Tuesday, December 31, 2019

Personal Info The Education System - 1198 Words

Personal Info: I became interested in Education in a Diverse Society because I enjoy diversity and how different people can come together to work or learn as one unit. Volunteering with children is what made me interested in education. Even though I have no plans in becoming a teacher, I would like to keep volunteering at schools and other events such as camps because I enjoy helping children develop their minds and learn various aspects that pertain to life. Attending school in America my whole life and knowing the ins and outs of the system and studying other international systems made me realize the immense differences in the education systems around the world from American school systems. These differences range from student-teacher†¦show more content†¦The punishment system could involve being detained after class, minimizing class activity time, negative points and letters to parents. I feel that students need to be kept in check at all times and that the reward and punishment system s would help the students stay on track because they would want to receive the reward and try to stay away from the punishment. The subjects in school that should be offered to students are several levels of math and science courses, philosophy, language arts including an intensive writing class, mandatory foreign language classes with a range of language preferences and electives such as art, theater, music/voice lessons and other creative forms of expression. Also schools should have a mandatory fitness class, ethics classes and optional cooking classes or other various electives. I believe these classes are a good balance to the student and would provide an enriching and rewarding learning experience. Each school has a different set of needs for their students. These needs may change due to socio-economic levels of the students in that school, whether the school has children with disabilities and many other factors. Therefore I believe that the principal if the school and the school heads should give the teachers the flexibility between what books they want to use and how to set up the classrooms. The school board of directors and the

Monday, December 23, 2019

Essay on Descartes Proof For The Existence Of God

Descartes Proof for the Existence of God The purpose of my essay will be to examine Descartes’ argument for the existence of God. First, I will review Descartes’ proof for the existence of God. Then I will examine the reasons that Descartes has for proving God’s existence. I will also discuss some consequences that appear as a result of God’s existence. Finally, I will point out some complications and problems that exist within the proof. The basic problem with most religions in the world has always been that they presuppose faith; that is one cannot be reasoned into believing in a religion, if such was not the case then we would have seen a huge migration to one religion or another. In any given religion, the main proof of God’s†¦show more content†¦That is to say that an idea cannot originate without a cause. The ideas can be less perfect than their cause, but they cannot be more perfect. He also explains that those ideas in us that apparently do not have formal reality, such as a mermaid, are merely combinations of other formal realities- in this case a woman and a mermaid -- and thus do not invalidate the rule. Descartes also explains the difference between being an idea and being merely an opposite of an idea. He uses heat and cold as his example; whereas heat is an idea, cold is simply non-existence of heat. That is a very important idea that he uses in his argument to exclude a potential critique of his argument. Descartes, after establishing his rules, explains that he knows that he is not perfect. He knows that because he doubts, and he can clearly see that knowing is more perfect than doubting. From that he determines that within him lies this idea of a perfect being, and that he is unable to come to such an idea by himself. Descartes concludes that such an idea must have a formal reality, a cause. This cause, he explains, could not have originated from a less perfect reality or being, since he has already established that ideas can be less perfect than their cause but never more perfect. He then determines that this idea could not have been composed of several ideas or causesShow MoreRelatedDescartes Proof Of The Existence Of God1609 Words   |  7 PagesOne of the most important ideas upon which Descartes’s proof of the existence of God rests is that rational minds face constraints. While God is the absolute infinite, humans and other beings exist with limitations on their actio ns. One of these limitations is human intellect, which Descartes names as one component of the cause of our tendency toward error as humans. The finite nature of human intellect, he argues, combines with an infinite will which causes us to seek an understanding of phenomenaRead MoreDescartes Proof for the Existence of God Essay3414 Words   |  14 PagesDescartes Proof for the Existence of God Many readers follow Descartes with fascination and pleasure as he descends into the pit of skepticism in the first two Meditations, defeats the skeptics by finding the a version of the cogito, his nature, and that of bodies, only to find them selves baffled and repulsed when they come to his proof for the existence of God in Meditation III. In large measure this change of attitude results from a number of factors. One is that the proof is complicatedRead MoreDescartes Proof for the Existence of God Essay example1562 Words   |  7 PagesDescartes Proof for the Existence of God The purpose of my essay will be to examine Descartes argument for the existence of God. First, I will review Descartes proof for the existence of God. Then I will examine the reasons that Descartes has for proving Gods existence. I will also discuss some consequences that appear as a result of Gods existence. Finally, I will point out some complications and problems that exist within the proof. The basic problem with most religions inRead MoreDescartes First Proof of The Existence of God Essays1407 Words   |  6 PagesThe 17th century philosopher Rene Descartes believed that God exists. His proof of an all perfect being’s existence was explained by having an idea of God that had to have been caused by God. But simply having an idea of God is not enough for there to necessarily exist such a being. This paper will critically examine Descartes’s causal argument though its premises and conclusion. Descartes makes an attempt to prove God’s existence throughout his third meditation. In his first premise he statesRead MoreComparing Socrates And Descartes On The Proof Of Existence Of God1759 Words   |  8 PagesComparison between Socrates and Descartes on the proof of existence of God. Socrates is who established ancient philosophy with Plato and Aristotle. His philosophy effects Western system of philosophy. He was born BC 470 in Athens and his father was a sculptor and his mother was midwife. He focuses teaching other people that philosophical argument in his life. He doesn’t want material for teaching because he doesn’t have material greed. His goals are verifying the oracle, question our belief, andRead MoreDescartes Proof of the Existence of God in Meditation Three Essay1026 Words   |  5 PagesDescartes Proof of the Existence of God in Meditation Three This paper is intended to explain and evaluate Descartes proof for the existence of god in Meditation Three. It shall show the weaknesses in the proof, but also give credit to the strengths in his proof. It will give a background of what Descartes has already accepted as what he truly knows. The paper will also state Descartes two major points for the existence of God and why the points can easily be proven false. The paper willRead More Descartes Third Meditation: Proof of Gods Existence Essay1370 Words   |  6 Pages Descartes Third Meditation: Proof of Gods Existence In Rene Descartes Meditations on First Philosophy, Descartes is seeking to find a system of stable, lasting and certain knowledge, which he can ultimately regard as the Truth. In his methodical quest to carry out his task, Descartes eventually arrives at the proverbial fork in the road: how to bridge the knowledge of self with that of the rest of the world. Descartesà ¢Ã¢â€š ¬Ã¢â€ž ¢ answer to this is to prove the existence of God. The purpose of this essayRead MoreDiscourse on Descartes Skeptical Method1672 Words   |  7 PagesSebastian Gumina Paper Topic #1 Descartes’ Skeptical Method Descartes’ method offers definitive conclusions on certain topics, (his existence, the existence of God)but his reasoning is not without error. He uses three arguments to prove existence (His and God’s) that attempt to solidify his conclusions. For his method to function seamlessly, Descartes needs to be consistent in his use of the method, that is, he must continue to doubt and challenge thoughts that originate in his ownRead MoreEssay about A Very Brief History on the Existence of God 1202 Words   |  5 PagesThe subsequent essay will provide a brief overview on the existence of God from Renà © Descartes through Immanuel Kant. First, section (1), examines Descartes’ proof for the existence of God. Section (2), explores G.W. Leibniz’s view on God’s existence in addition to his attempts to rectify the shortcomings of Descartes’ proofs. Before continuing, it is imperative to understand that both Descartes and Leibniz believed that th e existence of God could be proved via reason. The remainder of the essayRead MoreDescartes: Proofs of God/Deception and Error Essay1093 Words   |  5 PagesDescartes: Proofs of God/Deception and Error Instructions: First: Analyze and evaluate the two proofs of Gods existence. How are they different? Is one more convincing than the other? Why did Descartes think he needed two proofs? Do they do different work for him? And secondly: Does Descartes give a satisfactory account of human error, given a perfect and divine creator? Are Descartes arguments convincing, or does it still seem unnecessary and less than perfect that God created us with

