Wednesday, October 30, 2019

ANTH 25 Assignment 7 Essay Example | Topics and Well Written Essays - 750 words

ANTH 25 Assignment 7 - Essay Example Hence, employees at this level can work with the management team without much difficulty. I like my job because I always enjoyed playing with numbers while I was young. Banking too has been my core career interest and it fits into my educational goals. The main challenge is the time factor because the financial industry requires an employee to work for many hours due to the workload and limited time resource. This affects off-work commitments and relationships. I overcame this by re-arranging my schedules. The time factor also prevents employees wishing to any form of part-time study program. Today, graduates get an average of $53,000, but my starting salary was at $49,900. The employment of other employees in this position is an improvement from the earlier $49,700 in 2012. It has been higher in previous years notably 2011, where the figure stood at $50,500. This is according to Andrea Koncz, the employment information manager at National Association of Colleges and Employees NACE in their salary survey reports. I would describe it as both affiliate and goal oriented. Through this method, the management encourages the workforce to develop a sense of teamwork and drive towards set a target. Firms avoid the use of authoritative management, as it is destructive to the morale of the employees, which hurts organizational productivity. Thus, the management should strive to device strategies that work for the company and its skilled workforce. I get up at around 6:30. Am and head out to the gym, after an hour’s workout I clean up and go to the office. Ten minutes to eight, I check into the office, login to my work email, and check emails I need to attend to.9. Am my workday commences but if it is a Monday morning, we all gather for our weekly meeting with the management team. I go for lunch at 2.pm after handling client accounts for five hours non-stop, its tiring so the lunch break helps.

Monday, October 28, 2019

Inventory System Essay Example for Free

Inventory System Essay 1.0 Background of the study Computer nowadays is a basic need for businesses or companies. It helps a lot in such a way that it makes work more progressive and productive. It is an important thing that a company that manipulating data. Having computer programs may help a company grow bigger and be competitive in the flow of business world. It helps a lot because almost all the companies nowadays uses computer literate and very competitive in many aspects. Whatever kind of business you manage, you’re required by law to keep financial records relating to it. Bryan’s School Supplies and Accessories have to branches, all branches is using a manual inventory system. Each branch has its own inventory system and records transactions a day. The owner comes to visit in every branch to check the inventory and sales of the business weekly. It takes long time for them to record and file. All their transactions and they find difficulties and finding and searching their record in the past year or months. When recording their daily sales and inventory they should work together or their lot of people working in order to finish the job on time. The records of two branches are separated with each other. The owner found difficulty on checking records and sales of his business because the two branches are located in different place so he has to travel in order to check his business. The owner is looking for the most convenient way where the owner can save his money time and effort when checking the stocks inventory and sales of his business. A system that can merge all the records of their inventory and sales so that the owner don’t have to visit every branch of his business. 1.1 OBJECTIVES OF THE STUDY The main objectives of the study are to create an inventory system that could help the company increase their sales. Project aims to develop a web where the stock and sales record of company is stored. This system will help the  company to record and view all the record easy and fast, and also for the owner to view sales and inventory of his/her business even without visiting to it. The records of stocks of all branches are stored in the web. Specifically, this study aims to: 1. Provide an fast and easy to use inventory system for Bryan’s School Supplies and Accessories 2. Replace manual inventory with automated online inventory 3. Develop a system to help Bryan’s School Supplies and Accessories with their problem in terms of their stock records and sales inventory 4. Create a website where they can save and view their stock inventory and daily sales 5. Create a system that could help their business be more productive 6. Create a report about the daily stock records through the use of internet 7. Create a secure inventory system in web 1.2 SIGNIFICANCE OF THE STUDY This research would highly propulsive and could provide the community a solution for their problem regarding the said topic. The findings of this piece of research may provide an important informational base for the improvement of the business industries. The result of this research studies would specifically facilitate the policy makers and planners in devising suitable strategies for the future plan of action for getting better quality of education as the foundation of the business system. This study could benefit the following: The company: this study can help the companies to become more progressive and productive this study could provide the companies the idea on how to minimize the cost, time and effort of their stocks and employees in terms of recording daily transaction, sales and inventory. Company’s Staff: this study could give staff a benefit because if the company prefers to use this study as their system, their job would be easier and faster. Employees: the result of the study could benefit the employees to lessen their jobs and it will be easy for them to record all the transaction and inventory every day. Future researchers: this study could provide information for the future researchers that have a related topic. They can  use this study as related literature on their research study. Technical Review of Related Literature 2.0 Review of Related Literature This chapter presents the related literature and studies after the thorough and in-depth search done by the researchers. This will also present the synthesis of the art, theoretical and conceptual framework to fully understand the research to be done and lastly the definition of terms for better comprehension of the study. 2.1 Introductory Statement Organizations need to make the right choice and select the inventory control system that not only supports their current needs, but more importantly, is able to support additional functionality to narrow the business growth and technology gap at the right cost. The following are examples of inventory control systems that may suit your organization. In order for our project to be successful and much better than others, we made a system that can cater all the data and transactions of a business. Also, we add some additional and unique features to distinguish the difference of our system to the other systems used by some business firms. We gathered information about the features of some business inventory management system and compared it in our project as a related literature. The graph below shows the comparison of inventory systems in terms of their functionalities. 2.3 Comparison of the other system to the proposed one Bryan’s Online Stocks and Inventory System use an input device such as Barcode Scanner and RFID (Radio Frequency Identification). Also this system has the ability to search and filter data easily. But unlike the other systems this project has some unique features that other systems don’t have. It is an improve inventory system that has a special features that other inventory systems don’t have. Others don’t have a function like notifying the user about the number of products in the inventory which is one of the special functions of this system. Also it has the ability to generate daily report and have compilation of all transactions and records done from the start up to the current date. It has the ability to store data online through the use of private network over the web. Also with this system you can customize your own desired user interface. With this kind of system the company can be more organize because they can store all their records and data online, it reduces paper works and it makes transactions easier and faster. They don’t need to worry if the computer will be  corrupted or destroy because all the data was being stored online, they can open it to any computer as long as they have the security password and username of their private site. All the transactions performed in this inventory system occur in real time. So when multiple users are accessing inventory you can rest assured that theyre all seeing the latest information. Updates occur instantly, no more waiting for transactions to post. We can say that this system is more advance and efficient to use compare to the other systems of the other companies. Methodology and Project Scheduling 3.1 Introductory Statement Literature review is an important element for this project since it will give general idea and concept on how to develop an Online Stocks and Inventory for Bryans Accessories and School Supplies. Besides it will provide the requirements and challenges that need to be face during the progress of the project development. Project schedule is a project progress plan that shows the activities that has been plan throughout this project development. It will provide the guide to implement the progress of the project. Bryan’s Online Stocks and Inventory System have the following SDLC and Hardware and Software to be complying in order to have a good system project result. 3.2 Systems Development Life Cycle (SDLC) The SDLC of Bryan’s Online Stocks and Inventory System develop composed of 6 phases to follow in order to develop the system. The six stages are project planning, project analysis, project development, testing and debugging, implementation and maintenance. 3.2.1 System Planning In this stage the proponents identify and select the software to be used for Bryan’s Inventory. In system planning the proponents choose the project, brainstorming, doing research, interview and the whole member of the team develops the system. The planning of the system determines the task of each members. Determining who will used the system and functions of the system to  its user, the devices to be used in platform of the system. 3.2.2 Project Analysis In system analysis phase it consists of scripting, business process, data flow and database structure as a backbone of the system. It also include the planning of the schedule on how to finish the system project, the process and documentation of the system 3.2.3 System Development and design The system development stage is the application where it develops physical design. The proponents create scripting codes to compute the inventory and designing of the system. 3.2.4 Testing and Debugging Check the system for bugs and errors. The proponents used the bar code scanner to test the system; using the scanner the proponents will determine the functionality of the system. Testing and debugging helps to detect whether the system is working properly or not. The proponents let someone use the system that is not familiar with the system to test the system functionality subject for improvement. 3.2.5 Implementation The implementation of the syste3m will be exclusive for bryan’s school supplies and accessories. In the implementation of the system requires an internet connection to view the inventory of the company. The user log-in to a private network intended only for the inventory of Bryan’s school supplies and accessories 3.2.6 Maintenance In case of error of the functionality in the system the user/company can easily contact the proponents through the email or call/text to fix the problem. The system will implement using the internet which the proponents check and update. The proponents will keep an eye for the maintenance for one year. 3.3 Software Requirements (Recommended) Bryan’s online inventory system supported operating system is any windows 7 variety with 32 bit and 64 bit processor. This system is online and it doesn’t have much software requirements but the researchers prefer to use windows for this system. 3.4 Hardware Requirements (Recommended) The hardware requirements for Bryan’s Online Stocks and Inventory System are mouse, keyboard, and monitor, CPU with 2 GB and up RAM memory, Intel processor with 2-8 cores, hard disk (250 GB) and power supply. 3.5 Project Scheduling Bryan’s Online Stocks and Inventory System takes 47 days to be able to implement and used by the company. The activities and schedule of events are shown in our PERT and Gantt chart which is shown below: Summary of the Findings, Conclusion, and Recommendation 4.1 Introduction This chapter presents the summary of the findings, conclusions and recommendations based on the data analyzed in the previous chapter. Some limitations have been identified. The researchers study deals with the analysis and enhancement of Bryan’s School supplies and Accessories current inventory system. The study focuses on improving and on enhancing the existing system to double the performance and circulation of data.The researchers proposed an online inventory system where all the transactions and processes are done through the use of private network over the web 4.2. Findings The researchers found out that the online inventory system has a big help to the company as well as to the user of the system unlike the existing system which exhibits different problems like: System breakdown Slow processing of data Time consuming Unorganized records Too many paper works Too many people required to process transactions and inventory The researchers also found out that the proposed replacement of the existing  system can give the following benefits: 5x faster processing of data compared to manual system of inventory Less time consuming Continuous access to the entire system Better compilation of record transactions and data Reduces paper works and employees needed 4.3. Conclusion The researchers concluded that: 1. By replacing the existing hardware can give solution to the problems encountered by the encoder/user. 2. Inputing of data will be continuous and faster. 3. The proposed solution can bring such benefits in terms of maintenance cost and overhead cost of electricity.

