Wednesday, October 30, 2019

Proposal for Lighting Festival Case Study Example | Topics and Well Written Essays - 2500 words

Proposal for Lighting Festival - Case Study Example You may handover the product and get a replacement free of cost from the store where you have made the purchase. If you are not in a position to revisit the store, kindly arrange to send an email to the undersigned who will take immediate action to collect the product from you replacing it with a new one at our cost. Even though we are sure that what has been reported might be a stray incident, we simply do not want to undertake any risks on the health of the infants, as we value the interests of our customers more than our economic values. We deeply regret the inconvenience caused to you in this respect. It is with deep concern that the management brings to your notice that there has been a serious customer complaint on the product 'infant car seat'. The customer has complained that she has found fragments of glass in the upholstery of the seat which is a serious issue as it may cause dangerous bodily harm to the infant being carried in the seat. Such complaints not only bring monetary loss to the company due to lower sales on account of bad reputation and law suits for huge monetary compensation but also tarnish the image of the company built in the market over the last six years. The management wishes the employees to understand the seriousness of the issue and take all the extra precaution necessary to avoid such mistakes in the future. If any worker is found to be directly or indirectly responsible for the occurrence of such incidents or for non-detection of such complaints he/she will be reprimanded and punished as this is considered as a serious issue that may affect the future business of the company and your future also in the process. We advise each one of the employees in the manufacturing department to be more vigilant in adopting the safety procedures which are already in place for checking the product thoroughly in the assembly for any alien materials. Perhaps some of the employees do not understand the procedure due to language problems. The management though it to better to train all the employees to be proficient in English language so that the safety procedures can be followed effectively. Arrangements are under way for imparting the necessary training. Further safety procedures to be more effective in this direction are being instituted for follow up by workers. The management once again reiterates the seriousness of the issue and warns all the employees to be more cautious and vigilant. Email Dear Mr. Dolan Further to your note on the issue of the customer complaint on the product 'infant car seat' I have made a thorough investigation in to the issue. I have made sure that nothing has gone wrong in our manufacturing location. There is a possibility that this thing might have happened in the store or at the customer's home. But I did not want to do a post mortem of

Monday, October 28, 2019

The Existence Of Computerized Databases Essay Example for Free

The Existence Of Computerized Databases Essay When should patient be advised of the existence of computerized databases containing medical information about the patient? On AMA the patient and physician should be advised about the existence of computerized data both before and information is store http://patient.ezinemark.com/data-collection-in-a-computer-7d2eae229a7f.html website below Data collection in a computer Computerized database collection is commonly known as collection of large amount of data in a computer. The information collected can be organized to enable expansion, updating and retrieving for different uses. The collection of this information is organized in such a way that it can be retrieved in pieces form the organized automated system. In the medical field, the information collected concerning patients, process of treatment and other medical activities that are happening in a given medical facility. 1. Should corrections be dated and time-stamped? Collections are any amendments done on any filed record. In any medical activity, the alteration of any filed procedure may cause severe consequences, therefore, any collection made should be dated and time stamped. This will help in understanding the procedure that was initially followed and the preferred procedure which in turn will even show the time and the date the amendments were done. The dating and stamping time is therefore required incase of any collections. 2. When should the patient be advised of the existence of computerized databases containing medical information about the patient? The patient should be informed of the existence of a computerized database containing their information as soon as possible.his will help the patient in making decision as to whether his information should be disclosed or should remain anonymous. Informing the patient of existence of computerized database will help in safe guarding the patient’s right to privacy and confidentiality. Informing the patients about the existence of the system will avoid any conflict of interest between the patients and the medical practitioners in future. 3. When should the patient be notified of purging of archaic or inaccurate information? Purging[-0] is referred to as clearing of any unwanted information. When such information is noticed in the database, the patient and the medical practitioners should be notified before any action is taken. After their notification, the information should be replaced with accurate information and again they should be notified of the action taken. This will helps in safe guard the right of information in regard to their medical process. 4. When should the computerized medical database be online to the computer terminal? Online information is the information that can accessed through internet regardless of location and the necessity of information to the reader. The patient’s information should only be available online with the consent of the patient and full information has been fully credited by the patient and the concerned physicians. The information should be clear and should not violate any right. This will help in conveying any intended information to any interested party. (Jaeho Barley 2003) 5. When the computer service bureau destroys or erases records, should the erasure be verified by the bureau to the physician? Should the computer service bureau erase any stored record, the information deleted should be verified by the bureau to the physician. The patient and the physician have the right to know any little alteration on any record. This will help in knowing what information has been erased and what significance it has as far as patient’s medical process is concerned. Verification of the erased data will help in fixing or replacing the data with appropriate information. 6. Should individuals and organizations with access to the databases be identified to the patient? The patient has all the rights to know who have an access to his/her information and why. This will for the respect of the patient’s right to privacy and confidentiality. The patient has the right to restrict or allow his/her information disclosed to the third party or a court order may all ow or restrict if the patient is not in a position to act. The respect of personal information should be practiced and thus only the involved party has the authority over the information. 7. Does the AMA ethics opinion mention encryption as a technique for security? The computerized data systems have a compromising information security. The AMA opinion is that â€Å"there should be controlled access to the computerized database via security procedures such as encoding, passwords, and other user identification including scan able badges†. Confidentiality agreements should be made with other health-care professionals whom the office networks with. Encryption is recommended if the network entails public channels of communication such as radio waves, telephone wires, and microwaves. This will increase the chances of information confidentiality. (Jerome, 2001), 8. What does the ethics opinion say about disclosure by recipients of authorized data to third parties? According to the ethics opinion, disclosure of confidential medical information from the data base should be limited to the particular purpose for which the information is demanded. Nevertheless, authorized release of medical information to them does not warrant their further disclosure of the data to other individuals or organizations, or consequent use of the data for other reasons. Any person or organization found guilt of this offence; it may be obscured from accessing any further information and could be charged in court for violation of patient’s right to privacy. Reference: Jaeho, L. Barley, M. (2003),Intelligent Agents and Multi-agent Systems: 6th Pacific Rim International Workshop on Multi-Agents, PRIMA, Seoul, Korea, Jerome, C. (2001), Electronic Medical Records: A Guide for Clinicians and Administrators. American College of PhysiciansAmerican Society of Internal Medicine. ACP Press, [-0] http://ezinemark.com/goto.php?url=http://www.uktopessays.com

Saturday, October 26, 2019

America the Racist Tyrant Essay -- essays research papers

America the Racist Tyrant In "The Declaration of Independence," Thomas Jefferson shows the King of Great Britain acting as a tyrant to the colonies, and Jefferson declared America to be free from Britain. In the "Letter from Birmingham Jail," Martin Luther King Jr. writes to a clergyman logically analyzing criticisms while communicating to the public his arguments. Jefferson fought for freedom and right for America. King also fought for better civil rights for his black people. They both fought for their people, King however fought peacefully with white people, who in return were cruel. This comparing Jefferson's and King's fought for freedom, different skin color demonstrates racism causing unfairness to this day still exists because the fight for justice and rights still exist which calls for a social contract. Every single human being has a right to life, civil rights, and freedom. This is a right that Americans base their government on. Jefferson states that "all men are created equal" and man should naturally stand for every single person, no matter what color or sex they are. (53) Equality in all men however is untrue. Different race, religion or gender often causes conflicts between people. Conflicts results in discrimination against groups. This can be shown through King's fight for black's civil rights. Americans already have freedom and rights, however, the black people are still being looked down. For King and his people, they were treated without respect. The black people "have waited for more than 340 years for our constitutional and God-given rights."(217) The black people have waited silently while everyone else received their God-given rights. They are rights that everyone should possess; however, the black Americans did not because of their color. People are often judged according to the color of their skin. This judging of another person is often negative and is known as racism. America is known as the melting pot with all kinds of race living there. It is clear that no matter how big a melting pot, it can not contain all race mixed together. As a black man, King witnessed and experienced racism during the segregation period. People were "haunted by day and haunted by night by the fact that you are a Negro" shows that black people were being discriminated.(218) This judging and disrespe... ...or poor, strong or weak in rights to have freedom and justice. Just as Jefferson "has been the patient sufferance of these Colonies; and such is now the necessity which constrains them to alter their former systems of Government" (54). The colonies have also found equality between them and Britain by becoming an independent government. As King puts it "oppressed people cannot remain oppressed forever" (222) people are forever fighting and yearning for freedom from justice. In conclusion, Jefferson demonstrates that by declaring independence, thirteen colonies have given themselves their rightful freedom. However, these freedoms were given mainly to the white. The black, like King, fights nonviolently hard to change the society and government slowly to receive the same justice and freedoms as the whites. When comparing the people in Jefferson's time and the people in King's time, it is surprising to see that they are both fighting for similar rights on the same grounds, yet King is fighting for it later when America already have the rights. This concludes that racism indeed plays an important role in our past and present as we try to be free from other judges.

Thursday, October 24, 2019

The Yanoman :: essays research papers

The Yanoman This ethnography is about the Yanomam. Most people will think of these people as 'primitive'. But we do not consider the fact that these people look at us and call us 'primitive' and 'subhuman'. This is why it is important to judge these people with an unbiased mind. The Yanomam are Indians that live widely scattered in southern Venezuela and northern Brazil. They usually live in villages of 75 to 80 people. But there are villages in which there are as little as 40 people or as many as 250 people in a single village. The Yanomam live by a combination of horticulture and foraging. Each household in the village clears their own land and cultivates it themselves. Chiefs, who have to produce more food to meet their obligation to provide hospitality, commonly receives help from others. A village can produce all of its needs from only three hours worth of work per person. One characteristic of the Yanomam is that they are accustomed to violence. Violence is a part of their lives because of their values and culture. Because of this, the Yanomam live in a constant state of warfare. Warfare appears as a main interest supported by a set of beliefs urging strong villages to take advantage of the weaker ones. A regular series of degrees of violence has been institutionalized. It ranges from chest pounding to side slapping. Both are likely to cause injury or death. The Yanomam do not utilize much technology except in their weapons. The main weapon produced by the Yanomam are arrows. They make arrows that are six feet long. These arrows are very accurate. Arrows not only serve as weapons but as valuable possessions that are commonly exchanged as gifts among the Yanomam.   Ã‚  Ã‚  Ã‚  Ã‚  Villages that are nearby may sometimes ally. One reason in which the ally is so that they can team up against another larger village. In order to demonstrate their friendship towards each other, the two villages trade and feast.   Ã‚  Ã‚  Ã‚  Ã‚  The men drug themselves on a daily basis with a substance called 'ebene'. It causes for the eyes to become watery. Another effect of this drug is and excessive production of mucous. The recipient allows for the mucous to drip freely from each nostril. It is believed among these people that the usage of this drug will have an effect in which bad spirits are relieved of.   Ã‚  Ã‚  Ã‚  Ã‚  The dead are highly respected in this culture. Once a person dies, it is forbidden to mention the name of the person ever again. It is considered an offense to mention the name of a family member that has passed away.

