Get your financial life in order  before the new year Are you finally ready to get your financial health in better shape? If so, then you’re thinking wisely, because it’s never too soon to start taking your relationship with money more seriously and plan for your future- like it or not, it’s going to come eventually, and those who prepare for it in advance will be ready to face it responsibly and with as little anxiety as possible. For most of us, the future can be an uncertain entity- what our professional and personal lives will look like as the months, years, and decades roll forward can be difficult to predict, and unexpected twists and turns along the way can derail our plans and force us to revise our goals along the way. This uncertainly can cause a great deal of stress, so it makes sense to have as much under our control and working in our favor as possible. Having a financial safety net of sorts to help see us through is obviously beneficial.Have we convinced you that it’s a good idea to start gettin g your financial life in order? If so, then keep reading, and consider using the following strategies to get you started on the right path.Get seriousOne of the most important aspects of getting yourself in good financial shape is to get in the proper mindset for doing so. Like most endeavors in life that require a change in behavior and extended displays of discipline, being in the right mental space at the onset, during the critical first steps, is an essential ingredient for success.So, in order to get started with the right attitude and mindset, try making a list of goals for getting your life in financial order. Both short- and long-term goals are fair game here. Do you want to pay back a loan or reduce your debt? Do you want to make a significant purchase sometime in the future that you want to be in better financial shape for, like a car or home? Are you preparing for a major life change, like a move or starting a family? Having a set of tangible (and achievable!) goals on yo ur radar can help you get in the right mindset for making smart financial decisions- both now and over the long haul. The truth is, sometimes it takes having a destination in your sights to make it through a long journey.Start smallFor most of us, we can’t simply buy our way to financial freedom- it’s more of a long, hard road than a quick sprint, and it’s a journey that often never has a definitive end. So, think of your initial move to get your financial life in order as a series of small steps in the right direction. Even if they don’t completely change your life in an instant, they’ll get you moving in the right direction and will help you develop fiscally responsible behaviors, build on your positive inertia, and bolster your mindset and discipline.Think of some small ways you can get started- perhaps save a little bit of money each week from each paycheck or find a few ways you can earn some extra money (a part-time job or selling some of you r unwanted stuff are great ideas). You can also try eliminating some unnecessary expenses in your life. Don’t look back- like any great journey, getting on the road to financial order begins with a single step.Get helpOne of the really nice things about getting your financial life in order these days is that there are more tools than ever before to help you stay on track. An army of app developers have devoted their efforts to creating financial planning, organizing, and saving tools that can help you get your finances in order and hit all of your money milestones along your path to financial freedom. A little Internet research to discover the latest and greatest apps that best meet your needs is time well spent. Many available apps are free or low cost, so testing some out and discovering the ones that work well for you through trial and error won’t be a monumental investment.You can also turn to friends and family for help- the truth is, having the important people i n our lives helping to keep us motivated can mean the difference between success and failure in a challenging situation. So, let your friends and family know about your financial plans, fill them in on how they can help, and use their support to achieve your goals.Getting your life in financial order may not be easy, and you may stumble and restart at times along the way, but it’s a journey worth taking, and one that’s best to start early. Use the advice and strategies presented here to help get you moving in the right direction when it comes to your money and finances.

Saturday, October 19, 2019

Finance (Case Study) Essay Example | Topics and Well Written Essays - 1750 words

Finance (Case Study) - Essay Example They should work out how much (after paying off all their debts and driving down their expenditure) they can save every month. Good saving habits and practices begin with a clear knowledge and understanding of what one is capable of and how much one can spend at any given time without negatively affecting his/her financial health. The couple must therefore know how much they are capable of saving every month, compare that figure to the actual amount they are saving and then start cutting down on unnecessary spending. Work out a Saving Plan Ascertaining saving is only the first step. It acts as a precursor to the next course of action, which is working out a saving plan. The most important thing to note here is that one thing leads to the other, and in a case like this it is advisable to move in a systematic and methodical manner. Assuming the couple has now figured out how much they are capable of saving every month, they can now move to achieve that goal. All expenditures should be planned in such a way that the saving targets are either met at the end of every month (or even surpassed). So long as the couple is saving money, meeting its targets and avoiding unnecessary expenditures, a strong financial foundation has been laid which will act as a launching pad for financial security and freedom. Their Current Financial Situation I would say that the couple is currently doing fine. Their total expenditure per annum is $228,348, compared to their total income per annum which is $294,650. This means that at the end of every month they are able to save $66,302. In addition to this, their investments and assets total $1,771,500, while their total debt is $28,965. I would therefore say that since the couple is not in debt and they are able to save some money, their financial position is pretty healthy. As a consequence, it is possible that through better saving and spending habits, they can save even more money and maintain a positive financial outlook going forward . All the Aspects of their Finances Kevin and Alex are capable of saving more than they are saving now. The only thing they need to do is to eliminate any unnecessary costs and expenditures that can only serve to increase their debt. It is however encouraging to see that both of them have invested in either a superannuation or some other type of fund. Alex diverts a portion of her salary ($33,000) to a superannuation fund, while Kevin has invested in a superfund. Apart from this, the couple has invested in a share portfolio, an investment unit and a debenture. The superannuation is important because it provides them with a sense of security and something to fall back on once they are either retired or are unable to work. The debenture, investment unit and share portfolio also offer viable financial alternatives that would otherwise be unavailable if the couple did not seek financial security. Their Overall Situation I would laud the couple for making efforts to secure their future, because although they are faced with numerous financial challenges, they are managing to stay afloat. With a combined income of less than $300,000, it is commendable that they have made some very good investment moves. They took out a mortgage, and even though it was $850,000 at the time they took it, their house is now worth $1,050,000. This means that once they stop remitting the monthly payments that are due, they will own their home and probably get even a higher value for

Managerial Economics - Production Essay Example | Topics and Well Written Essays - 1000 words