Sunday, December 15, 2019

Apple Case Study 1 Free Essays

Apple Table of Contents: I. Introduction II. Opening Case III. We will write a custom essay sample on Apple Case Study 1 or any similar topic only for you Order Now Competitor Analysis IV. Sales Analysis V. Profitability Analysis VI. Cross Elasticity of Demand: Competitors v/s iPhone VII. Demand, Cost and Pricing VIII. Pure competition, Monopolistic Competition Oligopoly IX. Conclusion X. References I. Introduction Apple Inc. (Apple) designs, manufactures and markets a range of personal computers, mobile communication and media devices, and portable digital music players, and sells a range of related software, services, peripherals, networking solutions, and third-party digital content and applications. It’s products and services include Macintosh (Mac) computers, iPhone, iPad, iPod, Apple TV, Xserve, a portfolio of consumer and professional software applications, the Mac OS X and iOS operating systems, third-party digital content and applications through the iTunes Store, and a range of accessory, service and support offerings. The Company sells its products globally through its retail stores, online stores, and direct sales force and third-party cellular network carriers, wholesalers, retailers, and value-added resellers. As of September 25, 2010, the Company had opened a total of 317 retail stores, including 233 stores in the United States and 84 stores internationally. II. Opening Case: Apple reveals the iPhone MACWORLD SAN FRANCISCO—January 9, 2007—Apple ® today introduced iPhone, combining three products—a revolutionary mobile phone, a widescreen iPod ® with touch controls, and a breakthrough Internet communications device with desktop-class email, web browsing, searching and maps—into one small and lightweight handheld device. Phone introduces an entirely new user interface based on a large multi-touch display and pioneering new software, letting users control iPhone with just their fingers. iPhone also ushers in an era of software power and sophistication never before seen in a mobile device, which completely redefines what users can do on their mobile phones. â€Å"iPhone is a revolutionary and magical product that is literally five years ahead of any other mobi le phone,† said Steve Jobs, Apple’s CEO. We are all born with the ultimate pointing device—our fingers—and iPhone uses them to create the most revolutionary user interface since the mouse. † iPhone is a Revolutionary Mobile Phone iPhone is a revolutionary new mobile phone that allows users to make calls by simply pointing at a name or number. iPhone syncs all of your contacts from your PC, Mac ® or Internet service such as Yahoo! , so that you always have your full list of up-to-date contacts with you. In addition, you can easily construct a favorites list for your most frequently made calls, and easily merge calls together to create conference calls. iPhone’s pioneering Visual Voicemail, an industry first, lets users look at a listing of their voicemails, decide which messages to listen to, then go directly to those messages without listening to the prior messages. Just like email, iPhone’s Visual Voicemail enables users to immediately randomly access those messages that interest them most. Phone includes an SMS application with a full QWERTY soft keyboard to easily send and receive SMS messages in multiple sessions. When users need to type, iPhone presents them with an elegant touch keyboard which is predictive to prevent and correct mistakes, making it much easier and more efficient to use than the small plastic keyboards on many smartphones. iPhone also includes a calendar application that allows calendars to be automatically synced with your PC or Mac. iPhone fea tures a 2 megapixel camera and a photo management application that is far beyond anything on a phone today. Users can browse their photo library, which can be easily synced from their PC or Mac, with just a flick of a finger and easily choose a photo for their wallpaper or to include in an email. iPhone is a quad-band GSM phone which also features EDGE and Wi-Fi wireless technologies for data networking. Apple has chosen Cingular, the best and most popular carrier in the US with over 58 million subscribers, to be Apple’s exclusive carrier partner for iPhone in the US. iPhone is a Widescreen iPod Phone is a widescreen iPod with touch controls that lets music lovers â€Å"touch† their music by easily scrolling through entire lists of songs, artists, albums and playlists with just a flick of a finger. Album artwork is stunningly presented on iPhone’s large and vibrant display. iPhone also features Cover Flow, Apple’s amazing way to browse your music library by album cover artwork, for the first time on an iPod. When navigating your music library on iPhone, you are automatically switched into Cover Flow by simply rotating iPhone into its landscape position. Phone’s stunning 3. 5-inch widescreen display offers the ultimate way to watch TV shows and movies on a pocketable device, with touch controls for play-pause, chapter forward-backward and volume. iPhone plays the same videos purchased from the online iTunes ® Store that users enjoy watching on their computers and iPods, and will soon enjoy watching on their widescreen televisions using the new Apple TVâ„ ¢. The iTunes Store now offers over 350 television shows, over 250 feature films and over 5,000 music videos. Phone lets users enjoy all their iPod content, including music, audiobooks, audio podcasts, video podcasts, music videos, television shows and movies. iPhone syncs content from a user’s iTunes library on their PC or Mac, and can play any music or video content they have purchased from the online iTunes store. iPhone is a Breakthrough Internet Communications Device iPhone features a rich HTML email client which fetches your email in the background from most POP3 or IMAP mail services and displays photos and graphics right along with the text. Phone is fully multi-tasking, so you can be reading a web page while downloading your email in the background. Yahoo! Mail, the world’s largest email service with over 250 million users, is offering a new free â€Å"push† IMAP email service to all iPhone users that automatically pushes new email to a user’s iPhone, and can be set up by simply entering your Yahoo! name and password. iPhone will also work with most industry standard IMAP and POP based email services, such as Microsoft Exchange, Apple . Mac Mail, AOL Mail, Google Gmail and most ISP mail services. iPhone also features the most advanced and fun-to-use web browser on a portable device with a version of its award-winning Safariâ„ ¢ web browser for iPhone. Users can see any web page the way it was designed to be seen, and then easily zoom in to expand any section by simply tapping on iPhone’s multi-touch display with their finger. Users can surf the web from just about anywhere over Wi-Fi or EDGE, and can automatically sync their bookmarks from their PC or Mac. Phone’s Safari web browser also includes built-in Google Search and Yahoo! Search so users can instantly search for information on their iPhone just like they do on their computer. iPhone also includes Google Maps, featuring Google’s groundbreaking maps service and iPhone’s amazing maps application, offering the best maps experience by far on any pocket device. Users can view maps, satellite images, traffic information and get direct ions, all from iPhone’s remarkable and easy-to-use touch interface. iPhone’s Advanced Sensors Phone employs advanced built-in sensors—an accelerometer, a proximity sensor and an ambient light sensor—that automatically enhance the user experience and extend battery life. iPhone’s built-in accelerometer detects when the user has rotated the device from portrait to landscape, then automatically changes the contents of the display accordingly, with users immediately seeing the entire width of a web page, or a photo in its proper landscape aspect ratio. iPhone’s built-in proximity sensor detects when you lift iPhone to your ear and immediately turns off the display to save power and prevent inadvertent touches until iPhone is moved away. Phone’s built-in ambient light sensor automatically adjusts the display’s brightness to the appropriate level for the current ambient light, thereby enhancing the user experience and saving power at the same time. Pricing ; Availability iPhone will be available in the US in June 2007, Europe in late 2007, and Asia in 2008, in a 4GB model for $499 (US) and an 8GB model for $599 (US), and will work with either a PC or Mac. iPhone will be sold in the US through Apple’s retail and online stores, and through Cingular’s retail and online stores. Several iPhone accessories will also be available in June, including Apple’s new remarkably compact Bluetooth headset. iPhone includes support for quad-band GSM, EDGE, 802. 11b/g Wi-Fi and Bluetooth 2. 0 EDR wireless technologies. iPhone requires a Mac with a USB 2. 0 port, Mac OS ® X v10. 4. 8 or later and iTunes 7; or a Windows PC with a USB 2. 0 port and Windows 2000 (Service Pack 4), Windows XP Home or Professional (Service Pack 2). Internet access is required and a broadband connection is recommended. Apple and Cingular will announce service plans for iPhone before it begins shipping in June. III. Competitor Analysis Market Share by OS Nokia still has a third of the overall mobile phone market. The average selling price of a Nokia Smartphone fell by 21% from 2009. Nokia is selling plenty of devices, but they are at the cheap end of the market. They lost what some in the industry refer to as â€Å"mindshare† to Apple’s iPhone and the Google Android mobile software platform. Nokia wants to sell services – music, maps, and applications – as well as hardware but high-end phone users are looking elsewhere. The company says a new family of Smartphone’s, led by the N8 released in 2010, will revive its fortunes at the top end of the market. Nokia chief executive Stephen Elop was forced to abandon the mobile phone giant’s in September 2010. The news that the Finnish firm might only break even in the second quarter of this year slashed 25 per cent off its value in 24 hours. Mobile phone manufacturer Nokia has announced it will shed 7,000 jobs from next year as part of a plan to refocus the company on Smartphone. The Finnish firm is moving from Symbian to Microsoft’s Smartphone technology. The firm recently confirmed the deal with Microsoft last week to jointly develop Smartphone technology, which will cut costs by about 1bn Euros a year. Under the terms of that deal, Nokia agreed to start using the Microsoft’s operating system on its Smartphone instead of its own Symbian platform. Nokia’s response to the Smartphone threat from competitors such as Apple’s iPhone and phones using Google’s Android system has been long been a key investor concern. Prior to the iPhone, Nokia was the king of mobile handsets. Now its share of the Smartphone market has plunged from 47 per cent to 27 per cent. It has also lost its ranking as the largest handset maker in terms of revenue to Apple. Android When Google decided to get into the Smartphone business it decided that Android devices would be everything that the iPhone was not. Apple one or two handsets, Google on the other hand was laying out a great number of handsets. Manufacturers such as HTC, LG and Motorola could use the new operating system for free. It enabled Google to have phones for every section of the market – high powered and pricey, cheap and practical. Android’s real selling point would be the apps. Here too, the policy was one of openness. Apple controlled its App store controlling every submission and rejecting those that contravened its rules. For Android anyone who had written an app could upload it. At first, users and app developers welcomed the free-and-easy approach. However, some have begun to question if Google’s policy for the apps is the best way to manage the Market. Three years after its launch, hardware sales are booming. Yet sales of Android apps remain relatively poor. Estimates of Apple’s App store in 2010 were ? 1. billion. Android Market managed just ? 62 million. The figure was lower than both Blackberry App World (? 100m) and Nokia’s Ovi store (? 64m). Research predicts massive improvements for Android by this time 2012 but it is still expected to lag far behind iOS. Finally Android’s market share grew to surpass the Symbian platform used by Nokia making it the most sold Smartphone Microsoft Microsoft market share is declining in the Smartphone platform market. Windows Phone 7 lacks a number of features despite the innovation of its user interface. Microsoft hopes to gain market share once Nokia Windows Phones and its wide-ranging â€Å"Mango† software update get released later in 2011. Microsoft has unveiled the first major update to its Windows Phone 7 operating system it launched in 2010. The update, codenamed Mango, intdoduces more than 500 changes. Microsoft’s attempts to break into the Smartphone race have been mediocre at best. Currently, the company controls less than 4% of the market. Despite this, Microsoft’s Windows Phone 7 platform is forecasted to beat Android in 2013. Microsoft introduced Pocket PC in 2000, followed by Windows Mobile in 2003, prior to Apple and Android’s release. However it still failed to compete in the market, or rival Symbian who controlled nearly 90% of the market share. Microsoft lacked the features and compatibility that Symbian was featuring at the time, and as a result, consumers refused to recognize its product or give Microsoft the opportunity to be a contender in the Smartphone industry. The platform was notoriously sluggish and the most difficult of any platform to use. Microsoft tried to solve some of these issues with minor tweaks and software updates over the years to little or no avail. As Windows Mobile market shares continued to decline, Microsoft had no other option than to overhaul the Microsoft platform and launch Windows Phone 7 in 2010. Windows Phone 7 was much improved. But Microsoft still failed to take control of the market, or garner any real significant attention from consumers. RIM Research In Motion has given up more ground to Apple and Google in the hypercompetitive Smartphone market, a report shows, while two brokerages cut their price targets for the BlackBerry maker on concerns it can no longer keep pace. The latest figures dropped RIM from second to third place. The Canadian company’s struggle to compete is unlikely to get any easier, with Apple’s upcoming iCloud service expected to hurt RIM. IV. Sales Analysis Apple  produced some stellar results: revenues up 48% year-on-year to $13. 5bn, and profits up. The process is confused because  Apple has begun restating its year-ago earnings, to take into account the fact that it now recognizes income and revenue from subscription-based products such as the  iPhone(which may be sold on an 18-month contract) as soon as it gets it, rather than deferring it over the life of the device/contract as it used to. It began doing that in the most recent quarter, covering Christmas, which – confusingly – is the first quarter of its financial year. So previously, the second-quarter revenues were $8. 16bn, not the newly-restated $9. 08bn; the profits were $1. 21bn, not the now-given figure of $1. 62bn. The numbers also don’t include the iPad, because the quarter ended on March 31 – the iPad was launched three days later. According to MacJournals, which chewed over the numbers, â€Å"At $5. 445 billion, iPhone sales accounted for 40% of Apple’s revenue. All Mac sales were 28%, all  iPod/Music sales were 24%. Mac sales are 2. 943m units, generating revenue of $3. 