Thursday, October 31, 2019

Journal Essay Example | Topics and Well Written Essays - 1500 words - 1

Journal - Essay Example The market In the recent times, the growth in the smartphone market drives the industry for microprocessors. By 2014, it is expected that the total market size for cell phone users alone shall be 1.7 billion primarily driven by the surge in smartphone demand in emerging nations (Fan, Liu, Zhang and Zhao, 2008). As for the market captured by laptops, they completely acquired sales for desktops and face stiff competition from netbooks and tablets who have reported tremendous rise in sales. There are two basic components that hinder entry into the microprocessor industry is prices and innovative technology. Competitors are spending huge sums in new product development, technological upgradation and innovations that can allow patents and hence target market advantage. Companies also need huge economies of scale in order to compete in prices. Off late the substitution in the phone markets has evolved greatly but the substitution of CPU’s is virtually unavailable. The microprocessor industry is extremely competitive in prices. Product differences between major producers like Intel and (Advanced Micro Devices) AMD are virtually absent. Microprocessor industry is a one that entails huge fixed costs but very low marginal costs. This gives each company, the power to undercut the other. Exit costs of the microprocessor industry are also very high owing to huge sunk costs involved. Technology products are characterised by very short product life cycles. Technology changes and industry standards evolve as rapidly as they expire. Innovation here becomes the key to survive. The case of Apple Inc can be cited as a perfect example of innovation that led to market leadership where innovation of the iPhone took away margins and sliced away profits of other cellphone manufacturers who could not keep up. Competitive Business Strategies The desktop market is characterised by slow growth in the recent times. It is presently the largest and one of the most important microproces sor markets with a total of 150 million unit sales globally. The growth figures don’t seem as impressive. Intel, a leading firm in the microprocessor industry, has significant technological and resource advantage in the segment. The low end segment is price sensitive and so companies like Dell and Intel should keep its strategy aligned to prices to maintain itself as a market leader (Fan, Liu, Zhang and Zhao, 2008). In strike contrast to the desktop market, the laptop market needs an entire different strategy. Here front end technologies and processor performance drive sales for a company. In the fig 1 below, it is observed that concentration of exterior design is not as important as data protection. Figure 1: Consumer Need Preference Hierarchy in the Laptop Market (Source: Fan, Liu, Zhang and Zhao, 2008) With a view to capture the laptop market, key industry competitors are targeting the new generation. The trend requires thin and light laptops that do not need batteries and coolers like in CPU’s. Secondly, firms like AMD are increasingly trying to differentiate their laptops by bundling as done in the Centrino platform. The company also seeks to specialise in technologies, like the vPro to enhance security of data, a huge demand fulfilment of the business class. Thirdly, companies like Intel are trying to take on market leadership in the emerging nations via the price advantage. The use of Atom processor has strengthened Intel’

Tuesday, October 29, 2019

The idea of democracy Essay Example for Free

The idea of democracy Essay The example Provident provides is exemplary of what the founding fathers of America had in mind with the idea of democracy. Since all men are created equally, it seems only right that we would contribute to the betterment of all, including those of different races. The Provident example is key is illustrating that â€Å"a solid investment strategy† in the form of philanthropic giving helps to fuel the economy on many different levels. Since Provident, â€Å"A greater percentage of our population has achieved a higher standard of living than any other country with our levels of diversity. † In the spirit of democracy, self funding provides more opportunities, which provides a positive element to capitalism. Those who have already benefitted from capitalism have the opportunity to fuel new opportunities for more people, providing a unique balance between democracy and capitalism. This is why the United States has been so successful; more successful than any other nation actually. This balance is necessary in order for either of the two systems to work correctly and fairly. Without philanthropic giving, a very unique feature of the United States, this balance would be impossible. Generosity blurs some of the social restraints placed on people in different economic brackets and allows more people more opportunities for success.

Sunday, October 27, 2019

The Case Study Of Ruth And Joseph Social Work Essay

The Case Study Of Ruth And Joseph Social Work Essay This paper will look at the case study of Ruth, Joseph and their family. They are Humanitarian Entrants in Australia and face many issues. Their past life in Southern Sudan was fraught with war, violence and displacement. As a social worker assessing their case there are several factors which need to be taken into account which can impact greatly on their future. These include the dominant discourse which as a social worker we will choose to work from. The biomedical discourse deals with many factors which are evident in the work with Ruth and Joseph. Factors such as torture and trauma and the repercussions psychologically which this has had and how it continues to impact on the family. This paper will also look at how the western biomedical model may limit mental illness as just a brain disease and not look at all the factors which are related. When working with trying to resettle a refugee family in a new country which is so far removed from what they know, a social worker needs to deal with broad range of tasks. Selecting the right theory is crucial. The theory which would best work for Ruth and Joseph would be Anti-oppressive. Looking at the anti-oppressive theory when working with new migrants can help us to understand their history and help them overcome the oppression which they have felt for so long. It is our role as social workers to help integrate refugee people into local communities and adjust to a new culture. I will need to evaluate my own values and attitudes when working with my CALD (Culturally and Linguistically Diverse) clients. My focus will be on how these differences may impact or inhibit my work with Ruth and Joseph namely our cultural differences. GENOGRAM Assessing clients and intervening as a Social Work practitioner it is essential that we choose the best discourse relevant to our clients needs. As Healy (2008) states the biomedical discourse is one of the most powerful discourses shaping practice contexts, particularly in health services such as hospitals, rehabilitation services and mental health services (p20). Healy discusses how social work practitioners need to learn to understand some form of the biomedical terminology (2005,p22). When working with clients such as Ruth and Joseph whom both have post-traumatic symptoms in varying degrees the biomedical discourse seeks to address the complexity of their problems. Both Ruth and Joseph appear to suffer from some form of mental illness related to their post-traumatic experiences. Penhale and Parker (2008) say that difficulties with mental illness can be deepened if the person/s comes from black or minority ethnic community (p103). The symptoms which Ruth and Joseph are experiencing are in the form of flashbacks, anxiety and fear. The National Centre for PTSD state that refugees frequently experience recurring losses, challenges, and changes during the exile/acculturation and resettlement/repatriation periods (Bolton,2010). When assessing Ruth and Joseph, we have to be careful not to objectify them as just their illness. As a social worker we need to look at a client from varying degrees not just one. We need to look at a client and their past history in a holistic biopsychosocial way. With Ruth and Joseph, addressing their mental illness is just one of the multidimensional factors which they are experiencing. Looking at them as people rather than as an illness can help with assessing their case. STARTTS elaborate saying that It is necessary for social workers in this field to develop an understanding of organised violence and its effects on individuals, families and societies, and also of the refugee experience of escape and surviving in refugee camps (Bowles, n.d.). The biomedical discourse can also have limitations. Healy discusses how there is potential for biomedical knowledge to contribute to social oppression (2005,p26). When working with Ruth and Joseph our practice must be about empowering them and help them overcome any oppression which they have experienced. The implications which we as practitioners may face when working with refugees from the biomedical model is as Healy (2008,p.25) suggests in conflict with the holistic approach. As social workers it is our role to look at a client in a social context. Ruth and Joseph present with a range of problems that stem from the trauma which they have encountered. This branches into areas of social, economic and emotional needs that need to be addressed. Ruth faces trying to navigate her way around the bureaucracy of Centrelink, Medicare and other agencies just to get their simplest needs met. We will need to work with Ruth to overcome her fear of authority which stems from her trauma which sh e experienced in Southern Sudan. In the case study it mentions that Ruth appears afraid of all the questions regarding getting a job and the fear of authority coupled with the language/cultural barrier which she experienced has led to her self-doubting. We need to look at the case of Ruth and Joseph from more of social level rather than a medical level. This model does not consider the role, such as family and community play in development of illness; thus, diagnosis and treatment are narrowly defined (Pardeck and Yuen,2001, as cited in Pardeck,2002,p.4). Assessing clients whom have trauma related symptoms such as Joseph, being aware of his condition and all aspects appear to be from physical to emotional to psychological will help us to make decisions of referrals to other agencies which may need to be done. It appears as though Joseph will need to see a physiotherapist, dentist and a GP to help overcome his physical pain. His emotional and psychological problems range from trouble concentrating to becoming violent towards his family. The safety of Ruth and the children will be made in the initial assessment. It will need to be decided whether Ruth feels safe enough to have Joseph in the house with her and her children if he continues with his violent behaviour. Referrals may need also to be made to a psychologist or a mental health agency for Joseph. Healy places anti-oppressive practice between strengths perspective and the postmodern practices to reflect the common historical lineage of theories for practice, all which have emerged as significant influences in the formal base of social work since 1990s (2005,p173). Adopting an anti-oppressive framework whilst working with Ruth and Joseph, tribute must be paid to the past struggles and sacrifices which they have faced. Ruth and Joseph have suffered great oppression in Southern Sudan. This oppression included imprisonment, relatives killed, being taken from their home, hunger, and lack of safety. OHara and Weber (2006) maintain that an anti-oppressive or radical framework encourages practitioners to understand the structural context of their assessment practice (p,141). Some critical components of the anti-oppressive framework are the isms. These are anti-racism, anti-sexism, anti-heterosexism, anti-ablism, and anti-ageism (Moore,2003,n.d). Addressing these components of the anti -oppressive framework when assessing Ruth and Joseph will allow practice to empower and enable and support them to gain more control over their lives. As Milner and OBryne mention †¦..social work should make a difference so that those oppressed may regain control of their lives and re-establish their right to be full and active members of society (2009,p.23). In an initial assessment with Ruth and Joseph factors to be considered include whether an interpreter is needed as translation will play a vital role in the assessment process. Ruth and Joseph have obviously sought freedom from persecution because of war, assault and torture and/or other degrading treatment. STARTTS state that Social workers in this field are exposed to stories of gross human rights violations, and cannot maintain neutral opinions concerning the actions of various groups and regimes. Conversely, one is also exposed to the complexities of civil and international conflicts; ones own political ideologies, stereotypes and beliefs are all challenged in this work. Culture plays a significant part in anti-oppressive practice when working with Ruth and Joseph. Penhale and Parker (2008, p.197) points out: Cultural competence stems from an anti-oppressive approach to practice and concerns the competence and understandings to work with diverse groups, respecting and acknowledging difference whilst working with people to effect changes that have been agreed and negotiated together. There is no need to be a cultural expert as such but awareness of cultural differences and how this may impact on communicating effectively with Ruth and Joseph is important. By doing some research if possible of Ruth and Josephs Dinka culture will help when working with assessing their needs. For example the WYDA states that Dinka family members provides an essential support network (2008, para 5). This is important when talking to Ruth and Joseph about their family life and roles in the family etc. Another consideration to make would be to ask them what some of their expectations may be and ask them how things were done in their country. Breaking down this cross-cultural barrier in the initial assessment can lead to a more positive outcome for both the social worker and Ruth and Joseph. . Thompsons PCS interactive model of oppression (Penhale and Parker, 2008, p.155) shows oppression to be the constructor of personal, cultural and societal views and that the personal prejudice alon e does not explain racism. Furthermore it is important that a social worker understands how these aspects of life interact can create and recreate patterns of oppression and discrimination. It is important also to note that Ruth and Josephs children appear to be acculturating faster therefore may have to take over the role of translators in official realms. This reversal of roles can create stress in both parents and children and can sometimes lead to intergenerational conflict. Parents can feel like their children have lost respect for them and that that their authority may have been undermined. Social work practice must address a myriad of issues when dealing with asylum seekers and refugees. In establishing themselves in the community Ruth and Joseph they will require a number of services with which to access which will play a vital role in providing a safe community. Offering ongoing support and adopting an anti-oppressive practice Working with CALD (Culturally and Linguistically Diverse) clients as a social work practitioner this can raise several issues with values and attitudes which I may have. I am white, Australian and a social work student. I have a different cultural identity and am from a different country which holds different views and ideas to Ruth, Joseph and their family. Being a female and a mother I can empathise with Ruth in regards to running a household and caring for children. Ruth has had to take over as head of the family as Joseph appears to be mentally unwell and not fit to lead his family for the time being. She also has a large family and caring for seven children can be a struggle let alone being in a new country and trying to navigate our welfare and schooling systems. Having different cultural identities could limit my capacity when working with Ruth and Joseph. I need to recognise that refugees have similar social, emotional, spiritual and financial needs to everyone else and be wo rk in a culturally sensitive way. As I am from the Australian culture this is another subgroup which I have membership. With all the negative media attention surrounding asylum seekers or boat people it has been hard not to form an attitude. My attitude is that I believe that I dont understand, and I never will, the desperation that asylum seekers must feel to have to put themselves and their family in such unsafe environments such as a rickety boat from Indonesia just to escape the persecution and fear which they must experience in their own country to have to flee. I know that Ruth and Joseph are Humanitarian Entrants meaning that Ruths sister sponsored them to come and live here but they still were in fear of persecution and subjected to torture and trauma in their own country. As I am citizen of a country that lives in democracy I will never fully understand but my values of respect, honesty and Another subgroup I am part of is that of a family. I have two children of my own and I know personally that my family is my initial support network. As mentioned, the Dinka culture regards their immediate family as their initial support network also. When working with Ruth and Joseph my values and attitudes towards family support can enhance my capacity with addressing their needs. I feel that it is important to work with the positives of Ruth and Josephs situation and in this case it is their family is together in the one place. Offering some family counselling would allow a safe space for the family to address any issues which have arisen, such as Josephs lack of connectedness with the family. Along with Joseph receiving some therapy in regards to his mental health this would put the family on the path to healing together. Oommen, Brian, Stephen and Komersee (2008, p.6) state that An equally important concept when working in culturally diverse settings is the need for a health professional to suspend their personal biases and judgements about those for whom he or she may be planning health programs. As with so many areas involving values, reflective practice and self-awareness are central. I need to examine and question the sources and nature of my own power and the ways in which this is exercised in my relations with children and my family. By using reflective practice when working with Ruth and Joseph can help me maintain a level of self-awareness so as to apply my attitudes in an appropriate manner. As there is a domestic violence issue this could be one of the areas where my value of respect could limit my capacity when working with Ruth and Joseph. I could overcome this limitation by looking at the all the factors and understanding that the domestic violence is something that is perpetuated from their history as displaced persons and the trauma and torture which they have experienced. Working with a non-judgmental attitude will also help with conflicts such as domestic violence. Conclusion

