Monday, September 30, 2019

Relationship-based governance system Essay

1. What is the relationship between corporate governance and social responsibility? 2. What is your opinion of GAP International is having a code of conduct for its suppliers? What would Milton Friedman say? Contrast his view with Archie Carroll’s view. 3. Does a company have to act selflessly to be considered socially responsible? For example, when building a new plant, a corporation voluntarily invested in additional equipment that enabled it to reduce its pollution emissions beyond any current laws. Knowing that it would be very expensive for its competitors to do the same, the firm lobbied the government to make pollution regulations more restrictive on the entire industry. Is this company socially responsible? Were its managers acting ethically? 4. Are the people living in a relationship-based governance system likely to be unethical in business dealings? 5. Given that people rarely use a company’s code of ethics to guide their decision making, what good are the codes?

Sunday, September 29, 2019

Dreams in Of Mice and Men Essay

Of Mice and Men by John Steinback is a story about George and Lennie, two companions who share the same dream of owning their own land and being their own boss. They move from place to place looking for work but the â€Å"fetishes† of Lennie gets them into trouble which hinders their dream for being fulfilled. In the end, reality sinks in and George accepts their fate. Almost all of the characters in the story have dreams of their own but somehow fate conspires against them that prevent their dreams for becoming a reality. Of Mice and Men centers on dreams of the common man as much as it focuses on loneliness and human companionship. The focus on dreams however, is leaned towards a more realistic approach than idealistic. Steinback portrays dreams realistically by showing the obstacles that hinder dreams. Dreams is what drive people, or at least most of us, it gives us a sense of purpose, without them, existence seems unnecessary. The most notable dream in the story is the dream of George and Lennie having a farm of their own. Lennie always asks George to retell him their dreams because part of it involves Lennie petting rabbits, which is Lennie’s fetish (touching soft things), and also because Lennie has a short memory. Ironically, it is their dream that enslaves them to work. The dream of owning a farm is the lifelong dream of George and Lennie because they are tired of moving from place to place constantly trying to find work, which barely support them– owning a farm means, at least for George, being self-reliant, a sense of security and just simply being somebody and not just mere drifters. Lennie on the other hand is just in it for the rabbits but he clearly values the companionship that their dreams forge. This is shown throughout the story when Lennie gets upset by the thoughts of George getting angry at him Candy, the old man with the old sheep dog, partly became part of George and Lennie’s dream; as he offers money that he supposedly have, to contribute to the purchase of the farm. The dream of the farm also gives him a sense of security because he has nowhere else to go to if he is fired from the current farm he is in. Crooks also partly shared the dream of George and Lennie when Lennie tells him about the dream farm, Crooks offers his service to the farm for free because for him, equality in the farm might bring is enough. Equality is something he longs for outside of the dream farm because he is discriminated for being black. He lives separately from the other workers and is insulted by the wife of Curley. A place they can call their own where they can have some sense of security and pride is what drives these characters’ dreams. Dreams, by its mere definition, do not mean that everything would be achieved. The characters dream of a different, or rather, a better life but their conditions prevent them from achieving these dreams. George does not have the money to buy the farm and Lennie slows his progress, Lennie is mentally retarded and relies solely on George so he can somehow function in society. Crooks is a black man, and during the setting of the story, that fact alone is enough to stop all hopes for a better life. Even Curley’s wife had dreams of becoming an actress but he married Curley who does not make her happy. Slim provides contrast with these dreams as he appears to not have any dreams and accepts the reality that he is stuck on working in the farm. Having dreams is fine but the truth is the world is an unforgiving place. The story shows the idealistic dreams of the characters and their struggle to break out of their situation. The characters strive for a better life but remain in the cycle of work, more work, and hopelessness—Dreams does not always lead to a happy ending.

