Monday, September 30, 2019

Animal Cruelty Essay

To bring awareness to my audience about animal cruelty. Introduction: As humanity has grown, there has been an increase in authority and rules and regulations of everyday life. One of these rules is animal cruelty. Animal cruelty simply means cruel unjustified treatment of animals and sometimes pets to unnecessary harm and pain. One principal type of animal cruelty is torture. It is not ethical, moral, or legal but we humans do it.. One of the places we see the most animal cruelty is in the circuses. Animals in circuses are regularly and dangerously exposed to many abuses and diseases. Circuses do not practice what they preach and indulge in animal cruelty on a regular basis, after the training sessions of the circuses, tight collars, whips; beatings and torture are the order of the day for these animals. Elephants are one of the animals that suffer from major diseases in the circuses like tuberculosis and can infect humans with the bacterial disease. Some cases show that the elephants were not cured medically for wounds caused during beatings and other natural causes. Circuses have known to keep a large amount of soil ready, to hide the wounds and the blood on the elephants. Some elephants have also suffered from lameness, arthritis and food abscesses. Elephant deaths in circuses are normally caused due to osteoporosis. Elephants suffer from Osteoporosis simply because they do not have wide spaces to move around. Due to the cruel treatments, it has been proved that circus animals are dying at a higher rate than they are breeding. Circuses teach children that it’s acceptable to abuse and mistreat animals for amusement Another animal cruelty is with dogs, people seem to think that fighting is a dog’s nature. Dogs are not the same as humans, but dogs do feel physical pain. Just because a dog can’t say â€Å"That hurts! † doesn’t mean they don’t feel pain. Dogs also suffer from feelings such as loneliness when left chained. That’s why they howl and bark, to try and get some attention and if they are ignored dogs stops howling, it’s because he’s given up hope. So much cruelty is involved in dogfighting. Dogs are tortured to make them violent. Kittens and puppies are used as bait to teach dogs to kill. Illegal drugs and weapons are usual at dogfights. Fighting dogs usually live on chains their whole lives. Other animal cruelty we see is when they make experiments on animals, like monkeys, mouse, gineapigs etc. Monkeys and others animals do not have identical immune systems as humans, and may not respond to drugs or vaccines in the same way. Animals are often depressed alternatives for humans, and some mixtures that may well cause no harm to an animal, could seriously harm a human being. Also, a drug that is toxic to the animal it is tested on may have no toxicity, and even healing benefits in humans. Pain and suffering still occur, and simply being in captivity can cause great distress to animals, just as it would to a human. We most of the times forget the pain and suffering we are causing to animals, we use them as objects of study, rather than live creatures, and this can mean they are treated as disposable rather than indispensable.

Sunday, September 29, 2019

Prayer in School Essay

John Knox Press, 1996. 45-218. In this book the author gives an epic description of the controversy surrounding the debate on prayer in public schools. It touches on the legal aspects as well as the interpretation of among other articles the first amendment. Alley uses history and preceding events to bring out his argument against prayer in public schools terming the practice as an abuse and harassment of the minority by the majority who are keen on imposing their own definition of faith. He asserts that the law on first amendment religion issues has adequately and consistently clarified the differences that exist between church and state. He cited some cases such as Barnette, McCollum, Everson, Engel and Schempp to mention but a few as having set precedence thus preventing future conflict. However, one reads anti Christianity overtones which bring up the question of objectivity due to his obvious bias. He has successfully presented one side of the debate with a personal tone. The book strongly opines that any form of religious inclinations in public schools is incompatible with the constitution as well as with the principle of democracy. Murray, J. William. Let us pray: A plea for prayer in our school. New York: William Morrow & Co, 1995. 11-97. In the first pages of his interesting book, Murray tells of his atheist past that was directed by his mother Madalyn Murray and how he, as a 14 year old was a plaintiff against the Baltimore School system. The suit led to the Supreme Court’s decision that outlawed public school prayer and bible reading. Murray later converts to Christianity and embarks on a mission aimed at undoing the ‘damage’ done by his past. He becomes a strong proponent of prayer in Schools arguing that this is the one way of rooting out the moral decay in the society. Among other arguments, he presents the debate as conflicting discomforts. ‘The discomfort of minority faiths or nonbelievers at hearing prayer in school versus the discomfort of Protestant Christians at being prohibited from public prayer’. He allows that the drafters of the constitution are misinterpreted by those who claim that they intended to eradicate prayer from public institutions. Rather, he cites influential figures such as John Locke and Tocqueville as strong believers in the value of prayer in providing positive guidance to the society. His recommendations are however weak since the freedom he seeks could be confused with what is provided for in the constitution. Again the founding fathers he cites are understood to have given us the current laws and so his enlisting them undermines his very argument. Cookson, Catharine. Regulating Religion: The Courts and the Free Exercise Clause. New York: Oxford University Press, 2000. 54, 67-75. In this book, Catherine Cookson delves into the issues of the law and the authority of state as laid down in the constitution on one hand and the obligations of conscience on the other. She embarks on a project to provide the solution for a recurrent problem. She examines the history of the Christian tradition as well as more contemporary political development of religious freedom (186). Her argument on the free exercise clause is vivid and thought provoking as she seeks the balance between the majority’s right to religious expression and public prayer and the minority’s discomfort arising from that kind of expression. U. S Department of Education. Guidance on Constitutionally Protected Prayer in Public Elementary and Secondary Schools. Available on-line at: http://www. ed. gov/policy/gen/guid/religionandschools/prayer_guidance. html Accessed on 12. 04. 07. This article deals with the legal aspect of the debate on prayer in schools. The article endeavors to provide information on the current state of the law concerning constitutionally protected prayer in the public schools, and therefore spell out the extent to which prayer in public schools is lawfully protected. The Case against School Prayer. Available online at: http://209. 85. 135. 104/search? q=cache:RTckL_PUwSEJ:ffrf. org/nontracts/schoolprayer. php+prayers+in+school&hl=en&ct=clnk&cd=1&gl=ke. Accessed on 12. 04. 07. In this article the author delves into the arguments against school prayer. The author advances the argument that prayers are private and yet there is nothing private about a public school. Therefore the two are incompatible and should not mix. He/She asserts that public schools cater for students with varying backgrounds and religious inclinations and they should not be subjected to rules that promote one form of religious expression. According to the author of the article, Public prayer leads to discrimination of the minority and a denial of their right to worship. The article refutes the claim that prayer in school has any value in checking societal excesses. The conclusion calls for total separation of church and state arguing that this is one way of preventing divisiveness in the society. Works Cited Campbell, Ted A. Christian Confessions: A Historical Introduction. Louisville, KY: Westminster John Knox Press, 1996. Questia. 12 Apr. 2007 . Cookson, Catharine. Regulating Religion: The Courts and the Free Exercise Clause. New York: Oxford University Press, 2000. Questia. 12 Apr. 2007 . Murray, J. William. Let us pray: A plea for prayer in our school. New York: William Morrow & Co, 1995. U. S Department of Education. Guidance on Constitutionally Protected Prayer in Public Elementary and Secondary Schools. Available on-line at: http://www.ed.gov/policy/gen/guid/religionandschools/prayer_guidance.html Accessed on 12.04.07

Friday, September 27, 2019

Plasmids Lab Report Example | Topics and Well Written Essays - 5500 words

Plasmids - Lab Report Example Introduction: Plasmids are extrachromosomal DNA present in the bacterial species. They are double stranded DNA which forms circles with size ranging from 1 kb to 200kb ( kilobase ). Plasmids are very advantageous for the genetic engineering. Plasmids code for many antibiotic regions and they have the ability to accept the gene of interest. The transformation of our gene of interest into the plasmid is called recombination and the bacteria are called recombinant bacteria. Thus plasmids can be used as cloning vehicles or vectors. The first step of transformation is the isolation ofhte plasmid DNA from the given bacteria culture. The basic method or DNA isolation is 1. Cutluring the host cell containing the Plasmid DNA. 2. Harvesting and lysing the cell to separate the DNA from the cell organelles. 3. Separation of chromosomal DNA and Plasmid DNA through precipitation method. 4. Plasmid DNA isolation and purification. Since both chromosomal and plasmid DNA will remain in the solution, the method to isolate plasmid DNA from the Chromosomal DNA is precipitation method. Larger DNA molecules (i.e. chromosomal DNA), bound to the proteins are separated from the Plasmid DNA when the protein is precipitated. The plasmid DNA which remains in the solution is then precipitated using ethanol. Method: Method: 1. A single colony of Bacteria containing the pBlueSkript KS II was grown overnight in the Luria Betroth overnight with ampicillin as the antibiotic. 2. From the overnight culture, 1.5 ml of the culture was taken in the centrifuge tube and centrifuged at maximum speed for 1 minute. 3. The supernatant containing the medium is discarded and the cell pellet was kept as dry as possible. 4. The cells were resuspended in the 100Â µl of GTE buffer and mixed gently using the pipette to ensure that no cell pellets remain in the solution. 5. To the cell pellets, 200 Â µl of cell lysis buffer was added at room temperature. The tube was mixed gently by inverting the tube up and down five times and incubated at ice for 5 minutes. 6. To the mixture 150 Â µl neutralization buffer was added and again inverted gently up and down 5-6 times. 7. The mixture was centrifuged at maximum speed for 10 minutes and the supernatant was added to the new tube. 8. To the supernatant, 1000 Â µl of 100% ethanol was added to precipitate the DNA. 9. The tube is centrifuged for 10 minutes in maximum speed. 10. The supernatant was removed from the tube and to the whitish DNA pellet, 1ml of 70% ethanol was added and the tube was inverted several times and centrifuged at maximum speed for 2 minutes. 11. The supernatant was removed from the solution and to the DNA, 500 Â µl of 70% ethanol was added as final wash. The tube was again centrifuged at top speed for 2 minutes and the DNA pellet was obtained. 12. The pellet was resuspended in 40 Â µl of 10mM Tris- HCl with RNase. The tube was mixed by flicking the tube and incubated at 37Â ° C for 5 minutes. 13. 5 Â µl of the Plasmid DNA was transferred to sterile microfuge tube and was labeled as B3- 5 Â µl PKS II- southern blot and stored at -20Â °C. Result and discussion: The DNA was extracted from the culture using the miniprep method. The plasmid DNA obtained in this method is used for the transformation process. Answer 1: Ampicillin is an antibiotic that resists the growth of the ampicillin senstitive strains when added to the medium. As our plasmid PKS II codes for ampicillin gene, ampicillin was induced in the growth medium to avoid contaminants. Answer 2: RNase is the enzyme that cleaves the RNA present in the given sample. RNA are the contaminants seen along with the plasmid DNA. Hence RNase was added to cleave the RNA. Answer 3: We can use alkaline lysis/ phenolic extraction method or alkaline lysis/PEG

'Visibility is a trap' Essay Example | Topics and Well Written Essays - 1250 words