Saturday, October 26, 2019

The Hobbit :: Essays Papers

The Hobbit In this most appealing book, Bilbo gets caught up in an adventure he never dreamed of, that will later change his life. In the beginning Bilbo Baggins runs into an old acquaintance, Gandalf, a wizard, who he had met many years earlier at festivals, where Gandalf had made fireworks with his magic. Bilbo and Gandalf talked for a while and Bilbo being the kind and polite hobbit he was invited him for tea in his hill the next day. There at about the time Bilbo was expecting Gandalf he heard a knock at the door, but when he opened the door it was in fact not Gandalf but a little dwarf. The dwarf introduced himself to Bilbo as Thorin Oakenshield, son of Throror, son of Thrain. He then let himself in. After that many dwarves followed, actually 9 more had come to the little hobbit's doorstep. Then finally after all the dwarves had made themselves comfortable he heard another tap at the door, and sure enough it was Gandalf, but with 3 other dwarves. That night Gandalf and the dwarves spoke of wondrous tales and of a dragon’s gold that had once belonged to Thorin’s father. They also told of an adventure they were about to embark on, and then turning to Gandalf they asked what of the 13th member of the party? Gandalf spoke up and said, "My, the one I have chosen is the burglar Mr. Baggins." Bilbo did not seem pleased, for he had no need of adventure with his pleasant yet simplistic life. Even though he was secretly intrigued, but more so he was very scared. After a bit of chitchat Bilbo agreed to go and they all went to bed. When morning came Bilbo found no one in his hobbit hole, and it’s needless to say that he was very pleased, yet at the same time also a bit disappointed. He found a note from Gandalf on his Mantle telling him to meet them at the inn. So Bilbo embarked on his journey to the inn as well as his adventure. Many divergences transpired during their trip to the lonely mountain where the dragon lay with the adventurers’ soon to be gold. The journey was no walk in the park. Many fights sprung up, traps triggered, dark forests in need of paths appeared, and having to deal with creatures like trolls, goblins, elves, spiders, and many others.

Thursday, October 24, 2019

How Multi-Agency Teams Work Together to Form a Support Network

14. 4. 2 Peter explained that multi-agency teams work together to form a support network, they also work together to make the best plan/programme for the parents, school and child to get the best possible outcome and the child to achieve their potential. A child struggling with communicating and language may see a speech and language therapist, special education needs co-ordinator, psychologist, depending on the child’s requirement all have a different job within the team to get the best out of the child. Special Education Needs Co-ordinator – They organise all the members in the team and keeps checks on how things are going and making sure that all members are talking to each other by planning meetings. Speech and language therapist – They diagnosis the communication delay and advice on ways the child can be helped and sets down a plan/programme. If a child is coping with other forms of disability then there are other team member that can help to bring the best out in a child, if they are have a visual impairment or have autism. Sensory support teacher – help children and advice schools that have visual or auditory impairment on how to keep the child involved and what they need to do extra to make the child feel at ease. Autism advisory teacher- advise schools on the needs of a child with autism, who maybe struggling with social interaction and communication. They may work with the child at the school to get the best outcome. If none of the above are having affect and the child still doesn’t seem to be making the right progress then an Educational Psychologist may come involved to talk to the child and find out if there are other problems affecting the child that other members in the team cannot see. All the above have to have a good working relationship together to get the best outcome for the child, each on brings different advice and support for the parents and school so that their child can achieve the best in either the fastest time or over a long period.

Wednesday, October 23, 2019

Voyeurism notes

Video voyeurism is a relatively new crime that involves the use of video cameras in public areas to record underneath women's clothing. Recently, several courts have determined that this form of voyeurism is not covered under existing criminal statutes dealing with voyeurism. This paper examines current statutes relating to voyeurism to determine if these laws are adequate or If new legislation Is required to combat video voyeurism.Some of the areas covered Include: the nature of video voyeurism, challenges faced by law enforcement, and the challenges faced by makers attempting to write legislation which will clearly criminality the behavior. The old crime of the ‘Peeping Tom' has advanced, through the use of technology, to become a crime that Is so ‘state of the art' that police, prosecutors, and legislators are having a hard time keeping pace (Pope, 1999).Recently, criminal voyeurs have taken advantage of the ever decreasing size of video and photographic equipment to f acilitate and expand the scope of their criminal actively. Today, two forms of video voyeurism have become so commonplace that they have received nicknames in the awe enforcement community: ‘upsetting' and ‘downsizing. ‘ These forms of voyeurism involve using a video camera in order to photograph underneath the clothing of women in public places. A voyeur takes a shopping bag and places a small video recording device inside the bag pointing upward.He then goes to a shopping mall and waits near the bottom of an escalator. When a woman wearing a skirt gets on the escalator he steps on behind her. He sets the shopping bag down on the step underneath her skirt so the video cording device is pointed up her skirt and turns it on. A voyeur who wants to participate in ‘downsizing' heads to the same mall and stands on the top floor looking down. When a woman wearing a revealing blouse walks by on a lower floor the perpetrator simply zooms in on the woman's cleavage.Th e vantage point from the upper level of the mall gives the voyeur a better viewpoint from which to record the breasts of the woman below. Such innovative invasions of privacy go far beyond that of yesterdays ‘Peeping Tom' whose crime was generally limited to looking into sidelines, and did not involve the making of a permanent video record. The damage Inflicted by perpetrators of video voyeurism goes much further in view of the ease with which homemade video recordings and photos can be uploaded and distributed via the Internet.A ‘Google' search of the terms ‘upstart' and ‘downspouts' on the Internet can return literally millions of ‘hits. Voyeurism notes By chrysanthemum voyeurism to determine if these laws are adequate or if new legislation is required to combat video voyeurism. Some of the areas covered include: the nature of video come a crime that is so ‘state of the art' that police, prosecutors, and legislators are having a hard time keepin g pace (Pope, 1999).Recently, criminal voyeurs have taken facilitate and expand the scope of their criminal activities. Today, two forms of video law enforcement community: ‘upsetting and ‘downsizing. ‘ These forms of participate in ‘downsizing heads to the same mall and stands on the top floor inflicted by perpetrators of video voyeurism goes much further in view of the ease via the Internet. A ‘Google' search of the terms ‘upstart' and ‘downspouts' on the

Tuesday, October 22, 2019

Disraeli and Gladstone essays

Disraeli and Gladstone essays After the middle of the eighteenth century in Great Britain, a group of men beholding the ideas of the new age appeared on political scene. Men who from conviction or the need of votes for their parties were disposed to fulfill some demands for political reform. The two great political leaders who dominated this era were William Ewart Gladstone and Benjamin Disraeli. Their different views helped guide England along the way to a form of Although the notoriety of most British prime ministers is short-lived, both Gladstone and Disraeli have never been forgotten. Disraeli, who began as a Liberal, eventually made his way to leadership in the Conservative (Tory) Party, while Gladstone, beginning as a Conservative, later on became the leader of the Liberal Party (Whigs). Both men were great speakers and parliamentarians, but while Disraeli was good with words, Gladstone was insensitive to the demands of style. The differences between the two men struck a strong feeling of mutual dislike and distrust. Gladstone's career spanned nearly the entire length of the nineteenth century. For more than sixty years he sat in Parliament, and he was four times prime minister. During the early part of his career he moved to the Liberal Party and became the champion of democracy and liberty. Disraeli on the other hand succeeded in lifting himself by intellect and determination to the highest position in England attainable by the effort of man. One of Disraeli's novels, Sybil (1845), was one of the influences which led to the elimination of many of the evils in the factory system. In 1852, Disraeli became the Chancellor of the Exchequer and leader of the House of Commons. He stuck to the ideals of the Conservative party: the maintenance of the Established Church and the aristocracy, the development of the empire, and the elevation of the masses. One of his greatest triumphs ...

Monday, October 21, 2019

buy custom Evidence-Based Research Paper Example

buy custom Evidence Pressure Ulcers: Risk Factors, Risk Assessment and Prevention of HAPU Introduction The increasing incidences of hospital acquired pressure ulcers is becoming a great concern for health care professionals. Pressure ulcers refer to localized injuries to the skin or the underlying tissue, which occur over a bony prominence because of pressure. The condition remains a key issue affecting about 3 million adults. Further, the Centers for Medicare and Medicaid Services reported that it would not cover the extra costs incurred for hospital-acquired ulcers. The announcement by the Centers for Medicare and Medicaid Services has led to an increased focus on the preventive strategies and inspection of pressure ulcers developing in patients after admission. An evidence-based nursing practice can be used in preventing hospital acquired pressure ulcers. Against this backdrop and based on evidence provided by previous literature, this paper develops a plan on the prevention of HAPU using the Braden Scale Tool.

