Saturday, November 30, 2019

Motivation Theory In Business Essays - Motivational Theories

Motivation Theory In Business B-12, G-47, I-24, O-51, I-5, N-36.BINGO!!!!!! A simple game of bingo, if analyzed closely, can be shown to be a tedious task consisting of a repetitive action that occurs after being prompted by a repetitive stimulus. The skill level needed to make that action is low, and the variability in the rules of the game rarely changes. This game is not unlike many of the jobs that can be classified as having low motivational potential scores (Hackman, et al). So why do people not only enjoy playing games like bingo, but actually pay money to have the pleasure? The answer directly points to the motivating factors of monetary rewards and recognition which are provided on a variable-ratio schedule. Motivation by reinforcement (Miller). There are many theories regarding motivation with the most prevalent being the theories of Maslow and Herzberg. It is important to understand these theories and their implications to accurately comment on reinforcement theories of motivation. According to Maslows hierarchy of needs, there are five classes: (1) physiological, (2) safety, (3) social, (4) esteem, and (5) self-actualization. Each lower level need must be satisfied before an individual experiences higher level needs. Also, Maslow hypothesized that as physiological, safety, social, and esteem needs were satisfied, they ceased to motivate, while the self-actualization needs actually motivate an individual more as they are satisfied (Schwab, 1978: 57). Herzberg used this theory as a base to build his motivation-hygiene theory which ties Maslows needs to on the job achievement. The hygiene elements relate to low needs (physiological, safety, and social). For an individual, hygiene conditions include company policy and adminis tration, supervision, relationships with peers and supervisors, work conditions, salary, status, and security. These, according to Herzberg account for 69% of the factors which cause employee dissatisfaction or lack of motivation. The motivation conditions, which include achievement, the job itself, recognition, responsibilities, and personal growth, accounted for 81% of the factors which contributed to job satisfaction. The hygiene conditions are extrinsic factors while the motivation conditions are intrinsic factors, and the only way to sustain motivation toward organizational goals is through the achievement of intrinsic outcomes. Each of these theories have proven to contain ideas consistent with human nature, but each also has its limitations within organizational settings. Because lower order needs are generally satisfied in the workplace today, managers have to deal with how to provide esteem and self-actualization to their employees, and that can be a nebulous concept to a m anager who demands results immediately. Also, studies demonstrate that different workers are motivated by different factors be them intrinsic or extrinsic. Centers and Bugentals studies on intrinsic and extrinsic job motivation among different segments of the working population, show that while skilled workers are motivated the intrinsic rewards of their employment, lesser skilled workers in jobs that are deemed routine were motivated by extrinsic factors such as incentives and bonuses. This fact can be reaffirmed by analyzing union contacts and job descriptions in an industry like the steel industry. Employees who have routine jobs or jobs that have little in the way of decision making are often provided high monetary incentives based on productivity and quality. These ideas do not discount the work of Herzberg and Maslow, but instead show that as needs progress up the hierarchy ladder, focus must be made on what a manager should do to provide their workers with what they lack, an increasingly difficult task that have influenced the motivational theories of job enrichment (Hackman, et al. 1975). Job enrichment efforts have proven somewhat successful in improving performance and attitude amongst employees. Job enrichment theories are analogous to why people enjoy games so much. M. Scott Meyer wrote in his book, Every Employee a Manager, that the key to job enrichment can be related to why people enjoy bowling. His answer sums of the seven characteristics of bowling: 1. The bowler has a visible goal, 2. he has a challenging but attainable goal, 3. he is working according to his own personally accepted standards, 4. he receives immediate feedback, 5. he has an opportunity to satisfy social needs, 6. he is an accepted member of a group, and 7. he can earn recognition. The one thing that job enrichment cannot do, however, is make

Tuesday, November 26, 2019

IP)

