Thursday, October 31, 2019

Salvador Dali's History Backriound Essay Example | Topics and Well Written Essays - 500 words

Salvador Dali's History Backriound - Essay Example The essay "Salvador Dali's History Backriound" aims to analyze Salvador Dali's background. Salvador Dali is a Spanish painter. His parents had a strong influence on his development and artistic practices as his father’s strict disciplinarian approach contributed to Dali’s structured pursuit of art, while his mother’s creative nature influenced his artistic process. In 1926 he would leave Spain and move to Paris, where he came into contact with Pablo Picasso. While Dali had experimented with Cubist methods during this time in Madrid, it was clear that he did not fully understand the genre. During the next few years Dali would produce work heavily influenced by Picasso and fellow surrealist Joan Miro. Dali would then go on to combine a broad variety of influences into his work. Among these influences included academia, classical and modernist techniques, as well as recent psychological explorations by psychoanalyst Sigmund Freud. Through World War II and his later life Dali would increasingly focus on his unique approach to surrealist art. When examining Dali’s art it’s clear that there are a number of notable elements related to subject matter, content, meaning, and iconography. One notes that in examining Dali’s art within this context of understanding that his work has shifted during different periods of the artist’s life. Still, throughout these periods Dali implemented characteristic forms of oil on canvas in constructing his works. He became primarily interested in exploring abstract notions.

Tuesday, October 29, 2019

In what ways wining Ca state lottery makes you bad Essay

In what ways wining Ca state lottery makes you bad - Essay Example This weakens their mental concentration towards their studies, and this will shamble their academic performance. It is also factual that many students after winning lottery money they are subject to poor financial management and this often cause them more psychological stress hence devastating their academic progress. Empirical research also shows that many college students who become millionaires due to lottery money have the high tendency of quitting their studies and embark on ill-advised investments. Consequently, some students end up in debt, and this may cause them being hospitalize due to the depression they undergo as a result of shock. Disparagingly, they come to realize their mistakes after exhausting the money; rather too late for any rectification action to be taken. What’s more, recent reports have found that students who win lottery money lose trust with almost everybody including their colleagues, family members, and even their teachers. It is true that winning the big top prize could be hard to trust anyone or any new person. Consequently, one’s safety is compromised. Additionally, college students who win the big Jackpot tend to become more vulnerable, unlike before. This is because the money they possess may make them be kidnap, or even be killed, and this will automatically make the winner uncomfortable. While lottery money helps a student to cope up with college life by empowering them financially, it ruins students by giving them enough cash to engage in drug abuse, and this money may transform these students to drug dealers. Therefore, this may cause them their live such as being killed or lifetime imprisonment for violating the state’s constitutional declarations. Therefore, if a student winning lottery money is not monitored, they may use the money to ruin their life and even the life of others. From the above elucidations, it is ostensible

Sunday, October 27, 2019

Implementing a Supply Chain Management System

Implementing a Supply Chain Management System Advantages and Disadvantages of Implementing a Supply Chain Management System A Supply Chain Management system is an information system which integrates the primary inbound logistics business activity. Supply Chain Management system supports inbound and outbound logistics procurement as well as procurement support activities. Supply Chain Management systems support three basic processes which are source, purchase and settle; because Supply Chain Management systems support the three basic processes the process itself of the supply chain has become faster and more efficient. One advantage of implementing a supply chain management system within an organization is that it has expanded supply chain speed which is the dollar value of good exchanged in a given period of time; this allows for companies make their processes quicker and more efficient. Another advantage for implementing a Supply Chain Management is that the Supply Chain Management System enables both the supplier and the customer to reduce the size of inventories therefore reducing inventory costs which in the long run will assist the company grow because they are keeping their costs low. This reduction in inventory costs is possible because the speed and the efficiency provided by information systems enable processing of small orders fast. SCM Systems also help improve delivery scheduling this occurs because the suppliers are able to deliver materials and components at the time and sequence needed this enables just-in-time inventory which allows manufacturers to reduce raw materials and handle of raw materials. SCM Systems also are an advantage because it creates processes to achieve strategies. The SCM Systems are mainly developed for support for business processes which assist organizations achieve competitive advantage over other companies as well as helping to avoid creating systems that are unrelated to organizations strategy. The last advantage of a SCM system is it fixes bullwhip effect which is the tendency of consumers to buy more than they would need in the immediate fu ture. The disadvantages to implementing a Supply Chain Management System are that it can be expensive and difficult for some employees to learn. While some employees want change and are not reluctant to modifications to their current system many other employees will resist the change; which would result in the organization having to deal with this which can drive costs of implementing such a system even higher. Another reason implementing a SCM System is a disadvantage is because for some organizations it may require them to change substantially because their current system is very basic; therefore, implementation of such a highly advanced system could change the organization considerably. If a company grows significantly, such as NIKE did, then SCM can become a hindrance because the company grows and the system could become irrelevant towards the companys main objective. An additional drawback of implementing a SCM System is that there could be a lack of appreciation for the system just a s there was for NIKE; this is based on the statement made by the Nike CIO, Gordon Steele, he thought that that this system would have been an easier solution for the problems Nike was facing but in essence it turned out to much more complicated. Another disadvantage for implementing a SCM System is that even though a company may think that they have trained their employees enough, the reality of this can be that there is never enough training available, which Nikes CIO stated again. Options for Acquiring a SCM System Companies must first acknowledge that there is a problem with their organizational system. In the case, Nike sensed that there was an issue with their current business model in that it focused on centralization but increasingly became more and more decentralized. Its only option was to acquire a SCM system to create greater supply chain visibility. They were to find vendors by shopping around for SCM systems and the organizations that program them. So they had to search for information on how to solve their problem. Nike understood that they had to quickly and accurately analyze the impacts of proposed SCM . Business should use information to evaluate alternative brands in the choice set and assess the capabilities of each. Negotiation of the terms and conditions would follow. The purchase decision follows and the business decides to buy the program. Nike addressed this issue by implementing SAP ERP in conjunction with i2 software to be its information system. The final step is the post purchase evaluation in which the company takes further action after the purchase based on their satisfaction or dissatisfaction. The advantages of each option: Reduce costs of buying and selling, increases supply chain speed, reduces size and cost of inventories, and improves delivery scheduling. This disintermediation that occurs when eliminating the middle layers in the supply chain will increase market efficiency. The disadvantages of each option: Technology and user training. Raw Material Purchasing Process In order for there to even be a raw material purchasing process there must be a supply chain for which the raw materials get transferred through. A supply chain is considered a network of organizations/facilities that transform raw materials into products delivered to customers. The main purpose of a raw material purchasing process is for a company to be able to successfully transfer raw materials into intermediate goods which can then be transferred to finals good and delivered to the customer; this is all done to ensure that the customer gets the service as efficiently and prompt as possible. The processes itself is started once the customer realizes that there is a need or want for a product. The customer then places an order for their service through the retailer. The retailers then in-return must order from the distributors that would dispense to the retailers. The distributers are then required to order from the manufactures that develop or create the product but in order for the distributers to develop or create the product they have to order the supplies from the suppliers that they receive their materials from. The suppliers are the ones with the original raw material. Once the supply chain is complete from the customers realization up to the suppliers being notified of the raw material being needed all items are delivered and the suppliers payment goes through the same process; retailers get paid by customer the retailers pay the distributors distributors pay manufactures-manufactures pay supplier. Potential Pitfalls in Implementing a SCM System The increasing outsourcing that occurs is one of the potential pitfalls that may be Encountered when implementing a supply chain management system. Shrinking product lifecycles, intensifying economic pressures, and constant changes in supply, demand, and product make supply chain optimization harder than ever. Existing systems generate plans that become obsolete the moment theyre finished, while spreadsheets and ad hoc databases lack the visibility and collaborative capabilities organizations need to swiftly and effectively monitor and respond to change. Another downfall encountered is that user training must be administered and completed before implementing a supply chain management system. Major Tasks that need to be Completed Evidently Nike has not spent enough time and effort in implementing their supply chain process to coincide with the organization. Which is why they now must purchase a new SCM system, but before implementing this new system, major tasks must be done in order for it to work efficiently. A successful SCM System requires a change from managing individual functions to integrating activities into key supply chain processes. Supply Chain Management entails coordination and configuration of the process that is necessary to make products available in a timely, reproducible and pleasing manner. Nike must first come up with a strategy for managing all the resources that go toward meeting customer demand for their product or service. A big part in Supply Chain Management, that Nike failed to strive in, is monitoring the supply chain so that it is efficient, costs less and delivers high quality and value to customers. As Nike grew and times changed, their central control became more centralized leading them to 27 different order managements systems worldwide. This clearly has led to their downfall, and evidently Nike must look over and choose suppliers to deliver the goods and services they need to create their product. Supply chain managers must develop a set of pricing, delivery and payment processes with suppliers if not satisfied with the original and also create a better system for monitoring and improving their relationships. The manufacturing step is most important because this is when supply chain managers schedule the activities necessary for production, testing, packaging and preparation for delivery. Nike must develop a proper procurement process, this is important because Nike extends globally. This is the process of strategic plans made with suppliers to support the manufacturing flow management process and the development of new products. Procurement delivers the responsibility for assuring the quality of purchased raw material/services and linking supplier operations to distribution through manufacturing activities. This step allows for measurement of quality levels, production output and worker productivity. Nike must ensure that the manufacturing processes are flexible to respond to market changes and accommodate mass customization. The product development and commercialization must be looked at as well because it is such a lengthy task. Customers and suppliers must be combined into the product development process in order to reduce time to market because the appropriate products must be developed and successfully launched with shorter time-schedules to remain competitive. If Nike is to attain competitive advantage, then their ultimate aim should be to achieve supply chain excellence before their competitors do. What Nike realized, later than other companies, is that the most important assets to an organization are their employees and consumers. Steele quotes You can never train enough which is only the truth. To ensure that this new system is successful the employees must all need to know how to use work with the system. Hence this is why Nike has now made training an important part of business. As important is the customer service management process; an organization that strives to be successful should use the following steps to build customer relationships: determine mutually satisfying goals for organization/customers establish and maintain customer relationship, and produce positive feelings in the organization and the customers. We all know companies like Nike exist to serve their consumers; hence they must find a clear and concise way of knowing exactly what their consumers want and passing that information through the supply chain to the suppliers correctly.