Sunday, October 20, 2019

QUIZ What Career In Health Should You Choose

QUIZ What Career In Health Should You Choose So you’re thinking about going into healthcare but not quite sure where you would fit in best? The healthcare field is always growing and constantly in need of new hires. Healthcare is so broad it ranges from being a  medical assistant, registered nurse, therapist, pharmacist, home health aide, and there’s  so much more. The field is so diverse so you’re bound to find your perfect fit. This quiz is perfect for helping you decide your path into health care.  Source [Playbuzz]

Saturday, October 19, 2019

Child Rape in South Africa Essay Example | Topics and Well Written Essays - 1250 words

Child Rape in South Africa - Essay Example Crime is occurring at an unprecedented rate and South Africa now boasts some of the highest rates of violent crime in the world (De Capua & Robertson 2009). Yet, one of the most pressing social issues to emerge is the sexual violence of children. Child rape is occurring at unprecedented proportions resulting not only in the trauma of children but in the increase of HIV/AIDS infections. The South African legal system is struggling to cope with the number of child rape cases and many children's rights advocates argue that the system is flawed in its handling of sexual abuse victims, in particular children. This paper seeks to examine the issues surrounding child rape in South Africa including the role of the legal system in combating this issue. Apartheid emerged in 1948 and was a legalized system of segregation separating the white Boer minority from the Black, mixed-race and Indian majority (South African Government Information 2008). It was a complex set of laws that resulted in the oppression and marginalization of all non-whites in South Africa. Apartheid was brutally enforced by the white minority and state-sponsored violence was commonly used to maintain order and suppresses social uprisings. With the end of Apartheid in 1994, this legacy of social and economic inequality has remained resulting in extremely high levels of violence of which women and children are often victims (Human Rights Watch 2001). Due to social inequality, women and girls are often the most vulnerable victims of violence, in particular, gender-based violence such as rape and sexual abuse (Human Rights Watch 2001). Apartheid was deeply entrenched in South African society and it continues to impact the political, social and economic conditions of the country. Schools, in particular, have felt the brunt of the pervasive violence that has wrecked havoc on the country and its people. According to Human Rights Watch, "the South African education system today is still scarred by the racially discriminatory policies of apartheid and in particular the system of 'Bantu Education' imposed by the National Party government" (2001). During the period of resistance, where freedom fighters waged war against the oppressive Apartheid system, "schools were often transformed into sites of political struggle and frequently become violent spaces" (Human Rights Watch 2001). Since the dismantling of Apartheid, the government has struggled to compensate for the lack of professional teachers.

IT-LMS Essay Example | Topics and Well Written Essays - 4250 words

IT-LMS - Essay Example The researcher discussed the possible frameworks for introducing LMS for the first time at an institution or for migrating from one LMS system to another. This research paper also highlighted the way this technology can negatively affect pedagogy at institutions as instructors are forced to teach in certain ways. The researcher discussed this challenge in depth within the context of modern distance education programs that incorporate blended learning. Today’s education system still largely resembles the industrial age despite of the society’s shift to the so-called Information Age. In the industrial age, education placed the onus for learning on teachers and kept students passive. All students were treated as being the same with all expected to grasp and do the same tasks in the same amount of time (W. Watson & S. Watson, 2007). In today’s world, education stakeholders are demanding a more learner-centered education system to support the customized pace of instruction. It is difficult to see how it will be possible to achieve these new customized learning processes for individual learners without technology playing a central role. For this reason, over the past decade, there has been increased use of computers in education (W. Watson & S. Watson, 2007). This increased use of computers in education has resulted in literature that has an array of non-standardized terms and acronyms. The three more popular technologies often cited in the literature are Course Management Systems (CMS), Learning Management Systems (LMS), and Learning Content Management Systems (LCMS) (Coates, James, & Baldwin, 2005; W. Watson & S. Watson, 2007). LMS and these related technologies have the potential to meet these needs of today’s learners. This research will be focused on the integrated computer systems known as Learning Management Systems (LMS). It is therefore important to understand LMS, its merits and demerits, the way to implement it in institutions of

Friday, October 18, 2019

Arranged Marriage Term Paper Example | Topics and Well Written Essays - 2500 words

Arranged Marriage - Term Paper Example According to the term paper "Arranged Marriage" findings, arranged marriages are marriages arranged by the family members of the two partners. Even today in many parts of the world marriages are arranged by the families of the incumbents. The decision-making process in arranged marriages is quite different to the ‘love’ marriages popular in the West (Batabyal, 2001). The reasons are scientific. The young persons are not mature enough to choose the right partner. Their decisions would be based on aesthetics and pleasure while a successful marriage has to consider the family background. The youth would be guided by friendship and external factors whereas the family members would probe into the socio-economic search of the other family. While the marriages in India too are fixed by the two families, the consent of the two partners is paramount. The Indian families grow up with the conviction that marriages take place between two families and not two individuals. Thus, the f irst step is to evaluate the family when the proposal comes in. Once the two families are satisfied with each other’s standing in the society, the two potential partners in the marriage are provided an opportunity to talk to each other. This remains restricted to one or two meetings but their opinion does matter. Only when they give their consent the marriage is fixed. No coercion is exercised although when the two partners are very young, they may be shown the right direction in evaluating the taking the decision. The final decision however, rests on the two partners concerned. Thus, it is arranged to the extent that the family finds the prospective partner but the two agents have the right not to agree or get married. This sort of arranged marriage is healthy as there is no exchange or subjugation as in Pakistan. In Pakistan exchange marriages take place between where the family members or the close relatives of the spouses take the initiative to fix the marriages. In such societies patriarchic authority persists even today and such decisions are usually based on socio-economic relationships (Zaman, 2008). The two partners agree to such exchange marriages fixed by their elders for them and Zaman says they â€Å"subjugate themselves as actors to the agency of corporate family structures†. The reason for the involvement of families in arranging the marriages has several reasons. Such marriages provide social security as has also been pointed out by Zaman as it also helps to combat the security risks at both the macro and the micro levels. While security is important, partner compatibility is equally important which is not given importance to in Pakistan. Batabyal discusses about the utility of the traditional methods of decision-making in arrange marriages. He suggests that

Scholarly Writing Assignment Example | Topics and Well Written Essays - 250 words

Scholarly Writing - Assignment Example Through critical reading (Douglas, 2000) and analysis of the author’s reasoning using one’s purpose, information presented and conclusion (Paul & Elder, 2003, Spring), it can be deduced that the increase in use of personal computers does not reflect the current status of â€Å"digital divide†. The issue of â€Å"digital divide† or its non-existence has been over-generalized by the author. There are governments that restrict the use of computers in their countries or censor certain information. With the current technology, access to digital information from the computer or internet can be connected other gadgets. Thus, the divide can be perpetrated by the government according to its internal policies, such as the ban imposed by UAE (access of internet and sending of messages) and Saudi Arabia (on sending of instant messages) on some Blackberry functions because the government cannot monitor them (Walls, 2010, August 2). The author has also cited the 2001 Bu siness Week release that more than 80 percent of secondary students are â€Å"plugged in†, meaning, that they are constantly using the computer and the internet. Being â€Å"plugged in† may refer not only to personal computer use at home since there are public places and internet cafes that allow computer use for a certain fee.

Thursday, October 17, 2019

The Role of Computers in Industrial Espionage Research Paper

The Role of Computers in Industrial Espionage - Research Paper Example is, sharing sensitive information with suitable parties while protecting that information against competitors, suppliers, vandals, foreign governments, and customers. The attempt to gain access to a company’s plans, products and clients’ information, and whatever trade secrets are, is considered as industrial espionage. It describes activities such as theft of a business formula, practices, processes, design, instrument, pattern, or any vital information which is generally not accessible because these give the company leverage from competitors. Some other acts associated to this are bribery, blackmail, and technological surveillance. Intellectual property crimes are grave offenses in their own right, â€Å"not because they inflict physical injury or death upon a person, but rather because they steal creative work from its owner.† (Nasheri,) It is inevitable that a company aspires to know the business moves of a rival business and this has been the primary concern of some of the largest companies in the world. They have an annual budget and pool of people to handle these concerns. While it is true that to â€Å"survive in tod ay’s cutthroat business environment, [one] must be properly armed. And one of the most important arrows in the businessman’s quiver is accurate knowledge of his competitors and business environment – in other words, detailed knowledge of the enemy and the terrain of the battlefield,† (Rustmann, 2004) it is however unfortunate that commonly this said conduct is illegal. Oftentimes, rival companies will browse through public records in order to pre-empt actions about another company. However, when the search becomes private, industrial espionage is an unlawful act and punishable with financial penalties and sometimes jail time. Furthermore, this may lead businesses to bankruptcy and also affect the ties of friendly nations for when it already surpasses national boundaries it can make allied nations momentarily are indecisive and doubt

Arguments for and against Foreign Direct Investment In Developing Essay

Arguments for and against Foreign Direct Investment In Developing Countries - Essay Example According to the research findings it can therefore be said that foreign direct investment (FDI) is direct venture into business in a country by a company from another country. This can be either by buying a company in the intended country or by increasing operations of an open business in that country. In actual practice, FDI attraction may be  different in various countries. In this respect, technology, market access, growth, poverty reduction and the foreign direct investment outcomes of a country are extremely significant. Other aspects such as damages to the environment, regions and local capabilities are considered to be negative in a countries economy. For the last two decades, increased technological and liberalization advances have resulted into increased growth in the flow of FDI. This means that foreign direct investment gained in share of domestic investment and gross domestic product (GDP) in many countries. It is done for numerous reasons that involve taking advantage of low cost wages or for exceptional investment privileges like rewards to obtain a link that is tariff-free towards the countries markets or the regional market through the use of tax holidays granted to the company. Foreign direct investment is the submissiveness in security investments of various countries such that it comes in the form of securities and other investments being contrast with portfolio investments. The national accounts of a country, that relate to the equation of national income (Y=C+I+G+(X-M)) where I is investment plus foreign investment, The inflow minus outflow that amount to Net inflows of investment, is at least 10% or more of voting stash in an enterprise operating in an economy apart from that of the investor. It is the sum of other long-term capital, short-term capital and owners’ capital as frequently shown in the balance of payment. Transfer of technology & expertise, management involvement and joint venture are means used. The FDI may be both inward and outward, resulting in a net inflow that is positive or negative and "stock of foreign direct investment" that sums up the number for a given period. International factor investment is one example of FDI. Perspective FDI is the form of FDI that arises whenever a company ensures that its country-based income is duplicated using the similar stage chain in the hosting country by use of FDI. Podium FDI, and Vertical FDI that arises whenever a firm shifts upstream through FDI and downstream in various chain value through performing activities that adds value in a vertical fashion stage of a host country. The reduction in the international trade is attributed to the horizontal FDI as the most of them is usually move towards the host country while other two types generally act as a stimulus for it. Foreign direct investor gives out the power of voting of an enterprise within an economy by incorporating a wholly owned subsidiary / company anywhere, acquire shares in an associated enterprise, merger or acquire an unrelated enterprise, or participating in an equity joint venture with another financier or enterprise (Borensztein & De Gregorio, 2008). FDI incentives may take the following forms; Low individual income tax & corporation tax rates, tax holidays, preferential tariffs, which could be, a tax on a countries’ exports or imports inside and outside of a country, or a price schedule for services like as train service, buses route, and electricity usage, special economic zones(It involves a geographical region having economic and different laws that encourage the free-market. Export processing zones, bonded warehouses, â€Å"Maquiladoras† which is a Mexican name for manufacturing operations within a free trade zone(FTZ), where firms import material and equipment on a duty & tariff- free assembly basis, and manufacturing processing. After this, the assembled export are manufactured, and processed to give out finished products. In other situatio ns, raw materials are send to the origin country. Investment financial subsidies, soft loan or guarantees, free land or subsidies, relocation