Transmission Control Protocol/Internet Protocol (TCP/IP) Transmission Control Protocol/Internet Protocol (TCP/IP) Definition of TCP/IP TCP/IP is an abbreviation for the Transmission Control Protocol/ Internet Protocol. TCP/IP is often regarded as a protocol matching set that was named subsequent to the pairing of dualistically essential protocols namely, IP and TCP. Thus, it can be defined as a primary communication element applicable through the internet.Advertising We will write a custom term paper sample on Transmission Control Protocol/Internet Protocol (TCP/IP) specifically for you for only $16.05 $11/page Learn More It represents network protocol sets that offer support to networked computers to easily link up with the others. TCP/IP which is a universally known internet protocol suite is comprised of sets of layers whereby every layer is in charge of a specific network task while at the same time offering specific services to the upper layer. Internet Protocol Suite was first developed by the Defense Advanc ed Research Projects Agency (DARPA) in the fiscal 1970s. Applications and uses of TCP/IP Basically, TCP is commonly applicable during the transfer of data files and emails. The lower layer protocols of the TCP/IP functions at levels which are adjacent to the user and handles abstract data. IP and TCP became the initial protocols to be well-defined under the Internet Protocol Suite standard. It is as a result of these protocols that the name of the protocol suite materialized. Conversely, the Transmission Protocol Control functions on the internet protocol suite known as the transport layer where it offers the networked computers with dependable facilities for communication. As a network protocol, IP is used to communicate data above packaged switch network. IP facilitates the transfer of diagrams founded on the IP network hosts addresses while operating on the protocol suite internet layer. In the TCP/IP protocol pile, the highest level protocols are the application protocols. In fa ct, the application protocols are the visible user interface to the protocol suite of the TPC/IP and always communicate with other internet hosts applications. Each application protocol possesses features similar to others (Helmig n.p.). The features which exemplify their uses and applications are as follows: TCP/IP protocols are applications transported and standardized with the products of TCP/IP or user written applications. The protocol suite for TCP/IP incorporates application protocols namely internet mailing system called Simple Mail transfer Protocols, and collaborative terminal telnet which allows admission into the remote internet hosts. These application protocols either use TCP or UDP as transport mechanisms. TCP offers connection oriented, reliable streams, flow control enabled and congestion friendly protocols. As a peer to peer link leaning protocol, TCP has neither subordinate nor master correlations. Nevertheless, for communication purposes, the application normally draws on the server/client model. Servers are applications in TCP/IP which provide requisite services to the internet consumers.Advertising Looking for term paper on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More Users only need to invoke customer application segment that in turn creates requests for specific services and send them to the application server segment via the transport vehicle, TCP/IP. The program (server) accepts requests, execute the requisite services and propel the outcomes back in form of reply. Any server in the TCP/IP often handles multifaceted requesting customers and requests simultaneously (Panko 267). Therefore, it is apparent that TCP/IP has been widely used in server and clients models and in the provision of access to various other networks via gateway, bridge and router. Standards for TCP and IP TCP/IP has been widely recognized by users and developers alike due to its everlasting regeneration and integral openness. Similar facts hold true for the open communication network, internet. Nonetheless, such openness can certainly become helpful or harmful if there are no controls. Even though there no general bodies which could govern the issuance of internet regulations and directives, there are mutual cooperation control. Under the organization and management of Internet Architecture Board (IAB), the Internet Society (ISOC) is mandated to standardize the internet community. From these organizations both TCP and IP are regarded as standards (Cisco Networking Academy 91). That is, the TCP as a standard is denoted by RFC 793 while IP is represented by RFC 791. RFCs are numbered serially as they are issued. After a document is consigned an RFC number and issued, that number is certainly not reprocessed, even if the RFC is reviewed. In this respect, there has not been any question of having the most current versions of a specific RFC. Currently, RFCs are numbered up to 1609. The term RFC is an incongruity. While most RFC biographers certainly will not mind if you give your views about the article, RFCs habitually are not actually demanding for any comments at all. In fact, they are descriptions or statements. There are three types of RFCs: Informational, which offers beneficial information; Experimental, which describes an experimental protocol and Standards Track, which stipulate Internet standards path protocol for the entire Internet community. How TCP/IP protocol works TCP/IP comprises of layers while each and every layer plays a significant role of carrying out some processes on the received data. After the operations have been performed, the data is passed to the advanced layers. Every protocol layer handles specific issues that are linked with data transmissions and at the same time rendering particular services to the developed layers.Advertising We will write a custom term paper sample on Transmission Control Protocol/Internet Protocol (TCP/IP) specifically for you for only $16.05 $11/page Learn More A detailed TCP/IP description is illustrated by the reference model in the appendices (Architecture diagram). The functioning of the protocol can be gauged via looking at the protocol layers of TCP/IP. The protocol layers of TCP/IP TCP/IP is actually sculpted into layers just like any other networking software. The layered sign gives rise to the protocol stack term, denoting the protocol suite layers. The TCP/IP protocol suite can be positioned using the stack protocol against other network systems including Open System Interconnection (OSI) and the System Network Architecture (SNA) model. The protocol stack divides the communiquà © software’s into various layers. Thus, allowing for the capacity to generate alternate implementation layers, simple code testing and implementation as well as division of labor. The implemented layers communicate with any other layer that falls either below or above throu gh the abridged interface (â€Å"How TCP/IP Works† par.1). Layers in this regard offer services for any layer that falls right above it by utilizing services tendered by any layer that is underneath. The four architectural layers that allow TCP/IP model to properly transmit data include transport, network, application and the internet layers. Transport layer: This layer offers end to end transmission of data. This is possible as it can deliver data from a particular application to a specific distant peer. There is simultaneous support for several applications. TCP is the most applicable transport protocol layer. TCP allows for flow control, duplicate data suppression, link-oriented dependable data transfer and congestion control. User Datagram Protocol is another component of the transport protocol layer. This protocol allows for unreliable, best effort and connectionless services. Any application that uses UDP as its transport protocol must therefore craft its specific contr ol, end to end integrity and flow control. UDP is utilized by applications which can endure some data loss and require a quick transport mechanism.Advertising Looking for term paper on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More Application layer: Programs using TCP/IP protocol to communicate offers this type of layer. It is an operator process associating with other processes normally under the unlike hosts. Notable examples of the application layer are the File Transfer Protocol (FTP) and Telnet. The interfaces amid the transport and application layers are wells include SNA, FDD, IEEE and ATM. Internetwork layer: This layer is similarly dubbed as the network or internet layer as it offers virtual internet network images. The layer plays a critical role of shielding upper planes from the underneath physical system architecture. In this layer, the IP is deemed as an imperative protocol. It does not accept any dependability from the subordinate layers given that it is a connectionless protocol. Functions such as error recovery, flow control and reliability are not proffered by the IP and must thus be offered at advanced levels (â€Å"How TCP/IP Works† par.4). In summary, every layer is made of protoco l sets that are bound to function at that particular layer level. The available network or connection layer protocols play the role of attaching the network nodes. The transport protocol layer manages the data packet transmission amidst the host destination network and the source. Conversely, the internet layer comprises of methods, specifications as well as protocols which are drawn on when transporting packet data through the established networks (Torres 2). The uppermost TCP/IP layer is the application layer which unswervingly interacts and also connects with service applications. It is hence true that TCP/IP operates in each and every communication level situated within the network components. Sincerely, it emerges as the core and hub of the communication network. Components: The required Hardware and software devices The traceable components of the TCP/IP include: SYSTCPIP applicable in TCP/IP internal incident tracing; SYSTCPIS used to detect and trace the TCP/IP intrusion ser vices; SYSTCPRT used in the protocol for OMPROUTE tracing; SYSTCPRE used in the TCP/IP to resolve tracings and SYSTCPDA applied in an IP package tracing. The Serial Device Server is equally a TCP/IP protocol component. Other trace selections seem to be solely and habitually applied because of the advanced or IBM support personnel instructions (IBM par.1). However, SYSTCPDA packet trace is the most essentially applied component trace. TCP/IP Architecture The name TCP/IP protocol suite comes from the notable two essential protocols namely the Internet Protocol (IP) and the Transmission Control Protocol (TCP). Internet Protocol Suite is the name that is often used. The architectural model for TCP/IP is comprised of internetworking, and the already discussed TCP/IP protocol layers and the applications. Internetworking TCP/IP was mainly designed to build networked interconnections dubbed as the internet or internetwork which offers global communication amenities over a diverse physical n etwork. Such internetworks are beneficial in that they enable communication amid hosts located in diverse networks that are probably disjointed by large geographic areas. The phrases internet and internetwork emerged from the interconnected network phrase. Internet as used in TCP/IP has numerous network groups including local networks, commercial networks, backbones and regional networks. These networks are usually limited in size based on the maximum geographic area that can be spanned by a given network, the total number of users belonging to the networks, and network applicability in some settings. Ethernet for instance, is integrally partial with respect to geographical scope. As a result, the capacity to hierarchically interconnect volumes of networks in organized fashions facilitates the communication between two hosts that belong to such internetwork (â€Å"How TCP/IP Works par.2). TCP/IP internetworking also creates standardized communication mechanisms abstractions which a re offered by each kind of network. All physical networks have their own dependent technological communication interfaces known as programming interfaces which offer primitive or primary communication functions. From its structural composition, it appears that TCP/IP proffers communication services running amid user applications and the programming physical network interface. This independently supports joint interface applications devoid of the basic physical network. Therefore, it is apparent that the physical network architecture is concealed from both the application developer and the user. The application just requires the standardized communication abstraction code so as to purpose under any kind of operating platform and the physical network. From the diagrams in the appendices, it is clear that any interconnection between two networks is only possible if the computers are attached to each of the available networks. This will ensure that packet data will be easily forwarded f rom a given network to another via a router. In most cases, the IP router term is applicable given that the routing purpose is a component of IP segment of the Transmission Protocol Control/ Internet Protocol suite. This is well-illustrated by the protocol layers of the TCP/IP diagram, found in the appendix. However, to easily recognize the internetwork hosts, every host must be consigned an IP address (Helmig n.p.). If a host possess numerous networked interfaces or connectors such as routers, all interfaces ought to have inimitable IP addresses. Thus, the IP address is usually made of two components: IP address = host number network number Within the IP address, the network number segment distinguishes the network system inside the internet. The central authority plays the significant role of assigning the network number while ensuring that it is distinctive all through the internet. A segment of the IP address host number is assigned by an authority residing with the controlling organization which identifies the network number. Strengths and weaknesses of the TCP/IP protocol TCP/IP has numerous strengths and weaknesses. These are as explained below: TCP/IP Strengths: TCP/IP has the capacity to check errors, it can simultaneously transfer data and is considered very reliable, higher volumes of data can be held by the TCP/IP at once, it allows internetworking and has the capacity to establish connections amid various servers or computers. TCP/IP Weaknesses: The Transmission Control Protocol/Internet Protocol (TCP/IP) suite can occasionally be slow while the protocol has a very multifaceted structure or setup. Conclusion Generally, the Transmission Control Protocol/Internet Protocol (TCP/IP) suite has developed into a standard de-facto for computer communications in the current interacted universe. The permeating application of a particular network standard seems to have actually given rise to a far-fetched reliance on any application that is supported by th e protocol. In the contemporary society, people utilize the Internet and the TCP/IP protocols not merely for information and entertainment, but equally in conducting everyday businesses. Even though the protocol has manifold strengths and weaknesses, it plays the critical roles relating to gateway, routing, internetworking, bridging besides acting as a server and clients model. Hence, it is true that TCP/IP operates in each and every communication level situated within the network components. It emerges as the core and hub of the communication network. Appendices Architecture Diagram (how it is put together physically or logically) Architecture diagram Packer header decode Snapshot of the real thing in operation Cisco Networking Academy. IT Essentials: PC Hardware and Software Lab Manual. McKinney, TX: Cisco Press, 2010. Print. Helmig, Johannes. â€Å"TCP/IP Basics†. 2002. Web. How TCP/IP Works. 2003. Web. IBM. â€Å"Tracing TCP/IP components†. IBM Corporation 199 0, 2010. Web. Panko, Raymond and Panko, Julia. Business Data Networks and Telecommunications. New Delhi, India: Pearson Education, Limited, 2010. Print. Torres, Gabriel. â€Å"How TCP/IP Protocol Works†. 2007. Web.

