Thursday, October 31, 2019

Tool mark Examination Physical Criminalistics Lab Report

Tool mark Examination Physical Criminalistics - Lab Report Example Tools can include the usual instruments such as screwdrivers, drill bits, hummer, pry bars and punch or other substances such as rocks. Different tools will create different impressions or marks but each tool creates an impression that is unique to itself. Tools and their impressions are largely defined by the manufacturing process that was used in production and thus lab scientists should be familiar with the various manufacturing processes including casting, forging, extrusion, machining and others. Also certain manufacturing process produce marks that change with time due to wearing of the cutting tool when in contact with the work piece (Monturo, 2010, p 8). Ductile materials may also develop built up edges during machining when the material cold welds onto the tool cutting edge due to high pressures resulting from the process. As more pressure is applied, the built up edge breaks off and the new material replaces the edge and thus the change in the cutting surface is used to examine the manufactured tools and their marks. The main types of marks that are created by different tools including impressed marks such as hammer strikes and striated marks such as the marks made when a screwdriver slides over a soft surface (Association of Firearms and Tool Mark Examiners, 2007).The toolmarks are further classified according to their class and subclass properties. Tools also have individual characteristics including random imperfections resulting from the manufacturing process, corrosion or damage (Association of Firearms and Tool Mark Examiners, 2007). Class characteristic features are defined before the manufacture of the tool and include its shape and size and the type of impression that is imparted by the tool including shearing, slicing, compression and crimping (Association of Firearms and Tool Mark Examiners, 2007, p 8). Subclass properties are in most situations confused with the individual characteristics. They are the

Tuesday, October 29, 2019

Social and Environmental Accounting Research Paper

Social and Environmental Accounting - Research Paper Example This report states, Western Australia has implemented a water minimization program in 1997 and its implementation led to the reduction of usage of water, saved the company thousands of dollars and reduced their level of reliance on the water that is supplied by the municipal council. The objective of implementing this program was to optimize the water supply and also reduce the rate of consumption of poor quality drinking water that could be a health hazard to the residents of the area and minimize the flow of untreated waste water that was being discharged to the environment (BP, 2006). BP refinery processes over 138 barrels of oil per day .The refinery equipments and machinery ensures that the raw materials are processed into complete finished products. The management of the company found it worthwhile to be conservative after becoming more water conscious and water efficient. BP implemented various strategies that were aimed at improving the rate of performance within the organization. The strategy includes; delivery of water that is of high quality for consumption, minimizing on the cost of running the operations of the organization and maximizes the profits of the organization. It also minimizes the potential environmental risks from water that is being dis charged from the environment (Bp, 2006). The managemenThe management of the BP Company published the sustainable report 2007, addressed issues that are related to the observance and recognisition of the audience as important persons within the community. It also states that the major stakeholders' role within the community involves meeting the needs and wants of the customers within the stipulated period of time. The major stakeholders include academicians, investors and other non-governmental organizations (Appendix 1, Bp, 2007, cover page). BP sustainability refers to the capacity to endure and meet the needs of the people through renewing their assets, creating and delivering different kinds of products and services that can meet the needs of the people within a given period of time. It also refers to the process of ensuring that the rights of people are respected and observed in order to enable them carry out the tasks that have been assigned to them and also ensure that the operations and activities carried are undertaken in the appropriate manner. Moreover, Bp also ensures that the mutual trust and support that is bestowed on the customers, shareholders and the communities is maintained so that the activities of the company can continue into the foreseeable future (Burke, 1999). In similarity to BP water minimization program, Thames report was prepared and aimed at identifying the cause and solutions of flooding observed in Bowmonts Road. This report states the impact of the proposed development in River Tadley that would have been undertaken on the network. Besides that, is also intended to identify the options that can alleviate foul flooding in the region and also to provide the cost estimates for options

