Wednesday, July 31, 2019

The Problem with Overcrowded Prisons

At the turn of the 21st century the problem with the United States penitentiary system could no longer be ignored. There is no need to be incarcerated to understand the suffering of both inmates and personnel managing the prison. Just imagining constricted spaces and forced interaction with an increased number of criminals and or psychologically challenged people can be counterproductive to the supposed rehabilitation purpose of jail time. But reducing the number of inmates or making bigger facilities is not going to be the simple solution for this problem. There are many factors to consider and the dilemma is building up each year. A solution has to be reached before the problem can develop into a full-blown crisis that could result in total breakdown of the system.This study takes a closer look into the problem of overcrowded prisons. This includes finding out why overcrowding has become a riddle for many officials. The research would also tackle the effects of overcrowding. Moreov er, the proponent would find out what are the challenges faced by those who tried to formulate an acceptable solution.Overcrowding the JointIn a nation where slavery is outlawed and where everyone has the opportunity to make something out of life, it is a puzzle why many still go to prison. In the Information age where a person has access to more knowledge, it is a mystery why many are none the wiser since they commit deeds that would put them behind bars.In the book about U.S. prisons, authors Clear, Cole, and Reisig found out that, â€Å"In 2003, 22 states and the federal prison system reported operating at or above capacity. The federal system was estimated to be operating at 39 percent, and overall the state systems were operating at 14 percent above capacity† (2005, p. 467).Michael Jacobson the former Commissioner of the New York City Department of Correction, the largest city jail system in the U.S. provides additional figures that helps to clearly illustrate the crisis . And he remarked, â€Å"The United States now locks up a higher percentage of its population than any country in the world. The more than 2 million people who are incarcerated today make up roughly eight times the number in 1975† (Jacobson, 2005, p. 8).Overcrowding is due to tougher laws that were ratified due to the belief that habitual offenders must be punished longer. These laws also aimed to put these types of criminals locked up for good – that they may feel the full force of the law. Joycelyn M. Pollock in her book assessing the current state of American prisons remarked why there will be an increasing number of men and women who will be under lock and key for the rest of their lives:Even as recently as 1968, 23 states had statutes that authorized life imprisonment for habitual offenders who had previously been convicted of certain specified offenses [†¦] these â€Å"new† sentencing laws have the potential to exacerbate already severely overcrowded prison conditions while simultaneously creating more problems for state and federal governments, criminal justice agencies, and prison administrators (1997, p. 62).Problem with OvercrowdingWhat is the big deal with overcrowding? Others may even dare speculate that it could add another dimension to the punishing of criminals and therefore why make their stay more comfortable?It is therefore helpful to see prison overcrowding from another perspective. And that is to understand the real purpose of incarceration. Mark Colvin in his study of the infamous New Mexico prison riot of 1980 asserted that squeezing more and more inmates like sardines into a tin can was the result of a change in philosophy.It is therefore easy to argue that riots can be expected in prisons where the needs of inmates are not met or when the prisoners feel that basic human rights are not respected due to the lack of resources. It is also not hard to imagine the stress levels experienced by shorthanded staff. When riots ensue, the safety of the prisoners and at the same time the staff responsible in managing said facility will be in extreme jeopardy.Freeman elaborates on this issue when he wrote that, â€Å"It is difficult to maintain a close watch on ‘problem’ inmates when overcrowding exists. This problem is especially acute when those problem inmates are prone to violence† (1999).Colvin argued that policy makers should be reminded that the main purpose of prison is to rehabilitate offenders and not just function as a place to lock them up. Colvin realized that this situation is did not happen overnight and he wrote, â€Å"This current crisis emerged in the 1970s when the ideological commitment to rehabilitation declined sharply, along with our nation’s optimism about alleviating poverty and a host of other social ills† (1992, p. 1).SolutionA good start would be to again revisit the original aim of prison systems. As discussed earlier policies must be alter ed to minimize the punitive intent of incarceration and rather transform regulations so that it will focus more on helping prisoners deal with the root cause of their crime.Overcrowding reduces the efficacy of whatever rehabilitative impact prison can offer. This was highlighted by Clear, Cole and Reisig when they asserted that, â€Å"Prison overcrowding directly affects the ability of correctional officials to do their work, because it decreases the proportion of offenders in programs, increases the potential for violence, and greatly strains staff morale† (2005, p. 469).With regards to dealing with the main cause of crime, the discussion will then shift to preventive measures such as elevating poverty and providing for opportunities for marginalized members of society to have access to education and other training to improve skills.Finally, a solution is right down under the noses of policymakers; but they are so preoccupied by other more sensational and controversial issue s that they miss it. An example of a simple adjustment in the system can mean hundreds of millions of dollars in savings each year and a significant reduction in the number of incarcerated delinquent. The solution calls for a serious assessment of the role of parole officers within the criminal justice system.To better understand the structure altering role of parole officers, Jacobson made a case for the consequence of neglecting the needs of said officers:Virtually no one in government can spend money like a parole officer [†¦] who has no budget to control and may work in a cramped and overcrowded office in a rundown building in a rundown part of town. He or she may have little or no access to programs or treatment for parolees and may earn much less than a correction or police officer (2005, p. 132).Looking at the insight of Jacobson it takes little to understand the domino effect of neglecting this country’s parole officers. Fortunately for those suffering in an inef ficient criminal justice system, there is an insider in the person of Jacobson who truly understand how the system works.It is a wonder that only a few realized that when a parole officer gets overworked and when their morale are dangerously low they would not have the patience to help offenders walk the more difficult path of an ex-convict. A parole officer is like a volunteer counselor who has to work from the heart, giving more than expert advice. And to walk the extra mile to help those who do not deserve help. But according to Jacobson the system is not helping them and he wrote, â€Å"†¦parole officers have no ability to compel parole agencies to spend additional fund on less expensive parole services such as drug treatment, job training programs, or additional officers to lower caseloads† (2005, p. 132).If all else fails then a suggestion is to improve infrastructure and to add cutting-edge equipment to solve the problem of increasing number of prisoners which sig nificantly affect the inmate to staff ratio. In other words technology will be used to make prisons more safe and more manageable. The positive impact as well as the drawbacks were succinctly explained by who remarked:In the USA, new generation design has even been used to reduce staff-inmate contact [†¦] Too much reliance on technology to eliminate danger and reinforce control can be perilous; in the event of equipment failure, staff can feel virtually helpless. Technology should not be an end in itself, but an aid to officers’ personal control and supervision†¦(Fairweather & McConville, 2000, p.32).Another plausible solution is the privatization of prisons. Pollock argued that with privatization comes efficiency managers and controls that will help shape up the current penal system. There are others who object to privatization citing possible obstruction to due process since privatization means control not by the government but by certain people. But in the end Lo gan was right in saying that, â€Å"†¦in no area have I found any potential problem with private prisons that is not at least matched by an identical or a closely corresponding problem among prisons that are run by the government† (as cited in Pollock, 1997, p. 382).ChallengesThose who are knowledgeable about budget deficits and the need for more money to finance other programs; plus those who are wise enough to understand the ill effects of mass incarceration are clamoring for reduction of the overcrowding in U.S. prison systems.Convincing a large part of the population will not going to be an easy task. The first challenge is changing the perception of the majority, which was heavily influenced by the media and the exposure to controversial crimes. Yet even without high profile crimes many are aware of the problem of repeat offenders and even committing crimes while still being on trial or on bail or on parole. This was elaborated by Karti Sieberg who studied the said criminal dilemma, and she remarked, â€Å"According to the report made by the Council on Crime in America, in 1990, among those accused of violent crimes, 12% were awaiting trial for earlier offenses when they allegedly committed rape, murder, assault, or robbery† (2001, p. 16).ConclusionThe solutions discuss above aims to reduce the number of people held behind bars. The proposed methods and policy changes that advocates of reducing overcrowding are increasingly leaning towards a more lenient system. Being lenient can mean different things to many people but in the limited discussion made earlier, those espousing for leniency wished not to be misunderstood.Criminals must serve time but there are many that do not need to spend more time in prison. It will be for their benefit and the society also. Moreover, a focus on preventive measures can significantly reduce this problem. But most importantly giving importance to the role of parole officers can effectively change the dire ction of overcrowded prisons.Jacobson was right when he said that, â€Å"†¦parole officers’ decisions have had the effect of fueling U.S. incarceration boom by sending many parolees back to prison†¦Ã¢â‚¬  (2005, p. 132). If policymakers can start here they could make a lot of headway.Reference ListClear, T., G. Cole, & Reisig, M. (2005). American Corrections. Belmont CA: Thomson HigherEducation.Colvin, M. (1992). The Penitentiary in Crisis: From Accomodation to Riot in New Mexico. NewYork: State University of New York Press.Fairweather, L. & McConville, S. (2000). Prison Architecture: Policy, Design, and Experience.MA: Elsevier.Freeman, R.M. (1999). Correctional Organization and Management: Public Policy Challenges,Behavior and Structure. MA: Butterworth-Heinemann.Jacobson, M. (2005). Downsizing Prisons: How to Reduce Crime and End Mass Incarceration.New York: New York University Press.Pollock, J. (1997). Prisons: Today and Tomorrow. Boston: Jones and Bartlett Pub lishers.Sieberg, K. (2001). Criminal Dilemmas: Understanding and Preventing Crime. New York:Springer.

Van Gogh vs Salvador Dali

Van Gogh vs Salvador Dali The focus of the paper is to make a comparison and contrasts between Van Gogh's ‘Starry Night' and Salvador Dali's ‘Persistence of time'. While Van Gogh's theme formed the basis of expressionism in twentieth century, Dali initially became a leader of the Surrealist movement and later on developed interests in psychology and science, both movements influencing their beliefs and formal approaches in distinctive ways. The ‘Persistence of Time' is regarded as one of the most famous paintings of Salvador Dali. The painting is rendered in yellow, faint brown and blue colors and has earned a world-wide recognition for Dali.Like Van Gogh's ‘Starry Night' that shows typical moonlit scene in Saint-Remy asylum's neighborhood where he stayed for more than a year during his last period of life, Dali's painting resembles Port Lligat, his home. Dali uses sandy beaches and other imagery to which he had been exposed to as a child in his home town. Sim ilar to Van Gogh's ‘Starry Night', the ‘Persistence of Time' could have several interpretations. Although, some could be more meaningful, others remain elusive. The contents of Dali's ‘Persistence of Time' are not only puzzling but open to interpretation.Contrary to Van Gogh, Dali was also a philosopher, besides an artist as mostly known. While VanGogh's was expressionist, Dali was initially a surrealist and later on developed interests in psychology and science. ‘Persistence of Time' is no more than a collection of theme that are perception of time, reality, death, birth, and sexual desire. Orange clock placed on the rectangular table-like object is attacked by the ants show the anxiety related with time. This specific psychology as well as understanding of the reality of death could configure the viewer's behavior.Furthermore, Dali uses light in the painting, in contrast to Van Gogh's ‘Starry Night', for communicating themes of this painting. On the b asis of the arguments presented in the paper, it can be concluded that Van Gogh's ‘Starry Night' and Salvador's ‘Persistence of Time' although had some common aspects, themes of both Van Gogh and Salvador differ. While Van Gogh was an expressionist, Dali was initially a surrealist and later on developed interest in psychology and science, both movements influencing their beliefs and formal approaches in distinctive ways. Van GoghSalvador Dali