Saturday, September 28, 2019

Last Sacrifice Chapter Eighteen

I SPRANG UP FROM THE bed, relieved that I didn't fall over. My head still hurt, but I no longer felt dizzy, which hopefully meant I really had evaded a concussion. Glancing at an alarm clock as I left Sonya's bedroom, I saw that I'd been in Lissa's head for a few hours. Her test had been far more extensive than I'd realized. In the living room, I found an almost comical sight. Victor and Robert stood there, in the flesh, taking in the surrounding details. Even Robert seemed to be with us mentally this time. Only, whereas Victor was studying everything in his calculating way, Robert's attention was fixed on Sonya. His eyes bugged out in astonishment. Dimitri, meanwhile, hadn't altered his position near Sonya or put away the stake at her throat. It was clear from his stance and watchful gaze, however, that he regarded the brothers as a new threat and was trying–impossibly–to stay on guard against everything. He seemed relieved to see me and have some backup. Sonya had gone perfectly still within her chains, which I didn't like at all. It made me think she was planning something. Her red eyes narrowed. The whole situation was tense and dangerous, but a tiny part of me felt smug satisfaction as I studied Victor more closely. The dream meetings had been deceptive. Just as I could shift my appearance in dreams, Victor had made himself look stronger and healthier in those visits than he actually was in real life. Age, disease, and life on the run were taking their toll. Dark shadows lined his eyes, and his graying hair seemed thinner than it had a month ago. He looked haggard and tired, but I knew he was still dangerous. â€Å"So,' I said, hands on hips. â€Å"You managed to find us.' â€Å"There's one lake in this town,' said Victor. â€Å"One blue house. Maybe you had trouble with those directions, but for the rest of us, it wasn't that difficult.' â€Å"Well, if you're so smart, what's your plan now?' I asked. I was trying to stall as I frantically thought about what my plan was. I'd wanted to capture Victor and Robert but didn't know how. Since we had to split our attention between them and Sonya, Dimitri and I couldn't team up. I wished we had leftover chain. Aside from physically subduing the brothers, we would also specifically need to restrain their hands to reduce their ability to use magic. â€Å"Since you're so smart,' countered Victor, â€Å"I assumed you'd have already obtained the needed information.' I gestured toward Sonya. â€Å"She's not exactly forthcoming.' Victor's eyes fell on her. â€Å"Sonya Karp. You've changed since I last saw you.' â€Å"I'm going to kill you all,' Sonya snarled. â€Å"And consume you one by one. Normally, I'd start with the human and work up to the Moroi, but †¦' She glanced at Dimitri and me, her face full of rage. â€Å"I think I'll save you two for last and drag out your suffering.' She paused and almost comically added, â€Å"You've annoyed me the most.' â€Å"Do all Strigoi go through some boot camp and learn all the same threats? It's a wonder you don't cackle too.' I turned back to Victor. â€Å"See? Not that easy. We've tried everything. Beating it out, torturing it out. Sydney went through the names of all her relatives. No reaction.' Victor studied Sydney in detail for the first time. â€Å"So. Your pet Alchemist.' Sydney didn't move. I knew she had to be scared of facing someone who was both a vampire and a dangerous criminal. I had to give her points for meeting his stare unflinchingly. â€Å"Young,' Victor mused. â€Å"But of course she would be. I imagine it's the only way you could manipulate her into this little escapade.' â€Å"I'm here by choice,' replied Sydney. Her expression stayed calm and confident. â€Å"No one manipulated me.' Abe's blackmail wasn't really relevant at the moment. â€Å"Look, if you wanted to keep torturing me with your not-funny comments, you could have just kept invading my dreams,' I snapped. â€Å"If you don't have anything useful to offer, then get out of here and let us wait until hunger weakens Sonya.' And by get out of here, I meant: foolishly think you're going to leave so that I can knock your heads together and drag you back to the guardians. â€Å"We can help,' said Victor. He touched his brother lightly on the arm. Robert flinched, jerking his eyes from Sonya to Victor. â€Å"Your methods were destined to fail. If you want answers, there's only one way to–‘ Sonya made her move. Dimitri was still right next to her, but he'd also been keeping an eye on the rest of us. And of course, I'd been completely focused on the Victor drama as well. It was probably the best opening Sonya could have hoped for. With crazy Strigoi strength, she bucked up from the chair. The chain was wrapped around her over and over, but her quick movement and strength were enough to snap the chain in two places. The rest still encircled her, but I knew perfectly well even one opening was enough for her to eventually bust out. Distracted or not, Dimitri was on her in a flash, and a second later, so was I. She was flailing in the chair, using every bit of her strength and speed to shake off the chains. If she got loose, I knew she'd put up another fierce fight. Dimitri and I met eyes briefly, and I knew we were thinking the same things. First, how were we going to re-restrain her? The chain could probably be rebound, but we'd need to unwind it and start over, which would be next to impossible. We also both knew he and I might not be able to take her down a second time, and now we had innocents around. They couldn't fight, but Sonya might be able to use them to her advantage somehow. All we could do was try to keep her down. Holding her against a flat surface like the floor would have been much easier than the unwieldy recliner. It shook as she fought against us, and we struggled to get a good position on the chair. Dimitri had his stake– I'd set mine down earlier–and he raked it against her skin, giving us some advantage in the struggle. She screamed in rage, and I clung to the hope we might tire her out. Probably not. We'd break first. My aching head was proof enough that I wasn't in peak condition. I saw a flash of movement in my periphery, setting off new alarms. Robert Doru was heading toward us–and he had a silver stake in his hand. The sight was so bizarre and unexpected that I was slow to alert Dimitri. When my sluggish mind suddenly kicked back to life, it was too late. â€Å"No!' I shrieked, seeing Robert raise the stake. â€Å"Don't kill her!' Dimitri turned and saw Robert then, but there was nothing he could do. Dimitri and I had created the perfect opportunity. We were holding Sonya still, and with her chest vulnerable, Robert had a clean shot. Frantically, I wondered what to do. If I stopped him, I'd release Sonya. If I didn't stop him, he might kill our only chance at finding out who– Too late. The stake plunged down with a force that astonished me. Lissa had had a very difficult time staking Dimitri, and I'd assumed the same would be true for someone like Robert, who was older and seemed so fragile. But, no. He still had to use two hands, but the stake went firmly into Sonya's chest, piercing her heart. Sonya let out an intense scream. A brilliant, blinding white light suddenly filled the room, just as an unseen force blasted me away. I hit a wall, my brain barely registering the pain. The small house shook, and with one hand, I tried to grab something and brace myself. I squeezed my eyes shut but could still see starbursts. Time slowed. My heartbeat slowed. Then–it all stopped. Everything. The light. The tremors. I breathed normally. All was quiet and still, as though I'd imagined what had just happened. I blinked, trying to bring my eyes back into focus and assess the situation. I did my best to scramble clumsily to my feet and saw Dimitri was doing the same. He looked like he'd also been knocked over but had caught the wall for support, rather than smashing into it. Robert was lying flat out on the floor, and Victor rushed over to help him. Sydney just stood frozen. And Sonya? â€Å"Unbelievable,' I whispered. Sonya was still in the armchair, and from the way she was sitting back, it was obvious that she'd been blasted by the same force that had hit the rest of us. The chains were still around her, but she'd stopped struggling. On her lap was the silver stake Robert had held only moments ago. Sonya managed to wiggle a hand out of the chain, just enough for her fingers to brush against the stake's surface. Her eyes widened with wonder–eyes that were a rich, azure blue. Robert had brought Sonya Karp back to life. She was no longer Strigoi. When Lissa had saved Dimitri, I'd felt the magic's power through the bond, giving me the full and overwhelming experience of it all. Witnessing it now, without the firsthand knowledge provided from Lissa, was still just as incredible. Victor was preoccupied with Robert, but the rest of us couldn't stop staring at Sonya in amazement. I kept looking for anything–anything–that might give the slightest hint of her previous existence. There was none. Her skin bore the typical Moroi paleness, but it was still filled with the warmth of life, with the faintest tinge of color–not like the Strigoi, who were completely devoid of pigment. Her eyes were bloodshot, but that was from her rapidly forming tears. There was no red ring around her irises. And the look in those eyes †¦ there was no cruelty or malice. They were not the eyes of someone who had just threatened to kill us all. Her eyes were all shock and fear and confusion. I couldn't tear my gaze from her. A miracle. Another miracle. Even after seeing Lissa restore Dimitri, some secret part of me had believed I would never witness anything like it again. That was how miracles worked. Once in a lifetime. There'd been a lot of talk about using spirit to save Strigoi everywhere, talk that had faded when other drama–such as the murder of a queen– took precedence at Court. The shortage of spirit users had also made the idea unpopular, and besides, everyone knew the difficulties involved with a Moroi staking a Strigoi. If trained guardians died fighting Strigoi, how could a Moroi stake one? Well, here was the answer: a subdued Strigoi. A Moroi could manage staking one with two hands, especially with guardian backup. The possibilities made me reel. Robert's magic was strong, but he was old and frail. Yet, if he had still done this, could any spirit user? He'd almost made it look easy. Could Adrian do it? Could Lissa do it again? A miracle. Sonya Karp was a living, breathing miracle. And suddenly, she began screaming. It started off as kind of a low wail and rapidly grew in volume. The noise snapped me to attention, but I didn't exactly know how to respond. Dimitri did. His stake fell from his hand, and he rushed to Sonya's side, where he began trying to free her from the chains. She floundered at his touch, but her efforts no longer packed the supernatural strength of an undead monster seeking revenge. These were the motions of someone desperately, terribly afraid. I'd wrapped those chains pretty securely, but Dimitri had them off in seconds. Once Sonya was free, he sat in the chair and pulled her to him, letting her bury her face against his chest and sob. I swallowed. Dimitri had also wept when he had been changed back. An odd image of newborn babies flashed through my mind. Was crying the natural reaction for anyone being born–or, in this case, reborn–into the world? A sudden movement grabbed my attention. Sydney's eyes were wide, and she was actually moving toward Dimitri–to stop him. â€Å"What are you doing?' she cried. â€Å"Don't release her!' Dimitri ignored Sydney, and I caught hold of her, pulling her back. â€Å"It's okay, it's okay,' I said. Sydney was the most stable factor in this whole operation. I couldn't have her freaking out. â€Å"She's not Strigoi. Look. Look at her. She's Moroi.' Sydney slowly shook her head. â€Å"She can't be. I just saw her.' â€Å"It's what happened to Dimitri. Exactly the same. You don't think he's a Strigoi, do you? You trust him.' I released my hold on her, and she stayed put, her face wary. Looking down at the brothers, I realized theirs might be a more serious situation than I had realized. Robert, while not a Strigoi, looked pale enough to be one. His eyes were vacant, drool escaping his partially open mouth. I reassessed my earlier observation about Robert making Strigoi restoration look easy. He'd staked her like a pro, but obviously, there were a few side effects. Victor was trying to support his brother and murmured soothing and encouraging words. And on Victor's face †¦ well, there was a look of compassion and fear that I'd never seen before. My brain didn't entirely know how to reconcile it with my well-defined and villainous image of him. He seemed like a real person. Victor glanced up at me, his lips twisting into a bitter smile. â€Å"What, no witty quips now? You should be happy. We've given you what you wanted. You need answers from Sonya Karp?' He nodded toward her. â€Å"Go get them. They've certainly come at a high price.' â€Å"No!' exclaimed Dimitri. He still held Sonya against him, but his gentle expression turned hard at Victor's words. â€Å"Are you crazy? Didn't you see what just happened?' Victor arched an eyebrow. â€Å"Yes. I noticed.' â€Å"She's in no condition to answer anything! She's in shock. Leave her alone.' â€Å"Don't act like she's the one who's suffering here,' snapped Victor. Turning back to Robert, Victor helped his brother stand and go toward the couch. Robert barely managed it, his legs trembling and then giving way as he sat down. Victor put an arm around Robert. â€Å"You'll be all right. Everything's all right.' â€Å"Will he be?' I asked uncertainly. Robert didn't look like he was in all that good of shape. My earlier thoughts about spirit users saving Strigoi continued growing unrealistic. â€Å"He †¦ he did it before and recovered, right? And Lissa's fine.' â€Å"Robert was much younger–as is Vasilisa,' replied Victor, patting Robert's shoulder. â€Å"And this is hardly a simple spell. Doing it even once is monumental. Twice? Well, you and I both know how spirit works, and this feat takes a toll on both body and mind. Robert has made a great sacrifice for you.' He had, I supposed. â€Å"Thank you, Robert,' I said. The words came hesitantly to my lips. Robert didn't seem to hear. Dimitri stood up, lifting Sonya easily in his arms. She was still crying, but her sobs were quieter now. â€Å"She needs to rest,' he said gruffly. â€Å"Believe me, you have no idea what's going on inside her right now.' â€Å"Oh, I believe you,' I said. â€Å"You're idiots,' snapped Victor. â€Å"Both of you.' It was a wonder Dimitri's glare didn't pin Victor to the floor. â€Å"No interrogation yet.' I nodded my agreement, not knowing what else to do. When Lissa had changed Dimitri, she'd taken on a fierce, similarly protective attitude. He might not have been the one to change Sonya, but he was the only one here who had any idea what she was going through. I knew he'd had a hard adjustment and that the initial effects of the restoration had been disorienting. That wasn't even taking into account the subsequent depression. He swept past all of us, taking Sonya to her bedroom. Sydney watched them go and then glanced over to the sofa, where Victor still had his arm wrapped around his brother. The Alchemist met my eyes wonderingly. â€Å"I heard †¦ but I didn't believe.' â€Å"Sometimes,' I told her, â€Å"I still don't. It goes against every rule of the universe.' To my surprise, she touched the small gold cross around her neck. â€Å"Some rules are bigger than the universe.' Victor rose from the couch, apparently satisfied Robert was resting. I tensed up. Miracles aside, he was still a criminal, one I intended to capture. He took a step toward me, pitching his voice low. â€Å"Sorry to interrupt Metaphysics 101, but you need to listen to me,' he said. â€Å"Be careful, Rose. Very careful. A lot rests on you now. Don't let your pet wolf keep you from finding out what Sonya knows.' â€Å"But he's right,' I exclaimed. â€Å"Its been five minutes! What she went through †¦ what they both went through †¦ well, it's kind of a big deal. Literally life-changing. He had to recover too and adjust to being saved. Once she does, she'll help us.' â€Å"Are you sure?' he asked, narrowing his eyes. â€Å"Will she think she's been saved? You forget: Belikov was turned against his will. She wasn't.' â€Å"W-what are you saying? That she's going to try to become Strigoi again?' He shrugged. â€Å"I'm saying get your answers soon. And don't leave her alone.' With that, Victor turned and headed toward the kitchen. He soon returned with a glass of water. Robert drank it greedily and then fell into a heavy sleep. I sighed and leaned against a wall near Sydney, totally worn out. I still hurt from the earlier fight. â€Å"What now?' asked Sydney. I shook my head. â€Å"I don't know. We wait, I guess.' Dimitri returned a little while later and spared a small glance for Robert. â€Å"She's sleeping too,' he told me. â€Å"The transformation †¦ it's difficult.' I could see a haunted look in his eyes and wondered what memory was tormenting him now. The memory of being changed? The memory of being Strigoi? â€Å"I don't think we should leave Sonya alone,' I said. Out of the corner of my eye, I saw Victor smirk. â€Å"Someone should stay with her in case she wakes up. She won't know what's going on.' Dimitri didn't answer for a few seconds as he scrutinized me. He knew me well enough to sense there might be something else on my mind. Fortunately, he couldn't find a fault in my logic. â€Å"You're right. Do you mind sitting with her?' he asked Sydney. I groped for something to say. No, no. Not Sydney. If Sonya did turn on us, we needed someone else on guard–someone who could fight back. Sydney, probably guessing my problem, saved me from lying to Dimitri–or from telling him the truth about my concerns. â€Å"She doesn't know me. It might make things worse when she wakes up. Besides †¦' Sydney put on that disgusted expression that Alchemists excelled at. â€Å"I don't really feel that comfortable with someone who was a monster five minutes ago.' â€Å"She's not Strigoi,' he exclaimed. â€Å"She's absolutely, completely Moroi again!' Even I felt a little cowed by the harshness of his voice, but I wasn't entirely surprised at his vehement reaction. He'd had a hard time convincing others he'd changed. His face softened a little. â€Å"I know it's hard to believe, but she really has changed.' â€Å"I'll stay with her then,' I said. â€Å"No, no.' Dimitri shook his head. â€Å"Sydney's right about one thing: Sonya might be confused. It's better if someone's there who understands what's happened.' I started to argue that I was the only one Sonya really knew but then decided I'd rather stay with the brothers. They seemed harmless now, but I didn't trust them. Dimitri apparently didn't either. He took a few steps forward and leaned down, speaking only an inch from my ear. â€Å"Keep an eye on them,' he murmured. â€Å"Robert's down right now but might recover sooner than we think.' â€Å"I know.' He started to turn, then glanced back at me. His commander face had softened into something thoughtful and awestruck. â€Å"Rose?' â€Å"Yeah?' â€Å"That †¦ was that what it was like when Lissa changed me?' â€Å"More or less.' â€Å"I didn't realize †¦ it was †¦' He struggled for words. It was uncharacteristic. â€Å"The way that light filled the room, the way she changed. Seeing that life emerge from death †¦ it was †¦' â€Å"Beautiful?' He nodded. â€Å"Life like that †¦ you don't–no, you can't waste it.' â€Å"No,' I agreed. â€Å"You can't.' I saw something shift in him then. It was small, just like in the alley, but I knew then another piece of the Strigoi-trauma had peeled away. He said no more, and I watched as he walked back down the hall. With nothing else to do, Sydney sat down cross-legged on the floor, holding a book in her lap. It was closed, her thoughts clearly elsewhere. Meanwhile, Victor sat back in the armchair and reclined it. He didn't look as bad as Robert, but lines of fatigue showed on both brothers. Good. The longer they were out of commission, the better. I brought in a chair from the kitchen so I could sit and survey the room. Everything was peaceful. I felt like a babysitter, which I suppose I kind of was. It had been a long day, and night soon turned the windows black. This made worried me. For all I knew, Sonya had some Strigoi pals who might stop by. The fact that Donovan knew her certainly indicated she wasn't a total outcast among them. It made me extra-vigilant, but at the same time, I was exhausted. The brothers were already asleep. Sydney, perhaps in an attempt to keep her human schedule, eventually found a spare blanket and pillow and curled up in a makeshift bed on the floor. And me? I was halfway between human and vampiric schedules. I had a feeling Dimitri was the same. Really, we were on a do-what's-necessary schedule, in which extensive sleep was not an option. A hum of excitement and astonishment suddenly sang through the bond. I sensed no danger or threat, but curiosity made me decide to check in with Lissa anyway. Even if I was in her mind, I knew my body would stay watchful, and I wanted to know how the rest of Lissa's test had gone. Beautifully, of course. She rode back to Court, exhausted but proud of herself. She wasn't the only one. The rest of her companions all wore similar expressions †¦ all except for Ava Drozdov. She had been the only one to break and use the cell phone to call for help. Lissa was surprised that Ava had cracked. After his earlier bitching, Marcus Lazar had seemed the most likely to bail. But no, the old man had managed it somehow, meaning he'd continue on in the monarch trials. Ava refused to make eye contact with anyone, instead staring bleakly out the window as they traveled back to Court. She would still hold a Council spot, but her shot at being queen was gone. Lissa felt bad for her but couldn't spare too much concern. It was the way of the trials, the way they determined the best candidates. Besides, Lissa had her own issues. Staying out in the daytime had run contrary to the normal vampiric schedule. Now, she simply wanted to get back to Court, find her room, and sleep for a few hours. She wanted some peace. Instead, she found a mob waiting for her.