Managerial Economics - Production - Essay Example Inputs are the resources used in the production of goods and services. Inputs are classified into labour, capital and land or natural resources. Inputs are also classified as fixed or variable. Fixed inputs are those that cannot be readily changed during the time period under consideration, except perhaps at very great expense. Variable inputs are those that can be varied easily and on very short notice. The time period through which at least one input is set is called the short run, while the time period when all inputs are variable is called the long run. The length of the long run depends on the industry. In the short run, a firm can increase output only by using more of the variable inputs together with the fixed inputs. In the long run, the same increase in output could likely be obtained more efficiently by also expanding the firm's production facilities. In the long run, technology usually improves. A production function is an equation, table, or graph showing the maximum output of a commodity that a firm can produce per period of time with each set of inputs. Both inputs and outputs are measured in physical rather than in monetary units. For simplicity we assume hear that a firm produces only one type of output (commodity or service) with two inputs, labour (L) and capital (K). Thus the general equation of this simple production function is Q = f (L, K). The quantity of output is a function of, or depends on, the quantity of labour and capital used in production. "Output" refers to the number of units of the commodity produced, "labour" refers to the number of workers employed, and "capital" refers to the amount of the equipment used in production. An explicit production function would indicate precisely the quantity of output that the firm would produce with each particular set of inputs of labour and capital. Optimal Use of Variable Input The firm should employ an additional unit of labour as long as the extra revenue generated from the sale of the output produced exceeds the extra cost of hiring the unit of labour (i.e., until the extra revenue equals the extra cost). The extra revenue generated by the use of an additional unit of labour is called the marginal revenue product of labour (MRPL). This equals the marginal product of labour (MPL) times the marginal revenue (MR) from the sale of the extra output produced. This is MRPL = (MPL) (MR). The extra cost of hiring an additional unit of labour or marginal resource cost of labour (MRCL) is equal to the increase in the total cost to the firm resulting from hiring the additional unit of labour. That is, MRCL = TC/L A firm should continue to hire labour as long as MRPL > MRCL and until MRPL = MRCL. Optimization Analysis Optimization analysis can best be explained by examining the process by which a firm determines the output level at which it maximizes total profits. While the process the firm maximized total profit was determined above by looking at the total-revenue and total-cost, it is more useful to use marginal analysis. Indeed, marginal analysis is one of the most important concepts in managerial economics in general and in optimization analys

Friday, October 18, 2019

In this course you have been exposed to many current trends in Term Paper

In this course you have been exposed to many current trends in Business Intelligence. Two important emerging trends are the u - Term Paper Example Moreover, there are technologies such as reality mining which are also emerging in the business world. Reality mining is mainly used to analyze the collected machine-sensed environmental data with regard to social behavior of human beings (Doody & Shields, n.d., pp. 1-31). The paper intends to present an elaborative explanation of a few of the current technological trends being used in the business. Furthermore, the paper would also depict the various impacts of RFID technology and reality mining on the present day organizations. The paper would also discuss the merits as well as the demerits of the aforesaid technologies in business. Discussion Technologies have a very crucial role to play in the present altering business environment. There has been a continuous emergence of new technologies in the business world. A few of them such as RFID technology and reality mining would be explained in details below: Radio-Frequency Identification (RFID) Radio-Frequency Identification (RFID) i s one of the most important tools or technologies for business entities. This technology is quite effective and is capable of replacing the present modern day technology such as bar code. The technology offers strategic benefits to the business as it can track the record in case of supply chain activities more competently and effectively. This technology also provides real-time-in-transit visibility (ITV) and can also observe the general enterprise assets in the business (Sweeney II, 2010). A few of the present day examples of RFID is recognized in supply chain to create pallet tracking application which is used in companies such as Wal-Mart and its suppliers. The access control system such as keyless entry is also a RFID technology. Apart from this, applications like point-of-sale, automatic tool collection system, and animal tracking devices among others also use this technology (Hunt, Puglia & Puglia, 2007). Impacts of RFID on an Organization (Pros and Cons) The impact of RFID fo r the organization is based on how it is being handled by the organization. The ability of the technology to ensure services such as real-time and serialized data could prove to be quite essential to the organization. The best way to know the impact of the RFID on the organization is by assessing the area of the business where this technology is employed. The overall impact of RFID to the business can be assessed with the assistance of three distinct work flows. They are business processes, physical infrastructure as well as system and information. Proper execution of these three aspects alone would depict the major impacts of the technology in the organization (Sweeney II, 2010). On the other hand, the technology also has certain demerits that are quite vital to be analyzed. It has been observed that the technology of RFID reader at times faces difficulties to read the information if the tags are installed in liquids as well as in metal products. The problem occurs because liquid a nd metal surfaces replicate the radio waves, which makes the tags unreadable. Again, certain interventions can be observed in the proper use this technology if devices for example forklifts as well as walkies-talkies are in the surrounding area of the distribution centers (Shah & Murtaza, n.d. pp. 1-9). Effective Use of RFID Technology in Business By Harnessing the Benefits and Avoiding the Pitfalls The use of RFID technology in

Psychological Research Methods Essay Example | Topics and Well Written Essays - 2250 words