Wednesday, October 16, 2019

The Role of Computers in Industrial Espionage Research Paper

The Role of Computers in Industrial Espionage - Research Paper Example is, sharing sensitive information with suitable parties while protecting that information against competitors, suppliers, vandals, foreign governments, and customers. The attempt to gain access to a company’s plans, products and clients’ information, and whatever trade secrets are, is considered as industrial espionage. It describes activities such as theft of a business formula, practices, processes, design, instrument, pattern, or any vital information which is generally not accessible because these give the company leverage from competitors. Some other acts associated to this are bribery, blackmail, and technological surveillance. Intellectual property crimes are grave offenses in their own right, â€Å"not because they inflict physical injury or death upon a person, but rather because they steal creative work from its owner.† (Nasheri,) It is inevitable that a company aspires to know the business moves of a rival business and this has been the primary concern of some of the largest companies in the world. They have an annual budget and pool of people to handle these concerns. While it is true that to â€Å"survive in tod ay’s cutthroat business environment, [one] must be properly armed. And one of the most important arrows in the businessman’s quiver is accurate knowledge of his competitors and business environment – in other words, detailed knowledge of the enemy and the terrain of the battlefield,† (Rustmann, 2004) it is however unfortunate that commonly this said conduct is illegal. Oftentimes, rival companies will browse through public records in order to pre-empt actions about another company. However, when the search becomes private, industrial espionage is an unlawful act and punishable with financial penalties and sometimes jail time. Furthermore, this may lead businesses to bankruptcy and also affect the ties of friendly nations for when it already surpasses national boundaries it can make allied nations momentarily are indecisive and doubt

Tuesday, October 15, 2019

Methods and tactics used to reduce gender and racial disparities in Essay

Methods and tactics used to reduce gender and racial disparities in prisons.-CRJ - Essay Example Lately the query about racial and gender disparities in prisons arises more occasionally and intensively, calling to implement specific instruments and tactics to diminish that phenomenon. Due to the statistic results African Americans and Hispanic lawbreakers are more likely to be convicted of felony than white people (Hartney & Vuong, 2009). Also in most cases the sentences of black people are longer. Disparity of arrest rates between racial groups strikes and scares drastically. Moreover, death penalty among colored prisoners is spread oftener than among white delinquents. In addition, there is a significant disproportion between male and female rates of criminality. All mentioned facts indicate the inequality in judicial system concerning offenders of different races and genders. According to stated problem several solutions that are aimed to reduce disparity can be recommended.

Monday, October 14, 2019

Essay Example for Free

Essay â€Å"Children need positive invitations to read, demonstrations, information, explanations that fit their understanding and texts that engage them if they are to learn what reading is all about† Meek in Carter, p. 146 Fables are short stories that have an abstract moral lesson, fables consist on talking animals which have human like qualities while others consist of only humans or both in a story. Fables impart moral values and life skills which are indeed valuable to young children. The Didatic value of two fables will and the way one would approach these texts in a classroom will be discussed in the following essay. Reading which is at the heart of any literature is key to the children’s development be it socially, academically or language development. Fables are a wonderful way of getting children to read as they offer enjoyment; it increases the child’s vocabulary and encourages use of the language. The child’s reading skills are developed and since most fables consist of talking animals and are not time bound it stimulates the children’s imaginations. We will look at two fables whereby one will realise that through the different characters and traits children have the advantage of comparing and understanding themselves or issues at hand. One will also see it expands children’s views of different places and cultures but most of all its scaffolds children to the realisation of moral values. Fables can be used to a teachers favour in a classroom environment. For example, children are playful by nature and there attention span is only that long to keep themselves stimulated you might find some learners disrupt the class by troubling other learners, playing tricks and acting the fool is common disturbances teachers face with youngsters. A fable that will suit children who play tricks on other learners will be â€Å"The boy who cried Wolf† By exposing children to different type of character, places and consciences they develop ‘innerresources’ stated by Bruno Bettelheim. Bettelheim discovered through observation of children at play, they would take on or associate with the main characters personality or traits. Placing into context ‘The Shepherd’s boy and the wolf’ with regards to the disruptive children in the classroom.One must first understand children nature. Children who are generally disruptive in a class are usually bored or simple does not want to take responsibility of the task given at hand. Young children usually don’t know how to express themselves. By reading fables such as the one mentioned above gives them a better platform to differentiate between right and wrong and what the result will be for bad behaviour. They receive the moral of the story subconsciously and respond on an emotional level. I would approach this text in a story telling lesson. Improvising a bit on the story to suit my situation saying that the shepherds boy was bored by looking after the sheep and wanted to play with other children but did not want to carry out the task of looking after the sheep thus neglecting his responsibility his father had trusted him with. As oral mode is   antastic way of relaying a fable. It’s almost magical when one starts a story with a long time ago†¦. Children instantaniously open to a world of fantasy and make belief†¦ After having told this story I will allow children to voice the feelings towards the shepherd’s boy and the angry villages. As them expressing   their feelings will increase their understanding of the underlying message. One must understandmoral lesson in fables are taken in subconsciously. The disruptive children will come to a realisation that him going on the way he does will only be to his demise†¦ the other children will start smarting up and not give him the upper hand and he would have to stop his bad behaviour. By experiencing the boy’s agony this will allow for the children to get in touch with their own feelings thus imparting a life skill and this ‘inner resource will come forth later in life, be it in their work environment or social life, that a liar will dig his own grave. I will not threaten them or point out to them that if you lie this is what will happen but through this fable they will subliminally receive the moral and the result will be in the change of their behaviour. Another fable we can look at his the Hare and the Tortoise Because children are still developing emotionally, psychologically, socially and their vocabulary of language, we must understand their need to feel that they are in a safe environment as the world of unknown is a frightening and overwhelming place for children. By having a clear depiction on good prevailing evil, being able to easily identify with hero and having the happy ending serves a source of security. More importantly the children see what acceptable behaviour is. In this case where the hare was over confident and showing arrogance that he could actually take a nap while waiting for the tortoise these characteristics caused him to ultimately loose the race and on the flip side of the coin, the tortoise who infect had almost no chance of winning was confident and smart despite all the odds which stood in his way. He displayed peserverance. These very personality traits caused him to win. Children will internalise these traits even though it is displayed by an animal children readily accept them as they believe and live in a world where anything is possible. They can easily associate that all livings things have human like qualities this is called ‘Animism’ This specific text I would approach by having a play but firstly have a storytelling lesson. The children would become familiar with the text and characters and then I would prepare them for a play. Personal interaction will make children recall better. I would involve them in preparing props and improvising a bit where other children would dress up like different animals of the forest and give them parts in which they will have a chance to act in the play by expressing their views on the race before it takes place. This will be stimulating exercise as children will experience first-hand the emotions of the characteristics allowing them to bank into their ‘inner resource’ after the play I would ask them to write down their feeling towards the story and what lesson did they learn to see how well they grasped the concept of the moral. Children learn well through fun and games so replaying fables such as these serve not only as good entertainment it also talks to emotions that children can relate to such as fear, love, success etc. and its relevant to children’s life as fables consist of a basic and easy to understand introduction, plot development, conflict, climax and a happy ending in most cases. There characters as seen in the above mentioned fables were clearly identifiable, the hero and the villain and their strengths and weakness were easy to relate to. The diction was suitable for the age of children who take interest in fables