Friday, October 25, 2019

Mexico and the Quest for Economic Improvement :: Free Essays Online

Mexico and the Quest for Economic Improvement Karl Marx once stated, â€Å" A commodity appears at first sight, a very trivial thing and easily understood. It’s analysis shows that it is in reality, a very queer thing, abounding in metaphysical subtleties and theological niceties.† Ironically, Marx would have never anticipated the conflict over queer space that I am going to detail. The commodification of Aguascalientes, Mexico has been nonetheless a very queer thing indeed. The space in Aguascalientes has been torn apart by competing ideals surrounding sexuality and gay and lesbian identity, yet both sides in this competition have a common interest: selling a specific commodity—namely, the space of Aguascalientes In September 2000, Mr. Jorge Alvarez Medina, the Director of Regulations of Aguascalientes, in the Mexican state of Aguascalientes, publicly announced his opposition to gays, lesbians, and transgender people. He stated that he will â€Å"not allow ‘this type of people’ access to any public facility or allow them to work in the public sector.† Medina also claimed that Aguascalientes needed to portray a cleaner image to the public. Many LGBT and human rights organizations claim this act to be â€Å"prejudiced, corrupt, and violent.† The order made by Medina is also a threat to Article 7 of the Universal Declaration of Human Rights, which states, â€Å"All are equal before the law and are entitled without any discrimination to equal protection before the law.† This is only one of the many events that have occurred in Aguascalientes pertaining to gay, lesbian and transgender relations, where, according to some estimates, there are more than 12,200 gays (more than 10% of overall population). By analyzing these statements made by Medina, many questions arise. If Medina is tying to portray a â€Å"cleaner image† in the city of Aguascalientes, for whom is this image? Curiously the Mexonline website gives Aguascalientes a different reputation, contradicting Medina’s biased proposal. The Mexonline website gives its audience the impression that Aguascalientes has a very accepting and diverse society. The website states, â€Å" Aguascalientes is well positioned to mull full-steam ahead into the 21st century. We are well aware that our future rests on our export capacity. World business leaders, who have already located in the state, share our vision and, together with our local business community, our industrious labor force, and our imaginative policy makers, have joined hands and laid the foundation for a prosperous and happy society in this, ‘the state of friendly people.

Thursday, October 24, 2019

Kurt Vonnegut’s Slaughterhouse Five

Kurt Vonnegut has written something that has captured the imagination of generations. His novel is entitled â€Å"Slaughterhouse Five.† This novel has put into use what the literary world call as dark comedy, also known as black comedy. Dark comedy is basically a sub-genre of comedy that has satirical elements. This sub-genre typically tackles serious topics like death, war, rape, and the likes with wit and humor. I have selected three scenes of which Kurt Vonnegut displayed his talent in using dark comedy to hook his readers. The first scene that I’ve picked is that where the arguable protagonists Billy Pilgrim and the unlovable fat soldier Roland Weary were captured by enemy troops. Those enemy troops who had captured them were not regulars. They were merely using equipment collected from dead soldiers. When the novel was first read by the public, they could have just thought that this was fiction. Maybe they weren’t aware that this is a reality in war. Equipment from the dead is considered free rations since there will always be shortages in wars. What the author had done here is that with all the dark comedy packed into this novel, he had squeezed in bits of reality. The dark comedy there is that as readers we were caught off guard that we were already laughing at something that is brutally happening in reality. It could also be that the author is in favor of stripping the dead off their possessions since those things would only be beneficial to those who are still alive. The next dark scene that I’ve picked is where the Valencia, the overweight wife of the arguable protagonist Billy Pilgrim, died because of carbon monoxide poisoning. She was already on her way to see his husband. Then the unfortunate happened, or Kurt Vonnegut’s dark comedy made it happen, she died of carbon monoxide poisoning inside her car. The author had constructed the scene as if the death of Valencia didn’t invoke sad emotion at all. Again, I believe that the function of this is to show what is happening in reality. We don’t need statistics to prove that there are countless wives out there who are left by their unfaithful husbands. But then, this dark humor could also be targeted to those who have eating and weight issues. The author may have wanted to show that most overweight bring the problem upon themselves because just like Valencia, they can’t stop eating. This could be the author’s answer to why are there such a number of miserable people in this planet. It is because we cause our own problems. The last dark scene that I have chosen is when the prisoners of war were assigned to the dreadful task of digging up the graves for a lot of dead bodies after the town of Dresden was bombed. It was such an awful sight that one of those who were digging the graves threw up from the bad smell. He threw up so bad that he died. Again, there is no word that can perfectly describe the scene than dark comedy. The author had beautifully used the elements of dark humor, wit and irony. It is such an irony that the ‘dead’ is in a sense free from the toils of being alive and stuck in a war. That scene also shows that people can be pushed to do even the things that they won’t imagine themselves doing. Anyone will succumb when there is a gun pointed to you and your loved one’s. All in all, the author had used dark comedy as a hook that has kept his readers turning the pages. Dark comedy also evokes a certain weird combination of the effects of entertainment and disgust. Work Cited Vonnegut, K. Jr. Vonnegut, J. Slaughterhouse Five. NY: Tandem Classic Books. 1999.

Wednesday, October 23, 2019

Judith Beveridge’s Poetry Essay

An inherent tension between nature and the material world is revealed in the imagery of Judith Beveridge’s poetry. Discuss the significance by referring to three poems. Judith Beveridge poetry reveals an inherent tension between nature and the material world. She questions human’s ability to understand and be connected to nature, examines human’s destructive power over nature and demonstrates the changing nature of the world from natural to materialistic. This is represented in her poems, Mulla Bulla Beach, Fox in the Tree Stump and Streets of Chippendale. Judith Beveridge’s poetry examines the ability of humans or the materialistic world to be interconnected with nature. In the poem Mulla Bulla Beach she examines a human’s ability to be part of nature, particularly from an outsiders perspective. She states â€Å" A new world to me, but familiar†, demonstrating how she can be related to nature. She also examines an insiders perspective on the beach, in particular the fisherman, stating â€Å" who are born hearing the sea always there† She examines how the fisherman have become part of the natural rhythm demonstrating how humans can be part of nature, and the tension between the material world and nature does not need to exist. She uses many similes to link humans or human objects to nature for example â€Å"Jellyfish clear as surgical gloves† and â€Å" tide winded shells pacing quietly as shore runners†. These similes demonstrate how humans can not only understand but also be part of the natural rhythm. This is also seen in Judith’s poem, The Fox in a Tree Stump. Judith examines how the child feels a connection to the fox and its innocent nature stating, â€Å" Fox hairs of dust sweated in my palms† although, this connection does not overpower the fear of her uncle, so she kills the fox. This demonstrates that although humans may feel connected to nature although this does not prevent them from destroying aspects of nature. Judith Beveridge examines the inherent tension between nature and the material world by examining a human’s ability to understand nature.

Tuesday, October 22, 2019

Ansoffs growth-vector matrix For CIC Holdings Essays - Economy

Ansoff's growth-vector matrix For CIC Holdings Essays - Economy Ansoff's growth-vector matrix For CIC Holdings Figure SEQ Figure \* ARABIC 1 Ansoff's Growth vector matrix Market penetration isthe safest of the four options. Here, the company should focus on expanding sales of its existing product in its existing market. CIC can develop new strategies, to encourage more people to choose the company's product or use more of it. As CIC is in the agricultural industry, where consumers purchasing it uses the product in the kitchen, CIC could develop new strategies such as including kitchen utensils for free e.g.: spoons, cups etc. that would draw the customers attention into purchasing the product as they could save money from purchasing those extra utensils. Another strategy CIC could use is by adding extra product into their packaging e.g.: adding 200g extra to their 2kg package of rice and mentioning "extra 10%" in the packaging to make consumers aware of the extra included. More of the product with the same prices of the competitors would draw attention from buyers to purchase the product.(Mindtools.com, 2016) Product development is slightly more risky, because you're introducing a new product into your existing market. Here, the company is selling different products to the same people, who are already aware and have tried previous products of the company. When a product is there for a long time in the market, people might get bored of it, perhaps changing the packaging of the product by repackaging it with a more attractive package could change the customer's interest. Another technique CIC could use is by extending its product by producing in different variants such as producing Yogurts in different flavors instead of one, which allows customers to make choices within the same company's products. Market development, you're putting an existing product into an entirely new market. You can do this by finding a new use for the product, or by adding new features or benefits to it. There are many methods that CIC can use when it comes to market development. As CIC distributes its products to customers via agents and intermediaries, CIC could come up with new methods such as by having direct sales and by having Online sales to reach wider markets. When it comes to online sales, CIC could develop its own Smart phone app to enable customers to purchase products and get the goods delivered to their door step. With the amount of people having smart phones today with the touch of a screen, consumers can expect their goods to be delivered without any hassle. This way CIC could grab the market filled with lazy people and people who are too busy to walk up to a supermarket to purchase anything. Diversification is the riskiest of the four options, because you're introducing a new, unproven product into an entirely new market. This strategy is risky: there's often little scope for using existing expertise or for achieving economies of scale, because you are trying to sell completely different products or services to different customers. E.g. CIC could start manufacturing clay pots and sell it to the people in India. (Mindtools.com, 2016) Directional Policy Matrix List of Industry Attractiveness The GE / McKinsey matrix is a model used to assess the strength of a strategic business unit (SBU) of a corporation. It analyzes market attractiveness and competitive strength to determine the overall strength of a SBU. The GE matrix consists of two axis, the x axis which represents competitive strength of the business unit and y axis which represents the industry attractiveness of that unit. In order for a business to use the GE matrix, the business should first consider or list down the factors under each axis the competitive strength of a business unit and for the industry attractiveness. Basically what the industry attractiveness is, is the market attractiveness which deals with certain external factors of the business. There are several factors under industry attractiveness, but CIC should choose only the ones related to its industry. Factors under industry attractiveness include market size, market growth rate, and market profitability, industry structure, market segmentation and trend of prices. (Jurevicius, 2016) Competitive strength focuses on internal factors and the ability of the SBU to overcome specific issues with the market andcompetitors. Internal