Friday, November 22, 2019

Using Writing Bursts to Generate Ideas and Enthusiasm

Using Writing Bursts to Generate Ideas and Enthusiasm Using Writing Bursts to Generate Ideas and Enthusiasm Using Writing Bursts to Generate Ideas and Enthusiasm By Ali Hale Many of us want to write fiction but rarely manage to get round to it. We struggle to find a free hour to write in – or the energy to write. Doing writing bursts is a great way to get going when time is short and motivation flagging. What is a writing burst? I came across the concept in Robert Graham’s How to Write Fiction (And Think About It). Mini-exercises are scattered throughout the book, and Graham explains: Every class I teach begins with a 10 minute writing exercise which I call a writing burst. I give a stimulus and ask the class to start writing, keep writing for 10 minutes and not to worry for one second about the quality of the work appearing on the paper. When the thought of sitting down and writing a whole short story is daunting, it’s much easier to find 10 minutes. Open your notebook or word-processing program of choice, write the burst at the top, then set a timer – and write without stopping or looking back. How do writing bursts help? I use writing bursts when I have very little time in the day to write, but wanted to feel I’ve achieved something. They’re also great for establishing a creative mood at the beginning of a longer writing session. You can use the material you produce as a starting point for longer pieces. One of mine became a thousand-word â€Å"twist in the tale† short story that I’ve submitted to a woman’s fiction magazine. The bursts help you to generate new or unusual ideas – I come up with more creative and interesting concepts than usual, because I don’t stop to self-edit. Where do you find them? There are plenty of sources for writing burst prompts. The Writers’ Book of Matches, by Writers’ Digest Books, is a collection of â€Å"1,001 prompts to ignite your fiction†. The Pocket Muse: Ideas and Inspirations for Writing has some similar exercises, as well as photo prompts to help spark your writing. Competitions which give a first line can be used as writing bursts. Famous quotes can work well, so long as they’re short. Phrases or lines from a story you’ve read that inspire you are also good starting points. What variations are there? If you’ve tried a few writing bursts and you’re starting to get bored, the concept is open to any number of tweaks. When ten minutes starts to seem too rushed, you could lengthen the burst to fifteen or twenty minutes. If your ideas seem stale or trite, try writing with a friend: use the same prompt and swap the pieces that emerge. Alternatively, use multiple prompts – pick two prompts at random and figure out how to use them both. If you’re writing a novel or extended piece of fiction and have ground to a halt, use a prompt to get going again. You can always cut the scene out later – but it just may give your story the new life it needs. Some writing prompts After completing a solo camping trip, a woman gets her film developed and discovers that several photos are of her †¦ sleeping. (From 1,001 Prompts) â€Å"That was the moment I wished I could remember what we’d been taught.† (from How to Write Fiction) â€Å"She’s been told.† (from How to Write Fiction) â€Å"When a man knows he is to be hanged in a fortnight, it concentrates his mind wonderfully.† (Samuel Johnson) A man sneezes painfully. He looks into his handkerchief and finds something that looks like a microchip. (From 1,001 Prompts) â€Å"The place is very well and quiet and the children scream only in a low voice.† (Byron) Pick one of the prompts now – you can afford ten minutes – grab that blank page, and go! Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Fiction Writing category, check our popular posts, or choose a related post below:20 Great Similes from Literature to Inspire YouComma Before ButList of 50 Compliments and Nice Things to Say!

Wednesday, November 20, 2019

Marketing Strategies Essay Example | Topics and Well Written Essays - 2750 words

Marketing Strategies - Essay Example The main purpose of this essay is to develop an effective marketing strategy for Global Bikes Co. considering various significant aspects. The different major aspects include the identification of the target market, setting marketing objectives and the facets of marketing mix strategies of Global Bikes. Section 2: Target Market The target market for Global Bikes can be identified by executing certain market segmentation variables on the basis of four major categories that include demographic, psychographic, geographic and behavioural environment. The important market segmentation variable of the demographic environment is concerned with the aspect of age structure. Fundamentally, the demographic environment is very much important for the business organisations due to the fact that it significantly deals with certain vital components such as market size and population among others. In this regard, Global Bikes must consider the significant factors of age structure in relation to the s egmentation variable of demographic environment while implementing its marketing strategies. In this connection, the company should emphasise largely upon the different age groups of different people that include the teenage, children, young, old age and adults. Thus, it can be stated that the Global Bikes should target its customers or people belonging to the age group of 10-50 years that largely constitute the students, workers and children among others (Thomas, 2007). In terms of segmentation variable in relation to psychographic market environment, the Global Bikes should consider the lifestyle factor of the target consumers that generally include their attitudes, interests, emotions, values as well as beliefs. With the intention of developing effective marketing strategies, it is very much necessary for the business organisations such as Global Bikes to strictly consider the attitudes and the interests of the consumers regarding the purchase of their products. In this context, regarding psychographic market segmentation, the target market or the consumers of Global Bikes would be those customers who enthusiastically possess utmost interest towards the products such as bicycles and related accessories. This particular consideration upon the interests along with the attitudes of the customers on the basis of psychographic or lifestyle market segmentation ultimately would contribute to attain noteworthy competitive position along with expected business goals for the company (Wright, 2006). With due consideration to the behavioural market environment, Global Bikes should emphasise upon the segmentation variable of knowledge of particular products, adequate implementation of the products along with the development of understanding regarding the responses towards the different products that are generally represented by the customers. In this context, the behavioural aspects based market segmentation tends to encourage the marketer or the business organisation t o possess deeper understanding of the buying procedures of the customers. Moreover, the aspect of behavioural segmentation environment can also assist the business organisations to largely identify their potential target markets. The conception of behavioural segmentation generally include certain decisive facets such as adequate application of a specific brand, buying procedures of the customers, effective decision criterion and finally the attitudes along with the preferences of the decision makers (Beide, 2003). In terms of the

Tuesday, November 19, 2019

Cross-Cultural Management Essay Example | Topics and Well Written Essays - 2500 words - 1