Sunday, October 13, 2019

Dissection of Microrna-30Ds Function Roles

Dissection of Microrna-30Ds Function Roles DISSECTION OF MICRORNA-30DS FUNCTION ROLES IN MAMMALIAN PANCREATIC-BETA CELLS By:  Yiping Mao   ABSTRACT MicroRNAs (miRNAs) are a group of small non-coding RNAs (about 21-22 nucleotides long) that fine tune target protein output through messenger RNA degradation or inhibition of its translation. Recent studies showing that miRNAs and their function components respond to cellular stress to maintain steady state physiology of the cells. Since there are thousands of microRNAs existing in all kind of cells, their functional characterization during the normal states or stress conditions is not fully addressed yet. In this thesis, important aspects of pancreatic ÃŽÂ ²-cell function under normal or stress condition such as apoptosis, proliferation, insulin production and release and their regulation by the miRNA were explored. Pancreatic ÃŽÂ ²-cell is a group of insulin producing cells and plays critical role in maintaining glucose hemostasis. By combining mouse and cell line genetic approaches, high-throughput deep sequencing, a list of cell assays and molecular techniques, we have shed light on the novel roles of miR-30d, one highly expressed miRNA when ÃŽÂ ²-cell responding to high glucose stimulus, in regulating ÃŽÂ ²-cell mass on the middle aged mice. We demonstrated that overexpress of miR-30d deteriorated glucose tolerance ability of the mice with or without high fat diet treatment by significantly reducing the ÃŽÂ ²-cell mass with less insulin production. Additionally, we demonstrated that the reduced ÃŽÂ ²-cell mass is because both apoptosis pathway and proliferation p athway have been effected by miR-30d by targeting variety of protein factors expression. BCL2 interacting protein 3 (BNIP3) and cyclin E2 (CCNE2) have been respectively confirmed as miR-30ds targets and the effect of their regulation by miR-30d in pancreatic ÃŽÂ ²-cell proliferation or apoptosis aspects have been addressed as well. Furthermore, we could show that silencing of miR-30d in MIN6 cell (ÃŽÂ ²-cell mimicking cell line) by CRISPR-CAS9 gene editing system promotes the insulin secretion, which is through potentiated expression of MAFA, an insulin transcription factor. These studies uncovered novel functional roles of the miR-30d pathway in mediating ÃŽÂ ²-cell function and fate. Further dissection of these pathways shall uncover several mechanisms by which the ÃŽÂ ²-cells undertake to maximize their efficiency during disease states such as T2D.   CHAPTER 1: INTRODUCTION AND BACKGROUND 1.1 The Brief History of Diabetes and Research Long before terming diabetes, which means to pass through by Greek Apollonius of Memphis in 250 BCE and the re-discovery of honey-like-urine (glycosuria) by Thomas Willis, who included the term mellitus, Diabetes has discovered its first saying around 1500 B.C. in an Egyptian manuscript. It was perceived as a disease related with too great emptying of the urine (polyuria). Later, important discoveries includes Matthew Dobsons first proof of elevated urine and blood glucose levels (hyperglycemia) in people with diabetes (Dobson, 1776). In 1889, Joseph von Mering and Oskar Minkowski were the first to give evidence that pancreas removal in dogs induced diabetes, proposing that pancreas functional related to glucose levels. Afterward, Edward Albert Sharpey-Schafer proposed that diabetes could be brought on by losing a pancreatic chemical, which he named as insulin in 1910 (Polonsky, 2012). Taken together, diabetes is currently well recognized as a gathering of heterogeneous disorders cha racterized by hyperglycemia because of loss of insulin or its effectiveness. Current worldwide trends demonstrate a surprising 382 million individuals have diabetes and this is predicted to ascend to 592 million by the year 2035 (IDF Diabetes Atlas, 2013). The cases of diabetes complications, including diabetic retinopathy, cardiovascular disease and renal failure are constantly rising and the death rate because of those are worsen every year. Claude Bernards identification of liver as the major glucose production organ led to the first concept of homeostasis which has been termed and expanded by Walter Bradford in the mid-nineteenth century, to describe the maintaining of steady-state physiology of the cells (Robin, 1979). This gave the notion that actually the disturbed glucose homeostasis is one of the important events of the diabetes progression. Given the evidences of insulin is involved in maintaining the glucose homeostasis, Frederick Banting and Charles Best integrated a series of scientific approaches, and were able to purify the insulin from the pancreas. Moreover, they successfully treated the patients who suffer from the diabetes, with their purified insulin (Banting Best, 1922; Banting et al., 1922). This landmark finding set the stage for treating the severe diabetes with insulin. However, it has been almost a century now since the first time insulin was discovered and purified, diabetes remains the incurabl e disease, requires life-time attention and treatment because of its complexity. Diabetes has been classified as a couple different types nowadays, the major two types are known as the Type I Diabetes (T1D) or Insulin Dependent Diabetes Mellitus (IDDM) and Type II Diabetes (T2D) or Non-Insulin Dependent Diabetes Mellitus (NIDDM). Surprisingly, these two major types has been notified as early as 100-200 B.C by Indian physicians (Kahn, 1994). However, the first scientific evidence was brought by Wilhelm Falta and Harold Himsworth after they set the standardized glucose/insulin tolerance test in human to distinguish the insulin sensitive from non-sensitive patients (Himsworth, 1936). Insulin dependent T1D is featured in insufficient insulin production due to autoimmune response to the pancreatic beta-cells and it mostly affects young kids. T2D is more described as a metabolic syndrome with emergence of insulin resistance and obesity etc, and it is more common among adults (Moller, 2001). There is a complex network of several insulin responding tissues contributes to the maintenance of glucose homeostasis, and of course any abnormality in this network induces the progression of T2D. Besides the metabolic relevant tissues, the gene-interactions also play critical roles in the development of T2D and obesity such kind of metabolic diseases (Doria et al., 2008). 1.2 The Islet Architecture, ÃŽÂ ²-cell Fate determination The islets of Langerhans are specialized endocrine part of pancreas and are the only part producing the secreting hormones. They basically comprise of various cell sorts named ÃŽÂ ±, ÃŽÂ ², ÃŽÂ ´, PP, and ÃŽÂ µ that secret the islet hormones glucagon, insulin, somatostatin, polypeptide Y, and ghrelin individually, and these hormones are required to maintain the glucose homeostasis at normal or stress state. Furthermore, the islets are known to have dynamic and plastic architecture that is proposed to be adjusted over the time of development (Steiner et al., 2010). During the progression of insulin resistance, pregnancy or T2D, the islets extend in size to make up for expanded insulin requirement (Weir and Bonner-Weir, 2004; Kim et al., 2009). But afterwards, there is a considerable loss of ÃŽÂ ²-cell mass because of environmental or genetic factors, inducing the serious hyperglycemia in cause of insulin deficiency. While islets count to just ~1-2% of the whole pancreas, the insulin producing ÃŽÂ ²-cells represent ~65-80% of the islet mass, constituting to roughly 2% of pancreatic weight. Furthermore, the rest other cell types are considered as non ÃŽÂ ²-cells of the islets (Weir and Bonner-Weir, 2013). During the development, these distinctive cell types are known to emerge from a single progenitor cell that producing Neurogenin3 or Ngn3, a transcription factor that decides endocrine cell destiny (Edlund, 2002). Afterwards, other transcription factors, for example, Pdx1, Pax4, Nkx2.2, Nkx6.1, MafA, and Foxo1 help the ÃŽÂ ²-cell fate determination (Ziv et al., 2013). While it had been learned as that ÃŽÂ ²-cells proliferate by self-duplication from old ÃŽÂ ²-cells instead of differentiation from stem cell (Dor et al., 2004), some other study suggested that multipotent cells inside the pancreas could differentiate into ÃŽÂ ²-cells as well (Xu et al., 2008). The latter study is a lso confirmed by researches showing how expressing the ÃŽÂ ²-cell specific transcription factors in non ÃŽÂ ²-cell could trigger a ÃŽÂ ²-cell lineage in mice (Collombat et al., 2009; Al-Hasani et al., 2013). Recent studies additionally showing that non-ÃŽÂ ² cells, for example, ÃŽÂ ±-and ÃŽÂ ´-cells could experience transdifferentiation into ÃŽÂ ²-like cells when the mice is suffering from significant ÃŽÂ ²-cell loss (Thorel et al., 2010; Chera et al., 2014). On the other hand, a few researches demonstrate that the ÃŽÂ ²-cells can likewise lose their fate or dedifferentiate into non-ÃŽÂ ² or progenitor cells when losing any of the previously mentioned ÃŽÂ ²-cell particular transcription factor (Ziv et al., 2013). Moreover, a current study demonstrated that human ÃŽÂ ²-cells are capable of converting into ÃŽÂ ±-cells with no genetic modification (Spijker et al., 2013). Taken together, all these researches have showed that the dynamic plasticity of islet cells. 1.3 Glucose Stimulate Insulin Secretion One unique and significant feature of ÃŽÂ ²-cells is to detect the blood glucose changes and secrete insulin into extracellular milieu in response to keeping the glucose levels within the range of 4-8mM (Weir and Bonner-Weir, 2013). This is primarily accomplished by the take-up of extracellular glucose by the glucose transporter 2 (Glut2; Bell et al., 1990) at the plasma membrane. Upon uptake, the intracellular glucose sensor, glucokinase (Gck), subjects glucose moieties to quick metabolism system by glycolysis (Matschinsky and Ellerman, 1968). This brings about the producing of three carbon products: pyruvate, which takes part in the tricarboxylic corrosive (TCA) cycle inside the mitochondrion to eventually create adenosine triphosphates (ATP) by means of the electron transport chain system. The ATP therefore leads to the increase of ATP/ADP proportion in the cytoplasm, activating the closure of the ATP sensitive potassium (KATP) channel. Vitally, mutation in the kir6.2 subunit o f this channel were demonstrated to induce neonatal diabetes in both mice and human because of loss of insulin secretion as a consequence of constitutively open KATP channel (Koster et al., 2000; Gloyn et al., 2004). It has long been realized that glucose stimulates the closure of these KATP channels thus leading the slow menbrane depolarization (Ashcroft et al., 1984). This promotes extracellular calcium influx by voltage dependent calcium channels and potentiates the releasing of insulin (Matschinsky et al., 1998). Insulin is secreted in an oscillatory manner because of the blood glucose level and triggers downstream insulin signaling cascade in insulin-responsive tissues for the taking up glucose. It has well been shown that islets can be entrained to small changes in glucose and thus the plasma insulin has high frequency of oscillation. However, this capacity of entrainment of the islets is disturbed in patients with T2D (Mao et al., 1999). It exhibits ÃŽÂ ²-cell malfunction because of loss of insulin secretion is a major issue during the clinical indication of T2D. 1.4 Compensatory Islet Expansion During Insulin Resistance During the state of insulin resistance or over-weight, elevated plasma insulin levels (named hyperinsulinemia) has been found in polygenic mouse models showing insulin resistance and human subjects because of increasing of insulin secretion (Yalow and Berson, 1960; Polonsky et al., 1988; Brà ¼ning et al., 1997). It has been suggested later that both in rodents and people, this improved insulin secretion is apparently because of an expansion in ÃŽÂ ²-cell mass by either ÃŽÂ ²-cell proliferation (Steil et al., 2001) or ÃŽÂ ²-cell hypertrophy (Weir and Bonner-Weir, 2004). On the other hand, ÃŽÂ ²-cell failure because of different genetic or environmental variables, is known to cause declined plasma insulin levels in diabetics (Maclean and Ogilvie, 1955). It has been showed that lessened levels of insulin are frequently associated with a noteworthy loss of ÃŽÂ ²-cell mass because of ÃŽÂ ²-cell apoptosis (Butler et al., 2003; Rhodes, 2005). Other than the diabetes perspective, it has been demonstrated that matured ÃŽÂ ²-cells have long life-span and low proliferative rates at steady state. This is because of a potential limitation of the entry of matured ÃŽÂ ²-cells into cell cycle (Teta et al., 2005; Kushner, 2013). Other than this perception, later study suggested that adult ÃŽÂ ²-cells do have the ability to proliferate (Stolovich-Rain et al., 2012). In light of these findings on ÃŽÂ ²-cell proliferation, a few research groups have revealed various proteins essential for assisting ÃŽÂ ²-cell proliferation on knockout or transgenic mouse. Known cell cycle controllers including Cyclins D1 and D2, Cyclin subordinate kinase 4 (Cdk4), Cdk inhibitors (CKIs) such as Cip/Kip and INK4, transcription factors Retinoblastoma (Rb) and p53, have been proved on genetic mouse models as regulators of ÃŽÂ ²-cell proliferation and survival (Heit et al., 2006). Although transient high glucose has been considered as the result of insufficient insulin secretion or insulin resistance, it has also been revealed to promote the compensate ÃŽÂ ²-cell mass expansion (Bonner-Weir et al., 1989). This hypothesis was further supported recently by another observation, that it is the glucose metabolism, instead the glucose itself that triggers compensatory ÃŽÂ ²-cell proliferation in vivo (Porat et al., 2011). Some other attentions have been centered on the effect of activation of insulin/IRS2 pathway on driving ÃŽÂ ²-cell proliferation. The components of the pathway including IRS2 (Withers et al., 1998) and AKT (Bernal-Mizrachi et al., 2001) were demonstrated to be fundamental for ÃŽÂ ²-cell survival. Moreover, study has shown that the impact of insulin in ÃŽÂ ²-cell proliferation is even stronger when with hyperglycemia (Paris et al., 2003). It is notable that when in the state of severe insulin resistance, the pancreatic islets adjust t hemselves to meet the expanding requirement for producing and secretion more insulin by increasing their ÃŽÂ ²-cell mass (Weir and Bonner-Weir, 2004). Other than the involvement of protein coding genes, a few non-coding RNAs (ncRNAs), mostly microRNAs and long ncRNAs (lncRNAs), have been shown in the diabetogenes list, adding on to the complex genetic architecture of human diabetes. 2.1 The Brief History of MicroRNAs The most recent decade has seen huge attention regarding a new and special class of little ncRNAs such as microRNAs (miRNAs) in regulating the structure and function of ÃŽÂ ²-cells. With the first observation of a miRNA, lin-4 in C. elegans, researchers showed how a gene product encodes two little RNAs, instead of a protein. Besides, they demonstrated that these small RNAs binds to the compensatory sites at the 3 end of untranslated region (UTR) of lin-14, a development related heterochronic gene. This interaction is appeared to negatively regulate the expression of lin-14 by blocking its translation (Lee et al., 1993; Wightman et al., 1993), proposing miRNAs as negative regulators of gene expression. Even since the discovery of microRNAs, a lot of related research results have updated the mechanism of gene regulation to a novel level. miRNAs now are known as a group of small ncRNAs of ~21-22 nucleotides long that can complementary or non-complementary base-pairing the mRNA of protein coding genes, thus to regulate their expression at post-transcriptional level (Bartel, 2004 and 2009). Actually after the identification of lin-4, another miRNA called let-7 was revealed like lin-4 in both biogenesis and function level. Soon after, there starts a prevail in discovering new microRNASs mostly by high throughput sequencing technologies in research area and surprisingly, about 30,000 miRNA over about 200 species have been identified, which includes about 2,500 mature human miRNAs. (Kozomara and Griffiths-Jones, 2014). Many computational methods have also been produced to predict the potential targets of miRNAs based on the stable miRNA-target mRNA binding model (Lewis et al., 2003; Krek et al., 2005). 2.2 MicroRNA Induced Gene Silencing The intercellular gene silencing mechanism, termed as RNA silencing (RNAi) or post-transcriptional gene silencing (PTGS) is currently well known to be led by a group of small RNAs, for example, short interfering RNA (siRNA), piwi interacting RNA (piRNA), or the miRNAs. Basically, their working mechanisms are similar and the difference exist mostly in their biogenesis inside the cells (Ender and Meister, 2010). Mature miRNA producing has been through several steps: transcribed from DNA by RNA polymerase II, primary miRNA (pri-miRNA) has much longer sequence. Once transcribed, the pri-miRNA is further processed to precursor miRNA (pre-miRNA) about 60 nucleotides long by enzyme Dorsa and DGCR8 protein complex (Lee et al., 2003). Once pre-miRNAs are produced inside the nucleus, it will be export out of the nucleus by protein Exportin 5 to the cytoplasm in a Ran-GTP dependent manner (Lund et al., 2004). Another important enzyme, which is also critical for mouse development, Dicer would re cognize the pre-miRNA and process it to about 22 nucleotides long mature miRNA duplex form (Bernstein et al.,2003). Only one of stands of the duplex will be transported to miRNA-induced silencing complex (RISC) by Dicer, and the other strand, termed miRNA* is usually degraded in the end (Schwarz et al., 2003; Ender Meister, 2010). There are several components on the RISC, and one key protein component is AGO family. There are four well characterized members of AGO family in human AGO1, AGO2, AGO3 and AGO4. And AGO2 is expressed more often than other forms (Su et al., 2009; Wang et al., 2012). All the AGO proteins have the ability to slice mRNA because of their PAZ and PIWI cleavage domains under the guidance of miRNA sequence. Each miRNA has an important seed region, typically from 2nd-7th nucleotides, that could fully or partially bind to the mRNA 3 UTR sequence. The base pairing condition between the miRNA and target mRNA determines the target recognition and binding of miRISC, but also the fate of the mRNA- to be cleaved or to be repressed in translation. In animal system, the miRNA does not fully complementary bind to the 3 UTR of the target mRNA, through blocking the translation machinery, miRNA silencing the gene expression, without interference of the target stability. However, recent studies on the miR NA mediated gene silencing in mammalian cells reveals that miRNA may act through two step modes: at first, repressing the translation, then deadenylation and destabilization of target mRNA [27qualifier]. The deadenylation has been suggested to induce mRNA degradation [48] and translation inhibition is probably the requisite of mRNA degradation in mammalian cells [49].

