Tuesday, December 31, 2019

HMS Warspite - Battleship of World Wars I II

Launched in 1913, the battleship HMS Warspite saw extensive service during both world wars.  A Queen Elizabeth-class battleship, Warspite was completed in 1915 and fought at Jutland the following year. Retained after World War I, it moved between postings in the Atlantic and Mediterranean. After an extensive modernization in 1934, it fought in the Mediterranean and Indian Oceans during World War II and provided support during the Normandy landings. Construction Laid down on October 31, 1912, at the Devonport Royal Dockyard, HMS Warspite was one of five Queen Elizabeth-class battleships built by the Royal Navy. The brainchild of First Sea Lord Admiral Sir John Jackie Fisher and First Lord of the Admiralty Winston Churchill, the Queen Elizabeth-class became the first battleship class to be designed around the new 15-inch gun. In laying out the ship, designers elected to mount the guns in four twin turrets. This was a change from previous battleships which had featured five twin turrets. The reduction in number of guns was justified as the new 15-inch guns were substantially more powerful than their 13.5-inch predecessors. Also, the removal of the fifth turret reduced weight and allowed for a larger power plant which dramatically increased the ships speed. Capable of 24 knots, the Queen Elizabeths were the first fast battleships. Launched on November 26, 1913, Warspite, and its sisters, were among the most powerful battleships to see action during World War I. With the outbreak of the conflict in August 1914, workers raced to finish the ship and it was commissioned on March 8, 1915. HMS Warspite (03) Nation: Great BritainType: BattleshipShipyard: Devonport Royal DockyardLaid Down: October 31, 1912Launched: November 26, 1913Commissioned: March 8, 1915Fate: Scrapped in 1950Specifications (As Built)Displacement: 33,410 tonsLength: 639 ft., 5 in.Beam: 90 ft. 6 in.Draft: 30 ft. 6 in.Propulsion: 24 Ãâ€" boilers at 285 psi maximum pressure, 4 propellersSpeed: 24 knotsRange: 8,600 miles at 12.5 knotsComplement: 925-1,120 menGuns8 x Mk I 15-inch/42 guns (4 turrets with 2 guns each)12 x single Mk XII 6-inch guns2 x single 3-inch high-angle guns4 x single 3-pdr guns4 x 21-inch submerged torpedo tubesAircraft (After 1920)1 aircraft using 1 catapult World War I Joining the Grand Fleet at Scapa Flow, Warspite was initially assigned to the 2nd Battle Squadron with Captain Edward Montgomery Phillpotts in command. Later that year, the battleship was damaged after running aground in the Firth of Forth. After repairs, it was placed with the 5th Battle Squadron which consisted entirely of Queen Elizabeth-class battleships. On May 31-June 1, 1916, the 5th Battle Squadron saw action in the Battle of Jutland as part of Vice Admiral David Beattys Battlecruiser Fleet. In the fighting, Warspite was hit fifteen times by German heavy shells. HMS Warspite (left) and HMS Malaya (right) at the Battle of Jutland, 1916. Public Domain Badly damaged, the battleships steering jammed after it turned to avoid a collision with HMS Valiant. Steaming in circles, the crippled ship drew German fire away from the British cruisers in the area. After two complete circles, the Warspites steering was repaired, however, it found itself on course to intercept the German High Seas Fleet. With one turret still operational, Warspite opened fire before being ordered to drop out of line to make repairs. Following the battle, the commander of the 5th Battle Squadron, Rear Admiral Hugh Evan-Thomas, directed Warspite to make for Rosyth for repairs. Interwar Years Returning to service, Warspite spent the remainder of the war at Scapa Flow along with the majority of the Grand Fleet. In November 1918, it steamed out to aid in guiding the German High Seas Fleet into internment. After the war, Warspite alternated postings with the Atlantic Fleet and the Mediterranean Fleet. In 1934, it returned home for a large modernization project. Over the next three years, Warspites superstructure was greatly modified, aircraft facilities were built, and improvements were made to the ships propulsion and weapons systems. World War II Begins Rejoining the fleet in 1937, Warspite was sent to the Mediterranean as the flagship of the Mediterranean Fleet. The battleships departure was delayed for several months as the steering problem that had begun at Jutland continued to be an issue. When World War II began, Warspite was cruising the Mediterranean as the flagship of Vice Admiral Andrew Cunningham. Ordered to join the Home Fleet, Warspite took part in the British campaigns in Norway and provided support during the Second Battle of Narvik. Mediterranean Ordered back to the Mediterranean, Warspite saw action against the Italians during the Battles of Calabria (July 9, 1940) and Cape Matapan (March 27-29, 1941). Following these actions, Warspite was sent to the United States for repairs and re-gunning. Entering the Puget Sound Naval Shipyard, the battleship was still there when the Japanese attacked Pearl Harbor in December 1941. HMS Warspite in the Mediterranean, 1941. Public Domain Departing later that month, Warspite joined the Eastern Fleet in the Indian Ocean. Flying the flag of Admiral Sir James Somerville, Warspite took part in the ineffective British efforts to block the Japanese Indian Ocean Raid. Returning to the Mediterranean in 1943, Warspite joined Force H and provided fire support for the Allied invasion of Sicily that June. Remaining in the area, it fulfilled a similar mission when Allied troops landed at Salerno, Italy in September. On September 16, shortly after covering the landings, Warspite was struck by three heavy German glide bombs. One of these tore through the ships funnel and blew a hole in the hull. Crippled, Warspite was towed to Malta for temporary repairs before moving on to Gibraltar and Rosyth. HMS Warspite in the Indian Ocean, 1942. Public Domain D-Day Working quickly, the shipyard completed the repairs in time for Warspite to join the Eastern Task Force off Normandy. On June 6, 1944, Warspite provided gunfire support for Allied troops landing on Gold Beach. Shortly thereafter, it returned to Rosyth to have its guns replaced. En route, Warspite incurred damage after setting off a magnetic mine. After receiving temporary repairs, Warspite took part in bombardment missions off Brest, Le Havre, and Walcheren. With the war moving inland, the Royal Navy placed the battle-worn ship in Category C Reserve on February 1, 1945. Warspite remained in this status for the remainder of the war. Fate After efforts to make Warspite a museum failed, it was sold for scrap in 1947. During the tow to the breakers, the battleship broke loose and ran aground in Prussia Cove, Cornwall. Though defiant until the end, Warspite was recovered and taken to St. Michaels Mount where it was dismantled.

Monday, December 23, 2019

Human Rights Act of 1998 - 681 Words

The aim of this essay is to critically evaluate the statement The European Convention on Human Rights exists to guarantee legal protection to fundamental rights. It will examine how rights are protected in law and the way the UK approaches the protection of these rights. Explanation will be made of the way that the UK addresses the implementation of the rights in the English legal system. Issues such as conflicting rights and legal limitations will also be considered. An evaluation will be made of whether or not The Human Rights Act 1998 protects the fundamental rights of UK citizens as contained in the European Convention on Human Rights. Before the Human Rights Act 1998 was passed by parliament it had been considered unnecessary to incorporate the Convention directly into UK law as it was thought that the UK already provided adequate protection for its citizens. However, a number of infringements were identified and this eventually led to the start of the legislative process which resulted in the Human Rights Act 1998. Arguments that were put forward for the incorporation of The European Convention on Human Rights into UK law were partly based on the costs and time considerations involved in taking cases before the European Court in Strasbourg. The Human Rights Act 1998 gave the citizens of the United Kingdom the right to bring proceedings for the infringement of these rights before the UK courts. Other lines of reasoning concluded that the incorporation wouldShow MoreRelatedHuman Rights Act 1998 ( Hra )3755 Words   |  16 PagesSection C: 8 Before the Human Rights Act 1998 (HRA) coming into force, the UK subscribed to a ‘weak’ judicial review. However, the Act has brought a drastic change into the practice of judicial review in the UK. In this essay, I shall argue that with the new powers conferred to the courts under sections 3 and 4 (ss 3 and 4) of the HRA, they have developed a mechanism which allows the court to communicate with Parliament through their interpretations although the practice of judicial review remainsRead MoreSignificance of Section 3 and 4 of the Human Rights Act 19981312 Words   |  5 PagesThe power to strike down Acts of Parliament is defined as the power to declare legislation invalid because it is unconstitutional. This paper will critically assess sections 3 and 4 of the HRA 1998 by defining them, reviewing case law surrounding their use, and by evaluating the powers that they give to the judiciary. By doing so, it will demonstrate that section 3 gives judges powers that are no t significantly different from the power to strike down Acts of Parliament, whereas section 4 does notRead MoreThe Between The Uk Parliament And The Human Rights Act 1998 ( Hra ) On Sovereignty1030 Words   |  5 PagesParliamentary Sovereignty is, as Dicey coined â€Å"the right to make or unmake any law whatever†¦ [with] no person or body†¦ having a right to override or set aside the legislation of Parliament.† Immediately, we see a contradiction between the UK Parliament and the Human Rights Act 1998 (HRA) on sovereignty. The issues David Cameron puts forward in his speech have all attracted much attention from a Human Rights perspective. More and more the European Courts of Human Rights (ECHR) are becoming an integral part ofRead MoreThe Extent to Which the Human Rights Act of 1998 Strengthened the Rule of Law in the U.K. Constitution2570 Words   |  11 PagesThe Extent to Which the Human Rights Act of 1998 Strengthened the Rule of Law in the U.K. Constitut ion The Human Rights Act 1998 (HRA), an Act introduced to give effect to rights from the European Convention on Human Rights (ECHR) in domestic legislation. Its introduction has affected many legal areas; especially the conceptions of the rule of law and their place in the UK constitution. To understand the effect of the HRA, it is first necessary to establish the initial statusRead MoreThe Human Rights Act 19981486 Words   |  6 Pages The Human Rights Act 1998 The Human Rights Act 1998 was fully enforced in 2000 and describes further effect to freedoms and rights that are entitled under the ECHR (the European Convention on Human Rights) (Ward, Wragg Walker 2011, p. 146). The constitutional framework of the United Kingdom implies that the Human Rights Act 1998 is not ‘embedded’ in the same way as the human rights papers that are adopted by many nations in the world. Nonetheless, it is argued that any attempt to amend or repealRead MoreHuman Right Act, 1998766 Words   |  4 Pagescommunities which are not mainstream, often face additional challenges and barriers in escaping the domestic violence they are experiencing. Religion plays a vital role in that factor. Everybody has the right to worship whichever way they want to worship. Human Right Act, 1998. Vulnerable people have the right to privacy and protection from harm. Invasion of privacy is also an issue in residential homes where some staff members do not knock before en tering a resident’s room. Network of support- When anRead MoreThe Human Rights Act 19981355 Words   |  6 PagesThis is applicable to public authorities in the regard that it is fair, just and reasonable to impose a duty upon them as they act for the collective welfare of society. Newtown Council is a local government authority exercising public function; it is therefore susceptible to liability. Furthermore, it is important to note that the introduction of the Human Rights Act 1998 has affected the law of negligence, a breach of duty that results in damage to the claimant. This area of law has shown to beRead MoreThe Human Rights Act 19981470 Words   |  6 PagesThe Human Rights Act 1998 sets out fundamental rights for everyone within the UK. This incorporates the rights in which were set out in the European Convention on Human Rights, meaning if a persons’ rights are breached, the case can be brought to UK court rather than seeking justice from the European Court of Human Rights located in Franc e. In practice, this ensures all new laws are compatible with the Human Rights. The European Court of Human Rights; which focuses on humanities basic necessitiesRead MoreThe Human Rights Act 1998914 Words   |  4 Pagesimplications in regards to this study and the relevance to this particular case. The Human Rights Act 1998 according to Wild and Weinstein (2013-p217) came into force on the 2nd of October 2010. It seeks to protect the rights of all European nations. (LIST ALL RIGHTS IF YOU HAVE THE WORD COUNT) The Equality Act 2006 according to personnel today (2006) was firstly to establish the Commission for Equality and Human Rights, this is applicable to discrimination on grounds of beliefs and religions in theRead MoreHuman Rights Act Of 19982095 Words   |  9 PagesRights that protect human beings and the extent of legality of what they are entitled to as people are a core part of each constitution globally. The extent of human rights protection varies from country to country, with total democracies having most human rights that encompass freedom of speech and expression among other freedoms. These are the most sovereign of laws as they express how liberal and powerful the majority can be as opposed to the minority being powerful in some countries or kingdoms