'Visibility is a trap' - Essay Example Foucault’s work and contribution extend to the social domain as well as philosophy. His philosophical work is being expressed with context to the history and the changes as they take place in parallel and with time. For example the most important factor and understanding in his study is that of the most prevailing factor in form of the urban drive and urban migration. As a result of the urban drive, quite a few patterns have changed and the outlook has changed in a certain definite way in contrast to what it was in past. The visibility being a trap concept is one similar phenomena being derived from the same urban ambiance and its co relation has been drawn in the same pattern. Urban society and the digital element: Modern urban societies are characterized by presence of digital dominance, with everything being handled by the computers and digital devices, apart from their servicing features; they also provide the functions of monitoring and surveillance in certain specific way. For example all the metropolitans have established cameras and monitoring systems, this is also true in the case of highways, buildings and the official work places, where each action is being monitored in a closed and disclosed both ways (Ingersoll 2008, 186). Origin of the concept of visibility: The term can be loosely coined with observation, monitoring and surveillance and its routes stretch back to the last decade of 18th century when the word Panopticon (Dalton & Evans 2004 ,67) was first used for the purpose of watching over the prisoners to notice their activities from a common and panoramic view point enabling for clear observation against their any objective moves that would create any disturbance and turbulence. Characteristic traits of modern urban environments: A modern urban society is characterized by observation of individuals in their working environment. The roles are defined in such a manner that each team and its member works in a tier and hierarchy (Chow 2012, 47) in strict scrutiny and observation. This observation and direct exposure has been termed as a trap by Foucault in his assessment and the quite famous quote. Various proponents of the field from research on social studies and sciences have tried to investigate the aspect of the correlation and affectivity and relevance to the society in certain specific way and each of them has found some material and substance in this regard which would lead to the assumption that urban societies depict more relevance to this concept than any other mode of social outfit. Two common schools of thoughts prevail from the overall discussion, each presenting their views and stressing for the statement at hand and observing and presenting it i n different manners and checking its relation to the various variables of the society how they would have an impact on the individuals as well as those who are related to the other people in the society in one way or the other (ernst 2012). The need: The possible need driven by the visibility factor can be that of not just the establishment of the order in the society but also making things easier for people in a bigger perspective. It

Thursday, September 26, 2019

Consumer Behaviour in the UK high street clothing sector Essay

Consumer Behaviour in the UK high street clothing sector - Essay Example Particularly, UK and US can be regarded as the innovators of industry trends. Subsequently, the retail industry in these regions is substantially competitive, organized and efficient with the growth rate of 35%. The feature of urbanization has transformed the retail format of these countries with innovative tactics and business strategies. Wal-Mart, Mark & Spencer, Morrison, Tesco and Sainsbury are some of the leading chains of UK retail industry. The introduction of global competitors on board have not only enhanced the competition in retail sector but also have groomed the taste of consumer base resulting in the wide diversity towards brands and trends with an exceptional taste. (Experian, nd). In the year 2,000 the spending of consumer (worldwide) estimated on clothes marked the figure of US$1 trillion. (al., 2006) Current consumer behavior concepts; Consumer Behaviors is the study of people buying patterns, depicting the what, when and why aspects of buying. Effective understandi ng of buyer decision making process with social and economical concerns is necessarily to be evaluated in an attempt to understand people’s want and expectations for successful growth. Consumer buying behavior in retail industry is supported by set of six consecutive actions that include: Need / Want acknowledgment. Information hunt Evaluation of substitutes. Buying decision Buying Post Purchase Evaluation. A Model of influencing factors will illustrate various grounds influencing consumer behavior. (Phillip Kotler, 2003) However, the most influencing factors that underpin the ultimate buying decision of consumer are the psychological factor that is being controlled by features like motivation, perception, believes & attitudes and learning. The role of advertising in controlling the psychological factor to steward the others cannot be under estimated. A commentator on American literature claims that, â€Å"Advertisements are the pervasive part of the American aural and visua l environment. It is impossible to ignore their wider role in providing people a general education in goods, status, values, social roles styles and art†. (Phillips, 1997) (Agnes Nairn) The role of advertising can be regarded as factor to mould consumer towards a specific pattern. The different media outlets used for advertisement includes radio, TV, billboards, internet and even the walls. In the broad spectrum the â€Å"can do† aspects of advertising plays a major role in the growth of consumption. A research conducted to unfold the fact witnessed attitude shifts when â€Å"shame campaign† was jointly launched by department of Environment in Belfast and National road safety council in Dublin in November 2000. Attitude shifts were monitored by researchers among the core target of 17-24 males and massive increase in understanding that even one drink would affect driving were found as below: ("Industry as a partner for sustainable developments") Marketing Research and Strategy; The role of Marketing Strategy in the words of John Scully can be defined as a series of integrated actions leading to a sustainable competitive advantage. Competitive advantage depicts development of features which are not simultaneously implicated or discovered by competitors. On the wide spectrum a successful strategic marketing management draws its objectives from the corporate mission of the organization, driven by organizational values and embedded in company’

Wednesday, September 25, 2019

Neurontin lawsuit against Pfizer Term Paper Example | Topics and Well Written Essays - 1500 words

Neurontin lawsuit against Pfizer - Term Paper Example One of the major drawbacks of American healthcare system is that doctors are free to prescribe drugs for uses not approved by the FDA. But manufacturers are prohibited from marketing the drugs for such uses that they have not established are safe and effective (Neurontin Lawsuit Results in $142M in Damages Against Pfizer). Pfizer exploited this law very well. They canvassed the doctors with the help of lavish briberies and forced them to prescribe this medicine for uses other than the one prescribed by FDA. Pfizer with their immense monopoly in the drug manufacturing department, used every mean to sell this drug for uses other than the one approved by FDA. It is difficult for the people to analyse each and every medicine prescribed by the doctors against the FDA regulations. People put 100% confidence in the abilities of the doctors whom they are consulting and what ever the medicines prescribed by them will be used by the people without further evaluation. Pfizer knows this fact very well and they tried to canvas reputed doctors in order to sell their medicines. Doctors on the other hand, have forgotten the medical ethics and the basic responsibilities of their profession. Changing life styles and increasing family expenses forced them to accept bribes from all corners. Pfizer mainly focussed on recruiting sales personnel who was able to canvas the doctors for executing their mission. The relationships between a patient and a doctor were a divine one earlier. It was a common belief that a doctor always try to save the life of a patient. The first priority of the medical profession is to save the life of patients at any cost.

Tuesday, September 24, 2019

Cardiovascular Disease Prevention Plan Essay Example | Topics and Well Written Essays - 750 words

Cardiovascular Disease Prevention Plan - Essay Example Although, currently my cholesterol levels and glucose levels are controlled, which also significant risk factors for cardiovascular disease, but my habitual smoking and increased body fat are considerable risk factors for cardiovascular disease. It has been proved through research that smoking doubles the risk for ischemic stroke and smoking acts along with other modifiable and non-modifiable risk factors to increase the risk of cardiovascular disease. Smoking however, is also one of the risk factors which can be easily alterable. Smoking is also associated with premature morbidity and mortality leading to approximately 430,000 deaths per year in United States (Ockene and Miller 3243). A body mass index of 30 or more is considered obese and is a significant modifiable risk factor for cardiovascular disease. Being overweight increases the risk of increased blood cholestrol levels and triglyceride levels and also predisposes the person to diabetes and high blood pressure (National Inst ituite of Health). Cardiovascular diseases such as coronoray heart disease can be prevented by changes in lifestyle and different medicines. Since I am not suffering from high blood pressure and high cholestrol levels, I need to focus on changing my lifestyle in order to attain maximum prevention. Lifestyle changes that I strictly need to follow are following a healthy diet, being physically active, managing my weight and quit smoking. Stress management is also important and should be made a part of normal lifestyle. I should eat healthy diet which includes high fiber, low saturated and trans fat, high in omega-3 fatty acids and reducing daily salt and sugar intake (National Instituite of Health). Low-fat dairy products, fruits and vegetables, fish, legumes, poultry, lean meats, and grains are good sources of energy which also do not increase the risk to cardiovascular disease. According to guidelines I should reduce

Monday, September 23, 2019

Christinas World by Andrew Wyeth Personal Statement

Christinas World by Andrew Wyeth - Personal Statement Example We can see that she seems to be gazing at an old farmhouse from afar. An old barn stands not far from the farm house and what looks like remnants of old picket posts can be seen near the farm house. Given that the dominant colours are tertiary and that there is visible lighting or shadowing in the painting, it can be said that the painter definitely did not apply the colours flat on his canvas and that mixing of colours was done. The light is coming from the upper right front of the painting, sensibly coming from the horizon. The noticeable shadows in the painting are shadows of the farmhouse, the barn, the little outhouse, the Christina's arms, hair and lower body. The shadows of the objects consistently fall on the lower left of the object; this coincides with the source of light coming from the upper right portion of the painting. There is a wide range of tonal contrast for this painting. Very light highlights can be seen on the grass details and the dark shadows are seen on the shadows of the farmhouse, barn and the details of the Christina's body. The painting definitely looks still and peaceful. The artist achieved this stillness by making the painting almost barren except for the girl and the structures afar. The only hint of movement in the painting is the wisps of the girl's hair which seem to be moving because of a soft breeze. In addition, the girl seems to be moving her body because her left hand looks like it's about to touch the ground What is the centre of interest in the composition How does the artist draw your attention to it The center of interest in the composition is not the scenery of the landscape but the frail girl. The artist has drawn the attention to the girl by making the presence of other objects almost unnoticed. Christina stood out in her pale pink dress in the midst of an almost repetitive color of the fields. He placed the girl in the center of the composition and the way the girl is positioned is not natural. It appears as though she is having a hard time moving her body because of the disheveled hair. The girl's frailty is very noticeable in her bony arms and shin. Mood/Emotion: What do you

Sunday, September 22, 2019

Lightest football Essay Example for Free

Lightest football Essay I have chosen to focus on just one of the sports manufacturers Nike, for two reasons. 1. Nike is arguably the fore runner in the technological developments of most sports football being one. 2. There is little deviation between the finished products and their properties regardless of the manufacturer and with Nike being the largest of all the sports brands, it seems logical to focus on them. Shirt Nike cool motion shirt (image 1)   Two layers lighter than one   Inner shirt wicks moisture. Outer shirt has vents and water resistant properties   Luminous colouring makes visibility improved under floodlights Boots Nike vapour boots (image 2)   Lightest football boot around built for speed Soft ground 194 g Firm ground 202 g   Sprint spike stud configuration   Ultra thin synthetic for `feel` of the ball Ball Nike mercurial vapour ball (image 3). Synthetically made strength and durability in all conditions   Low water retention keeps shape and weight  Ã‚  2% more deviation in flight leading to harder shots, therefore more spectacular goals   Special small sided games version in metallic silver higher visibility Protection Nike vapour guards (image 4) Lightweight again built for speed   Anatomically shaped providing optimum fit   Wicking inner layer Nike Kracken gloves (image 5) 4mm thick grip durability and shock absorption in all conditions   curved grip for easier catching of the ball   wicking inner layer Headers` padded head band (image 6). reduces shock to the brain   reduces risk of concussions   reduces risk of onset of post game illnesses directly associated with brain trauma (i. e. Parkinsons) Stadia After the Hillsborough disaster of 1989 and a series of other crowd related tragedies (Heysel 1985, Bradford fires) there was a need to drastically improve the stadia across the world. The Taylor report deemed that all top division clubs must have all seater stadiums, with restrictions placed on those without. Similar guidelines were introduced and applied with lower league clubs, where although all-seater stadiums were not compulsory, the safety of each stadium must pass stringent checks. There have been cases especially highlighted in the conference league where upon a club has been promoted, only to be demoted back to the same league immediately because their ground or stadium did not meet safety regulations. The recent world cup in Japan/Korea highlighted the new breed of `super stadia`, where spectators can rely upon space age technology to enjoy watching in safety and comfort. (Image 7) Television Due to the ever increasing demand to watch football, and sometimes the increasing price to do so, the needs of the spectator, whether at home or at the stadium remain almost the same. Television, has pumped money into many clubs, and very nearly ruined many others. (the collapse of ITV digital bankrupted some smaller clubs)   Television runs football date and times of kick off are directly effected by television companies The majority of money involved is directly to do with television TV rights, pay-per-view   Some clubs cannot survive without TV. money. Football and television have become co-dependent Conclusion   advancements are geared towards providing more of a spectacle   speed of the game has increased more end to end action   balls/boots are benefiting the scoring of spectacular goals again more spectacle   Spectators watch games in more comfort at a price, some match tickets are no longer affordable.   Sport is run now like a business high risk for high rewards, and the rewards are getting that much greater Money essentially now runs the game.