Sunday, October 27, 2019

Database Design And Development For Petcare Veterinary Computer Science Essay

Database Design And Development For Petcare Veterinary Computer Science Essay Draw an Entity Relationship Data Model that describes the content and structure of data held by PetCare. Specify the cardinality ratio and participation constraint of each relationship type. Database Development Process The process is divided into four main stages: requirements elicitation, conceptual modeling, logical modeling and physical modelling. The techniques used in the development process naturally divide into three categories: those concerned modelling, those concerned with logical modelling and those concerned with physical modelling. Figure 1 the database development process Requirements Elicitation Requirements elicitation involves establishing the key technical requirements for a database system usually through formal and informal interaction between developers and organizational stakeholders such as users. It provides the structure of data needed and the use of the data in some information system context. Stakeholder identification and participation One of the first things that must be done in any information systems project is to identify the relevant stakeholders. A stakeholders group is any social group within and without the organization that potentially may influence the successful use and impact of the database system. Veterinary doctor Use the database to for managing treatment information of pet Staff keep track of animal and appointment Regulators National and regional government may need to audit the database Requirements Elicitation and requirements specification Requirements elicitation is the precursor to requirements specification. In terms of a system to manage Petcare, the following is a list of proposed requirements for system: The database should be capable of supporting the following transaction: Create and maintain records recording the details of Petcare Pets clinics and the members of staff at each clinic. Create and maintain records recording the details of pet owners. Create and maintain the details of pets. Create and maintain records recording the details of the types of treatments for pets. Create and maintain records recording the details of examinations and treatments given to pets. Create and maintain records recording the details of invoices to pet owners for treatment to their pets. Create and maintain pet owner/pet appointments at each clinic. Data requirements PetCare veterinary surgery Petcare has six medium sized veterinary surgery clinics across London. The details of each clinic include address of branch, telephone number, opening hours and emergency contact telephone number. Assuming that each clinic has a number of staff for example vets, nurses, secretaries and cleaners. Staff The details stored on each member of staff include the staff name, address, home telephone number and mobile telephone number. Pet owners When a pet owner first contacts a clinic of Petcare the details of the pet owner are recorded, which include name, address, home telephone number and mobile telephone number. Pets The details of the pet requiring treatment are noted, which include a put number, type of pet, age and sex. Examinations When a sick pet is brought to a clinic, the vet on duty examines the pet. The details of each examination are recorded and include an examination number, the date and time of the examination, the name of the vet, the pet number, pet name, and type of pet, and a full description of the outcome of the examination results. Petcare provides various treatments for all types of pets. The details of each treatment include a treatment number, full description of the treatment, and the cost to the pet owner. Based on the result of the examination of a sick pet, the vet may propose one or more types of treatment. For each types of treatment, the information recorded includes the examination number and date. Invoices The pet owner is responsible for the cost of the treatment given to a pet. The owner is invoiced for the treatment arising from each examination, and the details recorded on the invoice include the invoice number, invoice date, owner number, owner name and full address, put number, put name, and details of the treatment given. The invoice provides the cost for each type of treatment and total cost of all treatments given to the pet. Additional data is also recorded on the payment for example cash, credit card or check. Appointments If the pet requires to be seen by the vet at later date, the owner and pet are given an appointment. The details of an appointment are recorded and include an appointment number, owner name, date and time. Using the logical database design methodology Entity-Relationship modeling is a top-down approach to database design. We begin ER modeling by identifying the important data (called entities) and relationships between the data that must be represented in the model. We then add more details such as the information we want to hold about the entities and relationships (called attributes) and any constraints on the entities, relationships, and attributes. Identify entities Identify entities A set of objects with the same properties, which are identified by a user or organization as having an independent existence The first step in logical database design is to identify entity that you have to represent in the database. Entity name Description Occurrence Clinic Veterinary clinics One or more Petcare clinics located throughout London Staff General term describing all staff employed by Petcare Each member of staff works at a particular clinic PetOwner Owners of pets taken to Petcare Owner takes his/her pet to a particular clinic Pet Sick animal seek treatment to the clinic One or more animal are taken to the clinic Examination Treatment Invoice Appointment PetTreatment Attributes The particular properties of entities are called attributes. Attributes represent what we want to know about entities. Single-Valued attributes The majority of attributes are single-valued for a particular entity. For example, each occurrence of the Staff entity has a single value for the staffNo attribute (for example,001), and therefore the staffNo attribute is referred to as being single-valued. Derived attributes An attributes that represents a value that is derivable from the value of a related attributes, or set of attributes, no necessarily in the same entity. Some attributes may be related for a particular entity. For example, the age of a pet is derivable form the date of birth (DOB) attribute, and therefore the age and DOB attributes are related. We refer the age attributes as a derived attributes, the value of which is derived from the DOB attribute. Age is not normally stored in a database because it would have to be updated regularly. On the other hand, as date of birth never changes and age can be derived from date of , date of birth is stored instead, and age is derived from DOB attribute, when needed. Identify relationships Having identifies the entities; next step is to identify all the relationships that exist between these entities. A relationship is a set of associations between participating entities. As with entities, each association should be uniquely identifiable within the set. A uniquely identifiable associations is called a relationships occurrence Clinic Relationships Entity Relationship Entity Clinic Has Veterinary Registers Pet Schedules Appointment IsContactedBy PetOwner Veterinary Relationships Entity Relationship Entity Veterinary Performs Examination Pet Owner Relationships Entity Relationship Entity PetOwner Owns Pet Pays Invoice Attends Appointment Pet Relationships Entity Relationship Entity Pet Undergoes Examination Attends Appointment Cardinality Ratio of PetCare database Cardinality or degree concerns the number of instances involved in a relationship. A relationship can be said to be either a 1:1 (one-to-one) relationship, a 1: M (one-to-many) relationship, or an M: N (many-to-many) relationship. Final Clinic relationships Entity Cardinality Relationship Cardinality Entity Clinic 1..1 Has 1..M Staff 1..M Registers 1..M Pet 1..1 Schedules 1†¦M Appointment 1..1 IsContactedBy 1..M PetOwner Final Veterinary Relationships Entity Cardinality Relationship Cardinality Entity Veterinary 1..1 Performs 1..M Examination Final Pet Owner Relationships Entity Cardinality Relationship Cardinality Entity PetOwner 1..1 Owns 1..M Pet 1..1 Pays 1..M Invoice 1..1 Attends 1..M Appointment Final Pet Relationships Entity Cardinality Relationship Cardinality Entity Pet 1..1 Undergoes 1..M Examination 1..1 Attends 1..M Appointment First draft Entity Relationship Data Model Second draft Entity Relationship Data Model Final Entity Relationship Data Model Task 2 Normalization Normalization is a technique for producing a set of table with desirable properties that support the requirements of a user or company. There are several normal forms, although the most ones are called first normal form (1NF), second normal form (2NF), and third normal form (3NF). All these normal forms are based on rules about relationships among the columns of a table. First normal forms (1NF) Only first normal form (1NF) is critical in creating appropriate tables for relational databases. All the subsequence normal forms are optional. A table in which the intersection of every column and record contains only one value Clinic (clinicNo, address, city, state, zipcode, telNo, faxNo, opeingHour) Primary Key clinicNo Alternate Key zipCode Alternate Key telNo Alternate Key faxNo Alternate Key opeingHour clinicNo address telNo openingHour C001 Enfield 503-555-3618, 503-555-2727, 503-555-6534 9.00-21-00 C002 Islington 206-555-6756, 206-555-8836 9.00-21-00 C003 Hackney 212-371-3000 9.00-21-00 C004 Holloway 206-555-3131, 206-555-4112 9.00-21-00 C005 Chingford 8502333 9.00-21-00 C006 Leyton 4650000 9.00-21-00This version of the Clinic table is not in 1NF More than one value, so not in 1NF Converting to 1NF To convert this version of the Clinic table to 1NF, we create separate table called ClinicTelephone to hold the telephone number of clinics, by removing the tellNo column from the Clinic table along with a copy of the primary key of the Clinic table. The primary key for the new ClinicTelephone table is now the telNo column. The Clinic and ClinicTelephone table are in 1 NF as there is a single value at the intersection of every column with every record for each table Clinic (Not 1NF) clinicNo address telNo openingHour C001 Enfield 503-555-3618, 503-555-2727, 503-555-6534 9.00-21-00 C002 Islington 206-555-6756, 206-555-8836 9.00-21-00 C003 Hackney 212-371-3000 9.00-21-00 C004 Holloway 206-555-3131, 206-555-4112 9.00-21-00 C005 Chingford 8502333 9.00-21-00 C006 Leyton 4650000 9.00-21-00 Remove telNo column and create a new column called telNo in the new table Take copy of clinicNo column to new table to become foreign key ClinicTelephone (1NF) clinicNo telNo C001 503-555-3618 C001 503-555-2727 C001 503-555-6534 C002 206-555-6756 C002 206-555-8836 C003 212-371-3000 C004 206-555-3131 C004 206-555-4112 C005 8502333 C006 4650000 Clinic (1NF) clinicNo address openingHour C001 Enfield 9.00-21-00 C002 Islington 9.00-21-00 C003 Hackney 9.00-21-00 C004 Holloway 9.00-21-00 C005 Chingford 9.00-21-00 C006 Leyton 9.00-21-00 Second normal form (2NF) Second normal form applies only to tables with composite primary keys that are table with a primary key composed of two or more columns. A 1NF table with a single column primary key is automatically in at least 2NF. A table that is not in 2NF may suffer from update anomalies. A table that is already in 1NF and which the values in each non-primary-key column can be worked out from values in all columns that make up the primary key. Third normal form (3NF) Although 2NF table have less redundancy that table in 1 NF, they may still suffer from update anomalies. A table that is already in 1NF and 2NF, and in which the values in all non-primary key columns can be worked out from only the primary key column and no other columns. staffNo name lastName salary clinicNo clinicAddress telNo S001 Tom Adams 25000 C001 Enfield 5035553618 S002 Sally Daniels 35222 C001 Enfield 5035553618 S003 Mary Chin 5200 C002 Islington 206555675 S004 Sally Stern 5000 C002 Islington 206555 S005 Art Peters 45822 C003 Hackney 8502333 S006 Tommy Verciti 65000 C004 Holloway 4650000 Values in clinicNo and clinicAddress columns can be worked out from telNo, so table not in 3NF Values in clinicNo and telNo columns can be worked out from clinicAddress, so table not in 3NF Values in all non-primary-key columns can be worked out from the primary key, staffNo Values in clinicAddress and telNo columns can be worked out from clinicNo, so table not in 3NF staffNo name lastName salary clinicNo clinicAddress telNo StaffClinic (Not 3NF) staffNo name lastName salary clinicNo clinicAddress telNo S001 Tom Adams 25000 C001 Enfield 5035553618 S002 Sally Daniels 35222 C001 Enfield 5035553618 S003 Mary Chin 5200 C002 Islington 206555675 S004 Sally Stern 5000 C002 Islington 206555 S005 Art Peters 45822 C003 Hackney 8502333 S006 Tommy Verciti 65000 C004 Holloway 4650000 Move column to new table Take copy of clinicNo column to new table to become primary key Clinic (3NF) clinicNo clinicAddress telNo C001 Enfield 5035553618 C001 Enfield 5035553618 C002 Islington 206555675 C002 Islington 206555 C003 Hackney 8502333 C004 Holloway 4650000 Staff (3NF) staffNo name lastName salary clinicNo S001 Tom Adams 25000 C001 S002 Sally Daniels 35222 C001 S003 Mary Chin 5200 C002 S004 Sally Stern 5000 C002 S005 Art Peters 45822 C003 S006 Tommy Verciti 65000 C004 Primary key Becomes foreign key Becomes candidate key Becomes primary key Task 3 Using a Database Management System (DBMS) of your choice, set up all the above normalized tables, and populate them with well-designed test data (minimum 5 records per table). Provides printouts of all tables. Reasonable assumption may be made with regard to data Clinic Table create table clinic ( clinicNO int not null primary key, telNo varchar(255), address varchar(255), ) alter table clinic add clinicName varchar (255) alter table clinic add openingHour varchar(255) alter table clinic add eTelNo varchar (255) insert into clinic values (01,2863015,Darwin Avenue,8.00-21.00,2863000,Enfield) insert into clinic values (02,4650001,John David Avenue,8.00-21.00,2868000,Islington) insert into clinic values (03,4278926,King Arthur Avenue,8.00-21.00,2867000,Hackney) insert into clinic values (04,2682365,Paul Mac Avenue,8.00-21.00,2866000,Holloway) insert into clinic values (05,4682685,James Micheal Avenue,8.00-21.00,2865000,Chingford) insert into clinic values (06,2863015,Benaoit Frank Avenue,8.00-21.00,2864000,Leyton) Pet owner create table petowner ( ownerID int not null primary key, oFName varchar (255), oLName varchar (255), clinicNo int foreign key references clinic (clinicNo)) alter table petowner add addres varchar(255) alter table petowner add hTelNo varchar(255) alter table petowner add mTelNo varchar (255) insert into petowner values (01,Marvin,Hemraj,1,Edith Cavel Str,2106584,758956) insert into petowner values (02,Ramjeet,Lavin,2,Avenue Gonin,2564589,7585695) insert into petowner values (03,Arzeena,Bakarkhan,3,Gorgetown Str,2106584,758956) insert into petowner values (04,Chetan,Sing,4,Jackson Road,2458695,7582658) insert into petowner values (05,Hansley,Nowjee,5,15 Ollier Avenue,2565458,7589562) insert into petowner values (06,Sam,Fisher,6,Leess Street,26584585,75895623) Pet Table create table pet ( petNo int not null primary key, type varchar (255), breed varchar (255), sex varchar (255), dob varchar (255) ) alter table pet add clinicNo int foreign key references clinic (clinicNo) alter table pet add ownerid int foreign key references petOwner (ownerid) alter table pet add petName varchar (255) insert into pet values (01,Dog,Terroer,Male,1 Jan 2004,01,01,Wouf) insert into pet values (02,Dog,Poodle,Female,2 Feb 2005,02,02,Snoopy) insert into pet values (03,Cat,Persian,Male,3 March 2006,03,03,Minous) insert into pet values (04,Cat,Siamese,Female,4 April 2007,04,04,Milous) insert into pet values (05,Rabit,Dwarf,male,5 May 2008,05,05,Lapino) insert into pet values (06,Cat,Siamese,Female,4 June 2009,06,06,Lapinas) Examination Table create table examination ( examNo int not null primary key ) alter table examination add veterinaryId int foreign key references veterinary (veterinaryId) alter table examination add petNo int foreign key references pet (petNo) alter table examination add presDrugType varchar (255), presPeriod varchar (255) insert into examination values (1,1,Anti-biotic,15,01) insert into examination values (2,2,Painkiller,14,02) insert into examination values (3,3,Behaviour modification,13,03) insert into examination values (4,4,Ear medication,12,04) insert into examination values (5,5,Skin medication,15,05) insert into examination values (6,6,Painkiller,10,06) Appointment Table create table appointment ( appNo int not null primary key, aDate varchar (255), aTime varchar (255), petNo int foreign key references pet (petNo), ownerID int foreign key references petowner (ownerID), veterinaryId int foreign key references veterinary (veterinaryId) ) alter table appointment add clinicNO int foreign key references clinic (clinicNO) alter table appointment alter column aDate date insert into appointment values (01,2 October 2010,10.00,1,1,1,1) insert into appointment values (02,3 November 2009,10.35,2,2,2,2) insert into appointment values (03,4 December 2009,13.00,3,3,3,3) insert into appointment values (04,5 January 2010,15.00,4,4,4,4) insert into appointment values (05,6 Feb 2010,18.00,5,5,5,5) insert into appointment values (06,7 March 2010,9.00,6,6,6,6) Invoice Table create table invoice ( invoiceNo int not null primary key, ownerid int foreign key references petowner (ownerid), amt int ) alter table invoice add examNo int foreign key references examination (examNo) insert into invoice values (01,01,500,1) insert into invoice values (02,02,2000,2) insert into invoice values (03,03,400,3) insert into invoice values (04,04,300,4) insert into invoice values (05,05,1500,5) insert into invoice values (06,06,750,6) Veterinary Table create table veterinary ( veterinaryId int not null primary key, name varchar (255), Address varchar(255), hTelNo varchar(255), mTelNo varchar(255), clinicBranch varchar (255), specialise varchar(255) ) select * from veterinary alter table veterinary add spspecialise varchar(255) alter table veterinary drop column clinicBranch alter table veterinary add clinicNo int foreign key references clinic (clinicNo) insert into veterinary values (01,Jean,High Street Way 43,6358264,7595865,1,dog) insert into veterinary values (02,Robbin,Lower Downtown 2,6582354,7362548,2,cat) insert into veterinary values (03,Ricky,Market Ville Road,4582356,7586523,3,rabit) insert into veterinary values (04,Rowan,Little China Road2,4582653,7263158,4,dog) insert into veterinary values (05,Laksh,Havana Roadway,8596564,7236458,5,rabit) insert into veterinary values (06,Hans,Talipos Road,4625687,7859584,6,cat) Task 4 Set-up and test all of the following queries using Structured Query Language (SQL). Provide printouts of SQL code for each query and the output produced when you run the query in the database you have developed. Query Question 1 Display the names and address of the branches of Petcare and the name of all veterinary doctors working at each of the branches. Any specialism (s) of the veterinary doctors should also show. Using SQL Code SELECT clinic.clinicName AS [Branches Name], clinic.address AS [Branches Address], veterinary.name AS [Veterinary Doctor Name], veterinary.specialise AS [Veterinary Specialism] FROM clinic INNER JOIN veterinary ON clinic.clinicNO = veterinary.clinicNo The Result Using Query Designer The Result Query Question 2 Display all the appointments for the whole of the Petcare organization. This should be ordered by date. The result should display the branch the appointment is at, the name of the veterinary doctor the appointment is with, the date and time of the appointment, the name of the animal the appointment is for, the type of animal and the breed of the animal. Using SQL code SELECT clinic.clinicName AS [Branches Name], veterinary.name AS [Veterinary Doctor Name], appointment.aDate AS [Appointment Date], appointment.aTime AS [Appointment Time], pet.petName AS [Pet Name], pet.type AS [Pet Type], pet.breed AS [Pet Breed] FROM appointment INNER JOIN clinic ON appointment.clinicNO = clinic.clinicNO INNER JOIN veterinary ON appointment.veterinaryId = veterinary.veterinaryId AND clinic.clinicNO = veterinary.clinicNo INNER JOIN pet ON appointment.petNo = pet.petNo AND clinic.clinicNO = pet.clinicNo ORDER BY [Appointment Date] The Result Using Query Designer The Result Task 5 Explain any assumptions you have made when analyzing, designing and implementing the above database, justify the approach you have taken and explain any alternative approaches you could have taken to any of the above tasks. Discuss any changes you would make to improve your work. Determine candidate, primary and alternate key attributes This step is concerned with identifying the candidate key for an entity and then selecting one to be the primary key. In the process of identifying primary keys, note whether an entity is strong or weak. In trying to identify candidate keys, I observe that the clinic number for the Clinic entity, the veterinary number for the veterinary entity, the invoice number for the Invoice entity are unique for the entire practice. On the other hand, the owner number for the PetOwner entity, the pet number for the Pet entity, are only unique for a particular clinic. Its not uncommon for a company to give different offices a degree of local autonomy. However, in a centralized database system its sometimes more appropriate to have uniqueness throughout the company. In discussion with the PetCare management, its agreed that all numbers should be allocated across the entire practice, as opposed to each branches. If this had not been the decision, it would have been necessary to add the clinic number to those numbers only unique within each clinic to gain uniqueness across the practice. With this in mind, I have now identify the primary keys and foreign key. Check model for redundancy At this point, I have a logical data model for Petcare. However, the data model may contain some redundancy which should be removed. More speci ¬Ã‚ cally, I have to: (1) Re-examine one-to-one (1:1) relationships. (2) Remove redundant relationships. (3) One-to-one (1:1) relationships Redundant relationships There are a number of relationships between PetOwner, Pet, Clinic, and Appointment, and a closer examination is useful to identify any redundant relationships. First of all, note that the PetOwner/Pet entities have mandatory participation in the POAttends/PAttends/Owns relationships, and that a PetOwner may own many pets. Therefore, for any given Appointment we can identify the Owner through the POAttends relationship, but we cannot then identify the Pet through the Owns relationship. However, for any given Appointment, we can identify the Pet through the PAttends relationship and for any given Pet we can identify the PetOwner through the Owns relationship, which suggests that the POAttends relationship is redundant. In a similar way, through the PAttends relationship we can identify the Pet, and through the Registers relationship we can identify the Clinic involved in the Appointment, which suggests the Schedules relationship is also redundant. Note that the IsContactedBy relationship between Clinic and PetOwner also appears to be redundant. However, PetCare notes the details of pet owners when they first make contact and only obtains the details of pets at the first appointment, and so the IsContactedBy relationship is retained. Check business rules Business rules are the constraints that I have impose in order to protect the database from becoming inconsistent. Of the six types of business rules, four were identified in previous steps and documented in the above. I consider the remaining two here: referential integrity and other business rules. Referential integrity There are two issues to consider here: (1) Identify whether nulls are allowed for the foreign key. In general, if the participation of the child table in the relationship is mandatory, then the strategy is tha

