Thursday, October 31, 2019

Expanding a Multinational Company Research Paper - 1

Expanding a Multinational Company - Research Paper Example The revenue earned by the company in 2012 is $4.2 billion. After doing a market research on different countries the company decided to extend its operations to Singapore. Environmental Analysis An environmental scanning of the new market chosen for expansion of Network Manufacturing Company is being done using PESTEL analysis. PESTEL analysis helps to analyse the macro economic factors which are used in the environmental scanning (Lorat, 2009). Factors Analysis Political The political structure of Singapore is headed by the President at the top, who is the Head of the State. It is followed by the Prime Minister who is the Head of the Government and then the cabinet which consists of the executives who are also controlled by the President. The political structure of the country allows many foreigners to come and reside in Singapore and carry out their businesses without the fear of any political barrier. Thus the company will not face any threat from the political environment of Singa pore. Economic The Gross Domestic Product of the country in 2012 is $239.7 billion. The Gross National Income per capita is 59380 (in Euros) and the present inflation rate is 5.2 per cent (Singapore Economic Development Board, 2012). It is a well developed country and is highly successful for carrying out businesses. The country has an open business environment and is free from corruption. Therefore, the chosen company does not possess any threat from the economic scenario of the country and can carry out its business in the new market chosen freely and successfully. Social Singapore is a place of various cultures. The country possesses a strong social responsibility and allows different foreigners from all parts of the world with diversified cultures. The country is also known as a nation of many languages as the residents here speak in different languages. Thus the social environment of the country allows many outsiders to reside in the country and continue their business operatio ns. The chosen company is free from the barriers related to the social and cultural dimensions of the country. Technological The country is full of new technologies and allows many foreign investors as well as many foreign companies to continue their operations in the country under the controlled administration of the government. Environmental The environmental factors of the country support foreign investors as well as foreign businesses to start and continue their operations in the country. The country possesses a code of ethics for the businesses running there. It includes transparency; coordination among the managers, the directors and the investors and professionalism in the business. A business following these ethics will have no environmental barrier from this country. Legal The regulatory business of the country helps to encourage the businesses that are operating there. The regulatory framework of the country favours the businesses running there. The investments that are ma de by the foreign investors are supported by the law of Singapore. Entry strategy and Ownership Structure A company expanding into a new market involves a lot of risks. The company may possess several threats from the new market. Thus it is always beneficial for the company if it goes into a joint venture with an existing company in Singapore. It will reduce the

Tuesday, October 29, 2019

Opinion on Diop Essay Example | Topics and Well Written Essays - 250 words

Opinion on Diop - Essay Example He was obsessed by the same self serving misinformation held by racist white scholars implying that Africans had no significant civilization and strongly opposed their notion. He argued that the civilization was started by the Egyptians who were black and not by foreigners who trekked into Egypt as suggested by the white scholars. He proposed that Africans could not be categorized into one group that existed in the south of the Sahara. This was in opposition to the claim by white scholars that the inhabitants of Egypt in North Africa were white. He argued that rather, Africans had a wide variation in skin color, hair type and facial shape just as happens among other human races. I believe Diop was as racist as the white scholars. His perception was that the scholars conveniently selected white pharaohs and ignored the original black ones to show Egypt as a white civilization. Diop did researches determined to prove that ancient Egyptians bore similar physical traits as present day black Africans. He went further to claim that, linguistically, ancient Egyptian was related to his contemporary Wolof language of West Africa. In conclusion, I believe most of Diop’s efforts and work were aimed at wrestling civilization claims from the Western world. He was filled with an inferiority complex and tried to overcome it by attempting to link his Wolof ethnicity with the Egyptians. I also believe that is the reason he insisted on placing the human civilization credit upon the Egyptians, whom he claimed to be black.

Sunday, October 27, 2019

Improving WPA and WPA2

Improving WPA and WPA2 Introduction: WPA is an acronym for â€Å"Wi-Fi Protected Access†. It was designed and developed by Wi-Fi alliance as a reponse to the weaknesses and vulnerabilities in the previous wireless security protocol i.e. WEP (Wired Equivalent Privacy). It is a certification program developed by WiFi alliance to indicate compliance with the previous security protocol and secure wireless networks. WPA2: WPA2 is vulnerable to insider attack(If attacker is in the network or somehow gets into the network) under certain conditions. Following are the attacks on WPA/WPA2: PSK (Pre-Shared Key) vulnerability. PSK cracking tool, Eavesdropping. (Attack on PSK Authentication) PEAP mis-configuring Vulnerability. (Attack on Authetication Server) TKIP Vulnerability. (Attack on Encryption) Encyption in WPA2: There are two types of keys used in WPA2 for encryption: Pairwise key(PTK): It is used to protect unicast data frames. Group key (GTK): It is used to protect group addressed data frames like Broadcast APR data request frames. It is used as an encryption key in Access Point(AP) while as a decryption key in Client. Analysis and Improvement of 802.11i (WPA2): The security requirement for WLAN(Wireless Local Area network) industry are data confidentiality. Intergrit, mutual authentication and availability. Primary recommendations: CCMP should be used for data confidentiality. Mutual Authentication must be implemented for security concerns. Addresses DoS(Denial of Service ) in MAC (Medium Access Control)layer. Wireless Threats: Passive Eavesdropping/ Traffic Analysis: An attacker can easilty sniff and store all the traffic in the WLAN. Message Injection / Active Eavesdropping: An attacker is capable of inserting a message into the wireless network with the help of NIC cards(Network Interface cards). Attacker can generate any choosen packet, modify contents of the packet and completely control the transmission of the packet. Message Deletion and Interception: It is done by interfering with the packet reception processon the receivers antenna. eg. Causing CRC errors so that the receiver drops the packet. Message interception means that an adversary is able to control a connection completely i.e an attacker can capture a packet before the receiver actually receives it and decide whether to delete the packet or forward it to the receiver. Masquerading and Malicious AP (Access Point): An attacker can learn MAC addresses by eavesdropping and it can also spoof MAC address. Session hijacking: An adversary may be able to hijack alegitimate session after the wireless devics have finished authenticatin themselves successfully. It can be overcome using data confidentiality and strong integrity meachanism Man in the Middle Attack (MitM): ARP cache posioning is a type of Man in the Middle Attack in case of wired connection. Denial of Service(DoS): An adversary is capable of making the whole Basic Service Set (BSS) unavailable, or disrupting the connection between legitimate peers . Ex. forging the unprotected management frames, protocol weaknesses or jamming of frequency bands with denial of service to the legitimate users. Data Confidentiality and integrity: It defines threee confidentiality security protocols: WEP (Wired Equivalent Privacy). TKIP (Temporal Key Integrity Protocol) CCMP (Counter Mode Cipher Blocking chaining MAC (Message Authetication Code) Protocol). A temporal key (TK) is assumed tobe shared between peers before executing any data confidentiality protocols. Authentication and Key Management: There are two types of Authetication systems: Open System Authetication. Shared Key Authentication. These are not secured so IEEE802.11i definesa new standard viz. RSNA (Robust Security Network Association) RSNA establishment procedure: Network and Security Caability Discovery. 802.11 Authentication and Association. EAP / 802.1X / RADIUS Authentication. 4-way handshake Group key handshake. Secure data communication. Availability: Main cause is due to DoS attack: First, an adversary can launch an 802.11i attack much more easily than a physical layer attack, with only moderate equipment. Second, it is much more difficult for a network administrator to detect and locate these attacks. Layer abstraction is a very important concept in networks, requiring each layer to provide independent functionality separately. Michael Algorithm is used to solve above problems. It woks as follows: When a incorrect packet is detected by Access point, it waits for 60 secs,within this time span of 60 secsif another incorrect packet is received by access point from the same source then it shut down that link. Application: 1. Security for Mobile ATE: The data collected from hardware systems using mobile phones, PDAs application needs to be protected as currently many internet like things are done on mobiles only. We are also aware that the security in mobile phones while accessing internet is not secured.To overcome this, many ATE (Automatic test Equipment) are isolated from networks and run in stand-alone environments. An ATE system describes a single hardware device performing test measurements or a group of devices testing another hardware system. Mobile app developers need to focus on securing data using apps: Configuration of the mobile device. Apps running on the device. Equipment communicating with the device. Wireless connection between the device and ATE. When ATE is sending data out from the device, it can use an https connection, data encryption and user authenticationto ensure that the non-trusted sources will not have access to the data.The wireless connection between the device and the server should be secured using wireless security protocols like WPA,WPA2, HTTPS and AES encryption. Below fig. shows the security concerns for the mobile devices. Fig. Major Mobile Application Server Areas Securing the Wireless Connection: The mobile device should never connect to the ATE system through an unsecure WiFi network. Users must connect to the networks that implements strongest security protocol with encryption included. In strict scenarios, the application must use a secure VPN(Virtual Private Network) to connect to the server. Securing the mobile Device: No amount of coding, server configuration or wireless setup will be useful if the hardware containing the mobile application has already been compromised. Before installing any application on the mobile device, user must check that they have ot already compromised their systems security features by jailbreaking or rooting the device. A jailbroken device is that device where user removes â€Å"Operating system limitations imposed by the manufacturer†. By both of the process i.e. jailbreaking or rooting, all of the security features that the system designers built-in to protect users are put into jeopardy. Securing the Application: Application must not gain too much controlof the mobile device. Each application must be independent of each other i.e one application must not call other application or use resources of the other. Securing the ATE system: The administrator and the developer on the ATE server need to work together to assure that the server providing the mobile apllication data is secure. Most of the data processing must be done on the ATE server side as it is difficult for the attacker to access data and also computing power is ore on server side. (A)Data Acquisition Methodology: Obtaining black -listed IP addresses: It was obtained from a german website, which was not up-to-date. This blacklisted IP addresses were the primary source for quantifying illegal activities. Associating blacklisted IP addresses with geographic locations: IP addresses were never assigned to a specific geographical area or region. IP addresses were assigned to organisations in blocks or assigned to residences through fixed commercials ISPs. Maxmind provided one such tool named GeoIP. The GeoIP tool contains a database of IP addresses and their corresponding global location information viz. City, State, Country, longitude and latitude. Obtaining security statistics of WiFi deployments: The statistics of WiFi deployments such as percentage of secure access points and the number of blacklisted IP address occuring within the specific deployments for cities. (B) Data Manipulation Methodology: It involves processing the data. Depending on the number of IP addresses balcklisted, city were choosen i.e the city having highest number of blacklisted IP addresses were considered. Data Analysis Methodology: We generated derived statistics of fileds such as IP address availability, WiFi network security and the number of blacklisted IP addresses. Results of Data realated Methodology: Suggestion: After 2006, every wireless enabled device is WPA/WPA2 certified and Trademarked by WiFi alliance. The biggest hurdle is that users are unaware of the wireless security protocols and in the security dialogue box also first one is â€Å"None† and after that there is a list from WEP to WPA2. It has been seen that the user choose â€Å"None† or WEP as a security protocol without knowing exactly what that security protocol does as it comes earlier in the list. So, the first and the foremost thing is do make user aware of the protocols and advice them to use better protocol as per the requirements. For Ex.,Corporate world must use the toughest to decipher protocol whereas normal user can use somewhat lighter version of the protocol with good password, but it must never have the Wireless access without any security protocol i.e. none. References: Security for Mobile ATE Applications by Susan Moran. Malicious WiFI Network: A First Look by Andrew Zafft and Emmaneal Agu. Security Analysis and Improvements for IEEE 802.11i by Changhua He and John C Mitchell .