Saturday, October 12, 2019

Cloning More Ethically Acceptable than Global Warming Essay -- Climate

Cloning More Ethically Acceptable than Global Warming One day soon, human clones will walk among us. Does the thought send a shiver up your spine? How about the notion of eating french fries from a potato engineered with jellyfish genes to make its leaves bioluminescent? We should consider our responses to both issues now, before reality comes knocking at the door. Several groups have announced intentions to clone humans, and the bioluminescence gene has already been successfully incorporated into potato plants. If those prospects make you squirm, you're not alone. The public's emotional response to the issues of human cloning and biotechnology far outstrips its response to global warming and widespread species extinction. When Dolly the sheep was first cloned by Scottish scientists, political leaders around the world sensed the negative reactions among their constituents and moved to pass legislation banning the new technology in humans. Any new developments in the area stir up fresh controversy, such that the cloning issue is frequently featured on the front page of major newspapers. These articles seem to suggest that apart from a few mad scientists, most everyone agrees that cloning humans is wrong. But why is it so wrong? Consider the Monitor's quotes from the experts. Professor Chen, vice-president of Beijing University, says about human cloning, "There isn't a controversy. There's no real discussion. We know it's wrong and not natural." John White, who is secretary for science policy at the Australian Academy of Science, is equally willing to speak authoritatively on the issue: "We clearly oppose cloning whole human beings. There are too many troubling ethical and moral issues." &nbs... ...oss of biodiversity, humans are playing God to the extreme and are seriously harming the organisms themselves, as well as existing and future generations of humans. If tinkering with the genes of God/Nature's creations is wrong, then surely the complete extinction of thousands of species - of God/Nature's creation - and the complete transformation of His/Her planet is the ultimate evil. For the sake of consistency and morality, we must get passionate about these issues. Since Dolly the sheep hit the headlines in 1997, many people think of cloning whenever they think broadly of "ethical issues." Genetic engineering conjures the same reaction for similar reasons. But cloning and genetic engineering are nothing but small moral peanuts in relation to our negligent treatment of the organisms that grace this planet and render it habitable for humanity.

Friday, October 11, 2019

Job Shadowing Project

Job shadowing a great lawyer and family friend, Nancy Vanilla. I have nearly always wanted to be a lawyer, and in all honesty I was a little concerned that after watching a real court hearing, and seeing all the work that lawyers actually have to put into each and every case, I would no longer wish to become a lawyer. However my fears were removed entirely as soon as I walked into her downtown Fort Worth office; the day I had arranged to Job shadow Mrs..Vanilla, she had a court hearing in Denton, so immediately upon my arrival I as exposed to the last minute stress of getting the clients case in order. I was able to help Mrs.. Vanilla with getting her paper work in order, before going to the court house. This was the first time I had ever sat and watched a court hearing, and I was completely fascinated through the entirety of the hearing. I was able to watch two exceptional lawyers in action, and I could not have more impressed by either performance. At the end of my time with Mrs..V anilla I was able to sit with her and ask questions about her profession. During this time Is when I became completely and totally positive that this was the career I wanted to pursue. She was so passionate about what she did, and she explained to me the parts of the Job that most people don't really take Into consideration. I realized that I wanted to learn about and how to interpret the law, and use It to protect people as it was designed to do. I could not be more thankful for the opportunity given to me through this assignment, and through Mrs.. Vanilla's willingness to work with me.