Wednesday, October 23, 2019

Violence in Television Creates Aggression in Children

We all love action packed, horrifying, fighting type of movies like Drive, The Dark Knight, Kindergarten Cop, Star Wars or Who Framed Roger Rabbit. These movies don’t seem very harmful to us and may seem more funny then violent, but how children perceive these films is very different from how an adult may perceive it. How do children view these movies? And how do they absorb the information in front of them?. Violence in the media creates aggression in everyone but it has a major impact on children. Parenting and environmental factors also have in effect.Society and media has made us believe that violence is acceptable in films but when it happens in real life, many don’t seem accepting. People don’t seem to realize in order to suppress violence in life you have to begin with not displaying violence as if it was socially acceptable. Many factors play into childhood aggression; family, environment or mass media. Many parents sit their children in front of a televi sion for hours just to keep them occupied, but they are not aware of the damage they are doing to their kids.Movies like Who Framed Roger Rabbit may seem like a harmless movie to us but it portrays violence with guns, arguing and even distorted information of how to handle stressful situations. Movies or cartoons like this, show children you have to resort to violence to resolve certain situations. Other cartoons like Bugs Bunny, who cross dress and flirt to bring his hunter into a trap, are highly inappropriate. Young children are very manipulative and tend to reenact or repeat things they see or hear.It may be adorable when your kid is kicking and fighting around like Batman but in their mind they see fighting and aggression as a resolution. As they get older aggression and violence seems like a normal part of life and acceptable. They become desensitized with the more violence they are exposed to and usually want to watch something with more action and violence, hence become more and more absorbed in to aggression. (Huesmann & Miller,1994;) This aggression seems to stand out more on which family class they stand in.Children in lower class families tend to watch more TV, and have lower IQ’s because they are not interacting with others, reading, or using any kind of thought process. Many factors play into why children of lower class families watch more television (Huesmann, 1998). In these days many families find themselves working and not spending as much time at home, leaving the child to watch a lot of television, and if they are not around, there’s no assuring what the child is watching. Lower class families tend to be more stressed and that sometimes reflects on the children; creating anxiety and aggression (Tremblay,2000).Not having money to enjoy other activities, also causes more children to be inactive, and living in dangerous neighborhoods cause them to stay inside more. Television is America’s favorite pass time and people beli eve watching television is a good way to pass time or bond with each other but it does the opposite. There is no interaction with family members or peers and most adults don’t want to sit around watching kid shows, so children watch what their parents want to watch and usually it is inappropriate.Telling your child to cover their eyes or ears during a scene really doesn’t improve much. Some families neglect their children, give them harsh punishments or sometimes don’t discipline them at all and that also plays a role. Many studies have shown, the more a child is exposed to violence, the more often a child will respond with aggression or violence (Andison, F. S. 1977). Andison from the American Psychological Association, also discovered continue exposure to violence can lead to antisocialism, violence, drugs and criminality.Aggressive children prefer violence on television, prefer violent character and see it as part of life more than less aggressive children. S ome children won’t show signs of aggression until they are older. Consistently watching violent or inappropriate programs can affect anybody at any age or gender. Extensive researched from the American Psychological Association, also revealed aggressive behavior is more in males who tend to watch more television ( Huesmann, L. R. , Eron, L. D. , Berkowitz, L. , & Chaffee, S. (1991). Males are also raised more aggressively.Many parents believe they have to be hard on boys to make them tougher, but in actuality that can damage a child or create anger or hatred. Many children who grow up with constant aggression or violence usually don’t turn out to be the American dream person. Creators seem to forget their audience is young children and they side track to create more ratings instead of keeping it appropriate for children of a certain age. Not every person would agree violent television or inappropriate programs are the causes of aggression in children.Taking into consid eration how the child was raised, and the environment they grow up in, can have a large effect on many children. Not all television is bad, but the problem these days is that parents don’t monitor what their children watch. There are many reasons television can be a good thing for a child. If parents gave healthy viewing habits, less viewing time and watched what was on the screen for their kids, television can be very educational. Learning shows like blues clues give children thinking practice by causing them to solve riddles and find clues.Channels like the discovery channel can help children discover about the world around them and in turn learning and using thought. Television has been a revolutionary change for the last few generations. It has changed our way of life for the better and for the worse. I personally believe that before television families were closer, and violence wasn’t as popular on shows, and people were healthier, because there were more activiti es to enjoy, then just sitting at home doing nothing. These days the violence and uneducated shows on television has sadly affected even our younger viewer.Children don’t need to know about depression, hell or anger like the cartoon, Billy and Mandy display. Cartoons like this show children, it’s acceptable to be furious and angry and act aggressively to your siblings. If parents really began to care about their children, they would monitor and lower their television time. No child should have to sit 5 hours or longer in front of a television with no supervision, when they could be interacting and learning with family and peers. Violence in television also has to be decreased in adult watching as well. It has become such a large part in our society.Children shouldn’t have to grow up thinking fighting, cursing, and aggressive behavior towards others is acceptable, and it’s up to the parents to make a change. Sources * Longitudinal Relations Between Childre n’s Exposure to TV Violence and Their Aggressive and Violent Behavior in Young Adulthood: 1977–1992 Psychology Copyright 2003 by the American Psychological Association, Inc. 2003, Vol. 39, No. 2, 201–221 * Kidshealth. rg; How TV effects your child by   Steven Dowshen, MD http://kidshealth. org/parent/positive/family/tv_affects_child. html * Is Television Advertising Good for Children? Areas of Concern and Policy Implications Vol 20 No 1 (2001) http://www. sfu. ca/media-lab/archive/2007/426/Resources/Readings/readings%20kidcult/canadianadpolicy. pdf * Desensitization of children to television violence. Cline, Victor B. ;Croft, Roger G. ;Courrier, Steven Journal of Personality and Social Psychology, Vol 27(3), Sep 1973, 360-365

Tuesday, October 22, 2019

Alzheimers essays

Alzheimer's essays Alzheimers disease is a complex disease that affects the brain. Approximately 4.5 million Americans have this disease (Alzheimers Disease, 2004, 1). Alzheimers disease is a disorder that causes the gradual loss of brain cells. The disease was first described in 1906 by German physician Dr. Alois Alzheimer (Alzheimers Disease, 2004, p.2). The disease was once considered rare. However, Research has shown that it is the leading cause of dementia (Alzheimers Disease, 2004, p.2). Although many things about Alzheimers remain unknown, research continues to bring a better understanding of the disease, more accurate diagnoses, and more effective treatments. Dementia is a general term for several symptoms related to a decline in thinking skills. Common symptoms include a gradual loss of memory, trouble with reasoning or judgment, disorientation, difficulty in learning, loss of language skills, and weakening in the ability to perform routine tasks. People with dementia also experience changes in their personalities and behavior problems, such as agitation, anxiety, delusions, and hallucinations. Alzheimers disease advances at broadly different rates. According to Alzheimers Association (2004, p.2), The duration of the illness may often vary from 3 to 20 years. The areas of the brain that control memory and thinking skills are affected first, but as the disease progresses, cells die in other regions of the brain. The person with Alzheimers will need complete care. At 92, former President Reagan is in the last stages of Alzheimers, which he has suffered for nearly a decade. As said by Heyman, et al. (2003, p.121), If the individual has no other serious illness, the loss of brain function itself will cause death. The once-robust leader of the free world can no longer speak, feed himsel ...

Monday, October 21, 2019

Assess The Plan Framework To Solve Makeshift Marketing

Assess The Plan Framework To Solve Makeshift Marketing It’s good enough. Usually, â€Å"good enough† isn’t enough to solve problems for employees and customers.   Today’s guest is Brianne Hoffman, senior marketing and communications manager at Wanzek Construction. She offers advice on how to avoid makeshift marketing to improve productivity.   Some of the highlights of the show include:   Internal and External Marketing and Communications: Create strategies that grab and engage target audience   Wanzek Construction: Builds and maintains industrial wind turbines, solar farms Plan Persona and Associate with Audience: Long-term projects decrease need for brand new business and customers #1 Priority: Safety is cornerstone of Wanzek Construction’s people and property Core Values and Work Culture: Big, happy family 7 Internal Beliefs: Protect, Trust, Talent, Information, Integrity, Communication, and Profit Fist Bump App: Callouts to coworkers for a job well done   Content Pillars: Document marketing and communication goals and game plan   Plan in advance to help anticipate and alleviate fire drills and pop-up projects Weekly Summary: Reinforce and reflect on list of accomplishments Pressure to do more, with less: Identify inefficiencies to shift responsibilities, and find tools that get things done faster   Wanzek Way: Be the best and deliver excellence Back to the Drawing Board: What do you think we should do?   Marketing and Communication Metrics: Track popular posts, recruitment campaigns, followers, and more Links:   Brianne Hoffman on LinkedIn Wanzek Construction Xcel Energy ENGIE The Marketing Management + Strategy Statistics You Need to Know in 2019 New Marketing Suite Who do you want on the podcast? What do you want to talk about? Send suggestions for guests and topics. If you liked today’s show, please subscribe on iTunes to The Actionable Content Marketing Podcast! The podcast is also available on SoundCloud, Stitcher, and Google Play. Quotes by Brianne Hoffman: â€Å"When we are marketing ourselves to the outside worldwe’re maintaining our brand.† â€Å"We’re always looking to get them home safely every day.† â€Å"Feel of Family: The culture is important here, just as much as our product and what we produce.† â€Å"More resources doesn’t always equal more productivity. Additional headcount isn’t always the answer.†