Friday, October 25, 2019

Mother’s Comforting Gray Gun :: Personal Narrative Profile

Mother’s Comforting Gray Gun I lay on my side with one socked foot dangling off the edge of the bed, looking down at Mom on the floor. She lay on a pallet of itchy, green army blankets my dad "borrowed" from his tour in Vietnam. No matter how many times they were washed, the blankets always smelled like smoke and machine oil; I had never seen them used anywhere but the floor. It took a while for my eyes to adjust to the dark, but when they finally focused, I could easily follow along the profile of my mother's distinctive nose. The Torres Nose, a nose passed down from her father and his father before him--a nose I am now glad I did not inherit. She lay perfectly still looking beautiful and peaceful, hands at her sides as if asleep. I knew better, Mom never slept when Dad worked out of town, she was practicing. Eight seconds was the time to beat, and if anyone could beat it, it was my mother. Mom had a steely determination much like the .357 Magnum kept under her pillow. It took a full three seconds to slide her right hand up under her head, two seconds to secure her palm around the grip and place her finger on the trigger, another two seconds to roll up on one knee, and one second more to steady herself by jutting out her leg to the side, a move I am positive she stole after watching Farah Fawcett in Charlie's Angels. She would run through the exercise many more times before morning came. My mother's late night drills continued until 1983. That year, our city established emergency 9-1-1 service, and Mom believed the police could now protect us from would-be intruders. Still, she bragged her response time was a lot faster. The first Saturday morning of the month, if she hadn't stayed up practicing the night before, Mom and I would head over to a turquoise-and-pink cinderblock building that sold baked goods, tennis shoes, candles, cassette tapes, and meat. Spanish polkas played on the radio while an old woman with mismatched eyes sat in a folding chair near a box fan. I shuffled my feet along the floor making scraping noises with my shoes as I went. The linoleum was grainy with dirt that nearly hid the checkerboard pattern. As my mother placed her order, I used the black and white tiles to play my own version of hopscotch.

Thursday, October 24, 2019

Which is more effective in fighting crime, knowledge?

Sociologists, in an attempt to explain and point out the reasons behind delinquency, have concluded that there are connections between specific youth behaviors with the home environment, family background, the neighborhood, associations, and many other aspects that together, or separately affect the formative years of young people’s social environment. Delinquent children usually come from a background of difficult circumstances. Parental alcoholism, poverty, breakdown of family, abusive conditions in the home, death of parents during armed conflicts or drug overdose, and the HIV/AIDS scourge, and etc. are some of the various reasons that can leave children virtually orphaned.One or both parents may be physically present, but because of irresponsibility on their part (if even one of them is addicted to drugs or alcoholic), a child may grow developing certain ways and attitudes that are directly/indirectly caused by the parent/s addiction or drug-related behavior. In this case, true delinquency lies on the parents; and the children are, in a way, orphaned or unaccompanied, and without any means of subsistence which, in the first place, the parents’ fundamental responsibility to provide. Generally, and increasingly, these children are born and/or raised without a father.They are first in the line of those who are at greatest risk of falling into juvenile delinquency. Without noticing it as it is typical of any youth to be lacking in prudence, with newly embraced group, the gang, a corresponding subculture starts to assimilate them, and before long, they start to engage in activities of adult criminal groups. It is usually after being engaged in criminal activities for an extended period of time with its accompanying consequences (such as ending up in prison or rehabilitation institutions for drug addicts) that delinquents realize they are into a very dangerous zone.A large portion of all juvenile violations (between two-thirds and three-quarters) ar e perpetrated by youths who are members of certain gangs (Venkatesh, 1997). Unlike in school and their family, these have no strict rules to be followed except loyalty to the group. It gives young people esteem when they somehow feel they are the â€Å"rule† in themselves. This is the lure of gangs. It gives the promise of fulfillment to would be delinquents. Popularity, access to the powerful figures on the streets, freedom to express one’s self, as well as easy flow of money (if the gang is also involved in some illegal activities such as drug dealings, which is common in most gangs) are seemingly within grasp of anybody who just have the guts to dare (OJJDP, Mar. 2003).Children who are well taken care of by their parents and are thus adequately supervised are at less odds to be involved in criminal activities. Studies have proven that. A dysfunctional family, on the other hand, which is commonly characterized by regular conflicts, parental negligence, poor communica tion because of absorption to outside activities by parents, are always assumed to be the breeding ground for delinquents (Venkatesh, 1997).Studies on Risk versus Protective FactorsAn insightful paper prepared by Resnick describes the theoretical viewpoint that risk and protective factors are two things that may â€Å"mirror† each other. Risk factors like low academic performance increases the possibility of child or youth’s involvement in activities that may harm themselves and others while protective factors such as high academic performance increases the likelihood also of the individual committing aggression against another.These factors reside in an individual and that a disproportion of one especially the â€Å"risk factors† over the other indicates a caution or warning; the person may traverse in a direction which may foster a tendency to exhibit aggression or violent behavior. In the study, identifying these balance or imbalance within individuals may he lp reduce the occurrence of school violence by early detection of symptoms thus, interventions may be employed coming from various strategic points like the home, and the school and the community (Resnick, 2004).According to the Laub (1998), the home and the school are milieus that importantly direct the development of aggression or violence. Aggression at home significantly reflects what may eventually occur as aggression or violence in school, though not always. Male students attack peers or other male students. In addition, teachers are hurt either by verbal abuse, physical injury or threats of aggression. Fights that commonly occur in the campuses relate to â€Å"possession of toys, equipment and/or territory, about retaliation, & rules of games† (Laub, 1998).Nature of Violence or Aggressionâ€Å"From very early, the oxygen of the criminal's life is to seek excitement by doing the forbidden.†-S.SamenowA radical turn from the contemporary to classical rationalizatio ns on violent behavior equivalent to possessing a criminal mind, Stanton Samenow offered a quite â€Å"sweeping† point of view based on what he calls â€Å"errors of thinking.† Whereas years spent in studying and treating adolescence clinical disorders, he had leaned upon the understanding that adolescents, criminal behavior and/or violence in general have social determinants as a major factor, this change of mind was brought about by a collaborative work with another practitioner Dr. Yochelson (Genre,http://www.criminology.fsu.edu/crimtheory/samenow.htm).An elevated fear on the occurrence of violence in school is expectedly high not only because of what happened in Virginia Tech recently; this is because other forms of aggression or violent acts committed by students have not changed instead, increased in number among campuses today. In an excellent study by Jaana, the author specifically isolated these acts as becoming the source of fear for the average students to e xperience anytime during their school lives.The study reveals that suburban schools are also profiled as becoming unsafe these days. These violent activities can be in the form of physical attack for no apparent reason or provocation, fights without using any weapon, pilfering, breaking and entering school property, and vandalism. In addition, victimization occurs, in the manner of students stealing property of another (e.g., books etc.), being threatened because of racial or cultural difference, bullying, and threats of injury to teachers and not only to students among others (Jaana, 2001 in http://www.ncdjjdp.org/cpsv/Acrobatfiles/statistics_2008.pdf).Reference:Genre, C.T. 2007. â€Å"Stanton Samenow:The Criminalpersonality). Retrieved May 6, 2008Laub, J.H., & Lauritsen, J.L. (1998). The Interdependence of School Violence with    Neighborhood and Family Conditions. In D.S. Elliott, B. Hamburg, & K.R.   Ã‚   Williams (Editors), Violence in American Schools: A New Perspective, (pp. 127-  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   155). New York, NY:Cambridge University Press. Retrieved May 6, 2008from  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   the   Ã‚  Ã‚  Ã‚  Ã‚   Center for the Study and Prevention of ViolenceJaana, 2001 in Selected School and Youth violence   Ã‚  Ã‚   statistics. Department of Juvenile Justice   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   and Delinquency Prevention (DJJDP).Retrieved May 6, 2008.   http://www.ncdjjdp.org/cpsv/Acrobatfiles/statistics_2007.pdfVenkatesh, S. ‘The social organization of street gang activity in an urban ghetto,’   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   American   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Journal of Sociology, vol. 103, No. 1, July 1997, pp. 82-111.Yochelson, Samuel & Stanton Samenow. The Criminal Personality. N.Y.: Jason Aronsen,   Ã‚  Ã‚  Ã‚   1976,    1977, 1986._____Accessed Retrieved May 6, 2008.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   _______ 2007. Selected School and Youth violence    statistics. Department of Juvenile Justice   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   and   Ã‚  Ã‚  Ã‚   Delinquency Prevention (DJJDP). Retrieved May 6, 2008  Ã‚   http://www.ncdjjdp.org/cpsv/Acrobatfiles/statistics_2007.pdf_______OJJDP, Mar. 2003. The Office of Juvenile Justice and Delinquency Prevention is a    component of the Office of Justice Programs, which also includes the Bureau of   Ã‚  Ã‚   Justice Assistance, the Bureau of Justice Statistics, the National Institute of Justice, and the   Ã‚  Ã‚  Ã‚  Ã‚   Office for Victims of Crime. Retrieved May 6, 2008.