Friday, September 27, 2019

Written report project Research Paper Example | Topics and Well Written Essays - 2250 words

Written report project - Research Paper Example *Visible exclusive technology develops specifications for database view as one is carrying out data modeling - tracking changes of names to all procedure and location in which they are being made use of, doing away with errors as the model changes. *The visual analyst has an elegant reverse engineering - Reverse engineering has the duty of analyzing databases which have been inherited, and finding associations that are not specifically described to the database. It also allows the tool to deduce associations where none is described. Visible analyst is an absolute tool for enterprise engineering with amenities for data modeling, premeditated planning, process and object modeling. It offers advanced capabilities to database administrators, Enterprise Architects, and Data Modelers at a considerably lower price than any of its competitors. It offers a general, incorporated platform and user interface for all purposes of software design. These functions might be object-oriented, prearranged and entity association. In the visible analyst CASE tool, documentation and citations run involuntarily from the modeling drawings into the centre-based repository, together with all the information that the user enters. Visible analyst allows real enterprise application engineering by articulating and keeping store of data, requirements for business, processes, and objects that are able to be shared by those who develop applications all through an organization. As a result of this, one can easily blueprint and manage enterprise software for excellence, constantly, and reusability in applications meant for business through the controlled sharing of meta-data. A case repository: The extensible repository of the visible analyst stores the general known facts about the data, objects and processes that can be split all through an organization, rendering it greater than tools which are file-based. It makes sure that data flows consistently and without fail, which is

Thursday, September 26, 2019

Ethnography Essay Example | Topics and Well Written Essays - 1000 words

Ethnography - Essay Example n which the members of this church maintain a close-knit, family relationship by examining worship practices, family relationships and subgroup relationships within the greater whole. The data for this analysis was collected over a period of weeks in which the author kept a journal of his observations while attending church. While the author was a participant in these proceedings, effort was made to step back and view the proceedings from the perspective of the outsider without sacrificing the insights available to the insider. Journal entries were made on a weekly basis beginning September 4, 2006 and ending October 23, 2006. There are approximately 250 listed members of this particular church, 230 of which attend on a regular basis. The members of the church range in ages from the very young to the very old, with a majority of the members falling within the middle age category. The congregation is also comprised of a wide variety of ethnicities, primarily Russian, Lebanese and Greek. The worship service itself functions as a reminder of a call to family togetherness. One of the first actions parishioners observe as they walk into the church is to light a candle in the Narthex in memory of a deceased relative or loved one – the author typically lights one in memory of a deceased uncle. They then kiss the icon and cross themselves on the chest three times before taking their places to ensure they are in proper frame of mind to receive the instruction to follow. The sermon, usually covering a topic that is loving and nonjudgmental, typically lasts approximately one hour. Following the sermon, the congregation files out, kissing the priest and the cross he holds as they pass. From here, most members of the congregation file into a large dining room in which they partake of foods brought in from individual members. Toward the end of the period of study, a young girl was baptized in a child-size plastic swimming pool that had obviously been purchased at

Healthcare and Health Policy in Spain Essay Example | Topics and Well Written Essays - 1000 words

Healthcare and Health Policy in Spain - Essay Example Second, public insurance coverage of the general population is over 99.5% where only few groups of independent professionals and immigrants under special conditions are not covered by law. Third, is how the healthcare system financed In Spain it is financed through general taxation. The National Health Service started in the 1940's wherein it is originally funded by social security, over the years they needed additional funding and this came from the general taxation. And now it is clear that 98% of the funding in Spanish healthcare comes from general taxation. The healthcare and health policy in UK is somewhat different from Spain. The comparison between the two countries is enumerated below. In the conclusion the writer will analyze the significance of having a good healthcare system and policy. In healthcare Spain is said to be much better as compared with UK. Spain has a public health system which provides free or low cost health care for those contributing to the Spanish social security system and their families. The system also caters for retirees and includes those from other EU countries. The country has an excellent system of private medicine and this exists comfortably alongside the State system with both operated so as to complement each other. The Spanish health care system is rated ninth in the World by the World Health Organisation - far above that of the UK's. In Spain there are two types of hospitals operating, one private and one operated by the state. The private hospital offers immediate treatment with patients being accommodated in single rooms. The state hospital offers the same convenience. Both hospitals pool resources to the benefit of private and state patient alike. Because of the comprehensive policies in Spain the health services for patient such as CT scan or laboratories are 40-70% cheaper than in UK. To equality among its citizens Spain has passed a law called law of quality and health cohesion. It means that by law the citizens have the right to enjoy the same health services including pharmaceuticals with the same conditions regarding social participation, accessibility, time, information, security and quality independently of where they live. And according to the ministry of health, this is their first great law of healthcare since the 21st century. In Spain there is a pharmaceutical policy that is now being introduced in UK. This has been existed in Spain for many years; it is one of approaching the local pharmacist for minor ills. Pharmacists have an excellent reputation for accurate diagnosis and effective treatment and are able to issue all but controlled drugs. In no time at all they'll have you feeling better. In Spain there are several ways to contact a doctor or have an appointment if you are sick. You can just text the word "Urgencias" to the telephone number 5013 and you will be informed of the waiting time before your appointment. This is very convenient especially for the elders. Another way to consult the doctor is thru the web. Healthcare system and

Wednesday, September 25, 2019

E-Logistics2 Essay Example | Topics and Well Written Essays - 3250 words

E-Logistics2 - Essay Example This report describes the various challenges in global supply chain strategy of VF and provides recommendation to improve the â€Å"Third Way† supply chain system globally. Challenges of â€Å"Third Way† supply chain Strategy of VF VF produces apparel products from its own manufacturing plant as well as acquires apparels from other suppliers. The outsourcing strategy of VF focuses on flexibility. VF possesses strong manufacturing capacity and it can also outsource from suppliers to improve the manufacturing process and thus reduce the cost of production. The suppliers of clothing industry use term contract to produce particular garment in particular quantity. This strategy helped VF to shift production among suppliers in different locations for optimizing cost and respond to the changes in any business conditions such as changes in tariff or exchange rates and other factors related to cost. VF had responded to the market condition and implemented â€Å"Third Way† supply chain strategy to gain advantage of both in house manufacturing and outsourcing as well. VF had two critical elements in the growth strategy which were to expand sales outside the US and expand the ‘direct to consumer’ business. ... For example, Walmart, one of the largest jeans retailers of the US had launched jeans under their own brand. The apparel companies mostly concentrated on design and marketing rather than production. The production was generally a labour intensive method which had several disadvantages. This enabled the garment companies to outsource the production of their design in high competitive terms (Pisano & Adams, 2009). As the supply chain had become globalized, it was a great challenge for VF to find good supplier and develop good relationship in order to coordinate the production flows. The apparel companies do not possess appropriate skill and good bond for efficient outsourcing in Asian region. For this reason, a few Asian manufacturers had started to modify their business to provide fully incorporated supply chain to the apparel companies (Pisano & Adams, 2009). The economic recession of 2008–2009 was also another challenge of VF. Compared to other competitors, VF had managed the global recession much better, though it has also seen decline in sales by 9% in the year 2009. Their income had reduced by 30% in the same year, but the financial condition of VF was strong. It had relatively lower debt, good credit line and comparatively higher cash than their competitors. The biggest fear for VF was the long term impact of the economic crisis on the supply chain. Several garment suppliers were operating on low margin and did not have any financial cushion. When the volume fell because of low demand of garment products, suppliers were forced to shut down their business. The sudden closure of supplier’s business had proved to be troublesome for VF Company. For example, a supplier of VF had informed that it would close down its