Sunday, October 20, 2019

What Electronic Data Interchange Essays

What Electronic Data Interchange Essays What Electronic Data Interchange Essay What Electronic Data Interchange Essay I will expand on what Electronic Data Interchange (EDI) is (conventional and internet based) and share with you some of the benefits and downfalls of operating such a system. Some of the benefits are lower costs, improved accuracy, and decreased paper output and processing time. One main downfall is the initial cost of the implementation of the system. I will also give you an example of how a company uses this technology. Electronic Data Interchange (EDI) as defined by Roger Clarke: the exchange of documents in standardized electronic form, between organizations, in an automated manner, directly from a computer application in one organization to an application in another. EDI has been around for several decades and it has been the primary method of conducting electronic business-to-business commerce. It contains the same information that would be found on paper documents used for the same function within an organization. The following are elements of EDI: * Electronic transmission medium (VAN or the Internet) is used rather than the dispatch of physical storage media such as magnetic tapes and disks. * Structured, formatted messages based on agreed standards (messages can be translated, interpreted and checked). * Fast delivery of electronic documents within hours or minutes from sender to receiver. * Communication directly between applications rather than between computers. Conventional EDI Conventional EDI uses standard formats, American National Standards Institutes (ANSIs) X12 series, which specifies standard fields for invoices, purchase orders, shipping documents, payments and various other data transactions. The EDI software pulls flat files (where links to other data have been removed) from the mainframe systems such as financial and/or order-processing and translates the data into EDI standard forms. Then companies transmit large batches of EDI forms over a third-party value-added network (VAN). VANs make the job of connecting with other trading partners, organizations that receive or send documents from each other, easier by collecting forms in an electronic mailbox. It then sorts, translates and forwards them to recipients and guarantees that they reach their destinations intact. Benefits of conventional EDI are large companies can reduce the amount of errors in relation to re-keying information and decreasing the time and clerical costs of processing paper forms by hand. EDI standards and technologies are dependable, trusted and proven. Information is sent on private lines that have very little exposure to the public and in turn are relatively secure. Also, large volumes of data are moved efficiently through batch transfer of flat files, and established VANs help ease finding trading partners and connecting to their systems. Downfalls of conventional EDI are companies have to link their back-office systems to the EDI software, and then it has to synchronize protocols with their trading partners systems. Compatibility with new applications is difficult because of the complexity of the X12 formats. As a result of the compatibility the process of transferring large batches of data are delayed, which is at odds with todays real-time world. Also, the cost of transmitting data through VANs is very costly at $25 per 1,000 characters, but today costs are getting lower. Because conventional EDI is so rigid, costly and time consuming to initiate, it is only cost-effective for very large companies. For these reasons it keeps the number of EDI participants relatively very low. EDI via the Internet The internet was once thought to be the end of EDI, but instead it has given EDI users new options. EDI via the internet is basically the same as conventional EDI with the exception of how the information is transmitted. EDI transactions can now be sent over the internet instead of sending X12 forms back and forth via VANs. Software products put transactions into encrypted envelopes and then electronically seal them so that only authorized parties with the encryption key can view the contents. The envelopes are then sent over the public internet instead of privately owned VANs. Benefits of sending the transactions over the internet instead of via VANs are it can drastically reduce transmission costs and it is much faster. Also, most companies already have internet access and therefore would not have to pay additional costs to transmit batches over the internet. This would make it easier to attract new trading partners, like mom and pop stores, that have internet connections, but do not have the revenue to invest in VANs. Downfalls of EDI via the internet are questions raised about security, like confidentiality, data integrity, authentication, and denial of having sent or received transactions. Security is only a concern for some not all EDI managers. Another downfall is that the required software must be the same for trading partners at both ends. They must install the same software and coordinate their upgrade cycles. Efforts are being made to make systems compatible and create requirements for EDI over the internet standards, but this takes time and therefore companies are limited to firm EDI formats. Example of EDI Large companies like Wal-Mart Stores Inc. have an EDI-based stock-replenishment system, which sends sales data to suppliers and initiates reordering of hot-selling items. This drastically reduces retailers warehouse inventory costs. Also, this system tells the manufacturers warehouse to ship product direct to a specific retail location. Typical information in a transmission includes a ship to address, bill to address, UPC codes, and quantities. Other information can be included if agreed upon by the trading parties. This process is also practiced by fields such as medicine, transportation, construction, engineering as well as many other industries. The full potential of an EDI system can be best utilized if it is integrated with other applications such as inventory control, shipping, accounts payable and production planning. Unfortunately, suppliers are forced to use the sometimes costly EDI system in order to continue a business relationship with the larger companies. This is not always as cost-effective for suppliers as it is for the larger companies. Summary EDI saves time because it is faster at transmitting data, delivers data with the utmost accuracy, cuts down on paper usage and decreases overall time by eliminating re-keying of information. It is a more stream-lined business process for both trading parties. Benefits can be obtained in areas like administration, inventory management, distribution, and cash management. EDI has its share of problems, but its benefits far exceed them. With the internet it is becoming easier for trading partners to transmit data at a much greater reduced cost to both parties. The next few years hold great promise for EDI and the internet. Existing EDI forms can be kept by trading partners and new ways of transmitting data can be found cheaper, which will enable more new partners.

Saturday, October 19, 2019

Aging Research Paper Example | Topics and Well Written Essays - 750 words

Aging - Research Paper Example Aging refers to the biological process of growing old and developing physical characteristics that are associated with old age (Oswald, Jopp, Rott & Wahl, 2011, p 239). Aging is a multidisciplinary phenomenon that encompasses studies from various fields such as biology, genetics, sociology and psychology. Aging can also refer to the individual’s change in roles and responsibilities such as roles towards the family and society. Another meaning of aging is the physical changes that reduce the efficiency of body organ systems such as heart, blood circulation system and lungs. This occurs due to decline in rate of cell replications as an individual gets older (Oswald, Jopp, Rott & Wahl, 2011, p 245). Gerontological nursing refers to the study of the aging processes as individuals progress from middle age to later life. Gerontology studies the mental, physical and social changes associated with older people and changes in social policies aimed at taking care of the aged population (Scheibe & Carstensen, 2010, p 143). Gerontology nursing applies to community nursing through integrating advanced knowledge and skills in delivering quality and safe health care to the aged in the community. The branch of nursing focuses on health screening, counseling, and crisis intervention in order to provide quality care to older people (Oswald, Jopp, Rott & Wahl, 2011, p 248). According to U.S Census Bureau statistics released in 2010, the country’s age composition changed greatly between 2000 and 2010. Individuals aged between 45 to 65 years increased by 31.5 percent and accounts for about 26.4 of the total population. The number of Americans aged 65 years and above numbered 40,267,984 in 2010 and represented almost 12.4percent of the total population (Oswald, Jopp, Rott & Wahl, 2011, p 248). Accordingly, the aged individuals increased by 15.3 percent or 5.4 million citizens since 2010. Surprisingly, there were 53, 364 people aged more than 100 years. Target goals of Healthy People 2010 aims at reducing tooth loss, ensuring the aged receive flu vaccine every year and ensuring 90 percent of adults aged 65 years and older receive pneumonia vaccine. Accordingly, the target goals aim at getting colorectal cancer screening at the age of 50 years and ensuring 70 percent of women receive a mammogram at the age of 40 years. The targets aim at preventing falling through ensuring the aged citizens have healthy bones, increasing leisure and ensuring the aged increase intake of fruits and vegetables (Scheibe & Carstensen, 2010, p 143). There are numerous community issues affecting the elderly population. One of the issues affecting elderly people is poverty since majorities of these individuals depend on social security benefits. Another issue affecting this group is high risk of chronic diseases such as cancer, diabetes and heart related diseases. The elderly also suffer from sensory impairments and poor oral health problems such as vision impairment, hear ing impairment and loss of tooth. Other issues include lack of adequate access to vaccinations, poor diet quality, inadequate physical activity, obesity, inadequate physical activity and cigarette smoking behaviors (Scheibe & Carstensen, 2010, p 144). Community nursing practices must offer quality and safe nursing care to the elderly through carrying out an assessment of nursing needs. The assessment phase must collect data about each elderly person, the disease symptoms, surrounding environment such as close family members, access to recreational facilities and income level of the elderly person (Wick, 2010, p 121).

Friday, October 18, 2019

Influence of Television on the Behaviour and Attitude of People Essay

Influence of Television on the Behaviour and Attitude of People - Essay Example As the discussion outlines the socially aware people realized that we have been colonized by a veritable ruler and our daily life has been monitored in accordance with the discretions of this box. They started to attribute the abrupt change in attitude and behaviour to the television. Television has played a revolutionary role as a mass medium to disseminate information at a much faster pace as compared to other forms of media. This helps in speeding up the learning process at an early age. It is only due to the television that we are better informed about the harder facts of life. The unique way of presenting information makes it more acceptable to the viewers. The informative television shows give us a detail picture of the incidents and give us the insight of the people residing in even the remotest corner of the world. National Geographic channel, for instance, enlightens its viewers with their well-researched shows on wildlife and various expeditions undertaken all around the wo rld. Television bridges the age-differences and helps its viewers to get complete exposure to the outside world. Even the young viewers get complete thrill of venturing on an Amazon safari through television triggering their imaginative mind for their better.  Television, as an audio-visual medium presents its subjects through powerful visual images which directly speak to the viewers. The images offer a great deal of information and have an enormous potential to shape the reality of the viewers.  