Friday, October 25, 2019

david souter :: essays research papers

Birth, Residence, and Family Born September 17, 1939 in Melrose, Massachusetts, son of Joseph Alexander and Helen Adams Hackett Souter. Education Harvard College, A.B. 1961, Phi Beta Kappa, selected Rhodes Scholar; Magdalen College, Oxford, 1963, A.B. in Jurisprudence 1989, M.A. 1989; Harvard Law School, LL.B. 1966. Law Practice Associate, Orr and Reno, Concord, NH, 1966-1968. Government Service Assistant Attorney General of New Hampshire, 1968-1971; Deputy Attorney General of New Hampshire, 1971-1976; Attorney General of New Hampshire, 1976-1978. Judicial Offices Associate Justice, New Hampshire Superior Court, 1978-1983; Associate Justice, New Hampshire Supreme Court, 1983-1990; Judge, U.S. Court of Appeals for the First Circuit, 1990; Associate Justice, Supreme Court of the United States, 1990. Other Assignments Maine-New Hampshire Interstate Boundary Commission, 1971-1975; New Hampshire Police Standards and Training Council, 1976-1978; New Hampshire Governor's Commission on Crime and Delinquency, 1976-1978, 1979-1983; New Hampshire Judicial Council, 1976-1978. Civic Activities Trustee, Concord Hospital, Concord, New Hampshire, 1972-1985, President 1978-1984; Trustee, New Hampshire Historical Society, 1976-1985; Vice President, 1970-1985, Overseer, Dartmouth Medical School, 1981-1987. Affiliations with Professional Organizations and Academic Institutions Merrimack County Bar Association; New Hampshire Bar Association; American Bar Association; Honorary Fellow, American Bar Foundation; National Association of Attorneys General; Honorary Fellow, American College of Trial Lawyers; Honorary Master of the Bench, Gray's Inn, London; Honorary Fellow, Magdalen College, Oxford; Associate, Lowell House, Harvard College. David H. Souter was born in Melrose, Massachusetts, on September 17, 1939. He graduated from Harvard University in 1961. The following year he studied at Magdalen College in Oxford, England, as a Rhodes Scholar. He graduated from Harvard Law School in 1966. Souter was admitted to the bar and joined a law firm in Concord, New Hampshire. In 1968, he became an Assistant Attorney General of New Hampshire. In 1971, Souter became Deputy Attorney General and in 1976 Attorney General of the State of New Hampshire. During these years Souter also served on the New Hampshire Governor's Commission on Crime and Delinquency, the New Hampshire Judicial Council, the Maine-New Hampshire Interstate Boundary Commission, and the New Hampshire Policy Standards and Training Council.