Saturday, December 14, 2019

Mcdonald Competitive Advantage Free Essays

McDonald’s core competency is providing convenience when people need and want to eat fast food at prices that are competitive and provide best value for the customer’s money. One of McDonald’s competitive advantages is its focus on consistency of  quality, production of food and use of raw materials all around the world. The world recognition associated with the brand McDonald’s itself is also one of McDonald’s competitive advantages. We will write a custom essay sample on Mcdonald Competitive Advantage or any similar topic only for you Order Now We strive to be cost leaders and offer our food at prices that cannot be matched by our competitors. In order to do this, your store must be efficient and keep everyday operations costs as low as possible. Doing so, will allow for our stores to be superior to other fast food restaurants because we can serve our food at lower prices than any other fast food company. Another important competitive advantage we have here at McDonald’s is the speedy delivery of our food. In order to maintain this advantage over other fast food chains, you must make the processes of cooking food simple for all your employees. It must be easy to learn and easy to execute with a low failure rate to ensure the quick production and delivery of your food. These two competitive advantages comply directly with the vision of the company which is as follows: â€Å"McDonald’s vision is to be the world’s best quick service restaurant experience. Being the best means providing outstanding quality, service, cleanliness, and value, so that we make every customer in every restaurant smile. † Just like any other firm, McDonald’s competitive advantages are what makes it stand out when compared to other companies. These aspects of McDonald’s are what helped it become the number one fast food distributor in the world. McDonald’s competitive advantage is based on brand recognition. McDonald’s brand is well known in all markets, nationally and internationally. A new report by business intelligence firm shows how top corporations such as McDonalds’s, Coca-cola use their brands to strategically position themselves to gain and retain new customers, even in the most competitive markets. Brand recognition holds tremendous influence on consumer buying habits How to cite Mcdonald Competitive Advantage, Essay examples

Friday, December 6, 2019

A great man named Charles Darwin Essay Example For Students

A great man named Charles Darwin Essay A great man named Charles Darwin in his theory of evolution proposed that man comes from one common ancestor, but some instincts and genes are left the same. This idea of evolution links with todays world as today we still have the same thoughts and ideas and some of us are corrupt and are the opposite of what we should be. This links with Lazarillo as coincidentally all the characters in this novella appear one way, but in reality they are the opposite. In reality these men such as the nobleman; the nobleman depicts himself as very well-dressed man, but as our main character Lazarillo finds out, the nobleman is a miser who lives off his parents money. Many such instances are throughout the book where church officials are doing un-holy actions. The characters in Lazarillo de Tormes appear holy and pure in one light but in truth all the characters are portrayed in a darker light. Spain is a Christian dominant country and has been for several years including the time in which this book is set. Lazarillo de Tormes is primarily based upon members of the clergy being Lazarillos master. One would think these pious officials would follow Christian code such as: being helpful towards the needy and maintain abstinence, but during the book they do the opposite. Lazarillos second master portrays a selfish attitude that is very un-priest like when in the book it narrates, He would give me all the bones after he gnawed them saying the words: Here, eat and rejoice, because the world is yours. You are better off than the Pope! Lazarillo was famished at the time and the greedy pope offered him close to nothing which makes the priest rude and uncaring. Another example follows with the story of the archbishop when he says, Since people see your wife leaving and entering my house. It is to your complete honor and hers that she does so, I promise you. In this moment Lazarillo i s married and finds out that an Arch-Bishop and his wife are having an affair, this proves again that the Arch-Bishop did the un-pious thing. In reality an Arch-Bishop wouldnt be allowed to have sexual relations, but in secret he is, which makes him a liar in reality. It is an age old stereotype that rich people are generally mean people who dont like to spend any money and live miserly. It is in Lazarillo de Tormes that the character of a nobleman takes the word miser to a whole new level. When Lazarillo meets his new master he sees that this man is well dressed and considerably rich. It is a long while later; Lazarillo realizes this assumption is dead wrong and that the nobleman is just a poor master who lives off his parents money. An example of his cheapness is when he says, Theres nothing in the world that prolongs life like eating frugally. The Nobleman really means that he does not want to waste money on food and will take any chance to eat for free. In the rest of the chapter the Nobleman begins to flirt with a few women and they expect him to pay for something and he reacts by saying, realizing that his pocket was cold and belly was hot, was seized with such a shiver that his face turned pale and he begun to get tongue tied and make feeb le excuses. It is thwarting to know that a nobleman gave the idea of two women up because he was too miserly and poor to do anything about this. This Nobleman in the later part of the chapter is found to receive money from his family and runs away from Lazarillo. .ub45836cada6278107c225e4d84ca8a7a , .ub45836cada6278107c225e4d84ca8a7a .postImageUrl , .ub45836cada6278107c225e4d84ca8a7a .centered-text-area { min-height: 80px; position: relative; } .ub45836cada6278107c225e4d84ca8a7a , .ub45836cada6278107c225e4d84ca8a7a:hover , .ub45836cada6278107c225e4d84ca8a7a:visited , .ub45836cada6278107c225e4d84ca8a7a:active { border:0!important; } .ub45836cada6278107c225e4d84ca8a7a .clearfix:after { content: ""; display: table; clear: both; } .ub45836cada6278107c225e4d84ca8a7a { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .ub45836cada6278107c225e4d84ca8a7a:active , .ub45836cada6278107c225e4d84ca8a7a:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .ub45836cada6278107c225e4d84ca8a7a .centered-text-area { width: 100%; position: relative ; } .ub45836cada6278107c225e4d84ca8a7a .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .ub45836cada6278107c225e4d84ca8a7a .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .ub45836cada6278107c225e4d84ca8a7a .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .ub45836cada6278107c225e4d84ca8a7a:hover .ctaButton { background-color: #34495E!important; } .ub45836cada6278107c225e4d84ca8a7a .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .ub45836cada6278107c225e4d84ca8a7a .ub45836cada6278107c225e4d84ca8a7a-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .ub45836cada6278107c225e4d84ca8a7a:after { content: ""; display: block; clear: both; } READ: To Kill A Mockingbird: Man Versus Society EssayLazarillo was moving up the ladder of success heading from one master to the next, but each showing their true colors in the end which makes him quit. It was that Lazarillo may have had many masters, but there were a multitude of reasons why he quit and sometimes he was with a master for a very short amount of time. One of his instances was with a Mercederian Friar who was extremely arrogant and had his way with everything. When one thinks of a Monk they think of a secluded quiet person who respects nature. In the book there are shocking examples that exemplify the exact opposite of this friar. An example is when the book narr ates, To whom the low class women directed me. They said he was a relative. In this context it means that the friar used to go to prostitutes and also it is later mentioned that Lazarillo may have left because he was sexually abused by him. Lazarillos next dead end job was with a very crafty and sneaky indulgence seller who if you knew him would think he is secular. This man blatantly tricks people into buying indulgences and an example of him doing that is when he says, When people didnt buy indulgences readily, he sought ways for them to do it. This explains the fact that Lazarillo and him both knew that it was not about selling indulgences, but it was about making money. Lazarillo de Tormes is a fantastic book about the fortunes and misfortunes about a young boy who is learning the ropes. In the book many people give off a certain personality, but once Lazarillo goes undercover he finds those people to be cruel or fake. Lazarillo uncovers what the church is really about, how the clergy manipulates people and deep down is very corrupt. Not only are the church involved, but the nobleman and rich folk are lazy people who live off other people money even though they dress superbly. The characters in Lazarillo de Tormes appear holy and pure in one light but in truth all the characters are portrayed in a darker light. All the characters in a way helped Lazarillo grow as a person to be more successful because Lazarillo saw how people genuinely are..

Friday, November 29, 2019

Privatization The Better Choice Essays - Employment Compensation

Privatization: The Better Choice Privatization: The Better Choice Every working American citizen contributes to Social Security. Anyone who has ever held a job has felt the frustration of seeing how much money the government takes out of their paycheck. Being told that we will all be able to collect social security when we can no longer work does not ease the frustration of having 6.2% of our hard earned money taken from us each payday. If individuals could have control of their retirement funds, this frustration could be eased. Being able to control our own retirement funds is an option that is being supported more and more by American workers. Currently, nearly 44 million Americans receive Social Security benefits. Of these 44 million, 61% are retired workers, 17% are survivors of deceased workers, 12% are spouses and children of retired workers, and 10% are disabled workers. Obviously, the major group of Social Security Beneficiaries is retired workers. Since the number of working Americans has not grown along with the number who are retiring, Social Security has become a black hole to the current generation of workers. We will pay into it most of our lives, but will not be able to collect unless a drastic change is made. Everyone has heard the ongoing debate over the past few years about what should be done to reform Social Security. The Social Security Board of Trustees estimates that by the year 2032, Social Security funds will be fully spent. There are several reasons for this, including the retirement of the ?baby boom? generation and the assumption that the U.S. economy will grow at a slower rate than it has been. While republicans and democrats fight over whose plan is better, there is a simple alternative to Social Security: privatization. By making social security a private matter for individuals, everyone can benefit. One of the plans the government is considering includes partial privatization, but it is still centered around a flat tax deducted from the paychecks of American workers. The idea of Social Security is a good one. There are many retired workers who would not make it without Social Security. I have seen it myself. My mother has been in banking for more than 20 years, and during that time I have seen all kinds of people coming in to deposit their Social Security checks. The majority of them are middle class, retired workers, and although their Social Security checks are not their only source of income, the little bit of extra money does help them. Others, however, would not be able to put a roof over their heads without their Social Security. Even though it may not seem like much to most of us, that little bit of money is all they have, and they depend on it. A private system, however, would give retired workers a greater chance at having more money upon retirement. By investing into mutual funds or other low-risk investment programs, people could get a greater return on their money. Even with a private system, Social Security should still be mandatory. If people were concerned enough to plan for their retirement, they would already be investing or saving money for that purpose. Since many people have trouble saving money or do not feel they can afford to set money aside, a privatized savings system should still be mandatory, perhaps even with a set amount to be withheld from each paycheck. The difference between this idea and the existing Social Security program is that individuals would be in control of where and how their money is invested. Workers who do not care to make investment choices for themselves would still accumulate funds for their retirement, while those who choose to do so are choosing how they want their money to be invested, and possibly yielding greater returns. Many Americans would agree that helping our fellow citizens in their time of need is part of the American way; however, with the current Social Security program falling apart, the best way to secure the future of young workers is a system in which they can invest for themselves. A mandatory private savings account system would benefit everyone. The current SSI paycheck deductions are not only a frustration, but they distort the compensation sought by employees and reduce national savings and investment. Privatization would allow individuals to invest in the economy through the Stock Exchange and bonds. Not only would privatization allow individuals to secure their future well-being, but it