Monday, October 21, 2019

Analysis of Walden, by Thoreau, using Stylistic Devices

Analysis of Walden, by Thoreau, using Stylistic Devices In Walden, Thoreau uses techniques to convey thoughtful reflection and unwavering confidence towards his actions and convictions. By contemplating his past ventures and personal beliefs, he urges the reader to take specific paths in life with a strong and forceful credibility.Thoreau's use of syntax expresses his philosophical yet audacious approach towards his quest to live simply and without superfluous needs. The semicolons and commas in the first sentence of paragraph four string together his descriptive memories of the Hollowell farm in a long and drawn out manner. The recollections tumble from his mind directly into his pen, causing the sentence to reflect his stream of rushing thoughts at a quick but steady pace. He fondly recalls the exact state and condition of every aspect of the farm, using commas to gracefully fit them into the sentence. In sentence four of paragraph ten, Thoreau deviates from his lengthy, pensive sentences to a short, repetitive exclamation stating, "Sim plicity, simplicity, simplicity!" Instead of using eloquent and extensively written phrases to urge his readers to live a life of abnegation, he resorts here to a curtailed, but powerful statement that summarizes his dominant exhortation with a passionate fervor.Original title page of Walden featuring a picture ...Such repetition reinforces his earlier passages in which he urges the reader to live without excess, revealing his confidence and therefore allowing his persuasion more authority.Thoreau's use of diction allows the reader to understand his cogitative aversion and distaste towards the material world that is full of exorbitant and unnecessary goods. Life within such a society is "petty" and "fluctuating," and human improvements are "external and superficial." He is critical of America, for its states are constantly bickering over boundaries and other trivial and foolish concerns. Men concern themselves with constant building and constructing, work he believes to be unnecessa ry for...

Saturday, October 19, 2019

Big Time Toy Maker Essay Example for Free

Big Time Toy Maker Essay Chou and BTT had a contract at the point they agreed to all the terms. By including the obligations of the parties and the terms of the agreement, the manager showed objective intent. A written contract was not necessary since this was a contract primarily dealing with services to distribute the game, not a production contract or a sales contract. Had it involved a goods contract to buy or sell, which under the Statutes of Frauds would not be a contract until all the terms were laid out in writing; that occurred when the manager from BTT emailed the terms which would have included his electronic signature and thus would have sealed the contract between the two. Also, if the contract is under common law, then the mailbox rule would say it went into effect when it was sent, not received. What facts may weigh in favor of or against Chou in terms of the parties’ objective intent? There are a few facts that weigh in favor of Chou. First, three days prior to the end of the 90 day exclusive negotiation rights agreement, they reached an oral agreement and then shortly thereafter, a business email from a BTT management representative was sent to Chou with the specifics of the agreement. The email stated â€Å"that all of the terms had been agreed upon. † BTT also subsequently requested Chou to send them a draft distribution contract spelling out the specifics of the agreement that the email from the BBT manager sent to Chou. Finally, distribution of Strat would have exceeded the 500. 00 limit (Amended UCC  § 2-201(1)) of the Statute of Frauds. The fact that may weigh against Chou is that the contract never had an actual signature on it. Does the fact that the parties were communicating by e-mail have any impact on your analysis in questions 1 and 2? Yes, communication via email in today’s business world is considered a normal mode of business communication. The UETA, the Uniform Electronic Transaction Act states that electronic correspondence is a valid form of communications while conducting business, and that electronic signatures and documentation satisfy the need for written records or signatures. When the terms and specifics of the agreement were laid out via email and both parties agreed upon the agreement through email, it then became a written agreement, and therefore enforceable. What role does the statute of frauds play in this contract? None, since it is a services contract for distribution rights. The Statute of Frauds only comes into play if it is a goods contract. If it is deemed by the court to be a goods contract then the written requirement, the all terms included requirement and the signed by the sender all have been met by the email with its electronic signature of the manager representing BTT. Could BTT avoid this contract under the doctrine of mistake? Explain. Would either party have any other defense that would allow the contract to be avoided? No, since a mistake is required to involve a â€Å"basic† assumption involving the terms on which the contract was made. BTT would not try to argue that they were mistaken on the price, time frame and obligations of both parties since their manager had sent an email stating that both parties where in agreement in all those areas. Generally, in the absence of disagreement on one or several of the essential terms, the courts will not allow a unilateral Mistake to be considered and expects mutual mistake. Chou might try to avoid the contract if he had a better offer he could just let the matter be dropped since BTT wanted out of the contract Assuming, arguendo, that this e-mail does constitute an agreement, what consideration supports this agreement? Chou would benefit by having his product distributed for sale throughout the network of retail and wholesale outlets that BTT as a board game company had at their disposal. BTT would benefit by charging their cut for distributing the game to these outlets. At the end of the scenario, BTT states that it is not interested in distributing Chou’s new strategy game, Strat. Assuming BTT and Chou have a contract, and BTT has breached the contract by not distributing the game, discuss what remedies might or might not apply. Compensatory damages – Chou could recover actual out of pocket which may include the original $25,000 due to BBT not acting in good faith but would also include loss of estimated potential profits. b. Specific Performance – Since this is a services contract the court may order BTT because of their total breach to fulfill their obligation to distribute the game OR substitute performance under the doctrine of accord and satisfaction where they might agree to product the game instead of distribute it OR they could agree to a discharge through novation where BTT finds an acceptable 3rd party who agrees to distribute the game. . Delegation – BTT could substitute another company to distribute the game but as delegator BTT would still be liable if their delegate failed to perform. d. Injunctive Relief – The court could issue and injunction forbidding BTT from distributing a similar game, producing a similar game or financially benefiting from a similar game to pr otect Chou from suffering due to their intimate knowledge and trade secrets relating to the disclosures during initial negotiations. Big Time Toy Maker. (2018, Oct 23).

Friday, October 18, 2019

Leadership style or skills and Nursing Faculty Research Paper

Leadership style or skills and Nursing Faculty - Research Paper Example Likewise, the local colleges and universities are also being challenged on how they can effectively increase the overall quality of As a common knowledge, the use of poor leadership style will increase the risk of high employee turnover rate. Instead of being able to encourage more registered nurses to become a nurse educator, having an ineffective leadership skill will not only discourage our future registered nurses to start a career in nursing education but also lead to the development of a poor nursing educational programmes. For this reason, it is very important for all nurses to fully understand all factors that will contribute to an effective leadership style. By doing so, our future nurses will be able to help reduce the shortage of nursing faculty staff (Royal College of Nurisng, 2010, p. 10). The common challenges that most of our nursing faculty leaders are experiencing include recruitment and retention of highly competitive nursing educators (Laschinger et al., 2009). It is important to provide the faculty members with opportunity to participate in a leadership training programme. Failure to do so can make the nursing faculty leaders more dissatisfied and burnt-out with their overall job requirements (Laschinger et al., 2009). By continuously improving the effectiveness of nursing faculty staff recruitment strategies, the leaders of nursing faculty can gradually improve its employee retention rate. To do so, several studies strongly suggest that the leaders of nursing faculty should focus on identifying ways on how they can help them create a healthy and attractive work environment for all registered nurses who wish to pursue a career in teaching (Weberg, 2010). To create a healthy and attractive work environment, the leaders of nursing faculty should be able to improve their leadership skill (Casida and Parker, 2011). Through the use of effective leadership style, the leaders of nursing faculty can easily increase the overall job satisfaction