Thursday, October 10, 2019

The Purpose Of Measurements Health And Social Care Essay

In this practical, we are making hand-on measuring on length and comprehensiveness of the topic. By mensurating the length and comprehensiveness, it will enable us to gauge the organic structure frame and organic structure composing of the topic. For illustration, biepicondylar humerus ( elbow comprehensiveness ) is a good step of frame size and skeletal dimensions. It is less affected by adiposeness comparison to other anthropometric dimension and it is besides extremely associated with musculus size and thin organic structure mass. Beside that, length and breadth step can besides assist jocks to find the best organic structure composing for public presentation. For illustration, a swimmer may necessitate larger biacromial measuring to execute good in his athletics. Other than that, length and breadth step can besides utilize to supervise the growing and development of kid. The challenges we face in executing the measuring include trouble in landmarking. For illustration, as an inexperient pupil, we found trouble in placing the acromiale particularly in feeling the spinal column of the shoulder blade. Besides, we besides find trouble in mensurating the biepicondylar thighbone as we have difficulty in placing the sites of the epicondyles due to the midst hypodermic bed below the tegument. Furthermore, during the practical, while we use the anthropometer or calliper to use force per unit area to compact the overlying tissue in order to obtain a more accurate reading, the calliper will be given to skid off from the site of the landmark. This job particularly occur in mensurating biacromial and biepicondylar thighbone. The consequences of organic structure fat and musculus mass got from computations and utilizing bioelectrical electric resistance analysis ( BIA ) are different. By computation, the organic structure fat and musculus mass obtained are 21.1 % and 78.9 % severally. Whereas for BIA, the organic structure fat and musculus mass obtained are 25.6 % and 74.4 % severally by utilizing manus held machine and 28.9 % and 71.1 % severally by utilizing 4-point machine. There is difference of consequence for organic structure fat and musculus mass from computations and utilizing BIA. This is because consequence of organic structure fat and musculus mass from computation are utilizing skinfold thickness measuring. During the measuring of skinfold thickness, there may hold some intra-measurer mistake from site of landmarking and measuring, skinfold squeezability, variableness between readings and besides technique of utilizing the equipment. Whereas by utilizing BIA machine, less proficient mistake w ill happen as we merely identify in information such as age, gender, tallness and weight to acquire the per centum of organic structure fat. Therefore, computation of organic structure composing utilizing BIA machine have higher preciseness. The organic structure fat and musculus mass obtained are 25.55 % and 74.45 % severally by utilizing manus held machine and 28.95 % and 71.05 % severally by utilizing 4-point machine. There is a difference of consequence between manus held machine and 4-point machine as manus held machine merely has 2-point electrodes directing electric current to the organic structure while 4-point machine has 4-point electrodes directing electric current which is more accurate in gauging organic structure composing. Harmonizing to the Recommended Percent Body Fat Cut-off Points for Adult Individual ( 18 old ages and above ) , the per centum of organic structure fat obtained from both machine is still within the acceptable ( upper terminal ) . Skinfold measuring is easy to make one time accomplishment has been mastered. In general, combination of skinfold measuring provides a more valid appraisal of organic structure fat content and can bespeak the distribution of hypodermic fat. It does non necessitate much clip as consequence can be produced instantly. It is besides a noninvasive method for step organic structure fat and musculus mass. The equipment used for illustration harpender, slender usher and Lange are cheap and portable comparison to other machine for mensurating per centum organic structure fat such as double energy X ray and plethymography. The restriction may include big technician mistake from site of landmarking and measuring, skinfold squeezability and besides technique of utilizing the equipment. For illustration, some of the finger-thumb pinch or caliper arrangement during measurement may be excessively deep ( musculus ) or excessively superficial ( tegument ) . Another illustration is mid-arm point is fa lsely measured or marked. Besides, skinfold thickness may besides impact by factor other than sum of fat, for illustration exercising, hydrops, dermatitis which will increase the skin thickness and besides desiccation which will diminish the skinfold thickness. It may non besides be an ideal measuring for those who are corpulent and really thin. Bioelectrical electric resistance analysis ( BIA ) is non-invasive, particularly compared to the hydrostatic deliberation and skinfold calliper method. It besides give a good appraisal of organic structure fat per centum. It is besides speedy and easy to utilize in the field by merely key in information such as age, gender, tallness and weight to acquire the per centum of organic structure fat of the topic. The machine is besides low in cost and portable to convey to anyplace compare to other machine for mensurating per centum organic structure fat such as double energy X ray and plethymography. The restriction of BIA is that BIA is hydration-dependent. To guarantee accurate organic structure unstable consequences, the topic should non exert or execute any vigorous activity for at least 8 hours. Besides, the topic should non devour drinks such as caffeine or intoxicant in big measures 12 hours before the trial as these drinks are water pills. The status of the topic such as desiccati on, hydrops, fed or fast province will besides impact the consequence. For a particular status that patient has an automatic implantable cardiac defibrillator ( AICD ) , so BIA should non be done. Waist and hip perimeters can utilize to cipher waist to hip ratio ( waist perimeters divided by hip perimeters ) . The waist to hip ratio is a utile method to separate blubber between abdominal country and lower organic structure country. Lower organic structure fleshiness is frequently referred to as â€Å" gynoid fleshiness † as it is more typical to female while abdominal fleshiness is called â€Å" android fleshiness † which is more common among male. Whereas corpulent work forces and adult females can be classified into either group without refering about their sex. The hypodermic fat which is the external fat are mostly found in lower bole while the splanchnic fat which is the internal fat are chiefly found in abdominal country. Deposition of extra fat in the venters as a proportion of entire organic structure fat is strongly associated with increased hazard of developing certain metabolic upsets and obesity-related disease such as hyperinsulinemia, Type 2 diabete s mellitus, lipemia, high blood pressure, coronary bosom disease and others. This sort of fleshiness realted diseases are more likely to be associated with an abdominal fleshiness than a lower organic structure fleshiness. Apart from that, persons with higher waist and hip perimeter will be higher in entire organic structure fat mass. Therefore, beside BMI, waist and hip perimeter should besides be consider every bit good when determinining whether an person is healthy or non. This is because if an person has a normal BMI, but have waist perimeters or waist and hip ratio greater than the acceptable scope, the person is still holding hazard of developing obesity-related disease and metabolic upsets. The % of TEM calculated from skinfold measuring: triceps, subscapular, biceps, and suprailiac are 2.3 % , 3.6 % , 4.2 % , and 1.9 % severally. The values are still acceptable as compared to the mark TEM. Calculations of TEM are needed in skinfold measuring due to skinfolds are notoriously imprecise and both within and between tester mistake can be big. In this practical, due to single work, within tester mistake will be the chief concerned. Poor preciseness frequently reflects within tester mistake ensuing from unequal preparation, instrument mistake and trouble in doing the measuring.

Media Depiction of Teenagers

Britain, the land of hope and glory, or maybe not. Media today seems to be painting an inept picture of Britain, the land of drugs and ASBO's. Are we really that bad? Can you seriously say that all teenagers are unbelievably badly behaved even when we're not! Sure, we as teenagers are sometimes bad and don't do homework, however, what about the adults who are mercilessly murdering innocent people? Have we simply forgotten about those? I hope not, I think that it's about time we started to remember those few adults and started to weigh the sides against each other. Fact is, whatever way you look at it, people are bad. There are a select few that sit on street corners, drinking vodka and use every swear word that is known to man at old ladies driving past in their little mini's. Yes, but at least we aren't on the M11 speeding at 100 miles per our and totalling three cars every five minutes. Yes, we aren't perfect but neither are these so called adults. So to say that we are all â€Å"little emperors† is that at all fair? No! Of course it isn't. It's only a small percentage of people, namely teenagers, who actually do these hanist crimes. So, stop giving just teenagers a hard time, all the time. Be fair for once and we may, just may, start treating you with the respect you all demand most of the time unfairly. A perfect example of a â€Å"Jeremy Kyle† teenager is a Miss Emily Travell, only fifteen, and pregnant with her second child, a regular in the local boozers and with a reputation not to be shouted about. Not a freshman to the police either, just recently was taken in for indecent exposure, however, I'm sure whenever she isn't drinking, taking unseemly powders, that she is really quite nice. Also there's a saying â€Å"You grow up like those who you're around†, what about that? Yes, ok, using Emily Travell as an example does actually show you what some, not all teenagers, get up to, however, she is only a very small percentage of the population that chooses to act in this appalling way. Most teens are actually really well behaved; they don't commit crime, they don't have underage sex and actually do act like teenagers should. However can you even define what a good teenager is anymore? If you look at most adults they aren't exactly the best role models in the world, so how are we supposed to act? Its confusing; you say act like your parents would; some do and get slated for it. Fact is, that we are teenagers and yes, I agree that neo excuse for anything we do wrong but I'm positive that when you were our age you would have acted the same, maybe you did things in different ways, however it's the same sort of principle. If you are fair in judging us then maybe we could return that small favour? Maybe that rebellious instinct that we are all born with is still there in you adults too? No one is perfect, that is a simple fact of life which won't be changing anytime soon, nor can you really determine what perfect is. Maybe, just maybe, if you were to stop squabbling amongst and actually, shock horror, started to act like adults, then maybe we might start taking you for real as a proper role model, not a fake one. Exams; how on earth would you know that they're getting easier? You're not taking them; we are and let me confirm that in no way, shape or form are they getting easier; quite the opposite really. Sorry and all but when you've been writing for days on end trying to desperately get your coursework done and then your plonked right in front of an hour writing exam, is that not a decent enough reason for us to be annoyed at the adult race who believes it great to get us to do a few tests here and a few more there? Also I would like to see each adult that has a problem with the current GCSE test difficulty to get out of their office and sit them; lets see if you all pass and if your opinion changes. I can bet it will. Frankly, GCSE's seem pointless because they're always changing therefore if were all being fair here, how on earth can you get a consistent reading which you can compare? Without a sure set of results you can't expect people to just take your word for the exams getting easier. Maybe if you stopped changing them every two days then we may just get something to use on a larger scale and from that we can show whether GCSEs are getting harder or as you say, easier. Although I suppose the adults, our parents, have forgotten the general idea that teachers may get better training than that of 1852, yes, they actually do. Remember those taxes you moan about too? That helps for their training to so don't be such a hypocrite. They get at least six, yes, count them, six training days a year. Surely that means that teachers are better qualified? Besides why would you want to mean now? You are never happy, you are grumpy and absolutely kill us however when we actually do something right for once they moan even more! It's a vicious cycle which we can't escape from. You really don't even give us a chance to get better since you don't help, you simply bombard our minds and emotions with rants about pointless things we don't need to hear for the 50th time. That's a great example of us being bitter because you talk too much. At the end of the day, we are trying our best to behave and get good grades, which is incidentally what you want us to do. If you want us to do something else, then simply say. We have no choice but to do it because we live under your roof. All we ask is that you are fair when you judge us because if I'm blunt, you haven't been and truthfully you've just made the situation worsen and made it deeper. At the end of the day when I sit down to watch the BBC news, I expect to see teenagers being unfairly slandered. I can only hope for the day when our children can see a completely different screen.