76bn – which Apple says was 33% year-on-year growth, compared to market growth of 24%. The company’s market share of mobile subscribers has also taken a deep plunge. Market research firm comScore says that between October and January, Microsoft’s share of the market fell from 19. 7% to 15. 7%. RIM, the maker of the BlackBerry, remained the leader, growing from 41. 3% to 43%. Apple ‘s iPhone increased slightly, from 24. 8% to 25. 1%, and Google’s Android grew by more than 250%, going from 2. 8% to 7. An interesting analysis comes from Tomi Ahonen, a former Nokia executive. â€Å"I am writing the first history of the once-iconic iPhone, written now in early April 2010, before Apple has released its first quarter earnings for 2010. This is literally the peak of the short reign that Apple’s iPhone had as the most emulated Smartphone. [†¦] And mark my words, the numbers are now very clear, Apple’s market share peak among smartphones, and among all handsets, on an annual basis, is being witnessed now. † V. Profitability Analysis Apple reported in the second quarter of 2011 that net income rose 95 percent, to $5. 9 billion, or $6. 40 a share, from $3. 07 billion, or $3. 33 a share, in 2010. Revenue climbed 83 percent, to $24. 67 billion, from $13. 5 billion. The profit margin in 2011 is 22. 36% of the sales which is an improvement over the level the company achieved in 2010. The company’s return of equity is 38. 78% while in 2010 it was 26. 2% which means that there is a 12. 58% increase on the return of equity. The gross margin is 39. 07% which is slightly better than the company achieved in 2010. VI. Cross Elasticity of Demand: Competitors V/s iPhone When the iphone 3GS was released on July 11, 2008 it cost $199 with the AT;T two year contract. In January 2011 Apple cut the iphone 3GS price to $50. cross-price elasticity of demand = % ? in demand for product A% ? in price for product B %? in price for iphone: Price of Iphone 3GS, 2010 + Price of Iphone 3GS, 2011? Price of Iphone = 199 + 5050-199 = -1. 671% With the Market share OS table above we can compute the % ? I demand for prodct competing with the iphone. %? in demand for Symbian = Symbian market share of Q1 2011 – Symbian market share of 2010 = 27. 4% – 37. 6% = -8. % Symbian-iphone cross-price elasticity of demand = % ? in demand for Symbian% ? in price for Iphone = -8. 6%-1. 671% = 5. 146 %? in demand for Android = Android market share of Q1 2011 – Android market share of 2010 = 36% – 22. 7% = 13. 3% Android -iphone cross-price elasticity of demand = % ? in demand for Android% ? in price for Iphone = 13. 3%-1. 671% = -7. 959 %? in demand for R IM = RIM market share of Q1 2011 – RIM market share of 2010 = 12. 9% – 16. 0% = -3. 1% RIM -iphone cross-price elasticity of demand = % ? in demand for RIM% ? in price for Iphone = -3. 1%-1. 671% = 1. 855 ? in demand for Microsoft = Microsoft market share of Q1 2011 – Microsoft market share of 2010 = 3. 6% – 4. 2% = -0. 6% Microsoft -iphone cross-price elasticity of demand = % ? in demand for Microsoft % ? in price for Iphone = -0. 6%-1. 671% = 0. 359 The price elasticity of demand is the responsiveness of quantity demanded by a change of 1 percent in price. It is calculated by dividing the percentage change in the demanded quantity by the corresponding percentage change in price. The iPhone was launched in the US roughly at the beginning of the second Quarter 2008, at a price of $599. In mid September Apple reduced the price for the iPhone by 33% from $599 to $434. According to the quarterly reports, Apple sold 270 000 iPhones in the second quarter and 1,119 000 iPhones in the third quarter. If calculated according to the equation for price elasticity of demand, the iPhone would have a price elasticity of 4. 7, which means that Apple would lose almost 4. 7 percent of iPhone sales for each corresponding 1 percent increase in price. Since elasticity is greater than 1 the price is inelastic so the iPhone is a luxury commodity. Many consumers wait until increased competition forces Apple to decrease prices. VII. Demand, Cost ; Pricing Demand Apple’s iPhone Supply and Demand Concept of Supply and Demand There is a general rule in economics that if the price of a certain good or service rises, then the demand for such good or service declines. If the price decreases, then potential demand also increases (inverse relationship). On the supply side, if the price of a good or service increases, then firms will be willing to supply the market with higher volume of such good or service. If the price decreases, then firms will cut their supply of the good or service (positive relationship. The market then adjusts the price of the good or service in order to satisfy both the consumers and the suppliers. This is called market equilibrium. Apple iPhone Demand Last July, Apple iPhone was able to outsell all smart phones in the United States. It almost equaled the sales of the most popular feature phone (LG chocolate), giving it a relatively stable position in the market. New Apple handset models accounted for almost 1 . of all phone handset sales in the US for about a month. It was estimated that the demand for Apple iPhone was rising at7 . 2 a month, equivalent to about 5 million units of quantity demanded. The market research firm iSuppli noted â€Å"This is a remarkable accomplishment for Apple, considering that July marked the first full month of sales for the iPhone. While iSuppli has not collected historical information on this topic, it’s likely that the s peed of the iPhone ‘s rise to competitive dominance in its segment is unprecedented in the history of the mobile-handset market (Marsal ,2007 . In short , almost unexpected rise in demand of Apple iPhone was unaccounted by many experts , including of which are some of its competitors . The same research firm also noted that survey revealed that almost 57 of iPhones (bought in July ) were purchased by US consumers . Most of the consumers are aged 17-35. Almost 52 of the consumers of this product are male, and about 48 are female, revealing an almost equal propensity to consume for the product among the sexes. Added to that, iSuppli noted that 62 of the consumers of the product are actually college graduates or those with graduate courses . Nonetheless , the same research firm noted that â€Å"some of the iPhone ‘s success in July can be attributed to pent-up demand following months of hype (stagnant demand). Real proof of success will come in the coming months as demand patterns stabilize (Marsal, 2007). This prediction was almost accurate when the demand for iPhone was almost rising at 8 per month (month of June). Cost Apple’s Iphone 4 smartphone, for which it’s charging at least $500 at retail, is built of parts that cost $187. 51, according to market research firm Isuppli. According to the tear-down the most expensive part of the Iphone 4 is the 3. 5-inch LCD screen which costs $28. 50. Isuppli thinks that the Iphone 4 screen must be identical to one made by LG. It seems that Apple has managed to keep its parts cost at about $170 to $180 per unit. Isuppli’s cost estimate doesn’t include labour, shipping, advertising, software development or patent licensing. The cost is based on a 16GB version of the Iphone 4 but the low costs of each componant are fairly staggering. The Apple A4 processor reportedly is made by Samsung Electronics for $10. 75 per chip. Isuppli thinks that Geneva-based STMicroelectronics supplied the gyroscope chip at an estimated cost of $2. 60, as well as an accelerometer chip used in previous Iphone versions, which has an estimated cost of 65 cents. Other component suppliers named by Isuppli include Skyworks, a wireless chipmaker and TriQuint Semiconductor. In 2009, Isuppli estimated that the components and materials used in the iPhone 3GS cost about $179. Since then Isuppli thinks that the materials costs for that model have fallen to $134. Thus the Iphone 4 costs a bit more to make than the earlier model. Of course this means that Apple’s gross margin on the hardware in Iphones is extremely high. The actual price margin gets obscured by the fact that ATT heavily subsidises the phone in the US for about what it costs to manufacture. However the real winner is Apple, which does not have to pay for the cost of manufacture and still takes home about three times Iphone 4 production costs, on average. Pricing Because the iPhone price is entirely set by Apple, it makes an interesting case study on how much the price of technology drops over time. The official price of the iPhone periodically drops, as shown in the table below. But, there are no sales and a new iPhone is never sold for less than the official price. (There are occasionally sales on the refurbished iPhones for example on black Friday the refurbished 3GS was sold for $50. 00 instead of the usual $150. 00. )   Finding historical street price data is harder than historical MSRP data. For the iPhone both prices are the same. The table showing the historical price is included below. 1st Gen 4GB| 1st Gen 8GB| 3G| 3GS 16GB| 3GS 32GB| 29 June 2007| $499. 0*| $599*| N/A| N/A| N/A| 5 Sept 2007| Discontinued| $399| N/A| N/A| N/A| June 2008| N/A| N/A| $199| N/A| N/A| June 2009| N/A| N/A| $99| $199| $299| VIII. Pure competition, Monopolistic Competition Oligopoly Apple Inc. planned to begin producing this year a new iPhone that could allow U. S. phone carriers other than ATT Inc. to sell the iconic gadget, said people briefed by the company. The new iPhone would work on a type of wireless network called CDMA, these people said. CDMA is used by Verizon Wireless, ATT’s main competitor, as well as Sprint Nextel Corp. nd a handful of cellular operators in countries including South Korea and Japan. The vast majority of carriers world-wide, including AT;T, use another technology called GSM. With Apple developing a phone with CDMA capability, its exclusive U. S. arrangement with AT;T dating to 2007 appears set to end. Verizon Wireless, owned by Verizon Communications Inc. and Vodafone Group PLC, declined to comment. An AT;T spokesman said: â€Å"There has been lots of incorrect speculation on CDMA iPhones for a long time. We haven’t seen one yet and only Apple knows when that might occur. † Apple declined to comment. For AT;T, the Apple relationship has been crucial, helping to make the carrier the U. S. leader in lucrative smart-phone market share. According to comScore Inc. , AT;T has over 43% of all U. S. smart-phone customers, compared with 23% for Verizon. These customers are especially attractive because they generally pay higher monthly rates for data plans. For several quarters, AT;T’s growth has come almost single-handedly from the iPhone. In the fourth quarter of 2009, the carrier said it activated 3. 1 million new iPhones. In comparison, it counted only a net total of 2. million new subscribers as some customers moved from other phones to iPhones. Now that a new Verizon-compatible iPhone appears to be on the horizon, Digits looks at what Apple can do to win over mobile business users, particularly from RIMM’s BlackBerry market. The people briefed on the matter said the upgraded GSM iPhone is being made by Taiwanese contract manufacturer Hon Hai Precision Industry Co. , wh ich produced Apple’s previous iPhones. The CDMA iPhone model is being made by Pegatron Technology Corp. , the contract manufacturing subsidiary of Taiwan’s ASUSTeK Computer Inc. said these people. One person familiar with the situation said Pegatron is scheduled to start mass producing CDMA iPhones in September. Other people said, however, that the schedule could change and the phone may not be available to consumers immediately after production begins. Representatives of Pegatron and Hon Hai declined to comment. Verizon has publicly stated its interest in the iPhone, but people familiar with the situation said Apple originally decided against developing a phone for Verizon to keep its development process simple, since the technologies are incompatible. Verizon also is upgrading its network to a higher-speed technology, so Apple has said it believed CDMA was a short-term technology. Apple later changed its mind as it realized Verizon’s upgrade would take longer than expected, said people familiar with the situation. Making the iPhone available through Verizon, which has over 91 million customers, as well as potentially other CDMA carriers could open up a significant new market. In 2009, iPhone sales globally rose 83% to 25. million, far outpacing the 20% to 25% growth in smart phones sales overall, according to Bernstein. But since Apple already dominates smart-phone sales through existing partners, â€Å"sooner rather than later, Apple is going to have to look to find incremental distribution,† which implies a monopolistic competition between all smart phone sellers, said Bernstein analyst Toni Sacconaghi. He estimates Verizon could help Apple nearly double the number of iPhone users in the U. S. Some advantages that iPhone has comparing to other smart phones are: 1. Pod: iPhone is a not just a phone it is widescreen iPod with touch controls that lets you enjoy all your content — including music, audiobooks, videos, TV shows, and movies — on a beautiful 3. 5-inch widescreen display (Nokia N95 only has a 2. 6 inch screen). The N95 does have a good media player, however with all the iPod features and 4 GB / 8 GB space, it makes the iPhone the best music phone. 2. Advanced Safari browser: iPhone lets you see any web page the way it was designed to be seen, then easily zoom in by simply tapping on the multi-touch display with your finger which will change mobile browsing for the good. . OS X: All the power and sophistication of an advanced operating system that gives you access to true desktop-class applications and software, including rich HTML email, applications such as widgets, Safari, calendar, text messaging, Notes, and Address Book etc. iPhone is fully multi-tasking, so you can read a web page while downloading your email in the background. This software completely redefines what you can do with a mobile phone. 4. User Interface: iPhone features the most revolutionary user interface since the mouse. It’s an entirely new interface based on a large multi-touch display and innovative new software that lets you control everything using only your fingers. 5. Visual Voicemail: The iPhone lets you select and listen to voicemail messages in whatever order you want — just like email using a revolutionary new feature called the visual voicemail. IX. Conclusion Analyzing as managerial economics students, we can conclude that although the current methods and techniques are serving us well in analyzing the current market situation, there will be new techniques emerging in the future with global changes occurring at leaping speeds. What is essential is for us to grasp is that the theory is flexible with these changes and that it can be shaped or rounded to be applied to any market situation analysis. The content and subjects we learned in this course are nothing but the bedrock tools that any manager needs to know and use in his daily life in order to forecast revenues and demand, analyze current markets and evaluate his company’s stance regarding his competitors. X. References ttp://theblogpaper. co. uk/article/business/31may09/price-elasticity-demand-iphone http://news. cnet. com/8301-13506_3-20064223-17. html http://www. bbc. co. uk/news/business-10725887 http://www. bbc. co. uk/news/uk-13284156 http://m. ibtimes. com/microsoft-windows-phone7-google-android-apple-157595. html http://www. reuters. com/article/2011/06/03/us-rim-research-ubs-idUSTRE7523PP20110603 www. newyorktimes. com www. wallstreetjournal. com How to cite Apple Case Study 1, Free Case study samples