Saturday, September 21, 2019

Elektrobit Corporation Essay Example for Free

Elektrobit Corporation Essay Which of recommendations listed in the Manager’s Toolbox were used by Elektrobit Corp? Explain. Below shows some of recommendations of Manager’s Toolbox were used by Elektrobit Corporation :- (i) Elektrobit has recent arrivals to an area share their experiences with newcomers. To inform to the newcomers about what we experienced during all programmes in Elektrobit Corporation. Newcomers can judges companies achievement based on that experiences that we told to them. From there, we can persude newcomers to join us. Therefore, we can enlarge our business. (ii) Elektrobit employees who accept an international assignment have to sign a contract before they leave that spells out their pay, length of stay, and other details of what is expectedof them. To prevent the occurrence of fraud and breach of trust in the company. By signing contract, we can refer to the agreement if any problems stated on above is occur. Therefore, newcomers in the organization will be more diciplined in doing anytypes work given. So, this contract will be a good guidance in their organization and the company will have a good management. (iii) Elektrobit moves an average of 10 people a year between its global offices, spending about 10,000 annually for each of them on relocation expenses, housing for the employee, and any family that go along. The company make sure employees have whatever they need to start working efficiently on arrival. But it also tries to help them settle into their everyday lives outside work. This can prove that the Elektrobit Corporation is very concerned about the welfare of their workers.

Friday, September 20, 2019

Comparison between SOAP and REST

Comparison between SOAP and REST Dickriven Chellemboyee Table of Contents (Jump to) Abstract Introduction to Software Architecture Service-Oriented Architecture Resource-Oriented Architecture Web service SOAP REST RESTful Features SOAP WS-* REST Description Language WSDL WADL Message Format XML JavaScript Object Notation Pros and Cons Pros of SOAP over REST Cons of SOAP over REST Statistics Real Life Scenario Conclusion References List of Figures Figure 1: Basic web service Figure 2: Comparison of web services usage in 2006 and in 2011 Figure 3: Web service with JSON support Figure 4: New web service with JSON support only Figure 5: Web service with XML support Abstract The main aim of this document is to describe the two common software architectures mostly used in distributed system namely Service-Oriented Architecture and Resource-Oriented Architecture. The document provides a high-level descriptions of the two software architectures and implementation of those software architectures in the form of web services. Web services allow interaction between applications. Web services are compared and contrasted. The document describes and compares the differences between two types of web services namely SOAP-based web service and REST-based web services. Introduction to Software Architecture Service-Oriented Architecture Service-Oriented Architecture is a concept aims to improve flexibility by organizing and utilizing nodes of a network [1]. SOA enables the realization of business functionalities by allowing interactions between service providers and service consumers [2]. SOA turn application functions into services which can be consume by other applications over a network. A service describes the business function, self-contained and developed independently. It is defined by a verb, for example: validate user [3]. Services are simply a collection of service with independent methods. Resource-Oriented Architecture Resource-oriented architecture is based on the concept of resource. It involves retrieving particular resource instance and it has operations for resource lifecycle management that is to create, read, update and delete resource. Requests are stateless, one request has no connection with the next one. Resources are identified by some address and data included within the request [4]. Web service A web service is a node of a network accessible interface to application functionalities that is a set of specifications to support interoperable machine-to-machine interaction [2] [5]. The protocol and the format that are used for specific services are defined in those specifications. Figure 1 shows a basic web service where communication is done between two machines with different operation systems (Windows and Linux) and built with different programming language (Perl and Java). Figure 1: Basic web service SOAP SOAP originally Simple Object Access Protocol, is a set of rules for transferring organised information by the use of web services. SOAP uses XML based for transferring of information in a distributed computing style. SOAP is independent of transport protocol that is it can use any transport protocol for example HTTP, FTP, TCP, UDP, etc. [6]. SOAP has been developed by Microsoft to replace older technologies like CORBA and DCOM SOAP has an RPC architecture, all web service are message-oriented as HTTP itself is message-oriented, SOAP uses a second envelope inside the HTTP one, that contains XML data which is a description of a RPC call similarly as XML-RPC. This is how SOAP is used to call a remote function or what the return value from a function. Soap message contains data, the action to perform, the headers and the error details in the case of failure [6]. It uses interfaces and named operations to expose the business logic. It makes use of WSDL to describe the services for client to use and UUDI to advertise their existence [6]. REST Representational State Transfer is a set of software architectural style for distributed computing system like the World Wide Web. REST is not a protocol. The REST term originated by Roy Fielding in his doctoral dissertation. Roy Fielding is one of the main author of the HTTP protocol specification. The REST term has quickly come in practise in the network community [7]. REST tries to fix the problems with SOAP and provides a truly method of using web services [8]. REST do not require to add another messaging layer to make the transfer to message as oppose to SOAP, REST transfer its message in the HTTP request. It concretes on design rules for making stateless services. Request and response are built by the transfer of representational of resources. A resource can be essentially the data (object) that may be addressed [6]. Rest recognizes everything as a resource (e.g. User). Each resource has a standard uniform interface, usually an HTTP interface, resources have a name and addresses (URIs). Each resource serves a unique resource since each URL are unique. The different types of operations that can be performed on the resource are done by the different HTTP operations also known as HTTP verbs which are GET, PUT, POST and DELETE. Each resource has one or more representation (JSON, XML, CSV, text, etc.) and the resource representations are transferred across the network [6]. REST allows the creation of ROA but it can be used for both ROA and SOA [3]. RESTful A RESTful web service is the implementation of REST principles. HTTP Methods GET getUser – retrieve user information DELETE deleteUser – delete user PUT createUser– create user HEAD – getInformation – get meta information POST – updateUser – modify user information Features SOAP Independent of transport protocol (http, ftp, tcp, udp , or named pipes) [6] It can perform asynchronous processing and invocation (e.g. JAX-WS) It caters for complex operations which require conversional state and contextual information to be maintained. WS-* SOAP has a different set of XML â€Å"stickers† for its SOAP envelope to provide enhance features to transport its message. These specifications are analogous to HTTP headers. Some of these specifications are described below: WS-Security Enterprise security features are provided by the WS-Security standards. It supports identity through intermediaries, also provides the implementation of data integrity and data privacy [9]. WS-ReliableMessaging Provides reliable messaging that is a successful/retry process built in and provides reliability through soap intermediaries [6]. REST don’t have such feature therefore it should deal with failures by retrying the request. WS-Trust Enables issue, renew and validate security tokens. WS-AtomicTransaction ACID transactions over a service, REST is not ACID compliant. [9] REST Does not enforce message format as XML or JSON or etc. It has a good caching infrastructure which greatly improve performance when the data is not altered often or is not dynamic Security is provided by the transport mechanism (SSL), it does not have dedicated concepts for each, it relies predominantly on HTTPS Description Language WSDL The Web Service Description Language is used to describe SOAP interface in XML format. A client can read the file and know exactly which methods it can call and the signatures of the methods. The client can discover services automatically and generate useable client proxy from the WSDL. Most SOAP web services would be very cumbersome to use without it. The WSDL is a machine-readable file that is an application can parse it and knows how to make a service call. When a service method is called, a POST request is made to the endpoint of the SOAP service which is a single URL for all API call and only POST requests can be made. The signature details are found in the WSDL document. WSDL version 2 caters for HTTP verbs and it can be useful for documenting RESTful system but it will still very verbose [6]. WADL The Web Application Description Language is used to describe RESTful web services using XML grammar. A client can load the WADL file and access the functionality of the RESTful web services directly. A WADL is normally less verbose than a WSDL [6]. However since RESTful web services have simpler interfaces, the WADL is not mandatory as opposed to WSDL is to SOAP-based web services. Message Format XML A client requires an XML parser in order to get the information from the XML document. The parsing of XML has to go through different stages (character conversion, lexical analysis and syntactic analysis) before machine can interpret it. The parsing of XML document can take a lot of time since XML is a very verbose document and as the XML document gets longer much more time is taken to parse it. By replacing XML document with a remote call, there will be a great performance improvement if both sides of the application uses the same binary logic [10]. JavaScript Object Notation XML is mainly used by most web services for request and response messages but a growing number of web services are using simple data structures (such as numbers, array) serialized as JSON-formatted strings. JSON is expected to be used by a JavaScript call; it is much easier to get a JavaScript data structure from JSON than from XML document. Web browsers don’t have a standard JavaScript interface for XML parser as every browser has a different interface for treating XML document. JSON is normally just a string with some constraints with JavaScript so we can say that JSON string is interoperable on all web browsers. JSON is not attached to JavaScript but an alternative data serialisation to XML. JSON is a simple language-independent method of formatting complex data structures (e.g. array, object, etc.) as string. [11] Pros and Cons Pros of SOAP over REST Some programming languages provides some shortcuts, reducing the effort needed to build a request and parse the response. For example with .NET technology, the XML is invisible in the user codes [8]. SOAP has more mature tool support as compare to REST, but this is likely to change in the future [12]. No native support for SOAP in mobile, even though there are third-party libraries to bring SOAP support, out of the box SOAP support is not available. [13] SOAP has a lot of rules thus make it restrictive as compared to REST in the implementation Cons of SOAP over REST It is much simpler to implement REST as compared to SOAP The learning curve for REST is smaller than SOAP The difficulty lies greatly in the chosen programming language to develop it since some IDE automate the process of generate or referencing the WSDL Has support for error handling and the error reporting provides a standard error codes which can be very useful to handle the request and response in the application consuming it. SOAP is sometimes considered to be slower than legacy system such as CORBA or ICE because of being too verbose [14] While some programming language provides some shortcut to SOAP services, it can be very cumbersome in some others such as JavaScript since an XML structure needs to be created each time a request should be made. Distributed environments is best suited for SOAP whereas REST assumes an end-to-end communication Has strict set of rules for every stage of implementation while REST provides a concept and less restrictive with the implementation Uses strongly type messages, which is a problem for loosely coupled systems. If type signature of an operation is changed, all the clients that was using it will failed [15]. REST is flexible for data representation, it is easier to understand as they add an element of using standardized URIs and give importance to HTTP verb used. They are lightweight as they don’t need extra XML mark-up [6]. SOAP uses XML structure which make it slow as compare Statistics A comparison of web services protocol, styles in 2006 and in 2011 from more than 2000 web services are shown below. It clearly demonstrate that most developers have moved from SOAP to REST. The interest in REST is growing very rapidly whose those in SOAP is declining [16]. Figure 2: Comparison of web services usage in 2006 and in 2011 Figure 3: Web service with JSON support Figure 4: New web service with JSON support only Figure 5: Web service with XML support Real Life Scenario Amazon has SOAP and REST based web services and around 85% of their usage is from the REST-based web service [17]. Although all the beautiful name with SOAP, it is an evidence that developers like the simpler one, that is the REST one [18]. Google has deprecated its SOAP services in favour of a RESTful, resource –oriented service [11] Nelson Minar, used SOAP-based web service to design Google API for Google search and AdWord, he stated to be wrong for choosing SOAP [15]. Conclusion SOAP is more useful for complex web service or when there is critical data involve such as banking transaction where retrying the same request can be very critical. If one need a web service up-and-running quickly, it is better to start with REST rather than SOAP. REST is a good option for web service which are meant to be simple, lightweight and fast. However after using one of the web service, it can be almost impossible to change it to the other one. It would be cheaper to re-build the web service. When making your decision on which type of web service to use, the decision should be which one best meets the requirements with the chosen programming language and in which environment it will be used. Even though SOAP is meant to be flexible to change, add new features, expanding it. It is not the case in practise by the use of strongly-type as it can make existing client to stop working just by changing the type of method signature. References 1