Psychological Research Methods - Essay Example The groups will be tested before and after the therapeutic period using a health-related quality-of-life (HRQL) questionnaire designed specifically for this inquiry. The scores of the two groups will be compared and analyzed to determine if, as expected, the experimental group demonstrates a statistically significant improvement in motor impulsivity behavior. Attention Deficit Hyperactivity Disorder (ADHD) is a condition affecting three to ten percent of school-age children, primarily boys, and up to five percent of adults (Wender, 2000, p. 4). Although there are differing opinions on how to specifically define the condition, as well as the appropriate methods for sorting it out from other associated behavioral disorders, most practitioners agree that if a certain set of behaviors (distraction, fidgeting, excessive talking, etc.) are present in sufficient quantity and severity, the diagnosis is correct (Atkinson & Hornby, 2002, pp. 46-47). The scope of this research will not be to determine the actual presence of ADHD; it will rely on the diagnosis of medical professionals to form the study group. This approach is in line with established protocols, where "regardless of the treatment approach, the diagnosis of ADHD and other co-morbidities first must be established through a standard medical evaluation" (Baumgaertel, 1999, p. 977). This research will, however, seek to test whether a specific alternative treatment (music therapy), when used in conjunction with traditional pharmacological therapy, can attenuate motor impulsivity. The focus of treatment for ADHD is to "decrease symptoms, enhance functionality, and improve well-being for the child and his or her close contacts" (Klassen, et al., 2004, p. 541). The primary methodology for accomplishing this control is the use of pharmacological agents, and it is common knowledge that drugs such as Ritalin are often employed to attenuate the symptoms. In response to a perceived over-prescribing of such medicines by doctors, there has been a rise in alternative therapies that seek to attenuate ADHD behavior through non-pharmacological means; the majority of which are designed to be used in conjunction with medication. For example, a recent study sought to determine if yoga could be used as an alternative method and, although no "strong support" was found, the authors nevertheless concluded that "yoga may have merit as a complementary treatment for boys with ADHD already stabilized on medication" (Jensen & Kenny, 2004, p. 205). It has been suggested that of all the alternative treatments proposed, music may have the best impact, particularly with situational performance in cognitive tasks (Baumgaertel, 1999, p. 980). Others, however, have found that "there is little in the music therapy literature about [treatment] for ADHD," but cite survey results that music therapists are employing a number of different methods in treating children with ADHD (Jackson, 2003, 302). One study has directly addressed the issue of music therapy on the level of motor impulsivity, with mixed results. While "no statistical difference was found between the impact of the contrasting approaches as

Thursday, October 17, 2019

Ethics Article Analysis Research Paper Example | Topics and Well Written Essays - 500 words

Ethics Article Analysis - Research Paper Example These code of ethics help to ensure that the individuals who control the company’s infrastructure are recognizing their duties when it comes to financial decision making. Moreover these ethics greatly help in helping these individuals to take proper financial decisions in the business. Within a company a code of ethics is developed to which every individual of the company has to abide. However in some situations the code of ethics is not followed by the newer employees and they tend to break the codes. This in turn violates the code of ethics and the financial decisions become distorted. An example can be cited here about the senior financial officers who are already working in the company. These financial officers know that the information of the company should be kept confidential whereas if a new financial officer comes and he is unaware of the fact he might the leak the information out. And because of this leakage the financial decisions now taken would be not that effecti ve. Similarly the code of ethics also mandates it on the employees that they do not use the resources of the company inefficiently. However the company cannot measure all the minute activities of these employees and in order to abide by the code of ethics a company would be forced to involve more finances towards the check and balance of employees. While making financial decisions in compliance with the ethics it is necessary to see that the individuals who are involved do not have any personal or professional relationship with the issue. This can affect the financial decision making as the individuals who would have personal gains would tend to distort important information about the company. Financial Executives International is a company which abides by the code of ethics. `The company involves these ethics in all the financial processes that it implements. The company strictly follows these code of ethics and makes sure that all the positive cash flow is achieved after

Causes and Effects of Tattoos Essay Example | Topics and Well Written Essays - 1000 words

Causes and Effects of Tattoos - Essay Example It is characterized to be Tahitian, tatau, meaning an indelible figure fixed upon the body especially by the insertion of pigment under the skin (Merriam Webster Dictionary 732). However, these signs which used to be mere adaptation and camouflaged have advanced into many different uses dependent upon the enthusiast or fanatic. Aficionados vary in attitude, age, lifestyle or standard of living and interest, much as are the designs, motifs, consequence and significance. Nonetheless, the acquisition of infectious diseases corollary to motivations and driving forces is blameworthy. Whether healthy or unhealthy, in fad or mainstream, an aesthetic or natural, religious or secular, figurative or literal tattoo has its doable side. It is a mechanism of driving in some colorant using sharp edge instrument down to the dermal layer of the body's first line of defence. The human skin as an organ protects the underlying parts from physical trauma, pathogen invasion, and water loss (Mader 730). Infringing through the homogeneous epidermal sub layers: 1-a) twenty to thirty tiers of keratinized squamous epithelial cells making up the cornified outermost level, the stratum corneum; and 1-b) basal cuboidal cells, highly mitotic cells producing replacement epidermal cells for sloughed keratinized portion; and the dermis, the inner stratum of : a) connective tissues consisting of collagen, reticular and elastic fibres, blood vessels, nerves, pigment cells, adipocytes and fibroblast; b) sebaceous and sweat glands; c) hair follicles; and d) the papillary layer (Ayque 42-43) wou ld naturally wind up to its malfunction. In the dermis too are small receptors for pressure, touch, temperature and pain (Mader 731). Immunity, the ability of the body to defend itself and as non-specific defences consist of barriers to entry, inflammatory reaction, natural killer cells and protective protein. Any minor injury resulting from broken skin would result to redness, swelling, and pain. This would mean destruction to the epidermis, the underlying connective tissues and mast cells (Mader 762). It is the creation of an avenue for microbial invasion. Although the human body has its natural flora of microorganisms called indigenous microflora (Burton and Paul Engelkirk 5), opportunistic pathogens may cause a dilemma. A case in point is the intrusion of Escherichia coli. It is a species of coliform bacteria of the family Enterobacteriaceae, normally present in the intestines and common in water, milk, and soil. E. coli is the most frequent cause of urinary tract infection and is serious gram-negative pathogen in wounds. E. coli septicemia may rapidly result in shock and death through the action of an endotoxin released from the bacteria (Mosby's Pocket Dictionary of Medicine, Nursing and Allied Health 458). It may gain access into the bloodstream passing through lesion causing septicemia (Burton and Paul Engelkirk 488). It is typified by fever, chill, hypotension, pain, headache, nausea, or diarrhea (Mosby's Pocket Dictionary of Medicine, Nursing and Allied Health 1155-1156). Other opportunistic pathogens as human indigenous microflora are Staphylococcus aureus and Enteroccocus spp (Burton and Engelkirk 260). Staphylococcal infection of the skin includes carbuncles, folliculitis, furuncles, and hindradenitis supurativa. Bacteremia, the presence of bacteria in the blood is common and may result in

