Friday, November 29, 2019

The Evolution Of The Microprocessor Persuasive Essay Example For Students

The Evolution Of The Microprocessor Persuasive Essay Word Count: 2326Only once in a lifetime will a new invention come about to touch every aspect of our lives. Such a device that changes the way we work, live, and play is a special one, indeed. The Microprocessor has been around since 1971 years, but in the last few years it has changed the American calculators to video games and computers (Givone 1). Many microprocessors have been manufactured for all sorts of products; some have succeeded and some have not. This paper will discuss the evolution and history of the most prominent 16 and 32 bit microprocessors in the microcomputer and how they are similar to and different from each other. We will write a custom essay on The Evolution Of The Microprocessor Persuasive specifically for you for only $16.38 $13.9/page Order now Because microprocessors are a subject that most people cannot relate to and do not know much about, this paragraph will introduce some of the terms that will be in-volved in the subsequent paragraphs. Throughout the paper the 16-bit and 32-bit mi-croprocessors are compared and contrasted. The number 16 in the 16-bit microproces-sor refers how many registers there are or how much storage is available for the mi-croprocessor (Aumiaux, 3). The microprocessor has a memory address such as A16, and at this address the specific commands to the microprocessor are stored in the memory of the computer (Aumiaux, 3). So with the 16-bit microprocessor there are 576 places to store data. With the 32-bit microprocessor there are twice as many places to store data making the microprocessor faster. Another common term which is mentioned frequently in the paper is the oscil-lator or the time at which the processors clock ticks. The oscillator is the pace maker for the microprocessor which tells what f requency the microprocessor can proc-ess information, this value is measured in Mega-hertz or MHz. A nanosecond is a measurement of time in a processor, or a billionth of a second. This is used to measure the time it takes for the computer to execute an instructions, other wise knows as a cy-cle. There are many different types of companies of which all have their own family of processors. Since the individual processors in the families were developed over a fairly long period of time, it is hard to distinguish which processors were introduced in order. This paper will mention the families of processors in no particular order. The first microprocessor that will be discussed is the family of microprocessors called the 9900 series manufactured by Texas Instruments during the mid-70s and was developed from the architecture of the 900 minicomputer series (Titus, 178). There were five dif-ferent actual microprocessors that were designed in this family, they were the TMS9900, TMS9980A, TMS9981, TMS9985, and the TMS9940. The TMS9900 was the first of these microprocessors so the next four of the microprocessors where simply variations of the TMS9900 (Titus, 178). The 9900 series microprocessors runs with 64K memory and besides the fact that the 9900 is a 16-bit microprocessor, only 15 of the address memory circuits are in use (Titus, 179). The 16th address is used for the computer to distinguish between word and data functions (Titus, 179. The 9900 series microprocessors runs from 300 nanoseconds to 500 ns from 2MHz to 3.3MHz and even some variations of the original microprocessor where made to go up to 4MHz (Avtar, 115). The next microprocessor that will be discussed is the LSI-11 which was pro-duced from the structural plans of the PDP-11 minicomputer family. There are three microprocessors in the LSI-11 family they are the LSI-11, LSI-11/2, and the much im-proved over the others is the LSI-11/32 (Titus, 131). The big difference between the LSI-11 family of microprocessors and other similar microprocessors of its kind is they have the instruction codes of a microcomputer but since the LSI-11 microprocessor originated from the PDP-11 family it is a multi-microprocessor (Avtar, 207). The fact that the LSI-11 microprocessor is a multi-microprocessor means that many other mi-croprocessors are used in conjunction with the LSI-11 to function properly (Avtar, 207). The LSI-11 microprocessor has a direct processing speed of 16-bit word and 7-bit data, however the improved LSI-11/22 can directly process 64-bit data (Titus, 131). The average time that the LSI-11 and LSI-11/2 process at are 380 nanoseconds, wh ile the LSI-11/23 is clocked at 300 nanoseconds (Titus, 132). There are some great strengths that lie in the LSI-11 family, some of which are the efficient way at which the microprocessor processes