Friday, October 25, 2019

Analysis of Act 5 in Othello :: Othello essays

Analysis of Act 5 in Othello      Ã‚  Ã‚  Ã‚  Ã‚   Iago's intelligence causes the self destruction of Othello.   He appears to be the most intelligent person in the play, Othello, by the way he acts and handles some situations.   Iago is set to plan revenge on Othello for not making him lieutenant.   He gains the trust of Othello by telling lies to him, and these lies cause the destruction of Othello.      Ã‚  Ã‚  Ã‚  Ã‚   Othello should have investigated on some of the outrageous things Iago has told him.   Iago is simply just trying to gain Othello's trust.   This is shown when Iago talks about killing Roderigo because he was saying bad things about Othello.   "Nine or ten times I had thought t' have yerked him here under the ribs." (1:2, 4-6).   The same thing happens again, this time about Cassio. "With her - on her - what you will."   (4:1, 42).   Iago tells Othello about Cassio sleeping with Desdemona.   This appears to be Iago's smartest move because this causes the death of Desdemona and Cassio.   This part also appears important to Iago because he is finally made lieutenant.      Ã‚  Ã‚  Ã‚  Ã‚   Othello changes dramatically when he hears all these lies from Iago. He is now less patient.   He hurries through many decisions to be made.   Such as the one to kill his wife.   He also jumps to conclusions too quickly.   This is shown when Iago and Bianca are talking about Cassio and Othello misinterprets them talking about Desdemona.   "Ay, let her rot and perish and be damned tonight, for she shall not live."   (4:1, 200-201.   Othello is planning Desdemona's death.   He appears to be very stressed out, by the way he acts and

Thursday, October 24, 2019

Gangrene Essay

Gangrene is a condition that occurs when body tissue dies. However, in the book Whale Talk, Andy Mott states, â€Å"Gangrene †¦Ã¢â‚¬  (is) â€Å"†¦ rot. † (p. 134) Technically he is right. It is caused by a loss of blood supply due to an underlying illness, injury, and/or infection. Gangrene is probably one of the worse types of infections that can result in an amputation. Fingers, toes, and limbs are most often affected, but gangrene can also occur inside the body, damaging organs and muscles. There are different types of gangrene and all require immediate medical attention. Blood plays a very important role in your health. Not only does it transport oxygen and nutrients throughout your body to feed cells, it delivers disease-fighting antibodies that protect your body from infection. When blood cannot travel freely throughout the body, your cells cannot survive. Infection can develop and tissue can die from gangrene. So, Andy Mott’s blood in his leg could not travel freely. In the book Whale Talk Andy states, â€Å"My mom’s boyfriend (Rance Haskins)†¦ he’d tie my leg to the pipe under the kitchen sink†¦I’d been there almost twenty-four hours†¦ I guess I kept trying to get away†¦ and the knot just got tighter. † (p. 65) Any condition that affects blood flow increases your risk of gangrene, including: Diabetes, Atherosclerosis, Peripheral arterial disease, Trauma, or injury. Injuries that leave a portion of muscle tissue deprived of oxygen make a perfect home for infections. Some of the cells in a wound are already dead, and the infection starts in these. â€Å"Crush† injuries are most likely to cut off blood supply to a large amount of tissue, and are most prone to gangrene. The infection usually strikes the hands or legs, where blood supply is most easily cut off. In Andy Mott’s case gangrene affected his leg. He said, â€Å"†¦ my foot was discolored all the way to my calf†¦they had to whack†¦Ã¢â‚¬  (his leg)†Ã¢â‚¬ ¦ off before it snuck up and got something really important. † (p. 165) Surgery can also produce areas of died tissue. This is common in people who have preexisting vascular problems, or risk factors for heart disease. For example, high cholesterol can make blood more likely to clot. A person with high cholesterol is more likely to have more clotted blood vessels after surgery. The tissue that’s normally fed by those blood vessels can run out of oxygen, allowing bacteria to multiply and gangrene to start. Serious diseases that interfere with blood flow can cut off oxygen supplied to arms or legs, even when there’s no trauma or injury. For example, peripheral vascular disease in which blood flow to the legs is poor and can deprive a foot or leg of blood or oxygen and cause gangrene. People with diabetes are prone to gangrene in the feet. Diabetes-related infections are the most common reason for foot amputation. Severe frostbite (due to overexposure to the cold) can also lead to gangrene due to lack of blood flow to the tissues. Your arteries carry blood rich in oxygen and nutrients from your heart to the rest of your body. When the arteries in your legs become blocked, your legs do not receive enough blood or oxygen, and you may have a condition called peripheral artery disease, sometimes called leg artery disease. In severe peripheral artery disease, you may develop painful sores on your toes or feet. If the circulation in your leg does not improve, these ulcers can start as dry, gray, or black sores, and eventually become dead tissue resulting in gangrene. The presence of atherosclerotic disease (a disease in which arteries are stiff and hard, with fatty deposits blocking blood flow) is a major factor to gangrene, particularly in the toes, feet, and legs. Gangrene is caused by a loss of blood supply due to an underlying illness, injury, and/or infection, like: Diabetes, Atherosclerosis, Peripheral arterial disease, Trauma, or injury. This is why gangrene is probably one of the worse types of infections that can result in an amputation. But when you really think about it, it could be so much worse!