Saturday, December 7, 2019

Cloud Computing and Current Solutions †Free Samples to Students

Question: Discuss about the Cloud Computing and Current Solutions. Answer: Introduction In information technology the number of threats and the organisational risk factors are increasing day by day. It is seen that the organisations are facing lots of risks and threats from both inside and outside of the organisation (Aldunce et al., 2015). There are also various types of risks present in an organisation on the basis of the nature. Natural calamities like storm and earthquake can also lead to the organisation risk factors. Hacking, malware and virus are also reasons of the security issues. There are many differences between the risk and the uncertainty. VIC government has provided a list or guidance of regulations which can make the system more advanced in terms of security. In this report the risk factors are discussed in details with a diagram. The risk management methods and regulations of the VIC government are also discussed in the following discussions of the report. Explanation of the diagram and identification of different levels of risk exposure. The diagram explains the structure of the flow of the factors in an organization. It has also provided an outline about risk management regulations of the VIC government. There are many factors of making the system vulnerable. Most of the factors are dependent upon various risks and threats. In the diagram all the possible threats are given in accordance with their place and moment of occurrence (Becken Hughey, 2013). The risks are classified into two parts. One is the internal risks and the other is the external risks for the organization. The internal risks are generated due to various issues regarding the internal functioning of the organization. Another important factor is that the organization has many possible ways of creating threats and uncertainties by itself (Bianco et al., 2017). The internal risk factors can also be divided into two parts and those are deliberate threat and accidental threat. In case of accidental threats the cause is not due to individuals action. Accidental risk factors are caused due to several causes like power loss and lack of internet connection and many more. These factors are only considered inside the organization. In case of deliberate threats the reasons behind the threats are generated due to individual motive. In case of organizational risk the people who are working in the organization make cause threats and risk factors into the system of the organization so that the organization faces difficulties and loss of productivity. Unauthorized access, data loss and intrusion can be c onsidered as the problems regarding the functioning of the possible risk factors inside the organization (Brindley, 2017). Data breach can also be an important factor that can be used by the employees of the organization to harm it. Another type of risk is the external risk. External risk can occur due to the reasons initiated externally from the organizations. This type of risk factors is the most common risk factors. Hackers and other unwanted access are always making various kinds of risks to the system of the organization. Risks can also be divided into two parts according to the nature of the risk factors. The risk factors can be also determined by the nature of the risks. One is environmental risk and the other is human made risks (Chance Brooks, 2015). The environmental risks factors are also important in case of making the system more vulnerable. Natural disasters like earthquake, storm and sudden temperature change of the environment can cause a big damage to the system. I n the right most side of the diagram the risk management steps are shown as per the VIC government rules and regulations. To decrease the risk factors first the risk should be identified properly so that it can be fought properly. Then the mitigation of the risk factors is done by decreasing the reasons behind the risks. In case information technology the ICT security risks are also important factor (Davies, 2014). There are also many layers presenty in the risks management system. The main thing is that the risks must be clearly understood from the point of effect it can reach. Several risks are given various levels with respect to their vulnerability. These levels can be divided into three parts. Those are high, medium and low risk respectively. The main effects of the risks, which are also the main factors for the failure of organisations functioning, lead to several damages (DeAngelo Stulz, 2015). Those risks which lead to the failure of most of the organisations functioning an d also very vulnerable in terms of making the system endangered are known as the high risk factors. Examples of such risks are hacking, intrusion, failure of the total power system of the organisation. These types of risk factors are also important in case of making the system more vulnerable and also the source of these risks can be both internal and external with respect to the organisation (Ferguson at al., 2013). The natural risks like earthquake, storm is also considered to be high risk factors for the organisations. Medium level risks are data loss of the servers. This kind of data loss is also important in case of making the organisational background more vulnerable and also the importance of the risk factors is of medium nature (Glendon, Clarke McKenna, 2016). Sudden power loss and sudden loss of network connections are also considered to be low risk factors for the organisation. These risk factors should also be given equal priority in case of solving them and also these r isk factors are to be solved with respect to the organisational point of view. Comparison between Deliberate and Accidental Threats and ranking of threats according to the importance Threats are created by different types of reasons which can be divided in two different ways. These are deliberate threats and accidental threats. The deliberate threats are those which are created by intention by individuals or group of individuals (Heazle et al., 2013). Deliberate threats can be from the inside or from the outside of the organisation. In case of deliberate threats external deliberate threats are hacking, intrusion and data loss of the organisation by some external people. The access of the unwanted people can lead to the threats which are also very important in case of making the deliberate one (Holt, Smirnova, Chua Copes, 2015). The main aim of the risk management process is to cancel out the deliberate threats. Deliberate threats can be considered as the high level risk factors for the organisations. As the information of the public is the most important thing in information technology market, it is given the highest priority (Tadeusiewicz Horzyk, 2014). Hackin g and data intrusion can be big risk factors for the public information. These kinds of risks are also referred to high level risk factors. From that point of view of the organisation is responsible for the risks which are caused internally as the deliberate threats are also caused from the inside of the organisation. In case of organisational risks the main source of the risks are the data loss by the employees which are also considered as deliberate threats. These kinds of deliberate threats are of highest priority also (Hopkin, 2017). Another type of risks is the accidental risk factor as the risk factor is caused by uncontrolled reasons. Environmental and natural risks are of this type. This type of risks is of both high and low priority. As the risk factors which are caused by the natural disasters like earthquake and storms, are considered to be the high risk factors. Also the risk factors like sudden power cut and the loss of internet connection are considered to be of relati vely low risk factors. Explanation of the challenges of VIC government regarding the internal and external risk management The IT risk management is a challenging task for the organisation in case of making the organisations free from the reasons which causes vulnerabilities to the system (Reason, 2016). It is already discussed that the risks can be of two types and those are respectively internal and external risk factors. In case of risk management the risk factors are also managed by the organisation in such a way that there are two different methods for dealing with the internal and external risks. The patterns of the internal risks are completely different from that of the external risk factors (Howard Beasley, 2017). In case of internal risk factors the employees of the organisations are sometimes liable for that. In that case the organisations should be very strict with the employees. The main actions that can be taken by the organisation administration should be in such a way that the internal risks are demolished from the organisation (Howes et al., 2015). The advantage in case of the internal risk factor is that the organisation has the control on the risk factors. In case of the external risk factors the reasons behind the risks cannot be controlled. The organisation should be more careful and constructive in case of external risk management (Kettl, 2015). The main advantage of the external risk factor is that it can be caused not intentionally sometimes. For that reason the organisation should be more technically sounded for opposing the risk factors. There are lots of differences between the risk and uncertainty. Risks are those which actually happen due to predefined reasons (Lam, 2014). The uncertainties cannot be understood previously. The main advantages of the risk analysis are that the reasons behind any risks are already known to the organisation. The risks can be controlled by taking previous precautions on the basis of the nature of the risks (Lawrence et al., 2015). In case of the uncertainties the main disadvantage is that the precautions cannot be taken previously as the reasons behind the uncertainties are not known. The time of happening of the risks can also predefined but the time and duration of the uncertainties can never be understood previously. The main advantage of making the risk management in a proper way, is to make the system secure. Discussion and evaluation of several methods available to the VIC government for risk management In this part of the report the risk management methods are discussed in details. The VIC government has created lots of methods that will help to create the system more secure. The VIC governments have also created many rules and regulations which should be followed in order to make the system fight the risk factors (McNeil, Frey Embrechts, 2015). The main advantage of making the risk management procedures are that the organisations can rely on the standards in case of opposing the risk factors. VIC government has created many laws and protocols for risk management. The first one is the privacy and data protection act 2014 (Paton et al., 2014). The Victorian protective data security framework is also designed to make the system secure. The main features of the security acts are making the framework, issuing the framework and then to monitor and regime the data security frameworks related to the organisations. The public sector data and the protective data security acts are also impo rtant in case of making the system more secured. In this case same features are also taken in order to implement the laws in proper way (Poniszewska-Mara?da, 2014). The primary step of this law is to develop and documenting the security framework. Then the standards, policies and the guidelines are also designed to make the system more secure. Compliance should also be delivered in order to overcome the risk factors. The information access should be also followed properly in order to make the system more secure and to overcome the risks. The security requirements should also be monitored properly and the reasons should be understood properly. Security awareness and training should be provided more so that the organisations can deal with such employees and public who are reliable enough to access the system securely. The service providers should be contracted so that the security is ensured (Pritchard PMP, .2014). The government rules and regulations should also be followed properly . Information value is also an important factor in case of making the system more secured with respect to the organisations. The security should be provided according to the value of the information. The organisations also follow the regulations in Case of sharing the information with other organisations. Conclusion From the above discussion it is concluded that several organisations face a lot of risk factors and to make the information secured all the regulations which are made by the VIC government, should be followed properly. Public personal information is the most important data from the security point of view. Organisations give public information the highest priority. The main advantage making the system more secured is that the public reliability is increased on the organisation and also the quality of the service is better. To overcome all the risk factors it is also important to identify all the risks and to understand the reasons behind the possible risks. It is also understood that there is a basic difference between the risk and the uncertainties as the risk can be controlled but the uncertainties cannot be controlled and mitigated. All the challenges which are faced by the VIC government in case of making the risk management regulations are also discussed with respect to the inter nal and the external risks. References Aldunce, P., Beilin, R., Howden, M., Handmer, J. (2015). Resilience for disaster risk management in a changing climate: Practitioners frames and practices. Global Environmental Change, 30, 1-11. American Diabetes Association. (2016). 8. Cardiovascular disease and risk management. Diabetes care, 39(Supplement 1), S60-S71. Becken, S., Hughey, K. F. (2013). Linking tourism into emergency management structures to enhance disaster risk reduction. Tourism Management, 36, 77-85. Bianco, R. J., Arnoux, P. J., Wagnac, E., Mac-Thiong, J. M., Aubin, C. . (2017). Minimizing pedicle screw pullout risks: a detailed biomechanical analysis of screw design and placement. Clinical spine surgery, 30(3), E226-E232. Brindley, C. (Ed.). (2017). Supply chain risk. Taylor Francis. Chance, D. M., Brooks, R. (2015). Introduction to derivatives and risk management. Cengage Learning. Cole, S., Gin, X., Tobacman, J., Topalova, P., Townsend, R., Vickery, J. (2013). Barriers to household risk management: Evidence from India. American Economic Journal: Applied Economics, 5(1), 104-135. Davies, J. C. (2014). Comparing environmental risks: tools for setting government priorities. Routledge. DeAngelo, H., Stulz, R. M. (2015). Liquid-claim production, risk management, and bank capital structure: Why high leverage is optimal for banks. Journal of Financial Economics, 116(2), 219-236. Ferguson, B. C., Brown, R. R., Frantzeskaki, N., de Haan, F. J., Deletic, A. (2013). The enabling institutional context for integrated water management: Lessons from Melbourne. Water research, 47(20), 7300-7314. Glendon, A. I., Clarke, S., McKenna, E. (2016). Human safety and risk management. Crc Press. Heazle, M., Tangney, P., Burton, P., Howes, M., Grant-Smith, D., Reis, K., Bosomworth, K. (2013). Mainstreaming climate change adaptation: An incremental approach to disaster risk management in Australia. Environmental Science Policy, 33, 162-170. Holt, T. J., Smirnova, O., Chua, Y. T., Copes, H. (2015). Examining the risk reduction strategies of actors in online criminal markets. Global Crime, 16(2), 81-103. Hopkin, P. (2017). Fundamentals of risk management: understanding, evaluating and implementing effective risk management. Kogan Page Publishers. Howard, D. L., Beasley, L. M. (2017). Pregnant with a perforated levonorgestrel intrauterine system and visible threads at the cervical os. BMJ Case Reports, 2017, bcr-2017. Howes, M., Tangney, P., Reis, K., Grant-Smith, D., Heazle, M., Bosomworth, K., Burton, P. (2015). Towards networked governance: improving interagency communication and collaboration for disaster risk management and climate change adaptation in Australia. Journal of Environmental Planning and Management, 58(5), 757-776. Kettl, D. F. (2015). The job of government: Interweaving public functions and private hands. Public Administration Review, 75(2), 219-229. Lam, J. (2014). Enterprise risk management: from incentives to controls. John Wiley Sons. Lawrence, J., Sullivan, F., Lash, A., Ide, G., Cameron, C., McGlinchey, L. (2015). Adapting to changing climate risk by local government in New Zealand: institutional practice barriers and enablers. Local Environment, 20(3), 298-320. McNeil, A. J., Frey, R., Embrechts, P. (2015). Quantitative risk management: Concepts, techniques and tools. Princeton university press. Paton, D., Johnston, D., Mamula-Seadon, L., Kenney, C. M. (2014). Recovery and development: perspectives from New Zealand and Australia. In Disaster and development (pp. 255-272). Springer International Publishing. Poniszewska-Mara?da, A. (2014). Selected aspects of security mechanisms for cloud computingcurrent solutions and development perspectives. Pritchard, C. L., PMP, P. R. (2014). Risk management: concepts and guidance. CRC Press. Reason, J. (2016). Managing the risks of organizational accidents. Routledge. Tadeusiewicz, R., Horzyk, A. (2014, November). Man-Machine Interaction Improvement by Means of Automatic Human Personality Identification. In IFIP International Conference on Computer Information Systems and Industrial Management (pp. 278-289). Springer, Berlin, Heidelberg.