Thursday, October 24, 2019

Minor characters in “To Kill a Mockingbird” Essay

Harper Lee uses minor characters in a variety of different ways to help explore and expose some of the main concerns brought up in the book, ranging from strict town morals, justice, all the way to racism and death due to racism. I have chosen to outline some of the ways in which Harper Lee uses three minor characters, Mayella Ewell, Heck Tate and Dolfus Raymond, to help emphasise and explore some of the major concerns in the book. Mayella Ewell is the first minor character I shall discuss; a beacon of racial prejudice and the injustice of the courthouses. She is considered to be trash along with the rest of the Ewell’s; despite the fact that she is one of the few Ewell’s who can read and write. As well as being literate she tries her best to make that most of what she’s got, â€Å"the quote about the flowers she keeps†. Despite her decency compared to the others in her family Mayella still only cares for her own wellbeing. When she forces herself upon Tom Robinson, in a last ditch attempt to feel some affection from a man, she is soon to realise the error of her ways. As Atticus says, â€Å"She has committed no crime, she has merely broken a rigid and time honoured code of our society† by going after a black man she has broken ‘the rules’ of Maycomb and thus she tries to hide the truth by abusing Maycomb’s harsh structure of injustice and racism. She is white and Tom is black meaning the court case, as she well knows, can only have one outcome. She would rather sentence a man to death for something she had done to him, â€Å"She reached up and kissed me ‘side of th’ face. She said she never kissed a grown man before an’s she might as well kiss a nigger.† than tell the court and the towns folk that she had come onto a black man. Harper Lee uses Mayella and her made up story to show the racism of the  justice system, she shows that simply by lying and having someone to lie with you when the case is white words against black the white will win. Despite Mayella’s story falling apart under cross-examination Tom’s version of what happened isn’t taken note of, as he is black. Also in this case, we have the testimonial of the local sheriff Heck Tate; he too is a tool of great injustice for the blacks. In his testimony we read that he was called by Bob Ewell and told that â€Å"some nigger’d raped his girl† upon arrival he found Mayella and asked who had done it – Tom Robinson. A black man accused by a white woman, Heck went and rounded him up instantly to be identified by Mayella. No questioning, no looking for evidence or any kind of service a white man could expect, Heck presumes that he is black and therefore must have committed some kind of crime. However, despite Heck’s injustice towards the black population of Maycomb he does fulfil his duties to the white. After Boo stabs Bob to save Atticus’ children Heck decides that for the greater good nothing should be said and the incident should be considered an accidental suicide. Heck shields the town from the truth and allows Boo to go back to his normal life – after all he had done the town a favour. Another man who shields the town from the truth, but about a very different subject is Dolphus Raymond, a presumed evil alcoholic who spends most of his time with the black townsfolk. â€Å"Come round here, son, I got something that’ll settle your stomach.† Is the invitation given by Dolphus to Dill outside the courthouse. He offers Dill his brown paper bag with straws in and tells the boy to take a good sip. Scout says † Dill, you watch out, now† as she, like the rest of the town believes that Dolphus is always sipping from a bottle of gin within his bag. He pretends to be drinking all day as â€Å"it’s mighty helpful to folks.† He is forced to pretend to be drinking all day and to be messed up in the head to help the prejudice people of Maycomb understand why he would want to spend most of his time with the black people. Only the uncorrupted children are trusted with Mr. Raymond’s deepest secret as he feels that because they  are children they can understand why he pretends to drink and why he has to give the people a reason as to why he spends his time with black people. This helps give an idea of the intolerance in the town. Intolerance towards black people and towards anyone who has contact with black people as a friend, rather than just a slave. Harper Lee uses minor characters traits and beliefs to show the reader some of the issues at hand in the book. Whether it be a girl pretending to have been raped to highlight the levels of injustice and the racial prejudice in the book, or whether its Heck Tait acting under the powerful words of a white person to do wrong to blacks, or his truth shielding to help a white man stay out of prison for a crime he really did commit.

Wednesday, October 23, 2019

The Things They Carried – Dialogue and Materials

Themes and Dialogue of O’Brien in The Things They Carried War has done many horrible things to many people throughout time all over the world. War experience filled with death, suspense, and constant fear has swept through millions and millions of people who are still scared by the horrific experience. To some so horrific that a normal life, post war, was almost unbearable. But some were able to take the experience and share it to the world.Tim O’Brien is a perfect example of this. O’Brien was born in 1946 in the Midwest, but once of age was drafted into the Vietnam War. O’Brien only served for one year from 1969 to 1970, but nevertheless, the memories gathered in that year lasted him a lifetime. (Herzog) These memories, though some held them in, O’Brien used them to transform his writings to some of the most accurate and touching pieces about war in our generation. They established O’Brien as on of the most important soldier-authors of the V ietnam generation; furthermore, they establish his reputation as one of America’s most notable postmodernist writers – not only for his themes but also for the structure of his books and his exploration from multiple perspectives of problematic nature of truth and reality† (Herzog, 78). O’Brien was a man who had an objective to be original and construct all of his memories to others the best way he could. And the only way to do that was his way.In an interview of O’Brien, Herzog quotes from him â€Å"In this new book [The Things They Carried] I forced myself to try and invent a form. I had never invented form before. † His writings are unique and compared to the normal dialogue of introducing characters; O’Brien takes a different approach and makes his own style. In the book The Things They Carried, O’Brien uses materialistic belongings to show his experiences from a different perspective on war and the people in it without the immediate use of dialogue. O’Brien’s story The Things They Carried is a story of company of men that are in the Vietnam War.These men are normal people, called into duty of war by draft. Though each person is not introduced by age, and what their history was, they way they are introduced is by what they carry in their endless walk through unknown jungles. But though they are introduced by only what their position and what they carry, the personal level of knowing a character is better than ever. The first man introduced is First Lieutenant Jimmy Cross. He is the leader of all the men and whom everyone answers to. But for a man that is the one in charge his mind is everywhere but on the war.He carries letters and two photos from a girl named Martha from home and keeps a pebble in his mouth that she sent him. He is madly in love with her but all of her letters are not love letters from a significant other but just friendly letters. â€Å"They were not love letters, but Lieutenant Cross was hoping, so he kept them folded in plastic at the bottom of his rucksack† (LaPlante, 79). He wants to be focused on the war but his loving thoughts of her haunts him and takes him away from the reality of war he is in. It took him as much as a fellow soldier getting shot in the head before he knew how much a problem he had.The machine gunner was a man by the name of Henry Dobbins. Being the machine gunner he had to carry a twenty-three pound gun unloaded, but it was always loaded, and fifteen pounds worth of ammunition strapped around his chest and shoulders. Personally he was introduced as a big man that carried Black Flag insecticide, and extra food rations. Though not a huge introduction, he can still be known as a person but also with some mystery of who he is. From his belongings, Sanders can be seen as a big man that would be a brute force character in the company, but also a vital part to the company.His responsibility as the machine gunner with all the weight and his importance in battle puts him as a leader and a trusted man that people can rely to. His character and personality as a strong man, who can be there when he is needed, and do whatever needs to be done can be seen alone from O’Brien’s writings without any dialogue needed. Just from his position and his responsibilities his character even personality can be understood and noticed. The RTO or the man who had to carry the radio was named Mitchell Sanders. The radio he had to carry was twenty-six pounds with its battery.He also carries condoms and starched tiger fatigues for special occasions. He is an important man to the crew but he also can be seen as a light guy, more some of the others. He carries condoms even with no need for them at all and Norman Bowker, one of the other soldiers, carries a thumb that Sanders had cut off of a Vietnamese kid only fifteen or sixteen. So Sanders can be seen as not as much of a serious guy but still responsible enough to have the responsibilities of the holding on the their only way of communication.Dave Jensen was introduced with being all about personal hygiene. He carried a toothbrush, dental floss, several bars of soap taken from hotels, three extra pairs of socks, and Dr. Scholl’s foot powder for trench foot, earplugs, and extra sand bags for extra protection at night, and for superstitious reasons a rabbit’s foot. His position in the company is never mentioned but immediately by looking at all of the things he carries, it is seen he carries almost twice as much as anyone else. Through his items his personality of being over cautious stands out.He is not a very big character in the story but because of how O’Brien clearly shows how cautious and scared he is to make him a bigger character. Everyone is important in the company and when O’Brien talks about Jensen, he is referring to a quarter of the soldiers that were in war that were just like him. Though these are just a few to the many he introduces to the reader, all from O’Brien’s different writing style can be experienced and enjoyed more. O’Brien with his writings uses materials of what the soldiers carry to almost control the reader about how to feel about the character, and used this writing style in other books of his.His writing style can take you inside of the different soldiers heart and mind and with the different stories in The Things They Carried other detail are added to the story so nobody can know if his stories are real or true. This gives readers more freedom to have personal opinions. â€Å"The element of perception has to do with uncertainty†¦. The whole stew of variables determines what we perceive and what call real† (Herzog, Interview). O’Brien’s writing style all has a purpose with its creativity.The Things that they carry are not only the materialistic things that the soldiers personally have but it could be anything. à ¢â‚¬Å"Things is framed around the burdens we carry, not just war, not just physical, but spiritual as well† (Herzog, Interview). Just telling a story wasn’t enough; O’Brien wanted the reader to live it, to experience it like he did with his writing style. He wanted to tell you the story but leave mystery, his writing style was an attempt to expand readers mind further than ever before. O’Brien said, â€Å"A good piece of fiction, in my view, does not offer solutions.Good stories deal with our moral struggles, our uncertainties, our dreams, our blunders, our contradictions, our endless quest for understanding. Good stories do not resolve the mysteries of the human spirit but rather descried and expand upon those mysteries† (LaPlante, 587) Sources 1. Herzog, Tobey C. Tim O'Brien. New York, NY: Twayne Publishers, 1997. Print. 2. Egri, Lajos. The art of dramatic writing. Touchstone, 1960. Print. 3. LaPlante, Alice. Method and Madness. W W Norton ; Co In c, 2009. Print. 4. Herzog, Tobey C. Unpublished interview with Tim Obrien. Cambridge, Mass. , 11-12 July 1995

Tuesday, October 22, 2019

Russian Philosophy essays

Russian Philosophy essays While the rest of Europe was advancing culturally as a direct result of the Renaissance, Russia did not reap the same benefits of cultural development. The Mongol occupation in Russia was responsible for the disproportionate growth; because of the ongoing Mongol supression, Russians were not able to prosper culturally to the extent other European countries experienced. Russia did experience their own "renaissance" of sorts in the mid to late 19th century and on into the 20th century. This was characterized by a new way of thinking and viewing the world around them, mostly the Western civilizations. This was known as the "Russian Cultural Renaissance". Nikolai Bernyaev was one of the most prominant figures of the time and was later a leading philosopher of the Russian emmigration. Proffessioanl philosophers appeared in Russia in the 19th century, but it was thanks to Bernyaev and his existentialist attitude that Russia was able to contribute new ideas to world philosophy. Philosophical ideas in Russia rarely matured into well-balanced, self-sufficient systems, because it was the privilege of the State to consummate and elaborate them in a systematic way. The fate of Russian thinkers was to dissolve these ideocratic systems in a stream of capricious, spontaneous, prophetic, existential thinking which attempted to go beyond the systems, to undermine them rather than to consolidate them. Since the official philosophy functioned as a tool of power, it was the task and merit of non-official philosophy to advance anti-totalitarian modes of thinking, deconstructing any possible principle of systematization. In effect, Russia was overpowered by free thinkers once the hold of the czars loosened and communism paved the way for some to view Western society and what it had and was continuing to accomplish. Russia has made up for lost time very quickly, in the time from the Bolshevik Revolution and World War I. Russia continues to develope ...