Tuesday, October 22, 2019

Interesting Facts About Magnesium

Interesting Facts About Magnesium Magnesium is an important alkaline earth metal. Its essential for animal and plant nutrition and is found in a variety of foods we eat and many everyday products. Here are some interesting facts about magnesium: Magnesium Facts Magnesium is the metal ion found at the center of every chlorophyll molecule. Its an essential element for photosynthesis.Magnesium ions taste sour. A small amount of magnesium imparts a slightly tart flavor to mineral water.Adding water to a magnesium fire produces hydrogen gas, which can cause the fire to burn more fiercely.Magnesium is a silvery-white alkaline earth metal.Magnesium is named for the Greek city of Magnesia, a source of calcium oxide, which is called magnesia.Magnesium is the ninth-most abundant element in the universe.Magnesium forms in large stars as a result of the fusion of helium with neon. In supernovas, the element is built from the addition of three helium nuclei to one carbon.Magnesium is the 11th-most abundant element in the human body by mass. Magnesium ions are found in every cell in the body.Magnesium is necessary for hundreds of biochemical reactions in the body. The average person requires 250 to 350 mg of magnesium each day or about 100 grams of magne sium annually. About 60% of the magnesium in the human body is found in  the skeleton, 39% in the muscle tissue, with 1% being extracellular.Low magnesium intake or absorption is associated with diabetes, heart disease, osteoporosis, sleep disturbances, and metabolic syndrome.Magnesium is the eighth-most abundant element in the Earths crust.Magnesium was first recognized as an element in 1755 by Joseph Black, however, it wasnt isolated until 1808 by Sir Humphry Davy.The most common commercial use of magnesium metal is as an alloying agent with aluminum. The resulting alloy is lighter, stronger, and easier to work than pure aluminum.China is the leading producer of magnesium, responsible for about 80% of the worlds supply.Magnesium may be prepared from  the electrolysis of fused magnesium chloride, most commonly obtained from seawater.

Monday, October 21, 2019

The Mysterious Banana Essays

The Mysterious Banana Essays The Mysterious Banana Paper The Mysterious Banana Paper Barrie, ON. 9 March 2007 http://web. ebscohost. com. Kehler points of the references made in â€Å"Krapp’s Last Tape† which relate to both â€Å"Othello† and â€Å"Gooseberries†. This article gives insight to the reader as to where Samuel Beckett came up with some of the ideas for writing â€Å"Krapp’s Last Tape†. I did not use this in my research essay. Kriszner, Laurie G. , Stephen R. Mandell, and Candace Fertile. Literature: Reading, Reacting, Writing. 2nd ed. Scarborough: Nelson 2007. This is the text that â€Å"Krapp’s Last Tape† came from but also served as a reference to types of theatre. This text covers many kinds of literature such as short stories, drama, and poetry. Chapter 20, Understanding Drama, was particularly helpful as it described all of the genres of drama including the Theatre of the Absurd which was relevant to my essay. Santrock, John W. and John O. Mitterer. Psychology. 2nd ed. Toronto: McGraw-Hill Ryerson 2004. Santrock and Mitterer wrote this text as a learning tool for first year psychology students. It contains an overview on all of the fields of psychology. Chapter 1, What is Psychology? , was very helpful in explaining Freudian theory. Chapter 6, States of Consciousness, further explained Freud’s theory of wish fulfillment.

Sunday, October 20, 2019

Opinion of, Opinion on, Opinion about

Opinion of, Opinion on, Opinion about Opinion of, Opinion on, Opinion about Opinion of, Opinion on, Opinion about By Maeve Maddox A reader objected to the use of â€Å"on† in an example given in a post about prepositions: REFERENCE: He asked my opinion on the matter. IMHO, I think this use is a stretch. I would substitute about for on. He asked my opinion about the matter. More and more it seems that writers have forgotten the word about and use on instead, a rather annoying tendency. According to an informal web search using quotation marks around the phrases, opinion of is more common than either opinion on or opinion about: â€Å"opinion about† 7,470,000 hits â€Å"opinion on† 18,600,000 hits â€Å"opinion of† 52,800,000 hits The OED entry for opinion reflects this apparent preference, offering one example each for â€Å"opinion on† and â€Å"opinion about,† but 24 for â€Å"opinion of.† All three sound fine to me. Here are some quotations from newspapers: Looking for political cover, Senate Majority Leader Mitch McConnell, R-Ky., said Tuesday, â€Å"Everybody I know in the Senate, everybody is in favor of maintaining coverage for pre-existing conditions. There is no difference of opinion about that whatsoever.† Expert opinion on game-related research is further split, with hundreds of academics calling findings linking playing video games to violence flawed, while others argue that studies show â€Å"either no relationship between playing video games and violent behavior, or an ‘insignificant’ link between the two.† Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Expressions category, check our popular posts, or choose a related post below:25 Subordinating ConjunctionsFor Sale vs. On Sale45 Idioms About the Number One

Saturday, October 19, 2019

Public relation Essay Example | Topics and Well Written Essays - 500 words

Public relation - Essay Example Proactive public relation is where an organization continues being involved with the publics of the company all through while at the same time finding out new opportunities of creating good will for the company. On the other hand, reactive public relations is whereby an organization do not take their public seriously and only comes up whenever there is a problem to explain to the public. Such organizations are surprised by this issue and they tend to say that there was misunderstanding. The main similarity between the proactive and reactive public relations is that they are both meant to create good will for company as they look forward to bringing public acceptance and understanding. As for Riordan Manufacturing, they should not only come up in the light of public to publicize the company's public when there is a problem, but this should be a continuous process even when there is no problem. They should not have been concerned with their security threat on their internet as a result of meeting the requirements of Sarbanes-Oxley. There is a big difference between advertising and publicity. Advertising is whereby a company seeks to create demand for their products by informing or communicate to the public about their goods.

Friday, October 18, 2019

Health education Research Paper Example | Topics and Well Written Essays - 1000 words

Health education - Research Paper Example The topic of HIV/AIDS is very broad, therefore, this research papers focuses on transmission of HIV/AIDS. In addition, the impacts of the problem in the society are highlighted and recommendations are given on how to mitigate the spread of the disease. According to Akinwumi (2001), the rate of HIV/AIDS infection is high among the poor and the rich as well as the educated and the illiterate. It is, therefore, critical to evaluate how the disease is transmitted from one individual to another. Transmission of HIV occurs when the virus from an infected person gets into the body of a healthy person. This is through the semen, or injecting the virus into the body of a healthy individual. This means that there are numerous mechanisms through which the HIV virus can get into the body of a healthy individual as highlighted in the subsequent literature. In most instances, HIV is spread into a healthy person when the individual engages in unprotected sex with an infected partner. Though there are chances that the virus can be transmitted through oral sex, in most cases, the virus gets in the body of a healthy individual through the penis, vagina, vulva and through the mouth when the saliva has infected blood cells. It is, therefore, important to note that HIV is principally transmitted from one individual to another through sexual intercourse. The HIV infection is also transmitted among the intravenous drug users who share the needles employed in injecting the drugs. This is because the contaminated blood is transmitted from one person to the others sharing the syringe, therefore, in case one of the members sharing the syringe is infected, then the virus will eventually be transmitted to the others too (Henderson, 1994). The virus is also easily transmitted from the infected pregnant mothers to the children either during the

Delta Airlines Case Analysis Research Paper Example | Topics and Well Written Essays - 2000 words

Delta Airlines Case Analysis - Research Paper Example The company has alliance partners that enable it to provide greater connectivity to its customers. In addition to the legacy model the company also has a subsidiary named Delta Express which is the low cost model of the airline company. The company has a large fleet at its service numbering about 700 aircrafts that includes small planes to jumbo jets for long haul flights (Delta Airlines, 2011). Products Delta Air has a service portfolio that provides air travel facility to customers. The service portfolio of the company is comprised mainly of a full time legacy carrier model as well as a low cost model. The bulk of business is focused towards the legacy carrier that provides air connectivity not only in the domestic market in USA but also to a large number of nations abroad. The company also has alliance partnerships with leading alliances that helps increase the connectivity. In addition the company also has a hub and spoke model and a code share agreement to broaden its area of se rvice offering. Customer Satisfaction Customers form the main area of focus for the strategists at the organization. Every effort is being made to ensure the full satisfaction of the customer. The customers are provided with wide range of facilities that includes on board entertainment, food etc. Customers also have the option of web check in and internet bookings. The company also has loyalty points for frequent travellers. Due to its dedicated efforts towards customer satisfaction the company was ranked 1st in the Fortune’s list of most favoured airlines (Delta Airlines-a, 2011). Internal Environment Analysis SWOT Analysis SWOT is an acronym for Strengths, Weakness, Opportunities and Threats. The following section would analyse the strengths, weakness opportunities and threats faced by the airline. Strengths The main area of strength for Delta Airlines arises from its strong brand image and a formidable market position in the US market. The airline has a very large network helping it connect with a large number of both domestic as well as international destinations. The hub and spoke model of the airline also contributes to its success story. The existing hubs at Atlanta and New York provide competitive advantage to the organization (Datamonitor, 2007, p.24). Weakness The major weaknesses in the firm arise from the dip in demand for the services due to the ongoing effects of the financial crisis. The company also faces issues with regard to low yield of passengers and dip in cargo volume business. In addition to this high cost of fuel and labour also serve to generate considerable weakness on the business prospects of the organization (Datamonitor, 2007, p.24). Opportunities Opportunities for Delta Air mainly arise from the high growth of passenger traffic mainly in the Asia Pacific region and Latin America. In addition to this growth of cargo over the pacific has also improved showing good opportunities for the organization (Datamonitor, 2007, p.24). Opportunities for the organization also arise from the fact that the markets across US and