Wednesday, October 23, 2019

Pip and Magwitch Essay

Throughout the novel Great Expectations the reader will find that Magwitch plays a significant role to the plot of story. Not only does Dickens use Magwitch to form the main foundation of the story he also uses the character to convey Dickens’s view on important themes such as crime, punishment, social status and betrayal. In this presentation I will explore the ways in which Magwitch is presented and talk about and his significance in the novel. We are first introduced to Magwitch in chapter one. The reader becomes familiar with the character Pip; we learn he is a child who is alone in the graveyard and is mourning over the death of his family. The reader knows that not only would this upset Pip, it could make him feel frightened because as a child you are dependant on your family members to keep you safe. He makes it sound as if Pip was recalling what it felt like to be a child, like when we get the impression that he could have been exaggerating about wilderness and so on before him. An image is described, such as ‘the low leaden line beyond’ and this then is revealed as what it actually is; the river. This gives the effect that not only Pip is confused and lost by his surroundings but also and therefore scared and intimidated by them. Dickens delivers Pip’s emotions cleverly because there is no direct reference to how he is feeling at first. This is very good building up to the shock of first meeting Magwitch. The writer uses direct speech for his first words, which come out suddenly, at no particular starting point and with impression that they are loud! He says ‘Hold your noise. ‘ which sounds at first so abrupt it could be almost like he is trying to save Pip, that he fears for Pip too. We then read on to see how Magwitch is presented physically. He is wet and muddy, and is described as being stung by nettles, so he obviously does not look after himself properly. He is shivering and limping, so he may be unwell as well as cold. His shoes are broken and he has no hat or proper clothes which shows he cannot afford them. He has a very informal way of speaking, and is eager to see the scrap of food he finds on Pip, so this also shows that he is poor and working class. This could be because, or the results of being a criminal. The first chapter is important; we now know exactly what Magwitch looks like and how he is presented. As mentioned in the introduction, Magwitch is significant in the plot. The fact that he appears in the very first chapter makes us assume he is a main character, even though he does not reappear until later in the book when the reader either has completely forgotten about him or thinks it is very unlikely that he will appear again with the current story line, especially as at the end of chapter three it says ‘the last I ever heard of him. ‘ When he does make his unexpected reappearance in Chapter thirty-nine, he reveals news that causes him to become the centre of almost every aspect of the story line. By the end of Chapter fifty-four and when mysteries are revealed and loose ends tied we come to realise that Magwitch is somehow connected to every character. Pip, obviously because of the money he gives that cause him to become wealthy and middle-class. His lost past with Molly and Estella, his daughter, who was adopted by Miss Haversham. Also he is connected to Joe because it was his whittles and file he used to set him free. Perhaps he is connected to Mrs Joe because he murdered her. When Magwitch dies during chapter fifty-six, it impacts the plot and the characters, especially Pip. Magwitch influences other characters, especially Pip and sometimes they influence him too. Had it not been for Magwitch the way people behaved may have been very different! We do not know much about Pip before he meets Magwitch, but afterwards we find him to be cautious, for example how nervous he was when he meets Miss Haversham. This could have been a lasting effect from his fears upon first meeting Magwitch. Pip may have been so shocked by the way that the poor lived that he becomes even more determined to become a gentleman. It gave him an insight to the lives of the very poor. In chapter three Magwitch seems to wait all night just for the food Pip has brought him. Pip may have recognised his determination and perhaps used this will when he is seeking Estella as his wife later during the book. Magwitch may have been so grateful towards Pip that it made him feel like he should try and become a better person. Both Pip and Magwitch taught each other that you should not always be judgmental. For Pip, it was that he was at first very afraid of Magwitch and thought he was going to be scary. Later on he realises that he only was behaving in a threatening way because he was hungry and desperate for food.

Tuesday, October 22, 2019

United States in the 1780s essays

United States in the 1780's essays 1780's America was a country at the close of the war. A war that was not so much won by America's revolutionaries as simply given up by the British. The country consisted of a patchwork of states geld loosely by a common bond (their fight for independence) whose threads quickly unraveled as each state was faced with the heavy burden of repaying its depts and one government was left with the task of governing a nation. One major problem for the government was how to allow personal freedom and liberty without falling into a state of anarchy; and another was how to create laws that help govern and protect its people without becoming another monarchy. It was during this time that great men lived. They were industrious men who helped shape the country each leading the way to financial independence, westward expansion, and a strong government whose model still exists today. ...

Monday, October 21, 2019

Web Content Management Systems Essays

Web Content Management Systems Essays Web Content Management Systems Essay Web Content Management Systems Essay Essay Topic: Web Web content management system requires an administrator and/or web developer to set up and add features but mainly the editing and management part can be handled by a non-technical person. Features Web content management systems typically have the following features; Automated Templates: Standard output templates can be created and applied to change the design of the entire web page can be changed centrally. Access Control: Some of the web content management systems allow the content manager to manage access rights to certain groups or users, ? Access rights can be provided or certain pages can be blocked for specific user groups Access right can also be managed to allow or block access for ‘logged on’ or ‘anynonumous users’ Scalable Expansion: WCMS’ provide the capability to expand a single implementation (one installation on one server) to various domains. Work flow management: Workflow is the process of creating cycles of sequential and parallel ta sks that must be accomplished in the CMS. For example, one or many content creators can submit a story, but it is not published until the copy editor cleans it up and the editor-in-chief approves it.Collaboration: WCMS allows many people to collaborate on a single web page. Many authorized content writers can work on one document or web page simultaneously, these changes can be authorized to make them permanent or denied to revert to the original document. Document management: CMS software may provide a means of collaboratively managing the life cycle of a document from initial creation time, through revisions, publication, archive, and document destruction. Content virtualization:CMS software may provide a means of allowing each user to work within a virtual copy of the entire web site, document set, and/or code base. This enables changes to multiple interdependent resources to be viewed and/or executed in-context prior to submission. Content syndication: Content management systems help in content distribution by the likes of RSS feeds, emails can also be sent out to registered users in case the content is updated. Multilingual support: The content can be displayed in multiple languages.Versioning: Like many document management system, versioning can be done on the web content as well. Authorized content editors can pick up writing from a point in the article already published. This feature is very useful in contents that require regular updating. Types of content management systems There are three types of content management systems: ? ? ? Online CMS Offline CMS Hybrid CMS Online CMS: The online content management systems are capable of displaying content on demand when a user visits the web page. E. g. certain template can be applied to the webpage from the web cache when a user is visiting the web page. Offline CMS: These are sometimes referred to as â€Å"static-site generators†, here instead of displaying the content on-demand, the content process ing is done before publishing. Since pre-processing tools don’t require a server to display content on-demand. Offline CMS can also exist purely as a design time tool. Hybrid CMS: These content management systems write executable content, in which CMS itself doesn’t have to be deployed on a server but server similar functionality of the online CMS.Most popular content management systems ? ? ? ? ? WordPress Joomla ModX Text pattern Refinery CMS ? ? ? ? ? Drupal Concrete 5 Dotnet nuke Umbraco Tiny CMS Advantages of CMS Cost effective With a content management system, a web page can be maintained for a fraction of a price of hiring a web developer. Easy customization The web page can be easily customized without coding. Most WCMS provide a GUI using which the content can be customized using user friendly features such

Sunday, October 20, 2019

N.B. Meaning

N.B. Meaning Now, pay attention! Thats the basic meaning of N.B.  -   the abbreviated form of the Latin phrase nota bene (literally, note well). N.B. still appears in some forms of academic writing as a way of steering readers attention toward something particularly important. Two or three centuries ago, when classical Latin was widely taught in British and American schools, it wasnt unusual for Latin expressions to appear in English prose. For proof, pick up an American dollar bill and look at the Great Seal of the United States on the reverse (or greenback) side. There on the left, just above the floating eye and the unfinished pyramid, is the Latin phrase Annuit Coeptis, loosely translated as Providence has approved our undertaking. At the base of the pyramid is MDCCLXXVI (1776 in Roman numerals) and below that the motto Novus Ordo Seclorum (a new order of the ages). To the right, on the ribbon in the eagles beak, is the countrys first motto, E Pluribus Unum, or one out of many. Now thats a lot of Latin for a buck! But keep in mind that the Great Seal was approved by Congress way back in 1782. Since 1956 the official motto of the U.S. has been In God We Trust -   in English. As the Romans used to say, Tempora mutantur, nos et mutamur in illis (Times change, and we change with them). Nowadays, with a few exceptions (such as A.D., a.m., and p.m.), abbreviations for Latin words and phrases have become rare in ordinary writing. And so our advice regarding most Latin abbreviations (including e.g., etc., et al., and i.e.) is generally to avoid using them when an English word or phrase would do just as well. If you must use them (say in footnotes, bibliographies, and technical lists), consider these guidelines on how to tell them apart and use them correctly.

Saturday, October 19, 2019

Marketing strategy Assignment Example | Topics and Well Written Essays - 1000 words

Marketing strategy - Assignment Example Macro and Micro Environmental Analysis PESTEL The PESTEL analysis is performed to analysis the macro environment of the industry. The PESTEL analysis provides a frame within which the strategic thinking of the company for the future takes place. The analysis sets boundaries and expectations (Burke, Clarke, et.al, 2008, p.27). Political factors of the US software industry seem to be stable. The government has promoted the IPR protection as the US software industry experience a loss of about $12.8billion due to inadequate protection (Brown, et.al, 1995, p. 9). The US economical factor represents a strong GDP rate of $47200. In the market oriented economy, private firms and individual dominates the business. US business enjoys a better flexibility than the other parts of its counterparts (Central Intelligence Agency, n.d). With the population becoming savvier about the software industry there has been a steady rise in the software applications and industry. The social factor of the US h as demanded the country to produce more software application. The technological factors of US software industry have enabled it for the global distribution of software management teams. With a technological advance the software industry has been able to develop a new phase in the software industry. ... Legal factors include compliance with issues like Open Source Initiatives. The companies are following the source code to protect it against any threat. Also the use of illegal software is prohibited. Product-market industry analysis The product market industry is analyzed with the help of two dimensions and their extremes which is the product-market matrix. This matrix explores the two dimensions Product and Market (Lowy & Hood, 2004, p.134). Figure 1: Product-Market Matrix (Source: Lowy & Hood, 2004, p. 135) Microsoft with the launch of Windows 7 Phone has come up with a product development and hence its product Windows 7Phone would fall under the first quadrant of Product development. Microsoft has understood the positive relationship with its customers and also the goodwill and thrust that accompany it. When ZuneHD was launched it gained a positive feedback and thus Microsoft also expect the same from its 7 phone. With a growth in mobile phone, it has become a major computing pla tform for big giants like Microsoft, Apple. The market of Smartphone is expected to grow by 705 thus investment in this growing sector would help Microsoft gain profits and revenue as well as capture the market share. The new product, Windows 7 Phone, resents a lot of information more clearly and it’s easy to navigate. Therefore the product development by Microsoft is its new Windows 7 Phone. Competitor’s analysis The competitor analysis aims to evaluate the company with its peer group with a motive to analysis the company’s positioning with its competitors. Microsoft top competitors are Apple and Google. Apple known for its innovation, with its release of iPhone has revolutionized the mobile industry. Also with its innovation in desktop and laptops