Tuesday, September 24, 2019

Reducing the driver texting while driving can significant reduce the Essay

Reducing the driver texting while driving can significant reduce the number of car accident - Essay Example Texting while driving kills thousands of people each year. To stop these completely preventable accidents, every person who drives needs to stop texting in the car and wait to answer the phone. Distracted driving, which is the practice of not paying full attention to the road, is a big killer, and cell phone usage is one key factor. According to the FCC, in 2012 alone â€Å"driver distraction was the cause of 18 percent of all fatal crashes,† totaling more than 3300 deaths and over 421,000 injured people (FCC). While there are a number of ways that drivers could be distracted in their car, text messaging stands out as a very notable culprit. There are a huge amount of at-risk drivers who use cell phones. A poll from 2014 showed that 90% of all Americans own cell phones, 64% of which are smartphones (Pew Research Center). On top of that, studies have found that â€Å"text messaging creates a crash risk 23 times worse than driving while not distracted† (FCC). This is because, as can be imagined, the driver of a car who is trying to text has his or her attention split between a screen and the road. Distracted driving accidents have increased a lot in the past decade due to an increase in cell phone and smartphone usage. From 1999 to 2008, there was an increase of almost five percent in the number of fatal accidents which involved distracted driving (Wilson & Stimpson 2214). This makes sense when thinking about the increase in cell phone usage during that time. And the last few years of this period are the biggest increase, which ties in with more smart phones being popular for teenagers. Just from 2005 to 2008 there was an increase of 28% in distracted driving deaths (Wilston & Stimpson 2214). But there is still hope for the texting disaster. As Alosco et al. showed in a simulated driving study, texting as well as eating caused â€Å"impaired performance,† and interestingly, those who took part in the study after the fact understood that â€Å"texting

Monday, September 23, 2019

Financing Options Essay Example | Topics and Well Written Essays - 2250 words

Financing Options - Essay Example 41, No. 3, 2001, pp. 121-140). In this paper, various financial options available in the UK economy for large purchase will be evaluated and the issues associated with such options will also be analysed. Bank loans are considered to be the most reliable source of financing any large purchase. Bank loan is an agreement in which the borrower is provided with full or partial amount of the money required for purchasing certain assets from a large number of commercial banks such as HSBC, Barclays, Standard Chartered and Royal Bank of Scotland as well as cooperative banks such as Tesco Bank, Sainsburys Bank etc. available in the economy. Such sum of money is provided with an agreement of repaying the principle amount after completion of a stipulated period of time. Moreover, the borrower is subjected to pay the fixed or variable amount of interest rate, as applicable, on the principle amount taken as loan (M. Caglayan and A. Rashid, â€Å"The Response Of Firms Leverage To Risk: Evidence From Uk Public Versus Nonpublic Manufacturing Firms†, Economic Inquiry, Volume 5, No. 52,  2013,  pp 341–363). Bank loans can be of secured and unsecured. Unsecured loans are those source of capital in which fund can be quickly availed without any obligation of collateral. Such loan is provided, depending upon the current financial position of the borrower and his reputation in the market. However, in case of large purchases, loan is always made secured by involvement of certain assets such as housing property of the borrower which is used as collateral. The lenders hold the collaterals till the tenure of the loan. If the borrower fails to repay the loan or the interest payment within the stipulated time, the banks are entitled to acquire the right of ownership of the collateral. Secured loan is considered to be the best option for accumulating large amount of money. Mortgage loans are the most prominent example of secured bank loans (I. K. Nassr and G. Wehinger,

Sunday, September 22, 2019

Two Milestones In The History Of Space Exploration Essay Example for Free

Two Milestones In The History Of Space Exploration Essay The subject of space conquest has been a very interesting aspect of human history for the past few decades. Although to date, we already use advanced technologies, high-powered telescopes, satellites and spacecrafts, it would still be helpful for us to look back through time and consider the beginnings of space exploration. We will do this by studying two important events that enabled humanity to realize the possibility of conquering space.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   On April 12, 1961, Moscow Time, the world entered the realm of outer space flight when the spacecraft Vostok 1 carried to outer space the first human being to ever orbit the earth. The name of the cosmonaut to first orbit the earth was Yuri Gagarin. Zal (2002) wrote an interesting record of the Vostok 1 flight as follows: â€Å"The launch vehicle blasted off nearly as scheduled at 09:06:59.7 Moscow Time and the orbital insertion looked nominal to Gagarin. However unknown to the pilot, the core (second) stage of the rocket burned longer than scheduled, leaving the spacecraft in a 327-kilometer apogee orbit, instead of planned 230 kilometers. It meant, that in case of a complete failure of the braking engine, a natural reentry of the spacecraft caused by the friction in the upper atmosphere would take place at least five days after a 10-day supply of vital life-support consumables onboard Vostok would run out†.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   When the Russian government launched the Vostok 1 project and chose Yuri Gagarin to be on board, there was no complete certainty that the mission would work out one hundred percent successful.   Two years earlier, the first artificial satellite to enter geocentric orbit, named Sputnik 1, burned into space as it attempted to reenter the earth’s atmosphere. Previous unmanned test launches of Vostok 1 prototypes turned out to be failures. â€Å"Out of seven prototypes of the Vostok spacecraft flown (Versions 1K and 3KA), two spacecraft did not reach orbit due to the failure of the launch vehicle and two vehicles did not complete all their tasks†. (Zal, 2001)   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   A few hours before the flight of Vostok 1, it encountered a strange problem. During the closure of Gagarin’s capsule hatch, one of its sensors suddenly would not turn on. The hatch had to be re-opened to activate the sensor and everything went back to normal. Later however, the spacecraft, was able to successfully get out of the earth’s atmosphere. Its flight around the earth’s orbit took a total of 108 minutes.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The plan regarding Gagarin’s reentry into the earth was that he would detach from the spacecraft and enter the atmosphere by a capsule. Strange as it may seem, the capsule took ten minutes longer than expected before it actually detached from the spacecraft. This is crucial because any miscalculation and digression from the plan may cause the capsule to explode in the atmosphere. According to Gagarin, he experienced rapid spinning and extreme heat as the capsule began to enter the atmosphere. In the midst of the turmoil, Gagarin sent a message to the ground monitors which will later become an inspiration for other cosmonauts for the years to come: â€Å"Everything OK†.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Needless to say, Yuri Gagarin successfully returned to earth and was regarded a hero by Russian authorities. His name also changed the history of space exploration forever.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Meanwhile, if Yuri Gagarin was the first person to orbit the earth, Galileo Galilei was the first person to use a telescope to study the moon and other heavenly objects. What he did was improve the newly invented spyglass (invented in 1608 by a Dutch spectacle maker)[1] and turned it skyward in an attempt to study elements in outer space. His findings were shocking to the people of his time. Galileo found out that the moon doesn’t have a smooth surface, just like everyone supposed. In fact, it was full of rocky terrain and craters. He was also the first to discover sunspots, the four large moons of Jupiter, and the rings of Saturn.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Although Galileo’s findings were challenged and was not generally accepted by the religion of his time, still he was able to contribute to modern space conquest and research. Isaac Newton, in 1750, improved Galileo’s concept of the telescope. In future centuries, telescopes of a greater and broader view of the universe were invented. Among these far reaching telescopes are the Keck Telescope, the Very Large Telescope and the Hubble Space Telescope. According to Mould, Geffner and Lesser (1991), the Keck telescope is 33 feet in diameter, situated 33,000 feet above sea level in the Mauna Kea, Hawaii. The Very Large Telescope, a European project, is 52.5 feet in diameter and situated in the mountains of Chile. The Hubble Space Telescope is a satellite telescope and can see images in outer space up to 14 billion light years away.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Galileo’s basic findings through the telescope evidently paved the way for giant leaps of astronomical findings in future years and gave us a better understanding of the universe. Works Cited: Bellis, M. (2005). History of the Telescope – Binocular. Retrieved September 1, 2007, from http://inventors.about.com/library/inventors/bltelescope.htm Mould, J.A., Geffner, S.L., Lesser, S.M., (1991). General Science (3rd ed.).   Ã‚  Ã‚  Ã‚   New York: Amsco School Publications. Pogge, R.W. (2006). Lecture 16: The Starry Messenger: Galileo Galilei the    Telescope. In An Introduction to Solar System Astronomy (Astronomy 161). Retrieved September 1, 2007, from http://www-astronomy.mps.ohio-   state.edu/~pogge/Ast161/Unit3/galileo.html    Zak, A. (2001). Vostok 1: Dawn Of Human Space Flight. Retrieved September 1,  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚   2007, from http://www.russianspaceweb.com/vostok1.htm   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  [1] Although the credit for the invention of spyglass or early telescope was often given to Hans Lippershey of Holland, there was no sufficient evidence that he was the first to make one. See Bellis (2005).