Ways How Individuals And Communities Demonstrate Agency In Their Lives Essay

Ways How Individuals And Communities Demonstrate Agency In Their Lives - Essay Example It is vital to note that individual’s demonstration of the agency, later on, forms the building blocks of a community. This is because individuals are community agents since they express their thoughts on cultural matters to other people. Through the agency, people are able to carry out face-to-face conversations with people from other communities. This has an impact on either side of the communities since culture is a negotiated meaning (Gutman 5). Being a negotiated meaning, a cultural forum in which the culture is negotiated and re-negotiated is what makes and remakes the culture and the community. This, therefore, supports the earlier argument that through an agency, individuals are not passive recipients of community outcomes. Through the agency, individuals are able to engage in cultural construction (Gutman 6). Another demonstration of agency is seen in babies. According to studies, babies construct their own personal goals. Children create their own personal worlds for achieving their goals; this is what makes the difference between children and subsequently, adults. If they were to adapt to the conditions that they found in the community i.e. culture and ideologies, then all children in the community could be the same. This could also mean that the adults from the children could also be the same. Children, therefore, exploit the meaning they derive from the pre-existing culture to build their own understanding of the world that later on helps them or destroys them as adults.  

Thursday, October 17, 2019

Aesthetics and Experience Essay Example | Topics and Well Written Essays - 2000 words

Aesthetics and Experience - Essay Example Attfield (2000) suggests understanding culture through objects ‘acknowledges the physical object in all its materiality and encompasses the work of design, making, distributing, consuming, using, discarding, recycling and so on. But above all it focuses on how things have gone through all those stages as part of the mediation process between people and the physical world at different stages in their biographies’ (1-7). From this it is clear that objects can have multiple meanings. For example, a shaver may hold numerous positions in society. It holds its place in history as a social and cultural object, its history can trace the development of technology, there are now male and female versions of the shaver in most of its manifestations (manual, electric, etc.) and it has been designed to suit the lifestyle of the person that uses it as it is either plugged into the wall, carries a battery pack, is designed for travelling or is given a more aesthetic appearance for displ ay on the bathroom counter. Advertising, design and materials have been constructed to suit a particular market and durability has also been taken into account. All these factors are what make this and thousands of other objects what they are. How these elements function together to appeal to the individual’s personal sense of function and appearance is what is referred to as aesthetics. This term is most often used in the art world to designate important works of art. To understand these concepts better, I applied what I have learned about aesthetics to a specific photographic print entitled ‘Smutty’. In looking at photographs or other works of art, it is important to remember that what I may see as beautiful may appear quite different to another person. It is true that beauty lies in the eye of the beholder, as John Armstrong suggests. He says aesthetics is the process that ‘enables one person to

Week One Individual Assignment Essay Example | Topics and Well Written Essays - 750 words

Week One Individual Assignment - Essay Example the threats, the weaknesses the opportunities and the strengths. In diagnosing opportunities and threats, the manager should reflect on Michael Porter’s model for competitive forces in order to diagnose the competitive forces in the particular industry. These forces are very important since they can affect the business profit potential, growth rate or even survival. The business plan should assess these forces. These are the following: competitors, new entrants, customers, suppliers and substitute goods or services. Since the baby clothing store is a start-up business, the new entrants force is not of particular importance for this stage. From the competitors’ side the business owner should check the rivalry among competitors and more specifically should examine the number of firms there are in the particular industry, the rate of the industry growth and the level of fixed costs. The baby clothing store may face the danger of the customers’ bargaining power since the goods it provides are standard and undifferentiated i.e. the customers can find the same or similar ones to other shops and therefore they may force down the prices or buy more goods or services for the same price. A possible solution here would be to offer excellent customer service but this is going to be developed in strategies. The next step in planning is setting goals. The goals should be realistic, challenging but achievable and they can act as a benchmark so the manager can see if s/he meets his/her targets. The goal should be both strategic and financial. Then, the manager should develop and implement strategies. The strategies should be based on extensive market analysis, examination of opportunities and threats and contingency plans if things do not go as expected. From the three strategies i.e. market penetration, market development and product development strategy, it seems that the

Wednesday, October 16, 2019

Aesthetics and Experience Essay Example | Topics and Well Written Essays - 2000 words

Aesthetics and Experience - Essay Example Attfield (2000) suggests understanding culture through objects ‘acknowledges the physical object in all its materiality and encompasses the work of design, making, distributing, consuming, using, discarding, recycling and so on. But above all it focuses on how things have gone through all those stages as part of the mediation process between people and the physical world at different stages in their biographies’ (1-7). From this it is clear that objects can have multiple meanings. For example, a shaver may hold numerous positions in society. It holds its place in history as a social and cultural object, its history can trace the development of technology, there are now male and female versions of the shaver in most of its manifestations (manual, electric, etc.) and it has been designed to suit the lifestyle of the person that uses it as it is either plugged into the wall, carries a battery pack, is designed for travelling or is given a more aesthetic appearance for displ ay on the bathroom counter. Advertising, design and materials have been constructed to suit a particular market and durability has also been taken into account. All these factors are what make this and thousands of other objects what they are. How these elements function together to appeal to the individual’s personal sense of function and appearance is what is referred to as aesthetics. This term is most often used in the art world to designate important works of art. To understand these concepts better, I applied what I have learned about aesthetics to a specific photographic print entitled ‘Smutty’. In looking at photographs or other works of art, it is important to remember that what I may see as beautiful may appear quite different to another person. It is true that beauty lies in the eye of the beholder, as John Armstrong suggests. He says aesthetics is the process that ‘enables one person to

Tuesday, October 15, 2019

English as Second Language Research Proposal Example | Topics and Well Written Essays - 1250 words

English as Second Language - Research Proposal Example Ghaith). However, having said this, it is also essential to weigh the cons so that necessary steps are taken to plug the loopholes. Every system has some weakness. It is for the faculty to take note of these weaknesses and take adequate measures to effectively implement the CL concept in the institution. The participants are 200 male students of the English department in the age group 18-22 years and faculty of the Riyadh Teachers' College. The students as well as the teachers will be asked to fill out a questionnaire. Additionally, teachers will have to undergo an interview to investigate how they perceive CL. Let us first consider the advantages of the CL concept. It frees the teacher from the traditional method of addressing the whole classroom alone. The traditional system becomes more difficult to implement when the classroom is huge and there are students in such large numbers that it becomes almost impossible to evaluate if all the students have adequately understood the lessons being taught. In such situations, the CL concept not only frees the teacher from the shackles of many students not having their problems addressed but also provides them with time and capabilities to understand students' problems and find solutions. It is not usual these days to find classrooms with large number of students. The teacher might not feel it possible to adequately address all the students in the given time slot. She might resign to the possibility of the brighter students getting the best of her pedagogue while allowing the none-too-interested students to struggle away at the rear. The CL concept frees the teacher from solely addressing the students. However, it does not guarantee an easy strategy. The teacher has to prepare well in advance for what is about to happen. She must thoroughly visualize the scenario of the CL groups interacting and getting back to her with their queries (Adam Waxler). The CL concept helps the teacher better address the responsibility of attending the ESL needs of a large number of students with relative ease. The concept is a silent but effective tool to enable students gain confidence and learn ESL with peer interactions. The students may not be able to understand the teacher in the traditional method of pedagogue or if they have queries, they may not be in position to get them clarified on an immediate basis. However, in the CL setup they are able to do both (Implementing Cooperative Learning English Teaching Forum October). Methods of Data Analysis There are many methods of data analysis. A method is chosen when it is found convenient and fitting for the purpose. Equations for the probability functions are given for the standard form of the distribution. Formulas exist for defining the functions with location and scale parameters in terms of the standard form of the distribution (Gallery of Distributions). There are also the measures of variability wherein data is analyzed according to the spread of the frequency. In the case of ESL students, the groups could be analyzed

George Washington Essay Example for Free

George Washington Essay The shift of power in the late 1790’s by the Federalists can be attributed to different factor that had caused such incidents. In understanding this loss, the fall from power does not revolve around the hold of the government. Rather, it is the shift of ideas and reshaping of new interests that had led to the split of views among the American public and the rise of a new group who had a different view with the dominant Federalists. These changes began to manifest itself during George Washington’s tenure as president. Under his control, he had established a capable cabinet to address the current hurdles and obstacles surrounding American society during that time (Intelecom, n.d.). On one side, we can see Alexander Hamilton who seeks to redefine America’s policies and improve on the economy. On the other hand, his secretary of State; Thomas Jefferson, sees these scenarios as too much for central control. There are several issues surrounding this debate between Jefferson and Hamilton. Since the impeding issues of economic problems surrounding the country, there is now an argument surrounding creating a centralized bank that will facilitate these economic issues. However, this was hindered by Jefferson because such creation can undermine the overall capacity of the state to act on these problems (Intelcom, n.d.). At the same time, there is the issue surrounding national debt. Again, there are contrasting views surrounding its resolution. For the part of Jefferson, it is essential that the state pay off these debts and restart with policies that are debt-free which can in turn benefit the whole of the people. On the other hand, for Hamilton he believes that these debts should be hold on by the government. After this, he thinks to centralize these debt systems which shall be facilitated by the national treasury (Intelcom, n.d.). Though there were several arguments that have made a split in Washington’s cabinet, there was one important consolidation among the actors involved. This was choosing the appropriate capital for the central government. In here, it can be argued that Jefferson advocated the transfer of the central office to now Washington D.C. so as to prevent too much control of Federalists in a specific location. That is why choosing a neutral ground is an outcome that both parties especially Jefferson wanted (Intelcom, n.d.). Seeing these developments during the tenure of George Washington, the decline of Federalists power became evident during the formation of individuals who sought to control the level of centralization among other groups. Thus, this started the formation of the Republican Party and showcased a new wave towards redefining views concerning society, politics, and the economy (Intelcom, n.d.). This rise of the Republican party manifested itself after the presidency of George Washington in 1897.Though the head of office was gained by the Federalists, the vice-presidential position was attained by a member of the Republican party; Thomas Jefferson. Seeing this development, the country then saw for the first time two leaders who share opposing views concerning running a country. Such split is one indication of the end of the Federalists grasp of American politics. In the end, the loss of power and control of the Federalist Party resulted in different and contrasting views concerning political and economic politics. With the development of the Republican Party, it allowed the American public to have a choice on important and vital issues surrounding policies on domestic and foreign policy. Such idea catapulted a new wave of how politics and issues are addressed and administered by members of the government. Reference Intelecom (n.d.) Power Struggle Between Federalists and Republicans. Retrieved March 7, 2009 from, http://www.intelecomonline.net/VideoPlayer.aspx?Code=BDEF3032E99ACF2BD2D23910C9607455152966AE3C779225DA277C7DE3E7D3745F9D9FA44321A1B5C3BC82D441AC0566# Intelecom (n.d.) The Presidential Election of 1976. Retrieved March 7, 2009 from, http://www.intelecomonline.net/VideoPlayer.aspx?Code=BDEF3032E99ACF2BD2D23910C96074553A771997888BD3CE172D9718409283795AA3E4F7FDA67740E47B365B657B11DF#