Cross-Cultural Management - Essay Example However, it has also brought in certain major challenges for these organisations to succeed in the global arena. There are various determinants for international business that restrict the organisational capabilities to avail opportunities internationally. One of the major determinants that many experts have considered is the cross-cultural aspects of the international business. Cultural differences are often very difficult to observe and measure while failure to understand the culture may have intensified effects on the business organisation that can reduce the business performance (Ghemawat & Reiche, 2011). The poor understanding of cross culture has a radical influence on the business process as well as on the management as it may increase the propensity towards committing business blunders. Notably, the success or the failure of business greatly relies on the performance of human resources within organisations. Consequently, the limitation of certain understandings such language, business etiquette, norms and values by the human resources in an organisation at international level has often collapsed many business organisations (The Culturosity Group, LLC, 2004) Overview of the Airbus Consortium Airbus is a subsidiary company of Netherlands based European Aeronautic Defense and Space Company (EADS) with its headquarter located in Toulouse, France and the ingenuity of major European countries including France, Spain, Germany and the United Kingdom is combined to create a giant company to compete with other major companies such as Boeing of the United States. The consortium is a key manufacturer of military airlifters as well as commercial jetliners, continuously involved since previous 40 years (Airbus S.A.S., 2012). Airbus operates globally and creates value for its widespread customers and shareholders. The company employs more than 55,000 personnel from in excess of 100 nationalities around the world. The company’s operations greatly rely on industr ial cooperation as well as on partnership with world’s a few of the major companies. The company has more than 1500 suppliers spread over 30 countries. Its success is attributed to a mix of ideas, vision and knowledge such as a combination of diverse cultures in its work process. The company with its global presence and expanding business operations has now become an international family (Airbus S. A. S., 2012). Source: (Observatory of Sustainability in Aviation, 2012) Cross-Cultural Issues Faced By the Airbus Consortium Airbus consortium is a multi-national company which has workforce from all around the world. However, the company has always been cautious and has respected diversity and business ethics within the organisation. The company continuously strives to seek opportunities in order to reap the benefits provided by culturally diverse workforce committed towards accomplishing the organisational goals. The company with its multi-culture team ensures that it is efficien t to understand the various needs of its diverse customers, stakeholders and

Saturday, November 16, 2019

The effect of alcohol on reaction times Essay Example for Free

The effect of alcohol on reaction times Essay The table is used to drop the ruler from so we know that the height the ruler is dropped from is the same each time we do the experiment. We will hold the bottom of the ruler level with the surface of the table before it is dropped. The ruler is to be used as the measurement of peoples reaction times in millimetres. The pen is to mark out where the thumb and first finger must be when the ruler is released and is also used to record the results on the paper. Method We will make two short lines at the end of the table 1. 7 centimetres apart. The inside of the right hand thumb and right hand first finger must be placed along side these. We will place the ruler inside the fingers in the centre with the side with the shortest width touching the table and also facing away from the table. The persons hands should be level with the bottom of the ruler. The ruler will be released without warning the person who is catching it. The person catching it must have clear visibility of the ruler. When the person has caught the ruler the measurement should be read from the bottom side of his finger and thumb and not from above them. Write the results down on the paper and repeat the experiment four more times. When the experiment has been carried out five times we will make the person catching the ruler drink four units of alcohol. After he has finished drinking the last unit we will wait twenty minutes for the alcohol to take effect. We do this to see what difference alcohol has on the reaction times. Now we repeat the experiment above again. We will test four people. A young male and an older male, ages 15 and 44, and a young female and an older female, ages 11 and 38. The factors we will keep the same to make sure the experiment is a fair test are: Height ruler is dropped from Visibility Thumb and finger used No drugs Distance fingers are from ruler before it is released Moisture of skin Food Eaten Prior To Experiment Heart Rate Prediction I predict that the more alcohol that has been consumed, the longer the time it takes the body to react. I think alcohol effects the transmitter fluid in the synapse, or effects the myelin sheath on the axon. In turn this will considerably lengthen the reaction times. Also, the alcohol may have an effect on the neurotransmitters in the synapse. We now that alcohol is a poison. It could poison the neurotransmitters in the synapse, cause them to not work as fast, or even carry messages for them. I dont think the relationship between the alcohol consumed will be directly proportional. Preliminary Work Prior to making these plans for the experiment, we carried out a preliminary test. This test helped us a lot in understanding what the aim of the experiment was and gave us a rough idea of what we were going to do. Also, we can learn from the mistakes that we made in the preliminary work, so that we can ensure it is a fair test in the experiment. Results Attempt Distance 1 8. 6cm 2 9. 6cm 3 7. 9cm 4 10. 4cm Conclusion From our results we can make a safe conclusion that the reaction times of a person are very fast when they arent under the influence of alcohol. Also, because there are no anomalous results we can make a safe average reaction time from this. Average reaction time = 9. 125 seconds. Show preview only The above preview is unformatted text This student written piece of work is one of many that can be found in our GCSE Patterns of Behaviour section.

Thursday, November 14, 2019

Free Yale Admissions Essay: Great Expectations :: College Admissions Essays

Great Expectations    My name is Rob Geis, and I am currently a senior at Henry Clay High School. I have a GPA of 3.4. I was inducted into the National Honor Society during the last semester of my tenth grade year with a GPA of 3.5. My main hobby is playing the guitar. I participated in the school's band from my ninth grade year until my eleventh grade year. My specialty is playing the snare drum/tuba. I entered competitions for the guitar, winning numerous trophies.    Now in my senior year, I work in a private law firm as a law clerk. As soon as my last class ends, I go straight to work. I am an outstanding student, because I meet my academic standards as well as my job standards four days per week. I am also sergeant at arms of the National Honor Society. I participated in the National Honor Society community service that they organized. I sometimes participate in collecting lots of canned goods for the less fortunate people in our community. I participated in the Children's Intervention Project for three years at Mercy Hospital-Detroit, teaching young children about substance abuse prevention. That was a rewarding experience. I am a member of Greater Grace Temple. I am active in the music ministry, playing my guitar.    I plan to attend a four-year college of engineering, to pursue a career in the field of electrical engineering. That's the only thing I will concentrate on during the next five to six years. After I establish myself in that, I plan to get deeper in my career by studying for one or more advanced degrees.    One of my goals is to give back to my community. I feel that my community needs a role model that came from the same community. Many people achieve their career goals, make a little money, then leave their neighborhoods for a better one. I believe in coming back to help make the one I'm in better. I plan to invest money into the community for more recreational buildings and schools or invest in making the environment better, so that it is more suitable for the people that live there.