Monday, November 25, 2019

Assisting with Medication Essays

Assisting with Medication Essays Assisting with Medication Paper Assisting with Medication Paper Identify legislation that governs the use of medication in the social care settings? Legislation and guidance that control the prescribing, dispensing, administration, storage and disposal of medicines. The Medicines Act 1968, the Misuse of Drugs Act 1971 (and later amendments), the Misuse of Drugs (Safe Custody) Regulations 1973 (and later amendments), the Health and Safety at Work Act (1974), Control of Substances Hazardous to Health COSHH, legislation 1999, care standard Act 2000 receipt, storage and administration of medicines the Mental Capacity Act (2005) the Access to health records Act (1990), the Data Protection Act (1998) plus equality legislation. Administration and control of medicine in care homes and children services June 2003 hazardous waste regulations 2005. Legal framework: how the organisation policies and procedures reflect these for safe handling of medicines by all workers prescribing, dispensing, administration, storage and disposal. Outline the legal classification system for medication? The classification of medicines are all related to the medicines act 1968, while working with medication, it is good to have an understanding and working knowledge of the common types of medication by training that should be provided by my company that I work for. There are various legal controls on the retail sale or supply of medicines which are set out in the Medicines Act 1968. Medicines are classified into three categories Prescription Only, Pharmacy or General Sale List. Each category is subject to a number of controls. These controls apply to medicines sold or supplied by retail whether they are sold or supplied via internet transactions, by mail order, or any other form of supply. The general rule is that all licensed medicines are P unless otherwise designated. Explain how and why policies and procedures are agreed ways of working must reflect and incorporate legislative requirements? The policies and procedures are put in place to make sure that legislation is being followed so that all people in the setting, staff and the people who need care are being cared for are safe, all needs are being met, inclusive practice and diversity is being followed out and that the setting is staying within the law. They must reflect on legislation so that the policies and procedures are correct and are the correct way of doing things. For example, if a health and safety procedure I always make sure to put in place and was not in line with legislation, then this could cause the setting to get in trouble with the law and could cause harm to the individuals who was in need of health and safety requirements could become harmed. Identify common types of medication? The common types of medication, Anticoagulants Capsules, Tablets, Powders, Drops, Liquids, Inhalants and Skin preparations. Other Types of common medications are Analgesics, Antacids, Anti, anxiety Drugs, Antibacterial and Anti-depressantsetc. Antibiotics, Antipsychotic and anti-depressants. List conditions for which each type of medication may be prescribed? Antibiotics are used to fight infections. Analgesics are used to relieve pain Antacids are used to relieve indigestion. Describe changes to an individual`s physical or mental well being that may indicate an adverse reaction to a medication. What is an adverse drug reaction; Medicines can treat or prevent illness and disease. However, sometimes medicines can cause problems. These problems are called adverse drug reactions. I should know what to do if I think that I or someone I take care of is having an adverse drug reaction. For example, any sudden or drastic changes in a patients physical and mental condition could indicate an I can report an acute fear of being hypnotic drug prescribed to individuals in my workplace or I can report to my line manage. For example Mrs. D if she forgets to take her medication, she can change totally because she is loss memory and she is messing up everything and when I give her medication Mrs. D calm down. Describe the roles and responsibilities of those involved in prescribing, dispensing and supporting the use of medication. A combination of Doctors, and chemists and Pharmacists prescribe and dispense medication. This is to make sure not allergic to it, it works safely with other medications I am taking, and I take the medicine as prescribed. It is for safety for the consumer. The role of a pharmacist goes beyond dispensing case, involved a violent and threatening customer who wanted medication of responsibilities, from dispensing medication to. Pharmacists distribute prescription drugs to individuals. They also advise their patients, physicians, and other health practitioners on the selection, dosages, interactions, and side effects of medications, as well as monitor the health and progress of those patients to ensure that they are using their medications safely and effectively. Compounding the actual mixing of ingredients to form medications is a small part of a pharmacists practice, because most medicines are produced by pharmaceutical companies in standard dosages and drug delivery forms. Most pharmacists work in a community setting, such as a retail drugstore, or in a health care facility, such as a hospital. The roles and responsibilities a nurse and care worker when we receive the medication, pharmacists if am the care worker, I always make sure to Mrs D receive the right medication sometimes when delivery pharmacists they mix up the medication or open the box then I tell my line manage or I call pharmacists. Also, I am responsibility Mrs D her medication and that it is my part of my job when pharmacist delivery Mrs D medication and I check before they leave, it is the right one she takes regularly and I also check the date. Also, when I give her medication I make sure she takes properly her medication, because sometimes she keep her mouth the medication than when I leave her, she takes back the medication. So I always check before I leave Mrs D goes thought her mouth and said to her show me your mouth please then she show me her mouth and say thank you Mrs D. Explain where responsibilities lie in relation to use of over and supplements It is the responsibility of the user. The best way to become better informed and for young and old alike is to read and understand the information on Over-the-counter labels. Next to the medicine itself, label comprehension is the most important part of self-care with Over-the-counter medicines. If I read the label and still have questions I make sure to talk to a doctor, nurse, or pharmacist and GP. For example, when Mrs. D receives her medication I make sure to check the medication right one because sometimes is mess up. So I can report because I amresponsibilities her. For example Mrs. D says to me can you get some medication, pharmacists and I say no because I am not allowed to take medication, pharmacists without prescribing if I order medication without prescribing she can take then she risk herself and that it is my fault. I always to make sure if Mrs. D asks me to get some medication in the pharmacists. So I make sure to tell my line manage or supervise. Also that it is part of health and safety in the care home or policies and procedures and also that it is very good to follow safe for the care worker and service users. Describe the routes by which medication can be administered Definition: Medication route refers to the way that a drug is introduced into the body. This is based on the specific medication being used, the rate of absorption desired and the specific site of action where the medication needs to have an effect. Most drugs are manufactured for a specific route of administration and must be used as directed for safety and efficiency. Some examples of routes of administration include: Oral: Medications are taken by mouth in pill, capsule or liquid form and absorbed into the system through the digestive system. Absorption is slow. Medications that use this option cannot be used if vomiting is occurring. Internal: Medications are administered into the rectum via a suppository and absorbed by the lower digestive tract. Mucosal: Medications are delivered through the nose or inhaled and are absorbed through the nasal mucosa or bronchioles, respectively. Vaginal administration of a medication is also considered mucosal. Parenteral: Any medication administration that involves injecting a drug directly into a vein intravenous, muscle intramuscular, artery intrarterial, abdominal cavity intrperitoneal, heart intracardiac or into the fatty tissue beneath the skin subcutaneous. The speed of absorption varies, but is faster than oral administration. This is used when more complete and faster absorption of a drug is needed. Percutaneous: Medications are absorbed directly through the skin into the blood stream. Some hormone replacements are administered by patches that are absorbed slowly and evenly, for example. I always make sure to keep a record of all Mrs D current medicines she take, including their names and regimens dose, time, and other instructions for taking. I always make sure to Write down if any problems can get they have with the medicine Mrs D so I can discuss with the doctor or pharmacist she received every week. Describe different forms in which medication may be presented I always make sure use to describe a Medications may include situation will be different. Some patients will respond to CPR and medications immediately and other patients may What are the different ways in which I can give Mrs D medication? There are many ways to give her medicines, from tablets and capsules through to suppositories, through the skin and different types of injection. The choice of how you take your medication should be offered to you. The advantages and disadvantages should also be explained. Below are a few advantages and disadvantages of each of the different types. There are many different ways to take medicine, even though most may be familiar with just a few of these. It’s common to swallow a pill or take some liquid medication, but taking MEDs orally isn’t always practical or the best way to administer a medication. To this end, medical researchers have developed quite a few methods to take medication to serve a variety of purposes. For many over the counter MEDs, it’s more common to take medicine orally. Oral MEDs can come in various forms, including different types of pills and liquids. New methods that are taken orally, but aren’t swallowed whole are various melt in the mouth MEDs, which may absorb into mouth tissues and not be processed through the stomach. Sometimes medications will work faster and be more effective if they don’t have to go through the gate first. Sometimes, a common medication people would take orally needs a different delivery system. Vomiting with fever for instance, could mean a person can’t keep a fever reducer down or needs anti-vomiting medication. Numerous medications are taken annually, via a suppository. Though many people don’t care for suppository medication, it can be a good alternative when oral MEDs cannot be tolerated. There are different forms in which medication can be presented. Tablets and capsules, Syrups and liquids, Dispersible tablets melt-in-the-mouth, Injections depot or long-acting and Skin patches. When Mrs D receives her medication, it is one box divided into 14 compartments with lids in 7 days and when pharmacists to deliver her medication at home, I make sure to check before they leave me because sometimes they give her the medication some box it is open and thats why I always check.