Tuesday, July 30, 2019

Fast Food Industry in U.S Essay

A variety of different regulations have been set for people that are concerned with tobacco either on a personal level or commercially. Tobacco is associated with damages and thus it has been attacked by medical authorities and social observers. The fast food industry is no exception since it has also contributed to different damages to people’s health. Obesity is just one of the many ailments caused by fast food joints. FDA has made sure that regulations are set and implemented to protect people from damages that tobacco cause. FDA and Tobacco Regulation have some policies that prevent the families from smoking (McGrew, 2008). There is a control act for Tobacco that requires changes to be made to the labeling and advertising of various tobacco products. This act regulates all the advertising to ensure that information passed to people through advertisements is controlled. I think strict regulations should be put in place for the fast food industry. All fast food joints should ensure that their menus have healthier diets. Through advertising, advice can be given to people about their eating so that people can make informed choices on healthy foods. Just like the Tobacco control act, fast foods should post their menus or readable signs of the contents of various foods in terms of how many calories, saturated fat and carbohydrate a diet contain (Tom Paulson, 2008). This menu board can be placed in a readable place inside the restaurant so that when a person makes a choice of food, he or she can be aware of what is being consumed. Tobacco has been subjected to a regulatory control on its production. King James expressed his opinion towards Tobacco production and consumption. He said that tobacco was loathsome to people eyes, it was hateful to people’s nose, it brought harm to the brain and it was a big danger to people’s lung. This statement explains the most specific damages that Tobacco causes to the entire body. The above statement by the King also applies to fast foods. Meat consumption is viewed just as dangerous as Tobacco is to the public health. The people that can be held accountable legally for unhealthy lifestyles are meat producers and the fast food outlets. The fast food industry should be legally accountable for obesity. Living longer does not mean leaving healthier. There has been a great shift between what people eat and where they get their food from. Economic and public health continues to suffer the consequences brought by obesity and a question is raised who can be held accountable. This question is similar to the issue related to illnesses caused by tobacco which is another public health problem. There are different lawsuits brought against fast food industries like McDonald just like tobacco industries was earlier faced by the same disparaging reaction (Michelle M. Mello, 2007). The responsibility of the harm smoking causes was squarely laid on the tobacco industry by the public. These claims were solved by some tight regulations which have ensured the control of tobacco products to date. Fast food offer bad foods but the biggest problem is that a number of people seem not to disregard this fact despite knowing it. The industry tends to do just fine because their unhealthy foods continue to be consumed. For this reason they do not find the need for implementing policies but on the contrary this should be a prime reason as to why they should regulate the industry in a similar way to tobacco industries. My suggestion would be if people must eat these fast foods then they should know the best and the worst so that the role of making the choice can be left on the customer not the vendor. Why fast food industries should have similar policies to tobacco industry is because it has the same damages to the public health. Fast foods have faced claims from different customers in regard to the products produced. Consumption of these products has caused: obesity which has lead to diabetes, heart diseases due to excess fats, high blood pressure, high cholesterol intake and other health effects. The public have claimed that some fast food industries have engaged in advertising that is deceiving, low quality sales and promotions. Fast food has also been accused of producing food that is unreasonably unsafe, and lacking to inform customers on the dangers of these products. There is a rising level of obesity in the world today and the cause is found in the way our food is being grown, processed and packaged (Brownell, 2009). Fast food industry should adapt the marketing and the tactics in lobbying that are used by the tobacco industries. The tobacco industry used legal, political and business strategies tactic due to the concern that the industry had to the public health. Fast foods should employ these same regulations that the tobacco giants employed. The public should be informed about the link that exists between various fast food products and diseases. The doubts that the public has regarding to fast food products should be cleared through intensive marketing especially to the target consumers and in the fast food case it’s the children, adolescents and young adults. Just like tobacco is addictive fast foods can also cause an addiction especially to people who dislike cooking at home or mostly live alone in their homes. The industry should embrace regulations since a great concern has been raised about fast food and how they are advertising their products and selling unhealthy food to school children. Food industry should take up only the good policies that the tobacco industry used and leave the deceptive path. References Brownell, K. (2009, April 8). Food Industry Pursues the strategy of Big Tobacco. anvironment 360 . McGrew, J. L. (2008). History of Tobacco Regulation. Washington D. C. Michelle M. Mello, E. B. (2007). The Fast Food Industry and Legal Accountability. The McLawsuit . Tom Paulson, P. R. (2008, December 31). Fast food chains must post fat, calories. Retrieved March 2012, 2012, from County’s new rules aim at healthier eating: http://www. seattlepi. com/local/article/Fast-food-chains-must-post-fat-calori.

Monday, July 29, 2019

Robots in Manufacturing Assignment Example | Topics and Well Written Essays - 2000 words

Robots in Manufacturing - Assignment Example Without a doubt, these robots have started playing significant roles in different areas but this report discusses the role of robots in manufacturing. It is an admitted fact that organizations those are engaged in manufacturing industries need automated systems to deal with their varying needs. In this scenario, robots are reprogrammable, multifunctional machine intended to move material, tools, parts or particular devices through a variety of engineered motions for performing various tasks. This report has studied the uses of robots in various areas of manufacturing. The use of robots in manufacturing is believed to be very helpful for the reason that manufacturing industries require dealing with complicated machines and working on these machines involves serious risk factors especially related to human health. In this scenario, the use of robots can help manufacturing industries deal with these serious issues as well as save lots of costs associated with manufacturing process. In t his report I have studied various aspects associated with robots with respect to their usage in manufacturing. In this report I have discussed how the use of robots allows manufacturing industries to reduce costs by replacing machines with humans. This report presents interesting facts regarding robots that allow readers to get a detailed insight of robots especially their functionality and advantages in manufacturing. ABSTRACT In the past few years, the use of robots has increased in every area of business organizations. Additionally, many organizations have adopted robots for various purposes such as for packaging, installation, moving materials from one unit to another. This report discusses the use of robots in manufacturing industries. The use of robots in manufacturing industries brings a number of benefits such as reduction in costs and saving from health related issues. The basic purpose of this research is to discuss how robots can be used in manufacturing and what benefits can be achieved by the organizations through the adoption of these robots. This report summarizes the concepts discussed by various authors and analyzes it to present the role of robots in manufacturing. INTRODUCTION AND BACKGROUND The competitive environment for manufacturers today has necessitated it for them to be more productive, efficient and dynamic. Since customers are the ultimate stakeholder, all businesses are moving towards meeting their expectations and fulfilling their satisfaction by adopting automated manufacturing to improve in quality cost and timeliness aspects. Moreover, equipment deployed by business in manufacturing processes and operations need to be efficiently utilized to their maximum capacity to enhance profitability. This has been made possible through usage of robots for handling, running and managing machinery, tools and equipment’s (Mathur et al., 2011, p.77). Hundreds of enterprises have succeeded in their business by switching to automated man ufacturing to avail its benefits and exploit new opportunities and horizons (Papakostas et al.,

Sunday, July 28, 2019

Amazon's Kindle Fire Old and New 4 P's Research Paper

Amazon's Kindle Fire Old and New 4 P's - Research Paper Example With growing urge for portability, it was important that a product that offers the quality of a complete computer in a portable way be introduced and the computer responded to this squarely. Still on the product, the company was tactical to include in its new feature, services that were absent in the ordinary computer or laptop (Institute of Development Studies, 2012). By this, consumers had something new to buy the Kindle Fire to expect. On the factor of placement or place, it would be said that the computer placed itself so strategic by taking total advantage of web 2.0 and new media that it was virtually impossible for any computer and for that matter internet user to be out of place in terms of accessibility to the product. This is because the product was launched directly onto the internet to make online purchases possible. There were therefore no limitations in terms of place or location. The computer also used the power of social media to promote its product as advertisement and publicity of the product was all over the social networks and other digital media (Mangalindan, 2012). This way, users of social media, who are said to be the highest users of the internet, were made to thirst for owning one of the product. Finally, the Kindle Fire came onto the market as the cheapest tablet PC and this was an important competitive advantage as the product was introduced just around the time the world economy was recov ering from global economic shocks and thus consumers preferred value for money in their buying (Ovide, 2012). As the years went by, competition became tougher on the tablet PC market and so it was just right and appropriate that Amazon respond squarely to keep its place on the market for the Kindle Fire. For this reason, a market strategy that was more focused on internal structures and systems rather than external systems was instituted. This internal strategy took its source from

Saturday, July 27, 2019

The level of skills in contributing to the development of Human Dissertation

The level of skills in contributing to the development of Human Resource Management (HRM) practice in public sector in the Kingd - Dissertation Example Saudi Arabia is one of the biggest countries of Middle East earning mainly from the export of petroleum products (Ramady, 2010). Despite being rich in natural resources the country is facing a paradox of high wealth and a human resource base that is challenged in terms of skills. Saudi Arabia is facing significant shortage of skilled, semi-skilled and unskilled labor (Ramady, 2010). Part of the reason is the influence of religious and cultural values resulting in an educational system that focuses less on a structured vocational or professional training who can meet the demands of the thriving economy (Oxford Business Group, 2008). Moreover, female population constitutes a minor portion of the total workforce due to which the country has to rely on the foreign/overseas employees to fill the demand & supply gap of the workforce (Oxford Business Group, 2008). According to a study by Al-Masnad in 1999, about sixty percent of the population of Saudi Arabia is under the age of eighteen. T he youth is living under social stereotypes due to which they refuse to accept technical and manual jobs and prefer working in managerial positions. As a result, the country is depending on expatriates and third country nationals especially in the fields of engineering and information technology. Apart from this, there is a weak connection between the Saudi educational system output and the requirement of the industry. The system of education is inadequate for the training and development of the future employees in technical and managerial skills needed for the development of human resource management. The country is producing more graduates in the fields of religious studies and humanities (Achoui, 2009). According to a report by World Economic Forum in 2007, the major obstacle in the development of human resources in Arab countries is the uneducated local workforce. Human Resource Management (HRM) is an emerging field in Saudi Arabia (Ali, 2008). Therefore, it is important to see that impact of employee skills of the HR practices of public sector so that companies can gain a clear image of the contribution of their employees in the achievement of their organizational goals. Clearly, the level of skills of the Saudi people affect and are affected by the practice of human resource management in the Kingdom. This is because it is apparent that every HRM system must work hand-in-hand with the people in the area within which it is to operate. Thus, the state of the Saudi human resource base will definitely have an effect on the human resource management system. On the other hand, the human resource management system will attempt to modify the human resource base through events like appraisal, promotion and motivation. Thus the push and pull factors shape and define the human resource system of the country. The purpose of this research proposal is to find out the influence of the changes in the level of skills the public sector of Saudi Arabia on the development o f HRM practices and policies. The importance of this research is that it is an unprecedented exercise that seeks to build the foundation for for future research and development of human resource management in Saudi Arabia. LITERATURE REVIEW: Fitzsimons (1999) stated that education and training are fundamental elements of the concept of human capital which determines the economy of a given nation. In terms of