Monday, November 11, 2019

Strategic Review of Australian Department Store David Jones

David Jones Limited (DJS) is an Australian retailer tracing its origins back to 1838 when it first opened in Sydney to sell â€Å"the best and most exclusive goods† (DJS, 31 Oct. 2009). It has since expanded to become a national retail chain comprising of nearly 40 premium department stores. The subject of this analysis is a strategic business unit (SBU) that is playing an increasingly important role in the company’s future growth strategy; namely the provision of financial services. As the result of a strategic alliance with American Express (AMEX), DJS launched the David Jones American Express (DJA) card in 2008 (ASX Media Release, 20 February 2008). To effectively analyse the value proposition of this SBU and product it is important to first examine the overall value proposition of the company. As defined by Kotler, a company’s value proposition is the set of benefits which it promises to deliver to consumers in order to satisfy their needs (Kotler et al. 009). In the case of DJS these core benefits are the provision of an â€Å"empowering level of customer service†, a distinctive store ambiance, a unique and high quality product range and international brand portfolio offered at competitive prices, and a mission statement to â€Å"be the best full line, differentiated department store† (DJS Enterprise Agreement 2006). Key aspects of this proposition include the company’s focus on quality, luxury and aspiration. In terms of Maslow’s hierarchy of needs it demonstrates a desire to deliver an experience and array of products which satisfy needs of belongingness and self-esteem in a potential buyer (Maslow 1954). It also forms the basis for the company’s positioning strategy and its marketing orientation towards customer satisfaction (AFR Boss Magazine, October 2009, p. 22). The company strives to deliver these key benefits to a primary target market consisting of â€Å"three generations of women (daughter, mother, grandmother) from households with above average disposable incomes† (DJS JP Morgan Conf. October 2009). In other words DJS has a segmenting, targeting and positioning (STP) strategy that is female skewed and aimed at the affluent ‘AB demographic’ which constitutes the top 20% of the socio-economic quintile based on education, income and occupation (Roy Morgan, 2009). The value proposition of the DJA card dovetails into this broad set of company values , offering an array of additional benefits and functionality for DJS customers that compliment the company’s market position as an aspirational brand (ASX Media Release, 20 Feb. 2008). Whereas historically the company’s branded store card was only accepted in DJS stores, the DJA card offers customers credit facilities at any merchant who accepts AMEX. It therefore leverages the AMEX brand as a leading global payments, network and travel company with its corresponding level of acceptance to offer DJS customers additional credit purchasing power and functionality (AMEX, 31 Oct. 2009). The DJA card also offers unique reward benefits and gift points to loyal customers, professing to â€Å"turn everyday spending into dream brands and dream destinations† (DJS, 31 Oct. 009). The value propositions of DJS and DJA can be considered effective for a number of key reasons. Firstly the core beliefs which underpin these value propositions have remained largely consistent over time, with only small changes in response to evolving markets. This is important given they act as the foundation of a company’s brand building process (MM 2009, p. 2-34). Secondly they are unique, leveraging DJS focus on luxury and aspiration to help differentiate product offerings like the DJA card from that of competitors. Thirdly these values augment the company’s segmenting and positioning strategy by providing clear benefits targeted to their core customer base. Lastly the value proposition is well communicated, permeating all aspects of their marketing mix and integrated marketing communications strategy through mediums such as in-store branding, direct mail, print media, publicity, and online marketing. An overall analysis of the five C’s was conducted for the DJA business unit: Company| Strengths: Joining of two strong brands, reduction of risk for DJS, wealthy customer base, strong growth of financial services, distinctive ‘house of brands’. Weaknesses: Potential damage to DJS brand by alliance partner’s actions, fee structure, lack of acceptance of AMEX cards generally, higher merchant fees associated with AMEX. Opportunities: Store expansion increasing reach of customer base for DJA card, expansion of DJA alliance, supplementary card, status program. Threats: Cardholder resentment at annual fee, alliance partner motivations, Myer IPO, supermarket co-branded cards, AMEX debt recovery procedures. | Customers| DJS retail: â€Å"DJ’s core customer comprises of 3 generations of women; daughter, mother, grandmother, with a household income of >$75,000 p. . † (Macquarie Australia Confere nce, 2009, Mark McInnes). As the DJA credit card is a product development strategy, of supplying new products to existing markets, the customers of DJA are essentially the same as the current DJS customers. | Collaborators| Strategic alliance with AMEX in the provision of the DJA credit card. International alliances with other retail stores when the DJA card is used within their stores (eg. Harrods, Harvey Nichols, etc. ). Other local ‘bonus partners’ in the DJA reward program (eg. Vintage Cellars). Competitors| DJs competitive environment is summarised using the following adaptation of Porter’s Five Forces (Porter, 1908, in MKMT, 2009, 1-26). Industry Competitors: Mastercard, Visa, and other smaller credit card providers. Along with other AMEX co-branded credit cards and store cards. New Entrants: Barriers to entry in the credit card market are high including capital for lending and the setup of infrastructure. Although these issues can be mainly overcome by forming a strategic alliance with one of the major credit card providers, as has been done in the case of the DJA credit card. Substitutes: There are a number of substitutes to the DJA credit card including EFTPOS direct from bank accounts DJS store cards, Visa Debit and cash. Power of Suppliers: Threat of forward integration by alliance partner AMEX. | Context| DJA’s operating context is defined using the following adaptation of PESTLE model (MKMT, 2009, 1-29). Political: Operating within each Australian State requires understanding of a multitude of separate state governments’ regulators, government policy and the impact on consumer confidence in the provision of credit cards. Proposed changes to the National Consumer Credit Regime currently being considered by the Federal Treasury. Economic: Performance of the credit card sector is closely linked to consumer confidence within the market, key indicators affecting consumer confidence include; GDP growth, unemployment rates, interest rates, banking sector health, public sector debt. Increasing levels of private sector credit card debt. Socio-Cultural: Current trends in fashion affecting ‘house of brands’ and indirectly the DJA card. Societal downward trend away from carrying and transacting with cash towards the use of alternative point of sales payments. Technological: New competitors in the form of online shopping experience. Legal: Operating within numerous legal jurisdictions requiring understanding of each unique jurisdiction in relation to providing financial services. Environmental: Current push towards credit card companies to introduce paperless billing. Demographic: Increasing standard of living in Australia leading to greater take up of credit cards and other lending avenues. Ageing population in Australia which is aligned with the DJS brand and the DJS core customer base. | SWOT Analysis (MM 2009, 1-25) Strengths: (S1) Brand strengths: David Jones is a strong iconic Australian brand with 170 year history (DJS JP Morgan Conf. , Oct 2009) and David Jones has offered branded credit cards to its customers for 48 years (McInnes, National Consumer Credit Regime, 12 June 2009). American Express formed in 1850 and in the 1950s, issued its first credit card (AMEX, 31 Oct. 2009). The DJA card capitalises on the strength of both brand heritages and service cultures, both locally and internationally (ASX Media Release, 20 Feb. 2008). S2) Strong financial structure with reduced risk to DJS: Alliance partner is responsible for the credit policy and owns the receivables of the Financial Services business with the transfer of $374. 3m of largely debt funded receivables to American Express (DJS FY09, 24 Sept. 2009) and so the risk associated with the portfolio sits with AMEX not DJS. (S3) Wealthy customers: Core customers have above average disposable income with a hous ehold income of greater than $75,000 (DJS JP Morgan Conf. , Oct 2009). (S4) Strong growth of financial services: 7. % growth in past year and same projected over next four years and large growth in core customer base (DJS JP Morgan Conf. , Oct 2009). (S5) Distinctive House of Brands: positioning with the best product range, great service and the reinvigoration of high-value stores (David Jones FY 09, 24 Sept. 2009). Each DJS offering needs to be distinctly branded in a way which creates an individual brand relationship with the customer whist also aligning with the overall position of the master brand of DJS itself (Aaker and  Joachimsthaler 2000). (S6) Growth of brands: Strong range of national and international brands (DJS JP Morgan Conf. Oct 2009). The growth of these brands via ‘the introduction of 50 new department store exclusive brands to its portfolio across all categories’ at DJS stores is more attractive to buyers (Samador, 28 Nov. 2008). (S7) Fee structure: High membership fees, merchant fees, and credit fees generate more cash for generous rewards program. Weaknesses: (W1) Risk of DJS brand being linked to AMEX: DJS brand linked to AMEX credit policy and debt recovery. AMEX are perceived to be a pushy credit provider, with one shareholder describing AMEX as a â€Å"low grade† card that diminishes David Jones' â€Å"prestigious reputation†, (Samador, 28 Nov. 2008). (W2) Fee structure: Internal shareholders resistance to the $99 annual membership fee and 20. 49% per annum interest rate (the DJS Store card was free to join). (W3) High merchant fees and low merchant acceptance: AMEX merchant fees are the highest of all mainstream credit cards on offer in Australia (RBA, 6 Nov. 2009). This has led to lower acceptance of AMEX compared to MasterCard and Visa Australia wide. Overall AMEX and DJS have complimentary and mutual strengths that compensate for their individual weaknesses, giving them greater combined strength. Opportunities: (O-1) DJA credit card usage outside DJS stores: The strong history of the store-card (McInnes, National Consumer Credit Regime, 12 June 2009) and the high proportion of store-card holders in the DJA card program (Samador, 28 Nov. 2008) imply that card usage is likely to continue to be concentrated in-store. Given national expenditure in Department Stores accounts for less than 9% of total retail spending (ABS Retail Trade, Sept 2009); there is large opportunity for DJA to grow revenue through usage in the wider retail market. O-2) DJA credit card usage inside DJS stores: The DJS store-card is held by many cardholders as a status symbol (Hanson, 2009, pers. Comm, 30 Oct. ). DJA may build on this perception to encourage greater spending in-store and greater in-store usage of the DJA card. (O-3) DJA cardholder expansion: The DJA card program inherited 400,000 active accounts from DJS (McInnes, National Consumer Credit Regime, 12 June 2009). However this is a small percent age of the market, given there are over 14. 3 million credit card accounts in Australia (RBA, 6 Nov 2009). Increasing the number of DJA cardholders, within the target segment, is a significant opportunity for DJA. Leveraging the increased market coverage, to be achieved by the DJS store expansion program (DJS JP Morgan Conf. , Oct 2009), is one such means of increasing cardholder numbers. (O-4) Expansion of the DJA alliance: In addition to credit cards, AMEX offers a range of insurance products, travel and financial services (AMEX, 31 Oct. 2009). DJA currently offers insurance products and travel services to their cardholders through their Gift Points program (DJS, 31 Oct. 009). DJA may offer a wider range of AMEX insurance products, travel and financial services, under the DJS brand, to their existing DJA cardholders and DJS customers. Threats (T): (T-1) Resentment of the annual fee: Many DJA cardholders, whom had migrated from the DJS store-card, resented the newly imposed $99 annual fee (DJS, 31 Oct. 2009). The resentment of the fee is re-ignited annually when the fee is levied, such t hat cardholders will continue to re-evaluate the on-going benefits of the DJA credit card. T-2) Alliance partner AMEX: Under the DJA alliance, the merchant fee is waived on purchases made within DJS stores on DJA credit cards (Hanson, 2009, pers. Comm, 30 Oct. ). Given the DJA credit card history as a DJS store-card, a high proportion of spending is conducted within DJS stores, thereby limiting the merchant fees collectable by DJA. AMEX would benefit significantly by luring DJA credit cardholders to alternate AMEX products, so AMEX would receive merchant fees on card purchases within DJS stores. (T-3) The Myer IPO: Preferential share allocations were offered to Myer One cardholders in the Myer IPO (Business Day, 23 Sept. 2009). Current and potential DJA credit card customers may have been swayed away to the Myer One card program to benefit in the Myer IPO. (T-4) Supermarket linked credit cards: The co-branded credit card market is keenly contested by department stores, supermarkets and petrol companies to name a few. Monthly retail expenditure on food is over five times greater than department store expenditure (ABS Retail Trade, Sept 2009). Customers may elect to align their credit card with the retail store where they spend the most money, the most frequently. (T-5) AMEX Debt recovery procedures: Under the DJA alliance, debt recovery is handled by AMEX. Strong debt recovery procedures and activity from AMEX may reflect poorly on the DJA card and the DJS stores as customer may not differentiate between the two. References Ansoff, I. Strategies for Diversification, Harvard Business Review, Vol. 35, Issue 5, Sep-Oct 1957, pp. 113-124. Maslow, A. 1954, Motivation and personality, Harper and Row. Aaker, D. A. , ; Joachimsthaler, E. 2000, Brand leadership: Building assets in the information society, Journal of Consumer Marketing. Kotler, P. , Adam, S. , Denize, S. ; Armstrong, G. 2009, Principles of marketing, 4th edn, Pearson Prentice Hall. Marketing Management, 2009, AGSM MBA Programs Graduate Diploma in Management. ASX Media Release, David Jones selects American Express as its strategic alliance partner for its general purpose card, 20 February 2008. Mitchell, S. , AFR Boss Magazine, October 2009, p. 22 McInnes, M. , ; Goddard, S. , David Jones – JP Morgan Conference Oct 2009. David Jones, Full Year (FY09) Results: August 2008 – July 2009, http://www. davidjones. com. au/images/corp/pdf/2009/FY09_Results_24Sep09. pdf, 24 September 2009. McInnes, M. , National Consumer Credit Regime, http://www. treasury. gov. u/consumercredit/content/consultation/submissions/downloads/national_consumer_credit_regime/David_Jones. pdf , 12 June 2009) Reserve Bank of Australia, Credit and Charge Card Statistics, http://www. rba. gov. au/statistics/bulletin. html , September 2009 @ 5pm. Australian Bureau of Statistics, Retail Trade, http://www. ausstats. abs. gov. au/ausstats/meisubs. nsf/0/0C3F2426BB831DF3CA257662000E0A71/$ File/85010_sep%202009. pdf , September 2009, p6 ASX Media Release, David Jones Selects American Express as its Strategic Alliance Partner for its General Purpose card, http://www. asx. com. au/asxpdf/20080220/pdf/317jmwgpqdm2qr. df , 20 February 2008. Samador, L. , Investors Turn on David Jones Amex card, http://news. theage. com. au/business/investors-turn-on-david-jones-amex-card-20081128-6mtb. html, 28 November 2008. Business Day, Premier results add weight to timing of Myer float, http://www. businessday. com. au/business/premier-results-add-weight-to-timing-of-myer-float-20090922-g0ly. html, 23 September 2009. David Jones, David Jones Enterprise Agreement 2006, http://www. sda. org. au/images/awards/award13. pdf, Accessed 2 Nov. 2009. www. americanexpress. com, Accessed 31 October 2009 @ 5pm www. davidjones. com. au, Accessed 31 October 2009, @ 5pm