Monday, October 14, 2019

The Moroccan Goumiers: Origin and History

The Moroccan Goumiers: Origin and History INTRODUCTION Linguistically speaking, the term Goum comes from the Arabic word () pronounced with a Maghrebi accent which means stand up. This term is going to define a military unit that was formed by the French army to be used first internally for pacification purposes and then externally for fighting the Axis powers. The Goums were predominantly Berbers from the region of the Middle as well as High Atlas, their simple lifestyle and isolation from the lowland in Morocco distinguish them from the other Moroccans mainly the Arabs and Arabized Berbers. Their way of fighting made them fierce warriors that were admired by the French militarily and feared by the Germans and Italians, in addition to the fact that they condoned many barbarous acts that they were doing to their enemies. They regard war as a way of living to the extent that they were assiduous in their missions by perfecting their fighting methods. The Goums made a reputation as redoubtable warriors both in Morocco, North Africa and Euro pe with the testimony of many military officers. This research papers will analyze the emergence Goums by dividing the papers into three parts. The first one is devoted to the origin of the Goums, the second to the contribution of the Goums within the French Army in World War II and the last to the fate of the Goums after the end of World War II. The Origin of the Goums and the Pacification of Morocco The Goums were first recruited from the Berber tribes that were objected to the French army such as Ait Warayn, Ait Seghrouchn, Imermuchn, Ichqirn, Izayyan, Ait Yahyathe Goums are: hawk faced Moroccan troops whose specialty is mountain fighting. Their especial value is their uncanny gift for moving silently through trackless mountain country. Their method of working is similar to the action of an incoming tide on a series of sand castles. These waves of Goums could be unloosed on a shapeless mass of mountain country that orthodox troops would find impassable. They would move up silently on any opposition that presented itself, dispose of it and push on regardless of what was happening to those on their right or left. They had a habit of bringing back evidence of the number of victims they had killed, which made them an unpleasant enemy to face.[1] The origin of the Goums goes back to the area of the pacification of Morocco, they were used against the resisting Berber tribes in the Atlas Mountains until 1934, the end of the pacification. The birth of the Goums is going to be in 1908 when the French General D`Amande recruited six Goums in the regions of Chaouia to fight the resistance against France in tribal area.[2] The first resident general in Morocco was General Louis-Hubert Lyautey who intended to rule Morocco indirectly by using the Moroccan elite that would govern the country for the benefit of France. However, his idea of indirect rule did not prove to be successful as the Makhzen under the sultan was not able to control the regions outside its realm (Blad Siba) such as the Atlas Mountains, where tribal societies were either with the central power or against themselves.[3] Lyautey realized that diplomacy is not working with the tribes in the mountains therefore he resorted to organizing North African French troops such as the Tirailleurs and Spahis to fight insurrections. Under these circumstances the Service Des Affaires Indigenes et Renseignements (AIR) came into being, the service divided auxiliaries recruited from the tribes into three distinct groups: Partisans, Mokhaznis and Goums.[4] The Goums were the elite of the French colonial force and their assigned mission was to police the rebellion areas among their tribal areas and was used as Groupes Mobiles,[5] pacification soldiers that performed the task of inspection as they know their areas more than the French. The Atlas Mountains proved to be a difficult mission for Lyautey due to the harshness not only of its mountains but also of its inhabitants, to the extent that the French Morocco was separated from the Atlas Mountains by the River of Oum er Rebia[6], thus deemed a region off the French Control. When Lyautey started his military campaign against the tribes in the Atlas Mountains staring from the city of Khenifra, he encountered a fier ce resistance from the Zaini tribe mainly from Moha ou Hammou, Moha ou Said and Ali Amhaouch.[7] Lyautey relied on Goums as well as Algerian and Senegalese Tirailleurs to get Moha ou Hammou.[8]But the price was high as the French military was subject to many defeats with its pinnacle in the Battle of Lhri. Regarding the ethnic composition of Goums, when they were first formed in 1908 in the region of Chaoia they were a mix of both Arabs and Berbers. However in the late 1920s, the French are going to confine the recruitment of Goums to be mainly from the Middle as well as the High Atlas. From this perspective the Goums were distinct from other colonial troops such as tirailleurs and saphis by being distinctly Berbers, a reason that made France to use them as police officers against any resistance.[9] The Berber tribe of Ait Seghrouchn is going to be the most favored by the French to recruit the Goums. The tribe was attacked by the French and many of its inhabitants decided to enlist in the French army due to the death of their family. The Berber name of the tribe ouchn means wolf. The way of their fighting is derived from their attribution to this animal. According to Barbara erenchih the origin of war goes back to the area of Mesolithic when in fact game animals were scares and a holocaust of animals occurred, and psychologically the prey animals are revered. In Scandinavia the warriors were leaving their human form and assuming the form of a bear when they go to fight. From which the origin of the word berserk came.[10] Consequently, when the Goums of Ait Seghrouchn went to fight they assume the form of a wolf and leave behind their human form. The Goums were noticeable for their quality of loyalty to the extent that they remained faithful to their officers during the dissents in Morocco. As it is stated by Edward L. Bimberg during all these turbulent years the Goums remained steadfast. While the tribes of their origin vacillated loyal to the French one day, fighting them the next the Goumiers remained faithful, not to France, but to their officers, the Frenchmen to whom they owed their fealty.[11] The tribes proved to be a difficult task for the French, but Eventually, it was nature that defeated the tribesmen. The French dammed the streams that ran through the Berber positions, cutting off their water supply.[12] And by 1933, the last of the dissident tribes, the Aà ¯t Abdi, the Aà ¯t Sokhlman and, toughest of them all, the Aà ¯t Haddidou, came down out of their mountain strongholds and submitted to the French generals. The pacification of Morocco was complete.[13] After the end of the pacification, the Goums became ob solete and there was the idea of discharging the Goums as they were no longer needed. However, due to their ferocity and trustworthiness the French agreed to keep them as gendarmerie (police officers) in case new dissents aroused and by the start of World War II the Goums were going to have a new mission where they built a reputation of being fine warriors.[14] Tunisia In 1939 Germany invaded Poland ushering the start of the Second World War and it is obvious that France will be using its colonial troops such as Tirailleurs, Spahis and Zouaves to fight the Axis powers. The Goums were also on the picture, however they were used as a police rather than military force but eventually they were sent to Tunisia to fight the Italian and German forces in its border with Libya. unlike the French, the Berber when they were fighting the Germans had no natural or historical animosity towards them, on the other hand they just fought for the sake of fighting and the fact of being paid for their service was a motivation for them to fight savagely against the Germans.[15] When the French realized the power of the Goums they organized them in tabors to be used in military missions, the tabor came to be used in hand with the word irregular.[16] The Goums were deployed in Tunisia two times. First, In 1940 Tunisia was menaced to be attacked by Italians from its East-South border with Libya. Therefore, in May 1940 the Goums were deployed to Tunisia to fight against the Italians. However, when France lost in the phony war, it negotiated an armistice that allowed the Vichy France to head the country of France. It is worth mentioning that in contrast to the Italians who were being wary of the Berbers as a threat the German did not regard the Berber as a menace but rather a band of peasants. Additionally, France pointed to the Germans that they were used as gendarmerie. Thus they were allowed for their continuation in France Vichy; in the meantime the Goums were the resort of France to build its army without any interference from Germany.[17] The fact of being situated in the mountainous region of Morocco made the action of French officers unnoticeable. What made the Berbers to be highly regarded by the French was their loyalty to the extent that they remain loyal even during their defeat by Germany and under Vichy France. As it is stated by Moshe Gershovich This manifestation of Berber loyalty towards the France`s worst moments in history was celebrated as shining proof of the common bond which had been forged between the two peoples, the ultimate fruit of colonial genius and benevolence.[18] Second, in 1942 the Goums were redeployed in Tunisia where they acquired a reputation as brave and fearsome warriors who showed to the allied forces their skill in infantry They helped capture the city of Bizerte and Tunis, to the extent that Horrocks described the Berbers as The toughest of allon whom pain and discomfort seem to have no effect whatever.[19] The Goums fighting performance in Tunisia made them the suitable candidate to fight the Axis powers in Italy. The Mission in Italy After their participation in Tunisia which showed to the allied forces the fierceness and warrior quality of the Berbers they were taken to Sicily on what was called operation Husky[20] the 4th tabor that went was composed of 58 French officers and 678 Goums.[21] Sicily did not prove to be a hard terrain for the Goums as its rugged and mountainous terrain were similar to the Atlas Mountains in Morocco. Nevertheless, they did found the Island hellishly hot, unbelievably dusty and malarial besides.[22] The 4th tabor was essential at helping the American 1st division that were heavily attacked by Italians.[23] The Sicilian campaign ended after the capture of Messina, which proved to be a crucial battle for the Goums as it is proposed by Edward L. Bimberg It was their first adventure overseas, the first time in their history they had fought outside Africathey had overcome what may have been some- thing of an inferiority complex, a sense of being country bumpkins fit to fight only in African wars. One way or another, for the Moroccan irregulars Sicily was an important breakthrough.[24] The fall of Sicily paved the way for the fall of Sardinia and Corsica. The French were aware of the power of the Goums and their competence in war and after their deployment in Tunisia the French army added a metal unit insignia in which it was written Who Laughs Last Laughs Best[25] which served as a reminder for its enemies about the glorious victories of Goums against Germans. In 1943, due to the success of the Goums in Tunisia and Sicily with four tabors being under the command of the allied forces, a new position was created under the name of the Commandment des Goums Marocains (CGM) with Colonel Augustin-Leon Guillaume as its commander.[26] Its role was to maintain communication between those four tabors. The American relied on CGM which would be a part of the fifth army of Clark to invade Italy under the codename of Avalanche.[27] The Goums did not find the new invasion to be hard for as the allied forces did not like the terrain the Goums find an advantage. As it is stated by Edward L. Bimberg, as far as mountain fighting was concerned the Goumiers were at no such disadvantage. The Italian peaks and ridgesmeant nothing to the Moroccans.[28] And while the Germans regarded the mountains as a barrier for defense against the allies, the Goums did not find difficulty in their specialty as mountain warriors. While the Goums did a remarkable job of fighting the Axis powers, a new element of their charater was revelaed by their misconduct that was noticeable by Italians. As it is stated by Edward L. Bimberg: They were not popular with the Italians. This was the result of the off-duty conduct of some of them in the mountain villages and isolated valley farmscertain elements among the Moroccans had engaged in a wild spree of rape and pillage across the Italian countryside when they were not busy killing Germans.[29] In the movie La Ciociara which is based on the novel La Ciociara by Alberto Moravia, the group rape of two women by the Goums after the battle of Mosseni was portrayed. These brutal events were engraved in the memory of Italians as an Italian word marocchinare came to describe those events. In 1964 a monument was erected in the city of Roca di San Pietro, named Mammai Cioria to remind Italians of the atrocities committed by the Goums. The reasons behind the misconduct of the Goums has to do with the fact such things as rape and loot can be explained through the isolation of the Berber tribes in the Atlas Mountains. The reason why the people went to war in the first place was to rape and loot, to the extent that Alexander the Macedonian was portrayed as being gay for not indulging into rape during his conquests.[30] Barbara Ehrenreich stated that war not only depart from the normal; it inverts all that is moral and right: in war one should kill, should steal, should burn cities and farms, should perhaps even rape matrons and little girls. [31] She even pointed out that rape has been endemic wherever warriors rule and was even legalized in medieval Europe as the feudal lord`s droit de seigneur[32] Edward L. Bimberg stated that: Not that they had anything against the ItaliansTheir origins, however, can-not be forgotten; to the Moroccan tribesman, that was the way war was waged. To the victor belonged the spoils, and the Goumiers were somewhat puzzled by the restraints put upon them by their officers.[33] This misconduct of the Goums was used as justification by the French authorities for its brutal policies when dealing with tribal people in Morocco.[34] The Moroccans indulged in rape, theft, pillage and murder, consequently Clark, the head of the Fifth American division under which the Gums were supervised, ordered the execution of law transgressors. Accordingly, 15 Moroccans were executed while 54 were imprisoned to various sentences.