Friday, July 26, 2019

Women Rights Denial by Governments and Individuals Essay

Women Rights Denial by Governments and Individuals - Essay Example he Elimination of All Forms of Discrimination against Women (CEDAW) was adopted by the General Assembly in 1979 by votes of 130 to none, with 10 abstentions At the special ceremony that took place at the Copenhagen Conference on 17 July 1980, 64 States signed the Convention and two States submitted their instruments of ratification. On 3 September 1981, 30 days after the twentieth member- State had ratified it, the Convention entered into force - faster than any previous human rights convention had done - thus bringing to a climax United Nations efforts to codify comprehensively international legal standards for women. [1] Its content is divided into four parts. The first part deals with the concept of human rights. It presents the evolution and expansion of this concept and its philosophical formulations and theoretical reflection on the nature and sources of human rights. International standards in the next two parts are grouped, first, from the point of view of categories of human rights: civil, political, economic, social and cultural, and then in relation to the protection of certain categories of vulnerable persons (women, children, minorities, indigenous people and migrant workers). [2] There has been a growing realization that the definition of "human rights" needs to be revised to fully include "women's rights" in it. The International Women's Conference in Beijing in 1995, was another landmark achievement in this direction. After much dispute and heated debate, the final program of action stated, "While the significance of national and religious particularities in various historical, cultural, and religious systems must be kept in mind, it is the duty of states regardless of their political, economic, and cultural systems to protect and promote all human... This essay describes the feminism and the fight for women's rights as an epic saga that is still happening today. Whatever success has been achieved has been purely by dint of perseverance on part of the feminists. The researcher gives his opinion on the topic and states that it is unfortunate that, at times, governments and individuals fail to acknowledge these rights, even in 21st century. In fact it has been justly argued that resolutions against whaling were passed more quickly and unanimously than resolutions for women’s rights. The researcher mentiones that feminists’ efforts to introduce a homogenous standard may be admirable, but may also be misplaced. It is a matter of debate that rights in one culture may be taken as oppression in another culture today. For example, even wearing a scarf is considered a religious obligation and a feminine trait in Muslim society but is considered persecution in Western society. Similarly wearing a skimpy bikini on the beach may give rise to a furor even in â€Å"conservative† Catholic communities. The invasion of â€Å"multiculturism†, that was described in the essay is also a force to contend with. To conclude, the researcher explores that many countries allow different communities living there to preserve their culture today. In such a situation present homogeneity may itself be an infringement on the cultural freedom of that community. A more pragmatic approach is required today when dealing with issues related to different cultures and religions.

Thursday, July 25, 2019

Sustainability Powerpoint Presentation Essay Example | Topics and Well Written Essays - 500 words

Sustainability Powerpoint Presentation - Essay Example One of the most important factors is that of environmental concern. The company had initially issued policies to handle the environmental aspect but that had suffered from lack of proper implementation owing to the company’s decentralized structure. The second goal has been identified as reinventing and modifying the business models of the company. In order to improvise on the past strategies, the company has decided to set up a market research segment that would make a survey among the customers of HP and yield out aspects which they expect to be present in their products. The company had originally been engaged in many processes which were later figured out to be its drawbacks rather than its advantages. For instance, the company had initially been persistent in selling their products to the consumers which normally prove to be rather expensive for them. In contrast they are attempting to let their products out in lease so that they might extract incomes out of their products while the consumers stay better off as well. In addition, through the process, it can own the product throughout its life which could turn out to be rather profitable. Secondly, in order to move ahead with its plans of high networking, HP must also take care of environmental aspects so that its activities might not bring much impact over the same. In order to make its dream of networking come true, HP is also attempting plans to popularize the concept of electronic media among the poorer sections. In order to win over the confidence of its stakeholders, HP has adopted the strategy of transparency. HP prefers to express its strategies of business model and those adopted to overcome challenges they confront. In addition, they also maintain the expression of their shortcomings such as environmental issues, since such admissions help them in winning over the confidence of their stakeholders (Preston, 2001). One of the

Jitmrpcaliach Essay Example | Topics and Well Written Essays - 1750 words

Jitmrpcaliach - Essay Example The two men recognized the middle role that inventory plays in manufacture. The Toyota manufacture System, as Ohno and Shingo termed the JIT system, also built-in elements of cellular developed and excellence organization (Waters-Fuller, 1995). This research focused on this truth that whilst Ohno and Shingo are accredited with raising the total JIT systems, a figure of their philosophies traces as far rear as the late 18th century. Eli Whitney, better known as the inventor of the cotton gin, developed and perfected the idea of interchangeable parts. Henry Ford afterward streamlined this idea and urbanized a whole manufacturing strategy by means of the meeting line. It was Ford's process, practical to Allied war manufacture in World War II that in the end attracted Japanese manufacturers, particularly Toyota (Sakakibara et al., 1997). Department of Homeland Security defines Radio Frequency Identification Device (RFID) as "wireless systems that allow a machine to read in order contained in a wireless machine or "tag" - from coldness without making a bodily get in touch with or requiring a row of sight between the two. RFID provides a method to broadcast and receive information from one point to one more." RFID is an automatic identification technique relying on storing and distantly retrieving data by means of plans called RFID tags or transponders. Historically, the RFID knowledge was approximately in 1920s; however, the primary known machine was imaginary in 1945 and was supposed to be used as an spying tool; however, this tool was now a listening machine and not an ID tag. The real RFID system was urbanized approximately 1960s. RFID System The RFID System includes the tags, transponders, transceivers and request to retrieved and read information from tags to transponders and request software. Additionally, the person part must be accomplished and taught for the -request. RFID Tags If we analyzed then we come to know that the RFID ticket is a small thing that can be attached to or included into a creation, animal, or being. There are three types of tags: inert, semi-passive and lively. The inert tag uses no interior power. This tag is motorized when radio frequency sign sends the electrical present to the interior circuit of the tag to broadcast a response and holds an identification figure only. Due to the be short of of onboard authority, the passive tag can be fairly small. The dimension can be as skinny as a paper and little as the tip of a person finger. RFID Tag Reader This research focused on this truth that in arrange for the RFID system to purpose, it needs a booklover or a scanner machine that is competent of reading the tags and converse the results to folder device. Each reader uses an aerial to broadcast radio influence to all tags chosen to respond to frequency inside that variety. A reader has a ability to communicate by means of the tags without a straight line of view, dependant on radio frequency and kind of tag used. The tag readers are able to take delivery of from manifold tags at once allowing for greater than before dispensation times. The readers variety in a variety of shapes, sizes, moveable and

Wednesday, July 24, 2019

Argument for Lowering The Drinking Age to 18 Essay

Argument for Lowering The Drinking Age to 18 - Essay Example Banning drinking age at 18 will not stop teenagers from drinking. Some adults may have the impression that since it is made illegal to drink at age 18, then it would stop teenagers from drinking. On the contrary, the prohibition will not stop teenagers from drinking and that will even add to the thrill of drinking alcohol. Instead of stopping it, the prohibition will even have the effect of encouraging teenagers to drink. Banning alcohol at age 18 will just make teenagers hide when they are drinking and it is more dangerous. Adults or supervising authority may have the impression that they have stopped drinking but in fact, the drinking just went underground. This time, teenagers drink without the presence of adult supervision and this an unsafe environment for kids to drink. It is in this environment that excesses happen that often leads to the fatal outcome that some college presidents have aired their concern that drinking underground contributes to alcohol excesses among teenagers (Wechsler, 2010 pg. 987). Also, it is in this environment that beer binges and fighting occurs because teenagers tend to seize the moment and drink a lot until they could no longer control themselves. Also, 18 years old does not differ from age 21 in terms of the judgment. People may argue that older is better but being 21 does not make one wiser in terms of alcohol drinking. Delaying drinking age to 21 years old does not make one a more responsible drinker. In fact, delaying it promotes an irresponsible drinking behavior because teenagers will have to hide drinking first before they can drink in the open at age 21. So by the time they are already legal to drink to age 21, they have already developed the habit of drinking excessively because they were used to drink in an unsafe environment.

Tuesday, July 23, 2019

MANAGING A DIVERSE WORKFORCE Essay Example | Topics and Well Written Essays - 250 words

MANAGING A DIVERSE WORKFORCE - Essay Example In the case of Jessica, this is one area that she has not properly understood leading to her lack of unfair treatment of the internal customers (TrevinÃŒÆ'o, Linda K, and Katherine A. Nelson, 293-296). Organizations need to develop a two-way communication approach that ensures that all the ethical issues are well addressed as they emerge. Another principle is based on the sharing of ideas as well as information. The challenges that the organization is facing due to the conduct of Jessica does not just affect her department but the entire organization. Lack of separation of social life with formal office relations may hinder the flow of information within the organization. The fact that Bruce and Jessica are in a relationship makes it hard for free flow of information given that Bruce is the boss to whom reports should be made. This case can be handled by reporting the matter to the senior managers above Bruce so that they can talk to both Bruce and Jessica separately and discuss the issues with them based on their need to take their responsibilities in the organization

Monday, July 22, 2019

The Forgotten Group Member Essay Example for Free

The Forgotten Group Member Essay Identify and summarize the stages of group development According to the text, Christine and the group are in the stages of conflict as shown in figure 10.2, Antecedents, Felt conflict, Manifest conflict, Conflict resolution, and Conflict suppression. Professor Thiel assigns each group a task to be evaluated by their peers. Mike seems a little distant at the first meeting and never wanting to join the group. When Mike bumped into them at school having lunch, he would give them a vague look. They never spoke to him or the professor about this situation. Identify Key Problems The primary problem for the group is their class members will be evaluating how they dealt with problem at hand and Mike isn’t making it any better by not cooperating or corresponding with the team. The secondary problem is Christine and the group is trying to deal with Mike without the Professor being involved. Christine and the team should have noticed how distant Mike was during the first meeting. They should have gone to Professor Thiel after he declined and came up with an excuse not to attend any meetings, knowing he would affect their overall grade. Given that there is no â€Å"one perfect solution† for this situation, identify, describe, and defend two possible solutions to the primary problem(s). The class was put into groups to complete a task which will be evaluated. Mike never wanted to participate in the group meetings; he gave Christine notes on their project. Everyone in their group was capable of carrying on without Mike. If they didn’t have his i nput and cooperation they were to discuss the matter with the professor. According to the text, Christine compromised with him, trying to get him to meet with the rest of the group. She done everything she could to empathize with him regarding his girlfriend. Christine and the group should have gone to the professor about their problem first, now, if they were to handle this problem on their own. They should have voted on removing Mike from the team and continue on with their project. This would have been the answer or solution to their task at hand and possibly receives a good grade. Discuss whether Christine was an effective group leader in this case. Why or why not? Christine could have been stricter toward Mike, being this was a class project and he had no regard for the next person. She should have brought this to the Professor’s attention and dismissed him. Christine should have given Mike certain tasks to do and have him to turn them to her or drop it off to one of the other team members, this would show that he was trying and putting out on his share of the work. Having him to complete these tasks possibly would bring him from being so distant from them. These tasks for Mike could work toward her advantage and she wouldn’t be up worrying.