Thursday, September 19, 2019

The Day My Father Began to Understand the Colors of My World :: Personal Narrative, Autobiographical Essay

The world is full of color. It has to be. Where else would we find depth and meaning and purpose? Color comes together to make shape. The vibrancy of blues, reds and yellows all wash over us as we experience life. Everything ruptures with color, even music with its bright highs and dark lows or language spoken with meaning and clarity. Existence is an art and the freedom to express your art a privilege we all hold dear. I discovered the power of expression when I was young. Crayons and scissors filled my mind. I could manipulate a world of my own on paper, shaping its people. I was king. I knew my subjects. They were spread in 2-demensions before me as they struggled to all escape my mind at once. Although my scribbles never quite matched the emotion I felt deep inside me, they were enough. The forms and figures were mine. I created them. I began to know myself as I continued to grow and develop, but I could never reach the ultimate plateau I felt so strongly that I needed. I needed a boost to reach some sort of self-assurance in my ability and my love. I tried to achieve acceptance once. Although I was young, I remember it well. I had spent all day in school creating another expansive world. As my teacher rattled off times tables and division, I furiously created an eight-year-old masterpiece through a storm of colored pencils and erasers. As I perfected each tree in my landscape, I began to feel powerful. I knew what it was to create and to be good; all I needed was for someone to show confidence in my work. My mother picked me up, but I didn't take this opportunity to show her. My picture was special. It deserved the ultimate unveiling. I was going to show it to my father. Dad came home unhappy, as usual, and ready for dinner. I knew better than to involve him yet. As I ate my unnoticed meal, I could barely hold my excitement. After dinner, I ran to my room and unfolded my work along its careful creases. I walked slowly to his chair, carefully and excitedly balancing my masterpiece in my hands. "Look, Dad, look at what I did. I did it today in school all by myself." He turned slowly in his chair, upset because his connection with CNN had been broken.

Wednesday, September 18, 2019

Benefits of Human Cloning :: Clones Biology

What is cloning? "Cloning is the process of making a genetically identical organism through nonsexual means."(www.Howstuffworks.com) It has been used for thousands of years to produce plants. The next stage was to clone animals. Scientists can take unfertilized eggs of some small animals, and clone them, so they develop into full adults. After knowing that people realized how great it would be if we could clone humans. There would be a lot of advantages in cloning humans. Lets say someone will die if they can't get a heart transplant. If scientists could clone the human heart, they might be able to save that persons life. Also if they could clone a full human body, they could use the cloned bone marrow as a cure to leukemia. Scientists can also use some cloned animals organs for transplants. Or another big issue would be if you could not have a child with your husband or wife. Many couples around the world would give anything for a chance to have a child. With cloning they would be able to clone a human being that would grow up to be just like one of them. What can cloning do for you? If one of your family members was sick or dying of a disease, scientists will be able to clone them, so they will be normal again. Or maybe one of your pets needs a new liver, they can also clone one, so your pet can live. How would you like it if cloning could bring back some of the worlds most honored and respected people? For example, Albert Einstein was one of the smartest men alive. And with cloning, we could duplicate his DNA to create an exact replica of him. They could do the same for a sports legend or an award winning actor or actress. There are endless possibilities with cloning. What have we already cloned? We have cloned more than what the average person knows about. We have been cloning plants for a very long time. And we have cloned many small animals. Most people know about scientists cloning a sheep named Dolly, but what they don't know is that they have cloned many more small and large animals. They have cloned sheep, goats, cows, mice, pigs, cats, rabbits, and a gaur.

Tuesday, September 17, 2019

Macroeconomics: Should the Minimum Wage Increase? Essay

Minimum wage is the lowest wage permitted by law or by a special agreement that can be applied for an employee or put simply, the lowest amount of pay that an employee can make. Governments set a minimum wage on businesses in hope for reduced poverty and increases in the standard of living. Minimum wages are beneficial up to a line, when minimum wage is too high, it makes businesses make crucial decisions and must save money by firing workers, reducing output, and increasing prices on products. Over the years, the federal minimum wage has increased and has been beneficial up to the minimum wage increase in July 24, 2009 from $6.55 to $7.25. After the increase, the unemployment rate has soared and businesses fired worker and increased their prices. For this reason, it would be beneficial to the economy if the minimum wage is reduced back to $6.55 because it will decrease the unemployment rate, increase GDP, and help youth and unskilled workers in the job industry. The Great Depression was a devastating time for the United States with families having no income, there was no economic growth, and the poverty rate was at an all time high. To aid with the matter, President Roosevelt attempted to impose a federal minimum wage but was struck down by the Supreme Court. The Court continued to refuse to have a federal minimum wage over and over again. It was until chose a presidential nominee, and made a platform that supported minimum wages by the party’s presidential nominee, Alf Landon. After this, the Court decided to allow a minimum wage. Over the years, the government has increased the minimum wage from 25 cents in 1938 to $7.25 in 2009. The current debate in Congress now is that President Obama wants to raise the minimum wage to $9.50 which is going to be a bad idea for the economy, decreasing the minimum wage will benefit the economy for reasons that will be stated now. Human labor is very important to businesses even though technology is rapidly improving but if the minimum wage increases, the cost of human labor increases, so to deal with this, businesses must decrease output, increases prices, and ultimately fire employees. So if the minimum wage increases, the unemployment will also ultimately increase. Evidence of this occurring is seen through a recent minimum wage increase from $6.55 to $7.25. When the minimum wage increased from 2008 to 2009, the unemployment rate almost doubled. In 2008, the unemployment rate was 5.5% and in 2009, it increased to 11.2%. Decreasing the minimum wage will reverse this because human labor is cheaper, therefore businesses can increase output, lower prices, and hire more employees. This rapid increase unemployment rate is undesirable because of the huge economic cost for GDP. The economic cost is determined using Okun’s Law which is to double the unemployment rate to find the GDP gap, so the GDP gap for the year 2009 is 22.4%. Multiplying the GDP gap with the potential GDP gives the economic cost. The potential GDP in 2009 was about $13750 billion and multiplying this with the GDP gap 22.4% gives the economic cost of $3080 billion (McConnell, 2012, p. 175). The cost of this was way too high and the cost will increase much more if the minimum wage is increased, but if the m inimum wage was decreased, maybe the economic cost can be reversed. If the minimum wage can be decreased, the unemployment rate will also decrease, and GDP can increase. GDP is a monetary measure of the health of the economy. This is calculated by adding up all the expenditures made on final goods and services in the U.S or adding all the income mad in the U.S. If minimum wage is decreased, businesses and firms can increase output with more employees and lower prices. Since there are lower prices, there will be a higher demand so more goods and services can be sold thus increasing GDP making a bigger and healthier economy. For example, a man sells burgers and hires 10 people at $7.25 and minimum wage goes up to $9.50, the cost of ingredients goes up. The labor that is used in bringing the beef to market is paid with minimum wage. If those wages go up the cost of producing the beef will go up, ultimately driving up the price of beef. The man now can’t afford the price rise on raw ingredients because it will cause him to run at a deficit. Instea d he will have to raise prices and sell less burgers or make less output. Since there is less output to be made, fewer employees are needed so employees are fired. Since there is less burgers to be sold and it is at higher prices, not a lot of consumers will purchase the burgers and thus GDP will decrease. Decreasing the minimum wage will not just decrease unemployment and increase GDP; it will also benefit the working youth and unskilled workers as well. If the minimum wage decreases, businesses and firms can afford to hire more employees, including youth workers and unskilled workers and can train them. This gives youth and unskilled workers valuable experience which can help them with future job opportunities. If the youth and unskilled workers can at least get a job, they can work their way up the ladder and use the experience they get from the minimum wage job and use it as they rank up or pursue higher income jobs. There are many reasons for why decreasing the minimum wage would benefit the economy but there are those who oppose this view. Those who oppose this view say that decreasing the minimum wage will hurt the economy because lowering the minimum wage decreases the income of families so that they can purchase fewer goods and therefore decrease the GDP growth rate. There is another argument saying that is only fair to give an employee a â€Å"living wage† and can support at least a family of two for 40 hours a week. This is untrue because most employees that work minimum wage don’t work 40 hours a week anyway so it is already not a living wage but they don’t take the job for the short run, they do it to gain experience and can in the future work with other businesses that require past experience and will pay the employee a higher wage. As stated before, employees can work their way up the income ladder. Decreasing minimum wage is beneficial to the economy because of many reasons. It is beneficial because it reduces the unemployment rate, increases the GDP, and helps youth and unskilled workers with future job opportunities. This can be done by first refusing Obama’s plan of increasing minimum wage, and then starting a bill to reduce minimum wage. Minimum wage is needed to prevent employees getting an unfair pay but there is a limit on it, don’t raise the minimum wage too much Mr. President. References 2050., & 2000, u. f. (n.d.). Congressional Budget Office (CBO). Congressional Budget Office (CBO). Retrieved July 24, 2013, from http://www.cbo.gov/ Brownstein, R. (n.d.). A Short History of the Minimum Wage Fight – NationalJournal.com. NationalJournal.com. Retrieved July 24, 2013, from http://www.nationaljournal.com/politics/a-short-history-of-the-minimum-wage-fight-20130214 Macroeconomics, global edition (19 ed., p. 175). (2012). 9. S.l.: Mcgraw Hill Higher Educat. Shemkus, S. (n.d.). Increasing the Minimum Wage: Pros & Cons – Salary.com. Welcome to Salary.com – Salary.com. Retrieved July 24, 2013, from http://www.salary.com/increasing-the-minimum-wage-pros-cons/ U.S. Bureau of Economic Analysis (BEA). (n.d.). U.S. Bureau of Economic Analysis (BEA). Retrieved July 24, 2013, from http://www.bea.gov/index.htm U.S. Department of Labor – Wage and Hour Division (WHD) – Minimum Wage. (n.d.). United States Department of Labor. Retrieved July 24, 2013, from http://www.dol.gov/whd/minwage/coverage.htm