Analysis and Application of Traditional Governance Models Essay

Analysis and Application of Traditional Governance Models - Essay Example Not only in US , in all the other parts of the world, higher education institutions are complex organizations which have tremendous impact on the society. â€Å"Growing demand among learners for improved accessibility and convenience, lower costs, and direct application of content to work settings is radically changing the environment for higher education in the United States and globallyThe demand for higher education is increasing globally. (Sloan-C ) They are in search of convenient, cost effective and quality higher education in this rapid changing environment. In the case of Doctors, only an MBBS qualification is not sufficient enough for getting a good job. Along with MBBS, they need higher qualifications like MD, MS etc. to get good jobs. But such courses are not common everywhere and also the number of seats limited for such higher courses. The world economy is directly linked with knowledge. New organizations are emerging to cater the need of the higher education. Organizational changes and new developments are accelerating advances in learning technologies. Growing demand for learning combined with these technical advances challenges the traditional principles of old universities and institutions. New organizations compete directly with traditional universities. Traditional universities are changing their methodologies and curriculum to cater the demands of the modern world. The universities also divided into different segments like Public University, Open University, Self financing University, Science and Technology University, Agriculture University, Vocational University etc. Some of them functions under the government while others under private sector. Higher educational organizations are different in many ways from other organizations. Conventional management theories may not work with such institutions. The structure, objectives, accountability, all will

Thursday, October 17, 2019

STRATEGIC PLANNING AND CHANGE Assignment Example | Topics and Well Written Essays - 750 words

STRATEGIC PLANNING AND CHANGE - Assignment Example consider conscious involvement of all employees and key stakeholders as well as the application of the right tools so as to realize positive responses. The management need to ask themselves a number of questions based on how they can make the change process motivating to employee, how they can achieve clear understanding of the process among the employees and how to extend the knowledge to the staff. In order to successfully realize the benefits expected from the change process, managers must embrace the four engagement tools or benchmarks namely learning, involvement, rewards and communication. Effective communication of the tenets of the change initiative offers guidelines and direction to the employees so that they are well informed of their roles in the process. When change is properly communicated, the employees will feel some sense of ownership and control during the process (Freytag and Hollensen, 2001). The inclusion of the learning process through proper training enables employees to gain confidence and realize how real and serious are the changes. The creation of a learning environment is of great importance to the change process owing to the fact that changes within organizations need new skills and attitudes towards their implementation. Training help in minimizing the anxieties associated with the change process as well as granting the employees sufficient time to adjust and progress to the point where threats linked to the change process are no longer felt. According to Fairbairn the learning theory proposes that employees are motivated to respond by physiological demands that are based on the competency, self-sufficiency and understanding. Competence occurs when people develop a feeling that they are very important in the realization of the components of a given change process (Dube, et. al, 2005). Full involvement of employees in the work process is another are that managers must focus on for in-depth realization of the change process

Hollywood Science Research Paper Example | Topics and Well Written Essays - 500 words

Hollywood Science - Research Paper Example The film presents the scenario of doing a spacewalk extremely well. Notably, the visual impact of the astronauts to possess only the glass of their helmet between them and the Earth is legitimate in scientific terms. Similarly, the director renders the physicality and movement during the spacewalk in an accurate manner. Many scenes reveal the challenging attempt of the astronauts to start a motion and stop it in the vacuum place. It is scientifically correct that stopping motion in the vacuum is difficult. Although the execution of realism by detailing the real danger of the space travel is evident in the film, the closer examination of Gravity shows minor scientific flaws. Largely, the film Gravity violates the laws of physics. Notably, it is difficult for the astronauts to hop from a particular spacecraft to another easily. The shift from one station to the other demands tremendous energy, as well as, careful planning in order to change the orbits. The capturing of the simplicity to navigate in the space evokes questions about the plausibility of the application of the laws of physics. Hence, the film makes a notable error in presenting the shifting as an easy endeavor in the space. Similarly, the film fails to utilize the fundamental facts of science when the director presents a character struggling out in a vacuum. It is a mystery for Clooney to release Bullock’s tether, and the attempt makes the two characters to drift away from each other. In reality, the space has zero gravity. Thus, the scientific laws should dictate that a single tug would automatically bring bodies together instead of separating them. Efthimbiou and Ralph contend that a failure to incorporate fundamental scientific facts render sci-fiction films less informing. In essence, the film recreates the shuttle, the spacesuits, and space station perhaps to add drama or extend the plot. Arguably, overemphasis of the simulation of the physics about thrusts and counter-spin is noticeable in

Wednesday, October 16, 2019

Analysis and Application of Traditional Governance Models Essay

Analysis and Application of Traditional Governance Models - Essay Example Not only in US , in all the other parts of the world, higher education institutions are complex organizations which have tremendous impact on the society. â€Å"Growing demand among learners for improved accessibility and convenience, lower costs, and direct application of content to work settings is radically changing the environment for higher education in the United States and globallyThe demand for higher education is increasing globally. (Sloan-C ) They are in search of convenient, cost effective and quality higher education in this rapid changing environment. In the case of Doctors, only an MBBS qualification is not sufficient enough for getting a good job. Along with MBBS, they need higher qualifications like MD, MS etc. to get good jobs. But such courses are not common everywhere and also the number of seats limited for such higher courses. The world economy is directly linked with knowledge. New organizations are emerging to cater the need of the higher education. Organizational changes and new developments are accelerating advances in learning technologies. Growing demand for learning combined with these technical advances challenges the traditional principles of old universities and institutions. New organizations compete directly with traditional universities. Traditional universities are changing their methodologies and curriculum to cater the demands of the modern world. The universities also divided into different segments like Public University, Open University, Self financing University, Science and Technology University, Agriculture University, Vocational University etc. Some of them functions under the government while others under private sector. Higher educational organizations are different in many ways from other organizations. Conventional management theories may not work with such institutions. The structure, objectives, accountability, all will

Tuesday, October 15, 2019

Hollywood Science Research Paper Example | Topics and Well Written Essays - 500 words

Hollywood Science - Research Paper Example The film presents the scenario of doing a spacewalk extremely well. Notably, the visual impact of the astronauts to possess only the glass of their helmet between them and the Earth is legitimate in scientific terms. Similarly, the director renders the physicality and movement during the spacewalk in an accurate manner. Many scenes reveal the challenging attempt of the astronauts to start a motion and stop it in the vacuum place. It is scientifically correct that stopping motion in the vacuum is difficult. Although the execution of realism by detailing the real danger of the space travel is evident in the film, the closer examination of Gravity shows minor scientific flaws. Largely, the film Gravity violates the laws of physics. Notably, it is difficult for the astronauts to hop from a particular spacecraft to another easily. The shift from one station to the other demands tremendous energy, as well as, careful planning in order to change the orbits. The capturing of the simplicity to navigate in the space evokes questions about the plausibility of the application of the laws of physics. Hence, the film makes a notable error in presenting the shifting as an easy endeavor in the space. Similarly, the film fails to utilize the fundamental facts of science when the director presents a character struggling out in a vacuum. It is a mystery for Clooney to release Bullock’s tether, and the attempt makes the two characters to drift away from each other. In reality, the space has zero gravity. Thus, the scientific laws should dictate that a single tug would automatically bring bodies together instead of separating them. Efthimbiou and Ralph contend that a failure to incorporate fundamental scientific facts render sci-fiction films less informing. In essence, the film recreates the shuttle, the spacesuits, and space station perhaps to add drama or extend the plot. Arguably, overemphasis of the simulation of the physics about thrusts and counter-spin is noticeable in