Thursday, November 21, 2019

Cyber Crime Research Paper Example | Topics and Well Written Essays - 2000 words

Cyber Crime - Research Paper Example Cyber crimes have brought massive loss of funds and relevant authorities should formulate measures in order to address the situation. Consumers and businessmen have continued to face the problem of cyber crime as the legitimate uses of the internet have become more sophisticated and diversified. The crime that started in the late 1990’s as a form of social engineering whereby criminals would steal passwords for consumers account with the intent of getting free connectivity has acquired significant growth and expansion into a profitable industry with the new forms of crime. These forms are monetary theft, identity theft, extortion, money laundering and industrial espionage among other crimes (Ionescu, Mirea and Blajan p.375). The criminals who undertake various forms of cyber crimes operate from almost anywhere whereby they target businesses and people in all countries. There are many challenges that are posed by the volume and the scale of cybercrimes. Moreover, the technical complexity in identification of the cyber criminals makes it hard for the criminals to be brought to justice. The increase in the number of internet users and the nature in which most businesses are conducted online has enabled cyber criminals to increase their opportunities. Furthermore, law agencies have not formulated comprehensive mechanisms of addressing the issue of cyber crimes and the traditional type of policing that exists in many countries is incapable of apprehending the cyber criminals (Ionescu, Mirea and Blajan p.375). There are major types of cyber crimes. Vandalism of services concerned with telecommunication is one of the many forms of cyber crimes. This form has become a major industry whereby criminals are able to access circuits, make their calls and sell airtime to third parties. Moreover, the criminals have been able to access the telecommunication systems through impersonation of the technicians. This is achieved using software

Wednesday, November 20, 2019

GROUP ANALYSIS Essay Example | Topics and Well Written Essays - 750 words

GROUP ANALYSIS - Essay Example I loved my group and I think they were very supportive and helpful with me. Of the lessons on developing listening skills, I honestly believe that the talking stick that was provided was very helpful. It enhanced my listening skills to focus primarily on the speaker. At this university, I worked with two groups prior to this group; but I would say that my listening skills were most exemplified with this group. I have acknowledged all the group members’ opinions and I was therefore able to appreciate what I learned from them. Later on, we threw the stick in the middle and we started communicating with each other without its need. We realized that we learned to respect and listen attentively to each other without using the talking stick. With regards to discovering the controversial topic of the second Council session, when I first saw this topic, my initial reaction was that this topic would not be very beneficial for me. I really did not like the topic. I was and I am still co mpletely against the legalization of gay marriages. Through the group’s discussion, new and innovative ideas emerged. The discussion did not persuade me to change my opinion; but some logical arguments were presented about the issue. For example, Coyle Rebecca said to me that the USA is a free land and everybody is given the opportunity and the freedom to do speak and act according to one’s will. Regarding the group presentation and the group meetings during which we prepared the presentation, honestly, it was difficult for me to inter-relate with the group. Only later did I collaborate and actively participate in group activities. I was the opinion specialist. Even in the presentation, I suggested ideas for the group presentation. If I had a chance of doing a project of the same requirements again, I will try my best to contribute more effectively in the group. I realized that only through a collaborative and participative environment, would the group achieve its defi ned goals. We acknowledge that a crucial part of group development is leadership. In our experience, we did not formally assign a group leader. We understood each other; but we agreed to designate Coyle Rebecca as a leader to collect our papers and register a study room for us. But in general, there was no specific leader that directed the group to do something or organize the discussion. In retrospect, I believe we could have done better in preparing for the presentation. If my group focused on how the presentation can be managed, we could have done much better that what we did. Through a consensus, we arranged our meetings very well and agreed that every member was responsible for addressing one question. We appropriately prepared for the presentation by timing ourselves to determine the amount of time needed to respond to the questions. During the presentation, the time was shorter than the 30 minutes minimum stipulated time. Afterwards, I said to them that we should have added m ore ideas for a more effective presentation. One of the students said that at least we are not failing and the remark annoyed me. I hope the professor would discern the individual’s efforts within the group, in addition to grading us as a group. I would say that we were so cohesive and it contributed to facilitation of achieving group goals. We exchange jokes and phone numbers. We encouraged open

Monday, November 18, 2019

Media represent females at a particular sporting event-wimbledon event Literature review

Media represent females at a particular sporting event-wimbledon event upcoming one for this year - Literature review Example Research Hypothesis The above mentioned research questions, in a broader sense will be explored and analyzed to test and validate the below mentioned research hypothesis: The media representation of females in the sporting events is biased and prejudiced. Justification for Using the Qualitative Approach to Test the Research Hypothesis The given research will exploit the qualitative methods and approaches to test the proposed research hypothesis. A qualitative approach is highly suitable for testing the proposed hypothesis owing to a variety of reasons. Not to say, that a qualitative approach towards research has its specific advantages and flaws. Qualitative research has primarily to do with the qualitative phenomena that are the phenomena that have to do with quality or kind (Newman & Benz 1998). For example, in the research under consideration, the qualitative research undertaken will have to do with the quality or kind of the media representation of women in sporting events. Quali tative research is a valid form of scientific research. Qualitative research tends to sort out answers to questions. It adheres to s systematic and predefined procedure used for testing a research hypothesis. ... the undertaken research is not only to test the proposed hypothesis but also to cull out insights that are of relevance to the future research in related disciplines. In the context of the research topic under consideration, a qualitative approach will be highly suitable in exploring the values, behaviour and attitude of media towards the representation of women in sporting events. This qualitative research will provide the research scholar with the complex textual information regarding how people experience the representation of women in sporting events and what do they think about it. Besides, it will solicit information regarding the human side of the issue under consideration (Phillimore & Goodson 2004). It will help the research scholar better understand and interpret the complicated reality pertaining to the media representation of women in sporting events and its implications for further research in varied disciplines. The nature of the research hypothesis to be tested is such that it defies all attempts to quantify or accurately measure the type and nature of media representation of women in sporting events, and hence a quantitative approach will not be suitable and appropriate (Lankshear & Knobel 2004). A qualitative approach towards the proposed research offers varied advantages over a quantitative approach. The first and foremost advantage of qualitative research is that it accords a great degree of flexibility to the research scholar (Bowling 2002). The quantitative methods are usually inflexible and are mostly not appropriate for testing the type and kind of research hypothesis under consideration. When it comes to quantitative research, the common methods it uses to collect data such as questionnaires and surveys do tend to pose the same questions to all