Monday, September 16, 2019

Is Evil an intrinsic or extrinsic in Humans Essay

Evil: A noun meaning profound immortality, wickedness and depravity. It’s just a simple four letter word, full of darkness. There is a little bit of evil in everyone, varying in degree and severity, but it’s up to you whether you let it show or not According to Mr. Golding, evil is intrinsic in human beings. That means that evil is an instinct to humans, a part of them. Many people can deny that fact, however it is suppressed inside of humans and will come out in extreme situations or after traumatic experiences as a self-defense mechanism. However, what is evil? What defines evil? What can we compare evil to? Evil, to some people, are the acts that are against a certain religion, culture, society, etc. Many times, Again, evil is personified, and the most common evil known today that is personified is Satan, also known as Lucifer or the Devil. That includes the â€Å"goody two shoes† people, they have Evil Intents and thoughts, but they work well at suppressing i t. But evil isn’t something personified, if not, it is human nature. In â€Å"The Lord of the Flies†, all the boys are stuck on the island and are all in the same situation. However, the boys enjoy mocking Piggy because he is physically inferior. In the human mind, placing someone below themselves increases their self-confidence so that they feel superior and better about themselves. In many cases this appears in bullying. There are examples such as, â€Å"’You’re taking too much,’ said Jack Merridew. ‘Shut up, Fatty.’ Laughter arose. ‘He’s not Fatty,’ cried Ralph, ‘his real name’s Piggy!’†¦ a storm of laughter arose†¦Ã¢â‚¬  and â€Å"’His specs – use them as burning glasses!’ Piggy was surrounded before he could back away. ‘Here – let me go!’†¦ ‘My specs!’ howled Piggy. ‘Give me my specs!’† In both these insta nces, the boys took advantage of his physical disadvantage due to his asthma and mocking him for his body image. Evil could also be portrayed as self-preservation and survival. Although Simon’s death is a blur and is hard to comprehend, the boys attacked Simon, thinking that he was the beast and also using the excuse that it was a mistake and that they did not know as an excuse to get carried away by the game and simply attacked him for pleasure. Anyhow, isn’t murder considered  evil? If this isn’t murder, what is this? And is this terrible act, or so to speak, evil? In other books like Battle Royale and the Hunger Games, Humans have defined and showed their evil psychological side as it has been released in the terms of a kill or be killed situation, or just for the fun of it as other people termed it, either it was issues with home, or hate for society Mr. Golding is saying that evil is intrinsic, but since human society thinks that they are so civilized, humans think that evil is extrinsic. But under the right circumstances, survival and self-preservation surface, something that â€Å"civilized humans† consider as savage, barbaric, and evil. In other words, Evil is Intrinsic, but learning how to suppress that evil is Extrinsic need for humans. And as I looked into some reports, some of the parents of famous serial killers were not very civil and trying to compress.

Sunday, September 15, 2019

Lims

LIMS In the typical scientific laboratory there is a large amount of data that must be tracked and analysed. In my current work setting we collect data from outside laboratories, analyse the data, and then return the data. We process thousands of samples per week. This makes tracking and sorting the data very cumbersome. We basically serve as a clearinghouse for data to be batched out to our customers, the independent researcher. Our laboratory considers itself a high-throughput sequencing centre. Our daily objective is to make the lab more automated. We are continually striving to use more robots or automated data entry.For automated data entry we use bar codes. Bar coding tends to have fewer errors in data entry. It also allows us to generate a greater amount of information for any given sample. The more we can automate the process the more samples we are able to put through the system. Each of the independent researchers in the company is looking for a particular disease by identi fying the disease-causing gene. Once the gene has been located the researcher must get the DNA sequence from the gene. That is our job. We at the sequencing centre take the DNA sample, with the gene, and run the sample on our automated machines.Once the sample has been analysed we put the analysed sample, also known as the DNA sequence, into a database that the researcher can access. This is a very general idea of what the Sequencing Centre does. The role of the Laboratory Information Management System (LIMS) is to keep track of this data. The accuracy of the LIMS is crucial for an efficient and effective workflow. The analysed sample must be coordinated with the correct sample name that the researcher gives to the Sequencing Centre. This means that everything must be entered into the database correctly. The data must also exist in a safe and accessible database.The data flow can be characterized in the following context diagram. We have just begun the implementation of a new LIMS s ystem. Hopefully this analysis will help to guide our laboratory as we move towards its implementation. LIMS Functionality Different LIMS systems offer a variety of functionality. The systems have developed from simple data entry and record storage to complex relational database driven tools. They now offer enhanced functionality often provided over the wireless networks and company intranet, allowing greater flexibility for inspections in remote and difficult environments Regulations and ComplianceThe functionality of the LIMS system is far greater than just tracking and reporting on samples. LIMS systems must often comply with regulations that affect the user, for example a manufacturer of pharmaceuticals is obliged to operate under the cGMP 21 CFR Part 210 – Current Good Manufacturing Practice in Manufacturing, Processing, Packing, or Holding of Drugs. Other regulations that LIMS systems must operate under include HIPAA, ISO 9001, and ISO 15189. It is important for systems to have the ability to accept e-signatures, as well as offer audit trails and chain of custody.These types of functionality are required to ensure that the correct persons have access to the sample and the results of the sample inspection Equipment Calibration and Maintenance When inspections are carried out the equipment used to extract the sample and to test the sample must be maintained correctly and calibrated so that there are no errors introduced into the test results. The LIMS system should contain maintenance records of the equipment used in testing so that notifications can be generated to perform regular preventive maintenance.With some instruments and equipment, the requirement may include calibration after a certain number of uses, for example the use of a depth micrometre may require that it is calibrated after 50 uses or every month, whichever comes first. LIMS systems can also contain the calibration instructions so that a notification and a calibration instruction s heet can be sent to the maintenance department or a specialty outside vendor. LIMS Expansion Pre-1982 Laboratory notebooks and handwritten reports/charts were used to track and report information.In-house information systems were configured by a few laboratories. Custom-built LIMS became available from third-party vendors. 1982 The first commercial LIMS, known as first generation (1G) LIMS, are introduced. These 1G LIMS placed laboratory functions onto a single minicomputer, providing greater lab productivity and functionality as well as the first automated reporting capabilities. 1988 Second generation (2G) LIMS become available. 2G LIMS used the available market technology of third-party commercial relational databases (RDB) to provide application-specific solutions.Most 2G LIMS relied on minicomputers, but PC-based solutions were beginning to emerge. 1991 The move toward open systems ushered in third generation (3G) LIMS, which combined the PC's easy to use interface and standard ized desktop tools with the power and security of minicomputer servers in a client/server configuration. 1995 Fourth generation (4G) LIMS decentralize the architecture further. Processing can be performed anywhere on the network. Thus, all clients and servers can operate in either capacity depending upon the data load at any particular instance Pros and ConsMost LIMS products allow the laboratory to; register work requests; print analytical worksheets; monitor and communicate sample/technique backlogs; schedule work; acquire and store analytical data; monitor the quality of all analytical work; approve analytical data for client release; print and store analytical reports and invoices; protect the security of all data; track and locate samples in storage; track and communicate all quality control in the laboratory; provide laboratory management with production and financial statistics and with client information, e. . , names, addresses, sales figures, etc. An appropriately designed and installed LIMS can quickly bring accuracy and accessibility to the flow of samples and data in any laboratory. The real value of a LIMS is the ability to maximize sample throughput and minimize labour costs. Laboratory throughput is improved in a number of different ways. The most obvious gain in productivity occurs through the elimination of data entry via on-line instruments. Also, there will be a significant decrease in data entry errors.Finally, the up-to-date sample in-flow data available from a typical LIMS allows laboratory supervisors and bench personnel to better schedule analytical work, minimize â€Å"downtime† and maximize batch size. Some other effects are that there are better visible quality control checks and centralized data. The ability to monitor, track and communicate data and quality control information gives the laboratory the tools to improve methods and work practices. The end result is that people in the lab able to process more samples per hour worked. The problems Rushed or Incomplete InstallationLIMS installation can be expensive. As a result laboratory management has a tendency to reduce costs by shortening the time spent on-site by the design team. In addition, several installation phases may be required in order to allow laboratory personnel time to learn and apply each LIMS feature before adding the next. Effective communication between the bench personnel and the design team is key to ensuring a successful project. The best way to facilitate this communication is by extending and phasing the installation. Lack of Technician Access to the LIMSA problem that arises in some organizations as laboratory and support staff begin to use the system is a failure to recognize and remove access bottlenecks. For a LIMS to function smoothly all personnel must have their own access point. Access expansion can usually be spread over six to eighteen months as the laboratory assimilates the LIMS and usage increases. Design/Scoping Pr ocedure The design/scoping stage prior to acquiring our LIMS has involved the review and analysis of available software/hardware packages as well as the definition and documentation of our laboratory’s requirements.The error here is could be that bench personnel are excluded from the process. To resolve this problem we have had frequent meetings with the personnel in our lab. Some laboratories might go into a LIMS program believing that future requirements for bench level supervision will be reduced or eliminated. It has been recognized by many that LIMS is simply a tool and as such cannot manage the laboratory or take the place of personnel supervision. A LIMS will effectively provide current, reliable and complete operational data.The easy access to accurate data allows management to significantly enhance the quality and speed of decision making. Decision making becomes based more on fact rather than instincts. Many LIMS products tend to function more like accounting or fin ancial databases. This could be related to the educational and work experience of most software professionals. The demand for financial and accounting database packages means that the software industry is more familiar with this type of requirement than with a highly technical application like a LIMS.Thus, the average software professional does not usually have the background to effectively interpret a laboratory’s requirements. This communication problem can manifest itself in LIMS systems that do not easily fit into laboratory operations. Often the laboratory must significantly alter procedures and work flow in order to conform to the LIMS. This requirement for wholesale change significantly complicates LIMS installations and it might have poor acceptance and commitment support personnel to the project. A similar problem often occurs in large organizations with dedicated Information System (IS), departments.Significant conflict and problems can arise when IS personnel recom mend the most up-to-date hardware or software architecture regardless of the functionality, fit or overall cost to the laboratory. The end result of this process is that the laboratory must undergo significant change in order to conform to the product purchased. In the extreme case laboratories can wind-up having to increase overhead, e. g. , more data handling, in order to use LIMS systems that have been designed not for the laboratory but for the accounting or production departments.The keys to success are flexibility, adaptability, ease of evolution and support, and most importantly overall system speed. The speed issue is very critical as bench personnel will not use something that is slow or awkward. If the system saves bench personnel time they will quickly â€Å"buy into† the project and aggressively move the process forward. The key in any LIMS development should be to achieve a majority of the desired functionality without compromising system speed. Most laboratories need time to assimilate a LIMS before being able to take full advantage of all of its features.As a result of this ‘break-in period’ the more complex features can usually be postponed a year or two without affecting the success of the program. [17] This implementation delay may also allow laboratory personnel the chance to provide more input into the critical final stages of system optimization. Installation Stage The goal of any LIMS installation must be to acquire a system that will make the jobs of bench personnel easier and thus increase the efficiency of the organization. In order to be successful, the LIMS system must be accepted and welcomed by the bench personnel.Often the first contact front-line personnel have with the new system is during installation, long after all decisions have been made. This situation often leads to significant software and LIMS configuration problems that require major software re-writes, hardware retro-fits and/or disruptive organiza tional changes. In addition, analytical and support staff are more likely to resist the new system if they have had little input into its design and operational characteristics. The installation phase of a LIMS program is critical to the overall success of the project.It is during LIMS installation that personnel must be taught how to use the product and where the software designers get their first view of how the LIMS will fit into and function in the laboratory. The installation phase of a LIMS project can take from weeks to months depending on the size of the laboratory and the complexity of the project. No Staff Training Bench personnel must be taught how to use the LIMS. As with any subject laboratory staff must be taught progressively so that personnel have a chance to use and apply what they learn.In laboratories where the LIMS training has been available and sustained the staff will be using the LIMS at a similar level. This consistency of approach builds team work and staff efficiency increases. In laboratories where training has not been a priority, staff will be using the LIMS at different levels. This situation can create a great deal of competition in the laboratory as turf wars erupt over the adoption of new or unused LIMS features. Poorly trained staff fears the new features and as a result delay or resist their implementation.Poor Feedback Mechanism As noted above communication is a key component of any successful LIMS project. It is important that laboratories make sure that a well-developed feedback mechanism is put in place during the installation of a LIMS so that laboratory personnel can bring forward problems and see quick resolution. Staff often hesitate to bring forward complaints and will instead work around the problem. One successful approach that has been used by organizations to solve this problem has been regular procedural audits.The process required to perform an audit usually brings to light LIMS defects or problems that staff have been coping with. This is has already been implemented for other laboratory procedures in our lab. Conclusion Companies require that quality is part of every link in the supply chain, whether it is raw material at a vendor’s facility or finished goods delivered to a customer. To ensure that the quality personnel are able to achieve the optimum results, a Laboratory Information Management System is vital to that success.