The Fundamental Causes of the Womens Movement Essay

The Fundamental Causes of the Womens Movement - Essay Example In the 1960s, the National Organization for Women fought the good fight to bring women's rights and equality for all to the forefront, while at the same time some women, like Phyllis Schlafly, were very vocal against feminism and women's movement. Nonetheless, reformers have made great strides towards equality in society today, both in the workplace and within the home. The proverbial "glass ceiling" that keeps women from substantial promotions in the workplace still exists, and there are definite strides to be made, however, as time passes and outdated ideals and beliefs are shattered, total equality for women may be just a short distance down the road. The women's rights movement began in the first half of the nineteenth century. From the emergence of the suffrage movement in the 1850's until women obtained the right to vote in 1920, suffrage became the primary goal of the women's rights movement. Suffrage included a set of grievances such as unequal wages, inequality at work, unsanitary working conditions, and limited job options. This movement also targeted the suffering of the non-working woman as well, such as married women's property rights and the suffrage of women overall. This led to the first women's rights convention held at Seneca Falls, New York in 1848 (Baker 24). An outspoken proponent of women's rights was Francis Wright who gained prominence within the women's movement in the late 1820's as a colorful, sensational speaker. She spoke out against slavery and also believed that marriage was a coercive institution and advocated replacing current laws on marriage with a non-legal bond called "generous attachment", based only on mutual respect and love and not regulated by any legal authority (24). Because she was a woman, her speeches were considered radical and improper and her detractors labeled her a "Red Harlot" along with any other woman who followed her or attended her lectures (25). Frederick Douglas, a well-known reformer within the anti-slavery movement, was also a staunch supporter of women's rights, and as early as 1848 demanded the vote as an essential right of women (42). Furthermore, Susan B. Anthony, an American civil rights leader, played a pivotal role and wrote often about the women's suffrage movement. In her writings, many t imes she equated the women's movement with the anti-slavery movement. She stated: the 'Woman Suffrage Movement,' was the Anti-Slavery struggle (31) Anthony was also a paid agent of the American Anti-Slavery Society as well as a suffragist (42). In 1875, a major court case, Minor v. Happersett, arose out of the quest to vote by a woman named Virginia Minor. She attempted to cast her vote in St. Louis and the registrar, Happersett, refused to permit her to do so. Minor was the president of the Woman's Suffrage Association of Missouri and her husband was a prominent attorney. They sued the registrar for denying her what they believed was her privilege and immunity of citizenship. The court in Minor v. Happersett decided against her and Minor appealed her case to the United States Supreme Court. The Supreme Court ruled that if the founders wanted to include suffrage in the constitution, it would have been explicitly stated. The Court refused to interpret the constitution any other way and decided that

The Role of Consumer Behavior in Marketing Decisions Research Paper

The Role of Consumer Behavior in Marketing Decisions - Research Paper Example It is through such understanding that they grow up to become effective buyers and at the same time of the best products in the market (Wayne & Deborah, 2009). This will help avoid impulse buying among consumers hence invest in well. A good consumer should be able to portray the three major characteristics of a consumer namely a user, payer and buyer. This implies that relationship marketing is a vital aspect in the market decisions that are reached at by a buyer. Consumers in ant market setting are considered as the most vital aspect to the seller as they are a contributing factor to the profits that are made by the sellers. Branding Strategy The brands formed should be those that will help maintain the trust of the consumers. They are expected to be eye catching and convincing. It will serve as a form of company identity and it should be able to tell a lot about the company in question. As a government organization, our brand should be one that can be able to convince the consumers about our products or the services being offered. The company needs to define what its brand in order to be able to create a foundation for all the components that are to be included in it. It is through the brand that the company will be able to undertake a market evaluation and obtain all the required market related information and come up with practical strategies. The brand will also enable the organization to come up with objectives that will serve as a platform for working on (Edelman, 2010). Through the objectives, the organization will be able to focus on the target audience and this will enable them understand the consumer behavior. The company will also be able to set its market target in order to get the limit supply of their products to given consumers. This will become vital in avoiding unnecessary losses. In order to attract new hires, the company should discover and eliminate the brand barriers in existence. This is an analysis that will be undertaken in order to be a ware of the principle barriers that exist and can be responsible for the inability of the product to be successful. Branding is vital as it serves as identification in the market place. It communicates on behalf of the product and the company at larger and should be made in such a manner that it convinces the consumers (Wayne & Deborah, 2009). The target market has to be clearly defined and this is through a brand strategy where the consumers get to understand that you are talking specifically to them. To better understand your market group and consumer behavior, the company is expected to conduct an intensive market analysis. Competitors have to be known as they also influence the movement of goods in the market. Recommendations It is recommendable that as a company, we be able to consider people with common interests so that we can have goals that will enable the company adjust its strategies so that they are able to meet the market demands and competition. Communication is a vita l foundation through which the organization will build a good relationship with its consumers. Here ideas will be shared between the two parties and this will help the company to know where to improve on the services being provided. It is through communication that the company will be able to define better their brand strategy to their consumers in order for them to understand the company better. Secondly, the company shou

Thursday, October 17, 2019

Fieldnotes Write-up Assignment Example | Topics and Well Written Essays - 500 words

Fieldnotes Write-up - Assignment Example Initially, there were about three or four young people from the nearby community who guided our tour and I recall how eager they exchanged delightful phrases on introducing the garden with its history. It was quite amazing how one of them entertained me in my query of the freeway which interestingly runs alongside and beneath the garden. They pointed out that to some thirty nine gardeners, the Solano Canyon Garden has become an oasis, feeding and slaking thirst of a newly-found diverse mother nature gone concrete yet surprisingly organic. Surrounding the garden’s entrance, I noticed the inlays of tiles in certain portions, including the steps, which had seemingly been scientifically structured on purpose to allow proper growth of plants throughout their place. Back then, without a tour guide, I could imagine how little would be known of each plant type in view which, in reality, serves more than a single sense – aesthetic to sight and healthy taste to palate of urban living. It hardly occurred to us that the scenic fields are a lush vegetation of organic produce as we generally felt that Solano Canyon Garden is more of a park, lovely in its own way, exhibiting colorful flowers and herbs of peculiar species chiefly rendered as they are for tourist attraction. We were three-fourths way through with our journey when we met with the interactive Al Renner, the Master Gardener, who had humbly and cheerfully walked the class through paths leading to farm culture of dominant greens making us grin with awe upon seeing exotic plants of various unique appearances and whose green color sometimes comes beyond typical shades. As if to be one with real nature, I could sense that the majority of us had been drawn to its beauty featured in the well-tended beds of flowers and vegetables that are further enhanced by the refreshing swish of the river’s noise from the background and

Critical evaluation of why G4S Security Company failed in the 2012 Assignment

Critical evaluation of why G4S Security Company failed in the 2012 Olympic - Assignment Example The main reason behind the failure of the contract between Olympic committee and G4S was the staffing problem of the company. G4S could not maintain the terms if the contract and thus the contract cost them a huge amount. G4S, the largest international security solutions group, specialises in providing security solutions to those countries where risk of safety and security are conceived as a serious strategic threat. The company has provided successful security solutions to many countries but after the death of Jimmy Mubenga in 2010, it had started to face its darkest days. Several controversies followed the death and later in 2012 the security disaster at Olympic Games provided a severe blow to the company’s strategic actions and the company had to pay a huge amount as penalty (Taylor, 2012). If the issue is looked upon very closely, it can be observed that the company had undertaken many wrong policies for taking the contract of providing security solutions to Olympic Games. It overvalued the number of security personnel and also increased the pay of the chief executives when the company was encountering huge loss. All the issues led to the failure of the contract with the Olympic committee. However, the company has to pay an amount of  £ 88 million as penalty. The report highlights the facts that lead to the failure of the security contract of G4S with Olympic Games in 2012 (Shift Media Publication, 2013). The main issue was staffing problem and the company shares were also falling as the investors came to know about the issue. If the financial statements of the company are studied it can be noticed that the Annual Report 2012 does not have any transaction information regarding Olympic 2012. The financial statements do not have information regarding the transaction pertaining to Olympic Games. The only existence of the incident is written in small letter in the Performance Highlights section of

Wednesday, October 16, 2019

The Role of Consumer Behavior in Marketing Decisions Research Paper

The Role of Consumer Behavior in Marketing Decisions - Research Paper Example It is through such understanding that they grow up to become effective buyers and at the same time of the best products in the market (Wayne & Deborah, 2009). This will help avoid impulse buying among consumers hence invest in well. A good consumer should be able to portray the three major characteristics of a consumer namely a user, payer and buyer. This implies that relationship marketing is a vital aspect in the market decisions that are reached at by a buyer. Consumers in ant market setting are considered as the most vital aspect to the seller as they are a contributing factor to the profits that are made by the sellers. Branding Strategy The brands formed should be those that will help maintain the trust of the consumers. They are expected to be eye catching and convincing. It will serve as a form of company identity and it should be able to tell a lot about the company in question. As a government organization, our brand should be one that can be able to convince the consumers about our products or the services being offered. The company needs to define what its brand in order to be able to create a foundation for all the components that are to be included in it. It is through the brand that the company will be able to undertake a market evaluation and obtain all the required market related information and come up with practical strategies. The brand will also enable the organization to come up with objectives that will serve as a platform for working on (Edelman, 2010). Through the objectives, the organization will be able to focus on the target audience and this will enable them understand the consumer behavior. The company will also be able to set its market target in order to get the limit supply of their products to given consumers. This will become vital in avoiding unnecessary losses. In order to attract new hires, the company should discover and eliminate the brand barriers in existence. This is an analysis that will be undertaken in order to be a ware of the principle barriers that exist and can be responsible for the inability of the product to be successful. Branding is vital as it serves as identification in the market place. It communicates on behalf of the product and the company at larger and should be made in such a manner that it convinces the consumers (Wayne & Deborah, 2009). The target market has to be clearly defined and this is through a brand strategy where the consumers get to understand that you are talking specifically to them. To better understand your market group and consumer behavior, the company is expected to conduct an intensive market analysis. Competitors have to be known as they also influence the movement of goods in the market. Recommendations It is recommendable that as a company, we be able to consider people with common interests so that we can have goals that will enable the company adjust its strategies so that they are able to meet the market demands and competition. Communication is a vita l foundation through which the organization will build a good relationship with its consumers. Here ideas will be shared between the two parties and this will help the company to know where to improve on the services being provided. It is through communication that the company will be able to define better their brand strategy to their consumers in order for them to understand the company better. Secondly, the company shou