Saturday, November 16, 2019

Cache Manager to Reduce the Workload of MapReduce Framework

Cache Manager to Reduce the Workload of MapReduce Framework Provision of Cache Manager to Reduce the Workload of MapReduce Framework for Bigdata application Ms.S.Rengalakshmi,  Mr.S.Alaudeen Basha Abstract: The term big-data refers to the large-scale distributed data processing applications that operate on large amounts of data. MapReduce and Apache’s Hadoop of Google, are the essential software systems for big-data applications. A large amount of intermediate data are generated by MapReduce framework. After the completion of the task this abundant information is thrown away .So MapReduce is unable to utilize them. In this approach, we propose provision of cache manager to reduce the workload of MapReduce framework along with the idea of data filter method for big-data applications. In provision of cache manager, tasks submit their intermediate results to the cache manager. A task checks the cache manager before executing the actual computing work. A cache description scheme and a cache request and reply protocol are designed. It is expected that provision of cache manager to reduce the workload of MapReduce will improve the completion time of MapReduce jobs. Key words: big-data; MapReduce; Hadoop; Caching. I. Introduction With the evolution of information technology, enormous expanses of data have become increasingly obtainable at outstanding volumes. Amount of data being gathered today is so much that, 90% of the data in the world nowadays has been created in the last two years [1]. The Internet impart a resource for compiling extensive amounts of data, Such data have many sources including large business enterprises, social networking, social media, telecommunications, scientific activities, data from traditional sources like forms, surveys and government organizations, and research institutions [2]. The term Big Data refers to 3 v’s as volume, variety, velocity and veracity. This provides the functionalities of Apprehend, analysis, storage, sharing, transfer and visualization [3].For analyzing unstructured and structured data, Hadoop Distributed File System (HDFS) and Mapreduce paradigm provides a Parallelization and distributed processing. Huge amount data is complex and difficult to process using on-hand database management tools, desktop statistics, database management systems or traditional data processing applications and visualization packages. The traditional method in data processing had only smaller amount of data and has very slow processing [4]. A big data might be petabytes (1,024 terabytes) or exabytes (1,024 petabytes) of data composed of billions to trillions of records of millions of people—all from different sources (e.g. Web, sales, customer center for communication, social media. The data is loosely structured and most of the data are not in a complete manner and not easily accessible[5]. The challenges include capturing of data, analysis for the requirement, searching the data, sharing, storage of data and privacy violations. The trend to larger data sets is due to the additional information derivable from analysis of a single large set of data which are related to one another, as matched to distinguish smaller sets with the same total density of data, expressing correlations to be found to identify business routines[10].Scientists regularly find constraints because of large data sets in areas, including meteorology, genomics. The limitations also affect Internet search, financial transactions and information related business trends. Data sets develop in size in fraction because they are increasingly accumulated by ubiquitous information-sensing devices relating mobility. The challenge for large enterprises is determining who should own big data initiatives that straddle the entire organization. MapReduce is useful in a wide range of applications,such as distributed pattern-based searching technique, sorting in a distributed system, web link-graph reversal, Singular Value Decomposition, web access log stats, index construction in an inverted manner, document clustering , machine learning, and machine translation in statistics. Moreover, the MapReduce model has been adapted to several computing environments. Googles index of the World Wide Web is regenerated using MapReduce. Early stages of ad hoc programs that updates the index and various analyses can be executedis replaced by MapReduce. Google has moved on to technologies such as Percolator, Flume and MillWheel that provides the operation of streaming and updates instead of batch processing, to allow integrating live search results without rebuilding the complete index. Stable input data and output results of MapReduce are stored in a distributed file system. The ephemeral data is stored on local disk and retrieved by the reducers remotely. In 2001,Big data defined by industry analyst Doug Laney (currently with Gartner) as the three Vs : namevolume, velocity and variety [11]. Big data can be characterized by well-known 3Vs: the extreme density of data, the various types of data and the swiftness at which the data must be processed. II. Literature survey Minimization of execution time in data processing of MapReduce jobs has been described by Abhishek Verma, Ludmila Cherkasova, Roy H. Campbell [6]. This is to buldge their MapReduce clusters utilization to reduce their cost and to optimize the Mapreduce jobs execution on the Cluster. Subset of production workloads developed by unstructured information that consists of MapReduce jobs without dependency and the order in which these jobs are performed can have good impact on their inclusive completion time and the cluster resource utilization is recognized. Application of the classic Johnson algorithm that was meant for developing an optimal two-stage job schedule for identifying the shortest path in directed weighted graph has been allowed. Performance of the constructed schedule via unquantifiable set of simulations over a various workloads and cluster-size dependent. L. Popa, M. Budiu, Y. Yu, and M. Isard [7]: Based on append-only, partitioned datasets, many large-scale (cloud) computations will operate. In these circumstances, two incremental computation frameworks to reuse prior work in these can be shown: (1) reusing similar computations already performed on data partitions, and (2) computing just on the newly appended data and merging the new and previous results. Advantage: Similar Computation is used and partial results can be cached and reused. Machine learning algorithm on Hadoop at the core of data analysis, is described by Asha T, Shravanthi U.M, Nagashree N, Monika M [1] . Machine Learning Algorithms are recursive and sequential and the accuracy of Machine Learning Algorithms depend on size of the data where, considerable the data more accurate is the result. Reliable framework for Machine Learning is to work for bigdata has made these algorithms to disable their ability to reach the fullest possible. Machine Learning Algorithms need data to be stored in single place because of its recursive nature. MapRedure is the general and technique for parallel programming of a large class of machine learning algorithms for multicore processors. To achieve speedup in the multi-core system this is used. P. Scheuermann, G. Weikum, and P. Zabback [9] I_O parallelism can be exploited in two ways by Parallel disk systems namely inter-request and intra-request parallelism. There are some main issues in performance tuning of such systems.They are: striping and load balancing. Load balancing is performed by allocation and dynamic redistributions of the data when access patterns change. Our system uses simple but heuristics that incur only little overhead. D. Peng and F. Dabek [12] an index of the web is considered as documents can be crawled. It needs a continuous transformation of a large repository of existing documents when new documents arrive.Due to these tasks, databases do not meet the the requirements of storage or throughput of these tasks: Huge amount of data(in petabytes) can be stored by Google’s indexing system and processes billions of millions updates per day on wide number of machines. Small updates cannot be processed individually by MapReduce and other batch-processing systems because of their dependency on generating large batches for efficiency. By replacing a batch-based indexing system with an indexing system based on incremental processing using Percolator, we process the similar number of data documents averagely per day, happens during the reduction of the average age of documents in Google search which is resulted by 50%. Utilization of the big data application in Hadoop clouds is described by Weiyi Shang, Zhen Ming Jiang, Hadi Hemmati, Bram Adams, Ahmed E. Hassan, Patrick Martin[13]. To analyze huge parallel processing frameworks, Big Data Analytics Applications is used. These applications build up them using a little model of data in a pseudo-cloud environment. Afterwards, they arrange the applications in a largescale cloud situation with notably more processing organize and larger input data. Runtime analysis and debugging of such applications in the deployment stage cannot be easily addressed by usual monitoring and debugging approaches. This approach drastically reduces the verification effort when verifying the deployment of BDA Apps in the cloud. Matei Zaharia, Mosharaf Chowdhury, Michael J. Franklin, Scott Shenker, Ion Stoica [14] MapReduce and its variants have been highly successful in implementing large-scale data-intensive applications on clusters of commodity base. These systems are built around an model which is acyclic in data flow which is very less suitable for other applications. This paper focuses on one such class of applications: those that reuse a working set of data across multiple operations which is parallel. This encompasses many machine learning algorithms which are iterative. A framework cnamed Spark which ropes these applications and retains the scalability and tolerantes fault of MapReduce has been proposed. To achieve these goals, Spark introduces an abstraction called resilient distributed datasets (RDDs). An RDD is a read-only collection of objects which are partitioned across a set of machines. It can be rebuilt if a partition is lost. Spark is able to outperform Hadoop in iterative machine learning jobs and can be used to interactively query around and above 35 GB dataset with sub-second response time. This paper presents an approach cluster computing framework named Spark, which supports working sets while providing similar scalability and fault tolerance properties to MapReduce III. Proposed method An Objective of proposed System is to the underutilization of CPU processes, the growing importance of MapReduce performance and to establish an efficient data analysis framework for handling the large data Drift in the workloads from enterprise through the exploration of data handling mechanism like parallel database such as Hadoop. Figure 1: Provision of Cache Manager III.A.Provision of Dataset To Map Phase : Cache refers to the intermediate data that is produced by worker nodes/processes during the execution of a Map Reduce task. A piece of cached data is stored in a Distributed File System (DFS). The content of a cache item is described by the original data and the operations applied. A cache item is explained by a 2-tuple: Origin, Operation. The name of a file is denoted by Origin in the DFS. Linear list of available operations performed on the Origin file is denoted by Operaion. Example, consider in the word count application, each mapper node or process emits a list of word, counting tuples that record the count of each word in the file that the mapper processes. Cache manager stores this list to a file. This file becomes a cache item. Here, item refers to white-space-separated character strings. Note that the new line character is also considered as one of the whitespaces, so item precisely captures the word in a text file and item count directly corresponds to the word count operat ion performed on the data file. The input data are get selected by the user in the cloud. The input files are splitted. And then that is given as the input to the map phase. The input to the map phase are very important. These input are processed by the map phase. III.B.Analyze in Cache Manager: Mapper and reducer nodes/processes record cache items into their local storage space. On the completion of these operations , the cache items are directed towards the cache manager, which acts like an inter-mediator in the publish/subscribe model. Then recording of the description and the file name of the cache item in the DFS is performed by cache manager. The cache item should be placed on the same machine as the worker process that generates it. So data locality will be improved by this requirement. The cache manager maintains a copy of the mapping between the cache descriptions and the file names of the cache items in its main memory to accelerate queries. Permanently to avoid the data loss, it also flushes the mapping file into the disk periodically. Before beginning the processing of an input data file, the cache manager is contacted by a worker node/process. The file name and the operations are send by the worker process that it plans to apply to the file to the cache manager. Upon receiving this message, the cache manager compares it with the stored mapping data. If an exact match to a cache item is found, i.e., its origin is the same as the file name of the request and its operations are the same as the proposed operations that will be performed on the data file, then a reply containing the tentative description of the cache item is sent by the cache manager to the worker process.On receiving the tentative description,the worker node will fetch the cache item. For processing further, the worker has to send the file to the next-stage worker processes. The mapper has to inform the cache manager that it already processed the input file splits for this job. These results are then reported by the cache manager to the next phase reducers. If the cache service is not utilized by the reducers then the output in the map phase can be directly shuffled to form the input for the reducers. Otherwise, a more complex process is performed to get the required cache ite ms. If the proposed operations are different from the cache items in the manager’s records, there are situations where the origin of the cache item is the same as the requested file, and the operations of the cache item are a strict subset of the proposed operations. On applying some additional operations on the subset item, the item is obtained. This fact is the concept of a strict super set. For example, an item count operation is a strict subset operation of an item count followed by a selection operation. This fact means that if the system have a cache item for the first operation, then the selection operation can be included, that guarantees the correctness of the operation. To perform a previous operation on this new input data is troublesome in conventional MapReduce, because MapReduce does not have the tools for readily expressing such incremental operations. Either the operation has to be performed again on the new input data, or the developers of application need to manually cache the stored intermediate data and pick them up in the incremental processing. Application developers have the ability to express their intentions and operations by using cache description and to request intermediate results through the dispatching service of the cache manager.The request is transferred to the cache manager. The request is analyzed in the cache manager. If the data is present in the cache manager means then that is transferred to the map phase. If the data is not present in the cache manager means then there is no response to the map phase. IV.Conclusion Map reduce framework generates large amount of intermediate data. But, this framework is unable to use the intermediate data. This system stores the task intermediate data in the cache manager. It uses the intermediate data in the cache manager before executing the actual computing work.It can eliminate all the duplicate tasks in incremental Map Reduce jobs. V. Future work In the current system the data are not deleted at certain time period. It decreases the efficiency of the memory. The cache manager stores the intermediate files. In future, these intermediate files can be deleted based on time period will be proposed. New datasets can be saved. So the memory management of the proposed system can be highly improved. VI. References [1] Asha, T., U. M. Shravanthi, N. Nagashree, and M. Monika. Building Machine Learning Algorithms on Hadoop for Bigdata. International Journal of Engineering and Technology 3, no. 2 (2013). [2] Begoli, Edmon, and James Horey. Design Principles for Effective Knowledge Discovery from Big Data. In Software Architecture (WICSA) and European Conference on Software Architecture (ECSA), 2012 Joint Working IEEE/IFIP Conference on, pp. 215-218. IEEE, 2012. [3] Zhang, Junbo, Jian-Syuan Wong, Tianrui Li, and Yi Pan. A comparison of parallel large-scale knowledge acquisition using rough set theory ondifferent MapReduce runtime systems. International Journal of Approximate Reasoning (2013) [4] Vaidya, Madhavi. Parallel Processing of cluster by Map Reduce. International Journal of Distributed Parallel Systems 3, no. 1 (2012). [5] Apache HBase. Available at http://hbase.apache.org [6] Verma, Abhishek, Ludmila Cherkasova, and R. Campbell. Orchestrating an Ensemble of MapReduce Jobs for Minimizing Their Makespan. (2013): 1-1. [7] L. Popa, M. Budiu, Y. Yu, and M. Isard, Dryadinc:Reusing work in large-scale computations, in Proc. ofHotCloud’09, Berkeley, CA, USA, 2009 [8] T. Karagiannis, C. Gkantsidis, D. Narayanan, and A.Rowstron, Hermes: Clustering users in large-scale e-mailservices, in Proc. of SoCC ’10, New York, NY, USA, 2010. [9] P. Scheuermann, G. Weikum, and P. Zabback, Datapartitioning and load balancing in parallel disk systems,The VLDB Journal, vol. 7, no. 1, pp. 48-66, 1998. [10] Parmeshwari P. Sabnis, Chaitali A.Laulkar , â€Å"SURVEY OF MAPREDUCE OPTIMIZATION METHODS†, ISSN (Print): 2319- 2526, Volume -3, Issue -1, 2014 [11] Puneet Singh Duggal ,Sanchita Paul ,â€Å" Big Data Analysis:Challenges and Solutions†, International Conference on Cloud, Big Data and Trust 2013, Nov 13-15, RGPV [12] D. Peng and F. Dabek, Largescale incremental processingusing distributed transactions and notifications, in Proc. ofOSDI’ 2010, Berkeley, CA, USA, 2010 [13] Shvachko, Konstantin, Hairong Kuang, Sanjay Radia, and Robert Chansler. The hadoop distributed file system. In Mass Storage Systems and Technologies (MSST), 2010 IEEE 26th Symposium on, pp. 1-10. IEEE, 2010. [14] â€Å"Spark: Cluster Computing withWorking Sets â€Å"Matei Zaharia, Mosharaf Chowdhury, Michael J. Franklin, Scott Shenker, Ion Stoica University of California, Berkeley

Wednesday, November 13, 2019

Alias Grace :: essays research papers

Introduction Margret Atwood a long time celebrated author, has most recently published Alias Grace. Atwood has taken a different approach to this novel. Although fictional this story has been based on reality. Grace Marks, the main character is indeed, on of the mid-eighteen hundreds most famous criminals. She was the celebrated villain of the Kinnear-Montgomery murders. This novel has a terrific sense of mystery but also enough interest to engage the reader into its historical drama. Plot Summary Alias Grace, begins in the main character, Grace Marks', sixteenth year of incarceration for the murder of Thomas Kinnear, her past employer. Her supposed accomplice in the murders has already been killed for the murder of Kinnear, although Marks being a woman was handed a lighter sentence of life, although originally sentenced to death also. The death of Nancy Montgomery, Kinnear's housekeeper and mistress, was disregarded as both villain had already been sentenced to death. Grace is around thirty years old, being accused of the crimes when she was only sixteen. Grace is prison where she has been mentally tortured during her rotation from prison to asylum over time. Doctors who wish to "examine" her frequently visit. She has now has a subconscious aversion to these doctors and the world which she knows. She has become accustomed to being silent and unseen. This novel begins with the interest of a young doctor in Grace, Dr. Simon Jordan. He is noted as being from a wealthy family and of good name, but is more interested in studying abroad about sanity and those enclosed in asylums rather than interest at home. He has little experience in dealing on a personal basis with the question of sanity of patients, but is intrigued by this fabulously sensationalized murderess. A group that has continuously tried for the pardon of Grace Marks has recruited him. In hopes of discovery that she has been found mentally sane and furthermore innocent on all counts of murder. Dr. Jordan's main purpose is to help recover the lost memory of the time during the murders. This memory which some to believe was conveniently forgotten helped convict her during the trial; almost as if she had admitted to the killings. During the course of his visits with Grace, Dr. Jordan encourages her to tell of her life before the murders. Grace begins her story with her family in Scotland. Grace had been left with her abusive father and the smaller children after her mother died on the passage to America. A trip taken for necessity rather that need: for her father was in a bit of financial trouble in Scotland. Grace is sent out in Canada as a servant.