Monday, October 21, 2019

8 Surprising Jobs That Earn 100K with Just a 2-Year Degree

8 Surprising Jobs That Earn 100K with Just a 2-Year Degree While some people may think a four-year degree is necessary to get a higher paying job, there are a number of professions where you can make around $100,000 per year with only a two-year degree. A traditional college degree is not necessary to get a good job and earn a high-paying salary. Radiation therapistHealth care jobs are a growing field and will continue to grow as baby boomers age and the population increases. An associate’s degree lets individuals work in a hospital setting or a cancer-treatment center where they monitor the equipment, record a patient’s reaction and provide documentation for the treatment session. pay can be up to around $100,000.Air traffic controllerArmed with an associate’s degree, air traffic controllers can make up to $122,000 per year. the primary duties of an air traffic controller are to manage the flights of planes flying into and out of the airport, with safety being the primary goal. although this can be a high-stress job, th e pay may make it worth considering.Executive pastry chefExecutive pastry chefs can work in a number of different places, from hotels to restaurants and even on cruise ships. It requires the equivalent of a two-year degree from either a technical or culinary school or a community college to be ready to work. Really good pastry chefs can make up to $102,000 a year. This, of course, is dependent on the city and location.Master plumberEveryone, at one time or another, needs a plumber, and that’s one of the reasons working as a master plumber pays up to $102,000 per year. One of the good things about being a plumber is that individuals can either work for a company or set up their own business. workers who enjoy working with their hands and don’t mind getting wet sometimes when working on or installing water lines and related systems and appliances, may be interested in this job. They can go to a technical school or community college to learn the skills to get licensed.Rea l estate salesBrokers in real estate sales jobs can earn hefty commissions that amount to much more than $100,000 each year. To become a real estate broker requires a high school education and long hours that can include holidays and weekends. There may also be periods with low to no income when no sales are made.Construction supervisorThose workers that have experience in the construction industry may work up to the job of supervisor. These jobs can pay up to $130,845 per year, and promotions are usually from within the company. A strong knowledge of the business, policies and values is necessary as well as the ability to be on call to complete projects and for emergencies.Court reporterAn individual who has an associate’s degree as a court reporter, which entails transcribing court proceedings, can make a good salary. Court reporter jobs pay up to $104,000 and will require a background check. Salary can be dependent on location. A busy courtroom in a large city will likely pay more than a smaller town.BartenderBartenders make a wide range in salary depending on the location and volume of clientele. While some restaurants, bars, and clubs may pay around $19,000, more upscale locations in large cities can pay over $100,000, including tips. while most bartending skills are learned on the job, there are some programs that teach bartending and offer certification in the safe serving of alcohol.Getting a high-paying job does not necessarily mean that a four-year college degree is necessary. Thejobnetwork can help you find the job you want by searching job listings for you and sending you jobs that fit your qualifications. all you do is fill out your job interests and skills and we do the rest. we notify you by email when matching jobs appear. sign up for job match alert to find the job that’s right for you.

Sunday, October 20, 2019

Understanding Primary and Secondary Groups in Sociology

Understanding Primary and Secondary Groups in Sociology The study of social groups is the main focus of many sociologists because these groups illustrate how human behavior is shaped by group life and how group life is affected by individuals. The two groups on which social scientists mainly focus are primary and secondary groups, called primary because they are a persons primary source of relationships and socialization or secondary because they are of less importance but still significant to the individual. What Are Social Groups? Social groups  consist of two or more people who regularly interact and share a sense of unity and common identity. They see each other often and consider themselves as part of the group. Most people belong to many different types of social groups. They could include family, neighbors, or members of a sports team, a club, a church, a college class, or a workplace. What social scientists are interested in is how the members of these groups relate and interact. Early American sociologist Charles Horton Cooley introduced the concepts of primary and secondary groups in his 1909 book  Social Organization: A Study of the Larger Mind. Cooley was interested in how people develop a sense of self and identity through their relationships and interactions with others. In his research, Cooley identified two levels of social organization  that are composed of two different kinds of social structure. What Are Primary Groups? Primary groups are small and characterized by close, personal, and intimate relationships that last a long time, maybe a lifetime. These relationships are deeply personal and loaded with emotion. The members typically include family, childhood friends, romantic partners, and members of religious groups who have regular face-to-face or verbal interaction and a shared culture and frequently engage in activities together. The ties that bind the relationships in primary groups are made up of love, caring, concern, loyalty, and support. These relationships play important roles in the formation of individuals sense of self and identity because these people are influential in the development of values, norms, morals, beliefs, worldview, and everyday behaviors and practices of all members of the group. The relationships play important roles in the process of socialization that people experience as they age. What Are Secondary Groups? Secondary groups comprise relatively impersonal and temporary relationships that are goal- or task-oriented  and are often found in employment or educational settings. While the relationships within primary groups are intimate, personal, and enduring, the relationships within secondary groups are organized around narrow ranges of practical interests or goals without which these groups would not exist. Secondary groups are functional groups created to carry out a task or achieve a goal. Typically a person becomes a member of a secondary group voluntarily, out of shared interest with the others involved. Common examples include coworkers in an employment setting or students, teachers, and administrators in an educational setting. Such groups can be large or small, ranging from all the employees or students within an organization to the select few who work together on a project. Small secondary groups such as these often disband after completion of the task or project. A secondary group does not exercise a primary influence over its members because they do not live in the presence and thoughts of one another. The average member plays a passive role, and the warmth of the relationships in primary groups is missing Primary Groups vs. Secondary Groups An important distinction between secondary and primary groups is that the former often have an organized structure, formal rules, and an authority figure who oversees the rules, members, and the project or task in which the group is involved. Primary groups, on the other hand, are typically informally organized, and the rules are more likely to be implicit and transmitted through socialization. While it is useful to understand the distinctions between primary and secondary groups and the different kinds of relationships that characterize them, its also important to recognize that there can be overlap between the two. For example, an individual could meet a person in a secondary group who over time becomes a close, personal friend or a romantic partner who becomes a spouse. These people become part of the individuals primary group. Such an overlap can result in confusion or embarrassment for those involved, for instance, when a child enters a school where a parent is a teacher or administrator or when an intimate romantic relationship develops between coworkers. Key Takeaways Here is a nutshell description of social groups and the distinctions between primary and secondary social groups: Social groups  include two or more people who interact and share a sense of unity and common identity.Primary groups are small and characterized by close, personal relationships that last a long time.Secondary groups include impersonal, temporary relationships that are goal-oriented.Secondary groups often have an organized structure, an authority figure who oversees the rules, while primary groups are typically informally organized.There often is an overlap between primary and secondary groups that arises, for example, if an individual forms a personal relationship with someone in a secondary group. Sources: https://study.com/academy/lesson/types-of-social-groups-primary-secondary-and-reference-groups.html sociologydiscussion.com/difference-between/differences-between-primary-social-group-and-secondary-social-group/2232 https://quizlet.com/93026820/sociology-chapter-1-flash-cards/

Saturday, October 19, 2019

Course Design Coursework Example | Topics and Well Written Essays - 3000 words

Course Design - Coursework Example Following all the instructions as I have spelled out in either the assignments or in term papers is also important in order to do well in this course. Attendance is also a MUST and every student is expected to observe this without fail. As stipulated in the institution’s policy every student is expected to observe and maintain a high level of diligence while attending the classes. The course requires a lot of research and students are encouraged to work in groups to conduct the stipulated research and make the best inferences from the research conducted. Students are also encouraged to enjoy the learning experience and link the studies to their daily activities and situations to maximize on the learning objectives of this course. It is my belief that the students are well versed with the technological advancements that have been propagated by East Asia in the recent past. East Asia is leading in the amounts of products manufactured per year and therefore they are able to boost their economies accordingly. Am also assuming that every person has gone through the pre-requisite units before taking up this unit and therefore you are all well-versed with the background information and skills to pursue and take the unit. Research is an essential part of this course and I am assuming that all of you have learnt the research methods and are equipped with the skills to conduct a conclusive research on this course. I will facilitate the learning and give you ample knowledge on the unit so that you can take up and conduct the research on your own since I believe the best learning method is through involving the students in the learning process thereby making it more student oriented. Omvedt, G., Kelkar, G., & Asian Institute of Technology. (1995).  Gender and technology: Emerging visions from Asia. Bangkok, Thailand: Gender and Development

Friday, October 18, 2019

Sacred Texts, Major Essay Example | Topics and Well Written Essays - 1250 words

Sacred Texts, Major - Essay Example Habel, O'Donoghue, Maddox (1993) say that sacred texts of Islam include the Holy Quran where it holds higher than the primary importance in Islam. The second most important sacred text in Islam is Hadith. Quran holds the highest importance as it is firmly believed that Holy Quran is the word of God and these were the words truly revealed on the last Prophet. Muslim all around the world believe the Holy Quran as the most sacred word of God. Hadith is sacred text that holds an importance secondary to the Holy Quran. Hadith is not just one book in fact this is the compilation of many books representing the sayings of the Last Prophet as well as the sayings of the caliphs in that era including many other followers to Last prophet. Gordon (2002) says that the word Quran in the literal sense means "To recite" when the word is looked out for meanings in Arabic language. The word recite is the first command that was delivered to the Lat Prophet by angel Gabriel. Recitation is the fact strongly associated with the Holy Quran. The Holy Quran not only holds a highest authority in all the religious matters for all the Muslims around the world but Holy Quran has also been holding the first priority for consultation in all legal matters. All Muslims believe firmly that Holy Quran is a complete guide for life which not only has the religious matters and issues complied in one book but also the ways to pas life are also present within the most sacred book. Habel, O'Donoghue, Maddox (1993) discusses that it is resolutely held by all Muslims that Holy Quran is a written word of God which is unblemished thus without any errors being perfect in every sense. It is held that the Holy Quran is a flawless record of all the revelations that had been made by angel Gabriel to the last Prophet. The timeline that has been described in texts for these revelation spans from 610 A.D till 632 A.D. It is said that the length of Quran is approximately the same as Christian New Testament having 114 Surahs. The arrangement of these Surahs is from longest Surah to the shortest Surah. Surahs have been classified as Meccan or Medinan and this depends on the Surah's origin. Message in the Quran is spread by means of some literary frameworks and literary devices. There is Arabic text in Holy Quran which is composed of thematic structures that make the reader recall the message. As the text of Holy Quran is considered to be perfect so many scholars regard the Holy text to be the criteria to teach Arabic language. The literary readers believe that Quran has the most rhymed sequence of Arabic language. Moreover the verses of the Holy Quran reflect directness, intimacy thereby asking the reader the same question as to what will be of value after this life. Functions in community Gordon (2002) says that the Muslim community regards the Holy Quran as the word of God and thereby it is the only reliable word to follow to make the dealings in life. Muslims believe that the sacred word has the solution to every problem in life thereby recitation of the Holy Quran can lead to solutions. All the social and the legal issues are considered to be solved by consulting the Holy Quran. Significant features of Muslim tradition Here in this