Friday, November 29, 2019

Women and the Material Culture of Needlework and Textiles

This book focuses on a greater scope of the involvement of women in the production of textiles and the author presents it in a way of a historical literature. There have been other literary accounts of women and textile but most of the books concentrate on the home-based factory.Advertising We will write a custom book review sample on Women and the Material Culture of Needlework and Textiles specifically for you for only $16.05 $11/page Learn More This book has broadened the research by focusing on a larger scope of the women in the textile industry. The entry of women in other aspects of life such as social, political, economic, ethnic, and cultural aspects began with their involvement in the textile industry. The book depicts the fact throughout its entire text. Apparently, the needle and textile industry has not been accorded due attention by most scholars, but this book has given great insight on this subject. This book has given the needle and texti le industry a historic recognition alluding to their impacts and influence to the present innovations. The book has shown how different gender and ethnic identities formed with the involvement of women in this industry. This is when the feminine culture arose and the introduction of economic empowerment of the women began. The book is actually a collection of essays by different authors. The discussion revolves around a certain dress that was made with concealed trousers and the dress is commonly referred to as the â€Å"Willard dress.† The Willard Dress, though we cannot find any existing examples, symbolizes the ways that the individual embroidery could take on not only realistic but political scopes, in the customs that women endeavored to poise their personal political schedules, like suffrage, with manifestations in order to uphold a firm modesty in an antagonistic political atmosphere. These political ideas are drawn more openly in Part III, â€Å"Politics, and Design in Yarn and Thread.†Advertising Looking for book review on history? Let's see if we can help you! Get your first paper with 15% OFF Learn More The editors describe politics reasonably at this point, to their recognition, acknowledging the politics of the women culture at the back, knitting for militia during a period of war. Most of the essays outline the customs that material manufacture shifted from a woman’s requirement to the formation of textile items surrounding an enormous compilation of meanings. For instance, one of the essays examines the launch of the home embroidery appliance into the countryside during the post-World War II Canada, permitting women to not only scrimp and save their own home’s possessions, but also to maintain the most modern fashions for themselves and their families. Women took incredible satisfaction in their designs, acknowledging the way that they customized the designs to make individualized patterns that represent ed their own identity. In the essays, some authors argue that quilting liberated the industry by offering cheap fabric that was affordable to all the women across all the social classes available at that time. The book shows how women used stitching to save and preserve cultural and family records that would serve records of family history. The quilts are the perfect texts that can be used to trace and explain the culture of women. During this era as the book alludes, there were many cultural practices that shaped the behavior and conduct of women even in the present day generation. The book shows clearly the intersection of race and ethnicity and textiles. Quilting introduced the Western missionaries who also turned to be the oppressors of their subjects. Concisely the book shows how the women cultural practices introduced the political outfits in the African world. Similarly, restorations in the art of the Mandala, â€Å"the conventional Puerto Rican art of handmade bobbin lace,à ¢â‚¬  symbolize reinforcement in Puerto Rican ethnic uniqueness that has helped encourage the traveler’s trade. Amusingly, Mandela also continues to back Puerto Rico’s long account of relocation and the conflict and associations linking original, African, and European traditions. In addition, the formation of mundillo for American expenditure shows the island’s place in a superior history of work and abuse in the twentieth century, as the formation of market merchandise commence to shift to cheaper, and less easily synchronized, locales.Advertising We will write a custom book review sample on Women and the Material Culture of Needlework and Textiles specifically for you for only $16.05 $11/page Learn More Although this appraisal cannot assert to be comprehensive, the effort under contemplation is an outstanding input to the increasing field of material culture studies. The contributor signifies an extensive collection of discipline —the editor’s verdict to embrace quite a few museum curators in the position of these writers, for instance, gives the work a unique viewpoint. The striking illustrations also present an extra length of each author’s argument. While there are definite stories that motionlessly remain a plain debate about the function of women in sweatshop manual labor in the behind schedule twentieth century comes to mentality ,the essays in this quantity would nevertheless hand-round not merely as an outstanding accompaniment to upper-level learner or graduate route in history, myths, women’s studies, or museum studies. From an erudite standpoint, they present motivation into the infinite empire of the connotation of women’s work, in addition to the transfer in women’s job over time. This book represents the ideal women’s culture and the influence of the material industry especially in the textile industry on women’s culture. The term material culture was first used in the 19th century and early 20th century to refer to the relationship between artifacts and social relations. Materials have greatly influenced the African culture in a number of dimensions. The African culture takes many forms and the material used in different cultures shapes all these forms. The book has clearly outlined the impact and the social balances and imbalances based on gender orientations. Gender disparities have been based on materials and cultural beliefs that have borrowed significant practices from the same.Advertising Looking for book review on history? Let's see if we can help you! Get your first paper with 15% OFF Learn More The book is a good collection of essays written by many people who have specialized in the study of artifacts. This book therefore is a legitimate source of information in regards to African culture. The arguments and debates presented are well organized and quite convincing. The book is insightful and detailed touching on all aspects of African culture. Textiles are part of the African culture and cannot be detached from them. It has been a culture within the African people for a number of centuries and in West Africa, this culture is still embraced. Textile has many myths and spiritual meanings and some symbolize some good and bad omens. As suggested in the book, women’s culture was created around the textile and needle industry. The current modern woman started her formation from the error of needles and textile. The textile industry gave the women financial empowerment and hence giving them a highway to greatness and liberty. With the empowered women, the possibility of h aving a democratic society was realized and that is why it is correct to say that women are the backbone of modern civilization. This book review on Women and the Material Culture of Needlework and Textiles was written and submitted by user Haven F. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Monday, November 25, 2019