Sunday, July 21, 2019

The Industrial Training Experience Accounting Essay

The Industrial Training Experience Accounting Essay Lawrence Wong Co. was established in 1986 before the Malaysian economic recession in 1987. It has established itself as a recognized Management Consultancy Firm specializing in all kinds of management and consultancy services, including corporate secretarial, administrative, bookkeeping, auditing, taxation, business or financial planning and other management allied services. The company was founded by Mimi Gian Guek Poh and Lawrence Wong Fook Heng, both are Chartered Accountants from Australia. The business started as a sole proprietor on 6th August 1965 as an employment agency and was converted into a private limited company on 16th February 1986. As an associate member of the CPA Australia, the Malaysia Institute of Accountants, and The Institute of Secretaries and Administrators, Mimi Gian, my company supervisor, draws on more than 25 years of audit, management, secretarial, taxation, information system and corporate advisory experience in international and multinational corporations in Australia, Singapore, and Malaysia. Lawrence Wong Cos success today depends heavily on the confidence and trust their clientele have with them and also due to their dedicated workforce who has been continuously contributing their efforts to the overall success of the firms nearly 20 years of services. The company hopes to continue to expand its business by providing quality and reliable services in Malaysia as well as internationally. 1.2 Industrial Training Experience Industrial Training is one of the compulsory subjects in all Faculty of Business and Finance Programmes course structures. It is compulsory for every final year undergraduate to undergo industrial training for the duration of three months before completing their courses. With the combination of knowledge and work experience during the three months training, students are required to produce a written report. The objective of industrial training is to provide an opportunity for students to observe real life practices and develop their understanding of methods and applications of the accounting theoretical and conceptual framework in a real working environment. Additionally, the training program also provides an opportunity for the industry to identify potential employees from the industrial trainees. I joined Lawrence Wong Co on 1st October until 31st December 2012. During these three months of industrial training I was involved in bookkeeping, auditing, taxation and the companys secretarial function. This was a good opportunity for me to learn more about the business . Because of this, I can now apply my accounting knowledge to the real world, such as accounts entry, auditing and so on. At first my company supervisor discussed with our colleagues my tasks , after that only my colleagues assigned tasks to me. My company supervisor only gave me tasks after I had completed the work that was assigned by my colleagues. When I faced some problems that I have never encountered before, I discussed with my company supervisor and colleagues together to solve the problems. Luckily they treated me well and taught me with patience. Therefore, I increased my knowledge of accounting, auditing, and taxation from my company supervisor and colleagues. CHAPTER 2 SCOPE OF TRAINING 2.1 Statutory audit When I arrived on my first day, my first task was to do a statutory audit. Statutory audit is part of an in-house audit. Whilst I was doing this, I needed to get information from the company secretary file, such as annual return, minutes of meeting, and SSM forms. My colleagues told me that use of some of the SSM forms needed recording, such as Form 24, 44, 49, 32A, and so on. If one of these forms are used, the auditor report needs to disclose the information, as well as statutory audit. For example, form 49 which is the form of return for directors, managers and secretaries. If this form is used, it means that the company has appointed a new director or an existing director has resigned or is deceased. Therefore, this kind of information must be included in an audit report and statutory audit. 2.2 Accounting data entry During this internship, I did a lot of accounting data entry, such as receipt and payment entries. In order to have a better understanding of the basis of accounting, my company supervisor assigned me to a lot of the companys account entry, using UBS Accounting System and Microsoft Excel. This was a test for me, whether my double entry transactions were posted correctly. I posted the entries in accordance with bank statements, payment vouchers, cheque books, and receipt books. After I had done, I printed out the general ledger, bank reconciliation statement, income statement, and balance sheet to give to my colleagues and company supervisor to review. 2.3 Bank Reconciliation Bank reconciliation statements are the important documents that need to be prepared every month. Bank reconciliation is the process which prepares a statement accounting for the differences between the cash balances in a companys cash account and the cash balance according to its bank statement (Roshayani Arshad, 2007). During my training period, I prepared this by using UBS Accounting System and Microsoft Excel. Some clients prepared bank reconciliation statements by themselves. Therefore, I needed to check whether the bank reconciliation statements that were prepared by clients were the same as my results. 2.4 Auditing During these three months, I not only did a lot of accounting data entry, I was also involved in auditing work. Firstly, I prepared statutory audits because this was the easier part. Next, I started to do audits working on paper, such as accounting journal entries, income statements, balance sheets, variances, tax computations, and other working papers including information related to assets, liabilities, taxation, revenue, and expenses. In addition, I had learnt how to prepare every detail of the working paper. After that, I prepared an audit report, confirmation letter, letter of representation (which is a summary of all accounts), and an audit memorandum planning. Once I had done this, my colleagues reviewed my work and asked me to amend errors, before it was passed to my company supervisor to review. Lastly, I filled in the Form C R after my company supervisor reviewed and confirmed that all working papers were correct. 2.5 Others tasks My company supervisor had asked me to make some payments, such as telephone bills, water and electricity bills, EPF, SOCSO, clients income tax payments, as well as banking some cheques. Before my company supervisor issued the cheques, I needed to prepare the payment vouchers and attach them with the invoice, delivery order, and other related statements. I also had to call the suppliers to collect the cheques. After the payments were made, I filed all of the documents in the payment voucher file. Other than that, my company supervisor also assigned me to prepare client companys stock list and check list. Stock list is a detailed list of the stocks available of a company while check list is prepared for checking the stocks. In addition, I had filed some documents and letters received from Inland Revenue Borad (IRB) into the clients files. I also sent out documents to clients, such as tax refund from IRB, audit reports and others documents. Furthermore, I had updated the client company tax control list. For this task, I had to record the date received for the Form C R 2012, financial year end, the latest audit report that had already been submitted, and the date of CP 204 to IRB. After I completed this, I prepared a latest list of client company and IRBs schedule of payment code. CHAPTER 3 KNOWLEDGE AND SKILLS APPLIED AND GAINED 3.1 Knowledge and Skills Applied 3.1.1 UBS Accounting System These accounting entries, which are receipt and payment entries, I had been taught during my studies how to complete using the UBS Accounting System. So, I had no problem when I posted these accounting entries into UBS Accounting System because it is same as what I have done before. For example, for the pay for travelling expenses, the entry is debit in travelling expenses and credit in bank or cash account, so this is called a double entry. Before I passed my work to the company supervisor to review, I double checked the entries. 3.1.2 Financial Accounting Financial Accounting Framework I and II are the compulsory subjects for accounting students. These two subjects teach us how to prepare the financial statements such as income statements, balances sheets, cash flow statements, and statements of changes in equity. These subjects were very useful for me to apply to my work. By using the knowledge that I learnt, I had completed my tasks with minor errors. 3.1.3 Taxation Taxation is another important subject for accounting students. I took this subject in Year 2 Trimester 3. During my training, I had to prepare tax computation for companies and individuals. Mostly I prepared tax computation for companies, because when I was doing client companies audit, I needed to prepare it as well. This subject was very useful to me because I could apply the knowledge that I learnt to prepare the tax computation, making it easier for me to complete the tasks. 3.2 Knowledge and Skills Gained 3.2.1 Auditing During my studies I found that auditing was a totally theoretical subject that is different from accounting and taxation subjects because it is not included in any calculation matter. I had the opportunity to complete audits on client companies during the three months of training. I completed many tasks relating to audits, such as audit working papers, statutory audit, audit report, and many more. 3.2.2 Information Technology Lawrence Wong Co. accounting software includes Microsoft Excel and UBS Accounting System. With the UBS Accounting System, I learnt how to key in double entry transactions and look through the financial statements during my study. I also learnt how to prepare the bank reconciliation statements by using this system, and to do year end processing, which is to close the current accounting year and switch to a new accounting year (Sage UBS Range of Software, 1991). Before I performed year end processing, I needed to ensure that all transactions were up to the last period, back up all of the data files, update all stock values, print all reports, and check that there was only one retained earnings account. After I completed this, the system would generate an all balance brought forward account and accumulated profit would be transferred to the retained earnings account. All transactions from period 1 to 12 will be removed. Furthermore, Lawrence Wong Co. used Microsoft Excel to prepare audit works. This was an advantage for me when I was doing the audit working papers as I could key in the amount and generate the formula fast, then the software would automatically calculate the final amount for me. I had also learnt how to adjust the paper margin and make it neat before I printed the working papers. Other than that, I learnt how to use new software, which was the UBS Inventory and Billing System. This system is a real time system that updates the stock immediately after entry. It also performs as an invoicing system whereby you can print out the invoice, credit note, debit note, and many more (Sage UBS Range of Software, 1991). During my training, I had prepared a list of every client companys secretarial and filing fee in Excel form. My colleague taught me how to check the latest invoices inside the UBS Inventory and Billing System. Therefore, I could check the invoices easily and key in the information quickly. CHAPTER 4 WEAKNESSES AND STRENGTHS 4.1 Weaknesses During the three months of industrial training, I faced a lot of problems that I had never encountered before as they were problems that I could not learn from books. This made me feel weak because sometimes I did not know which methods should be applied to solve the problems. At the beginning, I had spent most of time finishing the audit works because what I had learnt in university was theory, but the training was more focused on practical tasks. These tasks were quite different from what I had studied in text books and from lecture notes, so I was a bit confused when I prepared the audit works. I also faced problems when I was doing account entries. Before I started to key in receipts and payments into UBS Accounting System, I spent a lot time trying to understand the companys business transactions and concepts, because different companies may have different versions of these. After I keyed in all the transactions, I printed the general ledger, income statement, and balance sheet to give to my company supervisor to review. Unfortunately, my works were rejected by her because I did not key in the transactions and descriptions properly. Moreover, some of the clients did not provide enough financial information, such as details of income received, so I did not know exactly what those incomes were. In addition, I had difficulty in using my English language because the company mostly has English speaking clients. Sometimes the clients did not understand what I said, so I had to use Chinese language or Malay language to communicate with them. 4.2 Strengths During this internship, I learnt a lot and practiced my knowledge and concepts relating to accounting, auditing, and taxation. I have come across many new things and gained knowledge from my company supervisor and colleagues. I was able to use other languages to communicate with clients, such as Hokkien, Cantonese, and Malay. The reason for this is that some of the clients cannot speak English, they only know to speak their own language. Therefore, I was able to use these languages to communicate or discuss some matters with clients. I felt lucky that my company supervisor gave me the opportunity to practice my knowledge in her company. She always motivated me and taught me many new skills as a trainee, and also helped me to acquire new knowledge. Furthermore, she was also a very patient person. When I did not understand how to do the tasks that she has assigned, she was very patient in explaining to me the steps. Another strength was that my colleagues were willing to help me whenever I encountered problems. CHAPTER 5 CONCLUSION Through this training program, I have gained so much new knowledge and experience , improved my communication and computer skills, as well as learning how to adapt to working life quickly in a new atmosphere. It also prepared me to be more responsible for my actions and tasks in the future working life. Furthermore, I have covered knowledge of auditing, accounting, and taxation during my time spent inside the company. For the auditing part, I learnt how to prepare the audit program, confirmation letter, auditing working papers, and others. I also learnt how to key in the account entries properly by using UBS Accounting System and Microsoft Excel. For the taxation part, I learnt about how to prepare tax computation. All of the learning made me feel interested and challenged although it was stressful at times . I can conclude that the industrial training was well organized. My company supervisor and colleagues were caring and willing to teach me all of the working steps and concepts. With their guidance, I was able to do my tasks properly and apply the accounting knowledge that I had learnt in university into real working life. In conclusion, I have been trained to be prepared in facing the real working environment in the future and gained some ideas about the work flow of a company. I am pleased that I did my industrial training in Lawrence Wong Co. and thank my company supervisor and all colleagues for caring and giving me a chance to learn all of the work involved. I hope I can use my experience and knowledge that I gained further in my education.