Critical evaluation of why G4S Security Company failed in the 2012 Assignment

Critical evaluation of why G4S Security Company failed in the 2012 Olympic - Assignment Example The main reason behind the failure of the contract between Olympic committee and G4S was the staffing problem of the company. G4S could not maintain the terms if the contract and thus the contract cost them a huge amount. G4S, the largest international security solutions group, specialises in providing security solutions to those countries where risk of safety and security are conceived as a serious strategic threat. The company has provided successful security solutions to many countries but after the death of Jimmy Mubenga in 2010, it had started to face its darkest days. Several controversies followed the death and later in 2012 the security disaster at Olympic Games provided a severe blow to the company’s strategic actions and the company had to pay a huge amount as penalty (Taylor, 2012). If the issue is looked upon very closely, it can be observed that the company had undertaken many wrong policies for taking the contract of providing security solutions to Olympic Games. It overvalued the number of security personnel and also increased the pay of the chief executives when the company was encountering huge loss. All the issues led to the failure of the contract with the Olympic committee. However, the company has to pay an amount of  £ 88 million as penalty. The report highlights the facts that lead to the failure of the security contract of G4S with Olympic Games in 2012 (Shift Media Publication, 2013). The main issue was staffing problem and the company shares were also falling as the investors came to know about the issue. If the financial statements of the company are studied it can be noticed that the Annual Report 2012 does not have any transaction information regarding Olympic 2012. The financial statements do not have information regarding the transaction pertaining to Olympic Games. The only existence of the incident is written in small letter in the Performance Highlights section of

Tuesday, October 15, 2019

Towards the Better Light Essay Example for Free

Towards the Better Light Essay The speaker in Elizabeth Bishop’s poem â€Å"The Fish† portrays someone who is rather inexperienced to what he is doing. An amateur in fishing if I may say due to several lines in the poem that suggests the speaker is confused with conscience upon catching the fish. The poem narrates a series of striking turns of emotions felt by the speaker towards his catch. First is the excitement and thrill of actually catching a fish, followed by being dumbfounded by the fish’s state: weak and powerless due to the many battles and struggles it might have been through before. The speaker becomes extremely at awe with the features of the fish, given a long list of descriptions all throughout the poem appealing to all senses for optimum understanding of the readers. It is as if the speaker desperately wants everyone to understand how he exactly saw the fish and how he actually felt at that moment.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Looking at the long list of detailed descriptions, it is evident that the speaker is moved and is renewed by this experience. In fact, he was so moved that confusion overtaking him has led to the decision of finally letting the fish go.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Epiphany, as Levin might define it, has overtaken the speaker in such a way that the experience is almost, if not life changing. Understanding the life of the fish somehow illuminated him, giving him a huge revelation to the meaning of life.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Changes in one’s life, as the speaker in Larkin’s poem A Study of Reading Habits may not be as moving as the amateur fisher in Bishop’s poem sees it. Rather, it may be more on deteriorating and depressing. The second poem entitled A Study of Reading Habits is also in a narrative form. It tells of the story of a person in three major points of his life- as a young boy, as a teenager and as an adult. The speaker expressed his emotions during these points through his portrayal of his reading habits during that time. Irony is present in the poem, as the decency and formality of the title contrasts the actual content of the poem, which is filled with slang terms such as â€Å"ripping† and â€Å"stewed†. This somewhat creates an image of sarcasm to give emphasis to the unfolding of a series of turmoil and depression throughout the speaker’s life. In the first stanza, reading serves as a way to brighten up his day if he is bullied and picked on by bigger kids in school. Using the term â€Å"cured†, the speaker points out that as a child, the books have comforted and soothed his fears of being oppressed because each time he reads, he enters a different world where he can be as strong and as magnificent as he wants to be. At adolescence, described in the second stanza, the speaker views the act of reading as a means of fantasizing sex in a dark, evil way. His sexual urges are probably triggered by erotic and ecstatic readings, as a naturally occurring part of puberty and adolescence. During these two stages in his life, reading has become his escape. He is very much relieved and transformed by the act of reading and whatever trouble and sadness he experiences in the real world is somehow erased by literary works. At these two stages, reading is still considered a good thing for him. However, as the speaker reaches adulthood, he came to a point of realization where his views have changed due to possibly more unfavorable events. At his point of realization, he now sees that reading cannot solve or even change whatever is happening in his life. Even his escapist tendencies in the form of reading cannot save him from believing that he is a loser, a failure of some sort.    Proofs to this are lines like â€Å"the dude who lets the girl down† and â€Å"the chap who’s yellow†, suggesting that even in his fantasies and made up world of stories, he still ends up being bad at what he does. The way I see it, it is not a form of depression but merely sadness. The speaker does not feel empty at all, but he feels terribly sad about not getting what he wants the way he has imagined things to turn out, or not getting what he wants at all. He does not blame the books for his sadness, but he now believes that he cannot rely on it as an escape from his sadness. Contrasting the amateur fisher with the troubled adult, the poems create two opposing attitudes towards life. The amateur fisher, a hopeful and inexperienced person that he is, finds beauty even in a lowly creature as the fish. He is able to empathize with the state of the fish and appreciate life in a better light through what he has witnessed. Being able to understand and feel the pains experienced by the fish, the amateur fisher is moved and blessed that he is in a better state. He let the fish go in exchange for a new lesson in life. The adult who has turned his back on reading, on the other hand, is more of a pessimist. He creates a negative aura in his life because he has let the drastic changes in his life get in the way of his joys. From finding it as a cure for sadness and oppression, â€Å"A load of crap† is how he now views the act of reading. Along with his maturity is the change in his attitude towards things. One is optimistic: learning from his experiences towards the better light while one sticks to his one- sided view of life, letting his self to be caught up in a dark, cold corner. References Bishop, Elizabeth. â€Å"The Fish†. The Compact Bedford Introduction to Literature. Meyer, Michael.5th Edition.   Bedford/St. Martins, 2000. 509-511. Larkin, Philip. â€Å"A Study of Reading Habits†. The Compact Bedford Introduction to Literature. Meyer, Michael.5th Edition. Bedford/St. Martins, 2000. 511-512. Levin, Harry ed. The Portable James Joyce. New York: Viking, 1947. .