Comprehensive Immigration Reform Opposition

Comprehensive Immigration Reform Opposition Arguments against Comprehensive Immigration Reform Perhaps the most widely held objection to comprehensive immigration reform is that it is amnesty  for people who have broken the law, and amnesty will only encourage more illegal immigrants to  come into the country. Opponents point to immigration reform efforts during the Reagan administration, the Immigration  Reform and Control Act of 1986, that granted amnesty to illegal immigrants. That reprieve opened  the door to a new wave of illegal migration, opponents say, and so will the plan to allow 11  million illegal residents to stay in the country. But Sen. John McCain, R-Ariz., one of the Senates Gang of Eight who helped fashion the  framework for comprehensive reform, makes the case that doing nothing about the 11 million   illegal residents is in itself a de facto amnesty. Because the federal government has no  realistic capability to deport the 11 million, or to incarcerate them, there long-term residence  in the country is virtually assured. Ignoring the problem is a form of amnesty, McCain and other  reformers argue. New Reform Efforts Come With Tougher Conditions Also, unlike the amnesty provision of 1986, 2013 reform proposals impose stringent  requirements on illegal immigrants. They must learn English. They must clear background checks.   They must pay fees and taxes. And they must move to the back of the line, behind those waiting  to enter the country through the legal process. Comprehensive reform is unfair to those immigrants who are playing by the rules.Even many immigrant advocates argue that it isnt right to give the 11 million who entered the  country illegally special status that is unavailable to other immigrants who are going through  the legal process and trying to come here the right way. But President Obamas plan and the one negotiated by the Gang of Eight both require that the 11  millions pathway to citizenship starts behind those already in line. Both plans reject the idea  of expedited treatment for undocumented residents and want to reward those who have been working  their way through the legal system. These illegal immigrants will take jobs from American workers and promote a decline in wages  overall, which is bad for the U.S economy. Study after study and anecdote after anecdote have refuted these arguments. They are both   factually incorrect. First, there are tens of thousands of necessary jobs across the United States that American  workers just will not do at any price. There are also thousands of jobs that go unfilled because   no qualified American worker can be found to do them. Can U.S. Economy Run Without Foreign Labor? The reality is that immigrant labor is essential to filling necessary jobs that make the U.S.  economy run. States that have enacted harsh laws against illegal immigrants have found this out  first hand. Arizona and Alabama, in particular, endured severe damage and costly labor shortages in their agriculture  and tourism industries after passing laws designed to drive illegal immigrants out of the state. Even states without immigration laws are dependent on immigrant labor. In Florida, immigrants  are essential to agriculture and the hospitality industries. Tourism would collapse without  them. Undocumented workers have a negligible impact on the wages of documented workers that work at  the same firm, according to a paper released in March by the Federal Reserve Bank of Atlanta.   Documented workers at firms that also employ undocumented workers earn 0.15 percent less or  $56 less per year on average than they would if they worked at a firm that does not employ  undocumented workers, according to the study. In fact, workers in retail and leisure and hospitality actually earn slightly more money when  their firms hire undocumented workers, since having more employees allows them to specialize,  according to the research paper.

Friday, November 22, 2019

To Regulate or Not to Regulate (Pick an area to apply the question to Research Paper

To Regulate or Not to Regulate (Pick an area to apply the question to it, as per the instructions) - Research Paper Example Many say absolutely; while others say definitely not. It is the intention of this work to outline reliable viewpoints to determine if self regulation is even a feasible contention. It is the overall determination of this research that it is not. Regulation of the banking system is essential. Reforms are certainly called for, but completely â€Å"free banking† would be foolish and economically dangerous to the United States. Regulations were initially introduced to unify the banking industry, but, also, to protect the monies of the people and to encourage universal honesty in banking business practices. Today the regulations have been altered, reformed, and added to accommodate the changing times in comparison to the earliest appearances and the opinions about those regulations placed on the banking industry have been heavily debated and will probably continue to be so for a long time to come. There are viewpoints that stretch the entire spectrum of the topic. There are those that believe that there should be absolutely no regulations dedicated to banking. There are those that feel that the regulations need to be stronger and even stricter that they currently are. There are, also, those that remain somewhere in the middle on the issue. They feel some regulations are definitely in order, but are not certain if even more restrictions will actually solve the problems within the banking industry, or just ma ke things much worse. So which viewpoint is right? Can the banking system be self regulated? Will the viewpoints ever find a compromise that result in a solution that is effective and successful? Would anyone feel comfortable depositing their hard earned money in a bank that did not possess FDIC insurance? Without that insurance and the regulations involved your money could become leveraged while the bank takes financial risks. If something goes wrong and that money was lost banks would have little incentive or responsibility to you or that money.("Office

Wednesday, November 20, 2019

Robert Herrick- To the Virgins, to Make Much of Time , Andrew Marvell- Essay

Robert Herrick- To the Virgins, to Make Much of Time , Andrew Marvell- To His Coy Mistress , John Donne- The Flea - Essay Example Any person that has delivered or been on the receiving end of a statement such as, â€Å"C’mon babe, it’s the Prom! We aren’t ever going to have another night like this again,† understands where Herrick is coming from. He is urging the ladies not to reject him now because there is only so much time for really good loving. The poems from Marvell and Donne take different approaches to the theme. Marvell is telling his mistress that she can stop playing shy because he knows she wants to be with him. Donne seems to be trying to elicit sympathy from his lover by wondering how you could –gasp- reject moi? Coupled closely to this theme of the lost moment or the tragedy of unrequited love seems to be the notion that the man was to be the aggressor in matters of the heart, seeking to gain the favor or displeasure, of the woman. I really loved the Herrick poem. He is such a subtle gentleman on the one hand and a playboy on the other. He is clearly using a tac tic that only works on the inexperienced (thus the Virgins in the title) but he does it so well, one can almost be sure of the outcome.

Monday, November 18, 2019

Impact of Generation Y on Management Effectiveness in Organizations Thesis - 2

Impact of Generation Y on Management Effectiveness in Organizations - Thesis Example s huge dependence on technological factors that distinguish them from Generation X that is more inclined towards conservative forms of workplace ethics (Martin, 2001). In this regard, business experts are endeavoring nowadays to identify factors that are causing problems in the workplace and are putting efforts to propose solutions and alternatives that may reduce the gap between the two generations, and allow the management to achieve their organizational objectives. Due to such reasons, some of the major problems in this respect of attracting and recruiting Generation Y talent that is fast-paced and technologically efficient. In addition, due to conflicting workplace practices (Tulgan, 2009), a number of organizations are confronting problems in retaining and engaging Generation Y successfully due to lack of communication between the two generations. In the result, recruitment, engagement, and retaining of Generation Y have now become some of the major issues of the current decade that are revolving around the factors, such as generational boundaries, technology, cultural shifts, etc. In specific, the major purpose of the proposed research is to identify and analyze issues that employers confront while managing Generation Y in their workforce along with proposition of different strategies that will enable management in ensuring improvement in workforce’ performance. Besides the abovementioned main purpose, the researcher will be putting efforts to fulfill other objectives as follows: To achieve the objectives of the research study, a qualitative research analysis will be employed. A qualitative method is the best option because it entails in depth analysis of a social phenomenon. Literature review will be used in analyzing existing information on the topic of study .After reviewing the information, vital points will be collected, evaluated and analyzed to come up with the required information. The material to be reviewed will include the Internet from