Friday, October 18, 2019

Keeshig-Tobias's and his love for boxing Research Paper

Keeshig-Tobias's and his love for boxing - Research Paper Example   Boxing was his life as he sought to beat the world. Nevertheless, boxing meant something else for Keeshig-Tobias. She knew of her father boxing at a young age and she was not convinced as to why her father was into boxing despite his age, family commitments, and lack of earnings from the sport. Keeshig-Tobias's father was a young man who struggled with his family and was loved and hated by his family in equal measure. His family and especially his daughter Keeshig-Tobias struggled to understand him to no avail. He was a man of mixed feelings and his love for boxing was a mystery.Keeshig-Tobias learnt something as he grew more mature that changed her relationship with her father. She learned that her father was actually fighting the world and had nothing to mistreat them. She learned that it was out of struggles that he behaves in an undefined manner and that she cannot engage him behind his back but must face him (Lanette 285). After learning this, their relationship changed trem endously in that she started practicing boxing also, they started talking, they opened up to one another, and they understood and trusted each other. It is arguably true that what Keeshig-Tobias experiences with her father are not unique. Indeed, many families are in the same situation where children cannot understand the lives of their parents as they struggle to sustain their families. However, as seen in this story, with time, it all comes out clear and families can relate at ease when the children mature.   

Physics assignment Example | Topics and Well Written Essays - 2500 words

Physics - Assignment Example There are certain standards set as to assert the safety standard of any nuclear power plant. The organization that regulates the policies around the globe is known as IAEA (International Atomic Energy Agency). This organization has set a certain benchmark; which are actually, major concerns of a nuclear reactor in any country of the world. Some on the concerns are: 1. Testing of emergency situations, if and when they happen. 2. Equipment and actions to adhere the consequences of such an emergency. 3. Probability calculations of units failing and their back-ups. 4. Examining the worst possible scenario and creating an emergency plan accordingly. 5. Actions taken, in the event of radiation emissions form the plant. 6. Proper training of the men working in these facilities. 7. Anti-earth quake and anti-flood systems, which have to be, installed (Hugh, 2011). Question 2 There are three types of radiation particles namely alpha, beta and gamma particle radiations. Alpha radiations have be en defined as helium nuclei, comprising of two protons and two neutrons. It is considered to be very stable. Beta radiations have been defined as fast moving electrons formed by nuclear decay, whereas gamma radiations are known to be high frequency, short wavelength electromagnetic radiation (Cheng et al, 2000). All three of these radiations have certain benefits and disadvantages. The disadvantage of alpha particle is that when it in inhaled, can cause damage to lungs and the respiratory system. Beta rays cause disorder in the molecular structure of humans, whereas gamma rays can directly damage the human tissue, since they are very high energy rays. Along with these disadvantages, there are some benefits as well. Alpha particles are used to detect smoke for engaging a fire alarm or water sprinkler. Beta particles are used to find thickness of aluminum foil, its variables and capable of treating cancer patients as well. Gamma radiations are used to locate flaws in pipes, other stee l products for leaks and the integrity of welds in them (Cheng et al, 2000). Medical benefits of radiations can be seen in the use of x-rays and treatment of cancer, whereas non-medical use of radiation can be seen in industries, for detection of leaks and welding faults in different metal mediums. Also for non-medical use, the rays are used for inspection on the production line to check emptiness or the thickness of materials like aluminum. (Cheng et al, 2000). Question 3 Apart from nuclear power, there are other ways to produce energy like hydroelectric, fossil fuel burning, solar and wind power. All these methods have a lot of advantages and disadvantages. Some of them will be depicted here. Hydroelectric power is free of cost, as water flow is easily available all around the world but the drawback is the amount of expenditure involved to build dams and huge water turbines. Furthermore, the environmental hazard for hydroelectric power generation is the disturbance of the ecologic al habitat of the aquatic life in the region. Fossil fuel is the best form of energy as it provides predictable and a constant power source but the major drawback falters this form of energy. It is the fossil fuel that is not a reusable or renewable source and is becoming scarce from the world at a very rapid rate. Solar and wind power both have almost the same kind of advantage and disadvantage. The setup for both is very expensive and is unpredictable in nature but the best advantage of these sources of power is

Thursday, October 17, 2019

Group therapy and t-groups Essay Example | Topics and Well Written Essays - 750 words

Group therapy and t-groups - Essay Example Sometimes clients consider themselves liable for the progress their peers make and therefore the ultimate feeling of being helpful is generated. Quite often after observing the changes in the group, the clients adopt the positive behavior they observe in others and at the same time they manage to learn from each other and therefore the trust can increase their self-confidence and interpersonal skills among members. Clients are more prone to test their new skills in a safe environment before going to normal a little bit hostile social world. In many case group experience may be therapeutic by offering the clients a chance to reinforce or revise the way in which they relate to their primary families. Purely practical advantage of group therapy is the fact that it is more cost-effective and results in the therapist's time reduction. The therapist's role encompasses facilitating member participation and interaction, focusing conversation, mediating conflicts among members, offering emotional support when needed, facilitating the establishment of group rules, ensuring that the rules are followed and in the case the conflicts are smoothed. The main disadvantage of group therapy can be the fact that not people are... dvantage of group therapy can be the fact that not people are predisposed to reveal their problems in front of everybody and group therapy can be not as efficient for some personality types. In addition to this, the feedback that group gives is not censored by the therapist up front, and quite often it can be detrimental for the client. Another disadvantage that group can face is the switch from the problem to the other focal points. There are many different groups that are used in the psychotherapy: Some groups such as alcohol dependence groups, single parents group, and assertiveness training group. Some group can accept new member, meanwhile the other can be completely closed to new members, once the group is formed. Group therapy became very a popular practice after the Second World War and includes numerous methods of psychotherapy, including psychodynamic, behavioral, and phenomenological. In Fritz Perls's application of his Gestalt approach to group work, the therapist tends to work with one group member at a time. Other approaches, such as J.L. Moreno's psychodrama (role playing) method, stresses the interaction among group members. Psychodrama calls for the group to act out scenes relevant to the situation of a particular member under the therapist's guidance. Influenced by Moreno's approach, new action-based methods were introduced in the 1960s, including encounter groups, sensitivity training, marathon groups, and transactional analysis, whose foremost spokesperson was Eric Berne. Marathon groups, which can last for extended periods of time, are geared toward wearing down the members' defenses to allow for more intense interaction. In addition to the adaptation of individual psychotherapeutic methods for groups, the popularity of group therapy has also

Germany's Holocaust Memorial Essay Example | Topics and Well Written Essays - 250 words

Germany's Holocaust Memorial - Essay Example Then there are those who argue that the site is not Jewish enough, since it lacks obvious Jewish religious symbols (Eisenman, 2006). An advantage for having the information center within the site is to harmonize, the concept of the memorial site with individual documentation concerning the Holocaust victims and their families. Hence, visitors do not just get to express their somberness, but they get to learn more about these victims and understand how typical they were through their biographical details. Furthermore, the information center assists in the broader documentation and education of universal concerns of genocide. The downsize of the information center is that, it can be perceived as presenting a new thought of memory, discrete from nostalgia, more of a public relation gimmick. The US does not have a permanent national memorial for victims of slavery, and the genocide of American Native Indians. Currently, the proposed museum for slavery has stalled entirely, while the native Indians have the national museum of American Indians at the national mall (National Mall,

Wednesday, October 16, 2019

Making a Difference through Nursing Essay Example | Topics and Well Written Essays - 3250 words

Making a Difference through Nursing - Essay Example Since hepatitis C was first recognized in 1989, it has gained increasing significance. More than half the number of individuals exposed to HCV develop chronic infection; and among them around 20% to 30% develop liver cirrhosis and/ or hepatocellular carcinoma within twenty to thirty years. Improved diagnostic techniques and possibilities of therapeutic intervention have brought out the role of HCV infection in acute and chronic liver disease (Hentiges & Wands, 1997: 521). This paper proposes to examine the hepatitis C virus (HCV), its pathophysiology and various other dimensions of the infection including the public health implications, the importance of raising public awareness, clinical governance and surveillance. Hepatitis C infection has been found worldwide, especially in the southeast Asian countries, in northern African and Arabian countries, and with highest prevalences in the Ukraine and in the central African countries of Gabon and Cameroon, as well as in Egypt where up to 14.5% of the population is infected with the Hepatitis C virus. Size of the Problem: HCV infection in Hong Kong is associated predominantly with multiple blood transfusions (67% to 87% anti-HCV positive) and intravenous drug abuse (56% anti-HCV positive). However, the source of infection is unidentified in a large number of HCV carriers (Ho & Wu, 1995: 15). The world-wide prevalence of hepatitis C is estimated at 170 million people or 3% of the global population, with a disease spectrum ranging from mild to severe chronic hepatitis, cirrhosis and hepatocellular carcinoma. Most people infected with HCV are unaware of their clinical status, due to which the actual prevalence of the infection may be under-reported. Around 85% of infected persons are chronically infected by the virus, and 70% of the infected develop chronic hepatitis, cirrhosis and hepatocellular carcinoma

Germany's Holocaust Memorial Essay Example | Topics and Well Written Essays - 250 words

Germany's Holocaust Memorial - Essay Example Then there are those who argue that the site is not Jewish enough, since it lacks obvious Jewish religious symbols (Eisenman, 2006). An advantage for having the information center within the site is to harmonize, the concept of the memorial site with individual documentation concerning the Holocaust victims and their families. Hence, visitors do not just get to express their somberness, but they get to learn more about these victims and understand how typical they were through their biographical details. Furthermore, the information center assists in the broader documentation and education of universal concerns of genocide. The downsize of the information center is that, it can be perceived as presenting a new thought of memory, discrete from nostalgia, more of a public relation gimmick. The US does not have a permanent national memorial for victims of slavery, and the genocide of American Native Indians. Currently, the proposed museum for slavery has stalled entirely, while the native Indians have the national museum of American Indians at the national mall (National Mall,