Wednesday, October 16, 2019

Ethics Article Analysis Research Paper Example | Topics and Well Written Essays - 500 words

Ethics Article Analysis - Research Paper Example These code of ethics help to ensure that the individuals who control the company’s infrastructure are recognizing their duties when it comes to financial decision making. Moreover these ethics greatly help in helping these individuals to take proper financial decisions in the business. Within a company a code of ethics is developed to which every individual of the company has to abide. However in some situations the code of ethics is not followed by the newer employees and they tend to break the codes. This in turn violates the code of ethics and the financial decisions become distorted. An example can be cited here about the senior financial officers who are already working in the company. These financial officers know that the information of the company should be kept confidential whereas if a new financial officer comes and he is unaware of the fact he might the leak the information out. And because of this leakage the financial decisions now taken would be not that effecti ve. Similarly the code of ethics also mandates it on the employees that they do not use the resources of the company inefficiently. However the company cannot measure all the minute activities of these employees and in order to abide by the code of ethics a company would be forced to involve more finances towards the check and balance of employees. While making financial decisions in compliance with the ethics it is necessary to see that the individuals who are involved do not have any personal or professional relationship with the issue. This can affect the financial decision making as the individuals who would have personal gains would tend to distort important information about the company. Financial Executives International is a company which abides by the code of ethics. `The company involves these ethics in all the financial processes that it implements. The company strictly follows these code of ethics and makes sure that all the positive cash flow is achieved after

Tuesday, October 15, 2019

Perspectives on Organisational Transformation Essay

Perspectives on Organisational Transformation - Essay Example In 2004, Dell made a profit of $2645 million on revenues of $41440 million. During the period 1997-2002, Dell's global market share of PC's went up from 5% to 15%. In the US, Dell had a market share of 27%. (Forbes, 28 october2002). The clear cost leader in the industry, Dell had concentrated on activities where it could add most value and on market segments where profits were highest. Dell had taken care to ensure that customer service was not diluted in the process of cutting costs. For example, the industry average downtime for a PC was 16 hours, but only 8 hours for a Dell PC (Kasturi& Bell,2002). For servers, the industry average downtime was 5 hours compared to 1 hour for a Dell server. A March-2001 fortune and trilogy survey of senior officers of fortune 1000 companies ranked Dell first in managing customer relations. Dell believed it could achieve a turnover of $60 billion, a target beyond the wildest imagination of most other players in the industry by 2006. Change is a necessary way of life. We are perhaps aware of the axiom that the certainty in the world is that these will be change. If an organization is to survive, grow and remain prosperous, it must ad aft to the demands of the environment, since these demands are constantly changing, organizations must also change. The pace of change is now so fast that business face constant market change and must respond very rapidly if they are to survive. Many don't make it. Evidence suggests that the average corporate life styles may be shrinking because of a mobility to change and adopt fast enough. For this reason managing change has now become a crucial part of competitive edge (Clarke, 2002). Newstrom and Davis (1997) have explained the impact of a change in any part of the organization of the total organization. They have illustrated it by comparing an organization to an air filled balloon. They have concluded that the whole organisation tends to be affected by the change in any part of it (Newstrom & Davis, 1997). Factors in Organizational Change : Organizational changes are required to maintain equilibrium between various external and internal forces to achieve Organizational goals. Therefore, various factors/triggers, which may be important for necessitating Organizational changes, may be grouped into two categories external & internal. External Factors: Changes affected by external factors i.e. social, political, economic, technological and legal, which force the Organizations to change themselves. Such changes may result change in major functions, nature of competition, economic constrains, organization methods etc. In order to survive in the changing environment, organization must change. Internal Factors: Change occurs because of two internal factors i.e. Change in managerial personnel and deficiency in existing organization. Initially Dell bought stripped down computers, added disk drivers and memory, upgraded and sold them. In 1989, Dell suffered its first major setback. To meet the growing demand Dell bought more microprocessors than it actually needed at the peak of a cyclical market. Then, prices plunged and microprocessor of higher capacity (1 megabyte up from 256 kb) came into the