Wednesday, October 9, 2019

Mies van der Rohe architecture Term Paper Example | Topics and Well Written Essays - 1250 words

Mies van der Rohe architecture - Term Paper Example Mies is known for the spiritualization of technique and he was an architect with the special ability to reduce all the problems of his character to the essential simplicity of his architecture. Significantly, the modern style in architecture commonly referred to as High Modernism was introduced in United States of America mainly by Mies van der Rohe and Walter Gropius. Mies van der Rohe worked as the director of Germany’s most famous design school, Bauhaus, during 1930-33 and he started applying the Modern architectural style to his works. The liberal members of the Bauhaus such as Mies and Gropius found their way in due course to America when it was disbanded by the Nazis and they reworked the modernist architecture in the 1940s and 50s. As a proponent of the modern architecture, Mies defined interior spaces with modern materials like industrial steel and plate glass in his mature buildings. One of the characteristic features of his style of architecture is that it made use o f minimal framework of structural order and he is the most important architect of the modernist and late-modernist architecture. Significantly, Mies van der Rohe is highly recognized for his skin and bones style architecture and his modernist architecture is esteemed for its plain surfaces and straightforward rectangular shapes which was adapted to the corporate skyscrapers, apartments, and university buildings. As E. C. Relph maintains, â€Å"his plans were simplicity itself. All the buildings were arranged in lines and at right angles, and their basic form was that of a carefully proportioned cube expressing the structure of steel columns and beams as perfectly as possible. The slogan Mies invented to express his design philosophy was ‘Less is More’.† (Relph, 191) Therefore, it is fundamental to maintain that the modernist architecture style introduced by Mies has been noted for simplicity and the skin and bones style achieved grand success in modern architectu re. This paper makes a profound analysis of Mies van der Rohe architecture in order to realize how his work relates to ‘modernism’ we can appreciate today. Born as the son of a stonemason, Mies van der Rohe received practical experience in construction during the early stages of his life and his later architecture style proved to be the milestone in modernist architecture. Soon he became Germany’s most important architect of his time and severed as the director of Bauhaus where he applied his Modernist architectural principles to his works. Whereas his early designs as an independent designer show the influence of Schinkel, he rapidly grew into a Modernist architect with original designs and styles, and his concept of a transparent skyscraper marked a new step towards Modernism. However, due to the scantiness of material science and construction techniques, it took more time for him to establish as the leading proponent of High Modernism. In 1938, he became the h ead of the architectural school at the Illinois Institute of Technology in Chicago and he redefined Modern architecture with a string of important commissions in the following years. â€Å"The elevated glass cube of the Farnsworth House (1950) in Plano, Illinois, took ideas of open, simple interior spaces to their extreme. The pristine steel and glass tower of the Lake Shore Drive Apartments (1951) in Chicago were hailed as perfect new renditions of this building type, and the Seagram Building (1958) in New York was viewed as the prototypical new skyscraper.†

Tuesday, October 8, 2019

The Myth of Horoscope Is Not True Essay Example | Topics and Well Written Essays - 1000 words

The Myth of Horoscope Is Not True - Essay Example However, I personally think the myth of horoscopy is not completely true. It is an unrealistic approach towards astronomy and a combination of psychological theories and techniques which effects people’s imagination and beliefs. Before talking about the truth of horoscope, it is important to know that where it came from. It can be traced back in Mesopotamia five thousand years ago; where many different races such as Babylonians and Assyrian lived. Their original religion had certain level of believe in celestial body. In fact, astronomy was practiced as horoscopy during that time period. They used to relate certain stars with the animal or human image. Later in about 592 B.C., Greeks named the images on sky after their gods and created stories to explain about their existence in sky. These illusions became what we call constellations nowadays. Horoscopy uses those constellations, planets and their movement in solar system to predict. Constellations are just configuration of stars as we see it from earth. The contradiction is how a person’s fate can be judged by the stars which are hundred million light-years away from earth. Constellations are nihility, and it is not necessary for astronomers to name each group of stars. Astronomers can simply assign a number to stars, but it will make astronomy somewhat boring for people. Therefore, in order to make it interesting and easy to remember, Greeks associated constellations with fairy tales. Astronomy is art of science, but unfortunately, horoscopy manipulates the original meaning of astronomy. Those who believe in it completely are losing their sense of judgment. Horoscopy is merely a combination of statistical and psychological techniques. First, astrologers collect the data about a group of people with same constellation. On the basis of collected data, they analyze people for similar characteristics. Second, they classify constellation’s characteristics with the

Monday, October 7, 2019

Postcolonial literature challenges the viability of the notion of a Essay

Postcolonial literature challenges the viability of the notion of a fixed identity. Consider how the colonial practice of othering is deconstructed in later novels - Essay Example Colonization has the strong impact on the history of the world that gave rise to the several revolutions, rebellions and different social changes in the society. Post-colonial literature has played a key role, in order to get through of the colonial system of the society. Post-colonial literature gives the sense of distinctive social identity and the otherness due the social culture and norms that are the main source of identification in the world since the early days of its creation. Identity is the element that gives the person realization of his importance in the society whereas Otherness is the distinctive factor that differentiates the person and his abilities in respect to others. Post-colonial literature came into existence as an opposition to the colonial system that ruled the society. It awakened the society to fight for their identity by giving them a sense of otherness in cultural and social aspects1. There are three books that have been discussed below in an account to this, these books belong to the colonial period, and they are also the perfect example of post-colonial literature. The book jasmine has depicted the struggle of the typical Punjabi girl of India and her journey of life in order to attain her distinctive identity in the society and American dream in term of social acceptance and self-contentment. Another book that has been discussed is the ‘Wide Sargasso Sea’, in which Antoinette’s has struggled for the attainment of her identity that has been having been perfectly illustrated in the book... The book gives a sense of otherness by being in a society where the number of other communities was dwelling and struggling to achieve their social identity. The third book that has been discussed in these papers is Black Mischief by Evelyn Waugh. In which the main character Seth can be observe having difficulty in

Saturday, October 5, 2019

Computer Shop Limited (CSL) Assignment Example | Topics and Well Written Essays - 4000 words

Computer Shop Limited (CSL) - Assignment Example Cloud Computing Service Models The organization’s data center provides hardware and software services. These services are provisioned by the Cloud Computing applications on the web. Similarly, the Internet services that are provided via cloud computing are called as ‘Software as a Service’ SaaS. The vendors use the term Infrastructure as a service ‘IaaS’ and Platform as a service ‘PaaS’ in order to display their products and services. Due to huge variations, the terms that are explained here are not accepted worldwide. The department of commerce NIST (National Institute of Standards and Technology) defined some useful explanations that are based on three concepts Simple computing resources regarding Cloud infrastructure as a service ‘IaaS’ are provided. Software applications are accessed by Cloud Software as a service ‘SaaS’ that can operate cloud infrastructure. For implementing and developing applications along with programming language and tools, the Cloud Platform as a service ‘PaaS’ provides to the customers. The data center hardware and software contains the major components of a cloud. The resources are available for general public also referred as public clouds and the cloud service providers are known as utility computing. Furthermore, the clouds that are not accessible for public are called as private clouds. The combination of the two, ‘SaaS’ and utility computing forms Cloud computing. (ARMBRUST, FOX et al. 2010). There are three service models for cloud computing i.e. infrastructure as a service, platform as a service and software as a service (Wilshusen 2011). Infrastructure as a service (IaaS) is comprised of three components i.e. software, platform and infrastructure. Organizations only provide software and platform and infrastructure is provided by a third party cloud computing vendor. The second service models i.e. platform as a service (PaaS) als o comprises of three components i.e. software, platform and infrastructure. Organizations only provide a software or application that will be executed on the third party or the vendor’s platform and infrastructure. The third service model also includes the similar three components as mentioned before and called as software as a service (SaaS). Organizations only utilize the services provided by the vendors in terms of applications that can be accessed by the Internet. All the three components i.e. software, platform and infrastructure are the property of the vendor (Wilshusen 2011). In figure 1.1, cloud deployment models are demonstrated Figure 1.1 (Retreived from :Wilshusen, G. C. (2011). INFORMATION SECURITY: Additional guidance needed to address cloud computing concerns. GAO Reports, , 1.) Cloud computing four service models are shown in Fig 1.2 Figure 1.2 (Retreived from :Wilshusen, G. C. (2011). INFORMATION SECURITY: Additional guidance needed to address cloud computing concerns. GAO Reports, , 1.) ‘Business Cloud’ must choose the relevant client model, as it will be proportional to the business or customer requirements and may differ from organization to organization and business types. The first service model is called as the ‘Private Cloud’. A private cloud is solely a property of the organization i.e. software, platform and infrastructure is the property of the organization (Wilshusen 2011). The second service model is called as the community cloud that is accessible to several organizations that may be similar to business types and will focus