Saturday, November 9, 2019

Looking for Alibrandi by Melina Marchetta Josie Essay

In this novel (Looking for Alibrandi) Josephine Alibrandi is seen as an illegitimate 17-year-old girl who is self-centred, ignorant and sensitive about her illegitimacy and her reputation and what people say about her behind her back. She is also described as confused because she isn’t sure where she stands in life, whether she is an Australian or and Italian, and is paranoid in thinking because she is of Italian background she is constantly being victimised and society wouldn’t see her for who she is as an individual instead as an Italian or an Australian. During her final year in High School, many events take place in her life that changed her attitudes towards both her self and others, those events ranged from the most life changing events like the discovering of Nonna Katia’s secret, the reunification of herself and her long lost biological father and the tragic suicide of her best friend John Barton to the most least important events like the incident involving one of the ‘beautiful people’ Carly Bishop. Firstly, the sudden and unexpected suicide of Josephine’s best friend John Barton turns her life around, â€Å"The day John died was a nose-dive day and I hit the ground so hard that I feel as if every part of me hurts. I remembered when we spoke about our emancipation. The horror is that he had to die to achieve his. The beauty is that I’m living to achieve mine.† John Barton was one of the closest people to Josephine and they shared many things in common, she later realises how lucky she is to have to choose her own path and destiny and that some people like John Barton had their life planned out by others for them and they had no freedom over their future. Although Josephine is portrayed as a confused teenager who doesn’t who she really is and where she stands in society, her emancipation changes all that, even though her emancipation didn’t happen like the way she expected it to â€Å"†¦I’d wake up one morning and see the light. Feel liberated from everything. †¦ Maybe one particular incident would see me through it.† Her emancipation began after she believed she was wrong on what she did on St. Martha’s day and she had put little kids in danger, as a result of that she became more accepting in the fact that you are not always right, and just because she wore a badge saying she was school captain doesn’t make her one, it’s what’s inside her that makes her a leader. Furthermore, Josephine’s emancipation-in my opinion- was the main reason for her change in maturity and personality, because after she realises she is emancipated she begins to know who she really is and where she stands in life â€Å"†¦asks me what nationality I am, I’ll look at them and say I’m an Australian with Italian blood flowing rapidly through my veins. I’ll say that with pride, because it’s pride that I feel.† This proves that she is proud in being an Australian with an Italian heritage. Additionally, Josephine overcomes her nature in being paranoid when it comes to racism and multiculturalism, and how she is always being victimised by society because of her upbringing, her incident with Carly Bishop makes her realise that not everyone understands multiculturalism, â€Å"I’m not sure whether everyone in this country will ever understand multiculturalism and that saddens me, because it’s as much part of Australian life as football and meat-pies†. Her relationship with Jacob Coote teaches her that not everyone has a problem with her been an Italian and that it is only a small minority of people who are racist, and she learns that it’s not because she is Italian that she and Jacob are separated. In conclusion, Josephine makes major changes in her life, which were somehow provoked by inevitable incidences, she learns to accept the fact that no matter what happens people won’t stop whispering behind her back â€Å"If I lived by the rules and never committed a sin, people would still talk.† She learns what responsibilities really is about and learns to appreciate and cherish every minute of her life and to not take life for granted.