Monday, October 14, 2019

Gigabit 10 Gigabit Networking Applications

Gigabit 10 Gigabit Networking Applications Ethernet Ethernet technology refers to a packaged based network that is most suitable for LAN (local area network) Environments and includes LAN products of the IEEE 802.3ae. 10 Gigabit Ethernet standards which is an up gradation on all other earlier versions, works on an optical fibre and operates in full duplex mode (Held, 1996). The IEEE 802.3ae is an upgraded version of the IEEE 802.3 base version developed as early as 1980. Ethernet technology originated nearly 30 years ago as a least expensive high-speed LAN based option (Ferrero, 1996). Ethernet defines the CSMA/CD protocol and is currently used in major LAN-based settings. Ethernet has the advantages of low implementation cost, simplicity and ease of installation and maintenance, reliability and compatibility with LAN based networks. Almost all Internet traffic generates and terminates with an Ethernet connection, which has been adapted for higher speeds and the volume of traffic over the Internet. Ethernet technology is rapidly changing and the new 10 Gigabit technologies maintains certain older characteristics like package format and at the same time adapts itself to faster connections, higher speeds and more efficient handling of internet traffic. The newer versions of Ethernet like the Gigabit Ethernet and10 Gigabit technologies have wide-ranging applicability in LAN, WAN,MAN and SWAN (Axel son, 2003). We will discuss these points in greater detail in the dissertation beginning our discussion with a brief description of Ethernet technology, its history, modes of operations, Gigabit architecture and applications and the rise of the 10 Gigabit technology in Ethernet applications. In our final analysis we will analyse the uses of Gigabit technology and the advantages involved. We would also discuss the market demands as far as setting up the new technology in business and enterprises is concerned and conclude with a final short summary giving the prospects of Ethernet and Gigabit Ethernet in this information savvy New Age. Ethernet Technology: Ethernet tends to connect computers using hardware that could be used on different linking machines and workstations. It differs from the Internet because the Internet connects remotely located computers with telephone or cable line or a software system. Ethernet uses software but connects in LAN on the basis of hardware and the Ethernet patent is referred to as the Multipoint data communication system with collision detection. Ethernet was the first technology that could connect through LAN hundreds of computers located in the same region or building(Spurgeon, 2000). Ethernet technology can be used on optical fibre and twisted cables and it operates on a half-duplex and in recent versions, full duplex mode. There are three major varieties of Ethernet and these are Gigabit Ethernet, 10Base T Ethernet and Fast Ethernet that supports data transfer rate of 100mbps. Ethernet uses a star or bus topology and supports a data transfer rate of 10 mbps. The CSMA/CD protocols aroused to handle simultaneous demands and workloads. The newest Gigabit version supports a transfer rate of 1000 megabits per second and thus has a speed of a 1000mbps. Ethernet is the most widely used LA standards. Ethernet specifications are used in IEEE 802.3 standard software and specify physical software layers within the system. Ethernet is used in nearly 90% of LAN workstations and LAN-connected PCs in the world (Lee and Lee 2002). Although Ethernet is the most popular physical layer of LAN technology that is in use, the other common LAN types include the Token ring, Fibre Distributed Data Interface (FDDI), Local Talk, Asynchronous Transfer Mode or ATM, Fast Ethernet, a more advanced variety of Ethernet and Gigabit technology. Ethernet helps in giving a high-speed connection along with the ease and convenience of installation and maintenance. Ethernet applications and installation are comparatively inexpensive and it has wide applicability and compatibility with LAN and other widely used networks but LAN is the most popular compatible networking. Ethernet inacceptable in the computer market and supports all popular network protocols making Ethernet the ideal networking technology for all computers used at present. The Ethernet standard is set at IEEE 802.3,deriving its name from the Institute of Electrical and Electronic Engineers (IEEE), which defines this, standard. An adherence to the standards can ensure the efficient communication and links between the networking equipment’s and the networking protocols. The IEEE standard802.3 defines the rules for configuring an Ethernet network and also specifies how the elements in an Ethernet network can actually interact with each other. Brief History about Ethernet: Ethernet originated nearly 30 years ago when Xerox corporation used an experimental coaxial cable network with an original transfer rate of just 3 mbps using a CSMA/CD (carrier sense multiple access/collision detect protocol that could be used in then existing LAN and that could support some heavy traffic. This experimentation and development of the first Ethernet technology received some attention and around 1976-1980,DEC (Digital Equipment Corporation) and Intel joined Xerox Corporation to develop a LAN architecture that supported a data rate of 10 mbps. This was the Ethernet version 1.0 specification and the original version of IEEE 802.3 was also based on this initial Ethernet version specification. The draft of IEEE 802.3 version received its approval in1983 and was specified as an official standard by the IEEE in 1985.Ethernet and IEEE 802.3 and all versions of these are ultimately compatible, derived from and improved versions of this basic version of original Ethernet technology. A number of supplemental versions and technologically upgraded and advanced versions have been used to support higher data transfer rates. Thus Ethernet technology saw gradual development with a gradual LAN technology development in the1970s to the formation of IEEE subcommittee and approval of Ethernet version IEEE 802.3 later declared as standard in the 1980s. This was upgraded further with the development of Fast Ethernet and an associated speed of 100 mbps in 1995 with the final 1000 mbps Gigabit standards approved in the middle of June 1998. Ethernet Explained: A general description of what is Ethernet and how it works can be given as Ethernet seems to be based on the idea of a group of people within the same location and on the same network sending messages through a radio system and using a common wire or channel and this has been referred to as ether, a supposed medium that 19th century physicists believed helped in the propagation of light. Each member in the system seems to have a 48-bit key MAC address assigned to the network-interface card and this makes sure that all systems within the Ethernet network have their own distinct addresses. As Ethernet is found and available and compatible nearly everywhere with wide ranging applicability, manufacturers tend to build the functionality of an Ethernet card directly into PC motherboards, which are printed circuit boards used in personal computers, also known as main boards. In the initial stages of its development and discovery, Ethernet used shared coaxial cable, which was found in the building attached to every connected machine brought within the system. All computers in a building were connected to an attachment unit interface (AUI)transceiver and this in turn connected to another cable. A simple passive wire was used for small Ethernets and was considered not quite applicable to large extended networks as any damage to the wire could actually make the Ethernet segment dysfunctional. Within the Ethernet technology, the systems are run in such a way that all communications between PCs, happen along the same wire, and information transmitted bygone computer is received by all computers in the network even if the information was meant to go only to one computer or specific destination. The interface card of the network filters out all information that is not originally addressed to the entire network and the CPU is interrupted when applicable packets are received. This information sharing by all computers is considered one of the weaker points of the shared medium of Ethernet since any node within the entire network connected by the Ethernet can dig out information that seems to have been originally meant for a single location. Thus all traffic within the single wire used for the technology, can be intercepted and manipulated. A single cable thus has its ups and downs because not only is there an information security risk with such networking, the bandwidth is also shared so after a power failure or are start, traffic can crawl to a point that it can cause a slowing down of information transmission and data transfer due to too much crowding within a single wire. The computers with an Ethernet connection networking share the channel using the CSMA/CD technology that stands for Carrier Sense Multiple Access with Collision Detection. The CSMA was first developed and used for ALOHA net in Hawaii and is comparable to token Ring and master controlled networks we have discussed here. An algorithm is generally followed when the computers transmits data and there can be several commands from start, transmitting, end transmission, wire busy, to wire idle and transmission stopped or maximum transmission attempts exceeded. In this way, a medium, the Ethernet is chosen through computers try to transmit information. When there is too much traffic, there is an apparent cessation of these attempts, which renews again after a random period of time. This aid in avoiding collision and an exponential increase of back-off times are used when there is more than one failed attempt of transmission. Depending on the type of medium used Ethernet segments can have restricted size. A 10BASE5 coax cable can only have a maximum length of500 metres. An Ethernet repeater can be used to have a bigger length cable and this device uses the signal from one Ethernet cable and repeats it into another cable. This way Ethernet repeaters can be used to connect up to five different segments with a maximum three of these devices used as attached devices. Since many segments are connected, cable breakages can be handled more efficiently. Thus when any one of the Ethernet segments breaks off, most of the devices are unable to communicate as connections are broken, however Ethernet repeaters allow the workings of different segments separately which can continue to work despite the cable breakage in one part of the network (Quinn,1997). Ethernet segments can usually be terminated with a resistor at both its ends within the network and as for the equipment’s used, each end of the coaxial cable must have 50 ohm resistor and head sink and this is called the terminator affixed to an N or BNC connector. When resistors are not used, it is usually perceived as a cable breakage and consequences will be such that the alternating current signal transmitted will be reflected and as a reflected signal is indistinguishable from a collision, similar results as in collision will take place with complete cut-off of all communication between the units. When Ethernet repeaters are used electrically different segments can continue to function even in isolation as separate units and this helps in regenerating and retiming the signals (Field, et al 2002). Most repeaters have an auto-partition function and this means they are capable of removing and isolating a segment from service when there are too many collisions, breakages, and traffic or when the collisions last too long. This is done to prevent the other segments from getting affected by such collisions or breakages and once there is a renewal of activities that are smooth and without collisions, the Ethernet repeaters reconnect the unattached segment to the original network. The advantages of using cables in the star Ethernet system has been used effectively by net workers who create Ethernet repeaters with multiple ports known as Ethernet hubs or fan outs that could be connected to other hubs or coax backbones. The earlier hubs were also known as multiport transceivers and DECs DELNI is one such example of an Ethernet fan out. Multiport transceivers allow the sharing of single transceiver by multiple hosts having AUI connections. This also allows the working of a standalone single Ethernet segment that does not essentially require a coax cable. Companies such as the DEC and Synoptic sold many multiport transceivers that could connect many10BASE-2 thin coaxial segments. However, coaxial Ethernet segments have been made obsolete by the development of unshielded twisted pair cables(UTP), which began with Starling and continued with 10BASE-T. The new developed of the unshielded twisted pair variety allowed Cat-3/ Cat-5cables and RJ45 telephone connectors to connect the fan outs to the ends. This further helped to replace the coaxial and AUI cables. Unshielded twisted pair Ethernet takes the termination problem into consideration and every segment is taken separately so that the termination could be built as a hardware component without requiring special and separate external resistor. However despite the development of the star topology, Ethernet networks use a half-duplex transmission access method and also use the CSMA/With minimal cooperation from the hub that deals with packet collisions. Every packet transmitted is sent to every port and node of the hub so what really remains are bandwidth and security problems due to this open information sharing, so to speak. Since the chance of collisions is proportional to the number of transmitters and the data that have to be transmitted, implying that the larger the amount of data sent, the higher are the chances of packet collisions. Modes of Operation: The Ethernet network elements have interconnecting media and network nodes which basically falls into two major classes known as the Data terminal equipment (DTE) which are the PCs, workstations, servers, and are usually the destination or source of data frames often referred toast end stations; the other category of network node is the Data communication equipment (DCE) that are the standalone intermediate devices such as the repeaters, interface cards, modems, switchers or routers (Hancock, 1988). The DCEs are intermediate network devices that receive and forward data frames across the entire network. The traditional Ethernet and IEEE 802.3 variety works in a half-duplex mode. For the other mode of operation as in Full-duplex CSMA/CD is not used. Auto-negotiation is another mode of operation for the Ethernet. Half-Duplex Mode of Transmission/ CSMA/CD Access Method: The Half-Duplex mode of transmission was developed in the original version of IEEE 802.3 Ethernet application and the CSMA/CD is considered as a means by which two or more stations could share common media in an environment that is switch less and does not require arbitration, or assigned time slots to indicate when workstations are ready to transmit information. This means that individual Ethernet Macias capable of determining when it can send a frame. The CSMA/CD access rules are given in the full form of the CSMA/Protocol as it involves Carrier sense multiple access and Collision Detect. Carrier sense implies that each station continuously keeps alert for traffic on the medium to determine when gaps between frame transmissions are seen. ‘Multiple access’ refers to stations that may begin transmission any time they detect that there is no traffic and the network is relatively quiet. Collision detect acronym implies that when there are two or more stations in the CSMA/CD network and if they begin transmitting data at the same instance the streams of bits from