Suicide Among the Elderly Around the Holidays Essay Example for Free

Suicide Among the Elderly Around the Holidays Essay Based on statistics, there is one elderly suicide committed every ninety minutes and this percentage relates to the age group of 65 years and above (National Mental Health Information Center). Suicide among the older people is growing rampantly. There are a number of reasons for committing suicide, and this ranges from depression to alcohol or substance abuse. This testimony becomes very helpful to not only Americans but to everyone in the world. Because of this testimonial, many are made aware of the truth or causes of why the elderly starts to think of taking their lives. Baby Boomer Care. (2007). â€Å"Why Do The Elderly Commit Suicide? † Retrieved June 5, 2010, http://www. babyboomercaretaker. com/senior-health/Why-do-the-Elderly-Commit-Suicide. html It has been accounted that statistically, there are more suicidal attempts and acts among the elderly than the teen and younger adults. Living in isolation, depression due to loss of a loved one, physical health, inability or difficulty to cope with crisis and stress are the usual causes and reasons our elderly perform suicidal attempts and actions. Having this information makes us wary and aware of the causes and reasons of such actions. â€Å"Elders who are at a high risk of suicide usually show certain behavioral and personality traits such as higher dependency, being overcome by an intense sense of helplessness and hopelessness, possess poor crisis management abilities, are extremely irritability, and demonstrate a certain degree of antisocial behavior (Baby Boomer Care). † Suicide Among the Elderly During the Holidays Lawson, W. (2003). â€Å"Holiday Suicide Myth. † Retrieved June 5, 2010, form http://www. psychologytoday. com/articles/200401/holiday-suicide-myth Although there have been many speculations and stories that most suicides happen during the holidays or winter season, this surmise is nothing but a hypothesis or a hunch and is considered as a myth. In fact, researchers and statistics express that suicidal acts and attempts of elders drops and declines during the holiday season. McIntosh, J. (2003). â€Å"Suicide and the Holidays: Myths and Facts† Retrieved June 5, 2010, form http://www. medicinenet. com/script/main/art. asp? articlekey=54647 Suicidal attempts are unlikely to happen during the winter season or Holidays. Old people take their lives on the basis of loneliness, stress of losing a love one, depression and isolation. During the holidays, people are surrounded by family, relatives and friends. This is a â€Å"season of giving. † And when we are surrounded and with friends and family, we are most able to socialize and express our feelings. In the case of the older people, ranging from 65 years and above, this is the time that they are unlikely to be left alone with their thoughts and memories of the past. Thus, suicide during the holidays a myth and an assumption. McIntosh, J. Phd (2008). â€Å"How to Help A Suicidal Older Men and Women. † Retrieved June 5, 2010, form http://www. healthyplace. com/depression/suicide/how-to-help-a-suicidal-older-men-and-women/menu-id-68/ â€Å"The causes of elderly suicide are treatable and suicide is preventable. Risk Factors for elderly suicide and how to help suicidal seniors (McIntosh, 2008). † Suicide among the elderly is a given fact and it is not a hypothetical topic to talk about, it really is happening at our present date. However, the reasons and causes of suicide may be treated and prevented. Old people who are suicidal usually experience pain, whether physical or emotional. They also may be feeling distressed and dissatisfied with their current life situations. There is a growing rate of 50 percent of suicidal actions from the older people. There is a way to help and prevent suicide from happening. If we look and pay much attention to the signs and symptoms we may be able to help these people from committing suicide. Nuys, D. V. PhD. (2009). â€Å"An Interview with Thomas Joiner, Ph. D. on Why People Commit Suicide. † Retrieved June 5, 2010, from http://www. mentalhelp. net/poc/view_doc. php? type=docid=29060 Suicide is a growing public health problem today. Suicide is one of the results and outcome of having mental disorders. Suicide is a common product of depression, stress and loneliness. Though this is a fact, this is controllable. Feeling and being depressed, stressed and lonely can always be managed. Having a positive mind and trying to be active in spite the old age will greatly help decrease the number of people committing suicide. Bibliography: Rosenberg, M. (1996). â€Å"Testimony on Suicide Among Older Americans. † Retrieved June 5, 2010, from http://www. hhs. gov/asl/testify/t960730a. html Baby Boomer Care. (2007). â€Å"Why Do The Elderly Commit Suicide? † Retrieved June 5, 2010,from http://www. babyboomercaretaker. com/senior-health/Why-do-the-Elderly-Commit-Suicide. html National Mental Health Information Center. (n. d. ) NATIONAL STRATEGY FOR SUICIDE PREVENTION Retrieved June 5, 2010, from http://mentalhealth. samhsa. gov/suicideprevention/elderly. asp Farberow N. L. (1961). â€Å"The Cry for Help. † Retrieved June 5, 2010, from http://www. questia. com/PM. qst? a=odocId=98403730 McIntosh, J. (2003). â€Å"Suicide and the Holidays: Myths and Facts† Retrieved June 5, 2010, form http://www. medicinenet. com/script/main/art. asp? articlekey=54647 McIntosh, J. Phd (2008). â€Å"How to Help A Suicidal Older Men and Women. † Retrieved June 5, 2010, form http://www. healthyplace. com/depression/suicide/how-to-help-a-suicidal-older-men-and-women/menu-id-68/