Saturday, November 16, 2019

Organizational Dynamics And Human Resources Management Management Essay

Organizational Dynamics And Human Resources Management Management Essay The terms Human Resource Management and Human Resources have replaced what was known as Personnel Management when it comes to describing the processes involved in managing people in organisations. The current trend towards people-oriented activities can serve the modern business challenges more effectively than the traditional Personnel Management approach. Naturally in a rapidly and constantly changing business environment, there is a call for more human resources involvement and more focus on human resource strategies in conjunction with the business strategies. Meanwhile there is evidence of devolving traditional human resource activities to line managers instead of personnel specialists. Recently, much of the work traditionally done by the human resources department has been devolved to line managers, who are now expected to take charge of people management activities such as, recruitment, selection, appraisals and training needs. This trend is encouraged as it leads to a closer relationship between line managers and employees, and hence leading to better employee performance and increased managers effectiveness. Torrington and Hall (2009) suggest that sharing HR activities between line managers and HR specialists is the key for a strategic HRM future, where HR specialists focus on business performance rather than operational concerns. This report highlights the significant role that line managers in HR activities while emphasising the importance of an HR specialist role for long term performance benefits. The Concept of Human Resource Management: HRM is defined as an approach to the management of people, the most valued assets of an organisation with their individual and the collective contribution to the success and achievement of the business objectives. Furthermore, Alan Price identifies HRM in Human Resource Management in a Business Context (2004) as the qualitative improvement of human beings who are the most valuable assets of an organisation. Hence HRM is concerned with the effective management of an organisations employees to achieve the strategic objectives of the business. Dave Ulrich (1996) defined four fields for the HRM role Strategic business partner Change management Employee champion Administration However, HR professionals have struggled to prove their value as a strategic business partner and were mainly concerned with the reactive roles of administration and employee champion despite the modern approach to devolve HR activities to line management. The Role of Line Managers in HR: Line managers have a major role in influencing employee behaviours and attitudes which reflects on performance and motivation. The increased responsibilities are mainly focused on people management where line managers could transform HR policies into practices to be embraced by employees leading to commitment, quality, productivity and ultimately, business performance (Hutchinson and Purcell, 2003). The CIPD highlighted the areas four areas where line managers can influence people management practices: Training, coaching and guiding Performance appraisal Dealing with discipline and grievances Recruitment and selection Moreover Hutchinson and Purcell (2007) explored the critical role of line managers in key HR areas including reward, training, learning and development, and identified that line managers do not only implement and bring HR policies into life, but also play a significant role in influencing employee attitudes and experiences. A case study at Selfridges indicates evidence that line managers in the retail store helped improve employees attitudes and behaviours. This change in the line management role mainly focussed on improvements to people management behaviours and skill sets. (Hutchinson and Purcell, 2003) However, a survey by Employment Review show HR practitioners disagree that line managers are applying these responsibilities effectively and training for line managers in people management should be compulsory. (Nadia Williams, 2008) In addition line managers agree with HR practitioners perception, as they struggle with the work overload and conflicting priorities to find time for people management activities. A research conducted by CIPD (2007) emphasise the extent of devolvement in the NHS, where ward managers effectively take responsibility for recruitment, selection, induction, appraisal and personal development plans, planning and delivering training, mentoring, communication, absence control and managing difficult people. The additional responsibilities are not welcomed by line managers who linked the lack of time and increased stress to the increased work load. Despite the trend to devolve HR activities to line managers, Phil Brown, in Why HR Must Empower the Line Manager (2008), believes that HR professionals are holding on to power and are unwilling to provide line managers with the tolls and information to perform HR duties effectively. Therefore CIPD stressed in their 2009 report that line managers need the following to fulfil their HR duties: Time to attempt management roles Carefully selected behaviour competencies Support by strong organisational values Sufficient people management skills training Career opportunity linked to training and development Involvement in decision making But above all, line managers need self-confidence, a strong sense of job security and development in the organisation. Support by HR professionals is welcomed by line managers as they take more accountability of implementing HR people management activities. This allows HR professionals to fulfil their own potential in defining policies and strategies that are adequately aligned with business strategies. Strategic HRM: The nature of Human Resource Management has changed from being reactive, prescriptive and administrative to being proactive, descriptive and executive (Boxall, 1994). Moreover, Guest (1997) highlighted the contribution of HRM in improving an organisations performance and overall success while Katou and Budhwar (2007) outlined three perspectives for HR practices. The Universalistic practice assumes the best of HR practices and implies business strategies and HR policies are independent in determining business performance. The Contingency practice implies a fit between business strategies and HR policies in determining business performance. The Configurational practice implies an interaction between business strategies and HR policies based on an internal and external fit of the organisational context in determining business performance. These perspectives highlight the growing contribution of HRM as an integral part of business strategy and success. Consequently, the term Strategic human resource management evolved which Guest (1987) outlined to be largely concerned with integration of HRM into the business strategy and adaptation of HRM at all levels of the organisation. In line with the emergence of SHRM, Budhwar and Sparrow (2002) proposed four generic HR strategies: Talent acquisition Resource allocation Talent improvement Cost reduction Strategic HRM is based on the integration of HRM and business strategies for the effective management of human resources. Barney (1991) suggests that organisations achieve competitive advantage by creating unique HRM systems that cannot be imitated. Recently, the pace of change in the global market has identified a significant number of contemporary issues emphasising the growing influence of strategic HRM and the importance of a human resources specialist to manage these challenges effectively. Contemporary Issues in Strategic HRM: HR professionals are struggling to catch up with the pace of transformation in global markets. Evidently, HRM faces an increasing challenge to use policies and strategies in the best interest of organisations and employees to maintain profitability and stability. The following are three basic examples of these challenges. Globalisation: The changes in international markets due to globalisation have a major effect on businesses in general and on how businesses manage human resources in particular. Although globalisation has many benefits, there are problems that have been attributed to the following factors: Reduction in job security because work can be moved from one country to another. Undercutting of one countrys wages by another, leading to erosion of wage rates. Increased working hours and exposure to health and safety risks to cut costs. HR professionals are struggling to ensure proper staffing and development with the required knowledge and skills for the changing business environment and according to Alan Price (2004), HR professionals are expected to be: Role models displaying appropriate company behaviours and values Fixers, adapting corporate values and mission statements to local circumstances Networkers, making connections between local managers and other parts of the business Coaches or mentors, transferring knowledge to local managers A major task for HR professionals is putting significant effort in the training and development of line managers to implement the relevant HR policies which can consistently be applied across different locations and cultures. Talent Management: One of the main challenges for HRM is to attract, develop and retain talented individuals though a recruitment, selection and development process. Nestlà © is a case in point as it uses a talent puddles initiative to overcome the shortage of skilled applicants. The process consists of small puddles each containing potential talents for each function rather than the whole company. (CIPD report 2007) The strategy managed to reduce the time and cost for filling vacancies and selecting suitable candidates. Other considerations include management of labour turnover and emphasizing employer branding in attracting the right candidates. Marks Spencer, the major high street retailer, conducted an analysis to understand and redefine its employer brand to keep ahead of the competition. This analysis explored the factors that increase job satisfaction and highlight the factors that make working at MS a unique experience. The analysis resulted in a better communication between the company and its employees that drove improvements across the business as well as increased levels of commitment and productivity. (CIPD report 2007) HR professionals invest considerable effort into finding new trends to attract and retain the right talents; however, their role is surpasses ensuring a faultless selection process. HR critical responsibilities include initial job design planning, defining the required qualifications and conducting accurate selection methods to ensure compliance with litigations and to avoid any legal case for discrimination or sexual harassment. Therefore HR professionals need to have the skills and knowledge that are required to handle these tasks effectively. Managing Diversity: For over thirty years the emphasis and progress on equality and diversity has been ongoing but slow. Globalisation and demographic change is putting further pressure on organisations to develop and manage equal opportunity and diversity strategies to improve performance and promote competitive position. (Torrington and Hall 2009) Furthermore the CIPD defines diversity as: valuing everyone as individuals as employees, customers and clients so diversity is a broader term of equality which aims to improve the opportunities of disadvantaged groups within an approach inclusive of all employees rather than focusing on the disadvantaged as in equality approach. Some of the main diversity issues may include: Age discrimination Bullying and harassment Disability Equal pay Race discrimination Religious discrimination Sex discrimination A recent case of bullying and harassment concerned British Gas, whose workers have been balloted for strike action over alleged bullying at the company. The GMB union sent ballot papers to 8,000 members at British Gas to vote over claims of bullying and plans for job cuts. It said the management culture was undermining employees terms and conditions. (PM online, 11/03/2010) It is worth noting that managing diversity is not solely an HR job but there is a great emphasis on the line managers role in promoting and achieving diversity in a workplace as well as handling conflicts before developing and becoming harder to resolve. Conclusion: Human resource management has evolved from the traditional personnel perspective and continues to evolve due to rapid change in the global business environment: in customer trends, competitors strategies and advancing technologies. Indeed factors such as globalisation, credit crunch and creation of multinational corporations have resulted in increased pressure to maintain the competitive edge while reducing operative costs. Clearly the daily HRM activities have become integrated in line operations; however, an investment is needed in time and effort to up skill managers to fulfil their HR responsibilities properly. HR needs to provide and integrate well designed policies and strategies in frameworks and systems to enable line managers to perform effectively. Despite an obvious trend to devolve more human resource activities into line management, clearly many of the new challenges require special skills and knowledge that line managers may not generally have. Therefore HR specialists and line managers must collaborate to achieve the business objectives within a frame of legislation and compliance. Hence the role of an HR specialist is moving towards a strategic partnership aligned with the business strategies while coordinating, advising and supporting line managers in performing the HR activities required. Obviously, line managers have a responsibility towards their staff, given the close relationship and direct daily connection and interaction. Line managers are expected to implement and deliver the policies and strategies that are devised by HR specialists. There are many areas of HRM like talent management where line managers need more responsibility to manage activities, such as attracting, retaining, developing and motivating. Moreover, line managers must have authority and responsibility to control and reward the staff which in turn will improve their people management and leadership skills. Finally it is evident that there is a correlation between HR professionals and line managers in certain HR activities that require further development. The report focussed on line managers as a front line management role, though HR knowledge and skills should be a requirement for middle management. Managers need be given adequate training and sufficient time to take on HR activities; these requirements should be included in HR strategies to achieve a high performance workforce objective.

Wednesday, November 13, 2019

MMX Technology :: essays research papers fc

MMX TM Technology The MMX TM Technology extension to the Intel Architecture is designed to accelerate multimedia and communications software running on Intel Architecture processors (Peleg and Weiser). The technology introduces new data types and instructions that implement a SIMD architecture model and is defined in a way that maintains full compatibility with all existing Intel Architecture processors, operating systems, and applications. MMX technology on average delivers 1.5 to 2 times performance gains for multimedia and communications applications in comparison to running on the same processor but without using MMX technology. This extension is the most significant addition to the Intel Architecture since the Intel I386 and will be implemented on proliferation of the Pentium processor family and also appear on future Intel Architecture processors. The media extensions for the Intel Architecture (IA) were designed to enhance performance of advanced media and communication applications. The MMXâ„ ¢ technology provides a new level of performance to computer platforms by adding new instructions and defining new 64-bit data types, while preserving compatibility with software and operating systems developed for the Intel Architecture. The MMX technology introduces new general-purpose instructions. These instructions operate in parallel on multiple data elements packed into 64-bit quantities. They perform arithmetic and logical operations on the different data types. These instructions accelerate the performance of applications with compute-intensive algorithms that perform localized, recurring operations on small native data. This includes applications such as motion video, combined graphics with video, image processing, audio synthesis, speech synthesis and compression, telephony, video conferencing, 2D graphics, and 3D graphics The MMX instruction set has a simple and flexible software model with no new mode or operating-system visible state. The MMX instruction set is fully compatible with all Intel Architecture microprocessors. All existing software continues to run correctly, without modification, on microprocessors that incorporate the MMX technology, as well as in the presence of existing and new applications that incorporate this technology. MMX technology provides the following new features, while maintaining backward compatibility with all existing Intel Architecture microprocessors, IA applications, and operating systems; New data types, eight MMX registers, enhanced instruction set. The performance of applications which use these new features of MMX technology can be exchanged. The principal data type of the IA MMX technology is the packed fixed-point integer. The decimal point of the fixed-point values is implicit and is left for the user to control for maximum flexibility.