Monday, November 11, 2019

To Kill a Mockingbird Analysis

Themes play an important role in the novel for it presents the main dead or the underlying meaning of the literary work. In To Kill a Mockingbird, the themes are made to surface through the shared feelings and attitudes of the main characters like Scout, Gem and Tactics Finch. The characters' thoughts and conversations, especially the ideas which are repeated in several dialogue exchanges and their actions in significant events also develop the novel's themes. The novel presents the oldest yet timeless conflict between good versus evil.This is evident in most situations and conversations which explored human morality and the innateness of oddness and evilness of people in the society. Tactics Finch represents the moral voice of the novel because he believes that people have aspects of both good and evil, but good will always prevail. He has never lost his faith on the goodness of man amidst the fact that man has also the tendency to do bad things. In the novel, he struggles to defend a black man of false accusation in a racist society but he never gives up and firmly holds on unto the idea that someday the truth and the good will overpower racism in their community.The same theme is manifested through the experiences of Scout and Gem. Tactics, their father, teaches them to believe in the goodness of all people and values and morals guide everyone in their actions but as the story progresses, both children are exposed to the reality that the world isn't really that perfect. Their innocence is stripped away from them through several incidents that made them think twice of their father's belief.Scout, in the beginning, is an innocent and good -hearted little girl who has no experience with the evils of the world but as she encounters racial discrimination in their town, she starts to get confused and questions everything around her. Gem, n the other hand, is older and in the midst Of entering puberty but the effect of the societal prejudice to a convicted black ma n is much graver compared to Scout's. Gem gets frustrated and disappointed to the harsh reality that sometimes justices will not prevail. This leaves him vulnerable and traumatized in an important facet of his life.Harper Lee manages to exhibit children's transition from innocence to maturity. She intelligently portrayed the fact that at some point in time in a significant event, children will be bound to graduate from their innocence and learn the facts about life and its imperfections. With children as the main characters in the novel, education is but obvious for a theme. In the initial chapters, the novel discusses the difference between institutionalized education and education at home. A conflict emerges as Miss Caroline scolds her for being too advance for their class.Scout gets disappointed for being punished because she is taught well in home by her father and their black servant. Miss Caroline even reminds Scout to tell her father that he shouldn't teach his child because he doesn't really know how to. He is in no position to teach for he is not a teacher. This conflict shows criticism to institutionalized education. This presents the conceitedness of teachers and the curriculum in providing education to learners. The system is too strict and traditional in their pedagogies thus resulting to ineffectiveness in developing and molding a child's intelligence and ability.Clearly, Lee expresses a lack of belief in the Institutionalized educational system. Furthermore, this makes one realize that true education is not experienced in school but outside it. Education shouldn't be limited in the four walls of the classroom; instead it should be brought out to the outside world where reality and life lessons are best learned through experience. The novel also presents moral education in question. Scout believes that she learns moral lessons best in home rather in school. Her teachers appear to be hypocritical as they teach things that are not even true in real ity.Scout notices this most obviously when learning about the Holocaust. Miss Gates explains that such oppression of one group of people could never happen in the United States however racial discrimination to black people is very evident in their town. Scout sees conflict with the lesson aught by Miss Gates when she heard her talk about black people and say : â€Å"time somebody taught them a lesson, they thought they was getting' way above themselves, an' the next thing they think they can do is marry us. This makes Scout doubt her education and rather listen to her father than to attend school. Hypocrisy is apparent in the system. The teachers breach what they teach thus emphasizing the incompetence and ineffectiveness of instruction provided by the educational institutions. This further implies that moral education and good values are not necessary best taught in school. Sometimes, it is best learned from other places like ones home. In a town of Macomb, Alabama, Lee illustrate s the complexities of social hierarchy.The well-off Finches are near the top of the pyramid, the Cunningham family are mere farmers thus Stay in the higher bottom above the white-trash Lowell family. These social statuses greatly confuse the children especially the rules that come along with them. Because of the structure, the children are prop bibbed to mingle with other families who are lesser in standing. This frustrates them most especially Scout because she ants to choose her own friends based on her definition of what makes a good person and not because of family income.The novel presents the dilemma of social inequality. The story takes place during the Great Depression thus social standing is as important as survival. People battle with society rules and structure. Lee exhibits how injustice and partiality divides a community and hinders human interaction thus contributing nothing but negativity to the people and the society as a whole. Racism, which is closely related to so cial inequality, is another focus of the novel. Harper Lee creates Macomb as a town separated by race.Harper Lee shows the bitterness that remains in the whites five decades after the end of slavery. This bitterness is best illustrated by the way that the way blacks are still oppressed, not by force but by fear and suppression. California, the Finch's servant is to be exceptionally bright, she even teaches Scout to write in script, but because she is black and a woman she cannot land a better job. The whites belittle and harass the blacks because they firmly believe that they are greater and more superior. This racial tension foreshadows Tom Robinsons case.Right in the beginning, everybody knows that Tom is innocent but because he is a black man, the prejudice jury still convicted him guilty of harassing and raping a white woman. The conclusion of the Tom Robinsons case ends with Tom being shot repeatedly while trying to escape despite his injury. Racism is considered as a social di sease. It brings out the evil nature of man as prejudice and discrimination overpowers conscience and moral code. It is through this novel that people are made to understand how nobody can ever benefit from racism.It only causes the creation of walls teen people thus hindering relationships and interactions to blossom. Lee shows the significance of human perspective in the processing of events and solving of problems. The character's outlook in life is deemed important in the development of the story and how each managed to understand the situation. In the novel, Tactics encourages Scout and Gem to be more considerate of other people and understand their situations. The children shouldn't immediately judge as it is not fair to the others.Tactics urges his children to try to step into other people's shoes to understand how they see he world: â€Å"You never really understand a person until you consider things from his point of view . Until you climb into his skin and walk around in it. † This lesson helps Scout gain insight into how other people view life and the world. Moreover, this broadens her moral education and social understanding. This theme was evident when Tactics requires Gem to go to Mrs.. Double's house to read to her as punishment for cutting all the flowers in her front yard.Gem didn't like Mrs.. Dubos and claims that she is an awful woman. Tactics tells Gem and Scout to try to understand Mrs.. Double's point of view. She is an old woman, very set her in ways, and she is entirely alone in the world. Gem and Scout agree to visit her and from that experience, they understood how she felt because they were able to see the world from her perspective. Scout applies her father's lesson when she meets Boo Raddled, a black man who kept himself hidden from the public because of the unjust and prejudice treatment.After she walks him home, Scout stands on Boob's porch and imagines many of the events of the story (Tactics shooting the mad dog the chil dren finding Boob's presents in the oak tree) as they must have looked to Boo. She then last realizes the love and protection that he has silently offered her and Gem all along. Scout's ability to assume another person's perspective sympathetically is the culmination of the novel. The final theme and probably the most significant is the mockingbird which represents the idea of innocence. Remember it's a sin to kill a mockingbird. † That was the only time I ever heard Tactics say it was a sin to do something, and I asked Miss Maude about it. â€Å"Your father's right,† she said. â€Å"Mockingbirds don't do one thing but make music for us to enjoy .. .But sing their hearts out for us. That's why it's a sin to kill a mockingbird. † When Scout and Gem receive arraigns for Christmas, Tactics tells them that although he would prefer that they practice their shooting with tin cans, if they must shoot at living things, they must never shoot at mockingbirds.Tactics explai ns that it is a sin to kill a mockingbird. Clearly, this is the title scene, but the theme continues throughout the book. Miss Maude explains why Tactics is correct – mockingbirds never do anyone any harm, and are not pests in any way. All they do is sing beautifully and live peacefully. Therefore, it is a sin to kill them. The mockingbird represents true goodness and purity. Tom Robinson is one example of a human â€Å"mockingbird†. He is accused of raping and beating Malay Lowell, but is innocent of the charges.

Saturday, November 9, 2019

communication industry essays

communication industry essays One hundred and twenty five years ago in 1876, Alexander Graham Bell, invented the telephone. With this invention the communications industry originated. The following 125 years have seen an evolution of communication equipment, lead by Bell Laboratories, now the Research and Development department of Lucent Technologies. The three segments of this industry growing at the fastest pace include optical networking, wireless, and access equipment. This paper will analyze the optical networking segment in detail. Bell Laboratories first developed fiber optics in the 1970s. The equipment transforms electronic signals into light that is pulsated by lasers through fiber-optic cables, which consist of thin glass fibers. The first full-service fiber optic telephone system was located in Chicago during the late 1970s. Today, nearly all long distance traffic is carried through fiber-optic cables. The clear growth driver of the optical segment is dense wavelength division multiplexing (DWDM) systems. These systems are projected to grow between 50% and 60% in 2001. Breaking this down even farther finds growth projections of 56% for long-haul systems used to carry long-distance traffic. In metropolitan areas, which still remain a relatively untapped market, is expected to double the long-distance growth, with an increase of 117% this year. The most popular type of optical equipment currently available is referred to as OC-192. This equipment is capable of transmitting 10 gigabits per second. This speed is significantly faster than the OC-48 systems (2.5 gigabits per second), which were used up until the middle of last year. Lucent failed to see this change occurring and consequently became hampered with outdated inventory causing their loss of market share last year. The OC-192 should account for over 40% of transport revenue by year-end, compared to 32% last year. Despite the additional capacity generated ...