Thursday, November 7, 2019

Supply Chain Management Essays

Supply Chain Management Essays Supply Chain Management Essay Supply Chain Management Essay Supply Chain Management SYSTEMS of SQUARE PHARMACEUTICALS LTD. Prepared by William Dhali ID No # M 073506 MBA 29th Batch Prepared for Mr. Mahmud Zubayer Internship Supervisor Date: May 28, 2010 Supply Chain Management SYSTEMS of SQUARE PHARMACEUTICALS LTD. Prepared by William Dhali ID No # M 073506 MBA 29th Batch Prepared for Mr. Mahmud Zubayer Internship Supervisor Date: May 28, 2010 28th May of 2010 Mr. Mahmud Zubayer Internship Supervisor Subject: Submission of Internship Report Dear Sir, Here is the internship report that I was assigned by you. The subject of the paper is â€Å"Supply Chain Management†. A study on Square Pharmaceuticals Limited. You have asked me to write the topic as a practical requirement for the MBA program. This is for the first time I have experienced working in an organization I would like to thank you for giving such an eye opening experience. The paper is prepared in four parts-the first part is on report introductory text, the second part is an overview of Square Pharmaceuticals Limited, the third part is on the marketing activities of Square Pharmaceuticals Ltd. It is to mention here that I have tried to the best of my sincerity to uphold the prestige of International Islamic University Chittagong giving wholehearted effort in preparing this report. I am grateful to you for this assignment. It has been an excellent learning experience for me tried my best to present it up to your expectation. I am ready to answer any of your queries. Sincerely, ___________ William Dhali ID: MO73506 To Whom It May Concern: Course: Date: Supply Chain Management Supply chain encompasses all the business activities that fulfill the customer’s demands. These activities are linked with the movement of goods from raw material stage to the end user products. Supply chain management involves the product coordination, inventory, location, transportation, retailing and distribution of products to customers in order to satisfy the needs of customers. Each supply chain in a company has its own unique set of marketing demands and operating challenges. Nowadays, many companies use the modern supply chain concepts especially when there is increased demand in the market, competition and expansion of diverse products. They incorporate the modern supply chain concepts with the additional logistic concepts in delivering products to the market. The technique used in guiding the process design in the company whereby a closed racecar pit crew takes 17 seconds in tuning the engine is the use of technology technique. Use of technology in the production process is beneficial because it makes work easier and saves time. Falkman (2011) points out that the use of technology facilitates the changeover process through diverse methods, which minimize labor and maximize utilization of machinery thus saving time and money. A number of benefit result from a better rapid changeover system. First, it reduces time in installing parts to a new container and changeovers can be done even by a less skilled employee. Secondly, it saves time since the work is accomplished faster and it is less costly. Additionally, if the same company takes 3 days in accomplishing the same work at a local garage or auto dealer, then it means that the use of traditional concept of logistics principle was used in this auto dealer. Traditional logistic concept is when the activities occur within the peripheries of a single organization. However, taking three days in accomplishing the same work that can be done within 17 seconds is costly and wastes a lot time. Thus, companies in any supply chain should make decisions collectively regarding their actions on inventory especially the kind of inventory that need to be stocked at each stage of the supply chain process. When the larger passenger jets preload luggage into large aluminum containers in the plane, it takes less time to accomplish the work than when the smaller planes get loaded with one bag at a time. Many companies employ different supply chain principles at each stage of production, transportation and inventory process. For instance, the airline can benefit more when they can employ an effective method of operation especially when they use inventory methods in the management process. Managers need to plan well and employ appropriate decisions that can be used when dealing with transportation of products. For instance, the use of Airfreight delivery of luggage can be fast and more reliable but it can be quite expensive when compared to other inventories such as shipping, which is more uncertain. However, the uncertainty should be compensated through stocking higher inventory levels. Nevertheless, the operation management techniques employed in the Airline Company are cost effective. The use of inventory techniques employed in the process of supply chain is beneficial because it makes work easier and reduces time spent in pre-loading one luggage at a time. Hence, the use of larger passenger jets in pre-loading luggage into the aluminum containers makes the work easier and it is more convenience. Nielsen (2008) argues that integration of logistics within the production, transportation and distribution chain should be aligned in a sequence. This is because the whole supply chain concept needs to be more lean and supple so that they can provide sufficient service level for the increasing demand. The ratio between lean and agile should be balanced and this are explained in the Pareto principle, which requires that the demands as well as the supply chain concept need to focus on efficiency and economies of scale. The operation management technique that may be used in the manufacturing fashion company is the use of the inventory techniques in the production process. In order to avoid outdated inventory with manufacturing of fashion goods, products undergo different product life cycle phases. This is essential because products that undergo processes of life cycle are beneficial since they enhance customer value and they are cost effective (Dornyei and Otto, 2000). In addition, the conceptual frameworks are employed and they align with the manufacturing fashion goods together with the process design and are in respect to the life cycle of the product. Thus, they enable the company to gain benefits through leveraging diverse stages of product life cycle. There are other application concepts such as the use of inventory machines that explore the operational supply chain and designing on new colored sweaters for women in the manufacturing fashion industry. Inventory machines are used in making work easier and work faster in producing more products within a short period. In addition, the efficient supply chain concept is employed in the manufacturing of fashion products. Goods flow from upstream to downstream starting with products development flow, service, information and then fund flow. The company incorporates the traditional logistic concepts in order to produce high quality products within the management system. When the manufacturing fashion goods did not add color to sweaters, the management introduced real orders of virtual integration. The virtual integration within the supply chain in an industry requires industry real time automation or inter-organization processes of business that span trading partners. Nowadays, organizations that are involved in the supply chain use communication techniques such as e-mails, faxes or utilize Internet sources in passing information across to customers. This is vital because it has benefited the manufacturing fashion companies in the supply chain process. Many companies such as large insurance companies have already demonstrated their ability in managing the supply chain through employing operation management principles that are effective in making work easier and faster. For instance, a large insurance company that used to take three days in handling home casualty claims is now able to make work easier because of its involvement in internal supply chain. This is beneficial because it helps the company to accomplish their work faster thus reducing costs that are incurred in the process of delivering services. Supply chain involves four stages that include the supply network, the internal supply chain, and this covers production, distribution and end users. In between the four stages is the material flow, service flow as well as funds flow. Thus, an insurance company can use e-procurement links and e-distribution links since they are cost effective thus enabling them to meet their customers’ needs. Moreover, the insurance company will benefit more especially when they can take thirty minutes in handling home casualty claims and sending an RV down to hurricane sites because they can incur less costs or expenses in the information distribution process. Accessing information timely and accurately requires managers to make better decisions and coordinate well in the organization (Raturi and Evans, 2005). This is vital because it will enable the insurance company to provide their customers with better services, which will be delivered in time. With better information, people are able to make effective decisions on what need to be produced and where to locate inventory as well as the best way to distribute services. This will be beneficial to both the company and the people since they will be able to process claims within thirty minutes once they have experienced any problems such as the hurricane, fire incidents or flood issues. References Dornyei, Z. Otto, I (2000). Motivation in action: A process model of L2 motivation. Working Papers in Applied Linguistics, 4, 43-69 Falkman, A. M. (2011). Improving the Speed of Machinery Changeovers, Consequently Decreasing Downtime, Raises Productivity and Profits. Retrieved from pmtdirect.com/website/article.asp?id=12512 Nielsen, A. (September 6, 2008). SMED Setup Reduction. Retrieved from http://setupreduction.blogspot.com/2008/09/shingos-insight-separate-internal-end.html Raturi, A. S., Evans, J. R. (2005). Principles of operations management. Mason, Ohio: Thomson/South-Western.