and the ability to run minicomputer software which leads to great hardware support (Avtar, 179). Although there are many strengths to the LSI-11 family there are a couple of weaknesses, they have limited memory and the slow-ness of speed at which the LSI-11 processes at (Avtar, 179). .u7ca9e2474c2e4e2647675009efd7686d , .u7ca9e2474c2e4e2647675009efd7686d .postImageUrl , .u7ca9e2474c2e4e2647675009efd7686d .centered-text-area { min-height: 80px; position: relative; } .u7ca9e2474c2e4e2647675009efd7686d , .u7ca9e2474c2e4e2647675009efd7686d:hover , .u7ca9e2474c2e4e2647675009efd7686d:visited , .u7ca9e2474c2e4e2647675009efd7686d:active { border:0!important; } .u7ca9e2474c2e4e2647675009efd7686d .clearfix:after { content: ""; display: table; clear: both; } .u7ca9e2474c2e4e2647675009efd7686d { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u7ca9e2474c2e4e2647675009efd7686d:active , .u7ca9e2474c2e4e2647675009efd7686d:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u7ca9e2474c2e4e2647675009efd7686d .centered-text-area { width: 100%; position: relative ; } .u7ca9e2474c2e4e2647675009efd7686d .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u7ca9e2474c2e4e2647675009efd7686d .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u7ca9e2474c2e4e2647675009efd7686d .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u7ca9e2474c2e4e2647675009efd7686d:hover .ctaButton { background-color: #34495E!important; } .u7ca9e2474c2e4e2647675009efd7686d .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u7ca9e2474c2e4e2647675009efd7686d .u7ca9e2474c2e4e2647675009efd7686d-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u7ca9e2474c2e4e2647675009efd7686d:after { content: ""; display: block; clear: both; } READ: Gsm: Network Architecture EssayThe next major microprocessors in the microcomputing industry were the Z8001 and Z8002, however when the microprocessor entered into the market the term Z8000 was used to mean either or both of the microprocessors (Titus, 73). So when describing the features of both the Z8001 and the Z8002, they will be referred to as the Z8000. The microprocessor was designed by the Zilog Corporation and put out on the market in 1979 (Titus, 73). The Z8000 are a lot like the many other previous micro-processors except for the obvious fact that it is faster and better, but are similar be-cause they depend on their registers to function properly (Titus, 73). T he Z8000 was improved by using 21 16-bit registers, 14 of them are used for general purposes opera-tions (Titus, 73). The difference with the Z8001 and the Z8002 is the Z8002 can only address 65K bytes of memory, which is fascinating compared to the microprocessors earlier in time but is greatly inferior to the Z8001 which can address 8M bytes (8000K) of memory (Titus, 73). The addressing memory between the two otherwise very simi-lar microprocessors is drastically different were as other functions of the microproces-sors seem to be quite the same. An example of this is the cycle time. The cycle time is 250 nanoseconds and the average number of cycles that occur per instruction are be-tween 10 and 14 for both microprocessors (Avtar, 25). The next microprocessor that will be discussed is the 8086. This microproces-sor is the best in my opinion, out of all the 16-bit microprocessors. Not only because the speeds of processing are tremendous, but because it simply paved the way to the 3 2-bit microprocessors using various techniques that will be discussed later. The 8086 was the second Intel microprocessor (being preceded by the 8080) (Avtar, 19). The 8086 was introduced in early 1978 by Intel (Avtar, 19). Like so many of the other processors the 8086 is register oriented with fourteen 16-bit registers, eight of which are used for general processing purposes (Avtar, 19). The 8086 can directly address 1MB (1,048,576 bytes) which is used only in accessing Read Only Memory. The ba-sic clock frequency for the 8086 is between 4MHz and 8MHz depending on the type of 8086 microprocessor that is used (Avtar, 20). Up until this point in the paper there have been common reoccurring phrase such as a microprocessor containing 14 16-bit registers. At this time in the evolution of microprocessors come the 32-bit register, which obviously has double the capacity to hold information for the microprocessor. Because of this simple increase of the register capacity we have a whole different type of microprocessor. Although the 16-bit and 32-bit microprocessors are quite different (meaning they have more compo-nents and such), the 32-bit microprocessors will be described in the same terms as the 16-bit microprocessors were. The remainder of the paper will discuss the 32-bit microprocessor series. The external data bus is a term that will be referred