each of the workstations will collide with each other and both the transmissions which collide will then become unreadable (Halaby and McPherson, 2000). Each transmitting station should be able to determine and detect that a collision has taken place before the station has finished sending its frame. Each transmitting station then must stop transmitting any further data as soon as a collision is detected and then this workstation must show a state of abeyance in its activity for random length of time determined by a back-off algorithm before attempting to retransmit the frame all over again. In certain situations when two distant stations on the network need to send a frame and the second station does not even begin transmitting until just before frame of the first station arrives. In that case, the collision is detected immediately by the second station yet the first station does not detect it until the corrupted frame signal goes all the way to the station. The time required to detect a collision can reach a twice the time required for the signal propagation between two distant stations on the network situated at farthest points (Quinn,1997). This suggests that the maximum collision diameter and minimum frame length are directly related to the slot time and longer minimum frame lengths translate to longer slot times and larger collision diameters where the shorter the minimum frame lengths are they correspond to shorter slot times and smaller collision diameters. There was growing understanding and need to reduce the impact of collision recovery and the need for network diameters to be large enough to accommodate networks, which are large, sized. The general consensus was to choose the maximum network diameter of around 2500metres, and to set the minimum frame length to ensure that all potentially damaging collisions are reported quickly. This system worked for 10mbps speed of Ethernet but for higher transfer rate Ethernet connections and developers such as the Fast Ethernet, backward compatibility with earlier Ethernet networks were necessary and this involved the inclusion of the existing IEEE 802.3 frame format and error detection procedures as also all the networking software and applications which could run on the 10mbps networks (Quinn, 1997). For all transmission rates, the time required to transmit a frame is inversely related the transmission rate and at 100 mbps, a minimum length frame could be transmitted at one tenth of the defined and original slot time and so any collision that might occur at this time would go undetected. The maximum network diameters used and specified for 10 mbps could not be used for 1000mbps networks. Fast Ethernet networks and connections help in reducing the maximum network diameter by more than 200 meters. This problem is also seen in the Gigabit Ethernet, as there is a decrease in network diameters by a factor of 10to more than 20 meters for 1000 mbps operations. This is however potential hindrance although as a solution the same maximum collision domain diameters were used to increase the minimum frame size adding an extension field to frames shorter than the minimum lengths. Full-Duplex Mode: The full-duplex mode allows the simultaneous two way transmission of data along the same or one link. The full-Duplex mode is an MA capability that allows the two-way transmission of information over point-to-point links. This Full-duplex transmission is functionally much simpler than half duplex transmissions as no collisions, media contentions, schedule retransmissions and extension bits on short frames ends are involved. Since there is a reduction is the procedural complications, more time is available for transmission and there is also a doubling of link bandwidth and each width is capable of supporting full-rate, simultaneous two way transmission of data frames and each transmission begins as soon as frames are ready to send. The main restriction is inter-frame gap between two successive frames that has to be of a minimum specified length. Usually all frames conform tithe Ethernet standard frame formats. Ethernet Types: Apart from the broad varieties of Ethernet types that transmit data at10mbps (Ethernet), 100mbps (Fast Ethernet) and 1000 mbps (Gigabit Ethernet), 10 Gigabit Ethernet and the earlier varieties such as Starling, there can be variations in the Ethernet frame types as well. We give a brief description of Ethernet types below. The earliest and first varieties of Ethernet was the Xerox Ethernet which was the original 3m bit per second Ethernet implementation and had versions 1 and 2(Hall, 2003).The framing format version 2 is stilling use. The other earlier Ethernet application 10BROAD36 is now no longer used although it was one of the earlier standards supporting Ethernet overlong ranges. The broadband modulation techniques are similar as founding cable modems and systems operated on coaxial cables. Starling or 1BASE5 as the first Ethernet implementation on twisted paired wiring and operated at 1mbps speed. This was gradually replaced by the other versions. Among the more recent versions of the 10 mbps Ethernet is the 10BASE5that uses thick net coaxial cables also called thick wire or yellow cable is the original implementation of the 10mbps Ethernet. Transceivers could be connected using a vampire tap and connecting the core and the screen with N connectors. There is a cable that could be used to connect the transceiver to the AUI or Attachment unit Interface. This type of Ethernet can have 5 network segments with 4repeaters, with three of the segments that could be connected to the network. The bus topology is used here and the maximum segment lengths 500 meters with the overall length at 2500 metres. The minimum length between nodes is stipulated at 2.5 metres with the maximum number of nodes per segment at 100. This system is obsolete as of now. 10BASE2 uses the thin net coaxial cable, also called the Thin wire or Cheaper net, a BNC connector and bus topology with a terminator at the end of each cable. The cable specified for its purposes is RG-58 A/U orRG-58C/U with a 50 ohms resistance. the 5-4-3 rule is applicable here meaning like the 10BASE5 Ethernet there are 5 network segments, 4repeaters and 3 of these could be connected to computers. 185-200metres is the maximum length for each segment and each machine uses at-adaptor to connect with a BNC connector. Although signal quality is considerably reduced with each barrel connector, barrel connectors could be added to link the smaller cable pieces in the network. Length between nodes is given at a minimum of 0.5 meters. This is one of the more widely used Ethernet applications. The Starling which was the first Ethernet twisted wire implementation later evolved into 10BASETwhich comprises of 4 wires and two twisted pairs with a Cat-3 or Cat-5 cable of up to 100 meters in length. At the middle of the connection is a hub or switch, which has a port for each node. The 10BASET uses star topology and as we mentioned 2 pairs of unshielded twisted wires. This category of the Ethernet is not subject to the 5-4-3 rule and can use 3, 4 or 5 cables with the best performance given by category 5 cable. The maximum segment length here is 100 meters. Maximum number of connected segments can be nearly thousand. The minimum length between nodes is 2.5 meters. Whereas only1 node can be present in every segment using the star topology, this system uses RJ-45 connectors. 10BASEF is the generic name for 10 Ambits/s Ethernet standards using fibre optic cable extending up to 2 mms in length. The number of network nodes can be 1024 with a maximum segment length of 200 meters. Specialized connectors for fibre optic cables are used here. This has three main varieties: the 10BASEFL is an updated and more advanced version of the FOIRL standard. FOIRL is the Fibre-optic inter-repeater link and the original standard for Ethernet on fibre optic. This Ethernet type is used to connect computers in a LAN setting a task not done mainly due to the incurring costs. This is the most widely used of the 10BASEF Ethernet type. The 10BASEFB that has never been used serves as a backbone between hubs. The 10BASEFP is a star network that does not require a repeater for its connections connect a number of computers with hubs and switches and gets cable distances up to 500metres. The 100BASET is also known as the Fast Ethernet and is a generic term for any of the three standard varieties if Ethernet that transfers data at 100mbits/s over twisted cables up to 100 meters long. These three varieties include 100-BASETX, 100BASE-T4 and 100-BASET2. Fast Ethernet uses RJ-45 connectors and star topology. The CSMA/CD media access issued here. The minimum length between nodes is specified at 2.5 meters. With 1024 maximum number of connected segments possible, the IEEE802.3specification is used. The 100BASETX is a star shaped configuration similar to 10BASE T and uses two pairs of wires and Cat-5 cable to achieve the 100mbit/s speed. 100BaseTX requires category 5 two pair cables and the maximum distance of these is given at 100 meters. The100BaseT4 requires a category 3 cable with 4 pair and maximum distance of these cables is 100 meters. This system uses a Cat-3 cabling and uses all four pairs in the cable limited to half-duplex access methods. As now the popular Ethernet cabling is the cat-5 cabling, his is now considered obsolete. The final variety 100BASEFX is a 100mbit/Ethernet type that uses a multimode fibre. The maximum length specified here is 400 metres for half-duplex connections and 2 mms for full duplex connections to ensure that all collisions are detected.100BASEFX can thus use fibre optic to transmit up to 2000 meters and for this purpose it requires two strands of fibre optic cable. 100VG LAN is also another Ethernet variety that uses star topology, a series of interlinked hubs and RJ-45 connectors. In addition to Ethernet packets this implementation also supports the Token ring packets and has an IEEE 802.12 specification. It requires 4 pairs of category 3 cable wires and the maximum distance covered is 100 metres(Held, 1996). However with a category 5 cable 150 metres could be reached. Additionally the fibre optic can be used to transmit data up to 2000 metres. We next turn to Gigabit Ethernet Technology, which being a new and improved version of Ethernet altogether requires a separate section. Gigabit Ethernet Technology: Also known in its abbreviated form Gibe, the Gigabit Ethernet technology describes the implementation of Ethernet networking and transmitting ate speed of one or more than one Gigabit per second. Gigabit Ethernet is supported with the use of optical fibre and twisted pair cables and the physical layer standards in this category includes 1000BASET. 1 Gaps issued over a category 5 cable with copper cabling and 1000BASE SX issued to attain for short to medium distances over fibre. The first Gigabit Ethernet standard was set at the IEEE 802.3 standard in 1998.Its relatively recent launch suggests that the Gigabit Ethernet is the latest version of the Ethernet, which is the most popular and widely used computing network worldwide (Katsambis, 1998). The Gigabit speed of1000 mbps of raw bandwidth is 100 times faster than the original Ethernet version of 10mbps and its greatest advantages lies in the fact that it is compatible with existing Ethernets and uses the existingCSMA/CD and MAC protocols. Gigabit Ethernet competes directly with ATMas far as market competition is concerned. It is deployed in high capacity backbone network links and for small installations Gigabitspeed is not yet necessary. Gigabit Ethernet has been used in desktop technology in apple computers, Power MacG5, Apples power notebook and is also being built into Pentium boards. One of its desktop features includes professional video editing. Gigabit Ethernet has been outsmarted by the 10gigabit Ethernet technology, which is the fastest Ethernet standard that became fully operational in 2002. Introduction to Gigabit Ethernet Our discussion on Gigabit Ethernet began by providing a brief description of the Gigabit technologies and the main characteristic of this upgraded Ethernet variety. The transceiver used for Gigabit Ethernet is the GBIC also known as the Gigabit Interface Converter. Thebe measures 8.5 mm by 13.4 mm and has a depth of about 50mm. A hot swap standard electrical interface of a one Gigabit Ethernet port can support any physical media including copper to 100 km of single mode fibre. The standard Gigabit Ethernet system operates at 1000 Mbps speed of transfer of information (Norris, 2002). The 802.3z is the standard that describes the specifications for fibre optics for the 1000BASE-XGigabit Ethernet system. The 802.3ab standard describes specifications for the category 1000BASE-T twisted pair Gigabit Ethernet system. This rate the major two varieties of Gigabit Ethernet technologies used. The10 Gigabit Ethernet is a further up gradation and has speeds reaching10000 Mbps. According to Frazier, the chair of the Gigabit Task Force developing the Gigabit Ethernet technology has been challenging and hard work mainly because this new technology aimed at developing a standard that scales the operation of Ethernet networks to 1000 Mbps while retaining the known characteristics that are compatible with Ethernet and that have made Ethernet the dominant-local area network (LAN) technology. The Draft D3.1 of the P802.3z was approved in a letter ballot of thieve 802.3 working group and this was only possible when an approval rate of 75% was obtained from the working group. The protocol layers in802.3 standards are the areas that have been developed and modified in802.3z version (Riley and Braver, 1998). The 100BASE SX and 1000BASE Fibre optic transceiver specifications have already been highlighted here. The 1000BASE-SX specifications for short wavelength laser transceivers uses 62.5 micron fibre and supports multimode fibre optic links of up to 260 meters. The 50 micron fibre can be used to support multimode fibre optic links of up to 550 metres. The 1000BASE Supports installations at longer distances and uses higher cost components with 62.5 micron fibre used for 440 meters and 50 micron fibre on 550 meters. On a single mode fibre, up to 3 mms of fibre optic links are possible. One of the latest technologies 1000BASE-CX that supports copper cabling links of 25 metres, is included in the 802.3zspecification for transceiver technology. Frasier goes on to describe that the Gigabit Ethernet encompasses the new full-duplex Media Access Control (MAC) and the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) MAC. The full duplex operation takes advantage of the contention free access and flexible topologies and the 802.3z used the CSMA/CD MAC to work at an extended range of 1000Mbps. This was done with the aid of a technique known as ‘carrier extension which was added to the CSMA/CD to overcome certain limitations of the algorithm that was based on the rule that the roundtrip messaging time between two workstations could not be higher than that required to transmit the smallest frame. To improve the throughput of Gigabit CSMA/CD LANs, frame bursting was introduced as an optional feature. In the early stages of deployment of the Gigabit Ethernet it is mainly being used to interconnect high performance switches, routers and servers in LAN backbones. The full duplex operating mode is suited for this type for application environment and is favoured over the CSMA/Chalk duplex mode. This also ensures that high performance desktop computers can take advantage of high peak bandwidths of repeating hubs that are cost effective. Frasiers claim also points to the fact that gigabit technology may be more compatible with full duplex rather than half-duplex modes of Ethernet operation. The 10 Gigabit Ethernet is full-duplex technology and the half-duplex access mode cannot be used for its purposes. T