Building Management System to Save Energy

Building Management System to Save Energy 1. Introduction of BMS Building Management System (BMS) is to control and monitor building services systems in an efficient way by centralizing the control of individual systems ( 1.1). The systems include HVAC, Fire Services Lift, Escalator, Lighting, Electrical Distribution, Steam Hot Water, and Plumbing Drainage. The main function of BMS is centralized control monitoring and fault management. So it has another name call Central Control and Monitoring System (CCMS). The other functions are enhance interface connectivity between systems, service response to customer, operator control of systems and graphical display to make the control of system more users friendly. Improve energy efficiency and operational efficiency. Allow capacity for future upgrades expansions and automation. And related system Building Automation System (BAS) will be use on BMS. 2. Basic BMS Design 3-Levels BMS Architecture ( 2.1): l Management Level User can configure and monitor plant performance. Anticipate future trends, improve efficiency, and analyze management report. l Automation / Controller Level The location with greatest technical control requirement, and differentiate one from others. Controllers automatically perform their tasks from I/P and to O/P. Controllers can communicate with each other (Peer-to-Peer). Event based operation. The devices can function at the highest efficiency and no repetitive information is transmitted. Controllers only react with the Management Level when plant goes out of limits, and adjustments are made through a user interface. l Field / Floor Level Information is gathered through sensors and other intelligent devices. The information will be sent back to the controllers. Third party equipment is integrated into the Automation and Field levels with control at the Management level. Centralized Architecture: Centrally controlled system ( 2.5) A control system in which transmission is to a central computer and the reliance of all controls on a central computer. Distributed Architecture: Distributed control ( 2.6) A control system in which control computations and intelligence are made at different locations and the result coordinated. System Architecture: The constraints of BMS are network expansion, the limited variety of topologies and transmission media. The solutions are mixing of communication media (twisted pair, power line, radio, infra-red, fibre optics, coaxial). Complete implementation of OSI model. Using free topology, user-friendly software and development cost. System Topology Topology affects system redundancy, communication protocol and system response time. The common system topologies such as: Bus, Star, Tree, Ring and Mesh. Bus Topology ( 2.7) All devices are connected to a central cable, call the bus or backbone. The advantage is much less cabling requirements. The brands using include Ethernet, Profitbus, ControlNet, LonWorks. Star Topology ( 2.8) All devices are conned to a central hub. Star networks are relatively easy to install and manage, but bottlenecks can occur because all data must pass through the hub. Cable fault affects one device only. But communication hub fault affects all devices. The brands using include Ethernet, Profitbus, ControlNet, LonWorks. Tree Topology ( 2.9) The topology combines characteristics of linear bus and star topologies. It consists of groups of star-configured workstations connected to a linear bus backbone cable. Tree topologies allow for the expansion of an existing network, and enable schools to configure a network to meet their needs. Device at the highest point in the hierarchy controls the network. The brands using include Ethernet, Profitbus, ControlNet, LonWorks. Ring Topology ( 2.10) All devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it. Same as bus network with both edges connect. The brands using include Token Ring, FDDI, Profitbus. Mesh Topology (Fig 2.11) Network topology which combines more than one basic topology such as bus, ring, or star. Good for redundancy. It will use lots of cable to connect every device with every device. Considerations in Topology Layout for automating building with vast amount of points require well-designed network segmentation, in order to achieve a good performance infrastructure. Well designed structured network by using repeaters, bridges or even better using routers to improve network reliability and simplify network troubleshooting. Some reasons why segmenting a network is important: Isolation of individual network segments in order to limit the propagation of a single fault to one segment and prevent this single fault from spreading out over the entire network. Different nodes demand different communication media and different network speeds but they all need to communicate with each other, which requires and interconnection between the different networking media. Increase the number of possible nodes in a single network and increase the number of possible nodes in a single network. Keep local traffic within one segment in order to avoid network traffic overload conditions which will make service like HVAC, lighting malfunction. BMS Configurations There are three types configurations using in BMS: 1. Conventional configuration Server workstations daisy chained with DDCs (usually using RS-485). Typical RS-485 Controller Level network ( 2.14) relatively low bandwidth (around 9600 bps). The limited nodes around 100, and the distance is lower than 1200m. Only for data transmission. Controller Level Network 2. Ethernet-Based configuration Use Ethernet as transmission media. Servers, Workstations and DDCs on the same Ethernet platform. Typical Ethernet-Based Network ( 2.15) with high bandwidth (typical 1Gbps backbone). Use IP Technology means open platform for various applications. Virtually no distance limitation. Always use for data, voice video systems. Ethernet-Based Network 3. Hybrid configuration ( 2.16) Non-hierarchy architecture with combination of different independent networks and interfaces. Various network topologies. Hybrid Configuration Networking Protocol Protocol ( 2.17) is a set of rules, which allows computer/controllers/devices to communicate from one to another. Proprietary Protocols developed by systems or computer manufacture to communicate to their OWN hardware and software over a recommended network. Open Protocols opening up protocols means disclosing procedures, structures, and codes and allowing other system developers to write interfaces and share data on their network. Acceptance of an open protocol depends on its quality, features, and services provided. 2.17 Protocol The OSI Seven Layer Model ( 2.18) Each layer has a defined set of functions. The model provides a useful common reference to communicate protocol. Most communication protocols including those used in our field today use either all or some of the seven layers of the OSI model. 1. Network-capable Applications produce DATA. 2. Each protocol layer adds a header to the data it receives from the layer above it. This is called encapsulation. Encapsulated data is transmitted in Protocol Data Units (PDUs). There are Presentation PDUs, Session PDUs, Transport PDUs etc. 3. PDUs are passed down through the stack of layers (called the stack for short) until they can be transmitted over the Physical layer. 4. Any layer on one machine speaks the same language as the same layer on any other machine, and therefore can communicate via the Physical layer. 5. Data passed upwards is unencapsulated before being passed farther up. 6. All information is passed down through all layers until it reaches the Physical layer. 7. The Physical layer chops up the PDUs and transmits the PDUs over the wire. The Physical layer provides the real physical connectivity between machines over which all communication occurs. 2.18 OSI Seven Layer Model The Physical layer provides for physical connectivity between networked devices. Transmission and receipt of data from the physical medium is managed at this layer. The Physical layer receives data from the Data Link Layer, and transmits it to the wire. The Physical layer controls frequency, amplitude, phase and modulation of the signal used for transmitting data, and performs demodulation and decoding upon receipt. Note that for two devices to communicate, they must be connected to the same type of physical medium (wiring). Ether to Ether, FDDI to FDDI etc. Two end stations using different protocols can only communicate through a multi-protocol bridge or a router. The physical layer is responsible for two jobs: 1. Communication with the Data link layer. 2. Transmission and receipt of data. The Datalink Layer is the second layer of the OSI model. The datalink layer performs various functions depending upon the hardware protocol used, but has four primary functions: 1. COMMUNICATION with the Network layer above. 2. SEGMENTATION of upper layer datagrams (also called packets) into frames in sizes that can be handled by the communications hardware. 3. BIT ORDERING. Organizing the pattern of data bits before transmission (packet formatting) 4. COMMUNICATION with the Physical layer below. This layer provides reliable transit of data across a physical link. The datalink layer is concerned with physical addressing, network topology, physical link management, error notification, ordered delivery of frames, and flow control. Network Layer establishes and terminates connections between the originator and recipient of information over the network. Assign unique addresses to each node on the network. The addresses identify the beginning and end of the data transmission packets. Outbound data is passed down from the Transport layer, is encapsulated in the Network layers protocol and then sent to the Datalink layer for segmentation and transmission. Inbound data is de-fragmented in the correct order, the IP headers are removed and then the assembled datagram is passed to the Transport layer. The Network layer is concerned with the following primary functions: 1. Communication with the Transport layer above. 2. Management of connectivity and routing between hosts or networks. 3. Communication with the Datalink layer below. Transport Layer maintain reliability on the network and enhances data integrity by delivering error-free data in the proper sequence. It may use a variety of techniques such as a Cyclic Redundancy Check, windowing and acknowledgements. If data is lost or damaged it is the Transport layers responsibility to recover from that error. Functions: 1. Communicate with the Session layer above. 2. Detect errors and lost data, retransmit data, reassemble datagrams into datastreams 3. Communicate with the Network layer below. The session layer tracks connections, also called sessions. For example: keep track of multiple file downloads requested by a particular FTP application, or multiple telnet connections from a single terminal client, or web page retrievals from a Web server. In the World of TCP/IP this is handled by application software addressing a connection to a remote machine and using a different local port number for each connection. The session performs the following functions: 1. Communication with the Presentation layer above. 2. Organize and manage one or more connections per application, between hosts. 3. Communication with the Transport layer below. The Presentation layer handles the conversion of data formats so that machines can present data created on other systems. For example: handle the conversion of data in JPG/JPEG format to Sun Raster format so that a Sun machine can display a JPG/JPEG image. The Presentation layer performs the following functions: 1. Communication with the Application layer above. 2. Translation of standard data formats to formats understood by the local machine. 3. Communication with the Session layer below. The application layer is the application in use by the user. For example: a web browser, an FTP, IRC, Telnet client other TCP/IP based application like the network version of Doom, Quake, or Unreal. The Application layer provides the user interface, and is responsible for displaying data and images to the user in a recognizable format. The application layers job is to organize and display data in a human compatible format, and to interface with the Presentation layer. Message Frame Format Fig 2.19 Message Frame Format Master-Slave Protocol (2.20) The control station is called master device. Only master device can control the communication. It may transmit messages without a remote request. No slave device can communicate directly with another slave device. 2.20 Master-Slave Protocol Peer-to-Peer Protocol (2.21) All workstations are loaded with the same peer-to-peer network operating system. Each workstation configured as service requester (client), service provide (server), or even BOTH. 2.21 Peer-to-Peer Protocol Client-Server Protocol (2.22) Client workstation are loaded with specialized client software. Server computers are loaded with specialized server software designed to be compatible with client software. 