to in the remainder of the paper is. The data bus is basically what brings data from the memory to the processor and from the processor to the memory (Givone, 123). The data bus is similar to the registers located on the microprocessor but are a little bit sl ower to access (Givone, 123). The first 32-bit microprocessor in the microprocessor industry that will be dis-cussed is the series 32000 family and was originally built for main-frame computers. In the 32000 family all of the different microprocessors have the same 32-bit internal structure; but may have external bus values such as 8, 16, or 32 bits (Mitchell, 225). In the 32000 family the microprocessors use only 24 of the potential 32 bit addressing space, giving the microprocessor a 16 Mbyte address space (Mitchell, 225). The 32-bit registers are set up so there are six 32-bit dedicated registers and then in combina-tion there are two 16-bit dedicated registers (Mitchell, 231). Each dedicated register has its own type of specific information that it holds for processing (Mitchell, 232). The microprocessors oscillator (which now comes from an external source) runs at 2.5 MHz, but due to a divide-by-four prescaler the clock frequency runs at 10MHz. There have been many new ideas pu t into practice to improve the 32000 series micro-processor generally and thus making it run faster and more efficient. .u7c10f6d17124aa55c47c091621ddac99 , .u7c10f6d17124aa55c47c091621ddac99 .postImageUrl , .u7c10f6d17124aa55c47c091621ddac99 .centered-text-area { min-height: 80px; position: relative; } .u7c10f6d17124aa55c47c091621ddac99 , .u7c10f6d17124aa55c47c091621ddac99:hover , .u7c10f6d17124aa55c47c091621ddac99:visited , .u7c10f6d17124aa55c47c091621ddac99:active { border:0!important; } .u7c10f6d17124aa55c47c091621ddac99 .clearfix:after { content: ""; display: table; clear: both; } .u7c10f6d17124aa55c47c091621ddac99 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u7c10f6d17124aa55c47c091621ddac99:active , .u7c10f6d17124aa55c47c091621ddac99:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u7c10f6d17124aa55c47c091621ddac99 .centered-text-area { width: 100%; position: relative ; } .u7c10f6d17124aa55c47c091621ddac99 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u7c10f6d17124aa55c47c091621ddac99 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u7c10f6d17124aa55c47c091621ddac99 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u7c10f6d17124aa55c47c091621ddac99:hover .ctaButton { background-color: #34495E!important; } .u7c10f6d17124aa55c47c091621ddac99 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u7c10f6d17124aa55c47c091621ddac99 .u7c10f6d17124aa55c47c091621ddac99-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u7c10f6d17124aa55c47c091621ddac99:after { content: ""; display: block; clear: both; } READ: The For A Family History Project EssayThe next family of microprocessor which was fabricated for the microcomputer is the MC68020 32-bit microprocessor which is based on the MC68000 family. The other microprocessors that are included in this family are the MC68000, MC68008, MC68010 and the MC68012 (Avtar, 302). Before going into the types of components that this microprocessor contains, it should first be know that the making of the MC68020 has been the product of 60 man-years of designing including the manufac-turing of the High-density Complementary Metal Oxide Semiconductor giving the mi-croprocessor high speed and low resistance and heat loss (Avtar, 302). Because of a ll the work that was put into the MC68020 and its other related microprocessors, it is an extremely complex microprocessor. The MC68020 operates in two modes, these are the user mode(for application programs) or the supervisor mode (the operating system and other special functions) (Mitchell, 155). The user and supervisor modes all have there own specific registers to operate their functions. The user programming has 17 32-bit address registers, and an 8-bit register (Mitchell, 155). Then the supervisor pro-gramming has three 32-bit, an 8-bit and two 3-bit registers for small miscellaneous functions (Mitchell, 155). All of these registers within the two modes are split up into different groups which would hold different information as usual, but this set up of registers gives the microprocessors a 20 32-bit information storing capacity. The next family of microprocessor is Intels 80386 and 80486 families. The 80386 and 80486 were mostly over all better then the other microprocessors being made by the different companies in the industry at this time, simply because Intel is now the leading microprocessor producer in todays market. The 80386 was a product that evolved from Intels very first microprocessor, the 8-bit 8080 (Mitchell, 85). Then next came