Tuesday, November 5, 2019

Case Report of Secondary Narcolepsy

Case Report of Secondary Narcolepsy Title of the article: â€Å" Case Report of Secondary Narcolepsy presenting as self-inflicted genital injury † Abstract: Primary Narcolepsy is a sleep disorder with classical presentation showing tetrad of excessive daytime sleepiness, cataplexy, sleep paralysis, and Hypnogogic hallucinations. Some conditions that result in secondary narcolepsy include traumatic brain injury, tumors, and stroke. [1] A rare case of secondary narcolepsy was seen in a patient with self-inflicted genital injury. A 30 year old male was referred to Psychiatry from Surgery for a self-inflicted incised wound on hydrocoele. Since last 1 year, he had multiple episodes of — 1. Sudden falls while working 2. Sleep during daytime often at unusual places 3. Periods of unresponsiveness during which he was aware but unable to move. During hospital stay, daytime somnolence, sleep paralysis and cataplexy were noted several times, but hallucinations were not consistently reported. Based on DSM-IV-TR N arcolepsy was diagnosed. Possible reasons for genital injury were 1. To remove fluid from swelling 2. Under sleep paralysis 3. Under Hypnogogic hallucinations. Patient’s EEG was normal. MRI brain showed Gliosis at cervico-medullary junction.MRI spine was advised to examine the cervico-vertebral junction but patient was lost to follow-up. But from history and investigations, it was concluded that he had secondary narcolepsy due to traumatic brain injury. Narcolepsy typically begins in the 2nd and 3rd decades of life and negatively impacts the quality of life of affected patients. Diagnosis relies on patient history and objective data gathered from polysomnography and multiple sleep latency testing. Treatment focuses on symptom relief through medication, education, and behavioural modification. Key-words: Cataplexy; Narcolepsy; Polysomnography; Self inflicted injury, Key Messages [D1] :Secondary narcolepsy is rare and sometimes can be missed to diagnose. Such rare presentation of secondary narcolepsy helps in diagnosing other cases of self-inflicting injuries. Introduction: [D2] Narcolepsy is neither a type of epilepsy nor a psychogenic disturbance. It is an abnormality of the sleep mechanisms specifically, REM-inhibiting mechanisms and it has been studied in dogs, sheep, and humans. Narcolepsy can occur at any age, but it most frequently begins in adolescence or young adulthood, generally before the age of 30. The disorder either progresses slowly or reaches a plateau that is maintained throughout life. [2]. The prevalence of narcolepsy varies across countries and with different ethnic groups, and so the exact prevalence is not known. Prevalence estimates have been reported to be between 168 and 799 per 100,000 in most studies, although Japanese studies have indicated a higher prevalence of 1600 per 100,000. [2,3]. There are no genetic tests currently available for clinical use to make a positive diagnosis of narcolepsy. Genetic testing may correlat e best to narcolepsy when there is already clear cataplexy. [4]. Supporting the evidence for an environmental influence is the fact that the disease is not apparent at birth, but instead commonly has its onset during the second decade of life. Additionally, there are apparent precipitating factors such as head trauma, infection, and changes in sleep-waking habits that have been identified in some cases. [6] Chronic, daytime sleepiness is a major, disabling symptom for many patients with traumatic brain injury (TBI), but thus far, its aetiology is not well understood. Extensive loss of the hypothalamic neurons that produce the wake-promoting neuropeptide hypocretin (orexin) causes the severe sleepiness of narcolepsy, and partial loss of these cells may contribute to the sleepiness of Parkinson disease and other disorders. One study has found that the number of hypocretin neurons is significantly reduced in patients with severe TBI. This observation highlights the often overlooked hy pothalamic injury in TBI and provides new insights into the causes of chronic sleepiness in patients with TBI. [7] Amphetamine usage has been associated with addiction, psychosis and self-injurious behaviour . There are report s on two patients who severely and repeatedly mutilated their own genitalia while intoxicated on amphetamines and consider possible diagnostic aetiologies. [8] Genital mutilation is common in males compared to females. [9] But narcolepsy presenting as self inflicted genital injury has not been reported so far. That is why this is a rare case .

Saturday, November 2, 2019

Second Language Aquisition and Perceptions of Native Language by Essay

Second Language Aquisition and Perceptions of Native Language by Foreign Students in UK Colleges - Essay Example Foreign students of English in the UK may feel particularly overwhelmed as they learn what is now the global language in its birthplace. Feelings of embarrassment over their accent and unfavorable comparisons with their own language could come into play in such a setting. The purpose of my study will be to investigate these comparisons and to find out to what extent it affects the performance of foreign students in UK Colleges. Learning a second language in young adulthood, as compared to any other age, has as many advantages as disadvantages. Young adults according to Clyne (2006) possess a distinct advantage in comparison to children in that they are better able "to achieve an analytical understanding of the new language being studied, while children can only reason about language in relatively concrete terms. Adolescents can add a child-like willingness to experiment and play with language to this capacity for metalinguistic awareness, and so they become the speediest second language learners" (P. 2). Despite these advantages it can be argued that psychological factors often outweigh mental preparedness, depending on the case. Problems with motivation and anxiety that young adults often face can impede even the brightest of students from reaching their academic goals. Anxiety surrounding language learni... Phillips claims, "Although many variables may interact to affect language learning, foreign language anxiety should be of considerable concern to language educators and students because of its potential impact not only on performance on oral tests, but also on students' affective reactions, hence their attitudes toward language learning in general" (P. 14). If a foreign student is having troubles with or doubts about the culture they are immersed in they may not feel comfortable speaking with those who are a part of this culture. This could result in the anxiety levels of foreign students building with few outlets for relief. 2. Motivation Motivation is key to success in education. If a student is not motivated they will most probably not be successful in their studies. Green (1993) believes that there are two levels of motivation in language learning. One level is cognitive linguistic which is brought out in formal language-learning situations. The second is cultural linguistic which is brought out in the environment outside of the classroom when the student is driven by what he calls instrumental and integrative motivation. Instrumental motivation comes from such forces as employment, promotions and academic success while integrative motivation comes from positive perceptions of the target-language culture and its peoples (p. 3). Green believes that, "integrative motivation might best be redefined as a force potential in any environment conducive to second-language acquisition, while acknowledging that it could equally well be viewed in universal, nonlinguistic terms as the drive for acceptance and security to bring a sense of belonging to a particular community (p.