Monday, October 14, 2019

Aqualisa Quartz Case Essay Example for Free

Aqualisa Quartz Case Essay Aqualisa Quartz In the targeting market, we tend to target plumbers and end users (Middle to high income) because most of the end users are suggested by the plumbers. The others might buy from showrooms. Therefore, we have to target them as well Positioning Statement To middle-high income customers, Aqualisa Quartz is a high premium shower brand which come under mixer shower category that offers quality and latest innovation because Aqualisa Quartz has benefits in water pressure, ease of installation, use and design. HOW 12775 comes ? This number is come from the fact that case study states that unit sold of Quartz is between 30-40 units per day. So we take the mean which is 35 units and times 365 days. Therefore, the unit sold per year is 12775. Problems: The problem for Aqualizer is that Plumbers are lack of knowledge and innovation of Aqualisa Quartz. Moreover, most customer decisions rely on plumbers. Second issue is the bad experience of electronic shower that customers and plumbers had. The last main issue is that brand perception towards Aqualisa Quartz from Customer is very low because customers do not perceive the value of Aqualisa Quartz and the group of only high income customers (Current target) is quite too small. Solutions: 4Ps * Product * Price * Place However, the product, price and place will remain the same, because Aqualisa quartz is a new product and latest innovative shower so the functions and features are the most improvement at the time (Temperature control, ease of installation, design, water pressure and usage). Another reason that we maintain the price to where it is, Aqualisa Quartz is a premium brand so the price should be high to remain brand image. Moreover, the company invested a lot for RD and wanted to gain profit margin to break-even. And for the places, normally plumbers will buy from trade shop, and end users will buy at showrooms. Therefore, the existing channel is already effective and efficient. From the case (Exhibit 6), trade shops and showrooms can generate 470,000 units per year. This shows that the two places are powerful to sell the products of Aqualisa. Promotion Our first strategy is to go after independent plumbers by providing product orientation events by calling plumber to attend the training and give 150 pounds as the compensation. This will satisfy and make the plumber attend because they do not lose the income when they attend our training. The orientation will be held every 3 months changing by geography. We will gain Plumber information from Database from APHC – Association of Plumbing Heating. The capacity for one meeting will be 100 seats per group. The  reasons we make 100 seats is because we believe that the larger the sample the higher chance of product achieving success. Another stategy is to create trustworthy of Aqualisa Quartz from existing users to new customers. Opinion leaders will convince the new customers and also build the confidence in the existing users that the electronic shower (Aqualisa Quartz) will last long and not have any problems like the early electronic showers by guarantee the satisfaction by r eferring the comment from opinion leaders (from showrooms). The third strategy is the use of award will help communicate value of Aqualisa Quartz and build the customer relationship with the brand. By doing this, the company could expand the new target group from only high to high-middle income. This would segmented by the income per year. If we could make the middle income group believes that it is worth for them to spend on our product, sales per unit would dramatically increase since this group is even larger than the high income and higher value perceived as well. Aqualisa Quartz already has the advertisement about the products so all they should do is to specify the beneficial points of the product, and also present the prize of Aqualisa Quartz to inform the target who has the middle income as well as those who has high income. Goal defense Quartz is a representative of the premium product under the brand Aqualisa, and the units sold are lower than the expectation of the Rawlinson (30-40 instead of 100-200 units per day). If we can sell more, it will generate overall sales a lot and potentially increase the market share. Problem defense According to the case, plumbers would like to go for the familiar products which they have much experience. If there is any problem after installation, plumbers are responsible for the fixing costs. Therefore, they avoid trying new product they are not familiar with. Moreover, the percentage of plumbers influencing customers’ decision is more than 50% which is resulted in they do not recommend Quartz to the customers. Another reason is that in year 1980, there were some manufacturers who introduced electronic showers, and the products were not successful because of the poor design and the failure of the usage. After that, it created  skepticism toward anything that is electronic. That makes both customers and plumbers refuse Quartz. The third reason is that Aqualisa Quartz answers all the features that the perfect showers should have in terms of water pressure, stable temperature, design, ease of installation and innovation. Even though the price is quite high the middle income can afford Aqualisa Quartz as well seen from the income information (15,000-30,000 pounds per year). For the problem of value perception, the evidence was in the year 2001. Quartz was awarded in the Bathroom Expo as a top prize since the very beginning of the Quartz but people did not know this information. Therefore, the sales of Aqualisa Quartz are not up to the expected units. Solution defense: The Conducting of orientation meeting will cultivate the perception inside the plumbers’ mind. The content of the meeting will be about the ease of the installation, and to show the convenience of the electronic functions of Quartz. In fact, Quartz’s installation duration is  ¼ of the other competitive products. It is the benefit that the plumbers can do more than one job in a day. It can certainly ensure the increase in sale. To demonstrate, we will definitely gain 12% of plumbers out from 10,000. These 12% of plumbers will generate sales 4 times higher than current sales. How many amount of sale would generate by plumbers? 12% *12775= 1533 ( 12% comes from 1200 that attend in meeting for the whole three years) 1533*4=6132 ( 4 comes from 4 times faster installation which means faster installation will lead to higher sales) As a result, we can get the sale increase about 74% of the goal which increase the chance of success. From the case, customers and plumbers do not trust the shower with electronic system (Aqualisa Quartz included). They will not use this type of products because they have bad experience with the electronic shower before. If Aqualisa can show them that the problems were solved and the Aqualisa Quartz actually works. Some of the plumbers and customers are willing to try it. Because the sales from show room are pretty strong (about 20% of the total sales) we can refer the comments from the real users and show them to the potential target groups. That would make them feel more confident to try our product. In conclusion, Aqualisa Quartz was  awarded in the expo but customers and plumbers do not notice. The problem is about the value perceived and trust. Therefore, this award can guarantee the quality and help with the value that is the awarded brand. We can do it by attaching the detail of award into the communication to make customers notice the â€Å"cleverness† and â€Å"elegant design† of Quartz.