Chapter 14 discussion question Essay Example | Topics and Well Written Essays - 750 words

Chapter 14 discussion question - Essay Example One of the goals of all managers is to maximize shareholder’s wealth. The community that lost those jobs will perceive the CEO to be an immoral and unethical person that has no sense of patriotism. The made in America label has a lot of value in the United States consumer markets. 2. There are hundreds of examples of ethical and unethical behavior in the business world. A case of an unethical act that occurred over a decade ago is the Nike Corporation sweetshop scandal. Nike Corporation is one of the leading apparels and shoe manufacturers in the world. Back in the 1990s Nike expanded its operation into several developing countries. The reason the firm choose these locations was to save in labor and operating costs. The company lost control and a managerial staff composed of immoral leaders created sweetshops at these locations. A sweetshop is a shop or factory in which employees work long hours for low pay in an unsafe working environment (Merriam-webster, 2011). An example o f a company that is using high ethical standards in its operating decisions is Starbucks Cafe. Starbucks Cafe sources its coffee using a practice known as fair trade coffee. Fair trade coffee guarantees poor farmers a price of $1.26 per pound of coffee which is twice the going rate for that product. 3. Unethical behavior can occur for a leader that has proper values and intentions. The reason that this can occur is that ethics is relative to the person or group that analyzes an act. A simple way to visualize ethics in the corporate world is through the stakeholder perspective. Each stakeholder group is going to react differently to an action. A leader may have great intentions and proper values, but sometimes budgetary constraints force the hand of a leader. If a leader closes down an operation knowing that the community needs those jobs the person despite wanting to help was force to make a decision that will be viewed as unethical by the community. 4. The glass ceiling effect that limits the managerial opportunities for women occurs for a variety of reasons. Our society believes the positions of power are better handled by men. In the United States there has never been a woman president. In the past there were more men in the workforce than women. The current trend is for more women to continue to enter the labor force. As of 2004 women represented 46% of the US labor force (Dol, 2004). Another social stigma that has helped men get better paying jobs is the belief that the man is supposed to be the provider of the household. It is also possible also that man visualize women as a threat to the corporate power structure which has historically been dominated by men. 5. In order to level the playing so that women can have better job opportunities including managerial spots at the executive level companies have to change from within. The corporate culture of companies has to change. The executive managerial staff has to implement strategic diversity plans. To tar get the problem of the lack of women in corporate management firms could create managerial training programs that utilized quotas to ensure enough women are getting a chance. Based on the fact that 46% of the labor force is composed of women a fair quota would be a 54:46 split. The use of quotas will also ensure that ethnic minorities are properly represented in the managerial ranks. Our educational system has to do a better job at recruiting women

MICROBIOLOGY Coursework Example | Topics and Well Written Essays - 2500 words

MICROBIOLOGY - Coursework Example Catalase test is used to identify organisms that are capable of producing catalase enzyme. The enzyme converts toxic H2O2 into water and oxygen and thereby prevent the formation of highly dangerous hydroxyl radicals. 2H2O2 Catalase 2H2O + O2 To test catalase activity, the culture must be of 18- 24 hour as old culture lose catalase activity and may display false negative test. The emerging bubbles in catalase positive test is due to the formation of oxygen gas. Aerobic bacteria in general display catalase positive test while most of the anaerobes are deficient in catalase enzyme indicating the sensitivity of anaerobic bacteria towards oxygen. E.g. Catalase positive organisms are Micrococcus spp. and Staphylococcus spp. Catalase negative organisms are Enterococcus spp. and Streptococcus spp. Bacto Agar or plain agar is used for the study as it contains calcium and magnesium. On the contrary, blood agar are unsuitable to carryout catalase test as blood contains catalase (Web: Catalase t est, n.d.; Pelczar, 1993). 2. Explain the principle of Oxidase test. Oxidase test is a test for the presence of cytochrome oxidase (playing vital role in electron transport chain or ETC) which catalyses oxidation of reduced cytochrome by oxygen. Cytochrome oxidase transports electrons from the ETC to oxygen, the terminal electron acceptor. The principle is utilized to test the organisms for the production of cytochrome oxidase. To test this ability of microorganisms, artificial electron donors and acceptors are provided. As soon as the electron donor (1.0-1.5 percent solution of tetramethyl p-phenylene diamine hydrochloride) is poured over the colonies, it is oxidized by cytochrome oxidase. Oxidase positive colonies become maroon, purple and black in 10-30 minutes (Pelczar MJ. 1993). E.g. Members of Pseudomonadaceae and Enterobacteriaceae are oxidase positive (Pelczar, 1993). 3. Explain how Oxoid Chromogenic UTI media (Clear) works. Oxoid Chromogenic UTI media is a nonselective medi um to isolate, differentiate and enumerate the pathogens prevalent in urinary tract and are responsible for urinary tract infection. The medium facilitates the differentiation and identification of E. coli and Enterococcus without undergoing confirmatory tests (Web. Dehydrated Culture Media, n.d.). The principle utilized is based on the difference in susceptibility prototypes of the microorganisms. For the efficacy of antimicrobial therapy, the organism must be identified to the species level. However, the prevalent species Enterococcus spp. and Escherichia spp. produce enzymes for the metabolism of glucosidase or lactose or both and aids identification. On the contrary other microorganisms may not produce enzyme for such substrate fermentation (Web. Dehydrated Culture Media, n.d.). The chromogen mixture present in the Oxoid Chromogenic UTI media (Clear) comprises artificial substrates or chromogens which are responsible for releasing different colored compounds when specific microb ial enzymes released by Enterococcus spp. and Escherichia spp act on substrate molecules, thereby a differentiation process works for the detection of certain species or a group of microorganism (Isenberg and Garcia, 2004). For instance the chromogen X-glucoside is a substrate for ?-glucosidase enzyme of enterococci which form blue colonies while chromogen red-galactoside is utilized by enzyme ?-galactoside generated

Thursday, October 17, 2019

Water pollution Essay Example | Topics and Well Written Essays - 250 words

Water pollution - Essay Example Therefore, water pollution is a problem that requires a collective effort in order to beat. In my opinion, this article was too lightweight for such a heavy issue. It was tackled in a single page and dealt with in such a lighthearted manner by the writer. It almost sounded like a Wikipedia or â€Å"Water Pollution for Dummies† article due to its simplicity. However, it does manage to effectively introduce the problem and the possible solutions to it. I am glad that such an article exists which was written with the intention of making the water pollution problem understandable to everyone, even children in a grade school level of study. The writer should be commended for making such a complex issue easily understandable to those who do not have a background or serious understanding of the water pollution problem and the various prevention methods that have been set in place to help prevent the further deterioration of our seas and water

Exploring the Brain Responses Assignment Example | Topics and Well Written Essays - 2750 words

Exploring the Brain Responses - Assignment Example The experimental study has the hypothesis of the inducement of either the rTMS or the stimulants triggering the dopamine production. In the two experiments, the brain is induced with rTMS for patients with depression and stimulants for the c-Fos experiment, which uses rats. Procedure outline of rTMS Eight Patients with depression was treated with rTMS, over the left prefrontal cortex on a daily basis. Each of them underwent neuropsychological test scores and PET scan before and after the rTMS treatment (Goldman et al. 1978). Procedure outline of c-Fos experiment Six rats was injected with cocaine and six with amphetamine. The rats were then killed, and the brain extracted. The brain was then preserved and treated with antibodies that recognize the c-Fos-positive cells. A special dye was then added to reveal the location of the c-Fos cells. The cells are counted easily since they are brown due to the dye. Q1a. The independent variable (IV), the conditions and the two dependent variabl es (DV) for this study First, the TMS experiment will be considered. The independent variable (IV) is the raclopride binding. This does not rely on the other variable, but it is rather depended on by the other variable. The conditions of the experiment rTMS are repetitive Transcranial Magnetic Stimulation. There are four dependent variables that depend on the set conditions, which are R caudate, Laudate, R putamen, and L putamen. These will vary depending on the rTMS induced on the patient. In the second experiment (c-Fos), the Independent variable is c-positive cells, which are not necessarily dependant on the other variable set. The conditions are cocaine and the amphetamine. The independent variables are the nucleus accumbens from the sections of the rat’s brain (Goldman et al. 1978). Q1b. The study within a participant study explanation The study of rTMS involves the participation of several patients who are observed before and after the rTMS induction. A PET scanning is then done to establish the number of functional dopamine receptors using radioactive raclopride. The study is thus within a participant study where the data obtained is from the patient pairs under experiment. The participants involved are patients who are 8 rather than being a single patient. Since 2 pairs of participants had the same pre-rTMS test scores represented by a single point for each pair, the study is within a participant study. The c-Fos experiment study is also within a participant study. This is because the study experiment involved the participation of every group member. This means that obtaining the data of all the group members was essential. Q1c. The vital piece of statistical information missing from the study results obtained The essential piece of statistical information missing from the results presented here is a hypothesis. This is a vital tool in analyzing the data presented to either agree with the data or disagree. This tool would be critical in making c onclusions, like establishing the level of deviation from the expected results set on the hypothesis. This piece of information set as a hypothesis would act as the researchers’ guideline when they are setting the procedures. This tool is also helpful to a researcher in the field since it will define his research scope.