Wednesday, November 6, 2019

10 Fascinating Facts About Stick Insects

10 Fascinating Facts About Stick Insects Stick insects are part of the order Phasmatodea (also known as phasmids and walking sticks) and are most often found in subtropical tropical habitats- when you can find them, that is. These amazing bugs are hard to spot because they look so much like twigs- until those twigs get up and walk away, that is. 1. Stick Insects Can Regenerate Limbs Should a bird or other predator grab hold of its leg, a stick insect  can still make an easy escape. Using a special muscle to break it off at a weak joint, the imperiled insect simply sheds the leg in a defensive strategy is known as autotomy. Juvenile stick insects regenerate the missing limb the next time they molt. In some cases, adult stick insects can even force themselves to molt in order to regain a lost leg. 2. Stick Insects Can Reproduce Without Males Stick insects are a nation of Amazonians, able to reproduce almost entirely without males, using a process known as parthenogenesis. Unmated females produce eggs that when mature, become female stick insects. When a male does manage to mate with a female, theres only a 50/50 chance that the offspring of that union will be male. A captive female stick insect can produce hundreds of all-female offspring without ever mating. In fact, there are species of stick insects for which scientists have never found any males. 3. Stick Insects Even Act Like Sticks Stick insects are so named for their effective camouflage among the woody plants where they feed. Theyre typically brown, black, or green, with thin, stick-shaped bodies that help them blend in as they perch on twigs and branches. Some stick insects exhibit lichen-like markings to make their camouflage more authentic but to make the disguise complete, stick insects imitate twigs swaying in the wind by rocking back and forth as they move. 4. Their Eggs Resemble Seeds Stick insect mothers arent the most maternal. While some stick insects females actually make an effort to hide their eggs- sticking them to leaves or bark or placing them in the soil- they typically drop eggs randomly on the forest floor, leaving the youngsters to whatever fate befalls them. Dont be so quick to judge mama stick insect, though. By spreading her eggs out, she lessens the chance of predators finding and eating all of her offspring at once. Its also helpful that the  eggs resemble seeds, so carnivorous predators are less likely to take a closer look. 5. Nymphs Eat Their Molted Skin After a nymph has molted, its vulnerable to predators until its new cuticle darkens and hardens. The castoff skin nearby is a dead giveaway to enemies so the nymph quickly consumes the shriveled exoskeleton to get rid of the evidence, simultaneously recycling the protein it took to create the discarded layer at the same time. 6. Stick Insects Arent Defenseless Stick insects arent venomous but if threatened, one will use whatever means necessary to thwart its attacker. Some will regurgitate a nasty substance to put a bad taste in a hungry predators mouth. Others reflex bleed, oozing a foul-smelling hemolymph from joints in their body. Some of the large, tropical stick insects may use their leg spines, which help them climb, to inflict some pain on an enemy. Stick insects may even direct a chemical spray, much like tear gas, at the offender. 7. Their Eggs May Attract Ants Stick insect eggs that resemble hard seeds have a special, fatty capsule called a capitulum at one end. Ants enjoy the nutritional boost provided by the capitulum and carry the stick insect eggs back to their nests for a meal. After the ants feed on the fats and nutrients, they toss the eggs onto their garbage heap, where the eggs continue to incubate, safe from predators. As the nymphs hatch, they make their way out of the ant nest. 8. Not All Stick Insects Stay Brown Some stick insects can change color, like a chameleon, depending on the background where theyre at rest. Stick insects may also wear bright colors on their wings but keep these flamboyant features tucked away. When a bird or other predator approaches, the stick insect flashes its vibrant wings, then hides them again, leaving the predator confused and unable to relocate its target. 9. Stick Insects Can Play Dead When all else fails, play dead, right? A threatened stick insect will abruptly drop from wherever its perched, fall to the ground, and stay very still. This behavior, called thanatosis, can successfully discourage predators. A bird or mouse may be unable to find the immobile insect on the ground or prefer living prey and move on. 10. Stick Insects Are the Worlds Longest In 2008, a newly discovered stick insect species from Borneo broke the record for longest insect (which had previously been held by another stick insect, Pharnacia serratipes). The Chans Megastick, Phobaeticus chani, measures an incredible 22 inches with legs extended, with a body length of 14 inches. Sources Marshall, Stephen A. Insects: Their Natural History and Diversity. Firefly Books, 2006.Gullan, P.J., and Cranston, P.S. . The Insects: An Outline of Entomology. Wiley-Blackwell, 2010.

Monday, November 4, 2019

Values and Ethics in a Global Setting in IT Essay

Values and Ethics in a Global Setting in IT - Essay Example Every individual has a set of beliefs and philosophies in mind that carry meaning and significance. Whether he or she consciously believes in those beliefs and philosophies or not, is not important. They can be in the subconscious mind, and the person does not have to think hard before reflecting them in his actions. These values are known as personal values and can include principles of punctuality, hard work, trust, and harmony. Steve Job’s belief of â€Å"Think different† has reflected in Apple’s success of coming up with innovative and creative technology that has earned them their brand recognition (Labrosse, 2010).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Personal values are relatively easier to tailor to a global setting. Most of the personal values, such as justice, trust and love, are prevalent in most of the communities around the world. What individuals need to do is find a point of intersection between the personal values and global values and build upon that. One can observe the online social communities, such as facebook and orkut, to see how they reflect personal values in a global arrangement. Individuals from all over the world use these mediums to interact with each other and socialize using harmony and trust with each other and are seen to give respect to others throughout the world.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   There are, however, differences found in personal values also.

Saturday, November 2, 2019

Schizophrenia and Recent Research Essay Example | Topics and Well Written Essays - 500 words

Schizophrenia and Recent Research - Essay Example Negative symptoms: which represent a loss or a decrease in the ability to initiate plans, speak, express emotion, or find pleasure in everyday life. These symptoms are harder to recognise as part of the disorder and can be mistaken for laziness or depression Cognitive symptoms (or cognitive deficits): which are problems with attention, certain types of memory, and the executive functions that allow us to plan and organise. Cognitive deficits can also be difficult to recognise as part of the disorder but are the most disabling in terms of leading a normal life" (NARSAD, 2006) It has been reported that "psychiatric researchers at The Zucker Hillside Hospital campus of The Feinstein Institute for Medical Research, including NARSAD-supported and affiliated scientists, have uncovered evidence of a gene that appears to influence intelligence" (NARSAD, 2006). This discovery means that the genes that are associated with the cognitive impairment caused by schizophrenic sufferers, has been mapped to the "dysbindin-1 gene (DTNBP1)" (NARSAD, 2006). Dr. Katherine Burdick will be reporting in the May 15 print issue of Human Molecular Genetics, that "a robust body of evidence suggests that cognitive abilities, particularly intelligence, are significantly influenced by genetic factors. Existing data already suggests that dysbindin may influence cognition" (Burdick, 2006). There is also evidence found by Lipska, Law, Weinberger, Kleinman, (2006) in

Thursday, October 31, 2019

Regeneration Assignment Example | Topics and Well Written Essays - 250 words - 2

Regeneration - Assignment Example To the poetic Siegfried Sassoon, regeneration was implied at the point he had indecisions whether to reject the idea of getting into war due to the horrifying aftermath it had brought or consider the noble purpose of taking part in the mission which claimed the lives of some of his friends. The thought of regeneration might come as trying to weigh which is the more rational side to take despite the previous experience of pain and the influence of poetry to his mental behavior. For Dr. W.H.R. Rivers who had worked at Craiglockhart War Hospital, regeneration could mean attempts to figure the best solution for each patient whose personal encounter was unique compared to fellow soldiers. In which case, as a treating physician, he needed to go beyond his confines and look into each situation at depth then seek which resolution would rightfully work as sensitivity of every subject under his current study still varied along a wider degree range. Billy Prior, on the other hand, may appear to have reflected the notion of regeneration through his own set of dilemmas and insecurities which the doctor could barely settle in the course of his treatment. Regeneration by means of recovering his normal memory functions would tremendously help him overcome mutism and move on especially that Billy ended up having love interest with Sarah. With the questions raised regarding the quality or level of creativity in his poetry, Wilfred Owen indicates the character type who would rather perceive regeneration as experimentation of elements in his writing as aided by Sassoon. Since he had an image of another poet he learned to look up to with the desired standards to match his skills and style, Wilfred would be found capable of adjusting beyond original potentials and acquiring diverse approach in handling his piece of work while he had Sassoon for a hero to fuel his passion. Lastly, Dr. Lewis Yealland served to portray the concept of