Monday, October 14, 2019

The Automated Teller Machines

The Automated Teller Machines Automated Teller Machines (ATMs) have gained prominence as a delivery channel for banking transactions in India. Banks have been deploying ATMs to increase their reach. As at the end of December 2007 as per the RBI circular, the number of ATMs deployed in India was 32,342. More people are now moving towards using the automated teller machines (ATM) for their banking needs. According to a survey by Banknet India, 95% people now prefer this modern channel to traditional mode of banking. Almost 60% people use an ATM at least once a week. Increased ATM usage is also helped by the fact that customers have now the flexibility of using ATMs of other banks, as most of the banks are part of major interbank networks like National Financial Switch (NFS), Mitr, BANCS, Cashtree and Cashnet. The interbank networks have brought together ATMs of several banks so that consumers would gain access to any of the participating banks ATMs. Banks find it cheaper to pay membership fees to these networks as against setting up additional units in expensive-to-deploy areas. ATMs are now seen to be more than mere cash dispensing machines. Customers use ATMs to recharge their mobile phone pre-paid connections, pay their utility bills, even mutual fund transactions making them at par with flexibility given in internet banking only more secure. Of the value-added services provided at ATMs, bill-payment is the most used service, followed by prepaid mobile talk-time recharges. However, still about one third of the respondents do not use any value added services at ATMs. The ATM market in India is not yet saturated. Though the concentration of ATMs is greater in metros, the demand is increasing for other cities and even rural areas. ATMs per million people approximately is 33 units is very low. Experts forecast that the growth rate (CAGR) is expected to grow 18 percent up by 2013. Banks going into a self service model can have huge saving potential for banks and may also increase the convenience for the customers. Following is a representative trend taking into account the growth in the number of ATMs in three of the largest Indian banks: ATM Supply Chain Network Activities Following are the major activities carried out as part of the ATM supply chain or in supporting the ATM services of a bank Maintenance Activities Site Telecommunication Link Cash Refilling ATM Monitoring Handling Customer Complaints Reconciliation of Cash And Interbank Transactions Following is a sample ATM Supply chain network: Bank Head Office ATM Vendors Outsourced Agent Bank Branch 1 Bank Branch 2 ATM As can be seen from the network above, the major participants in the ATM supply chain network are: ATM Vendors If the bank ATM and the related IT infrastructure is outsourced then; the ATM infrastructure is operated and maintained by the ATM vendors for a fees. It provides the advantages of cost efficiency and scalability for the banks Outsourced Delivery agents They are the ones who supply cash to the ATMs. They either have a Vault Cash account where the vendors themselves maintain some cash balance or they have an Overdraft Account with the Bank itself, which gets debited after each withdrawal and credited after the deposit at the ATM. Bank Branches These are the Bank branches in-charge of the various ATMs in a particular area Bank Head Office This is the main office branch of a bank in a particular city or district ATM supply chain IT infrastructure ATM Infrastructure Information flow Delivery Channel Coordinator Switch Network Outsourced Delivery Agents Card Issuers Server ATM Information flow for cash withdrawal and for Credit Cards Information flow for cash replenishment MIS Info ATM It interfaces with the switch network to exchange cash withdrawal, cash replenishment and credit card information Outsourced Delivery Agents They receive information from the delivery channel coordinators to replenish the ATM cash Delivery channel coordinator They receive cash replenishment and MIS information from the switching network. There is always more than one ATM under each Delivery channel coordinator to take advantage of the economies of scale. Also, the channel ordination can be either manually managed or automated. Switch Network The switch server authenticates the user, as well as exchanges cash replenishment related information with the individual ATMs Card Issuers Server The banks host server interacts with the switch network to obtain card withdrawal and credit card information while at the same authenticating the credit card transaction from the Card Issuers Server Delivery Channels Delivery channels are medium for information transmission or cash transmission in a banking context. They are also known as touch-points, which deliver service to the end-user in his convenience. The primary medium of touch-point was the brick-mortal form of banking. However as time passed, and information technology proliferated banks were able to extend the touch-points to various other forms such as: Automated Teller Machines (ATM) Point of Sale (POS) Mobile Banking Internet Banking The delivery channel innovation was started by private banks foreign banks after the 1991 reforms when many banks were allowed to carry out operations in India. Advantages of Delivery Channels Deliver channels provide the following benefits to users Easy access 247 availability Security, Reduced transaction costs Options of access per convenience Acceptance Implementation Old generation banks with little or marginal systems have acceptance issues with the disruptive technologies of internet. The acceptance issue also comes with many of the old generation customers who believe in losing the personal touch of banking. Implementation issues center around the following: Centralization of Data Multiple technologies for different systems Security issues (Customer end/Banking end) Multiple interface for different channels Synchronization of information across channels Currency Distribution Banks need to maintain a certain level of cash in order to service its daily withdrawals. There is an entire supply-chain in place which helps in ensuring the same. Below is a diagram of how money travels from the press to the various banks ATM Presses/Mints Public Press-linked offices Currency Chest offices (Banks) An overview of the supply-chain of Banks The presses and mints where notes and coins are printed are under the RBI. The money from the mints and presses is moved daily to the 19 press-linked offices. These are sent to the nearby zonal currency-chest banks, essentially Banks which store current called as Chest offices. There are in all 4279 chests and 4040 coin depots. Functions of the Chest office Fulfills the requirement of peoples funds Withdrawal and acceptance of unfit notes Payments to Governments Operates with minimum balance at all times Each day the records are maintained for the issue/acceptance of currency. It also has to maintain the asset-liability position in cash management. Currency in Circulation Just as a manufacturing supply chain deals with product varieties also known as SKUs, the currency supply chain also has its SKUs through various denominations. The shift towards higher denominations was observed since the wide-usage of ATMs. Various steps were also taken to phase out Rs .5/- notes and replacing with coins for many such low denominations Source:RBI Docs, Currency Management, Section VIII, Dt. 27/08/2009 Clean-Note Policy To ensure the life of currency notes, RBI issued a directive to all bank offices to cease the stapling of notes and instead band them and the soiled notes be returned to RBI. But devalued stapled notes were still lying with banks. IT systems were used to create a Currency Verification Processing (CVP) system. This categorized notes into Fit, Unfit, Reject and Suspect categories. A Citizens charter was also issued providing guidelines on how to identify soiled notes and steps to be taken to return to RBI. However due to implementation issues kept the proportion of soiled notes in circulation from 15.9 million pieces (2002-03) to 10.9 million (2008-09). Logistics Distribution Challenges Each bank generally arranges for personal logistics service with police protection. Security vans are used for short-distances and train for longer distances. The extent and size of the country poses a significant problem in meeting need for currency at various pockets in India. Following are some of the issues faced in distribution Security availability of railway wagons Political boundaries that inefficiently defining jurisdiction of Issue offices which lead to suboptimal logistic services Moving currency across touch-points an exercise that is avoidable is generally carried out Private security is not desirable and police cant be dedicated for this exercise Various existing distribution systems of milk-cooperatives, post-offices, coin-dispenser mechanisms and a directive to issue bulk users with a certain proportion of coins was made. Supply Challenges With 4 printing presses, supply after 1999 was not a problem, but the pace of notes replacement made quality of notes deteriorate. Since the notes that were returned came unsorted there were inefficiencies in understanding the outflow of currency from system. In order to develop capacities to free-up vault space in banks various measures like shredding systems in all offices were setup. Demand-forecasting among banks Banks carry out demand-forecasting using statistical analysis using long-term historical demands to calculate forecasts. These aim to serve the following needs: Incremental needs As and when money is needed by RBI, the presses supply Replacement needs Money is needed to replace specific notes, which are soiled or disfigured Reserve needs Emergency requirements to fulfil reserve requirements by banks Technology in Currency Operations With such a vast network of banks, the Reserve Bank established Integrated Computerized Currency Operations and Management Systems (ICCOMS) which helped in error-free reporting and accounting of chest-level transactions. Security in distribution and ATM Security is increasingly becoming more significant in network environment with the emergence of the internetworking technology. The internetworking technology can act as or provide the communication channels across networks so that machines in different networks can talk to each other. But such kind of technologies like ATM is exposed to all kinds of attacks in such an accessible environment. Most of the network technologies, without integrating with security mechanism originally, are being redesigned to provide some security services. ATMs attempts to be secure by keeping the customers personal identification number (PIN) and other information safe by using encryption software such as Triple DES (Data Encryption Standard) Threats to ATM networks Like other such networks, ATM networks suffer a lot of threats like eavesdropping, spoofing, service denial, VC stealing and traffic analysis etc. And VC stealing and traffic analysis happen only in ATM networks. Eavesdropping Eavesdropping refers to the threat that the attacker connects or taps into the transmission media and gain an unauthorized access to the data. It is one of the most common attacks to the network. Service Denial ATM technology is a connection-oriented technique managed by a set of signals. By sending some anti-signals frequently, the attacker can disturb the communication between user A and user B to a great extent which can disable the Quality of Service(QoS) in ATM. Combining this technique with other tricks like eavesdropping, the attacker can even completely block one user from another. Stealing of VCs If two switches in an ATM network compromise, the attacker can even steal a VC from another user. Some argue that possibility of compromising of the switches is quite low but that is true only if the ATM network is owned by one organization. But this is not the case today since in ATM internetworking, in which case cells travel through different ATM networks, it becomes very easy for two switches to compromise. Traffic Analysis Its a kind of threat in which a hacker can get information by collecting and analyzing the information (not the actual content of communication) like the timing, volume and about the parties communicating through a Virtual Circuit. Encryption effects only the content and not the timing and volume of the communication. So gaining access to even these can reveal a great deal of information to an attacker. Generally this attack doesnt happen but can happen when ATM is used in a highly stringent and securitised environment. Major requirements/functions of an ATM security system User Identity Verification: The system should have the facility to establish and verify the identity of all the users and players in an ATM network. Controlled Access and Authorization: The system should ensure that any player without authority to gain access to some information or resources should not be able to access it. Protection of Confidentiality: Every data that is stored or used in communication should be kept classified. Protection of Data Integrity: Guarantee regarding the integrity of the stored communicated data should be given by the Security system. Strong Accountability: The system should ensure that No entity is able to deny the responsibility of its any of the actions or efforts carried out by her. Activities Logging: The security system should support the capability to retrieve information about security activities in the Network Elements with the possibility of tracing this information to individuals or entities. Alarm reporting: Provision of generation of alarm notifications regarding certain selective events related to security. Audit: Provision of analysing of data logged into the system in case of any security violation so that required measures can be used and checks can be installed. Security Recovery: Provisions of recovery from successful or attempted security violations. Security Management: Proper management of the security services required as a part of above requirements. Suppliers of cash main source: Central bank The most important requirement of an ATM is one major motive behind the technology i.e. making money easily available to the customers. Traditionally there have been a number of suppliers of cash starting from unorganised money lenders in the past to the modern banks today. A bank is a financial intermediary that accepts deposits and gives loans to customers using those deposits. Can be commercial or retail banking or the money can be lend either directly to the customer or also through the use of markets. Banking channels Apart from their branches, bank offers many different channels to access their banking and other services. Among these, few channels help the customers in carrying out transactions without the involvement of real cash. These are E- Mail, Telephone, Call banking, Mobile and Video banking etc. In addition to all these channels, banks provide a source of real cash called ATM through a machine that dispenses cash and sometimes takes deposits without the need for a human representative from bank side. Major source of money: Central Bank A central bank is a banking institution with an exclusive privilege to lend to its government. It behaves both as a normal commercial bank wherein it charges interest on the loans made to borrowers, majorly the government of the country the bank exists for and also as a lender of last resort wherein it lends to the banks when situation is not too good or as a part of the statutory requirements. But Central bank has a monopoly on creating the currency of that nation and it is the kind of bank that can lend money to other banks in times of need. It is the major source of money in a market and acts as the regulator of money supply too. Security in Distribution on and ATM Security is increasingly becoming more significant in network environment with the emergence of the internetworking technology. The internetworking technology can act as or provide the communication channels across networks so that machines in different networks can talk to each other. But such kind of technologies like ATM is exposed to all kinds of attacks in such an accessible environment. Most of the network technologies, without integrating with security mechanism originally, are being redesigned to provide some security services. ATMs attempts to be secure by keeping the customers personal identification number (PIN) and other information safe by using encryption software such as Triple DES (Data Encryption Standard) Major requirements/functions of an ATM security system User Identity Verification: The system should have the facility to establish and verify the identity of all the users and players in an ATM network. Controlled Access and Authorization: The system should ensure that any player without authority to gain access to some information or resources should not be able to access it. Protection of Confidentiality: Every data that is stored or used in communication should be kept classified. Protection of Data Integrity: Guarantee regarding the integrity of the stored communicated data should be given by the Security system. Strong Accountability: The system should ensure that No entity is able to deny the responsibility of its any of the actions or efforts carried out by her. Activities Logging: The security system should support the capability to retrieve information about security activities in the Network Elements with the possibility of tracing this information to individuals or entities. Alarm reporting: Provision of generation of alarm notifications regarding certain selective events related to security. Audit: Provision of analysing of data logged into the system in case of any security violation so that required measures can be used and checks can be installed. Security Recovery: Provisions of recovery from successful or attempted security violations. Security Management: Proper management of the security services required as a part of above requirements. Suppliers of cash main source: Central bank The most important requirement of an ATM is one major motive behind the technology i.e. making money easily available to the customers. Traditionally there have been a number of suppliers of cash starting from unorganised money lenders in the past to the modern banks today. A bank is a financial intermediary that accepts deposits and gives loans to customers using those deposits. Can be commercial or retail banking or the money can be lend either directly to the customer or also through the use of markets. Banking channels Apart from their branches, bank offers many different channels to access their banking and other services. Among these, few channels help the customers in carrying out transactions without the involvement of real cash. These are E- Mail, Telephone, Call banking, Mobile and Video banking etc. In addition to all these channels, banks provide a source of real cash called ATM through a machine that dispenses cash and sometimes takes deposits without the need for a human representative from bank side. Major source of money: Central Bank A central bank is a banking institution with an exclusive privilege to lend to its government. It behaves both as a normal commercial bank wherein it charges interest on the loans made to borrowers, majorly the government of the country the bank exists for and also as a lender of last resort wherein it lends to the banks when situation is not too good or as a part of the statutory requirements. But Central bank has a monopoly on creating the currency of that nation and it is the kind of bank that can lend money to other banks in times of need. It is the major source of money in a market and acts as the regulator of money supply too. nation and it is the kind of bank that can lend money to other banks in times of need. It is the major source of money in a market and acts as the regulator of money supply too. Demand Projections for ATMs Most ATMs are connected to international bank networks, enabling people to withdraw and deposit money from machines not belonging to the bank or country where they have their account. Serving the ATMs network is a costly task: it takes employees time to supervise the network and make decisions about cash management and it involves high operating costs (financial, transport, handling, insurance etc.). As interest rate rises and greater operating efficiencies become paramount. Some banks typically maintain as much as 40% more cash at their ATMs than whats needed, even though many experts consider cash excess of 15% to 20% to be sufficient. Cash related costs represent about 35-60 % of the overall costs of running an ATM. Through currency management optimization, banks can avoid falling into the trap of maintaining too much cash and begin to profit by mobilizing idle cash. Effective currency management and control starts with an automated solution that uses advanced algorithms to accura tely predict currency supply and demand, allowing banks to forecast demand and pro-actively manage currency throughout their network. Transportation and servicing cost increase can be substantial for banks. To achieve the lowest cost of distribution based on accurate supply and demand forecasting and optimization procedures is critical for a bank to lower its operational expenses and improve the return on its cash assets. What is expected of a forecast model of the ATM network is that it simulates historical demand by using data from actual cash-in transactions and cash-out transactions. The historical demand model is overlaid with additional factors, such as paydays, holidays, and seasonal demand in a specific area. Analytical models are aligned with the experience of resources that have intimate knowledge of the banks daily operations and are used to determine the optimum cash amount for each ATM by calculating the transport and money upload costs against interest rates. Cash drawings are subject to trends and generally follow weekly, monthly and annual cycles. An appropriate model for a bank and its branches or ATMs should estimate optimal amount of stocked money plus efficiently manage and control day-to-day cash handling, transportation with reducing of currency transportation and servicing costs. The system should be flexible enough to allow the bank to reforecast future demand, perform WHAT IF analyses, and optimize the network as the cash distribution environment evolves. Cash demand forecast for every ATM is based on linear regression models with seasonality coefficients. The development of such models is relatively complicated and differs for various ATM. Therefore preparation of forecasting models for whole ATM network is difficult task for owners of machines. The parameters of forecasting models are determined in the system implementation stage and are held constant during the operation phase. However, business environment changes continually in real world and, therefore, the model parameters must be also adapted to the changing environment. A recent paper on the optimization techniques proposes the use of artificial neural networks combined with existing what-if analysis tools and simulation modelling procedures. This advanced method will handle the drawbacks of simple regression models but will be more accurate in projecting the demand. Off-late a few advanced software packages developed by traditional financial network giants like Visa are also available that provide powerful cash management facility. Publicly available data regarding these software packages suggest that they also use multi-regression models for prediction purposes. Network optimization models for cash distribution to various ATMs are also important to reduce the costs across the supply chain. In the first instance, it can be very valuable to coordinate cash uploading and service procedures while visiting the ATM network. Coordinated route planning for maintenance of various ATMs could also reduce the ATM networks management costs significantly. Issues in Currency Identification Counterfeit currency notes is one of the biggest problems that are currently plaguing the cash distribution network. A lot of people suffer from this while withdrawing cash from an ATM when they inadvertently receive a fake note in a bundle of proper bills. It is difficult to prove accountability in case of such an incident and fix blame. Of the 48,963 million pieces of currency in circulation in 2009 398,111 pieces were found to be counterfeit. RBI has come with a set of recommendations to be implemented across the distribution network that forms the supply chain of cash distribution to check counterfeit, maintain quality of notes in circulation, strengthening of security systems and procedures and fixing accountability in case of human error. These recommendations are as given below: (A) Measures for facilitating detection of counterfeit notes and maintaining quality of notes in circulation (i) Note Sorting Machines (NSMs) / Desktop Sorters may be installed in all bank branches in a phased manner for early detection of counterfeit notes. (ii) Banks may ensure the quality of the notes fed in ATMs. They may conduct periodic audit of the agents used for outsourcing this activity viz. the CIT companies. Banks may switch over to the cassette swap system for feeding the ATMs. New ATMs installed may be provided with in built note detectors. Over a period existing ATMs may also be required to have in built note detectors. (iii) Performance parameters of NSMs may be standardized by RBI to ensure that all NSMs installed adhere to the laid down standards for detection of counterfeit notes. (iv) RBI may ensure that the plan for withdrawal of notes of old series is implemented strictly as formulated and that the new series of banknotes with more robust security features be introduced as early as possible. RBI may also facilitate R and D efforts for development of new security features. (v) Where any person inadvertently in possession of counterfeit notes upto five (5) pieces tenders the same at a bank counter, the requirement of filing FIR may be done away with. A simple report may be filed with the branch which in turn may include this in the Counterfeit Currency Report (CCR) to FIU-IND / RBI. (vi) RBI may review the system of incentives and disincentives for detection and disclosure of counterfeit notes while assisting the enforcement agencies in dealing appropriately with those involved in making and distribution of counterfeit notes. (B) Measures relating to cash holding and distribution (vii) RBI may stipulate suitable cash holding limits for all currency chests beyond which the cash should necessarily be moved to a chest with larger limits or to RBI. (viii) Each RBI office may undertake a review of the requirement of currency chests in their jurisdiction based on the volume and nature of transactions, accessibility of the chest and other factors including security so as to rationalize the number of chests and upgrade the facilities thereat for better security and efficiency. (ix) To tap advantages arising out of economies of scale, minimize overnight cash risks at bank branches and to benefit from sophisticated logistics techniques banks may be encouraged to establish Currency Processing Centres, which should be permitted to charge other banks for processing services. (x) As NSMs have to be installed at all branches for sorting notes before dispensation, banks will have to make necessary investments. The cost of such investments will need to be recovered from the bulk tenderers of cash. Banks may put in place a transparent policy for such charges of cash handling/processing with the approval of their respective boards as already advised by RBI vide its DBOD directive DIR.BC.86 / 13.10.00 dated September 7, 1999. (xi) RBI may take initiatives in promoting use of cards and electronic means of payment. (C) Measures for strengthening security systems and procedures (xii) RBI may explore enlisting the services of a specialized and dedicated force / other approved agencies to provide security at chests and for movement of treasure. (xiii) RBI may explore upgradation of the security systems in currency chests and RBI vaults incorporating electronic bio-metric access, electronic locking of bins, and surveillance through Closed Circuit Television (CCTVs). Networking of CCTVs at chests within the jurisdiction of a controlling office of the bank may be explored for better surveillance. (xiv) Tamper-proof shrink wrapping of soiled notes with bar coding of details of the branch remitting them may be introduced. (xv) A system of quarterly security audit of currency chest branches by controlling offices may be introduced. Comprehensive guideline / format may be prepared by RBI /IBA. (xvi) A system of risk based inspection of currency chests may be introduced by banks / RBI taking into account various parameters for evaluating the extent of risk. (xvii) Banks may draw up a contingency plan / disaster management plan in consultation with local police. (xviii) RBI may explore the possibility of introducing a defacing system of self inking / marking of banknotes in transit or in chests, which would automatically trigger-in if there is an attack / attempted robbery/ theft etc. (D) HR Measures (xix) Banks may modify their transfer pricing policy or equivalent policy so as to pass on the benefit on account of having a currency chest to the branch where the chest is maintained. (xx) Rotation of staff posted at currency chests may be ensured to prevent vested interest and entrenched non adherence of laid down systems and procedures. (xxi) Where deviations and irregularities are found, controlling offices may take immediate punitive action after fixing accountability. (xxii) Bank may accord recognition to currency handling operations as a sensitive and skilled activity and provide necessary incentives and training. A. Dis