Wednesday, October 16, 2019

Water pollution Essay Example | Topics and Well Written Essays - 250 words

Water pollution - Essay Example Therefore, water pollution is a problem that requires a collective effort in order to beat. In my opinion, this article was too lightweight for such a heavy issue. It was tackled in a single page and dealt with in such a lighthearted manner by the writer. It almost sounded like a Wikipedia or â€Å"Water Pollution for Dummies† article due to its simplicity. However, it does manage to effectively introduce the problem and the possible solutions to it. I am glad that such an article exists which was written with the intention of making the water pollution problem understandable to everyone, even children in a grade school level of study. The writer should be commended for making such a complex issue easily understandable to those who do not have a background or serious understanding of the water pollution problem and the various prevention methods that have been set in place to help prevent the further deterioration of our seas and water

Monday, October 14, 2019

African Moral Values Can Complement Christian Moral Values Religion Essay

African Moral Values Can Complement Christian Moral Values Religion Essay Moral values can be said to be the ideals of good and evil, which oversees a persons deeds and choices. Individuals morals can be drawn from society and government, from religious conviction, or self. Moral values can also be defined as generally accepted, empathetic, caring, Christ-like philosophy. The bible states that good moral values can be observed in the ideology and manner of behavior taught by Jesus. It seems just to tie the definition of moral values to what is right and what is wrong conduct held by individuals. II. Morality Morality denotes a coordination of behavior that distinguishes intent, choices, and events between those that are right or wrong. Immorality is the reverse of morality. III. African Moral Values According to Mbiti (1990), the African is notoriously and incurably religious. Hence a conclusion can be drawn that African morals are elaborately entwined with culture (African) which is greatly dosed with spiritual beliefs. Consequently in order to comprehend the African moral values, an outline of African religion and culture is necessary. IV. African culture overview Culture refers to the following ways of life, including but not limited to: Language; Art and Sciences Thought Spirituality Social activity Interaction a) Religion African Traditional Religion (ATR) has proved to be extremely complex to define. There is no single easy and accurate definition to explain it. Sadly, many writers have misunderstood ATR by attempting to define it under deceptive terms such as magic, superstitions, primitive religion, paganism etc. The struggle to describe ATR seems to come from the fact that its propagation is carried out by living it other than preaching it. Its supporters are more preoccupied with its practice than with its theory. ATR influence wraps all aspects of life, from before the birth of a person to long after s/he has passed away. It is a way of life and life is at its core. Thus comments such as: For the African, religion is factually life and life is religion. Mbiti offers a summary of where to search for and locate ATR: belief and customs; rituals, ceremonies and festivals; shrines, sacred places and religious objects; art and symbols; names of people and places; music and dance; myths and legends; pr overbs, riddles and wise sayings. The beliefs and practices of ATR are based upon the faith of the old native people (Ancestors). This is the reason why it is said to be traditional in contrast to other religions, e.g. Christianity and Islam, which are considered as foreign since their dogma and practices came from outside of Africa. There has been considerable awareness of the dialogue between Christian and African Religion. This has been made possible through ways such as bible translation. African moral values can complement Christian moral values through the spirit of interreligious tolerance, dialogue and mutual respect. Also, Christian spirituality is greatly shaped by spirituality of African religion. Praying unites Africans and Europeans (West) at a spiritual level. b) The Supernatural in Indigenous African Religions Intellectuals who study religion in Africa inform us that every African society have a belief in God. Some African religions have faith in one supreme God who formed the world and all that is in the world. Other African religions have faith in more than one God; nevertheless even in these religions, typically one of the Gods is said to be the supreme God who created the world. The way God is seen in most African religions is both alike and dissimilar than the way monotheistic religions characterize God for example Christianity. It teaches that there exists only one God. African religion can complement Christian moral values by sharing concepts about God for example; God maintains creation, God is the creator of everything, God provides for and guards creation, God is omnipotent and omniscient, God supports fairness. The supernatural is also significant to African religious belief. Spirits exists between an all- powerful God and humans. Spirits in African religious traditions share a number of characteristics with angels in the Christian traditions. Good spirits assist in shielding against ill health and misfortune and aid humans by offering rain required for crops as well as animals used for food. On the other hand, not all spirits are good. Some are viewed as evil and are thought to be the responsible for illness, and other. c) Sense of community One African proverb puts across the African sense of community. It says Go the way that many people go; if you go alone, you will have reason to lament. The African thought of security and its value depends on personal identification with and inside the community. For that reason, the authentic African is identified and known, by and through his community. The community is the guardian of the individual; therefore we must go where the community goes. In another meaning, the community offers the African the psychological and decisive security as it gives its members both physical and ideological identity. It must be mentioned that in the African way of thinking, the community as an entity remains, while persons, come and go. As a result, the Africans stress community life and communalism as a living principle of which the fundamental ideology is community-identity. Its goal is to produce and present an individual as a community-culture bearer. Culture is a community asset and must the refore be community-protected. In addition, the individual in an African community is under the clans care. His individuality is not given emphasis at the expense of his community identity. This is the reason why individualism, as a dogma and code of life, is not encouraged in Africa. The social principles spelt out above are expression of African humanism. According to Lambo (127), the African man is first and foremost a member of his family, the extended family, the community and his society in that order before being an individual. Compared to the Wests individualism, the African man has a social and communal nature. The African culture can complement with the Western culture by integrating individualism with the communal nature of life. d) Sense of Hospitality Sense of hospitality is innately crucial in the present survival of African values. At all times, there is always unprompted welcome and accommodation to unfamiliar persons and visitors. Africans effortlessly incorporate strangers and offer them lands to settle hoping that they would leave one day, and the land would be returned to the owner. This is usually carried out with the conviction that one will never opt out of his own community. Unlike the West, no appointment and special invitation are required for one to call on a distant family member or neighbor. On arrival, when there is food the visitor is invited to dine. He is handled kindly, just as one would want to be treated when visiting another home. Africans possess a symbolic way of showing welcome. This is done in a variety of ways for example; in forms of presentation of coconuts, kola nuts, traditional brew, groundnuts etc. in different communities. These are offered to demonstrate that he is welcome and safe. Onwubiko ha s observed that a guest must not harm his host and that when he departs, he should not develop a hunch back on the way home. (Onwubiko, 23). This social value can complement Christian moral values to enhance integrity among Africans. The bible says that we should love our neighbors as we love ourselves. By integrating these values into Christianity, uprightness is enhanced among Africans. V. Conclusion For there to be growth and development, African value system must be promoted by the leadership. Falling into or imitating Wstern values will only wreck humanity as they are strange to the philosophy of humanism which is the basis of the African value system.

Sunday, October 13, 2019

Women and Self-Reliance, Is This Possible? Essay -- Feminism Feminist

  Ã‚  Ã‚  Ã‚  Ã‚   According to Ralph Waldo Emerson, we live in a society of conformity that is, "in conspiracy against the manhood of every one of its members . . . the virtue in most request is conformity. Self-reliance is its aversion" (Emerson, 21). Since Civil War Nursing, women in the work force have been faced with this dilemma of self-reliance and conformity. As women have been discriminated against, and referred to as inferior to men, it has not been an easy task to over come the social barriers, without giving in to conformity, especially when it comes to the work place. As their role in the Civil War, nurses "fulfilled more of a replacement mother position, rather than a healthcare provider"(Hamway, 2001).   During the Civil War, women began to feel like part of the work force, but along with it, was the downfall of being considered "service workers", which is very similar to being a servant. Nurses had to suffer through much conformity, as they had to wait hand and foot on male patients, while at the same time being scrutinized by their male "overseers". These issues that nurses faced in the nineteenth century, continue even to this day, with a little more ease, but we are still driven by a patriarchal society that just isn't ready to let go. Through the works of Louisa May Alcott and Charlotte Perkins Gillman, one can see the hardships that Nineteenth century women were faced with when it came to working. These stories bring to light the fact that, by overcoming oppression, through the strength and desire that leads to resistance, women have been able to achieve self-reliance, which makes their "service work" considered to have with it, an achieved independence. These stories show us the struggles that women faced in the nin... ...heir own sense of independence. But they also present the reality of it all, that in the end they are back to where they started, and that women will never be able to let their guard down, because of the constant struggle of becoming equally self-reliant as men are, which still remains today.    Works Cited Adams, Jill. "Nursing as a Profession and Florence Nightingale". 2001. . Alcott, Louisa May. Short Stories. Dover Publications, 1996. Emerson, Ralph Waldo. Self-Reliance and Other Essays. Dover Publications, 1993. Gilman, Charlotte Perkins. "The Yellow Wallpaper" and Other Stories. Dover Publications, 1997. Hamway, Theresa. "Civil War Nursing". 2001. http://bizntech.rutgers.edu/worknlit/civil_war_nursing_bib.html Summers, Anne. Angels and Citizens. Routledge & Kegan Paul, 1988. Women and Self-Reliance, Is This Possible? Essay -- Feminism Feminist   Ã‚  Ã‚  Ã‚  Ã‚   According to Ralph Waldo Emerson, we live in a society of conformity that is, "in conspiracy against the manhood of every one of its members . . . the virtue in most request is conformity. Self-reliance is its aversion" (Emerson, 21). Since Civil War Nursing, women in the work force have been faced with this dilemma of self-reliance and conformity. As women have been discriminated against, and referred to as inferior to men, it has not been an easy task to over come the social barriers, without giving in to conformity, especially when it comes to the work place. As their role in the Civil War, nurses "fulfilled more of a replacement mother position, rather than a healthcare provider"(Hamway, 2001).   During the Civil War, women began to feel like part of the work force, but along with it, was the downfall of being considered "service workers", which is very similar to being a servant. Nurses had to suffer through much conformity, as they had to wait hand and foot on male patients, while at the same time being scrutinized by their male "overseers". These issues that nurses faced in the nineteenth century, continue even to this day, with a little more ease, but we are still driven by a patriarchal society that just isn't ready to let go. Through the works of Louisa May Alcott and Charlotte Perkins Gillman, one can see the hardships that Nineteenth century women were faced with when it came to working. These stories bring to light the fact that, by overcoming oppression, through the strength and desire that leads to resistance, women have been able to achieve self-reliance, which makes their "service work" considered to have with it, an achieved independence. These stories show us the struggles that women faced in the nin... ...heir own sense of independence. But they also present the reality of it all, that in the end they are back to where they started, and that women will never be able to let their guard down, because of the constant struggle of becoming equally self-reliant as men are, which still remains today.    Works Cited Adams, Jill. "Nursing as a Profession and Florence Nightingale". 2001. . Alcott, Louisa May. Short Stories. Dover Publications, 1996. Emerson, Ralph Waldo. Self-Reliance and Other Essays. Dover Publications, 1993. Gilman, Charlotte Perkins. "The Yellow Wallpaper" and Other Stories. Dover Publications, 1997. Hamway, Theresa. "Civil War Nursing". 2001. http://bizntech.rutgers.edu/worknlit/civil_war_nursing_bib.html Summers, Anne. Angels and Citizens. Routledge & Kegan Paul, 1988.