Tuesday, October 15, 2019

White People and Young Black Men Essay Example for Free

White People and Young Black Men Essay Imagine walking down the street and having people stare at you or call you names, or talk behind your back. Imagine not knowing the time because nobody will tell you. Why wont they tell you the time, or spare you some change? Because you are black. Actually, because your skin is a different color, or because you are a different kind of religion. In a way I admire them because theyve survived for hundreds of years until they were free, and now that theyre free, the modern white man harasses them and beats them. I mean, they even had a world wide organization named for them. The KKK has been around for a while. The KKK, or Ku Klux Klan, began because of their intense hatred of black and Jewish people. Valerie Joseph, author of A Monument To Racism, writes that in front of Danny Carvers house, a KKK leader, in Flowery Branch, Georgia, were 8 or more signs, that read: A brain is a terrible thing to waste, thats why niggers dont have one. Another sign read; NAACP or Niggers, Alligators, Apes, Coons, and Possums. Or insisting that blacks dont have brains and that they should be treated like animals. There was also a figure in the front yard that had 4 young black men sitting on it with 2 KKK hooded members by them. To top it off, Carvers lawn was on the Atlantic highway, the main way through the capital. I strongly agree with Valerie Joseph when she says that she wanted to believe that people actually cared, she wanted to believe that there were lawyers, activists, parents, church groups of all races that were bombarding this man with phone calls and letters. She hoped that maybe teenagers would plan to smash the figures in the middle of the night. She also said that you can help stop this, all you have to do is try to accept people different than you as you do anyone else. If you cant, you dont have to express it, keep it to yourself. If you hear somebody saying something about somebody else, all you have to say is, listen, theyre just as equal as you are. If you do, pretty soon theyll quit. Many years ago, the states had to force businesses and schools to allow blacks in. For example, one of the establishments was the Brown V. Board of Education. Many years before, federal troops forced Little Rock Central High School to admit black students. The question I ask is, why would they want to be there if the government had to force the school system to let them in? Many years ago, there was a segregation where blacks and whites were separated in everyday life. They had different water fountains, restrooms, and even different lines at the movie theaters. Blacks also had to sit in the back of the bus while whites had top picks on seats and standing when a white person wanted your seat. Then, segregation was finally abolished. As blacks acquired middle-class status, just like their whites counterparts, they moved out of central cities and the sustaining buffers between lower-class blacks and the surrounding white role models, etc,were largely removed. (USA TODAY 55) I came across a Time magazine article that was titled Evict The Neighbor. It was about a couple that had been getting harassed by their neighbors and so they sued for $10 million in damages. U. S. District Court Judge Ann Williams granted a settlement agreement whereby the harassers will have to leave their home within 180 days. People continue to do these things even though they know that they could go to jail. Why? We ask ourselves, why do people do this? Well, it all started with the slaves. The African-Americans came to the United States hundreds and hundreds of years ago from Africa. Most of the slaves came from Ethiopia, Zaire, Somalia, and Nigeria. They came across that Atlantic Ocean with some of the first settlers. They were then sold to slave traders and auctioned off. But, back to the modern day; blacks should have some sort of protection or sense of safety with police officers, but lets consider the Rodney King trial in 1993 when police pulled over a drunken black man that they said was swerving all over the road. When the man, Rodney King, got out of his car, more than 3 police officers approached him and beat him almost to death. The whole thing was captured on video tape from one of the police cars dash-mounted cameras. The four identified police officers had a trial and when the verdict given was not guilty. The L. A. riots started almost immediately. People were beating others, looting stores, blacks were shooting people and beating white police officers. Some think that there would have been riots all over again if the jury would have found O. J. Simpson guilty a few years ago. Texaco, a large chain of gas stations throughout the United States, was sued for calling black employees porch monkeys and orangutans. Texaco pled guilty because an employee walked in on a faculty meeting and heard white employees copying the way African Americans talk. All the white employees were also getting promoted to higher ranks whereas black employees were working harder and receiving reduced checks. The settlement in the Texaco case was $115 million to about 1,400 current and former black workers, $26. 1 million in pay raises over five years for black employees, $35 million for a task force to set up diversity training programs, and an independent panel to oversee Texacos employment practices. Another suit was filed against Avis for refusing to serve blacks in North and South Carolina. Also, rappers, who everyone knows are mostly black, are harassed and put down daily, because of what they sing about. Nobody criticizes country singers who sing about the same thing over and over, or the love songs that all sound the same; you cant tell one apart from the other. It shouldnt matter what color that are or what they look like, its the music that they sing. Every parent thinks that rap is bad, because it has a few swear words, but not if you get the edited version. Everyone thinks that only rappers commit crimes. But in actuality, blacks make up to 12 percent of the population, and 30 percent of arrests made are blacks being arrested for violent crimes (US NEWS 93). A black man can not even get a cab for hours because cabbies are afraid to drive through the ghetto. Really, what is the ghetto? Only a place where homeless and low income black and white people live and hang out. In a recent Associated Press article, (Charles J. Ogletree, Harvard Law Professor), a powerful group of civil rights and class-action lawyers will seek compensation for American black descendants from slaves. The effort appears to be the most serious initiative to get compensation for American blacks for 244 years of legalized slavery. Ogletree stated, We will be seeking more than just monetary compensation. We want a change in America. We want full recognition and a remedy of how slavery stigmatized, raped, murdered, and exploited millions of African through no fault of their own. There are more questions than answers in the planned lawsuit, such as: when will the suit be filed, who are the defendants, and what damages will be sought? However, both public and private parties will be the subject of their efforts. This will be the most important case in the history of out country. No one knows the magnitude effect the lawsuit will have on this nation. It would have seemed better that America aggressively pursue a political solution but lawsuits and legislation have really gone nowhere in the past. It will probably come down to this, that when corporate America is hit in its own pocketbook, real change will occur. I strongly believe that the responsibility doesnt solely lie with big businesses and government but also within each one of us. one person can make a difference Making a choice to treat everyone equally, fairly, and with respect is the first step. Watching what we say by putting ourselves in anothers situation first is also doing our part. Otherwise, we just become part of the huge problem we currently have. Whats it going to bewill you be a part of the perpetual persecution of blacks or stand up for what is right.