Tuesday, October 29, 2019

Apple Executive Summary Essay Example for Free

Apple Executive Summary Essay The iShare is an innovative product designed to offer more convenience and speed in file sharing. iShare aims to help eliminate the traditional inconveniences and complicated requirements involved when transferring files between any two Apple i-devices, to give users the joy of easy sharing, and to deliver sustainable profit to its shareholders. This business plan concerns the introduction of iShare to the Thai market. MARKET ANALYSIS We aim to be the expert in file-sharing gadgets between any electronic devices. We decided to first begin by developing a device called the iShare, which enables music sharing between the Apple iPods/iPhones before we go further and make similar products for other brands like Samsung and HTC in the future. The target market for iShare is mainly the Thai middle-to-upper-class, younger generation who owns an iPod/iPhone and have solid income to spend on this innovative gadget. Our market size is carefully calculated to be approximately 200,000,000 THB for the iShare alone and up to 1,000,000,000 THB in total. Our direct competitor is miShare LLC, which offers a similar product to customers in the US and Europe. Indirect competitors include other computer programs that enable easy file transfer between e-devices as well. PRODUCT AND TECHNOLOGY The iShare is a small device that connects 2 iPods or iPhones together, and let users easily transfer files from one device to another without any computer required. We aim to provide our customers the never-before convenience, speed, and the fun of directly transferring files between their device and their friends’. The iShare will also overcome the technical problems and satisfy the customer needs that has not been met previously by our main competitor, miShare LLC. We will develop the software ourselves and outsource the production to China. After we succeed with the iShare, similar products capable with HTC Android and Samsung Galaxy will be introduced to the market. MARKETING AND SALES STRATEGY The iShare will be launched in the middle of the year 2012. They will be sold directly to first tier distributors who will then pass them on to other retailers. The iShare can be purchased from any iStudio and authorized retail stores. Customers can also find an online user manual, a demonstration video, and many more useful information on the iShare website. The iShare will be advertised through various distribution channels such as social networking websites, printed advertising, and viral marketing. MANAGEMENT TEAM Our team is composed of many talented members with different expertise and great connections. We have a technology expert with a background in consumer electronics, a talented software programmer and developer, an experienced and amazingly creative designer who specializes in hi-tech gadget designs, and a very devoting marketing manager with 5 years of experience in marketing consumer electronics. In addition, we also have a close relationship with a huge manufacturing company in China, which will be our supplier and manufacturer for the iShare. The company has confidently claimed that it is capable of producing our product at our desired cost, given our carefully developed software program and product specifications. FINANCIAL HIGHLIGHTS Market and Competition Analysis Market Opportunity There are many ideas and theories concerning the relationship between the choice of media and personality types nowadays. One of the most popular and widely accepted ideas is the one stating that a person’s music taste reveals personality type: classical music fans are most likely to be shy, while British-pop fans are mostly young, indie hipsters. As we all know, everybody in this world is unique, or at least they want to be perceived that way: as being unique, different, and have their own tastes and preferences for basically everything. Most people are likely to be confident in their own tastes. People with the same taste in music usually gets along well, providing that they believe they have some common values, backgrounds, and personalities that enable them to understand each other better. Music has always been one of the most popular communication tools that bring people closer together. Many people love to share with their friends their favorite album, current favorite songs, or the artists they admire. Nowadays in the world that has become much more digitalized, almost every music and songs offered are in the digital format, to be played and listened to on a digital music player. Sales of music CDs and cassette tapes has been constantly decreasing, while on the other hand the sales of online music, in the iTunes store, for example, has rocketed worldwide. Digital music players have become so popular, and the use of them is widely adopted globally. Cassette tapes and CD players, on the other hand, are going into extinction. One of the general customer needs that have not been fully met in the digital market nowadays is the ability to share their digital files with friends and families easily and without a computer. Whether it is a HTC android, a Samsung Galaxy Player, or an Apple iPod touch, it requires at least a cable and a computer to support file transfer and sh aring. For some particular brands like Apple, transferring files between two iPods or iPhones is still not easy, even with a computer involved. Unlike many other music player producers, the complicated Apple software does not allow users to simply copy and paste files from the portable device to the computer, but requires that users have the corresponding program, the iTunes, that supports the uploading and syncing of files from a computer to their device, and vice versa. Our group sees this unsatisfied customer need as a great market opportunity. We are determined to become the expert in file sharing between electronic devices, especially focusing on music sharing. Eventually we will become the business that provides the market with a device that will make file sharing much more easier for users of almost every digital music player brand, but we have decided to first begin with Apple. From various researches, surveys, and discussions with digital experts, we came to the conclusion that easy music sharing between the Apple i-devices is the highest in demand, due to the brand’s complicated traditional requirements involved in file transferring, and to the massive number of existing Apple users in the market. We have decided to develop first a device that enables music sharing between the Apple iPod/iPhone before we go further and make similar products for other brands like Samsung and HTC in the future. These devices to follow the iShare will work with Samsung Galaxy and HTC Androids, and can be expected to be developed, produced, and offered to the market relatively quickly. This expectation is due to the existing capability, experiences gained, and the competences achieved during the development, sales, and marketing of our first product, the iShare. Our group’s product, the iShare, is a small device that connects 2 Apple iPods or iPhones together, and let users easily transfer files from one device to another. Ordinarily, people would need a computer to transfer files, but the iShare helps eliminate this inconvenient requirement. We aim to provide our customers the never-before convenience, speed, and the fun of directly transferring files between their device and their friends’. Market Size Generally, our target market is the Thai people who own at least one digital music player and have the passion and anxiety about innovative gadgets and file sharing made-easy on their electronic devices. They are likely to be middle-to-upper-class, young to middle aged people with solid income to spend on gadgets and electronic devices’ accessories. They are likely to be interested in new technology and keep themselves updated with new innovation and hi-tech products. We also target on people whose career revolves around the digital music industry, in which it will be very helpful for them to have a device that makes file sharing and transferring convenient and fast. The overall market size is carefully estimated to be approximately 3,000,000 people. However, due to the fact that this business plan will mainly focus only on the iShare, a sharing device specifically designed for the Apple iPod and iPhone, the potential number of market size is reduced to 1,000,000 people as of now. This number is believed to be constantly rising due to the increasing popularity of Apple products. The market size for iShare can be predicted by the number of existing iPod/iPhone users in Thailand. From our careful calculation, together with some reliable sources, out of all the population in Thailand, the number of people who owns at least 1 iPod or iPhone is around 1 million people. Assuming realistically that we can sell the iShare to about 10% of this total, our market size can be estimated at roughly 100,000 people in total. Given that our wholesale price for a single iShare is 2,000 THB, our market size for the iShare alone can be estimated to be around 200,000,000 THB. However, this number does not include other potential markets, the markets for other brands’ users that we will enter in the future. If we take those markets into account, the total market size for our business can be as high as 1,000,000,000 THB. Our Section of the Market Figure 1 : Age groups of Apple i-devices users in Thailand In Thailand, the major group of Apple customers, which accounts for 32% of all users, is between the ages of 22-35. This group also made up a majority of the early adopters of Apple products. Other groups of users, which also contribute a lot to the total number of users, are users with the age of 18-21 and 36-50, which together accounts for 52% of all users. ( See illustration in Figure 1 ) Figure 2 : Percentage share of Apple users among e-mobile users per country According to Figure 2, in Thailand, the percentage share of Apple users among all other e-mobile users in Thailand is 79.6% of the whole market. This makes the market of complementary products to be used with the electronic devices very large; therefore, we can attract a lot of potential customers by introducing iShare, the new, innovative complementary product to the Apple iPhone/iPod. We conducted a survey at MBK mall, one of the most popular malls in Bangkok for mobiles and electronic devices shopping. We gave out a questionnaire about the iShare to 100 people who were wandering around the mobile phone section. More than 90% said that they are very interested in this product and more than 70% of the interested people have responded they are willing to pay up to 3000 THB for the iShare, while another 30% thinks that it would be too expensive and they would not buy it at this price. Market Segmentation Our market for iPod/iPhone users can be segmented further using age groups. By looking at different age groups of users, we can determine the segment that is most likely to be our potential customers and thus market our product and create strategies accordingly. Different segments for our market are as follow: 1. Apple devices users with the age of lower than 18 ( Students ) 2. Apple devices users between 18-21 years old ( College students ) 3. Apple devices users between 22-35 year old ( Junior working class ) 4. Apple devices users between 36-50 years old ( Senior working class ) 5. Apple devices users with the age of more than 50 years old ( Senior citizens ) ( Refer to Figure 1 for illustration ) We are targeting a specific market and plan on overtaking it with quality – what we try to achieve is to be a selection of choice that will offer a never-before convenient and fun product that enables people to share more with each other. We aimed at existing users of iPod/iPhone who desire the ability to save the time and effort required to transfer files between their devices. Basically our market is largely based on a millennium age people that give a huge importance in the ease of use and the amount of time that can be saved by using our product. After looking at some statistics and researches previously done by many interested parties, we came to the conclusion that the most interesting segments for our product are the iPhone/iPod owners with the age of between 18-35, or segment 2 and 3 from our classification. These two segments make up more than 60% of all Apple i-devices users in Thailand. Market Growth Since the market for electronic devices, including smart phones, MP3 players and tablet PC, is growing worldwide, the complementary products market is most likely to be growing along with them in the same direction. We first focused on Apple products because of its undeniable continuous rise in popularity and demand. Not only Apple, there are a lot of other companies such as Samsung, HTC and Sony who are also in the electronic device market, and in the near future there is likely to be more and more brands that will enter into this market. Although this will also attract many other competitors, we can gain the brand loyalty easier as a first mover of a product of this kind in Thailand. Therefore, after we succeed with the iShare for Apple products, we will modify the iShare and make it compatible for use with other brand users in order to generate more revenues for our business from the new market segment. We will develop a similar device to the iShare that will work with a Samsung Galaxy Tab, a HTC android, and possibly other competing brands in the future. We see a lot of opportunity for growth in this industry, and we will continue to maintain our image as being the expert in music sharing with our restless innovation. Market Competition Looking only at the iShare, our direct competitor would be the one company that actually gave us the idea of this device at the very beginning of our project: miShare LLC. MiShare LLC is a software and hardware developer company in New York City, specializing in publishing tools for iPods and other digital media and offering publishing systems for schools, museums, music and movie companies, and marketers who want to distribute audio and video directly to iPods and other digital-media players for immediate playback. MiShare LLC is the inventor and legal producer and distributor of the miShare, a small device that enables users to transfer music, pictures, or videos from one iPod to another without the use of a computer. In the past, there had been similar devices that claimed to have the same ability, but most of them failed and none has ever been as successful as miShare. Nathaniel Wice, the CEO and cofounder of miShare LLC, is the technology entrepreneur and marketer with a journalism background. He adds startup experience and contacts to the miShare and looks forward for collaboration with other startups on business and funding opportunities. His other co-partner name is Josh Hochman, a busy writing software programmer. Hochman is the top programmer with the background in consumer electronics. The company’s main players in the office consist of Nathaniel Wice, Josh Hochman, and a young woman doing shipping-and-receiving department working on the hand-stamping envelopes. Our group’s idea of the iShare originates from the fact that such successful and widely accepted device like a miShare is not yet made available to the Thai and other Asian market. MiShare targets only the iPod users in the United States and Europe. Currently they do not have the policy to ship their product to any Asian country. Thus, we take this opportunity to follow their footsteps and bring to the Thai market this interesting product. We aim to outperform miShare by overcoming their product’s major weakness, which is the current version of miShares software that does not work with the distinctive disk format of iPhone and iPod touch. Their products only works with a limited range of iPod models such as the iPod shuffle, and iPod touch are still unsupported by miShare. This is the technical problem that we aim to overcome in order to provide an even more superior file-sharing device that also works with iPod and iPhone, the iShare, in order to satisfy our customers need and be successful in our business. Other indirect competitors include other iPod/iPhone applications that also enable users to transfer files from one Apple device to another easier than traditionally required. These include applications like Bluetooth Share and Files Lite. Bluetooth share is an application that allows users to share files, photos and contacts. It was first launched to App store in early 2010. However, its major weakness is the fact that its sharing process takes much longer time than the iShare. A regular 3 minutes song would take 5 minutes to transfer from one device to the other. Another indirect competitor, Files Lite, is an application that gives users the ability to synchronize documents directly to their devices. They can store and share files via email and PC easily. The files can be opened directly on the devices. Files Lite supports Microsoft documents, PDF, HTML, images, videos, audios, Apple iWork and text documents. With the most recent update in January 2012, this application allows users to transfer their files easier and quicker. However, a Wi-fi connection is required to connect Files Lite to transfer files and documents. The transfer time is slightly faster than Bluetooth share, but still is much slower compared to iShare. Despite the fact that these applications have also made it easier for its users to transfer music and files between 2 iPods or iPhones, there are still some disadvantages that still make the iShare a superior choice over them. The fact that these applications are much slower and that some require internet connection in order to transfer files are some of those disadvantages. Looking at the situation from every angle, the iShare still holds the superior advantage of being the fastest, most convenient choice ever for file sharing. Product and Technology Product Technologies From our design development and our effective and innovative production process, the iShare will provide the convenience and speed in file transferring between Apple i-Devices like never before. Our RD Team has developed this new gadget to make file sharing between iPods and iPhones much easier. No computer or cable is needed, and its very easy to use. Users can use the iShare to transfer just about anything they have on their iPods or iPhones: music, photos, videos, and playlists. A typical song will take ten seconds to transfer once the devices are attached, depending on the file sizes. A short home video in iPod format could require half a minute.