Saturday, October 12, 2019

Greed in Julius Caesar :: Julius Caesar Essays

Greed in Julius Caesar Greed can disrupt a family, town, or even a country. The play "Julius Caesar" was a great example of the power of greed. In the play "Julius Caesar" the driving forces were Cassius, Brutus, Marc Antony, and Octavius Caesar. Cassius was the brother in-law of Brutus and was also the creator of the group of conspirators. Cassius was also a senator of Rome. Cassius's greed for power, good reputation, and his jealousy lead to Caesars death. Cassius had the most honorable man in Rome to help in his plot to kill Caesar. Brutus was the honorable roman which Cassius took control of. Brutus loved Rome and all of the Roman people. Brutus was actually the true leader of the conspirators because he made the important decisions. Brutus had a different motivation for killing Caesar. The conspirators killed Julius Caesar because they were worried that if Caesar had succeeded in becoming king all the conspirators would lose their power. Brutus's motive for killing Julius Caes ar was his fear of Caesar destroying the city of Rome. Mark Antony was a regular Roman citizen, who was good friends with Julius Caesar. After Julius Caesar's death, Marc Antony recited a speech at Julius Caesar's funeral to all the people of Rome. The speech caused the plebeians to destroy everything in sight. It was by his speech that Marc Antony got his revenge towards Brutus and Cassius. Octavius Caesar was the nephew of Julius Caesar. When he got to Rome he and Marc Antony teamed up to fight against the forces of Brutus and Cassius. It was at Brutus and Cassius's last battle where Octavius and Marc Antony succeeded in their plan. Cassius had many motives for the killing of Julius Caesar. One of Cassius's motives was his greed for power. Cassius believed that he should have as much power as Julius Caesar. Cassius was also worried that if Julius Caesar had been king he would lose all of his power and become another regular citizen of Rome. Cassius showed his greed for power when he would always talk about how Caesar would get so much power and he was treated like he was nothing.

Friday, October 11, 2019

Information technology Essay

1 How do information technologies contribute to the business success of the companies depicted in the case? Provide an example from each company explaining how the technology implemented led to improved performance. IT digunakan dalam hal Bussiness Intelegence. Dalam perusahaan eCourier, mereka mempergunakannya untuk membaca tentang kepuasan pelanggan. Bahkan sampai digunakan untuk semacam peramalan. Contoh, apabila suatu pelanggan biasa mengirimkan barang antara jam 9-10 pagi, apabila melebihi dari jam tersebut, maka akan perusahaan akan dikirimi peringatan. 2 In the case of law firm Bryan Cave discussed above, the use of BI technology to improve the availability, access, and presentation of existing information allowed them to provide tailored and innovative services to their customers. What other professions could benefit from a similar use of these technologies, and how? Develop two different possibilities. Tempat Jawaban 3 Cablecom developed a prediction model to better identify those customers at risk of switching to other company in the near future. In addition to those noted in the case, what other actions could be taken if that information were available? Give some examples of these. Would you consider letting some customers leave anyway? Why? Tempat Jawaban Real World Activities 1 Use the Internet to research the latest offerings in business intelligence technologies and their uses by companies. What differences can you find with those reviewed in the case? Prepare a report to summarize your findings and highlight new and innovative uses of these technologies. Tempat Jawaban 2 Why do some companies in a given industry, like eCourier above, adopt and deploy innovative technologies while others in the same line of business do not? Break into small groups with your classmates to discuss what characteristics of companies could influence their decision to innovate with the use of information technologies.

Thursday, October 10, 2019

Thomson (Easysource) : Development of an E-Procurement System

What business is the organization in? Thomson is a French company, created in 1883, whose headquarters are in Issy les Moulineaux, near Paris. It is specialized in the conception and the manufacturing of digital images and videos systems. The company developed itself in the world to be present in different countries, such as Italy, India, China, Spain, USA, Belgium and UK. It has about 73 000 employees dispatched over 230 sites, including more than 60 factories. Its sites are distributed around 10 countries but the company sells its goods and services to 100 countries.We can also notice that Thomson is a real leader in the innovation system, as it owns 35 000 patents worldwide representing around 6 000 inventions. The group sells its products and services through 4 major brands which are Thomson, RCA, Grass Valley and Technicolor. The 2 last brands allowed the company to take advantage of the digital technology’s global transition In the late 80s and the early 90s, Thomson was dedicated to Electronic oriented activities for both everyone and activities oriented to professional.After different plans of restructuration and reorganization, in 1997, Thomson decided to focus on the production of key components and electronic products (representing about 98% of its turnover). Since 2000, the company opens to the Medias and entertainment industry focusing on creation, management and content distribution. Thomson’s aim is about becoming a leading worldwide group of integrated solutions for media and entertainment industries. In order to gather this goal, Thomson decided to turn to e-procurement in 2001. What products are bought via e-procurement?In order to well understand the company we are going to develop the main purchases operated by the group. We have the production purchases (such as the electronic components, material and so one), that represents 70% of the total purchases. Then, we have the non-production purchases (maintenance, transportation an d so one). Thomson developed its e-procurement system, with EasySource, around this second kind of purchases. Indeed, non- production purchases are divided as follow: oNon-production purchases outside EasySource: Licenses, Guarantees, Customer Marketing, Other. Non-production purchases inside EasySource: oTransport, oEnergy, oSoftware, oIT and Telecoms, oProperty and tenant services, oExternal services, oMarketing, communication and advertising, oManufacturing supply, oInvestment, oTravel oOther So, those non-production purchases are items that are difficult to manage for companies as they are really diversified and need to be well analyzed. As a consequence they are very costly as they need competent people to deal with them and quite a lot of people due to their diversification. That is why Thomson has recourse to e-procurement with EasySource for such purchasesWhat savings were realized? The following shows that the solution at its completion should bring 150 million of euros: Ea sySource allows Thomson to save around 80 million per year. First, we can look at the following table showing us a few results from before and after the use of EasySource by Thomson: â€Å" Before EasySourceAfter EasySource Active suppliers per buyer10050 Percentage of active suppliers approved by the State10,0%100,0% Percentage of purchases generated with small suppliers40,0%10,0% Percentage of transactions via e-commerce3,0%60,0% Percentage of purchases under agreements50,0%95,0%Number of suppliers for indirect purchases360007000 % of indirect suppliers which represent 90% of the total amount of purchases30,0%10,0% † Such data easily show us the great impact that Easysource had on the company. For example the number of active supplier per buyer was divided by 2. Moreover, Transactions via e-commerce went up from 3% to 60%. E-commerce is much more profitable to company as it cost much less than traditional commerce. How were those savings realized? By implementing EasySource , Thomson developed a unique centralized tool for every user that brings important savings for the company.There are 3 main points that explain how those saving were realized. The first one is the control of the purchase condition. Indeed, it is easier to explain et order exactly what you want, avoiding mistakes. You can also negotiate ask to different suppliers and see which one offer you the best program. Then, you have a global improvement of the running. As everything is taking place on a unique platform, it is easier to make sure for example that you can have what needed or to compare the products through different suppliers.Finally, last but not least, the system allows the improvement of the productivity such as the reduction of the number of suppliers. And it make it easier to change of suppliers when findings others more profitable. EasySource was first develop in 2001 and followed 3 steps. The â€Å"Pilot phase† was quick as it wanted to show that the concept was re alistic and would bring many advantages to the company. It was also to see and learn how he system worked. So, Thomson developed the process on 3 key areas (Asia, Europe and America) and enrolled the 10 major suppliers of each of those areas.The second phase was the â€Å"large-scale deployment phase† aiming to develop the solution worldwide. It lead 3 stages at the same time : implementing he concept on 110 sites, massive enrollment of the suppliers while rationalizing and focusing on ad hoc purchasing rather than catalogue purchasing. Finally, the last step was â€Å"the capitalization and user adoption phase† that allow EasySource to become today the common and unique solution for non-production purchases. For this final stage the main point was to convince everyone to use EasySource for their transactions and to improve the use rate per family of product.To conclude all those points allow a better understanding and following of the purchases. In other words, it mea ns a gain about money through the reduction of management costs and the negotiation and validation processes What problems occurred during the implementation process? The major problem faced by the company, while implementing the process, was to catalogue all the suppliers. Indeed, the suppliers for non-production purchases are numerous and complex due to the large panel of family products.Then another problem that occurred was the access to the networks and to Internet. It might was already present on some areas, but it was also needed all over the world where the company is present. So, Thomson had to modernize its network infrastructures, as it was the first trial of some intranet database for the group. Thomson also add to inform both its workforce, suppliers and buyer to its new system. This problem was easily compensated thanks to a strong communication strategy and a real effort to get the portal o be easily used and understood by its users.