2.22 Client-Server Protocol The CSMA/CE Protocol is designed to provide fair access to the shared channel so that all stations get a chance to use the network. After every packet transmission all stations use the CSMA/CD protocol to determine which station gets to use the Ethernet channel next. CSMA/CD likes a dinner party in a dark room: Everyone around the table must listen for a period of quiet before speaking (Carrier Sense). Once a space occurs everyone has an equal chance to say something (Multiple Access). If two people start talking at the same instant they detect that fact, and quit speaking (Collision Detection). IEEE 802.3 standard covers CSMA/CD. Switched Ethernet nodes are connected to a switch using point-to-point connections, When a frame arrives at the switch, the control logic determines the transmit port. If the transmit port is busy, the received frame is stored in the queue which is a First-in First-out (FIFO) queue. The memory to store pending frames is obtained from a shared memory pool. In case the memory is full, the received frame is dropped. Networking Cables Copper wire pairs are the most basic of the data media. †¢ Two wire untwisted pair The insulated wire conductors run in parallel, often in a moulded, flat cable. Normally used over short distances or at low bit rates, due to problems with crosstalk and spurious noise pickup. Performance in multiple conductor cables is enhanced by dedicating every second cable as a ground (zero volt reference), and by the use of electrically banetworkced signals. 1. A single wire is used for the signal transmission/reception 2. A common reference level/point is existed between the transmitter and receiver 3. It is the simplest connection technique but it is sensitive to noise, interference, loss, and signal reflection 4. It is suitable for short distance and low data rate application (Normally less than 200Kb-meter/s) †¢ Twisted Pair The insulated conductors are twisted together, leading to better electrical performance and significantly higher bit rates than untwisted pairs. UTP is unshielded, like telephone cable, whilst STP is shielded and capable of higher bit rates. Systems using banetworkced signals obtain the highest bit rates. 1. Twisting or wrapping the two wires around each other reduces induction of outside interference 2. 1 to 5 twists per inch is quite typical †¢ Cheap and moderate bit rate applications 3. For a few km distance the bit rate can be up to 10Mb/s, and 100Mb/s can be achievable for short distance applications like 100m 2.23 Two wire untwisted pair and Twisted Pair Unshielded Twisted Pair (UTP): †¢Composed of two of more pairs of wires twisted together †¢Not shielded †¢Signal protected by twisting of wires †¢Impedance of 100W †¢Recommended conductor size of 24 AWG 2.24 Unshielded Twisted Pair Cat5e: 100MHz ANSI/TIA/EIA-568-B.1 Cat6: 250MHz Cat7: 600MHz Undercarpet: †¢Susceptibility to damage †¢Limited flexibility for MACs (move, add and change) †¢Distance limit of 10m †¢Avoid in high traffic areas, heavy furniture locations, cross undercarpet power on top at 90 degrees 2.25 Cat3, Cat5e and Cat6 Cable Screened Twisted-Pair (ScTP): †¢Characteristic impedance of 100 W †¢Four pair 22-24 AWG solid conductors †¢Mylar/aluminum sheath around all conductors †¢Drain wire that must be grounded 2.26 Screened Twisted-Pair Shielded Twisted Pair (STP): †¢Composed of two pairs of wires †¢Metal braid or sheathing that reduce electromagnetic interference (EMI) †¢Must be grounded †¢Characteristic impedance of 150 W †¢Conductor size is 22 AWG †¢Electrical performance is better than UTP (300MHz bandwidth) †¢More expensive †¢Harder to handle thick and heavy 2.27 Shielded Twisted Pair Coaxial Cable (Coax): Composed of insulated center conductor with braided shied. It provides high degree of protection against EMI. †¢Because the electrical field associated with conduction is entirely carried inside the cable; problems with signal radiation are minimized very little energy escapes, even at high frequency. †¢There is little noise pick up from external sources. Thus, higher bit rates can be used over longer distances than with twisted pairs 2.28 Coaxial Cable Series 6 (Video): †¢Characteristic impedance of 75 ohms †¢Mylar/aluminum sheath over the dielectric †¢Braided shield over the mylar †¢18 AGW solid-center conductor 2.29 Series 6 Series 11U (Video): †¢Characteristic impedance of 75ohms †¢Mylar/aluminum sheath over the dielectric †¢Braided shield over the mylar †¢14 AWG solid-center conductor or 18 AWG stranded-center conductor 2.30 Series 11U Series 8: †¢50 ohms characteristic impedance †¢Multiple mylar/aluminum sheath over the dielectric †¢Multiple braided shield over the mylar †¢11 AWG solid-center conductor 2.31 Series 8 Series 58 A/U: †¢50 ohms characteristic impedance †¢Mylar/aluminum sheath over the dielectric †¢Braided shield over the mylar †¢20 AWG solid-center conductor 2.32 Series 58 A/U Fibre Optics: Higher bandwidth and much lower signal loss than copper conductors. It used in the backbone or in horizontal runs of huge control network. †¢The data is carried as pulses of light from a laser or high-power LED. †¢Optical fibre is non-electrical, hence is completely immune from electrical radiation and interference problems. It has the highest bit rate of all media. †¢The fibre consists of an inner glass filament, contained inside a glass cladding of lower refractive index, with an outer protective coating. In a step index fibre, there is a sudden transition in refractive index. A graded index fibre has a gradual transition from high to low index, and much higher performance. †¢Most common fibres are multimode, where the inner fibre is larger than the wavelength of the light signal, allowing multiple paths to exist, and some dispersion to limit the obtainable bit rate. In single mode fibres, the inner fibre is very thin, and extremely high bit rates (several Gbps) can be achieved over long distances. 2.33 Fibre Optics Multimode Fibre: Composed of a 50 or 62.5 micron core and 125 micron cladding. It commonly used in horizontal and intrabuilding backbones. It has distance limitation of 2000m. Often uses a light-emitting diode (LED) light source. †¢The center core is much larger and allows more light to enter the fiber †¢Since there are many paths that a light ray may follow as it propagates down the fiber, large time dispersion may occur which results in short distance applications or bandwidth reduction †¢Because of the large central core, it is easy to couple light into and out of the this type of fiber †¢It is inexpensive and simple to manufacture †¢Typical value: 62.5/125 Multi-Mode Graded Index †¢It is characterized by a center core that has non-uniform refractive index †¢The refractive index is maximum at the center and decreases gradually towards the outer edge †¢The performance is a compromise between single-mode step index fiber and multi-mode step index fiber 2.34 Multi-Mode Fibre Singlemode Fibre: It composed of a 6 or 9 micron core and 125 micron cladding (say8/125 or 9/125). It used for distances up to 3000m. It uses a laser light source. †¢Small core diameter so that there is essentially only one path that light may Take care,as it propagates down the fiber †¢ There is minimum time dispersion because all rays propagating down the fiber with the same delay time and results in wider bandwidth (i.e. high bit rate) †¢ Because of the small central core, it is difficult to couple light into and out of the this type of fiber †¢ It is expensive and difficult to manufacture †¢ Typical value: 9/125 2.35 Singlemode Fibre 2.36 LAN Media Technology Analysis Open System The definition of open system is that system implements sufficient open standards for interfaces and services. It is supporting formats to enable properly engineered components to be utilized across a wide range of systems and to interoperate with other components. And that system in which products and services can be mixed and matched from set of suppliers; and supports free exchange of information/data between different systems without inserting gateways or proprietary tools. Some benefits from Interoperability: †¢Devices can be shared among different subsystems. †¢Reduce cost, shorten installation time, and reduce complexity as parts are being reduced. †¢Devices in different subsystems can interact with each other; therefore, new breed of applications can be created easily. †¢Owners can choose the best-of-breed products from different manufacture. †¢Elimination of gateway dependency, especially during system upgrade. †¢Allow move-add-change relatively easy, hence lower life-cycle costs. The characteristics of open system are well defined, widely used, preferably nonproprietary interfaces/protocols; Use of standards which are developed/adopted by recognized standards bodies or the commercial market place; and definition of all aspects of system interfaces to facilitate new or additional systems capabilities for a wide range of applications. The different between proprietary protocols and open protocols; For Proprietary protocols, most manufactures have their own proprietary protocols within their systems, so no communication between Systems unless a gateway is deployed. For open protocols, it allows systems of different manufacturers to communicate. Systems communicate with each other. 2.1 BMS Open System Modbus: A high-level protocol for industrial networks developed in 1979 by Modicon (now Schneider Automation Inc.) for use with its PLCs. It is providing services at layer 7 of the OSI model. Modbus defines a request/response message structure for a client/server environment. It is the most commonly available means of connecting industrial electronic devices. Several common types of Modbus: l Modbus RTU n A compact, binary representation of the data. l Modbus ASSII n Human readable more verbose. l Modbus/TCP n Very similar to Modbus RTU but is transmitted within TCP/IP data packets. 2.37 Modbus 2.2 BMS Open System ARCent: Attached Resource Computer NETwork (ARCnet) was founded by the Data point Corporation in late 1970s. ARCnet was one of the topologies used early on networking and is rarely used as the topology of choice in current LAN environments. ARCnet, however, still is a solid, functional and cost effective means of networking. Each device on an ARCnet network is assigned a node number. This number must be unique on each network and in the range of 1 to 255. ARCnet manages network access with a token passing bus mechanism. The token (permission to speak on the network) is passed from the lowest number node to higher number nodes in ascending order. Lower numbered addresses get the token before the higher numbered addresses. Network traffic is made more efficient by assigning sequential numbers to nodes using the same order in which they are cabled. Choosing random numbers can create a situation in which a node numbered 23 can be a whole building away from the next number, 46, but in the same ro om as numbers 112 and 142. The token has to travel in a haphazard manner that is less effective than if you numbered the three workstations in the same office sequentially, 46, 47, and 48, and the workstation in the other building 112. With this configuration, the packet stays within the office before venturing on to other stations. A maximum time limit of 31 microseconds is allotted for an ARCnet signal. This is also called a time-out setting. Signals on an ARCnet can travel up to 20,000 feet during the 31-microsecond default time-out period. You can sometimes extend the range of an ARCnet by increasing the time out value. However, 20,000 feet is the distance at which ARCnet signals begin to seriously degrade. Extending the network beyond that distance can result in unreliable or failed communication. Therefore, the time-out parameter and cabling distance recommendations should be increased only with great caution. An ARCnet network is used primarily with either coax or twisted pair cable. Most older ARCnet installations are coax and use RG-62 A/U type cable terminated with 93 Ohm terminators. Twisted pair (UTP) installations are newer and use stranded 24 or 26 gauge wire, or solid core 22, 24, or 26 gauge type cable terminated with 100-Ohm terminators. Many ARCnet networks use a mix of both coax and UTP cabling. UTP cable is simple to install and provides a reliable connection to the devices, whereas coax provides a means to span longer distances. Typical ARCnet installations are wired as a star. ARCnet can run off a linear bus topology using coax or twisted pair as long as the cards specifically support BUS. The most popular star-wired installations of ARCnet run off two types of hubs: 1. Passive hubs cannot amplify signals. Each hub has four connectors. Because of the characteristics of passive hubs, unused ports must be equipped with a terminator, a connector containing a resistor that matches the ARCnet cabling characteristics. A port on a passive hub can only connect to an active device (an active hub or an ARCnet device). Passive hubs can never be connecte