Sunday, October 13, 2019

OSI reference model

OSI reference model HISTORY: OSI reference model is advanced teaching of network. As there was a need of common model of protocol layers, this concept promoted the idea and defined about interoperability between network devices and software. Networking with protocol standards such as SNA and Decnet are completely vendor-developed and proprietary which are prior to OSI concept. Industries worked out to sort out such complications, and have introduced a new concept named OSI which is attempting to get everyone to agree to common network standards to provide multi-vendor interoperability. Many devices were unable to communicate with other protocols directly because of lack of common protocols. It was common for large networks to support multiple network suites. Database design and distributed database design were the interest of canepas group in the early and middle 70s. It was clear in the mid 70s that standard distributed communications architecture would be required to support database machines, distributed acce ss, and the like. For development of such standardized database systems some of the groups have studied the existing solutions, including IBMs system network architecture (SNA), so the work on protocols is done for ARPANET, and some concepts of presentation services. In spite of these defaults which lead to the development of a seven layer architecture known internally as the distributed systems architecture (DSA) in 1977. Meanwhile, in 1977 International Organization for Standardization has got a proposal that a standard architecture was needed to define the communications infrastructure for distributed processing by British Standards Institute. Thus, subcommittee on Open System Interconnection was formed by ISO [Technical Committee 97, Subcommittee 16]. The American National Standard Institute (ANSI) was charged to develop proposals in advance of the first meeting of the subcommittee. INTRODUCTION:- Although the topic of OSI can seem boring and academic, actually it is a very useful way to learn more about networking. OSI offers a good starting point for understanding the differences between repeaters, switches, and routers, for example. The model also can help one better understand network protocols. The main idea in OSI is the process of communication between the end points of a two telecommunication network, this can be divided into layers, which can be added within its layers of its own set of special, related functions. The OSI model (and networking models developed by other organizations) attempts to define rules that cover both the generalities and specifics of networks. OSI model was not a network standard, but it was used as guidelines for development of network standards. It was become so important that almost all major networks standards in use today conform entirely to its seven layers. The relationship between OSI model and internet protocol stack, as it is known that the new technologies and developments are emerged based on networks. These networks comprise of protocols and the entire protocol stack. Internet protocol stack is based on OSI model. [1] OSI MODEL:- The modern day networking process is understood by layering. OSI model consists of seven layers. They are 1. Application Layer (7th Layer) 2. Presentation Layer (6th Layer) 3. Session Layer (5th Layer) 4. Transport Layer (4th Layer) 5. Network Layer (3rd Layer) 6. Data-link Layer (2nd Layer) 7. Physical Layer (1st Layer) [2] The OSI model defines internetworking in terms of a vertical stack of seven layers. Among, these layer, there are two parts division one is upper layer and the other is lower layer. Upper layer consist of layer 7, 6 and 5 and the lower layer consist of 4, 3, 2 and 1. Among these two layer upper layer deals with the application issues which are generally are implemented only in software. The software that implements network services like encryption and connection management. When we consider deals with the data transport issues and the implement more primitive, hardware functions like routing, addressing and flow control. [3] Upper layer: (Application layer, Presentation layer, Session layer) OSI designates the application, presentation, and session stages of the stack as the upper layers. Software in these layers performs application-specific functions like data formatting, encryption, and connection management. For example: -HTTP, SSL and NFS Lower layer: (Transport layer, Network layer, Physical layer.) Lower layers of the OSI model provide more primitive network-specific functions like routing, addressing, and flow control. For example:- TCP, IP, and Ethernet Application Layer: Describes how real work actually gets done. Ex: this layer would implement file system operations. And also it defines interface to user processes for communication and data transfer in network. It provides standardized services such as virtual terminal, file and job transfer and operations. â€Å" provides service directly to the user application. Because of the potentially wide variety of application, this layer provide a wealth of services. Among these services are establishing privacy mechanism, authenticating the intended communication partners, and determining if adequate resources are present.† [3] Presentation layer : Describes the syntax of data being transferred. Ex: this layer describes how floating point numbers can be exchanged between hosts with different math formats. Mask the difference of data formats between dissimilar systems. Specifies architecture independent data transfer format. It encodes data; like encrypts and decrypts data, compresses and decompresses data. â€Å" performs data transformation to provide a common interface for user application, including services such as reformatting data compression, and encryption.†[3] Session layer : In general, describes the organization of data sequences larger than the packets handled by lower layers. Ex: this layer describes how request and reply packets are paired in a remote procedure call. It mange user session and dialogues. And also controls establishment and termination of logic between users. Reports upper layer errors. â€Å" establishes, manages and end user connection and manages the interaction between end systems. Services includes such thing as establishing communication as full or half duplex and grouping data†[3] Transport Layer:- In general, describes the quality and nature of the data delivery. Ex: this layer defines if and how retransmissions will be used to ensure data delivery. Manage end-to-end message delivery in network. Provides reliable and sequential packet delivery through error recovery and flow control mechanisms. Provides connectionless oriented packet delivery â€Å" insulates the three upper layer, 5 through 7, from having deal with the complexities of layer 1 through 3by providing the function necessary to guarantee a reliable network link. Among other function, this layer provides error recovery and flow control between the two end points of the network connections.†[3] Network layer :- In general, describes how a series of exchanges over various data links can deliver data between any two nodes in a network. Ex: this layer defines the addressing and routing structure of the Internet. Network layer function determines how data are transferred between network devices. Routes packets according to unique network device addresses. It provides flow and congestion control to prevent network resource depletion. â€Å" Establishes, maintains and terminates network connection . Among other functions, standard define how data routing and relaying are handled†[3] Data link layer: In general, describes the logical organization of data bits transmitted on a particular medium. Ex: this layer defines the framing, addressing and check summing of Ethernet packets. Defines procedures for operating the communication links and frames packets. And also detects and corrects packets transmit errors. â€Å" ensures the reliability of the physical link established at layer 1 . standard defines how data frames are recognized and provide necessary flow control and error handling at the frame level.†[3] Physical layer : In general, describes the physical properties of the various communications media, as well as the electrical properties and interpretation of the exchanged signals. Ex: this layer defines the size of Ethernet coaxial cable, the type of BNC connector used, and the termination method. Physical later defines physical means of sending data network devices and defines optical, electrical and mechanical characteristics and interfaces between network medium and devices. â€Å" controls transmission of the raw bit stream over transmission medium. Standard for this layer define such parameter as the amount of signal voltage swings, the duration of voltage and so on.