Monday, October 14, 2019

Plasmodium: The Malaria Parasite

Plasmodium: The Malaria Parasite An endoparasitic protozoan that causes malaria, Plasmodium, requires two hosts to complete its life cycle in; usually a mosquito and a vertebrate. Female Anopheles mosquito is responsible in the transmission of malaria in human beings. Human malaria is caused by four identified species of Plasmodia, namely Plasmodium falciparum, Plasmodium vivax, Plasmodium malariae and Plasmodium ovale. Recently, in addition to these four species, the simian parasite Plasmodium knowlesi have been identified to infect humans in Malaysia (Cox-Singh, Singh, 2008). Malaria can be treated in just 48 hours; however the delay in diagnosis and treatment can cause fatal complications. Malaria caused by P. falciparum is also called malignant or falciparum malaria (Rich et al., 2009), which is observed to be the most dangerous form of malaria with the highest rates of complications and mortality. A dormant stage in the life cycle of P. vivax and P. ovale may results into relapses long afterwards. The malaria d ue to P. knowlesi can also cause life threatening symptoms(Cox-Singh et al., 2008). P. malariae is associated with milder clinical manifestations in comparison to other species. The systematic position of malaria parasite described by (Mhelhorn H. and Walldorf V., 1988) is as follows: Kingdom Protista Sub Kingdom Protozoa Phylum Apicomplexa Class Sporozoa Sub Class Coccidia Order Haemosporidae Sub Order Aconoidina Family Haemosporidae Genus Plasmodium 1.2 History of Malaria The term malaria is derived from Italian word mala bad and aria air. Italians used this word to refer the cause of intermittent fevers associated with exposure to marsh air or miasma. In the first century A.D., Roman scholar Marcus Terentius Varro (116-27 BC) suggested that swamps breed certain animalcula which is not visible with naked eyes and we breathe it through our mouth and nose into the body, where they cause grave maladies. Later, about 30 A.D., two types of tertian fevers were described by Celsus. He concurred with the views expressed by Varro. In 1716, Italian physician Giovanni Maria Lancisi, first demonstrated a characteristic black pigmentation of the brain and spleen in the victims of malaria. In 1816, Giovanni Rasori (1766-1837) of Parma suggested microorganism as a cause for the disease. Later, in 1847, a German physician, Heinrich Meckel, identified round, spindle-shaped or ovoid structures containing black pigment granules in protoplasmic masses in the microscopic slides of blood from a patient with fever and observed similar entities in the spleen of an insane person during the autopsy. In 1848 Schutz observed these pigments in the internal organs of patient who had died of malaria. Soon afterwards, Virchow (1849) observed these pigmented bodies in the blood of a patient who had died from chronic malaria and specifically associated it with malaria. Finally, Charles Louis Alphonse Laveran in 1888 named a living organism as Oscillaria malariae and suggests it as the malaria parasite. In 1885 Camillo Golgi, established that there were at least two forms of the disease, one with tertian periodicity (fever every other day) and one with quartan periodicity (fever every third day). He demonstrated that the rupture of shizoints and release of merozoites into the blood stream coincided with the fever and correlated the severity of symptoms with parasite load in the blood. In 1906, Nobel Prize was awarded in Medicine for his discoveries in neurophysiology. In 1897, the sexual cycle of malaria parasite was demonstrated by Dr. McCallum, William G and Opie of Johns Hopkins Hospital. In the same year, Ronald Ross demonstrated the presence of oocysts in the midgut of female anopheline mosquito and soon afterwards, he (1898) demonstrated the sporozoites infection in salivary glands of the mosquito and also carried out transmission of malaria in birds with an infected mosquito. He was awarded the Nobel Prize in 1902 for establishing the fact that infected mosquitoes are respons ible for transmission of malaria. In 1907, Charles Louis Alphonse Laveran, was awarded the Nobel Prize for Medicine and Physiology for his discovery of the malarial parasite and other significant contribution to parasitology. In 1975 William Trager cultured P. falciparum in a medium of red blood cells. In 1987, a Colombian biochemist named Dr. Manuel Elkin Patarroyo developed the first synthetic Spf66 vaccine for P. falciparum infection. In 2002, the genome of parasite Plasmodium falciparum and the vector Anopheles gambiae were successfully sequenced. 1.3 Public and Global Health Burden Malaria is one of the oldest infectious diseases known to mankind. Malaria influenced outcomes of many wars and fates of many kings would have been different. It has competently forced many military defeats and responsible for decline of nations, often caused casualties more than the weapons could have. For centuries it has been responsible in preventing economic development in various regions of the earth. Malaria occurred in more than 100 countries and affects more than 2400 million people in the tropics, from South America to the Indian peninsula. Human malaria in tropical and subtropical areas accounts approximately 40% of the world at risk for the disease. The cause of this distribution in tropics is because of ideal breeding and living conditions for the anopheles mosquito. About 300 million to 500 million people suffer from malaria annually. Most lethal form of malaria infection is focused in the African continent, especially among children under five. In total, sub- Saharan A frica show most (90%) of the malarial cases and two thirds of the remaining 10% cases occur in six countries- India, Sri Lanka, Colombia, Vietnam, Brazil and Solomon Islands (Figure 1.1). WHO forecasts a 16% augmentation in malaria cases annually and about 1.5 million to 3 million deaths due to malaria every year (85% of these occur in Africa), accounting for about 4-5% of all moartality in the world. One child dies every 20 sec. due to malaria somewhere in Africa and there is one malarial death every 12 sec somewhere in the world. 50 million peoples have died of malaria. Among the major infectious diseases, malaria ranks third in cause of martality- after pneumococcal acute respiratory infections and tuberculosis (WHO., 2005). A brief account stated that ~ 30000 visitors who visited endemic countries developed malaria; where as 1% may succumb to the disease. Malaria can be accounted for 2.6 % of the worlds overall burden of diseases, thus raising expectations that it can climb to n umber one of the highest killer infectious diseases by the end of the century. Total global estimates of the annual expenditure (in 1995) showed a whooping US$ 2 billion directed towards malaria. World Health Organization reported it as a re-emerging infectious disease, and specify as infectious killer and number 1 priority tropical disease (WHO., 2005). The recent WHO World Malaria Report registers a global impact of approximately 225 million new clinical malaria infections associated with 781,000 deaths (WHO., 2010). Particularly, in the tropical countries, malaria is a health problem that setbacks social and economical developments. Malaria is commonly associated with poverty, and represents a major burden to economic and social development, costing an estimated sum of greater than US$ 6 billion for the year 2010 (Sachs. J and Malaney. P, 2002; WHO., 2010). Early diagnosis and prompt treatment are two basic elements in easing the impact of malaria. While progress in these areas h as been remarkable, the emerging insecticide resistant vectors, population movements, environmental disturbances, disintegrative health services and wide spread antimalarial drug resistance have constrained this mission. In early 60s, under the guidance of the Figure 1.1 Global distribution of malaria. (Reprinted from Nat Rev Microbiol.) (Bell et al., 2006) World Health Organization, malaria was nearly eradicated from most parts of the world owing to well planned anti malarial campaigns over the world. However, soon after, a resurgence of malaria took place in 1970s, which could be due to several reasons described below. Man made complacency and laxity in anti malarial campaigns; conflicts and wars; migrations; deteriorating health systems; poverty Drug resistance in parasite Insecticide resistance in vector and ban on use of DDT Environment global warming causing increased breeding and life span of the vector Jet age shrinking world spread of malaria from endemic areas to all other parts of the world. 1.4 Life Cycle of Malaria PARASITE The complex life cycle of malaria parasite involves two hosts; an insect vector (anopheles mosquito) and a vertebrate host (human). In search of a blood meal, a malaria-infected female Anopheles mosquito inoculates the infectious sporozoites into the human host. The malaria infection begins as these viable sporozoites invade liver cells and develop into mature schizonts, which in turn rupture and release invasive merozoites into blood stream. In P. vivax and P. ovale an arrested phase [hypnozoites] can remain dormant in the liver and re-invade the bloodstream after weeks, or even years later and cause infection, this delayed primary blood infection is termed as relapse. The initial asexual replication in liver is termed as exo-erythrocytic schizogony. In the normal developing exo-erythrocytic schizont, the cytoplasm of the parasite becomes subdivided and the ensuing invasive merozoites develop. These emergent merozoites are then released upon rupture of the mature schizont and invade the erythrocyte. The parasites undergo asexual multiplication in the erythrocyte, termed as erythrocytic schizogony. Redifferentiation of intra-erythrocytic merozoites into the feeding trophozoites occurs then. The ring stage Figure 1.2 Life cycle of malaria parasite (Plasmodium falciparum) trophozoites mature into schizonts and when rupture releasing merozoites to begin another cycle of red blood cell infection. However, the majority of merozoites entering an erythrocyte will develop into asexual schizonts, a small fraction can develop into the first sexual stage of life cycle (gametocytes). The rupture of mature schizont also releases the metabolic debris, which is toxic to the host and play a role in stimulating the clinical manifestations of the disease. The female anopheles mosquito must take blood meals on regular basis to support the development of eggs in successive batches. When biting malaria infected vertebrate host, she will take up infected erythrocyte and the gametocytes. Both female (macrogametocytes) and male (microgametocytes) are ingested by female anopheles mosquito during a blood meal. The asexual division of parasites in the mosquito is termed as sporogonic cycle. While in the mosquitos gut gametocytes are triggered by the fall in temperature and begin the formation of gametes. The microgamete penetrates the macrogamete generating zygote. Soon after the zygotes become motile and elongated structure termed as ookinetes, which invade the midgut wall of the mosquito where they develop into oocysts. The sporozoites emerge from ruptured oocysts make their way to reside in the mosquito salivary glands. Inoculation of these viable sporozoites into a new human host to maintain the malaria life cycle (Figure 1.2) (Bannister, Mitchell, 2003). 1.5 THE PLASMODIUM GENOME SEQUENCE The genome sequences of six Plasmodium species have now been published. The complete sequences of the P.falciparum 3D7 strain and the rodent malaria P.y. yoelii 17XNL clone (Carlton et al., 2002; Gardner et al., 2002) appeared in 2002 and the genomic data of two more rodent malaria species, the P.berghei ANKA clone and P. chabaudi AS clone, were published in 2005 (Hall et al., 2005). Recently, the genome sequences of the human malaria P.vivax Salvador 1 strain and the human/simian malaria P.knowlesi H strain, along with a comparative analysis with P.falciparum, were released (Carlton et al., 2008; Pain et al., 2008). Thus, this genus has the highest number of sequenced species of any eukaryotic organism yet (Birkholtz et al., 2008). Comparative analysis of the publicly of the available Plasmodium genomes revealed that they are all haploid with a standard size of 23-27 Mb, which is distributed among 14 linear chromosomes between 0.5-3.0 Mb in size. The base composition varies among the different species, with the rodent and P.falciparum genomes being extremely A+T rich (80.6% on average and close to 90% in introns and intergenic regions in P.falciparum) in contrast with the more G+C rich P.knowlesi and P.vivax genomes (37.5% and 42.3% respectively) Each Plasmodium genome has in the order of 5000-6000 predicted genes, most of which (51%) contain at least one intron and ~60% are orthologus among the different species (Hall, Carlton, 2005; Hall et al., 2005). The difference in gene number is the result of the differential gene expansion in distinct lineages and the presence of large variant gene families that are involved with antigenic variation (Hall, Carlton, 2005). The unique genes of the different species are o ften localised within the subtelomeric regions and code for immunodominant antigens (Hall, Carlton, 2005). The mean gene length of the three sequenced human malarias (including P. knowlesi) is~ 2.2 to 2.3 kb, compared to the average of 1.3 to 1.6 kb in other organisms (Gardner et al., 2002). The reason for these long gene lengths is not known and this is compounded by the fact that these long genes usually encode hypothetical proteins with unknown function (Gardner et al., 2002). Gene-mapping studies of conserved genes have shown that gene location, order and even exon-intron boundaries have been preserved over large regions across the three sequenced rodent Plasmodium species and P.falciparum(Hall, Carlton, 2005). In addition to the nuclear genome , the parasites also have a liner mitochondrial genome of ~6 kb in the case of P.falciparum , which is smallest mitochondrial genome known (Painter et al., 2007) and a ~35 kb circular apicoplast genome (Gardner et al., 2002). The P.falciparum nuclear genome exhibits minimal redundancy in transfer RNA (tRNA) and encodes 43 tRNAs (Gardner et al., 2002) compared to the ~30 of Homo sapiens (Strachan T and Read A, 1998). The parasite tRNA bind all 64 possible codons except TGT and TGC that both specify cysteine (Cys). As no other codons specify Cys, it is possible that these tRNA genes are located within the currently unsequenced regions , since Cys is incorporated into P.falciparum proteins (Gardner et al., 2002). The small P.falciparum mitochondrial genome does not encode any tRNAs (Vaidya et al., 1989) compared to the 22 tRNA of the circular 16.6 kb human mitochondrial genome (Anderson et al., 1981). The P.falciparum mitochondrion therefore imports tRN As from the cytoplasm , whereas the apicoplast genome encodes sufficient tRNAs for protein synthesis within the organelle (Wilson et al., 1996). The P.falciparum genome does not contain tandemly repeated ribosomal RNA (rRNA) gene clusters as seen in many other eukaryotes, but it contains individual 18S-5.8S-28S rRNA units at loci on seven of the chromosomes(Gardner et al., 2002). The sequence of the particular rRNA genes is distinct in the different units and the expression of each unit is developmentally regulated, depending on the stages of the parasite life cycle It is anticipated that by transcribing different rRNAs at different life stages, the parasite could change its ribosomal properties and the translation rate of all or specific messenger RNA (mRNA), which could alter the cell growth rate or cell development pattern. Previously , the rRNA expressed in the mosquito was described as S(sexual)-type and that expressed in the human host as A (asexual) type(Gardner et al., 2002). Parasite rRNA is also species-specific and can be assessed for diagnostic purposes (Singh et al., 2004). More than 60% of the predicted 5268 ope n reading frames (ORFs) of P.falciparum have no sequence similarity to genes from other sequenced organisms (Gardner et al., 2002). The absence of sequence similarity complicates characterization of the unknown ORFs, but might hold the answer to finding selective drug targets (Bozdech et al., 2003). There is currently a dedicated initiative aimed at improving the annotation status of P.falciparum led by the Plasmodium database, PlasmoDB (www.plasmodb.org). 1.6 Malaria Incidence in Different States of India The malariometric index evaluated as annual parasite incidence (API) indicates the number of malaria cases per thousand of population. As per the National Vector Borne Disease Control Programme (NVBDCP) incidence records, in most part of India, the API was 5 API were scattered in the states of Gujarat, Goa, Rajasthan, Madhya Pradesh, Chhattisgarh, Jharkhand, Orissa, the northeastern states and Karnataka (Kumar A et al., 2007). The proportion of occurrence of P. falciparum and P. vivax differs in various parts of India. Most of the indo-gangatic plains, northwestern India, northern hilly states, and southern state like Tamil Nadu have > 90% P. vivax infections, and the rest are P. falciparum. This situation is reversed in forested areas inhabited by ethnic tribes, where the proportion of P. falciparum is 30-90%. In the remaining areas P. falciparum prevail between 10% and 30%. Although Orissa has a population of 36.7 million (3.5%), it contributed most (25%) of a total of 1.5-2 milli on reported annual malaria cases, 39.5% of total P. falciparum malaria, and 30% of deaths caused by malaria in India (Source NVBDCP, India). Similarly, in the other states, forest ecosystems inhabited by ethnic tribes lives mainly in Figure 1.3 Prevalance of Plasmodium falciparum in India meso to hyperendemic conditions of malaria, where the preponderance of P. falciparum exist upto the extent of 90% or even more (Kumar et al., 2007) (Figure 1.3). 1.7 MALARIA Control and Prevention A global strategy for malaria control was developed by W.H.O. in a ministerial conference at Amsterdam, held in October 1992. The strategy broadly suggests emphasis on diagnosis and treatment in place of earlier trend of emphasis on vector control as a strategy for malaria control. The salient aspects of this strategy were early diagnosis and treatment; prevention of malarial deaths; promotion of personal protection measures like use of ITMs; forecasting, early detection and control of malaria epidemics; monitoring, evaluation and integration of activity in primary health centres; and operational research in field sites. Malaria prevention was classified at the level of personal protection, the prophylaxis and the malaria vaccines. Protective measures adopted at individual level and at family level not only help in protection of the individual against mosquito bites but also prevents spread of malaria in locality. These measures indirectly helped in reducing the mosquito population b y denying the blood meal which is an essential for nourishment of the mosquito eggs in the female anopheles. Protection measures at personal level against mosquitoes includes: Prevention of mosquitoes from entering the house, protection from mosquito bites and prohibiting the mosquitoes from resting inside house. All these prevention activities need the following; i. Protective Clothing ii. Mosquito Repellents iii. Insecticide vaporizers iv. Mosquito nets v. Air conditioning The absence of vaccines necessitates the use of drugs against malaria. All visitors from non-endemic area to a malarious area should have presumptive antimalarial drugs which offer protection against clinical attacks of malaria in that particular malaria endemic area (www.who.int/malaria). The practice of anti-malarial drugs to prevent the development of malaria is known as chemoprophylaxis. The choice of chemoprophylaxis differs depending on the species and drug resistance prevalence in a country. It must be remembered that no chemoprophylaxis regime provides 100% protection. Therefore it is essential to have personal protection from mosquito bites as well as to practice the chemoprophylaxis. Drugs used for chemoprophylaxis include: chloroquine, sulfadoxine, pyrimethamine, atovaquone plus proguanil, proguanil, halofantrine, doxycycline and mefloquin (www.ncbi.nlm.nih.gov/antimalarialdrug.html). The effective way to control any infectious disease is indeed to have a safe and effective vaccine, but even after decades of malaria research, an effective malaria vaccine is still elusive. The major culprit in not having an effective malaria vaccine is complex life cycle of the parasite which involves vector mosquitoes and human. In turn, parasites allelic diversity and antigenic variations make the development and implementation of effective malaria control intervention more problematic. In the present scenario of increasing resistance against antimalarials by parasite and the insecticide resistance shown by the anopheles mosquito, it is evident that an intervention at multiple stages of life cycle will be an appropriate way of combating malaria. Malaria vaccines for different stages of life cycle will therefore play a major role in future malaria interventions. Evaluation of new malaria vaccine candidates in malaria endemic countries is required. The present situation demands suf ficient sites in malaria endemic countries for testing potential malaria vaccines in future. 1.8 Antimalarial drug resistance One of the major control strategies against malaria is prompt treatment of malaria patients with effective antimalarial drugs; however one of the major challenges in the battle against malaria in recent years is the development of drug resistance in the malaria parasites. A continuous research and monitoring is crucial when trying to control and diminish this development. Antimalarial drug resistance in the malaria parasite, both in vitro and in vivo has been related to changes at molecular level in the malaria parasite (P. falciparum and P. vivax).