Monday, November 11, 2019

Wellness Perspectives Of Obesity Health And Social Care Essay

It has been observed that those with high abdominal splanchnic adiposeness or huge sums of splanchnic adiposeness in general ( fleshiness ) are at increased hazard for the metabolic syndrome. This is due to effects of inordinate fat shops on the vasculature and on endothelial map. Per Bjorntorp offered grounds to back up that hormonal instabilities, specifically of hydrocortisone and sex endocrines, are of import in the pathogenesis of insulin opposition, which is besides a lending factor to increased hazard for the syndrome. Genetics plays an implicit in function in the forecast of the metabolic syndrome, every bit good. Restrictions of utilizing the metabolic syndrome in clinical scenes as a diagnostic tool include concluding such that it ‘s non clearly understood which individual or combination of status ( s ) described above ( ATP3 diagnostic standards ) really are responsible for increasing hazard or doing any cardiovascular or metabolic upsets in the long tally, and the fact that the arbitrary figure ( 3 ) of conditions met measure up a patient for holding the syndrome. Metabolic syndrome is besides a gray country in foretelling wellness result due to the manner wellness professionals approach intervention – some tackle one status at a clip while others prescribe a general life style intercession. The metabolic syndrome has evolved into its name from â€Å" Syndrome X † over the old ages ; Syndrome X addressed a bunch of symptoms associated with insulin opposition and when cardiovascular abnormalcies were added to the diagnosing the name changed to the â€Å" metabolic syndrome † . There is a disagreement as to whether or non the construct metabolic syndrome should be dismissed, due to the obscure nature of its being as neither a true disease nor a true syndrome. 2. Describe why the metabolic syndrome is sometimes depicted as a syrupy rhythm. ( 10 points ) We live in a society where sedentary life styles are common and nutrient is aplenty, two factors that addition likeliness for positive energy balance. When genetic sciences and constructs like the â€Å" thrifty cistron † theory are factored into the equation the likeliness for weight addition is raised even more. Once an single becomes obese they are at hazard for certain features that represent the metabolic syndrome – or all of them – harmonizing to ATP3 guidelines. They besides may meet some of the emotional effects of being overweight, such as depression or deficiency of ego esteem – both can potentially originate and fuel â€Å" nerve-racking feeding † and take to farther weight addition and wellness complications. This cycling mentioned so far is merely in footings of weight, which sets the phase for farther jobs in association with the metabolic syndrome. At the cellular degree, one thing tends to engender another, whether it ‘s an aggravation of one factor or the induction of a different 1. For illustration, as insulin opposition is brought on by hapless dietetic and exercising wonts ( but particularly the self-contradictory free fatso acid flux associated with fleshiness[ 2 ]) , it causes greater insulin opposition. Besides, insulin – being a growing factor that can advance adipogenesis – has the possible to heighten production of ectopic fat in its ability to heighten lipoprotein lipase ( LPL ) activity and suppress hormone-sensitive lipase ( HSL ) activity. This ( over ) production causes inflammatory markers to be called upon to assist relieve the state of affairs, and their presence in and of itself serves to decline insulin opposition. Girod et al 20032 explains this rhythm in great item in a superb article. The diagram below was taken from the article and depicts the rhythm ‘s chief flow and major points. 3. Define weight cycling. Discuss the grounds about weight cycling being â€Å" risky † to wellness. ( 10 points ) Weight cycling is insistent weight loss and recover over clip. It is besides referred to as â€Å" yo-yo † dieting, and is normally measured by how many witting dieting efforts an person has made. Cycling is in regulation with Elfhag ‘s belief that losing weight and maintaining it off is highly hard.[ 3 ]She and several others stand steadfastly behind the impression that weight care is disputing. Despite the increased prevalence of weight cycling and the increasing figure of rhythms carried out per individual, diet crazes and weight loss plans are at full steam with new constructs and â€Å" advanced † merchandises being placed on the market continually. Though the mechanisms are non good understood weight cycling appears to hold an association with increased all-cause and cardiovascular mortality.[ 4 ],[ 5 ]There are several factors that may turn to this job. It may hold to make with the evident alterations in organic structure composing related to loss and regain ; those who regain tend to recover mass in the signifier different types of fat – chiefly splanchnic fat – and it appears to roll up mostly around the middle of the organic structure.[ 6 ]Two specific factors are at drama here for increased hazard for cardiovascular issues, one is the high sum of splanchnic fat and the 2nd is the accretion of this fat around the center, increasing waist perimeter. Both of these are besides mostly involved with the oncoming of insulin opposition, another reported complication of weight cycling.[ 7 ]The addition in cardiovascular mortality may besides be a consequence of the changeless fluctuation of certain markers that affect endothelial map, which include blood force per unit area, serum glucose and serum lipoids ( lessenings in HDL are associated with weight cycling[ 8 ]) .[ 9 ]Kidney map is besides affected during cycling by a fluctuating glomerular filtration rate.[ 10 ]One more factor is the pronounced alterations in sympathetic nervous system activity during the restriction/overfeeding cycling, which significantly insult blood force per unit area and bosom map and finally impacts overall cardiac burden. To farther support that weight cycling is â€Å" risky † , Hooper et Al observed pronounced additions in appetite-stimulating endocrine profiles ( increased ghrelin, lower glucose, and lower androgen degrees, specifically ) in postmenopausal adult females who reported a history of repeated turns of weight cycling[ 11 ]– this would increase the likeliness for weight regain. It has besides been reported that weight cycling is associated with an increased prevalence of eating disorders/disordered feeding, bone breaks, malignant neoplastic diseases, type 2 diabetes, high blood pressure and psychological upsets. 4. Define and depict what is meant by chronic emphasis. ( 10 points ) Chronic emphasis is continual exposure to certain stimulations that elevates and maintains a degree of allostatic activity in the organic structure. Chronic emphasis can originate from a figure of state of affairss, whether environmental or internal. The â€Å" stress response † refers to the manner the organic structure reacts under emphasis, and it depends on the strength and continuance of the abuse. When an person is under chronic emphasis, the allostasis involves alterations in energy flow which affects several factors such as appetency, energy storage mechanisms and alimentary use. Stress endocrines such as hydrocortisone, corticotropin-releasing endocrine ( CRH ) , epinephrine and norepinephrine are released in effort to restart stableness in a fight-or-flight- or defeat reaction-type state of affairs that has been imposed on the organic structure, via either the hypothalamic pituitary suprarenal gland ( HPA ) axis or the sympathetic-adrenomedullary ( SAM ) system. Chro nic emphasis has been linked to increased hazard for going corpulence or corpulent. 5. Describe how chronic emphasis it is related to splanchnic fleshiness and clinical manifestations of the metabolic syndrome. Define and depict the part of the SNS system, the HPA axis, and wellness behaviours on splanchnic fleshiness and metabolic syndrome. ( 30 points ) . The HPA axis is a cardinal control hub of the emphasis response cascade, located in the hypothalamus and encephalon root, and regulated by CRH. It runs on a feedback system, in which adrenocorticotropic endocrine is secreted from the anterior hypophysis and Acts of the Apostless on the adrenal cerebral mantle to excite cortisol secernment ; in bend hydrocortisone studies back to the encephalon to close off production of more hydrocortisone. The SAM works in concurrence with the HPA axis to run the emphasis response and is located in the venue ceruleus on the Ponss – though it is typically called upon in state of affairss where the emphasis abuse is non perceived as overly-threatening. During the response to chronic emphasis, the presence of adrenaline serves to close down digestive procedures and diverts all attending to the sympathetic activity in an effort to supply the organic structure with the ability to get by with the emphasis. Cortisol release, nevertheless is associated with eating and increased feelings of hungriness. Chronic elevated hydrocortisone degrees is besides known to do splanchnic fat accretion and deposition ; a good known factor of fleshiness and the metabolic syndrome. Adipose tissue – particularly intra-abdominal – contains more glucocorticoid ( hydrocortisone ) receptors, which finally yields greater glucocorticoid metamorphosis in the abdominal country compared to other parts. Within splanchnic adipose tissue, in the presence of insulin the hydrocortisone serves to forestall lipid mobilisation for usage and supports fat accretion alternatively, in either of two ways: one, through stimulation of lipoprotein lipase activity or two, through the repressive effects hydrocortisone has on growing endocrine, which promotes lypolitic activty when permitted to work freely. Cortisol besides suppresses the consumption and usage of glucose in musculus tissue, and at the same time promotes the dislocation of protein in an attempt to originate gluconeogenesis in the liver. Epinephrine and noradrenaline are received and processed by sympathomimetic receptors. Two types of receptors exist, alpha and beta. Alpha receptors initiate a cascade consequence to let go of free fatty acids, while beta receptors inhibit this cascade and therefore the release of free fatty acids and alternatively advance fatty acerb storage. When free fatso acids are released into the portal system, unless they are used right off ( i.e. , to back up energy demands of physical activity ) they remain in circulation and it can be risky to hepatic metamorphosis and insulin sensitiveness. Both of these complications are markers associated with the metabolic syndrome. The presence of hydrocortisone stimulates hunger which can take to â€Å" nerve-racking feeding † and, accordingly, weight addition particularly in the signifier of splanchnic adipose via mechanisms mentioned above. The more hydrocortisones released in response to emphasize the higher the inclination to eat more of calorically heavy nutrients. There is grounds to propose that consumption may be affected by neuropeptide Y, CRH and leptin every bit good as opioid and endocannabinoid signaling in concurrence hydrocortisone activity.[ 12 ]In footings of the theoretical account of reward-based feeding, cognitive restraint of indulging in a peculiar nutrient outputs a signifier of emphasis that increases hydrocortisone concentrations which impact NPY, insulin and leptin degrees ; hunger work stoppages hard while the wages tracts are initiated and while the individual gives in and devour the point the circulating endocrines and hydrocortisone act to heighten fatty acerb storage in th e signifier of splanchnic adipose and supress insulin sensitiveness. Currently-overweight females and those with a history of high dietetic restraint are most likely to digest this destiny. Repeated Acts of the Apostless of this step will finally take to increased hazard for weight addition and farther, the metabolic syndrome. 6. Using the Obesity Atlas and/or other resources, describe and compare the function and influences of biology/genetics, physical activity behavior/ eating behaviour and environment on the etiology of fleshiness. Which of these facets has the strongest impact? Why? Which of these may be the most promising to prosecute for bar or intervention of fleshiness. Why? ( 30 ) The etiology of fleshiness can non be represented by any one individual factor ; alternatively there are a battalion of influences on energy balance and weight fluctuations that are really loosely grouped into: biological science and genetic sciences, physical activity/inactivity, dietetic wonts, and the psychosocial influences from the envrionment. While physiology and familial make-up are the strongest forecasters of phenotype, they are about impossible to alter after creative activity of a human being. On the other manus, the physical universe around us and our concsious daily determinations are extremely dynamic, and therefore these are the 1s that should be targeted for intercession and intervention. There is grounds to back up that genetic sciences work in concurrence with the environment to lend to obesity on a planetary degree. Research has shown there are specific internal biological and physiological procedures that can be influenced by heritable traits ; one such illustration set Forth is the thrifty cistron hypothesis ( Neel, 1961 ) with which it was proposed that the organic structure can be predisposed for extremely efficient food hive awaying mechanisms, therefore seting them at a disadvantage for increased hazard of weight addition compared to the non-thrifty-gene-carrying population. Another illustration is the set point theory ( Bennet et al, 1982 ) , which entails that an internal control system dictates and regulates how much fat a individual carries throughout their life-time. Geneticss have besides been linked to weight loss as good – Shin et Al, 2006 found that certain SNPs in the ADIPOQ cistron ( influences alterations in go arounding adiponectin degrees ) can find how good, or ill, one responds to dietary & amp ; exercising intercessions. Mager et Al, 2008 observed mutants in the ghrelin receptor cistron which were associated with fleshiness and glucose metamorphosis in people with impaired glucose tolerance, and found that specific SNPs in this cistron besides influenced how one responds to burden loss intercessions. However, good beyond the negligible sum of research behind the familial part to fleshiness is the other, good established offender – the external environment in which we live and its afloat pool of abuses. The society we are constructing around us begets eternal options and short cuts – 1s that were non available in the times of our early ascendants ; therefore, they are non contributing to proper direction of our organic structures the manner nature intended. The grounds is all around us, from McDonalds Dollar Menu to the Dollar Store and from wireless cyberspace to Segway scooters ; it ‘s all about money and ease these yearss. And so to prod us while we ‘re down after lading up on cheap, high fat nutrient we have the amusement industry, which has drawn voluminous sums of attending to an overdone image of the â€Å" perfect organic structure † over the old ages, making this mute criterion of and spliting line between how we should and should n't look . Now the sudden rush in diet and weight loss pills, plans and regimens has left us in even more of a dither, scared to look one manner or the other in fright of being stared at, smirked at, laughed at, judged or ridiculed for the manner we appear on the exterior. So we stagger on, and our caputs down and custodies in the bowl of comfort. emphasis could ne'er be the exclusive cause of and be an effectual mark for intercession and intervention for the rise in fleshiness. There are merely excessively many extra confounding factors – genetic sciences and hapless dietetic and exercising wonts are the major wrongdoers. The construction of American society is by no agencies conducive to easy, healthy life, with widespread economical instability and far, far excessively many cutoff options. You ‘re stressed at work so you mindless make for the tremendous bowl of Halloween confect in the common country ; you are short on hard currency so you head into McDonalds for their dollar bill of fare choice ; you do n't experience like walking the stat mi to work so you get into your auto or hop on the coach.