[35] The action committed by the Goums came as a surprise to the French officials Alphonse Juin, commander of the French Expeditionary Corps (CFE), and Guillaume. Therefore, the French decided to bring Berber women to Italy through the US Navy LST to prevent future misconducts by the Goums, to the extent that they were the only soldiers in WWII that brought their women with them.[36] Surprisingly the policy did help in quelling rape and pillage but the disgrace did not disappear.[37] Apart from their misconduct in Italy, the Goums were also known for the fact that during the night they would sneak in the American tents and steal their stuff.[38] Additionally, their way of fighting involved also the pro cess of cutting throats and ears which was reminiscent of what the Trojans did to their enemies,[39] the basic aim of these practices was to take souvenirs.[40] The Goums succeeded in chasing the Germans down and reached the cities of Rome and Siena where they fought their last battles in Italy. After that, the Goums have to go to Naples to be embarked directly in southern France to fight the German in what was called Operation Dragon.[41] Italy was an opportunity for Berbers to distinguish themselves again after Tunisia as worthy warriors who can survive under any conduction. As it is pointed out by Edward L. Bimberg: The Italian campaign was the supreme testing ground for the Moroccan Tabors. Could these lightly armed primitive tribesmen survive in modern warfare? Their officers maintained that they could and did, that their performance in the mountains of Italy was proof of their value, even in the most difficult circumstancesSupply alone, with one air drop and 4,000 mules, was in itself an almost magical accomplishment.[42] When the Goums preparing to be embarked in Southern France, the French`s inspector general`s department published a report about the Goums, which mentioned their strong points as well as weak points. It pointed to the qualities of Berbers in warfare such as scouting and patrolling[43] particularly in Mountains, Overflowing or swarming, or what is called by French as de`bordement[44] which means being fast to attack with the element of surprise, in addition to Adaptability, endurance and cleverness in making booby traps.[45] The major weak points of the Goums tend to be lack of inventiveness especially in the absence of French chiefs,[46] the fact of taking orders instead of improvising is a constant characteristic of the Goums, In addition to their reluctance to attack a well-equipped target as they prefer war of movement to a sedentary siege.[47] Another interesting fact that is mentioned in the report is the Goums` dislike and contempt of the tank,[48] which is normal as any warrio r society fears new weapons because not only do they menace their life but also the survival of their groups as fighting elite that is redoubtable and in need of in addition to the fact that a man who fights through a tank is hiding in a machine. For instance, the samurai had the same feelings as they were abhorred by the invention of guns to the extent that they banned it.[49] The report was made with the intent of finding solutions to the weak points as well ameliorating the strong elements of the Goums, for instance by equipping them with anti-tank rifles.[50] The Mission in France The participation of the Goums in operation dragon (also known as Anvil) was at doubt not because the French doubted the warfare power of the Goums, but out of fear from their reputation as being prone to rape and plunder like in Italy, to the extent that Pope Pius XII in Vatican had protested against the use of Goums in Europe.[51] However, General Guillaume defended the Goums and asked for their participation in the French soil. [52] In France, the Goums were going to be under the command of General Jean de Lattre de Tassigny who unlike Giraud, Juin and Guillaume was neither African nor having an experience of fighting in North Africa. Another issue that was an obstacle for the deployment of the Goums in southern France is the military nature of Operation Dragon which was gigantic as it included five battleships, nine escort carriers with 216 aircraft, 122 destroyers and escort vessels and 466 land- ing craft, all from five navies American, British, French, Australian and Greek and an imposing fleet of transports and supply ships as well. [53] Finding room for the Goums among this vast military along with their mules and horses was a cumbersome one. Many officers showed their opposition to the inclusion of the Goums in the ships as well as undermining their capacity as warriors based on their looks. For instance, General Alexander Patch of the American force was against their deployment. Nevertheless, the need for Goums attested to be vital for the Allied forces as General De Lattre convinced the officers that opposed the Goums Deployment in the operation, mainly the Americans. He pointed out to their specialty of mountain warfare which would be useful in getting along the mountain ranges surrounding the two cities: Toulon and Marseille, in addition to the Alps and the Vosges in Alsace.[54] To put things differently, regardless of their look or reputation as rapist and plunderers, the Goums were crucial for the success of Operation Dragon. Moreover, regarding the issue of rape and pillage De Gaulle agreed to the deployment of Goums in France as long as they were not used in cities.[55] Eventually, 6000 Goums along with 1200 mules were embarked in the ship heading towards the shores France.[56] The German forces that were stationed in France to defend the South were the 19th army under the control of General Friedrich Wiese. The major German power was stationed in two major French cities Marseille and Toulon. In the former, it was the 244th Infantry Division as well as naval and Luftwaffe ground units and the latter it was 242nd Infantry Division and the Kriegs-marine.[57] The cities captured by Germany such as Marseille were used as fortresses while the leading roads to the city were fortified by artillery, machine guns, mines and wire.[58] What made the invasion more difficult is due to the fact that the Germans followed Hiller`s rule of fighting to the last man. Regardless of the way the German fought, the Goums had the advantage of identifying war as a reason for their life therefore making the best of it. What was noticeable regarding the Goums in contrast with the allied forces is their Berber character that can be seen from their clothing: djellaba, rezzas and mule-r iding. To the extent that De Lattre described their march toward Marseille as trotting along in single file with their mules, bare footed, their hob-nailed boots hanging about their necks or slung at their belts with their tin helmets. The endless striped djellabas gave the landscape an African appearance.[59] The Goums proved to be worthy of their reputation as fierce warriors, they were mostly used in areas that involved inhospitable terrains such as the Mountains of Alps where the Goums were stationed to guard the eastern border of France with Italy, their mission was to prevent any infiltration of Axis powers to France from the Alps to the Col de Larche while the allied forces guarded the less harsh border between Col de Larche and the Mediterranean Sea.[60] The Alps proved to be a strenuous terrain for the Goums, as it is acknowledged by Edward L. Bimberg The Alpine terrain in that area was particularly difficult, even for the Goumiers. They found the footing around the Col de Larche and the Plateau des Bouchieres extremely unstable. It was all shale, a rock made of densely packed clay that split easily into layers, of a type unique to the territory and strange to the Moroccans They had never before experienced this kind of stone that sheared off underfoot as they marched, making the uphill going doubly difficult and the down- hill even more dangerous.[61] The fight in Alps was an arduous one that generated many casualties from both sides. However, the Goums remained in the Alps only for a month and then replaced by units of the FFI (). As the German received heavy losses in Southern France mainly by losing Toulon, Lyon, Grenoble and Marseille Hitler ordered his troops to evacuate Southern France.[62] The next mission of the Goums in France after the Alps is going to be in the Vosges Mountains. The new terrain was different from the Atlas Mountains as it was heavily forested, dark and dank,[63] to put it in other words Its terrain was perfect for defense, and the Germans had made the most of it.[64] So, De Lattre expected a long battle in the area which was hindered by the weather as well as the harsh terrain, however the general relied on deceiving the German to think that their aim is at the Vosges instead of Belfort Gap, an aim in which he succeeded at. In order to do that, the Goums were kept busy by fighting the German on the mountains,[65] and eventually the victory paved the way to freeing Alsace and getting the Colmar Pocket.[66] The Mission in Germany Obtaining Alzace was not enough for the French, for that reason De Gaulle urged his army to go further, beyond the Alsace in the Rhine to capture the capital of Wà ¼rttemberg and Baden province, Stuttgart. However, there was an obstacle as the other bank of Rhine is settled by the mountainous, wooded terrain of the Black Forest.[67] But that was not obstacle for the Goums whose reputation did not stop at Italy and Tunisia but arrived to Germany too as the people were more fearful of the Goums than the regular allied forces. As it is affirmed by Edward L. Bimberg, The German civilians were, understandably, totally cowed, and the white bed sheets of surrender were displayed everywhere. They were particularly fearful of the Goumiers, whose hooded djellabas and scraggly beards made them seem like some avenging medieval monks.[68] As the French army occupied such cities as Karlsruhe and Pforzheim, the next step is to invade Stuttgart. However, the American forces under the command of Gen eral Devers were engaged in fighting the Germans in the north. De Lattre was recalcitrant to the orders of his superiors and preferred to go to the mission without informing the Americans, his plan was to surround the city by isolating it like a siege and the Goums were used effectively in that matter.[69] Just like Alsace, getting Stuttgart was not enough for the French but they sought something further which is Ulm, the basic interest of French is based on its pride, it wants to be known in history that France reached as far in Germany as the Danube River.[70] Another city that De Latter was after is Sigmaringen, the headquarters of the French Vichy government in exile, under the command of Marshal Petain.[71] Although the two cities were missions for the American Seventh Army De Latter made it a personal mission to get the honor of France as well as capturing the traitors: Marshal Petain and Pierre Laval.[72] Once the Allied forces captured German cities, there was a task that the Goums were skillful at that it was always performed after the fall of each German city, the task was mopping up or what is called in French ratissage.[73] The final place where the Goums along the allied forces fought the German is in the Voralberg Massif in the Austrian Alps.[74] After the End of World War II The Goums fought with the French amry in the world wr two with loulaty and efficiency however Germany was not the last mission where the Goums served but they also went as far as Indo china in 1948 1854.[75]unitl where they severed a heavy defeat in the Tonkin Region in the north, ten tabors were snet to the area, the reason for the deafet is due to the guereilla warafer tactic empoloeyed by the northern vitnamese as weel as the terrain that was unprecendt for the Goums. In the oprocess many leflet were given to the goums incldung other nother African soldiers to join the veitanoimie military by referring to them as comrade. When the Goums were discharged from the French army due to the end of World War II and the changing time in Morocco as Moroccans ask for Independence under the PI, The Goums preferred to support the Pasha of Marakesh, El Glawi in contrast with the supporters of Mohemmed V. the king went into exile and Mohammed Ben Arafa became the sultan for a short period and by the independence.[76] Conclusion The Goums were good at fighting and helped the allied forces in their war against the axis power, they were used under the command of French officers, and they proved their warrior spirit in Tunisia, Italy and Germany. To the extent that only four of the Goums have became prisoners of war during their experiences in Tunisia, Sicily, Italy, France , Germany and Austria.[77] The Goums are specialized in mountain warfare however during their deployment in Europe they proven to be adaptable to other types of warfare. The Goums are not mercenaries but military unit under the international law and a basic evidence of that is the fact that the Goums were fighting in Europe for the sake of France to the extent that When one Goumier was offered a monetary reward, he refused it saying, It is for France.[78] Their reputation seems to be tarnished by the brutal events of Ciociara and the defeat in but still they did a difficult work of helping the allied forces freeing Europe from the Axis power s. Bibliography Augustin-Leon Guillaumes Goums in a Modern War. Military History Quarterly. Winter 2007. http://www.historynet.com/wars_conflicts/20_21_century/ 4644596.html?featured=yc=y Maanouni, Ahmed El dir. Les goumiers marocains(Moroccan Goums). with Eric Deroo and Alain de Sedouy. GMT Productions, 1993. Bimberg, Edward L. The Morrocan Goums: Tribal Warriors in a Modern War. Westport, Connecticut: Greenwood Press, 1999. Eisenhower, John S. D. They Fought at Anzio. Columbia, Missouri: University of Missouri Press, 2007. El Merini, Abdelhak. L`armee marocaine a travers l`histoire (Moroccan Army through the History). Rabat: Dar Nachr El Maarifa, 2000. Ehrenreigh, Barbara. Blood Rites: Origins and the History of the Passions of War. Henry Holt and Company: New York, 1997. Gershovich, Moshe. Collaboration and Pacification: French Conquest, Moroccan Combatants, and the Transformation of the Middle Atlas. Comparative Studies of South Asia, Africa and the Middle East 24.1 (2004): 139-146. Gershovich, Moshe. French Military Rule in Morocco: Colonialism and its Consequences. London: Frank Cass, 2000. Ilahiane, Hsain. Historical dictionary of the Berbers (Imazighen).The Scarecrow Press: Lanham, Maryland, 2006. Maghraoui, Driss. The Moroccan Colonial Soldiers: Between Selective Memory and Collective memory, in Ali Abdullatif Ahmida, ed., Beyond Colonialism and Nationalism in the Maghrib: History, Culture, and Politics (Houndmills, Basingstoke, Hampshire, New York: Palgrave, 2000): 49-69. Maghraoui, Driss. Nos goumiers Berbà ¨res: the ambiguities of colonial representations in French military novels. The Journal of North African Studies 7: 3 ( 2002): 79-100. Bouchareb, Rachid. Indigà ¨nes (Days of Glory). with Jamel Debbouze, Roschdy Zem and Samy Naceri. Tessalit Productions ,2006. Van Creveled, Martin. The Tansformation of War. New York: The Free Press, 1991. De Sica, Vittorio dir. La Ciociara (Two Women). with Sophia Loren and Jean-Paul Belmondo.Compagnia Cinematografica Champion, 1960.