Saturday, October 12, 2019

Laws of Life :: essays papers

Laws of Life "Each contact with a human being is so rare, so precious, one should preserve it."(Anais Nin). This means that every person one comes in contact with has an influence on his life. One should never forget the people who go out of their way to be nice to them. Influences others have on my life are the most important details of my life. There have been many influences on my life, three of which stand out the most, my laws of life. One influence on my life is people. Miss Haferman is a person who has had a very great influence on my life. She was my first grade teacher. She was the most caring and dedicated teacher I ever had and she respected every student as an individual. On the other hand, she had a very negative influence on my life. She is the person who told me there was no Santa Clause, which ruined Christmas for me for a very long time. Another person who has had a great influence on my life is Mr. Robinson. He was my first band teacher. He is the person who convinced me to join band, which helped me make many great friends and also made school fun for me. He also taught me how to play the clarinet. Now, I love playing the clarinet and it could even get me a scolarship for college. Another influence on my life is incidents. Moving to Tennessee was an incident that was very influential on my life. One way it was influential was losing all my old friends whom I had known my whole life. They were a big part of my life and I still regret ever losing touch with them. Moving to Tennessee was also influential because I had to make new friends, and I became less shy and more outgoing. My friends in Tennessee and my friends in Illinois are very different, but they are all very great people. Another influential incident in my life is going to FCHS. Going to FCHS also caused me to lose some of my friends. Even though I lost those friends, I made many friends who are really nice. I also learned alot about who my real friends are. Society has also had a great influence on my life. Princess Diana had a great influence on my life. One of the great things she did that influenced my life was when she auctioned seventy-nine of her dresses and donated the money to charity.