Saturday, September 21, 2019

The Cathay Pacific Airways Information Technology Essay

The Cathay Pacific Airways Information Technology Essay This report comprises all the relevant information regarding the Cathay Pacific Airways, specially its security governance framework. It sums up four parts: background of the organization, potential areas of IT security failures, recommended IT security governance framework and lastly issues and challenges faced by that security governance framework. In the very first part, we have described about basic fundamentals like its headquarter, its fleet of airbuses, worldwide destinations and its achievement. In the 2nd section of the report are the specific areas where security failures may occur. These areas include managing core business system. Because the airways adopted the legacy systems, which is easily susceptible to security threats. Secondly it can not cope with current competent requirements. Furthermore, it being a wide infrastructure desktop PCs, the airways data flow over internet, which can be captured by any intruders or hackers. This may cause disruptions to routinely business. Its business to business (B2B) interchange of data again creates vulnerabilities in its IT infrastructure. The pervasiveness of network creates a more open set of information systems for the mobile and diverse need of the orgnaisation. This mobile arrangement may be easily attacked by internal and external sources. In the third part this report discourses on IT governance framework. This framework is the recommended one to be implemented in the organization. The structure of governance is fully r esponsible to provide control and effective management of the IT infrastructure security. In the structure each one is accountable at his own rank for the security, safety of IT assets and data protection. Lastly this report raises various issues and challenges confronting the security governance structure while managing and controlling the security of the IT infrastructure of Cathay Pacific. INTRODUCTION Today, every organization adopted or is thinking to adopt IT infrastructure. Once it is implemented, it needs security. IT assets, database and information trafficking on ubiquitous network need to be fully protected. That is why; a necessity relating to this IT infrastructure in an organization has cropped up. For safety and security, security governance has been thought of. It may comprise shareholder, board of directors, CIO, financial manager and so on. These persons are fully responsible for controlling and streamlining all the information system of the organization like Cathay pacific. This governance framework follows various new laws and regulations designed to improve the security governance. Threats to information systems disruptions from hackers, worms, viruses and terrorists have resulted in need for this governance. This report explains clearly security failures, governance framework for ICT and IT related issues and challenges. BACKGROUND OF ORGANISATION Cathay Pacific Airways is an international airline registered and based in Hong Kong, offering scheduled cargo and passenger services to over 90 destinations around the world. The main vision of this company is to make Cathay Pacific the most admired airline in the world. To Achieve this goal Cathay started its journey from 1946 and now it is known as best Airlines in Asia. It is one of the five airlines to carry a five star rating from Skytrax (Cathay Pacific 2007). The official website of Cathay Pacific is http://www.cathaypacific.com/cpa/en_INTL/homepage Cathay Pacific was established in 1946 in Hong Kong with a mere two DC-3 aircrafts servicing passenger routes for Bangkok, Shanghai, Manila and Singapore. From its humble beginnings, it has to date grown into a world class airline employing over 15,000 employees and reaching out to 62 global destinations. It owns over a hundred widebodied aircrafts that transports over a million passengers a month to almost each continent in the world (McFarland Young, 2003) and transports freight worldwide which constitutes to nearly 30% of its revenue. Profits stood at $511 million during 2002 and Cathay expanded into the state of the art $628 million global headquarters in Cathay City. Cathay continuously faced numerous challenges on its way to success. Nevertheless, its management acknowledges the fact that in order to remain competitive given the current market situation; it is of utmost importance to improve on its strategic and non strategic perspective of its entire ICT resource. Cathay Paci fic continues to invest in new ICT infrastructure to streamline its business processes and make information easier to access for all employees. As part of this process, Cathay Pacific implemented technology solutions designed to automate and simplify customer and financial information management. POTENTIAL AREAS OF IT SECURITY FAILURES Currently, many airlines are looking at e-business to protect their assets and to secure customers loyalty, and to be successful in todays competitive environment. Many e-commerce principles have been pioneered by the airline industry. These include the first business-to-business electronic information exchange and industry-wide electronic marketplace. There are many benefits to be gained for airlines and airline passengers, E-ticketing, e-Check in many internet base services provide to customer with quick and low cost services but there is still hesitation among many peoples even many companies about committing any major effort to electronic commerce. The main concern about security of sensitive data, such as credit card numbers, personal data and business confidential data (Jiang 2003). Managing Core Business System Cathay Pacific has been developing in house systems since the 70s. Some of its core business systems are accounting systems, engineering system, personnel and flight systems and other internal applications. Legacy systems are systems that have evolved over many years and are considered irreplaceable, either because re-implementing their function is considered to be too expensive or because they are trusted by users (Dietrich 1989). Business change constantly in order to meet the demands of the marketplace and this necessitates the need for information systems to evolve accordingly (McKeen Smith 1996). Over 20 years later, Cathay realized that the coordination and support of these systems was a cumbersome task that could potentially stunt the strategic growth of the company. Given its phenomenal growth rate, Cathay realized that the IM department will not be able to cope with the ever changing business requirements. Legacy passenger service systems may not be flexible and scalable en ough to support the new marketing strategies of airlines today (Cavaliere 2006). Cathay needed a technology that keeps costs down and is flexible whilst at the same time delivers on both todays needs and those of the future. Customizing current legacy systems to match these current competitive requirements just consumed too much time and resources. Mckeen and Smith (1996) further argues that since change is a constant in business and in technology, demand for maintenance is un-easing and since existing systems are the ones operating the business, maintenance work can easily overwhelm new development. Managing network infrastructure desktop PCs. Infrastructure plays an important role in ensuring vital support is supplied to systems development teams and that effective coordination and direction is available to IS as a whole (McKeen Smith 1996). Cathays rapid expansion to new destinations and tremendous surge in route expansion, passenger and cargo volume in the 80s caused Cathays network infrastructures to continue to expand. Without infrastructure, productivity will soon decline as individuals and groups each attempted to replicate the work of others. Cathays data center which coordinated fundamental airline operations was placed in two locations in Kowloon and on Hong Kong Island. These data centers provided uninterrupted information to Cathays airline operations. The fire in 1991 on Cathays data center interrupted flight operations for 12 hours. Cathays management realized the importance of ensuring uninterrupted information flow to critical business functions is top priority for the organization. IT infrastructure and f acilities need grow in tandem with the organizations growth pace. Almost full at its operational capacity at its current data center, Cathay probably needed a few more data centers to manage the organizations information at current growth rate. Mid 90s saw an uneven PC distribution at Cathay Pacific. PC distribution to staff members depended on each staff members level of security access. This caused some of the staff to have a PC while other did not. This uneven distribution was finally rectified by Cathays outsourcing its PC management to IBM in 2001. The costs involved in outsourcing these services means that more scrupulous attention will be paid to their value on an ongoing basis. Nevertheless, the outsourcing exercise posed its own complexity involving hardware and software licensing issue. Managing dynamic changes in desktop environment and the suppliers was the main challenge in the desktop PC management for Cathay. The PC outsourcing trend was still new in this region thus raised skepticism among managers in the initial stage. Managing B2B system integration In a broad sense, Business to business (B2B) integration refers to all business activities of an enterprise that have to do with electronic messages exchange between it and one or more of its trading partners (Bussler 2003). Bussler further narrows down this definition in a software technologys scope that B2B integration refers to software technology that is the infrastructure to connect any back end applications system within enterprises to all trading partners over formal message exchange protocols like the Electronic Data Interchange (EDI). Cathay is naturally in a highly competitive and challenging airline business. Fundamental flight operational information can be very dynamic and customers must be kept updated with the latest information. Information, fares and schedules have to be accurate; sales promotions and marketing activities are constantly changing. Flight operations are vulnerable to any changes in weather which may cause last minute schedule changes or cancellations. With the wide array of multiple destinations, languages, time zones and alerting travelers, an airline business is constantly a logistical operations challenge to any Cathay. These information need to be translated into online web content in order to fulfill its B2B requirement. Information has to be accurate, the selling channel has to be reliable and secure, changes have to be updated quickly and last minute flight disruptions have to be communicated to passengers immediately and consistently through a number of different channels. Such an e-business vision has required a sophisticated architecture of specialist platforms designed to integrate and deliver a number of different information and application components in a seamless manner. Content management is one of the core components in Cathay Pacifics e-business architecture. It was vital for the airline to ensure that it invested in the right product that could deliver its promise within budget and on time. Managing Standards As the pervasiveness of network create a more open set of information systems for the mobile and diverse need of the organization, increased attention must be paid to the corresponding increase in exposure to attacks from internal and external sources (Dhillon, 2001). Cathay uses Secure Socket Layer (SSL) protocol as an industry standard for encryption over the Internet, to protect the Data. Cathays main challenge to date is not being able to convince its partners and customers with confidence that despite with the most recent security standards, any internet transaction could be leaked out by individuals through internet hacking. This is acknowledged in its website claim which says that complete confidentiality and security is not yet possible over the Internet, and privacy cannot be assured over all its internet communication between the business and its customers (Cathay Pacific 2007). Cathay pacific in ensuring reliable B2B applications has to ensure that the latest standards su ch as XML and open source technology are used extensively in all its software applications critical to business. Digital certification for all online transactions especially the ones that involve monetary exchange is imperative in ensuring customer confidence and to avert security breach. RECOMMENDED IT SECURITY GOVERNANCE FRAMEWORK There are many definitions that describe the ICT Corporate Governance. Here I choose a few interesting definitions to be discussed in this report. Corporate Governance of ICT is Specifying the decision rights and accountability framework to encourage desirable behavior in the use of IT. (Weil Ross, 2004) In contrast, the IT Governance Institute, 2003 expands the definition to include underpinning mechanisms: the leadership and organizational structures and processes that ensure that the organisations IT sustains and extends the organisations strategies and objectives. While AS8015, the Australian Standard for Corporate Governance of IT, defines Corporate Governance of IT as The system by which the current and future use of IT is directed and controlled. It involves evaluating and directing the plans for the use of IT to support the organization and monitoring this use to achieve plans. It includes the strategy and policies for using IT within an organization. Figure 1 AS 8015 2005 model of Corporate Governance of ICT (Source: Skinner, 2006) Every definition has its own way of describing the term Corporate Governance of IT but I think the definition of the AS8015, the Australian Standard for Corporate Governance of IT is the most understandable and clearly defined (see figure 1). AS8015 clarified whats really important the organisations goal (Toomey, 2006). However we can notice that every definition focuses on the same issues which is directing and controlling the implementation of IT according to the organisations strategy and policies. This involves the contribution in decision making of every stakeholder of the organization. As we can see that the IT Governance Institute has also stated the word Leadership, which stands for the principal of the organization, the board of directors and the management team, who must manage the efficient use of IT to achieve the strategies and objectives. Unlike old time which the IT system is managed alone by the IT department. Talking about the IT Management people may usually mix it up with the IT Governance. They are not the same thing. Governance is the process by which management is monitored and measured. It is not a substitute for management it is a way of ensuring that sound management occurs (Philipson, 2005). There are many key drivers for Corporate Governance of IT. Here in this report I will focus on the legal and regulatory compliances which will be discussed in the next part of the report. IT Governance Framework of Cathay Pacific Information security governance is the responsibility of the board of directors and senior executives. It must be an integral and transparent part of enterprise governance and be aligned with the IT governance framework. Whilst senior executives have the responsibility to consider and respond to the concerns and sensitivities raised by information security, boards of directors will increasingly be expected to make information security an intrinsic part of governance, integrated with processes they already have in place to govern other critical organisational resources. To exercise effective enterprise and information security governance, boards and senior executives must have a clear understanding of what to expect from their enterprises information security program. They need to know how to direct the implementation of information security program, how to evaluate their own status with regard to an existing security program and how to decide the strategy and objectives of an effecti ve security program. Whilst there are many aspects to information security governance, there are several matters that can assist in focusing on the question, What is information security governance? These are the: Desired outcomes of information security governance Knowledge and protection of information assets Benefits of information security governance Process integration (IT Governance Institute 2006) Figure 2: IT Security Governance Framework of Cathay Pacific (Source: Poore 2005) Information security governance consists of the leadership, organisational structures and processes that safeguard information. Critical to the success of these structures and processes is effective communication amongst all parties based on constructive relationships, a common language and shared commitment to addressing the issues. The five basic outcomes of information security governance should include: 1. Strategic alignment of information security with business strategy to support organisational objectives 2. Risk management by executing appropriate measures to manage and mitigate risks and reduce potential impacts on information resources to an acceptable level 3. Resource management by utilising information security knowledge and infrastructure efficiently and effectively 4. Performance measurement by measuring, monitoring and reporting information security governance metrics to ensure that organisational objectives are achieved 5. Value delivery by optimising information security investments in support of organisational objectives The National Association of Corporate Directors (NACD), the leading membership organisation for boards and directors in the US, recognises the importance of information security. It recommends four essential practices for boards of directors, as well as several specific practices for each point. The four practices, which are based on the practicalities of how boards operate, are: Place information security on the boards agenda. Identify information security leaders, hold them accountable and ensure support for them. Ensure the effectiveness of the corporations information security policy through review and approval. Assign information security to a key committee and ensure adequate support for that committee (IT Governance Institute 2006). Benefits of Information Security Governance Information security governance generates significant benefits, including: An increase in share value for organisations that practice good governance Increased predictability and reduced uncertainty of business operations by lowering information security-related risks to definable and acceptable levels Protection from the increasing potential for civil or legal liability as a result of information inaccuracy or the absence of due care The structure and framework to optimise allocation of limited security resources Assurance of effective information security policy and policy compliance A firm foundation for efficient and effective risk management, process improvement, and rapid incident response related to securing information A level of assurance that critical decisions are not based on faulty information Accountability for safeguarding information during critical business activities, such as mergers and acquisitions, business process recovery, and regulatory response The benefits add significant value to the organisation by: Improving trust in customer relationships Protecting the organisations reputation Decreasing likelihood of violations of privacy Providing greater confidence when interacting with trading partners Enabling new and better ways to process electronic transactions Reducing operational costs by providing predictable outcomes-mitigating risk factors that may interrupt the process (IT Governance Institute 2006). ISSUES AND CHALLENGES In the ICT world today, not every organisation will be able to achieve success or reap its benefits. Too many ICT initiatives have failed to deliver the bottom-line results companies had hoped for. One very common reason of failure is that the organizations fail to have a good management and controlled of their IT system. The Data Governance Council, with a focus on the review and approval aspects of board responsibilities, recently recommended that boards provide strategic oversight regarding information security, including: 1. Understanding the criticality of information and information security to the organisation 2. Reviewing investment in information security for alignment with the organisation strategy and risk profile 3. Endorsing the development and implementation of a comprehensive information security program. Lets discuss about major issues and challenges that faced by Cathay pacific, implementing an IT Security Governance framework. Boards and management have several fundamental responsibilities to ensure that information security governance is in force. Amongst the issues they should focus on are: Understand Why Information Security Needs to Be Governed Risks and threats are real and could have significant impact on the enterprise. Reputation damage can be considerable. Effective information security requires co-ordinate and integrated action from the top down. IT investments can be substantial and easily misdirected. Cultural and organisational factors are equally important. Rules and priorities need to be established and enforced. Trust needs to be demonstrated toward trading partners whilst exchanging electronic transactions. Trust in reliability of system security needs to be demonstrated to all stakeholders. Security incidents are likely to be exposed to the public. Take Board-level Action Become informed about information security. Set direction, i.e., drive policy and strategy and define a global risk profile. Provide resources to information security efforts. Assign responsibilities to management. Set priorities. Support change. Define cultural values related to risk awareness. Obtain assurance from internal or external auditors. Insist that management makes security investments and security improvements measurable, and monitors and reports on program effectiveness (IT Governance Institute 2006). Take Senior Management-level Action Provide oversight for the development of a security and control framework that consists of standards, measures, practices and procedures, after a policy has been approved by the governing body of the organisation and related roles and responsibilities assigned. (Design) Set direction for the creation of a security policy, with business input. (Policy Development) Ensure that individual roles, responsibilities and authority are clearly communicated and understood by all. (Roles and Responsibilities) Require that threats and vulnerabilities be identified, analysed and monitored, and industry practices used for due care. Require the set-up of a security infrastructure. Set direction to ensure that resources are available to allow for prioritization of possible controls and countermeasures implement accordingly on a timely basis, and maintained effectively. (Implementation) Establish monitoring measures to detect and ensure correction of security breaches, so all actual and suspected breaches are promptly identified, investigated and acted upon, and to ensure ongoing compliance with policy, standards and minimum acceptable security practices. (Monitoring) Require that periodic reviews and tests be conducted. Institute processes that will help implement intrusion detection and incident response. Require monitoring and metrics to ensure that information is protected, correct skills are on hand to operate information systems securely and security incidents are responded to on a timely basis. Education in security measures and practices is of critical importance for the success of an organisations security program. (Awareness, Training and Education) Ensure that security is considered an integral part of the systems development life cycle process and is explicitly addressed during each phase of the process. (IT Governance Institute 2006) Questions to Uncover Information Security Issues Does the head of security/CISO routinely meet or brief business management? When was the last time top management got involved in security-related decisions? How often does top management get involved in progressing security solutions? Does management know who is responsible for security? Does the responsible individual know? Does everyone else know? Would people recognise a security incident when they saw one? Would they ignore it? Would they know what to do about it? Does anyone know how many computers the company owns? Would management know if some went missing? Are damage assessment and disaster recovery plans in place? Has management identified all information (customer data, strategic plans, financial data, research results, etc.) that would violate policy, legal or regulatory requirements or cause embarrassment or competitive disadvantage if it were leaked? Did the company suffer from the latest virus or malware attack? How many attacks were successful during the past 12-month period? Have there been intrusions? How often and with what impact? Does anyone know how many people are using the organisations systems? Does anyone care whether or not they are allowed access, or what they are doing? Is security considered an afterthought or a prerequisite? (IT Governance Institute 2006) CONCLUSIONS Information security is not only a technical issue, but a business and governance challenge that involves adequate risk management, reporting and accountability. Effective security requires the active involvement of executives to assess emerging threats and the organisations response to them. As organisations like Cathay pacific, strive to remain competitive in the global economy, they respond to constant pressures to cut costs through automation, which often requires deploying more information systems. The combination is forcing management to face difficult decisions about how to effectively address information security. This is in addition to scores of new and existing laws and regulations that demand compliance and higher levels of accountability.