†[3] INFLUENCE: The protocol stack or Internet protocol stack also show influence of the OSI model most of the terminology is same, and most of the books present an Internet protocol stack that uses OSI terminology and that includes physical and data link layer. But in 1981 article by john postal, Carl Sunshine and Danny Cohen there is a diagram showing the Internet protocol functioning on top of one of the several Network protocol and it describe such network protocol as being the packet transmission protocol in each individual network. In a article 1983 by Vinton Cerf- often referred to as â€Å" one of the founding father of the internet† and Edward Cain that the layer that IP function is called â€Å"Internetwork layer† and the layer under that is â€Å"Network layer†. We can universally that the layer at which IP function is called the Network Layer and the important layer was called â€Å"Network layer is usually omitted.† [4] TCP/IP: TCP/IP was originally developed as a research experiment. It has become the backbone of thr information superhighway. It provides users with the back bone services used to carry popular services such as the World Wide Wed (www), E-Mail and other. In late 70s as a US Government Advanced Research Project Agency (ARPA) research development project, the â€Å"ARPANET†. This has grown to provide connection to system world wide, helping bring the information age into reality. TCP/IP is not really a protocol, but a set of protocols a protocol stack, as it is most commonly called. Its name, for example, already refers to two different protocols, TCP (Transmission Control Protocol) and IP (Internet Protocol). There are several other protocols related to TCP/IP like FTP, HTTP, SMTP and UDP just to name a few. The TCP/IP suite can be understood as a set of discrete component with a layered architecture. The transport layer and below of the TCP/IP suite can be viewed in the figure. The link covers the internetwork and transport protocols. The delivery of packets between the adjacent nodes in an internetwork id provided bye the link protocols. This link delivery only implies that delivered information is intact. Internetwork layer is responsible for addressing and routing of packets between source and destination nodes within the network. At the final the transport layer provides full service to transfer information between them.[5] Application layer: Application layer is the communication between programs and transport protocol. Several different protocols works on the Application layer. The familiar protocols HTTP, SMTP, FTP, SNMP, DNS and Telnet. Application layer commucate through Transport layer that to through a port. Ports are numbered and standard applications always use the same port. For example , SMTP protocol always use port 25, and HTTP protocol always use port 89 and FTP protocol always use ports 20 for data transmission and 21 for control.[6] Transport layer:- The layers gets data from the Application layer and divide into several data packets. It is the most uses TCP. After receiving data TCP protocol gets the packets which sent by the Internet layer and make the in an order, because arrives at the destiny in out of order. Transport layer also check if the content of the received packet are intact and reply by giving acknowledge signal to the transmitter , allowing it to know that the packet arrived in an order at the destiny. If there are no acknowledge signal is received it re send the lost packet.[6] Internet layer: IP address is the unique virtual identity on TCP/IP network of each computer. It as charge of adding a header to the data packets received from the Transport layer. Where other control data will, it will add source IP address and target IP address. the physical address assigned to the network card of each computer. This address is written on the network card RO and is call MAC address. Let us suppose A computer want send a data to B computer so the A want to know the B MAC address but in small local area network computer can easily discover each other MAC address, this is an easy task. If there is no any virtual addressing were used we must to know the MAC address of the destination computer, which is not only a hard task but also does not help out packet routing, because it does not use a tree like structure.[6] Network Interface Layer:- The next is the network interface layer, the datagram generated on the upper layer will be sent to the network interface layer if we are sending data, or the Network Interface layer will get data from the network and send it to the Internet layer, if we are receiving data. The Network Interface Layer breaks down the packets from the Internet Layer into frames and then eventually into bits for transmission across the physical network medium. Signalling and network medium standards such as Ethernet, Token Ring, FDDI, X .25, Frame Relay, RS-232, and v.35 are defined in this layer. Network Interface Controller (NIC) Cards, network hubs, repeaters, bridges, and switches operate at this level.[6] TCP/IP and OSI MODEL:- TCP/IP is defined in term of the protocols that constitute it. Most of the critical protocols functions are their lower layer of the OSI Reference MODEL that are layer 2, 3 and 4 which correspond to the network interface that is internet and transport layer in the TCP/IP model. Which includes all important IP at layer 3 and TCP at layer 4 which combine to give TCP/IP the name to it. TCP contains four subsections. The first description are the two TCP/IP protocols that reside at the network layer, layer 2 of the OSI model PPP and SLIP. And the second details a couple of special protocol that reside between layer 2 and 3 ARP and RARP. The third covers the TCP/IP internet layer (i.e) OSI network layer and layer 3 including IP and several other related and support protocol. At the final the fourth describes the TCP/IP transports layer protocols TCP and UDP.[7] The lower layer of the OSI model is the physical layer which responsible for the transmitting information from one place to another on a network. The layer just above the physical layer is the data link layer and in TCP/IP its call has Network interface layer. Its main job is to implement network at local level and interface between the hardware oriented physical layer, and the ore abstract, software oriented function of the network layer and the above it.[8] Effects of Internet:- As a consequence of the development of internet, the internet protocol best effort delivery. But it is considered to be unreliable when it is talked about its service. In other network architectural language it is called as connection-less protocol. Thus it has its contrast implications to so called connecting modes of transmission. This lack of reliability causes many effects. The major problems raised are: Data corruption Lost data packets Duplicate arrival Out-of-order packet delivery Coming to the effects based on IPv4 and IPv6, they are as follows. IETF declared that IPv4 will not be able to accommodate the need for ever increasing amount of IP addresses in the next few years. The increase and expansion of IP addresses are needed to accommodate following. They are used for proliferation of internet devices such as personal computers, personal digital assistants (PDAs), wireless devices, and new Internet appliances; the expansion of internet through the world; the increasing applications of internet access; requirements of emerging internet applications. Thus decrease in usage of IPv4 effects all the above mentioned utilizes. The solution for this problem is found from development of IPv6 which enables a mass market and the increased adoption of the internet. IPv4 was in existence and effectively working from almost 20 years. But now all of its approximately four billion of address seems to be getting finished. Because with the tremendous growth of the internet devices and blocks of the ip addresses assigned to various organizations and countries. This fast growth in the number of devices e.g. Mobiles, computers, music players, etc. it looked as if IPv4 addresses would be exhausted in near future. In order to overcome this problem and increasing life for IPv4 certain measures have been taken e.g. network address translation (NAT), classless inter-domain routing (CIDR) and PPP/DHCP. But all of these solutions are temporary and they made networks more complex and difficult for one to understand and implement. Internet Stack Model The Internet Stack Model employs a Internet Protocol Stack or Suite both these words are used interchangeably. This can be defined as the set of communications protocols used for the Internet and other similar networks. As discussed earlier Protocol is a set of rules in a network. The names of the two protocols which employed the Internet Stack Model are Transmission Control Protocol (TCP) and the Internet Protocol (IP), which were also the first two networking protocols defined in this standard. A protocol stack (sometimes communications stack) is a particular software implementation of a computer networking protocol suit. In practical implementation, protocol stacks are often divided into three major sections: media, transport, and applications. A particular operating system or platform will often have two well-defined software interfaces: one between the media and transport layers, and one between the transport layers and applications. Upper layers are logically closer to the user and deal with more abstract data, relying on lower layer protocols to translate data into forms that can eventually be physically transmitted.