Friday, October 11, 2019

Elderly Client Project

Elderly Client Project Winston Salem State University Nursing 3303 October 17, 2012 Elderly Client Project Mrs. F. Nowell is a ninety-four year old mother, grandmother and great grandmother living in a skilled nursing facility. She has several co-morbidities which are managed medically and chemically within a detailed nursing care plan. She is diagnosed with type II diabetes, hypertension, coronary artery disease, pedal neuropathy, and arthritis.Within this paper we will explore her age related changes, concept of health and wellness, one chronic disease, diabetes, along with the care and health maintenance associated with this chronic illness, compare and contrast medical/nursing care with current research, health promotion, safety and any special concerns, current resources used and community resources not used, and the clients perspective of her own quality of life. Age Related ChangesWe begin with age related changes which everyone can see externally, however it’s in part, the individual’s concept of these changes that occur over the life span that help define the person’s health. American’s are living longer and Mrs. Nowell is a prime example of this fact at age ninety-four along with her sister-in-law in the same nursing facility at age one hundred and four. Americans over the age of 65 now comprise almost 13 percent of the United States’ population. Mrs. Nowell notes a definite change in her physical body and abilities.However, though now faced with physical mobility limitations, she admits a life satisfaction and is living a happy and productive life. Common age-related changes she’s experiencing are visual acuity or presbyopia for which she wears glasses to assist in ready, very slight hearing impairment or presbycusis, along with hypertension, coronary artery disease and arthritis. Though Mrs. Nowell does have diabetes, she doesn’t associate this chronic disease with normal aging. She stated â€Å"Iâ⠂¬â„¢ve been a diabetic as long as I can remember. Obvious integumentary changes are seen, yet no deep, well defined wrinkles, having not been a smoker, and wore hats to protect her face from sun exposure. Mrs. Nowell does appear to have a slight bit of memory loss because when asked how old her husband was when he died she was unable to recall. However, when asked about her childhood and where she grew up, she recounted very vivid memories. This is typical of the aging adult. The speed with which information is processed, stored, and received is decreased; older memories tend to be intact with new memories being recalled less frequently.What is important to remember about the aging population is while they are experiencing moderate physical limitations, they learn to live with them and lead happy and productive lives, as is Mrs. Nowell. Concept of Health and Wellness Mrs. Nowell’s concept of health and wellness is definitely one of her own perspective. She equates herself to being healthy for a ninety-four year old lady. At ninety-four Mrs. Nowell is mentally healthy with little to no signs of dementia. And because she â€Å"has her mind,† she does not see her physical limitations as making her unhealthy.She envisions wellness and her state of well-being as optimal because with the use of her motorized wheelchair she can come and go as she pleases within the confines of the skilled nursing facility in which she lives, as well as, out in the community. She feels she’s definitely one of the healthiest ninety-four year olds she knows because each day she dresses well, though with assistance, puts on her lipstick and matching jewelry. She states when she looks good, she feels good. Chronic Disease and Care to Improve/Maintain Health Though Mrs. Nowell has several co-morbidities, this paper will focus on her type II diabetes.Diabetes Mellitus is associated with many related health factors of which Mrs. Nowell currently precipitates. She does h ave some visual impairment which is linked with aging, as well as diabetes. She also manifests pedal neuropathy of which she admits to taking Neurontin to alleviate the nerve discomfort and tingling. She lives in a skilled nursing facility where her blood sugar is checked before meals and at bedtime. She is treated with Novalog Insulin in the morning and evening which keeps her blood sugars at a normal range between 80 and 100, and below 150. They ncourage healthy meals and eating, though Mrs. Nowell admits to having family bring in snacks to her liking which are not always on the American Diabetic Association (ADA) food options. The nursing facility also goes to great lengths to ensure meticulous foot care is provided to all diabetics. They inspect their feet when assisting in dressing and showering, as well as, have podiatry perform toenail clipping. Mrs. Nowell does not see her diabetes as a disease, but rather a lifestyle and way of living. Compare and Contrast Medical/Nursing C are and Current Research As previously mentioned Mrs.Nowell’s diabetes is treated with insulin and given a diet per recommendations of the ADA. The nurses perform regular blood sugar checks before each meal and at bedtime, following a regimented nursing care plan to keep her blood sugar below 150. However recent guideline updates recommend that primary care physicians do not push the patients to obtain a standard targeted blood sugar level. The facility nurses also provide education on healthy snacks and exercise programs available to their residents. Because obesity is a major concern and noted problem among the diabetic community daily exercise is recommended for the diabetic patient.However given Mrs. Nowell’s physical limitations daily exercise is minimal at best. Researchers are now giving acceptance to bariatric surgery among diabetics faced with morbid obesity, which has shown rapid blood sugar levels and decreased pharmacological intervention needs. However giv en Mrs. Nowell’s advanced age, she is not a bariatric candidate. Current medical care of Mrs. Nowell includes keeping her hemoglobin A1c below 7% per her primary care doctor and nursing supervision. Yet it is evidenced that the aging adult is more vulnerable to hypoglycemia, and combined with Mrs.Nowell’s cardiovascular disease, recommendations are pointing to an A1c below 8%. The Mayo Clinic also has an online tool developed for diabetics which includes low blood-sugar risks, weight changes, blood sugar testing requirements and costs which help the physician and patient weigh the risks and benefits of diabetic medication therapies. Health Promotion, Safety and Special Concerns Mrs. Nowell’s promotional health needs are met through nursing care provided and maintaining an optimal sense of wellness. Mrs. Nowell’s immunizations are up to date including her flu and pneumonia vaccinations.She receives assistance with activities of daily living (ADL’s) to maintain meticulous skin care and foot inspection to reduce risks of diabetic ulcers. Her diet remains well balanced per the ADA guidelines for optimal nutrition, to further reduce risks of pressure ulcers, which would be of concern with her mobility limitations. She also suffers from incontinence, yet admits to receiving quick response to toileting needs and perineal care. The floors are kept clutter free with no rugs or sliding floormats. The bathrooms are equipped with handrails and emergency call bell pull cords.Showers are large and can be accessed with a wheelchair and have showering chairs for those with mobility limitations such as Mrs. Nowell. Daily use items such as her toothbrush, hairbrush and makeup are kept within easy reach to decrease risk for falls. Mrs. Nowell voiced no special concerns or needs that weren’t being met to her expectations. Current Resources Used and Community Resources Not Used Mrs. Nowells uses the assistance of the occupational therapist that works with the clients of her nursing facility to maintain optimal health and wellness.She has been trained to use a reaching device or â€Å"reacher† which clasps items out of safe reaching range or items she may have dropped and desires to retrieve reducing her risk of falls. Mrs. Nowell takes great pleasure in participating in the community offerings that come to the nursing facility for senior involvement opportunities, such as church groups, entertainment companies, and many local businesses, including restaurants that offer samplings of new menu items. She has participated in numerous provided educational classes and socialization activities for the residents.She also uses the facilities transportation system for group outings and community access. Mrs. Nowell stated they do have a hair dresser that provides services twice a week, however she prefers her daughter, who visits daily, to assist her with her hair care needs. She further does not use their common dinin g area choosing to have her meals in her room or with family when they visit. Yet does frequent the common area for bingo and karaoke for socialization and enjoyed participation. Quality of Life, the Client Perspective Mrs. Nowell considers her quality of life optimal. She finds herself healthy.As with Maslow’s Hierarchy, having her basic needs met, Mrs. Nowell presents with a high self-esteem and self-actualization. She is living a healthy and productive life, exhibiting an exuberant personality. She is still a good mother, grandmother and great grandmother able to enjoy family and friends, while appreciating her life and memories. Conclusion In summary Mrs. Nowell is a wonderful example of an aging population that is well adjusted and reached the highest plateau of hierarchy. As a nurse caring for the elderly, we must be better prepared to assist the aging population to this optimal level of health and wellness.We can achieve this through continued research and provision of age appropriate care. Living happy and productive lives within the elderly population, and given their limitations, be it physical or mental, should be the goal of all nursing. References Anderson, B. , de Chesnay, M. (2012). Caring for the vulnerable: perspectives in nursing theory, practice, and research. (3rd ed. ). Burlington, MA: Jones & Bartlett Learning. Jett, K. , Touhy, T. (2010). Gerontological nursing & healthy aging. (3rd ed. ). Saint Louis, MS: Mosby Elsevier. Khardori, R. (2012, October 8). Medscape references.Retrieved October 14, 2012, from Type 2 diabetes mellitus treatment & management: http://emedicine. medscape. com/article/117853-treatment Resources For Seniors, Incorporated, (n. d. ), Retrieved October 6, 2012, from: http://www. resourcesforseniors. com Seniors Health, (n. d. ), Retrieved October 14, 2012, from: http://medical-dictionary. thefreedictionary. com/Seniors’+Health Winslow, R. (2012, July 9). The wall street journal. Retrieved October 14, 20 12, from New strategies for treating diabetes: http://online. wsj. com/article/SB10001424052702303292204577517041076204350. html

Thursday, October 10, 2019

Carrefour Case Analysis

The purpose of this analysis is to highlight how Carrefour has financed its growth over the last four years i. e. 1968 through 1971 with the help of the Statement of Sources and Uses (Exhibit 1). In addition, the financing needs for the projected growth of the company will be reported and analyzed briefly. For this purpose Pro-forma Income Statements (Exhibit 2) and Pro-forma Balance Sheets (Exhibit 3) have been prepared for the next four years (1972 through 1975). From 1968 to 1971, Carrefour has used trade notes extensively as a source of cash. Other significant sources of funds are Other Current Liabilities, Accounts Payable, Shareholder's Equity and Long term debt. Most of the sources have been utilized to fund Building and also to generate more cash for the firm. A good portion of the sources have also been used to create more Inventories from 1968 to 1971. Land has been acquired during these four years as also other fixed assets and current assets. As is seen from the Pro-forma Balance Sheet, Carrefour would have to take significant amounts of Long Term Debt(at 10% Interest rate) in order to finance its expansion outside France. According to the projections, LT Debt would have to be increased to around 89% from 1971 to 1972 and 96% from 1972 to 1973 respectively. This means Carrefour would also have to pay huge amounts of interest on these debts. With revenue growth of 35% Carrefour would be able to support its debt and still earn fair amounts of profit including dividend payouts. However, huge amount of debt and interest expense might be risky and could lead to negative earnings if the actual revenue growth falls below the expected value of 35%. Exhibit 1 CARREFOUR STATEMENT OF SOURCES AND USES – 1968 to 1971 | |Â   |1968 |1971 |Change |Source/Use | |Intangible Assets |0 |1 |1 |Use | |Land |14 |28 |14 |Use | |Buildings & Equipment |50 |202 |152 |Use | |Other Fixed Assets 21 |49 |28 |Use | |Total Fixed Assets |85 |279 |194 | | | less: Depreciation |10 |63 |53 |Source | |Net Fixed Assets |75 |216 |141 | | |Investments & Advances |5 |19 |14 |Use | |Inventory |30 |107 |77 |Use | |Acounts Receivable |2 | 4 |2 |Use | |Other Current Assets |58 |124 |66 |Use | |Cash |18 |151 |133 |Use | |Total Current Assets |108 |386 |278 | | |TOTAL ASSETS |188 |622 |434 | | | | | | | | |Shareholders' Equity |39 |112 |73 |Source | |Special Provisions |0 |1 |1 |Source | |Long-term Debt |26 |64 |38 |Source | |Accounts Payable |0 |77 |77 |Source | |Trades notes (noninterest) |100 |244 |144 |Source | |Other Current Liabilities |23 |124 |101 |Source | |Total Current Liabilities |123 |445 |322 | | |TOTAL LIABILITIES & EQUITY |188 |621 |433 | | | | | | | | |Master Check(Sources-Uses) |Â   |Â   |0 | | Exhibit 2 CARREFOUR PROFORMA INCOME STATEMENT |Past 3 yr avg of % of sales taken for| | |all items except Revenues and Int | | |Rates | | |Actual | |Actual |Actual |Actual |Actual |Pro Forma |Pro Forma |Pro Forma |Pro Forma | | | |1968 |1969 |1970 |1971 |1972 |1973 |1974 |1975 | | |Intangible Assets |0 |4 |1 |1 |5 |7 |9 |12 |0. 004 |0. 001 |0. 000 |0. 002 | |Land |14 |20 |25 |28 |50 |67 |90 |122 |0. 020 |0. 017 |0. 013 |0. 016 | |Buildings & Equipment |50 |82 |136 |202 |266 |359 |485 |654 |0. 080 |0. 094 |0. 090 |0. 88 | |Other Fixed Assets |21 |38 |52 |49 |95 |129 |174 |235 |0. 037 |0. 036 |0. 022 |0. 032 | |Total Fixed Assets |85 |140 |213 |279 |411 |555 |749 |1011 | | | | | |less: Depreciation |10 |22 |35 |63 |97 |142 |204 |287 |0. 100 |0. 069 |0. 112 |0. 094 | |Net Fixed Assets |75 |118 |178 |216 |314 |412 |545 |724 | | | | | |Investments & Advances |5 |10 |12 |19 |27 |36 |49 |66 |0. 010 |0. 008 |0. 009 |0. 009 | |Inventory |30 |65 |72 |107 |162 |219 |295 |399 | | | | | |Acounts Receivable |2 |2 |3 |4 |6 |8 |11 |14 |0. 002 |0. 002 |0. 002 |0. 002 | |Other Current Assets |58 |50 |75 |124 |157 |212 |286 |386 |0. 049 |0. 052 |0. 056 |0. 052 | |Cash |18 |51 |116 |151 |199 |268 |362 |489 |0. 050 |0. 080 |0. 068 |0. 66 | |Total Current Assets |108 |168 |266 |386 |524 |707 |954 |1288 | | | | | |TOTAL ASSETS |188 |300 |457 |622 |870 |1162 |1557 |2090 | | | | | | | | | | | | | | | | | | | |Shareholders' Equity |39 |89 |98 |112 |206 |278 |375 |507 |0. 087 |0. 068 |0. 050 |0. 068 | |Special Provisions |0 |0 |1 |1 |1 |2 |2 |3 |0. 000 |0. 001 |0. 000 |0. 000 | |Long-term Debt |26 |25 |64 |64 |121 |237 |393 |605 | | | | | |Accounts Payable |0 |48 |61 |77 |124 |168 |226 |305 |0. 047 |0. 042 |0. 034 |0. 041 | |Trades notes (noninterest) |100 |79 |147 |244 |244 |244 |244 |244 | | | | | |Other Current Liabilities |23 |59 |86 |124 |173 |234 |316 |427 |0. 058 |0. 060 |0. 056 |0. 058 | |Total Current Liabilities |123 |186 |294 |445 |542 |646 |786 |976 | | | | | |TOTAL LIABILITIES & EQUITY |188 |300 |457 |622 |870 |1162 |1557 |2090 | | | |