Saturday, September 14, 2019

Kashmir Problem

I think that if war is seen as real possibility, all efforts should be on its prevention as war brings killing of innocent people, hunger and devastations. The region of Kashmir would hardly be able to restore uniqueness of the legendary beautiful mountainous area. Moreover, 7 million of people are endangered to be killed. But for what?This question is a matter of interest for many politicians, historians and economists as many countries are involved in the conflict – India, Pakistan are the primary participants of the conflict, and the US has its own position towards the problem. Pakistan and India are known to have dispute over Kashmir as they are willing to divide the region. â€Å"Line of Control† is introduced as a violated truce.The problem is that India views Kashmir region as a part of its nation and it claims that Pakistan has occupied illegally portion of the region. Therefore, Indian government is going to prevent unification between Kashmir and Pakistan. In its turn, Pakistan residents are allowed to choose freely whether they want to live in Kashmir or in Jammu. It goes without saying that India rejects such plebiscite. In my opinion, the most dangerous thing is that both countries are nuclear power. It means that in war they may refer to nuclear weapon which can destroy not only Pakistan or India, but also all neighboring states.I think that everything should be done to solve the conflict peacefully to avoid killing. The article mentions that India had invented more than 300 kg of weapons-grade petroleum in 1995, and it is hard to image what the consequences of such attack may be. Additionally, both countries are hardly equipped with ballistic missiles and fighter jets which could be armed with nuclear weapons.The conflict is worse by the fact that India suffers from terrorist attacks and may refer to military response, whereas Pakistan views India as aggressor which is willing to take full control of Kashmir threatening in such a wa y Pakistan nation. It is rather hard to decide whether India or Pakistan can be considered right. The situation is two-fold, but it is necessary to press Pakistan to give up terrorism as it encourages India to attack.ReferencesKashmir. New York Post On-line. Retrieved March 28, 2008, from http://www.washingtonpost.com/wp-srv/world/kashmir/front.html

Friday, September 13, 2019

An Introduction To Accounting

An Introduction To Accounting AIS is a system that collects and store accounting data, after that process the data into useful information used by the decision makers (internal and external users). The information produced by AIS can help decision maker to manage their business more efficiently strategically. However, accounting information system can be manual using the traditional way of recording business transactions manually using paper-and-pen. Today the term AIS referred to as compound computer base system that merges the ability of information technology together with traditional accounting principles and practices. Accounting information systems consist of six components: People: users who work on the systems Procedures and instructions: the process of collecting, managing and storing the data Data: data which is related to the company and its business. Software: application that processes the business data Information technology infrastructure: the physical devices like personal computer and systems In ternal controls and security measures: which is employed to secure the data In the beginning, AISs were mainly developed â€Å"in-house† as legacy systems. These kinds of solutions are difficult to develop and require a high cost to maintain. In the present day, AIS are sold as prebuilt software packages from vendors. The most popular vendors for AIS are Microsoft, Sage, Group, SAP and Oracle where they customize the software to mach organizations’ business processes. Modern AIS follows a multitier architecture, which separate the application processing and data management in different layer from the presentation to the user. The presentation layer manages how the information is displayed and used by functional users of the system (through client application, web browser or mobile device). All the data in the system is stored and packed by a centralized database. this includes transactional data generated from the core business processes such as inventory, purchases et c. when a transaction occur from business event the data is collected and stored into the system database where it can be processed into useful information used by decision makers. A big benefit from computerize accounting information system is that they automate and make financial reporting more efficient. Accurate and summarized, timely information is a major tool for organizations decision making and financial reporting. The accounting information system pull imports data from the system database, process and transform it and eventually produces information and reports which can be easily consumed and analyzed by the users, managers and decision makers. These systems are required to ensure that the reports are timely and relevant so that decision makers are able to quickly and efficiently base on the information provided in the reports. Consolidation is one of the greatest characteristic of reporting as user does not have to go through a massive number of transactions. For exampl e, at the end of the accounting period an accountant consolidates all payments by running a report on the system. The system application layer reclaims the data stored in the system database and produces a report with the total payments made to the vendors for that particular period. With large corporations which have huge volume of transactional data, generating a report without AIS can take day or even weeks.

Thursday, September 12, 2019

Flannery O'Connor's A Good Man is Hard to Find Essay - 1

Flannery O'Connor's A Good Man is Hard to Find - Essay Example The Grandmother is very irritating woman. During the car ride, she lies about the dimensions of a house just to make it sound more interesting to the children. And when she realizes that the house she’s been bragging about is not even in that state, she panics and kicks the cage holding the cat. She doesn’t do that on purpose. She is annoying but she doesn’t deserve to be shot three times in the chest. In fact she tries to make a connection with the Misfit during the confrontation and when she feels sorry for Misfit and about the way he has been treated all his life, she tries to physically touch him and at that moment Misfit’s henchmen shoot the old woman. It is very true that many people only claim to be Christians but in the dealings of their lives, their behavior, their conduct and their daily conversations are devoid of the spirit of Christianity. The grandmother is blessed with a loving son but she is not thankful for it and doesn’t actually care about him. In fact she treats him as a tool and takes advantage of his obedience. In the book, after the car accident Misfit and his men seize the family and they take family members in the woods and shoot them. Seeing her fate very clear the grandmother suddenly remembers God and Jesus and turns soft. She asks Misfit to pray so that his soul may be spared for the sins he has committed all his life. A very religious and philosophical conversation takes place towards the end of the story between the Misfit and the Grandmother, where Misfit tries to mock Jesus by saying that he created a lot of confusion by raising dead people (in hidden words, he mocks the whole concept of heaven a nd hell and the day of judgment). To this, grandmother agrees somewhat by saying that probably he didn’t raise the dead after all but when she gets shot in the chest, she falls down with her legs crossed in to her grave, representing her faith in a dramatic and symbolic way. "Flannery

Tree-Species Density across Environmental Gradients Zones Research Paper

Tree-Species Density across Environmental Gradients Zones - Research Paper Example Vegetative populations proliferate in a given section of land when conditions of moisture, temperature, and soil composition favor certain species at the expense of others. Experiments of this sort are crucial to enhancing our understanding of species diversity. Â  Similar ecological conditions can exist between both mountainous regions and ravine systems. Either of these landscape systems can yield effects on communities of vegetation, providing niches where they may not otherwise exist. Landscape effects can be hydrological, thermal, and these locations are known to produce microclimates with influences on soil moisture and nutrient availability. Â  The hydrological cycle in the region can experience variations in water infiltration within the soil, proclivities towards erosion/soil retention, movements of air fronts and dry adiabatic lapse rates; all relating to the slope of the terrain, or lack thereof. Terrain slopes affect soil types, which impact the growth of a variety of plants, which itself influences sunlight availability, which influences the success of subsequent vegetation. These combinations cause vegetation to arrange in communities favoring undergrowth/ground cover, shrubs, and canopy trees. Trees are of specific importance for this study, which will document tendencies of five species to colonize either of three environmental gradient-levels upon sloping terrain. Â  These gradient-levels form zones that will naturally distribute similar plants along a horizontal axis to take advantage of the slope conditions most favorable to them, while the most variation will occur along a vertical axis, as soil and air conditions vary with elevation. Â  

Wednesday, September 11, 2019

The Cold War and U.S Diplomacy Essay Example | Topics and Well Written Essays - 750 words

The Cold War and U.S Diplomacy - Essay Example In the context of the United States, presidential doctrines normally consist of attitudes and major goals for the country’s foreign relations as outlined by a seating President. It is of essence to note that Presidential doctrines are usually established in order to address certain events that are ongoing in the international arena, and therefore, the Presidential doctrine presents guidelines on how the country will handle or approach the prevailing regional or global event. The previous research paper, focused on the Reagan doctrine that was developed and implemented during Ronald Regan’s presidency. Troy (2011) stated that the Reagan doctrine was established mainly to curtail or diminish the influence of the Soviet Union during the Cold War era. During the Cold War era, the Soviet Union committed aggressions and oppression on the citizens of the territories that it had occupied and even violated human rights of theses citizens. Therefore, the Regan’s doctrine was aimed at diminishing the Soviet Union hold on these territories and securing the rights and freedom of those who had suffered under the rule of the Soviet Union. The relationship between the United States and Soviet Union prior to the announcement of the Regan’s doctrine According to Graham et al. (2011), the United States and the Soviet Union had long been at loggerheads with each other mainly because of their difference in terms of political and economical ideologies. Prior to the announcement of the Regan’s doctrine, the two countries had been engaged in a battle for supremacy, with the United States constantly trying to diminish the dominance of the Soviet Union both in the Eastern and Western Union, where the U.S had already established political and economic ties. Graham et al. (2011) wrote that the severity of the bad relationship between the two countries was demonstrated when the U.S extended its Marshal plan to the Soviet Union under certain conditions that were known to be unacceptable by the Union. Additionally, prior to the announcement of the Regan doctrine, Troy (2011) wrote that the U.S and its allies in Western Europe opted to strengthen their relationship and spite the Soviet Union. The current relationship between the U.S and the Soviet Union According to the writings by Graham et al. (2011), they wrote that despite the end of the Cold War in November 1989, the U.S and the post-Soviet Russia still do not enjoy a cordial rel ationship. Moreover, certain occurrences have alluded to the existence of a prevailing Cold War between the two nations. Hunt (2009) stated that the two countries have traditionally up-to-date failed to agree on certain global issues. For example, Russia has recently provided asylum for an American whistleblower (Edward Snowden) who is currently wanted in the U.S for espionage charges. Secondly, the U.S and Russia have taken opposing stands on the on-going civil war in Syria whereby the U.S government is seemingly backing the Syrian opposition rebels while Russia is purpotedly supporting the Syrian government. Thirdly, Russia’s President Vladimir Puttin has treated, in numerous occasions, U.S government officials including with Secretary of the State John Kerry, with a demeaning approach. The effect of the Reagan doctrine on regional or global affairs since its

Tuesday, September 10, 2019

Why Death Penalty is Right Research Paper Example | Topics and Well Written Essays - 750 words

Why Death Penalty is Right - Research Paper Example Koch presented a stronger argument than Bruck because of his strong use of logos, ethos, and pathos to support the fairness of death penalty, while Bruck failed to respond to the problem of preventing violent crimes. Furthermore, I argue that death penalty is right because the slight rise in violent crime rates justifies the need for capital punishment and anyone who murders or rapes another person has forsaken his/her right to live in a civilized society. Koch (1985) used sufficient logical appeals, through statistics and reason, to argue that death penalty is morally justifiable, while Bruck did not properly respond to the concern of resolving violent crimes. Koch (1985) used adequate statistics to prove that death penalty is suitable to the U.S. He mentioned that the murder rate increased by â€Å"122 percent between 1963 and 1980,† while the â€Å"murder rate in New York City increased by almost 400 percent†¦Ã¢â‚¬  (Koch, 1985, para.6). The statistics underscored that America is a unique case because of its high violent crime rate that death penalty can decrease. Furthermore, Koch (1985) persuaded the audience through the reason that, without death penalty, more people will die if these killers are out in the streets. By describing that Shaw killed people even before he was executed (para.2), Koch (1985) underlined that punishing Shaw by death penalty surely ended his ability to kill. Without the presence of these mu rderers, lives are spared in the process. Bruck (1985), on the opposite, did not respond on how to stop violent crimes. He mentioned that imprisonment is enough to stop murderers, but how about those who were later on released due to lack of evidence or poor handling of the justice system? Bruck (1985) did not satisfy the audience in finding a proper resolution that can truly end violent crimes for good.