Sunday, October 13, 2019

Karl Marx :: Biographies Philosophy Papers

Karl Marx Karl Heinrich Marx was born on May 5, 1818, in the city of Trier in Prussia, now, Germany. He was one of seven children of Jewish Parents. His father was fairly liberal, taking part in demonstrations for a constitution for Prussia and reading such authors as Voltaire and Kant, known for their social commentary. His mother, Henrietta, was originally from Holland and never became a German at heart, not even learning to speak the language properly. Shortly before Karl Marx was born, his father converted the family to the Evangelical Established Church, Karl being baptized at the age of six. Marx attended high school in his home town (1830-1835) where several teachers and pupils were under suspicion of harboring liberal ideals. Marx himself seemed to be a devoted Christian with a "longing for self-sacrifice on behalf of humanity." In October of 1835, he started attendance at the University of Bonn, enrolling in non-socialistic-related classes like Greek and Roman mythology and the history of art. During this time, he spent a day in jail for being "drunk and disorderly-the only imprisonment he suffered" in the course of his life. The student culture at Bonn included, as a major part, being politically rebellious and Marx was involved, presiding over the Tavern Club and joining a club for poets that included some politically active students. However, he left Bonn after a year and enrolled at the University of Berlin to study law and philosophy. Marx's experience in Berlin was crucial to his introduction to Hegel's philosophy and to his "adherence to the Young Hegelians." Hegel's philosophy was crucial to the development of his own ideas and theories. Upon his first introduction to Hegel's beliefs, Marx felt a repugnance and wrote his father that when he felt sick, it was partially "from intense vexation at having to make an idol of a view [he] detested." The Hegelian doctrines exerted considerable pressure in the "revolutionary student culture" that Marx was immersed in, however, and Marx eventually joined a society called the Doctor Club, involved mainly in the "new literary and philosophical movement" who's chief figure was Bruno Bauer, a lecturer in theology who thought that the Gospels were not a record of History but that they came from "human fantasies arising from man's emotional needs" and he also hypothesized that Jesus had not existed as a person. Bauer was later dismissed from his position by the Prussian government. By 1841, Marx's studies were lacking and, at the suggestion of a friend, he submitted a

Saturday, October 12, 2019

The Wedding by Nicholas Sparks Essay -- The Wedding by Nicholas Sparks

â€Å"The Wedding† by Nicholas Sparks The novel â€Å"The Wedding† by Nicholas Sparks is a sequel to the love story, The Notebook. The characters in this novel are facing pretty much one big problem. The setting in this story is taken place in the year 2003 in a little place called New Bern, where the lives of the Lewis family would change in many ways. Wilson and Jane Lewis; a married couple for many years, are the main characters in this novel. They are facing a very difficult time in their lives. It seems as if Jane has fallen out of love with Wilson. Wilson is the kind of guy who spends far too much time at work. He knows he should be spending more time at home, but just never could find the time to do so. During the course of their life, they had kids and did everything a normal f...