[1] Difference between OSI and TCP/IP:- OSI model is the standard reference model that describes how the protocols should interact with one another. This was invented by the Department of Defense.TCP/IP does map clearly into OSI model, but is so convenient to think in terms of the OSI model when explaining protocols. The major differences are:- The application layer in TCP/IP handles the responsibilities of layers 5, 6 and 7 in the OSI model. The transport layer in TCP/IP does not always guarantee reliable delivery of packets at the transport layer, while the OSI model does. TCP/IP also offers an option called UDP that does not guarantee reliable packet delivery. [9] TCP/IP appears to be a more simpler model and this is mainly due to the fact that it has fewer layers TCP/IP is considered to be a more credible model- This is mainly due to the fact because TCP/IP protocols are the standards around which the internet was developed therefore it mainly gains creditability due to this reason. Where as in contrast networks are not usually built around the OSI model as it is merely used as a guidance tool The OSI model consists of 7 architectural layers whereas the TCP/IP only has 4 layers. Disadvantages of OSI model: Major disadvantages of OSI model are Bad timing Bad technology Bad implementations Bad Timing: Presently it appears that standard OSI protocols got crushed. It was completed too late, TCP/IP had already taken hold and become the familiar standard for research universities by the time the OSI Model was ready Bad Technology:- Both the models and protocols are flawed. As mentioned about the layers, cause major disadvantage of this model. Working on OSI model which is associated with several definitions and protocols is extraordinarily complex. The reappearance of functions in each layer also cause problem. Some of those functions are addressing, flow control, and error control. Certain important features are placed in every layer. Some times the decisions taken for placing these features are not obvious. In the past the presentation layer had virtual terminal handling which is presently used in application layer. Data security, encryption and network management were also omitted. The criticism given by world is that communication mentality is increasing rapidly. Bad Implementations: Initial implementations made by people were huge ,unwieldy and slow Because of the complexity of the model, the initial implementations were huge, unwieldy, and slow. As time is passing the product got betterments, but bad image stuck. [10] everyone who tried to implement it got burned, giving OSI a reputation for poor quality Disadvantages of TCP/IP model: When TCP/IP is compared with IPX there are few drawbacks. IPX is faster compared to TCP/IP. TCP/IP is intricate to set up and manage. The overhead of TCP/IP is higher than that of IPX. The process involved in TCP/IP is long. The entire process is, port numbers are assigned by the Internet Assigned Numbers Authority (IANA), and they identify the process to which a particular packet is connected to. Port numbers are found in the packet header. [11]. Few more disadvantages of this model are: software used for strict layering is very inefficient. When buffers are provided they leave space for headers which are added by lower layer protocols. [12] Security:- Internet has become a phenomenon. Sharing Files, transferring Files all across the network has caused the users to think about some serious problems that are being raised due to the phenomenon of Internet. Security is another issue that sits at the top of the level as designers and developers both struggle to give out the correct form of measures to be taken to deal with the issue of Network Security. Since the Protocol Stack has got just one layer to really check the authenticity of the packets that pass through the layers and the network. It has allowed the network to become more susceptible to foreign threats. Since, Computers that are connected to each other create a network. These networks are often configured with public Internet Protocol (IP) addresses that is, the devices on the network are visible to devices outside the network. Networks can also be configured as private meaning that devices outside the network cannot see or communicate directly to them. Computers on a public network have the advantage (and disadvantage) that they are completely visible to the Internet. As such, they have no boundaries between themselves and the rest of the Internet community. This advantage oftentimes becomes a distinct disadvantage since this visibility can lead to a computer vulnerability exploit -e.g.: Hacking if the devices on the public network are not properly secured.To plainly counter this strategy the, we employ a private LAN and make the network a private network then the disadvantage of a private network would be that it entails more configuration and administration to maintain usability. At times, not being fully visible on the Internet can cause some difficulty in connecting to certain services, such as streaming audio/video, chat/instant messaging programs, or some secure Web sites. Maintaining most computers on a private network, with only an IDP/IDS and/or Firewall visible to the public Internet helps maintain a highly secure environment for the computers on the private network, while at the same time keeping them connected to the public Internet.[13] Benefits of OSI model:- The OSI Model is a standard and a very useful tool to deal with the problems of networking. The OSI model is also a standard model for networking protocols and distributed application. In the OSI model there are a total of 7 network layers. The layers of OSI provide the levels of abstraction. Each layer performs a different set of functions and the intent was to make each layer as independent as possible from all the others. This guarantees the security to each packet that passes through these layers also, it reduces the complexity of packet routing through each layer thus reducing the threat of congestion in the network. Each layer uses the information from the below layer and provides a service to the layer above in the OSI Model. [14] Conclusion: Even though OSI model has a few limitations it cannot be said that the model is not suitable anymore because talking about the time and the influence of the OSI model on the networking as whole has had a lot of positive causes. Even if we have many new models coming up with different improvements the base model is always the OSI model. What we can take out of the OSI model are mainly the benefits of the OSI model and which even are the major characteristics needed for creating a good model. The OSI Model is perhaps the most imp lest and widely used through the world. Owing to the advantages of this network we are able to reduce the complexity and save time when passing data on a network. Reference:- 1) John Larmouth (1996): Understanding OSI: International Thomson Computer Press, Michigan. USA} 2) Computer networks 3rd edition by ANDREW S. TANENBAUM 3) Standard network layer architecture, By Bradley Mitchell http://compnetworking.about.com/cs/designosimodel/a/osimodel.htm 4)http://www2.rad.com/networks/introductory/layers/main.htm 5) By Douglas Comers http://www.cellsoft.de/telecom/tcpip.htm 6) Author: Gabriel Torres http://www.hardwaresecrets.com/article/433/1,2,3,4,5,6 7) Charles M. Kozierok .http://www.tcpipguide.com/free/t_TCPIPLowerLayerInterfaceInternetandTransportProtoc.htm 8) Charles M. Kozierok http://www.tcpipguide.com/free/t_DataLinkLayerTechnologiesandProtocols.htm http://itprofesionals.blogspot.com/2009/01/what-is-difference-between-osi-model.html 10) Computer Networks Fourth Edition by Andrew S. Tanenbaum 11)www.tech-faq.com/understanding-the-osi-model.shtml www.bookrags.com/wiki/OSI_model 13) Behrouz A. Forouzan, Sophia Chung Fegan (2004). Data Communications and Networking, McGraw-Hill Professional, USA. 14) http://compnetworking.about.com/cs/designosimodel/a/osimodel.htm