Monday, September 9, 2019

Geol 3372 Petrography Adopt a rock Research Paper

Geol 3372 Petrography Adopt a rock - Research Paper Example A field research was done where the rock was identified, and physical examination done to substantiate its characteristics. The paper seeks to explain the various types of hornblende andesite and their location around the world. An understanding on the on the plate tectonics association is important in understanding the natural processes that necessitated the formation of the rocks in the various location regions in the world. The thin report section gives the complete picture on the physical and chemical composition of the hornblende andesite detailing its mineral composition. The three minerals that make up the hornblende are Plagioclase, Sanidine mineral, and the Hornblende mineral. A hand sample showing dark gray hornblende in a very fine-grained groundmass is also illustrated further to exhibit some of the physical characteristics of hornblende. Hornblende is a common rock-forming mineral that is found in igneous and metamorphic rocks. Hornblende andesite has several different types of minerals at varied percentages (Kepezhinskas 246). The crystals vary in chemical composition, but they are all double chain in silicates with similar physical characteristics. The chemical composition of the minerals include metals, such as magnesium, chromium, calcium, sodium, iron, aluminum, silicon, fluorine, manganese, potassium, and hydroxyl (Kepezhinskas 246). The above chemical substances vary in percentages. It is composed of calcium, sodium, magnesium, iron aluminum, silicon, and Fluorine and hydroxyl groups. Different composition of these chemical substances makes the appearance or the optical properties of the rock to differ .The general optical characteristics of the hornblende andesite are: Fig 1.1 shows a hand specimen showing a dark gray hornblende in the very fine-grained groundmass (Kepezhinskas 246). The hornblende andesite minerals consist of the different chemical

Sunday, September 8, 2019

Nuclear Weapons Thesis Proposal Example | Topics and Well Written Essays - 500 words - 1

Nuclear Weapons - Thesis Proposal Example In spite of the apprehensions that have been elevated about the nuclear weapons, those who are taking part in the creation and development of such weapons have stated that the weapons are not intended to disturb the world peace. They have argued that the project is important for their countries and should not be seen as steps towards destabilizing the world or causing unnecessary harm to the world populations. Some people have argued that the nuclear weapons pose no threat to the world and they should therefore not be destroyed and the countries that are involved in the creation and development of the nuclear weapons should be allowed to proceed with the projects (Mueller par 3). B. The public needs to be given information on the various perspectives of the nuclear weapons and also on the implications that devolvement and use of the weapons will have on their lives as well as the lives of the rest of the world population (Krieger 65) A. When countries are involved in the creation of nuclear weapons, other counties use it as an excuse to also develop their own nuclear weapons and this has led to the militarization of world countries (Bernstein 43) B. Others have however argued that the choice to engage in the creation of the weapons is something that is solely dependent on the administration of a country and is not influenced by the fact that others are engaging in it (Mueller para 4) D. Some, however, argue that the nuclear weapons are not the sole cause of cross-border diplomacy wars since such wars and relations issues exist even in areas where nuclear development and creation is not taking place.

Saturday, September 7, 2019

Are laws that protect us from our own dangerous behaviors (such seat Essay

Are laws that protect us from our own dangerous behaviors (such seat belt or helmet) morally acceptable - Essay Example Controversies over the laws which are basically designed for protecting people from dangerous behavior are problems of paternalism. Paternalism is interference in people’s freedom though it is for their own good. It is like a father making decisions for his kids instead of letting the kids make decisions for them, considering one important thing that father knows best. Wide range and variety of laws, practices and actions are taken into account which is under the principles of paternalism. More like a doctor or physician deciding what is best for his patients and the laws which are designed to restrict the use of cocaine, marijuana, heroin and other drugs. Such plans also include compulsory retirement plans, mandatory seatbelt laws which are designed to protect one’s interest whether they are liked by the people or people detest them. All these paternalistic practices are common, but the question is whether these practices are morally accepted or not. There is conflict of two important values attached with paternalism which include the value is taken into account for protecting and also promoting well being of others, along with the value which is associated with the freedom of persons which make their lead their life according to their wish and choice. When the people are ready to act in certain ways oppose to their own well being and security , an important question arises that are the laws justified which interfere in people’s private choices and matters. This is what leads to the problem of paternalism. There is a majority who would agree that paternalism becomes a justified thing when it is about a person who has limited and also impaired freedom of choices whether the cause of this is limited cognitive capacities or even the ignorance of facts, effects of a disease, influence of drugs and another reason can be due to coercion. Paternalism varies depending on the person, their emotional stability and behavior along with the capacity to understand and know what is best for them. According to many moral philosophers, a competent and a knowledgeable person should be allowed to make decisions freely and they should not be over ridden, though they are for their own person’s good. There was a case voiced by John Stuart Mill who was a British philosopher during the nineteenth century, according to him the only reason due to implement and make laws for the citizens and people of civilized community is to prevent problems and harm to others. Will of one’s own being is not enough physically and even morally. The laws are made for a collective society and laws which are beneficial and important for protecting the society over all. According to Mill, it was important to provide freedom as it is important and crucial for people’s individual personality development. Along with that people should be given a free hand for making choices they wish and like even if the choices are not the best ones. All these individual choices creates ability for people to make decisions and their decision making power will only improve their practices and experiences. Another important view which he holds was that individuals are the best judge for

Friday, September 6, 2019

The History Boys Essay Example for Free

The History Boys Essay What elements of Bennetts own educational experiences has he used in â€Å"the History Boys†? Bennett says that he was made fun of at school for coming to school in a suit on the day of his exams. He says he did this because he thought the exam was an occasion and he must rise to it. This show us how he felt towards his exams and probably shows how some of the boys in his book would have felt like when taking their exams. This shows how important he thinks exams are and this theme will probably reflect in the book. Bennett then goes to talk about taking his finals at oxford, this is where the boys in the book are aiming for and he has already been there and knows what it’s like to pass so he will probably talk about the emotions that he felt when he passed. Bennett talks about his Head teacher and describes him as a â€Å"snob† and as we already know that the Head teacher in the book is a snob. Bennett being from a working class family and the boys in the books being from a working class family then he will probably share his experience of feeling like a second class citizen compared to the boys from Eton or the other private schools down south. Bennett says that the â€Å"History Boys† has nothing to do with his â€Å"contemporaries† but this is hard to believe as the subject of the book is so close to his life. He could be telling the truth or trying to hide the embarrassment of whatever happens in the book. Bennett goes to chapel and says in the play that Scripps also goes to chapel this could be show the subtle differences between the boys in the play. He also talks about his teacher getting upset with his class which he also uses in the book. Bennett being a homosexual is also reflected in one of the boys in the book so Bennett’s sexuality is also in the book so it’s like the boys in the book all make up Bennett rather than just one. Bennett felt like he wasted his time at university although I doubt we will see the characters in the book reach university because the book is about the seventh term but some of the boys may end up feeling like this at the end of their school careers. Bennett fe els like a fraud for just retaining information onto a page, he may reflect this feeling onto one of the boys in the book. Bennett states that reading a book about the working class going to university often tires them out and it reflects poorly in their efforts at university and he portrays these feelings into Posner.