Friday, September 20, 2019

Learning Temperance in Homer’s Odyssey Essay -- Odyssey

Learning Temperance in Homer’s Odyssey Being a work of importance in the western tradition of philosophy, The Odyssey is much more than some play written by Homer ages ago. Though The Odyssey certainly is a dramatic work and partially intended for entertainment, it also provides insight into the ways of thinking of the time it has been written in. Aside from illustrating the perspective of early Greek philosophy The Odyssey also raises certain questions pertaining to virtues and the morality of actions undertaken therein. Such questions and the pursuit of their answers may also lead to a better understanding of the actions taken in present-day society and the human condition in general. One of the virtues that is present throughout The Odyssey is temperance, or the lack thereof. In the course of Odysseus' journey, numerous events take place which are determined by the actions of Odysseus' himself, as well as those of his shipmates. In fact, the endeavor here is to portray how the delays and troubles encountered by O dysseus and his crew are due to their inability to exhibit proper self-restraint in conduct, expression, and indulgence of the appetites. This is undertaken in the proceeding text by an examination of two specific episodes from Homer's The Odyssey. The first episode being Book X of The Odyssey, entitled "The Grace of the Witch", containing Odysseus' encounter with the goddess Kirke. The second being Book V under the title of "Sweet Nymph and Open Sea," of how Odysseus departs the island of the nymph Kalypso. Both episodes are intended to demonstrate the importance of temperance in the journeys of Odysseus. Prior to a discussion of how temperance affects The Odyssey, it is good to discuss the concept of... ...ry for him to learn the virtue of temperance. If he is not able to moderate his impulses towards revenge, feasting, and lovely goddesses, then he shall always be doomed to roam upon the wine dark seas. Obviously he does learn this, since he does return to Ithaka without being smitten down by the gods, but he returns a different Odysseus. The new Odysseus realizes that there is more to living than a feast of roast meats and wine each night before the flawless bed of love of a lovely goddess. The new Odysseus wipes a salt tear from his cheek at the sight of an old hound that lays neglected (17.394). Works Cited Baird, Forrest E., and Walter Kaufman. "Aristotle." Ancient Philosophy. 3rd ed. Philosophic Classics, vols. 1. Upper Saddle River: Prentice Hall, 2000. 304 - 444. Homer. The Odyssey. Trans. Robert Fitzgerald. New York: Farrar Straus Giroux, 1998.

Thursday, September 19, 2019

Comparing Love in To Dance with the White dog and Moulin Rouge :: comparison compare contrast essays

Comparing Love in To Dance with the White dog and Moulin Rouge   Ã‚  Ã‚   In the novel, To Dance with the White dog, Terry Kay crafts a love story about Sam Peek and his wife Cora, that seems to extend beyond the grave in the form of a white dog.   At the same time, the film Moulin Rouge is a fast paced, tensely dramatic, love triangle between Christian, the poor writer, Satine, the courtesan that everyone fancies, and the Duke, who has the money to transform the Moulin Rouge into a theatre with real merit. Both movies center on the main theme of love but take two different stands on that love. While Satine is unable to concentrate solely on a single relationship, Sam Peek is able to focus solely on the love of his life, Cora.      Ã‚  Ã‚  Ã‚  Ã‚   In To Dance with the White Dog, there are several instances that show Sam's devotion and unchanging love for Cora.   When Sam writes in his journal, at the beginning of the novel, "Today my wife died.   We were married 57 good years" (Kay 9).   Sam was completely devoted to his wife for over half a century and even after her death with his devotion to White Dog, who he perceived to be his deceased wife watching over him.   Even though Satine was unable to pursue her love for Christian due to her death, her ambiguity towards her two suitors makes the viewer wonder if she could be as devoted to one love as Sam is devoted to his wife.      Ã‚  Ã‚  Ã‚  Ã‚   A prime example of Sam's enduring fidelity is when he goes to his wife's grave, "[...] He took the hoe and cut away at the weeds, balancing on his walker, until the plot was clean" (Kay 42).   No matter what his circumstance, Sam is going to do what he can for his wife, even if it is simply taking care of his wife's grave.   Christian does something similar to this by writing Satine's and his story, so that the world would know about their love.  Ã‚   The love is there, but the audience is unable to see if Satine and Christian's love would last as long as Sam and Cora's due to Satine's untimely death at the end of the film.