Sunday, October 13, 2019

The One-Drop Rule Essay -- Racial Issues

The growth in the multiracial population in the United States of America since the 1970’s has greatly increased and is continuing to increase. Although the number of biracial and multiracial Americans is relatively small to the total population at 5 million, the multiracial population is growing at a rate of ten times faster than that of the White population (Stuckey 2008). These facts weren’t officially known until the United States government’s verdict to allow individuals to claim multiple races on the 2000 US census. Along with these aspects, the increased exposure of multiracial public figures and celebrities such as Tiger Woods, Halle Berry, and Barack Obama, has caused the focus of public discussion and scholarly attention on multiracial people to increase greatly. Much of this discussion focuses on racial identity. Racial Identity is put to question in censuses and other polls, applications, and in personal meetings. When it comes to answering in these si tuations I believe most biracial White-Black people internally identify as Black, and describe how both Blacks and Whites see them as Black. I argue that the one-drop rule still shapes racial identity. Blacks and Whites first began mixing significantly in America in the 17th and 18th centuries, between African slaves and the European indentured servants. Fearing that these interracial relationships would tarnish the purity of the White race, states passed laws in the 1660s to prohibit interracial marriage. Despite these strict anti miscegenation laws, the relationships continued, sometimes through consent and other times through force, as White slave owners often raped their Black female slaves. As a result, many multiracial children were born as the circumstance of bru... ...h to Understanding the Racial Identification of Multiracial adolescents. Conference Papers—American Sociological Association, 1-22 Pearlmann, J. and Mary Waters. 2002. The New Race Question: How the Census Counts Multiracial Individuals. New York: Russell Sage Foundation. Qian, Zhenchao. 2004. â€Å"Options: Racial/Ethnic Identification of Children of Intermarried Couples.† Social Science Quarterly 85:746–65. Rockquemore, Kerry Ann, and David L. Brunsma. 2002a. Beyond Black: Biracial Identity in America. Thousand Oaks, CA: Sage Publications. Roth, W. 2005. The End of the One-Drop rule? Labeling of Multiracial children in Black Inermarriages. Sociological Forum, 20(1), 35-67 Stuckey, M. (2008, May 28). Multiracial americans surge in number, voice. Retrieved from http://www.msnbc.msn.com/id/24542138/ns/us_news-gut_check/t/multiracial-americans-surge-number-voice/

Saturday, October 12, 2019

Negative Consequences of Gender Role Stereotyping Essay -- Class Gende

In our society today, men and women perform distinctly different roles which are based on nothing more than their biological gender. Although these roles do not hold true for each individual, the majority of people live out their lives in accordance with these extremely pervasive roles. Society tends to assign classes of social roles to "male" individuals and classes of social roles to "female" individuals (as society perceives their sexes). These gender roles limit what both males and females can and cannot do. Gender roles enslave individuals and force them to be what others want them to be. They are perpetuated and reinforced by the mass media and society in general many ways, some which are obvious and others which are more subtle. In many societies, there is a strong tendency to exaggerate these gender roles, and it seems to frequently jump from a valid observation to a false conclusion. Individuals within the culture are expected to conform to these "norms" and are socialized in manners which constantly reinforce the beliefs and behaviors which are prescribed and presupposed for them. We live in a sexually repressive society, but in order to break out of these binds, people must define their sexuality on their own terms, and not be manipulated and dominated by cultural "norms" of beauty, desirability and behavior. Gender role is a social construction of a particular cultural group's expectation of another person's behaviors, attitudes, values and beliefs based on their perceived biological sex. Biological factors have strong impacts on occupations that are judged by a society to be appropriate for men and for women. The probl... ... L.A. (1998). The allocation of household labor in gay, lesbian, and heterosexual married couples. In D.L. Anselmi & A.L. Law (Eds.), Questions of Gender (pp. 582-591). Boston: McGraw-Hill. McIntosh, P. (1998). White privilege and male privilege. In M.L. Andersen & P. Hill Collins (Eds.), Race, Class and Gender: An anthology (3/e). Boston: Wadsworth, pp. 94-105. Plous, S. (2003). Understanding prejudice and discrimination. Boston: McGraw-Hill, pp. 507-536. Pollack, W. (1998). Real boys. New York: Henry Holt, pp. 3-64, 272-337. Schiebinger, L. (1993). Nature's body: Gender in the making of modern science. Boston: Beacon, pp. 11-39, 143-183. Steinem, G. (1998). If men could menstruate. In M.L. Andersen & P. Hill Collins (Eds.), Race, Class and Gender: An anthology (3/e). Boston: Wadsworth, pp. 428-429

Friday, October 11, 2019

The Family Nurse

â€Å"It was the best of times; it was the worst of times . . . † Charles Dickens penned this famous opening statement in one of his popular books which spoke about the changing times during his day. Much has not changed either, if people interpret these same words into today’s context. Families however, are encountering the constant and ever increasing bombardment of myriad pressures or more commonly now known as stressors. Spouses assume a variety of roles never before imagined during Dickens’ days. In most first world countries women live alone with children to support which made single parenting commonplace. In other words, every person’s choice has significant effects upon his own world and that of the rest of his immediate reach of influence. Another example is when women who used to stay at home prior to the industrial age started to assume multiple roles: homemaking plus other jobs aside from tending to children and husband. This has complicated the family set-up or when the husband is left at home with no work, most conflicts arise. Husbands rarely accept willingly the tasks that wives used to do such as cleaning, laundry and baby-sitting. Husbands start to become hostile and relationships take the downturn in scenarios such as when a husband perceives that the wife makes him feel she has become superior in the arrangement. The nursing profession has made great strides primarily towards the intervention aspects when nurses work as part of a team of health providers (as he/she takes on different roles) who address homelessness, facilities geared to aid the ageing; assess, care and administer prescribed therapeutic remedies to the mentally disturbed, spouses and families in crises and especially those physically undergoing the effects of various kinds of emotional, physical (including chemical), mental and sexual abuse (Alexander et al., 2000). Specifically, the family nurse can respond in many ways. Basically his/her role is in counseling. Knowledge not only in therapeutic techniques, medical or chemical drug application is not the only side to it. Counseling may come in the form of eliciting information on the issues or concerns of the family but it also has to do with the skills involved in both verbal and non-verbal communications such as active listening. The family nurse must be able to build rapport and establish credibility for the helping relationship to be effective. However, the family nurse must be knowledgeable as well on ethics that are expected to guide that relationship (Alexander et al., 2000). Reference: 1. Alexander, Margaret et al. THE FAMILY HEALTH NURSE CONTEXT, CONCEPTUAL FRAMEWORK AND CURRICULUM: World Health Organization (WHO). http://www.see-educoop.net/education_in/pdf/family_health_nurse-oth-enl-t06.pdf Â