Saturday, July 20, 2019

frogs :: essays research papers

Frogs are usually small animals that have smooth, moist skin, bulging eyes, and external eardrums behind the eyes; the adults lack a tail. Frogs have long hind legs, and most species can take long leaps. Many species also have webbed feet, making them excellent swimmers. Most frogs, especially males, are quite vocal. As the frog forces air through the voice box, or larynx, the vocal cords vibrate to make calls distinctive of its species. A much louder sound is produced by the males of species that possess vocal sacs, which swell enormously when the frog calls to attract a mate. The frog's tongue is attached at the front of the mouth instead of at the rear, and it is covered with a sticky substance, making it an efficient trap. Like most amphibians, most frogs pass through a free-living fishlike larval stage before undergoing true metamorphosis into adult frogs. Many of these frogs lay their eggs in water, although some lay their eggs on vegetation above the water, in wet places on land, or even on the back of one of the parents. The breeding season varies according to species and geographic region but often coincides with heavy spring or summer rains. Tadpoles have gills and a tail, and most feed on algae and other vegetation, although a few are carnivorous and may even feed on their siblings. As tadpoles mature, the tail is absorbed, lungs develop, the gills disappear, legs appear, and the adult frog form is established. Some frogs, especially in the tropics, do not go through a larval phase; these frogs lay eggs, usually in damp places out of water, that hatch directly into froglets. Behavior Frogs live in a variety of habitats, but most prefer moist regions. Although they are air breathers, frogs can stay underwater for long periods, and they can breathe through the skin. Tree frogs are adapted for tree living; other frogs are permanently aquatic; still others spend most of their lives in underground burrows, coming up only to feed or breed.

Friday, July 19, 2019

Bradbury :: Biography Biographies

Bradbury A common theme in science fiction is outer space. Many of Bradbury's stories take place there. As critic Wayne L. Johnson observes, "For Bradbury, space is not merely a stage upon which stories of the future are played, it is what the Great Plains were to the pioneers, not just a frontier but a symbol of the future for the human race" (49). If space serves as a symbol of the future for the human race, the story "Kaleidoscope" has a large amount of symbolism. In this story, the crew of a spaceship is shot into space. "The first concussion cut the rocket up the side with a giant can opener. The men were thrown into space like a dozen wriggling silverfish. They were scattered into a dark sea; and the ship, in a million pieces, went on, a meteor swarm seeking a lost sun" (Bradbury The Stories of Ray Bradbury 143). The view expressed in "Kaleidoscope" is that although people come from one original being, they grow apart all the time. This divergent evolution is clearly expressed as each member of the crew, although separated for a short time, changes their view on the situation. The crewmen being hurled at the sun has a happy attitude, while the ones being hurled into darkness are engulfed in it. Bradbury might have not intended the reader to find this theme in the story, but it shows how creatures adapt to their environment. Another element of Bradbury's writing is robots. Wayne L. Johnson explains that "the robot represents the ultimate heart of the scientific conceit, wherein men's knowledge of the universe becomes so great that he is able to play God and create other men" (73). Robots represent the degrading value of life present in society. All of Bradbury's robot stories found in The Stories of Ray Bradbury come to unhappy endings. They are "horror stories as well as light-hearted warnings against taking robots for granted" (74). Many stories with robots are considered science fiction because robots are considered to be futuristic things. Bradbury uses robots to show the value people place on science over human beings. In "Marionettes, Inc.", two men are unhappy with their wives. One man, Braling tells the other man, Smith, that he has purchased a robot to take his place as a husband.

Thursday, July 18, 2019

Iliad :: Literary Analysis, Homer

The Iliad Comparison and Contrast of Achilles and Hector When audiences read Homer’s Iliad, we find that this epic tale is centered around the Greek and the Trojan War. We notice in this tale, that Achilles of the Greeks and Hector of the Trojans carry the title of greatest warrior for their perspective armies, both men are an inspiration for their countrymen in this battle. Each man shows us their strengths and weaknesses, which we will use as points of comparison and contrast between the two heroic men. When reviewing the two men, we find that there are actually very few comparison points. However the common points we do find are critical in describing the characters of both men. One major comparison is that both men are warriors and known as fierce fighters. Agamemnon describes Achilles as â€Å"the most violent man alive (pg. 123).† Achilles himself describes Hector as â€Å"man-killing Hector (pg. 126)†. Another key similarity is that for both men, their fates are influenced by the Gods. Achilles was very angry with Agamemnon because of the situation with the priest’s daughter. Achilles vowed to Agamemnon that he would no longer follow him in battle, bringing home a pittance of the spoils while Agamemnon always brought home the lions share. Agamemnon answered back that he would give back the priests daughter but in return for his loss, he would take Achilles spoil, Briseis. Achilles is gripped with rage and strongly considers killing Agamemnon on the spot, â€Å"should he draw the long sharp sword slung at his hip, thrust through the ranks and kill Agamemnon now? – or check his rage and beat his fury down (pg. 124 – 125)?† Although still extremely angry, Achilles listens to the voice of Athena and pulls back his fury, â€Å"†¦a man submits though his heart breaks with fury. Better for him by far. If a man obeys the gods they’re quick to hea r his prayers (pg. 125).† For Hector, his godly influence is Zeus. He is even described as â€Å"dear to Zeus (pg. 141).† He constantly prays to Zeus and seeks his guidance. He curses his brother Paris to Zeus because he blames Paris for causing the war between Troy and the Achaeans, â€Å"let the earth gape and swallow him on the spot! A great curse Olympian Zeus let live and grow†¦that man – if I could see him bound for the House of Death, I could say my heart had forgot its wrenching grief (pg.

Effect of racism from a functionalist’s point of view Essay

One of the most identifiable effects of racial discrimination in education and training is the negative impact it has on the performance of children at school. The failure to address the needs of minority children and those of migrant workers through, for example, combating racial stereotyping or through formulating school curricula that include modules on minority languages and cultures, can lead to school curricula which lack relevance for those children. As a result, children may lose interest and become bored at school which in turn increases the risk that children will drop out early or even fail to attend school at all. The failure to provide curricula adapted to the specific needs of the children of minorities and migrant workers can also lead to low literacy rates amongst these groups. Similarly, where a child does not have an adequate grasp of the official language, the failure to provide additional language classes in the official language and to provide classes in minority or migrant languages could have the effect of retarding the progress of those children through school. Another long-term effect of racial discrimination is that children learn to accept acts of racial discrimination as the norm. Such learnt behaviour can lead to the consolidation of racial discrimination within society as the norm, with children of minorities or migrants growing up and discriminating against the newest influx of migrants. Thus, a vicious cycle of discriminatory behaviour is produced which reinforces racially discriminatory behaviour. The forced segregation of children of minorities and migrant workers from other children can have serious negative effects on the capacity of these children to integrate with other children and into the society in general. In particular, segregation of children into schools for mentally handicapped children can severely retard the child’s progress through school and can affect his or her self-image. Education is arguably the basis of a functionalist’s beliefs, where children learn social skills and behaviours, these skills help build towards unity in society. Therefore racism is abhored in their beliefs.