Friday, October 11, 2019

Mcsa Networking Basics Essay

Introduction What is a network? A network can be defined as two or more computers which are linked together to share resources. These resources can include internet access, printers, software and files. The ‘heart’ of a network is called the server, and its function is to contain all the software and services which the network and its users depend on. Figure 1: Example of a basic network The server is operated by personnel called Network or System Administrators, and it’s their responsibility to ensure the smooth running of the network so it is working as efficiently as possible. This is achieved through the use of a dedicated operating system called Windows Server 2003 – this gives the network administrator complete control over the network functions. Advantages for a network Cost Because networked computers can share the same resources, costs can be dramatically reduced. For example, if there are ten computers in a room each needing access to a printer – it is far cheaper to route all ten computers to a single, shared printer than it is to purchase ten printers; one for each computer. In this example, the saving would also include the cost of ink cartridges (you would only need to purchase one set of cartridges instead of ten). Software can be purchased and installed in a similar cost effective way. Most popular software is able to be bought and installed on a server, and anyone who requires to use it will only need to purchase a license (the legal rights to use it, usually in the form of a certificate). These licenses are far cheaper than buying the software for each user. This method also means that it isn’t necessary for an I.T Technician to install the software on every computer; only one install on the server is needed. Another benefit to this approach is when the software requires an update. If it is server based, only the software on the server would need to be updated. All the users would benefit from the update as soon as it has been installed. If each user had a copy on their computer, I.T Technicians would need to update each one. This could become time consuming, expensive and complicated. The software that this could apply to, includes most Microsoft software and Anti-virus software. Security Security is a vital element in any business. In a network, security is enhanced both internally (security within the network) and externally. Users are given a username and password to access their files and all the programs, hardware etc that they have been given access to. When a user saves a file, it is saved to the server and not the computer that he/she is working on. If that user wants to retrieve that file, it can be done on any computer on the network, and not just on the computer that was originally used. This data can be accessed, monitored and backed up by the Network Administrator at any time. Each department can have their own ‘identity’ on the server, which allows them to have access to files, applications and resources which would be relevant to their requirements. For example, the Accounts department may need to have access to invoicing software (e.g. Sage and Excel), whereas Sales may only require software to monitor and forecast sales over a period of time (e.g. Excel). Accounts may not want other departments accessing their software due to security or confidentiality reasons. Internet security is tighter for both users accessing the internet, and external threats when a network is set up. All the computers can share a single access point to the internet, which makes it easier to monitor internet usage, help reduce hacking and other external threats trying to access data on the network. Another feature which can be applied by the system administrator is Encryption. Data within a folder/subfolder can be encrypted to prevent unauthorized access to data if other security measures have been breached. Typically, only system administrators will be given the ‘recovery key’ to be able to decrypt data incase of system failure or other unforeseen situations. Disadvantages for a network Expensive to install The initial cost of setting up a network can be expensive, with hardware like the server, router, cabling, backup equipment, network printers and server software. Also, dedicated personnel must be hired to keep the server running efficiently and to resolve any server/network issues. Centralised Data Having all of the data in one place means that data could be lost in the event of a system failure. Regular backups of the server are highly recommended (daily, weekly and monthly) to help to keep data safe. But if the server goes down in between backups then all the recent data will be lost. Reduced Performance The server’s performance can become reduced as the network expands or as its workload increases through the working day. A server must have as much memory and processing power as possible to help minimise the reduction in performance. Task 2a Network Topology is the description of how a network is laid out, the devices (server, routers, printers etc) attached to it and the direction which data flows. A network can be described as either Logical Topology (the way data flows in a network) or as a Physical Topology (how a network is physically laid out) There are six main topologies, Bus, Ring, Star, Extended Star, Hierarchical, and Mesh. Bus Topology This can be both a Physical and Logical, in a local area network (LAN), each device is connected by a single cable. This single cable is also referred to as the ‘backbone’ of the network. A terminator must be on either side of the cable to prevent the data signal from bouncing back down it. The Bus Topology was widely used in early networks using standard Co-ax cables. It was an economical solution for networking as only one main cable was needed. The disadvantage to this was if this cable failed, the whole network would go down. Ring Topology In a Ring Topology (also known as IBM Ring Token), each computer (node) is connected to each other in a closed loop. Each computer has its own unique identity on the network. When data is transmitted from one node to the other, the data will include the destination’s identity and will pass through each node until it reaches the destination. This type of topology has two main disadvantages; only one computer can transmit data on the network at a time and if a computer fails the whole network will go down. There is a slight variation to this; the Duel Ring Topology The second ring within the network provides a backup connection, so if there is a failure within the network, the secondary connection will keep the network connected. This is expensive as more cabling is required. Star Topology The most common type is called a Star Topology. Each device is connected to a dedicated central hub. All the data on the network flows through the network via the central hub. These types of networks tend to be small, as data could be degraded or lost on a large network. The main advantages to this is that it is easy to setup and easy to add new devices to the network. But if the central hub fails, the whole network goes down. Extended Star Similar to the Star Topology, but instead computers are grouped together and connected to a local hub, which in turn is connected to a central hub. This is widely used in large networks where the network may be in a large building, and each group of computers may represent each department. There are more points of failure on this network, but if a local hub fails, then the rest of the network will not be affected. Hierarchical or Tree Topology This is very similar to a Ring Topology, but computers are attached to the central hub in layers. While the structure looks different, this still has the main disadvantage of network failure if the top device goes down. Mesh Topology All the above topologies suffer from the same problem. If one device fails on the network, the whole network goes down. The only solution is to connect each device with each other and remove the need for a server. This is the Mesh Topology and has two main advantages; If a device fails, the network will still work and the network doesn’t need to rely on the processing power, bandwidth etc from a server as it is supplied from each computer. The disadvantage to this is the high cost of connecting each device to each other, so this would not be suitable on a large network. This type of topology is also referred to as Peer-to-Peer whereas the other topologies are considered to be Client/Server based. A comprise between cost and connectivity would be the Partial Connected Topology. Devices are connected to more than one node on the network, so if one fails the network can still work. This is more cost effective than Mesh Topology as less cabling is required. Task 2b Recommendations As it stands, the structure of the current network is a Hierarchical or Tree Topology. The network uses two different switches to connect the Domain Controller to the 24 computers. These are from two manufacturers; CISCO and 3Com and this offers 100Mb and 10Mb speeds respectively. This is a disadvantage because one ‘group’ of computers has a quicker data transfer rate than the other. The network does not have a disaster recovery plan should the Domain Controller fail. This has the potential for putting the whole network at risk from permanent data loss. The network also shares a single printer which is attached to the Domain Controller, 10 of the computers are connected to it through the slower 3Com 10Mb switch. This means all 24 computers print via the Domain Controller (which is currently overloaded) and 10 computers send data at a slower rate than the rest of the network. My first recommendation would be to replace both switches with a single CISCO 100Mb 48 port switch ( £631.99 from MISCO website). This would provide a standard, quicker data transfer speed throughout the network and allow for the network to expand. There are a total of 24 computers, and this switch would enable a further 24 devices to be added to the network e.g. additional computers, printers etc. This would allow the network to expand whilst maintaining a fast data transfer speed. With the new switch in place, my next recommendation would be to replace the HP Laserjet III (USB connection only) with a newer, network-ready printer like the HP Laserjet 2055DN or P2030 which costs  £319 and  £160 from HP website. By replacing it with a newer model, printing could be completed quicker, quieter and more cost effectively e.g. more reliable printing, more energy efficient, lower consumable costs etc. Also, sharing the workload throughout a faster network is more efficient than channelling all the printing requirements of the network to an older single printer on a slow 10Mb switch via the Domain Controller. This will also help reduce the workload to the Domain Controller. While the Domain Controller’s workload can be reduced by the addition of a network-ready printer, other options could be to increase the specifications (e.g greater hard drive space, more memory etc). Ensuring the controller has the latest software updates will ensure both the running efficiency and increase the network security. This will help prevent unauthorised access (hacking) to the network. My final recommendation is add disaster recovery and remote working within the network, By regularly backing up data on a daily/weekly/monthly basis, this will ensure the network can be restored in case of total data loss. To assist learning or to prevent students from accidentally causing errors/problems within the network, remote working should be enabled. User accounts can be easy created in Active Directory though the use of a standard template. Templates could be set up for both students and tutors, so all of the common properties of the accounts are already established. When a new user account is required, the administrator will only need to complete the fields that require unique values (eg, name, address, telephone number, course details etc). Once the users have been created within the Active Directory, they can be placed into Organisational Units (OU’s). This will group together users, so in this situation students could be placed in OU’s which represent their course. When the OU’s are established, the users’ configuration settings can be applied through the Group Policy Management Console (GPMC). It holds hundreds of user configuration settings, security options and user event logs, all which can be applied as required by the college administrators. Figure 2: Example of the Group Policy Management Console (GPMC) By using Group Policies effectively, the administrator can control and manage exactly what users can and cannot do whilst logged onto the domain. Administrators are able to control how the desktop appears, the icons that are available and the ability to configure the task bar etc by applying the Desktop setting found within the ‘User Configuration’ in the GPMC. This could be useful if the college policy states that all users must have the Llandrillo College logo as their wallpaper, and various required icons are in place and users to have access to various programs via the ‘start’ menu. To improve password security, administrators are able to increase the effectiveness of the passwords that users apply to protect their identity on the network. The password options can be found within the ‘Password Policy’ within the ‘Computer Configuration section of the GPMC. These options include the ability to reuse old passwords, to apply complexed passwords (eg. more than 6 characters, using upper, lower case letters and digits 0-9). In the example, a programmer has created a random word generator to create passwords. Group policy could be configured so when they log on for the first time, users input the randomly generated password and then they must input their own password using a complexed password. If the user ever forgets the password at any time, administrators are able to reset it through the ‘Active Directory Users & Computers’ tool. Figure 3: Example of Password Policy within GPMC To prevent users from using too much disk space on the network, administrators are able to allocate limited disk space to users and by applying prompts when this space is nearly used up. By putting this in place, administrators can calculate how many users will be on the system multiplied by how much hard disk space each user will be allocated. This total will be the minimum amount of disk space required for all users in each new academic year. Administrators will be able to ensure the server can physically hold all the users data without completely running out or running low of disk space. To achieve this, administrators will need to locate the allocated hard drive and apply a quota, limiting users on how much space they can use. Individual users can have separate entries in the quota, allowing them to have a lesser or a greater share of disk space. This would be useful for tutors who may need greater disk space to store course material etc. When the network is running, administrators may be required to monitor the networks resources to ensure it exceeds the users demands. The tool required is called the ‘Performance Console’ which is found under Administrative Tools. This tool appears in the form of a graph although it has three counters as a default (Memory:Pages/Second, PhysicalDisk: Average Disk Queue Length and Processor: % Processor Time), additional counters can be easily added or removed accordingly. A college administrator may add counters to monitor network bandwidth, server utilisation (memory, cpu performance, disk performance etc). To help administrators monitor the server, counter logs and alerts can be applied. This can enable administrators to proactively identify when system resources run too low or to identify possible hardware failures/malfunctions. Any one of these problems could result in a degraded performance or total server failure. Figure 5: Example of the Performance Console The college network may be required to support remote users, allowing them to access the college network whilst being in a different location eg working from home, from another campus etc. This can be achieved through the use of a Virtual Private Network (VPN). The user will be able to access the college’s network through the use of the internet whilst achieving the required security and data encryption. The network’s firewall must have exceptions to allow authenticated users to access the network whilst preventing unauthorised access. Once the network is running effectively, the next challenge administrators will face is maintaining the security and the efficiency of the network. This can be achieved by deploying server updates and hotfixes as provided by Microsoft. The server can be updated with the use of ‘Automatic Updates’, which can be found within the ‘All Programs’ menu under the start button. Updates can be downloaded either straight away or scheduled to download at a certain day/time. This could be configured to download when the network is at its quietest time (eg 10pm). This would ensure that the update would not effect the overall performance during busy periods. Also, updates for the users computers may be required. Instead of administrators physically installing them on every computer on the network, this could be downloaded on the server as an *msi file and automatically installed via a group policy. So the next time users within the network log onto the network, they will automatically be downloaded & installing the updates from the server with no intervention required.