Wednesday, September 18, 2019

Marijuana Legalized: How It Can Positively Effect Our Society Essay

The dispute over the legalization of cannabis sativa, more commonly known as marijuana, is one of the most controversial issues ever to take place in the United States. Its use as a medicine has existed for thousands of years in many countries across the globe. Legalization should be considered despite efforts made by groups who say marijuana is a harmful drug that will increase crime rates and lead users to other more dangerous substances. The legalization of marijuana can improve our society by helping with our economy, freeing legal resources, and benefiting the overall health of the nation though medical uses. Helping the Economy Our economy in America is hurting right now. We need something to help boost it and bring our country out of debt. Taxation on legalized marijuana could help aid in this goal. Assuming the taxes are comparable to tobacco, a $40 billion marijuana market would yield about $16-20 billion in taxes (Nelson, 2010, para. 24). There are worries that the black market will undercut the legitimate sales of marijuana, which might be very true, the same thing has happened with tobacco. Having the security of knowing where the marijuana is coming from and that it was grown without harmful chemicals, altered by a third party, and knowing it is a quality product is a deterrent to black market purchases. Marijuana would also still be illegal to purchase from the black market. If marijuana were legalized it would open up a whole new commerce in industrial hemp farming and the products that are made from it. The products that can be made from hemp number over 25,000 (Hemp Facts, 1997). A few of those products include paper, clothing, rope, fuel, and building materials. Hemp can be cultivated once or in som... ...chool to buy marijuana that it is alcohol because alcohol is controlled and age restricted. Since 2001 marijuana use in high school students has gone down (Marijuana - InfoFacts – NIDA, 2010). If marijuana is controlled the same way I believe that its use will only reduce further. People should make their own decision if they want to smoke marijuana. They deserve the right to exercise their own freedom of choice when considering using marijuana. It should be taxed and regulated to help our country’s economy and it will open up a whole new industry for hemp products. Legalization will help free up money and resources to focus on more serious crimes. Its medicinal properties help people with various types of illnesses and pain from injuries. Further research and studies will only open up more uses for cannabis. Its benefits far outweigh its negative effects.

Tuesday, September 17, 2019

Mitosis and Meiosis

It is important that cells go through mitosis because it makes each new cell contain the same gentic information. If meiosis did not occur the reproduction would cease to exist. Mitosis is the process of chromosomes dividing. There are four steps that it goes through. Between cell division the cells are in interphase. During this there is cell growth and the genetic material such as DNA is contained in the chromosomes, duplicated so that when the cell divides each new cell has a full version of the same genetic material.First is prophase, which the chromosomes coil up and become visible. Second is metaphase, the chromosomes move in toward the center. Third is anaphase, and here is where the cromatids are pulled apart. Fourth and last, is the telophase, this is when a nuclear envelope forms around the chromosomes. If mitosis occurred in the gametes, when fertilization happens the offspring would receive a double dose of hereditary information. To prevent this, it undergoes the reducti on division of meiosis. Meiosis is a form of cell division that cuts the number of chromosomes in halves in the gametes.An organism would need to go through mitosis for growth, development, repair and asexual reproduction. Meiosis is important for eukayotic organisms, this causes production of gametes which is the organisms reproductive cells) for sexual reproduction. Mesoisi is very random in its way of separating homologus pairs. It randomly determins which of each pair ends up in each newly produced gametes. An organism with 23 pairs of chromosomes can produce 8,388,603 possible types of gametes. According to (2010), â€Å"The process of meiosis also creates another opportunity to generate genetic diversity.During one phase of meiosis, called metaphase, the arrangement of each pair of homologous chromosomes is random, and different combinations of maternal and paternal chromosomes line up with varying orientations to create new gene combinations on different chromosomes. This ac tion is called â€Å"independent assortment. † (para. Five).Reference (2010). Understanding Genetics – growth and Reproduction. Retrieved from http://www. libraryindex. com/pages/2222/Understanding-Genetics-GROWTH-REPRODUCTION. html

Monday, September 16, 2019

Elementary Education Essay

Thesis: Elementary teachers may not have highest income, but they have one of the most fulfilling careers. Introduction: When thinking back to elementary school, what most people remember the best, are the teachers they had along the way. Elementary teachers not only introduce their students to the basic concepts of core subjects, they also help pave the path to each student’s future success. While the income may not be the highest available, watching students develop a new skill or grow an appreciation for learning can be very rewarding. I. What is the role of an elementary school teacher? a. Elementary teachers play an important part in not only the intellectual development but also the social development of their students. What students learn at a young age can affect the way they see themselves, others, and the world later in life. b. Elementary teachers have the responsibility of introducing their students to the core subjects of mathematics, language, science, and social studies. II. Education, Training, and Certification c. The normal route to becoming a teacher involves receiving a bachelor’s degree from a teacher education program, then obtaining a license. Teachers in private schools are not required to be licensed. d. Each state honors its own individual certifications. However, The National Board for Professional Teaching Standards offers a voluntary national certification, which is also honored by each state. Having a National Boards certification usually results in a higher income. III. Salary and Employment e. Teaching salaries vary by state, experience level, and location. f. Elementary teachers hold about 1. 5 million jobs. Employment is projected to grow about as fast as average, increasing 7-13% from 2008 to 2018. Elementary Education: Shaping the Minds of the Future When thinking back to elementary school, what most people remember the best, are the teachers they had along the way. Elementary teachers not only introduce their students to the basic concepts of core subjects, they also help pave the path to each student’s future success. Education to become a teacher is long and tedious, and while the income may not be the highest available, watching students develop a new skill or grow an appreciation for learning can be very rewarding. Because there will always be a need for education, even with the recent budget cuts, teaching jobs will always have to be available somewhere. Elementary teachers play an important part in the intellectual development as well as the social development of their students. The education of young children can affect the way they view themselves, other people, and the world, and their success throughout life. Usually, one elementary teacher will teach several subjects to one class, of about 20 students. However, some will work in teams with other teachers, depending on the type of school (â€Å"Career Information: Elementary School Teachers. †). Teachers are faced with the responsibility of nurturing their students as well as their education. In the early years of elementary school, teachers introduce their students to the concepts of reading, writing, and counting. In the later years of elementary, teachers have the task of introducing the concepts of mathematics, language, science, and social studies. Teachers also have multiple behind-the-scenes duties. Teachers have the duty of creating daily lesson plans based on state requirements, assigning homework and making tests. They must keep records of grades made on homework assignments and tests. Teachers develop the materials that help students learn solving and reasoning. They also meet with parents of their students to discuss progress, lack of progress, and any discipline problems that may be occurring (â€Å"Elementary School Teachers. â€Å"). The traditional education route to becoming an elementary teacher involves earning a bachelor’s degree from a teacher education program, and then earning a license. A teacher’s education program normally includes courses such as the general mathematics, physical science, social science, music, art, and literature, as well as prescribed professional education courses, such as psychology of learning, and teaching methods. Normally, 4-year school schools require students to wait until their sophomore year before applying for admission to teacher education programs. Teacher education programs also require students to perform a student-teaching internship. It is not required to graduate from an accredited teacher education program to become a teacher, but it will make fulfilling license requirements easier. After receiving a bachelor’s degree, one should obtain a license from a teacher education program. The State Board of Education or a licensure advisory committee grants licensure. Teachers earn their degree in five different categories: the early childhood grades (preschool through third grade), the elementary grades (grades one through six or eight), the middle grades (grade five through eight), a specific secondary subject, or a special subject, such as music. Teaching in private schools does not require a license. The requirements for regular licenses vary by state. Each state individually issues and honors their teaching licenses. However, The National Board for Professional Teaching Standards offers a national certification. All 50 states honor this certification, and in some cases, teachers will receive special benefits for this certification. These benefits can include higher salaries, and reimbursement for continuing education and certification fees (â€Å"Teachers – Kindergarten, Elementary, Middle, and Secondary. â€Å"). The salaries of teachers can vary by school location, teacher experience, and level of education. Public school teachers in elementary schools earn an average of $47,602. Private school teachers earn anywhere between $43,580 and $48,690. However, there are a few ways to increase a salary. Teachers have the option to teach summer school, sponsor or coach extra-curricular activities, or take on other extra duties at the school. Despite being on the lower end of income, teachers do have a non-monetary compensation of fulfillment, while watching their students develop new skills and learn new concepts (â€Å"Teacher Career Salary Expectations. †). Elementary teachers hold around 1. 5 million jobs. As well as affecting a teacher’s salary, the subjects and grade levels one is capable of teaching, and location can affect job opportunities. Jobs in inner cities and rural areas will be easier to find compared to the suburban districts. Minority teachers will be in higher demand because of an increase in minority enrollment, and the lack of minority teachers. Due to a greater public interest in education as well as better pay prospects, the supply of teachers is expected to grow, and employment is expected to grow as fast as average, increasing 7-13%, in the next six years (â€Å"Career Information: Elementary School Teachers. †). Teachers will always be able to find jobs due to the fact that there will always be a demand for learning. Elementary teachers make a huge impact on the lives of young children. Some teachers are remembered as role models; some are remembered as more of a parental figure, and some may just provide fond memories. Either way, they are an important part of each student’s life. They help their students develop important skills that will lead them to success in their future. Works Cited â€Å"Career Information: Elementary School Teachers. † Campus Explorer. 2012. Web. 15 Jan. 2012. . â€Å"Elementary School Teachers. † Oklahoma Career Information Center. 2011. Web. 12 Jan. 2012. . â€Å"Teachers – Kindergarten, Elementary, Middle, and Secondary. † U. S. Bureau of Labor Statistics. 17 Dec. 2009. Web. 12 Jan. 2012. . â€Å"Teaching Career Salary Expectations. † EduDecisions. com. Web. 12 Jan. 2012. .