Wednesday, July 17, 2019

Nursing Board Examinations Scam: Impact to Practice

The the several(prenominal)izesn Dream is in the hands of all nurses rough the humankind as the U.S. is now facing a chronic treat deficit with a projected RN dearth of to a greater extent or less 800,000 in class 2020 (Buerhaus et al., 2000). The famine of nurses that the U.S. healthc atomic number 18 private road ask to fill up collisions hundreds of railway yards as the paucity continues despite rising wages of nurses.The health c ar industry has bemoaned the c atomic number 18 for shortage for much than a decade, and that more(prenominal) than go protrude be needed for additional patients as the Baby Boom generation ages. The U.S. office of Labor Statistics projected in 2005 that more than 3.1 million registered nurse jobs would be getable by 2014, which would add an additional 700,000 unsanded jobs for nurses (Moore, 2007).The United States has ramped up its importation of abroad-trained nurses generally sourced from Africa (mainly Nigeria and South A frica), India, Canada and the Filipinos (Vujicic, 2004). U.S. hospitals and health c atomic number 18 agencies pullulate on the Filipinos because the outlandish is a former the Statesn colony with school curriculum ground on the Ameri arse educational activity organization, classes are taught in English and nurses earn a four-year bachelors degree, almosttimes more than what American nurses obtain.Thus, the discipline curve for Filipino-trained nurses in the United States is borderline (Jenkins, 2003). The Filipino nurses thrash moral philosophy is the primal reason why they comprise 83 percent of foreign nurses in America and are the most preferred by hospitals, doctors clinics and care homes accord to U.S. field Council of State control panels of breast feeding (NCSBN) (Bondoc, 2007). The Filipino Nurses Association of America (PNAA) reported that in that location are well-nigh 90,000 Filipino nurses in the United States. all(prenominal) year 12,000 to 14,000 Fil ipino nurses migrate to the U.S. (OPS, 2007).Nurses licensing interrogatoryinations is offered afield to bring more foreign-born nurses to the U.S. and jock alleviate the acute care for shortage that is crippling American health care. more or less of the foreigners taking the mandatory U.S. licensing care for test came from the Filipinos, India, Canada, Nigeria, Korea, United Kingdom and Commonwealth of States (formerly USSR) according to National Council of State panels of care for. Of those, more than fractional were from the Philippines, which educate thousand more nurses than what the democracy needs (Friess, 2002).The U.S. is a net importer of medical runination and breast feeding artals from the Philippines. The stretch out on the June 2006 care for shape up testing leak in the Philippines has snowballed, settling on a question to Filipino nurses credibility and ability in the provision of health care and precaution to American Community, not and to mo uld nurse shortage crisis in America.This newsprint discusses the important bulge out of irregularities in breast feeding get on exams. After introducing the heydayic, a preaching on the essence of care for ethical motive is do. The next section briefly presents the novel Philippine nurse Board exam to the U.S. breast feeding make out, followed by a faultfinding analysis on this screw. The summary, conclusions and recommendations are presented in the last section.In Respect to the Nursing InsigniaThe treat insignia, although it disappears, the meaning still embarks the truthful identity of the nurse in the breast feeding practice as a health care provider with sympathize with post possess noesis symbolizes by the care for cap, the crowning glory of intelligence and the same is a picture perfect of pureness and cleanliness living with ethics and morale which are molded inside the nurse school.Although the vocation of breast feeding is as ancient as medicine, a nd may encounter the greatest veracious to the Cup of Hygieia as its symbol, most of the nurse tradition use a lamp or candle, which is not wholly in repositing of Florence Nightingale, alone which represents the light of fellowship, the central symbol of quality health care.The take aim of knowledge of nursing graduates is measured by nursing lineup examsa licensure examination to eligibly practice the nursing concern. The exam regulates the legal nursing practice as a traffic by assessing the basic nursing level competency which considers the objectives of the nursing curriculum, the broad areas of nursing and new(prenominal) related disciplines and competencies.The integrity of foreign licensing systems ultimately affects the health and safety of patients in the United States, a primary consideration of CGFNS in its role in evaluating candidates at a lower place U.S. immigration law (The manila Times, 2007). refer of Philippine Nursing Board test passing waterag e to U.S. Nursing PracticeThe Philippines is the ahead(p) source of nurses to the United States, with several thousand Filipino nurses migrating there each year. However, the U.S. National Council of State Boards of Nursing (NCSBN) and the National Council Licensure interrogative sentence (NCLEX) delayed their approval for the Philippines accreditation as a testing center of the U.S. National equip on Licensure Examination (NCLEX) for nurses.The shelved application is caused by the direct repercussion of the nursing bestride exam leak outrage. It capped 2 hours of grilling earlier on Philippine assurances of exam security and housecleaning by and by fraud marred its own nursing board tests last June 2006 (Bondoc, 2007).The United States committal on Graduates of Foreign Nursing Schools (CGFNS) cause all Filipino nurses with 2006 licenses, who wished to work in the US, to retake the devil sets of tests that investigators said were leaked to several nursing critical reappr aisal centers in Manila, the Philippine capital (Cabreza, 2007). The retake of the tests is to allow nurses who thoroughfareed the leak-tainted 2006 nursing board and are wishing to work in the United States to secure UV Visa-Screen certificates as required by the CGFNS (Rodis, 2007).The Philippines term as one of the worlds top producers of nurses could be threatened as it significantly tainted the credibility of Filipino nurses abroad due to the recent examinations irregularities. The grease allegedly knotty leakage materials of the June 2006 Philippine nursing board examinations of at to the lowest degree 200 questions. Some members of the nursing board were accused of receiving bribes from the owners of nursing review centers in exchange for leaking several(prenominal) test questions ( Asiatic peace-loving Post, 2007).Sometime after the board exam was held, the whistleblowers who centerfield-to-heart the said irregularity wrote to the mainland China in June 2006 to repor t that handwritten copies of two sets of examination were circulated among examinees who took their review at a wearicular review center during the positive examination period (Cabreza, 2007). The initial charges were made by students who said that the president of the Philippine Nurses Association, who apparently is the owner and director of a nursing review center and a nursing school, had given the exam questions to students who had interpreted his coaching classes with the final coaching at SM Cinema in Manila (The Filipino Express Newspaper, 2007).Many of the whistleblowers who exposed chess ask decided to take a new licensure test to engage the stigma of the scandal (Cabreza, 2007). Only 68.96% (9,198) turn over passed the nursing board retake out of 13,338 nurses who voluntarily retook, concluded that the quality of education is becoming a real(a) issue, peculiarly in light of the recent cheating/leak in the said board exams (Philippine day by day Inquirer, 2007 Rodi s, 2007).After the said disclosures were made, officials and industry experts cautioned that the countrys status as one of the top sources in the world for nurses would inevitably be adversely affected (Conde, 2006). In fact, this scandal has already demonstrated far-reaching impact on Filipino nursesaside from some stubborn incidents regarding racial discrimination in primetime American showsindicating that such scandal inevitably mired the entire Philippines.For one, one episode of the hit ABC series Desperate Housewives involved Teri Hatcher insulting the Filipino society when she malignly portrayed that Philippine medical schools are producing substandard, small andworseinept medical practitioners. some other is Jay Lenos similar remark on his late night show The this evening Show. Unfortunately, the above incidents gave rise to some political humors across America.A unfavourable AnalysisThe nursing board exam leak scandal in the Philippines brought legal, good and pol itical issues confronting professional nursing today, including in the U.S., as the Philippines is its prime source of custody to address the ever-escalating shortage of nurses. Better honorarium packagesor simply a wear life for the nurse and her/his familyhave been achieved nonetheless ethical and moral of standards of nurses everywhere.The Philippines has had a keen-sighted history of corruption and low standards of ethics especially in politics and business. The Philippine nursing schools fleece mills and review centers, for years, have been earning significantly, capitalizing on the nursing shorted in the developed world. In a country where cheating with impunity has turn the norm or else than the exception and where remittances from exported skilled professionals literally pass off the economy afloat, the leaks that marred the last nursing board exam and the desperate effort to preserve the examinations credibility in the wake were bound to happen.The issue of the sc andal is the issue of pathetic dreamers who damage the long-untainted credibility of the nursing institutions in the new era in spare for some cheap clams. That there was a leak in the Board of Nursing exams is nothing more than a symptom of the nations deep cancers.However, the response of the academe, the Board of Nursing, the NCLEX, the CGFNS, the hospitals, the physicians and the other professionals abroad could form part of the cure. In fact, indications are that there is a collective effort of many an(prenominal) another(prenominal) canton to do straight off address the issue. For one, the fall of the president and the vice president of the Philippine Nursing Association and the Board of Nursing would properly set the tone for reforms deep big bucks the nursing practice as nearly as in the academe.The report that some prestigious hospitals, clinics and recruitment agencies around the nut would not accept Nursing graduates from 2006 unless go were taken to ensure th at they indeed are worthy of the title of Registered Nurse, and the passage of arms being waged by deans of prestigious nursing schools to stop the Philippines Professional law cathexis from administering the professional oath to successful examinees until the issue is conciliated, all provides some sense of confide that there are still many among who refuse to allow precious nursing institution from prostituting itself.This is not an accident that this resolve has come from those involved in caring for peoples health. It reflects a sentiment now sweep across the country and other pertain countries among health professionals. It has little to do with dollar remittances and the promise of a good life.Hence, this involvement to preserve the integrity and credibility of the nursing board exam is much more than that. It goes beyond making sure that the nurses who aid in the operating room or administer medicines to patients dont end up doing harm, although this is a big part of the issue. The battle is still a part of a bigger struggle to restore decency, integrity, and honor in country long-plagued by political dissymmetry and economic woes.The nursing insignia is being take of its cleanliness and purity of morale and intelligence. The white reproducible is being stained with the filth of deception and devious acts of betrayal to the nursing profession as the profession of cleanliness and purity. The light of knowledge taught by nursing schools has been diminished with phantom and blindness in the search for greener pastures.The real oppression is to the successful examinees who did not cheat, the hardships should not been paved with shame expert because they are being called to participate in something beyond themselves. The only way cheating can be avoided in the future would be if those investigating the leak could pin localise those who benefited from them and have only these persons retake the subjects. Needless to say, the perpetrators esse ntial be punished.It was Gandhi who said that our values become our destiny. What go forth happen to the destiny of those nurses with prejudice values and what go away happen if those nurses will hold the health of the American community? What will be the destiny of the American health care system if the healthcare providers credibility remains a big question?The nursing exam scandal is an opportunity to rediscover and reclaim the values that have been oblige to be denied and even discarded proficient for the sake of surviving. This unfortunate scandal can, however, provoke to be one of the greatest blessings for this nation, because it expertness finally drive home the point that there can be no true progress and success unless they have their hearts in the right place. diagnose it a counterculture of sorts, or simply a natural reaction to anything in excess. barely the fact is that all over the Philippines, doctors, nurses and other health professionals are starting to o bey the call to be more than just healers. There is a growing realization that Filipino nurses must use their professions to care begin a revolution of the heart from the bottom up. It might be the only way to eventually force certain change at the top.Summary, Conclusions & RecommendationsThe American Dream, the air castle of greener pasture in the land of milk and honey, has driven the perpetuators to commit the crime against nursing profession and the morality. The opportunities brought about by nursing shortage and nursing exodus has force the nursing system failures.The quality of nursing education is becoming the real issue as there are 460 nursing schools in the Philippines and 50 of which have already been ordered by the Professional Regulation Commission of the Philippines to be closed down as nothing more than diploma mills (Rodis, 2007). The exam fraud was but a part of the bigger task of nursing.And there is also the issue of measly education. Schools, cashing in on a freshet of enrolments from news of a nurse shortage in America, were churning out around 80,000 graduates per year. But only 32,000 or so are able to pass the board test, and only 2,000 easily get jobs in top hospitals (Bondoc, 2007). The nursing shortage is not the number one problem in America, but if one takes a close look, this may arise to a greater problem of hiring half-baked nurses.The illicit chuck out of exam questions in the Philippines is an indication of deeper problems plaguing the Philippine health care system. Desperate to pass the nursing exam and work abroad, many students easily fall victim to such scams. Diploma mill nursing schools and review centers have exploited this desperation and will do anything to compete for more students and more profits. In the end, the quality of nursing education, profession and the whole health care system suffers.Nurses in the United States involved directly or indirectly in the recruitment of nurses from the Philippines s hould consider only candidates with a minimal two- to three-year work experience and completely intermit from hiring fresh graduates. By doing so, the Filipino nursing community in the United States would overhaul ensure the continued flow of only qualified and well-trained professionals into the American healthcare system.ReferencesAsian Pacific Post. (2007). Filipino Nurses Exam Scandal.Bondoc, J. (2007). NCLEX in Manila Open by Mid-Year. ABS-CBN Interactive.Buerhaus, P.I., Staiger, D.O. & Auerbach, D.I. (2000). Implications of an senescence Registered Nurse Workforce. Journal of the American checkup Association, 283, 29482954.Cabreza, V. (2007). Whistleblowers in 2006 Nursing Test Leak Take New Exams. Philippine Daily Inquirer.Conde, C.H. (2006). Cheating on Exam Taints stand up of Philippine nurses. International Herald Tribune Asia Pacific.Philippine Daily Inquirer. (2007). Results of June 06 Nursing Board recapture Out.Friess, S. (2002). U.S. Looks Abroad for Nurses. U SA Today.Jenkins, C. (2003). Filipino Nurses manufacture a New Life in a New Place. St. Petersburg Times.Moore, J.L. (2007). Nursing payment Rise, Shortage Continues. The Morning News.Office of the embrace Secretary, Philippines. (2007). Declaration of RP as NCLEX Testing commit Hailed as a Triumph for Filipino Nurses.Rodis, R. (2007). The Nursing Scandal. Philippinenews.com.The Filipino Express Newspaper. (2007). judicature Asked Stop Nurses Oath-taking.The Manila Times. (2007). U.S. Nixes VisaScreen Papers for June 06 Nursing Board Passers. Manila The Manila Times.Vujicic , M., Zurn, P., Diallo, K., Adams, O. & and dkl Poz, M.R. (2004). The Role of Wages in the Migration of wellness Care Professionals from Developing Countries. Human Resources for Health, 2, 3.