Thursday, September 5, 2019

Impact of Information Technology Outsourcing

Impact of Information Technology Outsourcing Introduction Information Technology Outsourcing (ITO) will continue to have a major impact on all organizations and will over time increasingly becomes an integral part of the organizations strategy. Various aspects within the metamorphosis of ITO will be covered but not necessarily detailed. ITO has become a global phenomenon. Globalization with some distinct drivers in technology evolution has reshaped the market place and given rise to the advent of the digital age. Sustainable competitive business strategy will need to embrace this opportunity and will need to seek enablers to exploit it. IT, by virtue of the web and broadband communications in particular, allows an organization to fulfill this need. Further decrease in costs communication, increase in broadband capacity and web collaborations accelerates the process. Definitions Outsourcing has variously been defined by scholars in the Information Systems (IS) literature as follows: â€Å"The significant contribution of external suppliers in the physical and/or human resources associated with the entire or specific component of the IT infrastructure in the user organization.†(Loh and Venkataraman,1997) Outsourcing occurs when third party vendors are responsible for managing the Information Technology components on behalf of their clients. IT Outsourcing means handing over the management of some or all of an organization’s information technology (IT), systems (IS) and related services to a third party.†(Willcocks et al.,1998) †¦business practice in which a company contracts all or part of its information systems operations to one or more outside information service suppliers (Hu et al., 1997, p. 288) â€Å"Outsourcing is the handover of an activity to an external supplier. It is an alternative to internal production†(Aubert et al.,2003) â€Å"IS sourcing† is the organizational arrangement instituted for obtaining IS services and the management of resources and activities required for producing these services (Dibbern et al., 2004 , p. 11). Therefore outsourcing involves the transfer of the responsibility for carrying out an activity (previously carried on internally) to an external service provider against agreed service levels at an agreed charge. History ITO has received great attention for scholars and researchers since the mid 1990’s but it’s been around for a while as per the examples below: 1963 – Electronic Data Systems (EDS under Ross Perot) signs an agreement with Blue Cross for handling of its data processing services. Mid-1980s EDS signed contracts with Continental Airlines, First City Bank and Enron. 1989 – Kodak outsources its IS function to IBM, DEC Businessland (â€Å"Kodak Effect†) being the most notable example. More recent developments (Kern and Willcocks 2000, Ross and Westerman 2004, Kishore 2003, Kaiser 2004, Lander 2004, IBM 2004, Smith and McKeen 2004), suggests motivation is more strategic in nature with the goal of improving the business’ competitive advantage. It’s clear that ITO is not quite a new phenomenon but increasingly more prominent in this era where it is prevalent in almost every facet of business. The industry evolved from monolithic mainframe to pervasive computing. A survey of the London Stock Exchange FTSE Index over a period of three years found a generally positive relationship between high levels of outsourcing and enhanced stock market performance. Reasons for outsourcing Organizations adopt ITO for various reasons (Turban et al, 2006). The ever dynamic evolution within the IT sector grants great opportunity to business. The following reasons were invariably most common as per numerous surveys done and researched globally: Cost reduction This has been the foremost reason to outsource as senior executives’ only views the IT function as a noncore activity and a necessary cost to be minimized. Economic pressures are also external factors that lead to advent of ITO. Lacity and Willcocks(2001) explains that cost savings are no longer a major reason for outsourcing. Focus on core competency Business deems IT as a cost centre and excludes it from its core strategy. With increased shareholder demands organisations feel they need to refocus on broader business issues other than technology. Organizations places more focus on their â€Å"core competency† business (Field, 1999). Access to specialist expertise and technology Highly skilled labour comes at a cost and also the technology and is also not readily available. ITO is not only for cost savings but as a tool for utilizing state of the art expertise and technology through their service providers (Field, 1999). However of late, the companies with strong IT capabilities, such as IBM, Microsoft and SUN, are also outsourcing some of their IT functions to concentrate on their core-responsibilities and reduce costs to the economies of scale. Decision Making In the past, organizations used frameworks and models as guidelines for assessing their current state and determining future strategic actions (Gorry and Scott-Morton 1971, Nolan 1973, Luftman 1999, Venkatraman and Henderson 1993). More organizations are considering ITO as part of their strategic thinking. Organizations use ITO as a method to reduce costs, achieve efficiency and flexibility but many don’t realize the benefits due to bad decision making. ITO decision-making is a process and requires careful scrutiny before being finalized. ITO decision making process addresses a wide range of issues, such as economical (eg., financial feasibility), technological and political .This process starts with an in-house assessment of the IT capabilities which should highlight to management activities that can potentially be outsourced. SWOT (Strengths, Weaknesses, Opportunity, Threats) analysis could be used to substantiate the need whether ITO can possibly be used to negate those threats and weaknesses or whether at all necessary to explore ITO. The facts gathered should include a baseline and evaluation of the current environment which should be made available for executive management approval. Knowledge within the strategic decision at this higher level can thus be descriptive (know-what), procedural (know-how) or reasoning (know-why) (Fahey et al., 2001; Holsapple Singh, 2000). Case studies within surveys conducted by M.C.Lacity,L.P.Willcocks and D.F.Feeny published in the Sloan Management Review(Spring 1996) summarizes the ITO process. The abovementioned reasons were most common in their samples. Scope of sourcing Sourcing is often referred to in IT literature as outsourcing. The research delineates four categories of sourcing: Total outsourcing is where all IT activities including assets and management become the responsibility of a third-party vendor. Total insourcing refers to the in-house management of IT activities where external or internal staff is used with the buying in of the vendor resources to meet a temporary need. Vendor resources are only used to supplement the internally managed teams. Selective sourcing locates selected IT activities to vendors while the customer remained responsible for delivering the result and will be held accountable. De facto insourcing uses internal IT departments to provide products and services that arise from historical precedent, rather than from a reasoned evaluation of the IT service market. Considerations of sourcing Critical review of above categories found that the all-or-nothing approach ( total outsourcing) characterized by long-term(5 years or more) deals can lead to trouble after a few years as exemplified in the case studies due to: Senior Management approach ITO like any other make-or-buy decision where ubiquitous IT applications across business functions complicate matters. Lost alignment between business and IT strategies. Failed promises to access new technologies. Processing power cost depreciates at an average of 20 percent annually due the IT capabilities evolvement. And contractual costs soared greater than market prices. Termination of such contracts was found to be prohibitively expense. Research found that those who approach ITO in all-or-nothing terms either incur great risks or forego the potential benefits of selective sourcing. Reasons for ITO can be categorized as two dimensional and based on: Purchasing style refers to contracts to either be once off or an expectation of business for many years. Purchasing focus refers to companies buying resources from vendors, such as hardware,etc, and manage the delivery of IT themselves or vendors manage the IT activity and the organization expect the specified results. The result is four distinct categories will be representative of whether ITO is required as figure 1 represents. The figure also represents a decision matrix for business and guide for an effective strategy. A decision in selecting what can be outsourced usually distinguish between the contribution that IT makes to the business operations and it’s impact on competitive advantage. ITO was primarily domestic but has now evolved due to globalization and can also be categorized now by variance of service provider distance. The same reasons apply globally for ITO. On-shoring refers to the outsource vendor located in the same country of the customer. Near-shoring refers to the outsource vendor located geographically close but not in the same country. Off-shoring refers to the outsource vendor located offshore and possibly on a different continent and time-zone. Managing ITO Once the scope and type has been identified,the vendor selection process will be initiated by soliciting via Request for Proposal(RFP). Not all service providers are equal as all offer different types of services like: IS consultancies/solutions providers services in all IS functions Systems houses system integration Hardware vendors – hardware platform Ex-IS departments industry specific sourcing Development houses – develop software Generic outsourcers manage functions, especially infrastructure Freelancers There are also important criteria to look for in your service provider. Appropriate outsourcing experience and proven customer satisfaction track record. Accredited in application of best practices such as ITIL with the necessary evidence. Adequate numbers of skilled labor. Scale and geography to fulfill the organizations needs. Prepared to be flexible to you organizations needs, ie plan with current staff. Upon selection of the ITO partner, an outsourcing contract provides a legally bound, institutional framework in which each party’s rights, duties and responsibilities are codified and the goals, policies, and strategies underlying the arrangement are specified. Selective sourcing allows for flexibility within the short contracts. While some organizations realized their benefits in ITO, others have not been able to achieve benefits due to poor staffing of the IT function, poorly written service level agreements (SLA), lack of outsourcing experience on the client side, poor project management skill, poor technical infrastructure (especially in some offshore cases), and lack of trust (Jennex and Adelakum 2003, Lacity and Willcocks 2001). A contract alone is insufficient to guide outsourcing evolution and performance since it involves repeated inter-organizational exchanges that become socially embedded over time.This is why ICT outsourcing is very challenging and often a painful process!! Governance is fundamental to outsourcing relationships. Tracking SLAs and ensuring compliance to contracts are critical to controlling costs and setting minimum performance requirements. It is therefore important to ensure that the ITIL framework,starting with support management, are implemented to ensure that the IT aligns with business with the necessary metrics in place. Control Objectives for Information and Related Technology (COBIT) framework will ensure that all policies should be enforced, especially adherence to security. Critical Success Factors in an outsourcing relationship that should mitigate risk: Define a strategy with measurable goals within your SLA to ensure the relationship don’t lose momentum over time. Exercise due diligence to establish a baseline for the relationship. With the adoption of the ITIL Framework,adopt a comprehensive change management strategy. Always keep senior management involved to ensure that adherence to policies and procedures. The right metrics and regular reporting build confidence and help sustain relations. As per the Tuckman’s stage model the relationship should grow like a team and evolve in stages. Stage one is the Insourcing stage where organizations buy only a few IT functions or services from external vendors on short term contractual agreements. Only a few IT activities are bought from outside parties, generally less than 5% of the entire IT operation. Stage two is the Forming, or experimenting, stage. In this stage organizations engage in sporadic outsourcing of IT activities. Sourcing activities may be between 10-20% of the entire IT needs in the organization. Stage three is the Storming stage; it is regarded as a transition stage. At stage three organizations need to make a decision either to pursue outsourcing actively or to keep on experimenting. Stage four is the Norming stage. At this stage organization have already made a decision to pursue IT outsourcing actively and have established some norms, methods or processes for IT outsourcing within the organization. The reason for outsourcing could be either cost focus or desire to improve internal efficiency. Outsourcing could account for up to 40% of IT activities. The last stage is the strategic focus stage. In this stage IT outsourcing is part of the corporate strategy and it is not based just on cost reduction or IT improvement but is a strategic decision to use IT outsourcing within the entire organization as part of corporate strategy. Benefits from ITO Offshore outsourcing holds more advantages than disadvantages with: IT outsourcing to India helps to leverage from immensely intelligent, skilled and dedicated resources at reduced labor. Opportunity to expand service levels beyond ordinary. 24/7 Productivity has given rise to the â€Å"global delivery system† where development in particular could be done around the clock or â€Å"overnight† in a collaborative model. Choice of accredited vendors indicates that best practices are applied which should result in increase quality of service. Best-of-breed technologies accompanied by best practices should decrease the latency on time-to-market. Conclusion All factors for outsourcing was highlighted in would thus mitigate risks and highlight benefits.The future of outsourcing include service-oriented architecture (SOA), green IT, the changing role of practitioners and what the future holds for convergence of technology and business process. The ITO market would thus become more specialized and modular. Offshore ITO has also grown due to the bandwagon effect where other organizations just take advantage of the options prompted by others. Numerous surveys in outsourcing indicates that Offshore Leaders are Canada, India, Ireland, Israel, Philippines Up-and-comers are Brazil, China, Malaysia, Mexico, Russia, South Africa. Rookies are Argentina, Chile, Costa Rica, New Zealand, Thailand, Ukraine Reverse sourcing is a new trend in global business where offshore outsourcing is reversed to near-shore outsourcing but not primarily for cost factors. This trend is more evident in call-centers as customers prefer dealing with agents proficient in their language and culture. References Apte, U. M., Sobol, M. G., Hanaoka, S., Shimada, T., Saarinen, T., Salmela, T. and Vepsalainen, A. P. J. (1997). IS Outsourcing Practices in the USA, Japan and Finland: A Comparative Study, Journal of Information Technology, Vol. 12, pp. 289-304. Bansal, V. and Pandey, V. (2003). A decision-making framework for IT Outsourcing using Analytical Hierarchy Process, Kampur, Indian Institute of Technology Buchanan, Steven (2006). â€Å"A framework for business continuity management† International Journal of Information Management, vol. 26, no. 2, pp. 128-141, Apr 2006 Corbett MF (2004)- The outsourcing revolution, Dearborn Trade Pub Dibbern, J, Goles,T, Hirschheim, R, Jayatilaka, B (2004). Information Systems Outsourcing: A Survey and Analysis of the Literature. The DATA BASE for Advances in Information Systems – 2004 (Vol. 35, No. 4). Felton JD (2008)- The Art of Outsourcing Information Technology,AuthorHouse Gallivan, M. J. and Oh, W. (1999). Analyzing IT Outsourcing Relationships as Alliances among Multiple Clients and Vendors, Proceedings of the 32nd Annual International Conference on System Sciences, Hawaii. Gottschalk P (2006)- Knowledge Management Systems: Value Shop Creation,Idea Group Inc (IGI) Greaver MF (1999)- Strategic outsourcing: a structured approach to outsourcing decisions and initiatives,AMACOM Div American Mgmt Assn Gupta A (2008)- Outsourcing and Offshoring of Professional Services,Idea Group Inc (IGI) http://is2.lse.ac.uk/asp/aspecis/20040001.pdf http://sloanreview.mit.edu/the-magazine/articles/1997/spring/3834/beyond-outsourcing-managing-it-resources-as-a-value-center/ http://www.eds.com/about/history/timeline.aspx http://www.iitk.ac.in/ime/veena/PAPERS/icsci04.pdf Hu, Q., Saunders, C. and Gebelt, M. (1997). Research Report: Diffusion of Information Systems Outsourcing: A Re-evaluation of Influence Sources, Information Systems Research, Vol. 8, No. 3, pp. 288-301. Khosrowpour M(2003)-Advanced Topics in Information Resources Management,Idea Group Inc (IGI) MC Lacity, LP Willcocks, DF Feeny (1996)- Sloan Management Review http://hickeyj.googlepages.com/p5.pdf Mcivor R (2005)- The Outsourcing Process,Cambridge University Press Michaelides P -Reasons Leading to the Ineffectiveness of Information Systems Outsourcing in Minimising Costs,Universal-Publishers Schniederjans AM,Schniederjans DG(2007) Outsourcing management information systems,Idea Group Inc (IGI)