Sunday, October 13, 2019

A New Policy on High-heeled Shoes :: Medical Medicine Health Essays

A New Policy on High-heeled Shoes Background Throughout history, women have bent over backward to feel and look attractive. Many of the methods used to obtain this goal are dangerous to their health. The high-heeled shoe, one of the most popular types of women’s foot apparel, belongs in this category. The pump puts a tremendous amount of stress on a woman’s knees, back, heels, and toes. To avoid these potential problems, women should be warned about the dangers of wearing high-heeled shoes. Needs Without knowledge of the damage done by high-heeled shoes women are put in danger of permanently harming their bodies. "High heels hurt and can cause significant health problems including bunions, heel pain, toe deformities and painful trapped nerves" (1). Many women experience lower back pain resulting from the extended wear of high-heeled shoes. Women are also more likely to sprain an ankle while wearing heels than while wearing flatter shoes. The constant wearing of a heeled shoe can shorten the Achilles tendon over time, causing the wearer to lose a range of motion in the foot. This can result in causing pain during any exercise, even one so simple as walking(1). Another health concern is the strain on the knee, which can result in osteoarthritis, a chronic degeneration of cartilage in the joints. A two-inch heel is enough to cause an increased amount of strain on the inner side of the knee, possibly setting the stage for the onset of this condition (2). Below are two diagrams sh owing the health dangers of extended high-heel shoe wearing, Figure 1.1 shows the injuries to the foot and Figure 1.2 shows the damages to the rest of the body. Source: www.ama-assn.org/insight/en_hlth/atlas/newatlas/mufront.htm (3) Source: www.ama-assn.org/insight/gen_hlth/atlas/newatlas/foot.htm (4) Many women also have to waste money going through a corrective surgery that otherwise could have been avoided if they had been aware of the damage caused by high-heeled shoes and had been more moderate with the amount of wearing time. "The total estimated cost for this avoidable surgery is $2 billion annually" (1). This wastes time and labor, both of which could have been easily saved by an informational warning about the risk of wearing high-heeled shoes. Idea Since there are so many ill effects resulting from high-heeled shoe usage, women should be informed of them. I propose the best way to do so is to place a warning label on all high-heeled apparel boxes. This label would appear something like the following:

Saturday, October 12, 2019

Sir Thomas Malory :: Essays Papers

Sir Thomas Malory Sir Thomas Malory was an "English translator and compiler" (Encarta) who wrote "the first great English prose epic, Le morte d'Arthur (Encarta). However, little is truly known about Maloryà ­s personal life. We do know that the title of his most famous work, "Le Morte D'Arthur", was first seen on William Caxton's illustrated edition in 1485. In the first chapters, Malory "refers to himself as a knight-prisoner" (Paula Barker) which has led many historians, according to Paula Barker, to believe that at least some of Le morte d'Arthur was written while his incarceration. The work is a collection from French sources, The Vulgate-the Arthurian Prose Cycle (1225-1230), which Malory so delicately "reduced", in addition to Maloryà ­s own writings, additions, and compilations to produce Le morte d'Arthur. Today Maloryà ­s collection has become "the basis of most modern tellings of the Arthurian story. " Because it occurs just past the age of chivalry, the 15th century, Maloryà ­s work has the opportunity to evaluate the "elegance and leisure of the antecedents in chivalric literature." (Tara Knapp) It was written in English and consists of eight intertwining tales of King Arthur and his different knights, and is packed with "compassion for human faults and nostalgia for the bygone days of chivalry." (Encarta) Each tale flows from one to the other which allows better understanding for the reader. However some of that understanding is lost because it seems to be a tale told in a series of flashbacks which would allow for Maloryà ­s memory loss at times. Despite this loss, the story has cohesion because of its compilation from many different fragments of different stories. It is speculated by Tara Knapp, J. S. Brown, and numerous others that Malory was born in the year 1400. Although it is possible, his birth date could range from 1400 to as late as 1405. Little true facts are known of his personal life, although there has been some speculation concerning a Sir Thomas Malory of Newbold Revel in Warwickshire. According to Knapp, this knight served with a Richard Beauchamp, Earl of Warwick, who "had some difficulties with a local priory" resulting in a period of imprisonment for Malory as well as Beauchamp. More specifically this violent and vagrant individual committed several crimes such as robbery, murder, and extortion.