Sunday, September 15, 2019

Impact of Mobiles on Youth Essay

Globalization has many aspects. It contains important discursive aspects in the form of ideologically charged narratives that put before the public a particular agenda of topics for discussion, question to ask and claims to make. The whole world is accepting and adopting the ways towards the advancement of technology. The youth is playing a vital role in this rapid pace. The strong and mighty cultures are toppling the frail ones. Unfortunately the countries like Pakistan, India and Bangladesh have strong cultural values, norms and customs that are easily fettered by the western cultural onslaught. Our youth is concentrating on some bad choices. In this global village, firstly our youth was allured to divert their attention towards the internet. They have changed a lot by the usage of internet. A few of them have inclined for knowledge, information, awareness and exposure but the majority of them appear to have misused the internet. To some extent, people were done up and vexed with internet but due to the ensconsment of cellular technology all gaps have been bridged for the destruction of youth. The telecommunication companies in our country have been inclined towards introducing new and attractive packages for youth like Mobilink (ladies first, happy hours), Warid (zem series), Ufone (public demand, prepay life panch ka pandra, u circle) Telenor (talkshawk Aone, djuice) and Zong’s life package. The question arises why these companies are introducing these packages without the social mobilization to check the mindset of the youth. Are they trying to facilitate the common man or only youth? I think except on very urgent occasions ordinarily no one would like to talk after midnight. All necessary and normal interactions can be dealt with during daytime but the companies offer the packages that start after end of family or business communication. My feeling is that these packages are more likely to spoil and ravage our youth than to do anything else. In our youth segment the majority is student community that is spell bounded by these packages. They are losing the essence of their profession/studies. They are derailing and deviating themselves. They are getting away from their goals, destinies and motives. Their minds are becoming stagnant and static. Creativity and innovation is blocked by the consistent telephonic conversations spread over the whole of night. They are losing their interest towards the interactions and sociality. Alienation is increasing within small community or groups of people. In one room four roommates are strangers to one another. They never try to tie up the relation because they don’t have a pinch of time. By talking whole night with opposite sex, they are getting psychologically weak and pressured. There are many other physical distortions also arising due to spending the precious time which is needed compulsory rest, relaxation, relief and mental health. Due to spending whole nights the absenteeism is skyrocketing in every profession. They are going far and far away from the hold of families. They tell lies and have false communication with their parents. They are betraying the decisions, trust and expectations of their parents. They are traveling towards the lone parent family system in which one is not accountable to anyone and he is the only decision maker. Such kind of behavior is leading towards the social fragmentation and terrible decline of moral values in which respect is core one. They are crossing the restraints and limitations, very essential for the well integrated society. Due to the bogus projection of the companies their effectiveness and determination is diminishing if we put a furtive glimpse on the chart of protests and rallies conducted against the negative policies, the ratio of youth’ contribution is at minor level and seems vanished because they have engrossed in making affairs and spending their potential and energy to locate the suitable packages. Their mental approach is revolving around sexual satisfaction. Other emotions and sentiments are pushed oblivion, there are forgetting that there are so many matters that need their kind attention. They have obsessed devoid of manners and healthy attitude to other requisites and needs. It is obliterating the mental capacity and concentration of the youth like plague. There is a critical and pathetic state prevailing over the sky of our nation. The whole nation is passing through the chaos, disturbance and mental incapacitation. We are not realizing that what is worth of our youth? That’s why we ourselves are paving the way for our youth towards the devastation and shoving them into fire. The mobile companies have every right to work out innovative packages offering greater value of money to their customers. But they should not making profits by compromising on the interests of the young generation.

Saturday, September 14, 2019

Patent Infringement of Internet Technology

Issue in Dispute & Factual Background The issue being disputed is whether Vonage contravened patent law by using a technological invention registered to Verizon, without permission, in providing its online communication services. Infringement was claimed by Verizon on three of its patents. Since 2006, a string of patent infringement cases have been filed against Vonage, an online communications company providing customers with the means to communicate through their computers through the Internet route. Verizon was first to sue Vonage for the use of three patents covering the translation of ‘analog voice signals’ into ‘digital signals’ to allow customers to communicate through their computers with broadband connections. In March, a jury verdict found Vonage to have infringed the patents and this was also upheld by the appellate court but only for the two patents. However, the appellate court remanded the case down to the lower court for re-determination of the monetary award since this was not detailed by the jury. Next to file a case was Sprint Nextel Corporation for the use of its patented voice-over internet protocol (VoIP), which allows computer users to make calls using broadband connections. In September, a jury also found voyage to have infringed this patent. Lastly, Klausner Technologies also communicated its claims to Vonage but this has been settled. To date, claims of Sprint Nextel Corporation and Klausner have already been settled. All these claims involved Vonage’s online use of these technology patents in its online popular communication services. Position of Litigants Verizon based its claims on the infringement of three patents. Patent 574 enhances translations of communication information such as telephone numbers or websites into IP addresses. Patent 711 covers the manner of using computer speakers or microphones to communicate online. Patent 880 covers ‘localized wireless gateway system’ that enables phones to register with transceivers before connecting to the Internet.[1] Although these patents do not constitute online communications, this serves to enhance the system by providing a means of translating numerous digital to analog signals, instructing a means of using speakers and microphones to communicate online, and connecting into local base stations to connect mobile phones to computers. By offering online communication services using these three patents without its permission, Verizon claims that Vonage has violated its patent grant. Vonage claims that it has not violated Verizon’s patents because it did not translate but merely extracted and reformatted the telephone numbers. Verizon also claimed that the court of first instance erred in the direction it gave to the jury, particularly on the construction of vital terms found in the claims. First contested term is ‘translation’, which was construed by the courts generally instead of limiting this to the conversation of higher to lower protocols as contained in the patent grant. Second contested term is ‘conditional analysis’, which was interpreted by the court as generating a result from a prior first condition. Vonage claims that this should be limited only to the preferences of the parties using the system.[2] Since its operations do not fall under the technological systems patented by Verizon, it has not infringed any patent. Ethical Issue & Opinion on the Case Prior to the cases, Vonage has become popular as an online communications company[3]. In 2006, it launched virtual phone numbers in Europe[4] implying the development of a new type of Internet based community function apart from linking its services to various Internet communication channels such as voicemail. Its popularity was due to the competitive prices together with the high Internet accessibility in most developed countries and the higher interconnectivity it offers by being able to link landlines and mobile phones to computers when compared to purely landline or mobile services or with Internet connectivity but limited only to same network calls. Basically, prior to Vonage’s service, VoIP was already existent but with limited use only to partners of the service provider. Vonage took the VoIP concept fused it with the other online communication connectivity and processes and created a service that higher interconnectivity. Did Vonage violate the law? According to the courts, it did violate the patents of the two companies. Was its actions right or wrong? The answer cannot be plainly stated in black and white. On one hand, this may be wrong because it profited out of somebody else’s technological innovation but on the other hand, it served or even empowered the public by giving them an alternative option. Even in a competitive world, consumers, through demand, do not always influence market prices, quality of service, or innovation. This is especially so in the case of online technology sector, which have become a venue for monopoly such as Microsoft. Under existing law and jurisprudence[5] there may be infringement. However, this case could have become a landmark by clarifying the concept of patent for the purpose of negating infringement. A patent is a property right to use or own inventions for a given number of years and an invention is a new creation[6]. However, it does not necessarily cover purpose, function or importance to the community. Patent has also been used for abuse such as the monopolistic tendencies of technological companies. While private property should be respected, this should also be balanced with public good. Moreover, Internet technologies are virtual, making it necessary to determine or limit the processes or operations considered as qualifying for patents. References KSR Int’l Co.v. Teleflex Inc. (No. 04-1350) 119 Fed. Appx. 282. Retrieved November 1, 2007, from www.law.cornell.edu/supct/html/04-1350.ZO.html. Richtel, M. (2007, October 26). Shares Rise as Vonage Settles Fight over Patent. The New York Times. Retrieved November 1, 2007, from http://www.nytimes.com/2007/10/26/technology/26phone.html. Vonage (2007). Timeline. Retrieved November 1, 2007, from www.vonage.com. US Patent and Trademark Office (2007). General Information Concerning Patents. Retrieved November 1, 2007, from http://www.uspto.gov/web/offices/pac/doc/general/index.html#patent. Vonage Told to Stop Using Verizon Technology By IAN AUSTEN Published: March 24, 2007 A federal judge said yesterday that he would order Vonage Holdings, the Internet-based telephone service, to stop using technologies patented by Verizon Communications. The decision, which could force Vonage to close or to install new systems, follows a jury decision this month that awarded Verizon $58 million and monthly royalties. But the judge agreed to postpone the effective date of the injunction for two weeks while he considers a request by Vonage for a stay pending what could be a lengthy appeal. The decision forced a temporary halt in the trading of Vonage shares and eventually sent the company’s stock down $1.05, or 26 percent, to close at $3. Vonage began trading last May at $17 a share. â€Å"For Vonage, everything that can go wrong has gone wrong,† said Richard Greenfield, the co-head of Pali Research in New York. â€Å"The constant stream of bad publicity has got to be adding to customer churn.† As it did earlier this month, Vonage quickly moved to assure its two million customers that their service would not be affected. It has said it is developing alternative technology that does not conflict with Verizon’s patents. â€Å"We are confident that Vonage customers will not experience service interruptions or other changes,† the company’s chief executive, Mike Snyder, said in a statement. â€Å"Our fight is far from over. We remain confident that Vonage has not infringed on any of Verizon’s patents.† Brooke Schulz, a spokeswoman for Vonage, said the company had not seen any effect on its ability to attract and retain customers because of the case. â€Å"We believe this case has had not impact on churn to date, nor do we expect it to,† she said. Judge Claude M. Hilton of Federal District Court for the Eastern District of Virginia in Alexandria said yesterday that an injunction was necessary because fines and royalties will â€Å"not prevent continued erosion of the client base of the plaintiff,† The Associated Press reported from Alexandria. Vonage has been the early leader in an attempt by several companies to shift traditional telephone company customers to Internet-based calling. â€Å"We’re pleased the court has decided to issue a permanent injunction to protect Verizon’s patented innovations,† said John Thorne, a senior vice president and deputy general counsel at Verizon. The three patents that a jury found Vonage to be infringing upon involve the way the company moves calls to and from the Internet from the conventional telephone system, methods for giving customers calling features like call waiting, and means for providing Internet calling through wireless networks. If Vonage is forced to switch to other technologies, the cost and feasibility of such a change is not clear. It is believed that the company has the ability to make remote software updates in devices that its customers have installed at their homes and offices.  Many conventional telephone companies hold patents involving Internet calling. Vonage faces a separate patent lawsuit from Sprint Nextel that has yet to go to trial. Â