Friday, October 11, 2019

Team Strategic Plan

Team Strategic Plan * Core Values: * Loyalty – stay committed to the team’s schedule. * Respect – Treat others as you would wish to be treated * Selfless Service – Put the best interest of the team and class above yourself * Integrity – Do what is right, even when no one is watching * Personal Courage – Do the hard right over the easy wrong * Operating Guidelines: * Zero tolerance for any member who refuses to contribute to the success of the team. * All team members are required to follow the Texas A&M-commerce’s code of conducts. * We will consult each other before taking any decisions. * SWOT Analysis: Internal Strengths- * Teamwork focused * Well rounded educational foundation * Diversity * Quantitative analysis * Writing skills * Internal Weaknesses- * 75% of members are 1st semester graduate students. * Ineffectiveness in communication because English is the second language for 75% of members. * None of the team members are famil iar with APA style. * External Opportunities- * Easy access to information about Strategic Management (textbook and library). * Abilities to research online needed information. * Aptitudes to ask for help to our wonderful well-educated teacher and at the Texas A&M-commerce library. External Threats- * Geographic distance * Limited time to achieve this assignment. * The high expectations of our teacher will not allow us to present a poor documented strategic plan. * Mission: (Who, what, when, where, why) This team was organized to enhance the collective learning experience and draw from the diverse backgrounds of its team members in order to successfully complete all MGT 591 course requirements to the highest standards . * Vision: (What we want to be): we will present to this class a strategic plan on the addressed topic: The potential Impact of Compassionate Leaders on Performance Excellence Initiatives. Goals: (Must be Specific, Measurable) * Broad Goals- write a research paper on the potential Impact of Compassionate Leaders on Performance Excellence Initiatives. * Specific Goals- * 1-Submit the team strategic plan on or before 11:30p. m. CST on 9/8. * 2- Submit the team Research Paper any time before 11:30p. m. CST on 10/27 * Strategy: (The plan of how and when to Achieve the Goals & Objectives. Who will do what, when) * Strategy Formulation- in order to be fully on time with the schedule, we will use all sources of communication available such as online chat, emails, phones, and face-to-face intercourse. Strategy Implementation- * First day of meeting: we will get to know each team member, choose a topic, and brainstorming on the best ways to get this assignment done on time. * Second day of meeting: first we will set a fix and detailed schedule. Then, we will found a common ground on whether to assign each team member with a specific part to research on, or to research the topic as a whole. * From then on until the final day: we will make sure to help eac h other stay on schedule. * Critical Success Factors: (Only two or three): * All team members must do thorough research on the topic. It is imperative to submit on time to avoid penalties. * Effective communication among team members. * Distinctive Competencies: (Different than Core values, but in line with them): the source of our competitive advantage comes from our diverse backgrounds. Each one of us has a different culture, which enables us to provide a synergy beneficial to this research paper. * Measurements and Feedback: this section will be use each and every day to avoid any misunderstanding. At any time, we will let each other know what we think should be done.

Thursday, October 10, 2019

Bubonic plague Essay

Bubonic plague has emerged and spread rapidly across towns, cities, and rural areas in several worldwide epidemics through the whole of history. Probably the earliest mention of bubonic plague is the Old Testament record in the First Book of Samuel giving an account of swellings and rodents that made attack on the Philistines (Ackroyd 55-57). The bubonic plague later hit the falling apart Roman Empire in the period of the sixth and seventh centuries. And from 1348 to 1350, the plague known as the Black Death brought the suffering and death across Europe and China, killing perhaps one-quarter or one-third of the population. This terrible epidemic outbreak of the deadly and highly infectious plague in China and Europe, that became possibly the worst catastrophe in all written history, still remains one of the most important and controversial tragic events through the history. Many professional historians of medicine analyzed the origin and spread of the Black Death, trying to explain or understand the origin and flow of epidemic disease during that period. This paper will discuss some of the perspectives and historical accounts by giving a glimpse of the evidence that various historians have considered. The Cause of the Black Death Most historians acknowledge that Europe and China experienced population pressure and famine in the 1300’s. Supporters of the demographic model usually link famine with plague, sometimes directly, sometimes vaguely. Famine and population pressure, state North and Thomas (1970), â€Å"set the stage for disease† and often were associated with the origin of the plague (1-17). Supporting such point of view, Le Roy Ladurie (1972) described the Black Death as a â€Å"holocaust of the undernourished† (3-34). Historians indicate that the Black Death had been preceded by the periods of famine, in particular the great famine of 1315-17 that was experienced by European population in the north, and it is also recorded that considerable population increase in general had already been reported before the Black Death. Consequently, analysis of supporters of the demographic model would suggest that the massive expansion of the twelfth and thirteenth centuries generated a situation where population growth went faster than food resources, with the outcome that lack of means by which population could maintain life became more serious and facilitated the origin of the epidemic. Other historians disagree. Thus, for example, Jean Meuvret (1993) argued that there was no simple or direct cause-effect relationship between famine/population pressure and Black Death. Jean Meuvret’s position was confirmed by Jean-Noel Biraben in a great study of the plague (Grmek and Fantini 319). Biraben demonstrated that although bubonic plague often originated after famine, there were many examples when famine came after plague and other cases in which plague was not accompanied by famine and vice versa. The historian came to conclusion that in the case of the Black Death there was no cause other than the plague itself that could have brought about epidemic. There may be found some relationship between famine and disease, he indicates, but it was not because famine became the cause of the plague; rather, it was because plague, after striking, aggravated famine as a result of the considerable stagnation of agriculture and economic disorder. Moreover, in all the recent medical literature that examines plague taking into account historical cycles, there is found no direct connection between lack of food and plague origin. These considerations generate doubt about the position of the demographic model. The Spread of the Black Death This section will begin by asking where Black Death came from, and why it emerged when it did. There is general agreement among contemporary observers and today’s historians that the Black Death of the fourteenth century originated in central Asia. Although it is hard to tell for sure, but there is also a growing opinion among historians that the Black Death came and expanded across Central Asia from China in the period of the 1340s and in 1347 it infected medieval Genoese traders who had established roots between Europe and Central Asia, it almost instantly emerged in Constantinople and was then right away communicated by the trade routes to the widespread areas of Mediterranean and western Europe. Historians have found out that already by the end of 1348 most population of southern and western Europe had been infected with this rapidly developing disease. It soon appeared in England and two years later it already hit the rest of the British land, Germany and Scandinavia. It is estimated that between a third and a half of all Europeans were killed by the Black Death of 1348-53 (Loudon 66). The dreadful disease spread every day from the sick to the noninfected. It was even not necessary to be near the infected: even being in contact with their clothes or anything they had touched was enough to become infected. Most of the poor population was not allowed to leave the houses and became sick every day by thousands. And for insufficiency of appropriate medical service and other things, almost all unavoidably were destined to terrible death. The epidemic killed whole communities. John Saltmarsh presents account of the genocide, economic stagnation and depression brought by plague. He refers to a French historian who described in detail deserted villages and farms. Saltmarsh cites a Franciscan Friar, John Clyn: Lest things worthy of remembrance should perish with time, and fall away from the memory of those who come after us, I, seeing these many evils, and the whole world lying, as it were, in the wicked one – myself awaiting death among the dead – inter mortuos mortem expectans – as I have truly heard and examined, so I have reduced these things to writing; and lest the writing should perish with the writer, and the work fail together with the workman, I leave parchment for continuing the work, if haply any man survive, and any of the race of Adam escape this pestilence and continue the work which I have begun (Creighton 115). This situation was not confined only to Europe. Beginning from the 1320s, the Black Death had carved its way along the roads of Central Asia. In particular China was hard affected. Some sources indicate that by the 1390s the population of China may have dropped to approximately 90 million from 125 million (Gottfried 35). Interpretations of the Black Death Medical professionals are now of the same opinion that the Black Death was the bubonic plague, arriving from central Asia, and carried by fleas and rats, which were widespread in medieval Europe. Medieval doctors, however, naturally possessed no knowledge to determine by diagnosis anything so dependent upon microscopic examination of phenomena. As a result, the plague was often attributed to God’s rage against the special depravity and corruption of that period. Thus, for example, in Piers Ploughman, Reason â€Å"proved that these pestilences were for pure sin, and the south-west wind on Saturday at even was for pure pride, and no point else† (Sumption 15). Contemporary astrological specialists noticed the deadly union of Saturn, Jupiter, and Mars. In addition, Jews were oppressed and destroyed as there was information that they had poisoned wells. Medical representatives had two opinions: the first group claimed that the cause was miasma, pollution of the air, and the second group considered that direct contact was the cause and recommended complete isolation. The quarantines were absolutely useless, taking into consideration the fact that the disease was transmitted by rats and fleas, but these nuances were not known until additional studies were done after the next great plague emerged in the 1890s. Conclusion Human devastation was tremendous in the period of the Black Death, and the demographic, economic, political, social, and psychological impact of the plague was greatly felt for many decades. This paper explored various points of view of historians studying epidemics of the past and their explanations of how and why the great epidemic emerged, spread rapidly and caused so high mortality. It also looked at various interpretations of this disease by contemporary observers.