the earlier mentioned 16-bit 8086. The reason why Intel did so well in the market for microprocessors was because every microprocessor that they made was compatible with the previous and future (Mitchell, 85). This means that if a piece of software worked on the 8080 then it worked on the future microprocessors and vice-a-versa. Not only did Intel look forward but they looked back. The main difference between the 80386 and the other 32-bit microprocessors is the added feature of a bar-rel shifter (Mitchell, 88). The barrel shifter allowed information to switch places mul-tiple times in the registers within a single cycle (Mitchell, 88). The microprocessor contains 8 general purpose 32-bit registers, but with the ba rrel shifter that is increased to the equivalent of a 64-bit microprocessor. For the most common 20MHz 80386 microprocessor the run time for each cycle is 59 nanoseconds, but for a 33MHz mi-croprocessor the cycle time is reduced to 49 nanoseconds. The next 32-bit microprocessor in market are ATTs WE32100 and 32200 (Mitchell, 5). These microprocessors also needed six peripheral chips in order to run, these are termed: Memory Management Units, floating point arithmetic, Maths Accel-eration Units, Direct Memory Access Control, and Dynamic Rand Access Memory Control (Mitchell, 5). These microprocessors apart from the microprocessors all work an important part of processing the data that comes through the microprocessor. The difference from this microprocessor and the others is because the WE32200 address information over the 32-bit range with the help of a disk to work as a slow form of memory (Mitchell, 9). The WE32200 microprocessor runs at a frequency of 24MHz (Mitchell, 9). The 16-bit and 32-bit microprocessors are a mere page in the great book of processor history. There will be many new and extremely different processors in the near future. A tremendous amount of time and money have been put into the making and improving of the microprocessor. The improving and investment of billions of dollars are continually going toward the cause of elaborating the microprocessors. The evolution of the microprocessor will continue to evolve for the better until the time when a much faster and more efficient electronic device is invented. This is turn will create a whole new and powerful generation of computers. Hopefully this paper has given the reader some insight into the world of microprocessor and how much work has been put into the manufacturing of the microprocessor over the years. BibliographyMitchel, H.J. 32-bit Microprocessors. Boston: CRC Press. 1986,1991Titus, Christopher A. 16-Bit Microprocessors. Indiana: Howard W. Sams Co., Inc. 1981Aumiaux, M. Microprocessor Systems. New York: John Wiley Sons. 1982Givone, Donald D.; Rosser, Robert P. Microprocessors/Microcomputers. New York: McGraw-Hill Book Company. 1980Avtar, Singh. 16-Bit and 32-Bit Microprocessors: Architecture, Software, and Interfacing Techniques: New Jersey. Englewood Cliffs. 1991

Monday, November 25, 2019

Discusses the management of risk in the care of older adults in hospitals The WritePass Journal

Discusses the management of risk in the care of older adults in hospitals Introduction Discusses the management of risk in the care of older adults in hospitals IntroductionReferences:Related Introduction This essay critically discusses the management of risk in the care of older adults in hospitals, in the prevention of falls.The rationale for selecting this topic is based on several factors.   According to Nazarko (2008), elderly people are admitted to hospital for a variety of health conditions. The family of the patient trust that they are being cared for in a safe environment. However, every environment carries a physical risk to the people within it and this essay will focus on the fact that older people admitted to hospital are more susceptible to experiencing falls (Nazarko, 2008). Moreover, the National Patient Safety agency (NPSA) (2007) state that there are more than two hundred thousand falls that occur in NHS hospitals in England and Wales. NHS Greater Glasgow and Clyde (2011) state that one of the biggest admission for hospital in elderly people are falls. Out of that figure, 99% of them are unhurt, minor or moderate injuries, however 1% of those falls cause severe inj ury, death or fracture bones. Falls are a major problem in hospitals as well as outside of hospital in the UK. Various studies have shown that 30-50% of the population are over 65years old. Most of those falls are happening in the nursing home setting and 10-20 % cause severe injuries (Kennedy 2010, Pountney 2009a and Weaver 2008). Adding to this rationale, Pereault and Bourbonnaise (2005) state that the nurse’s role is to take care of patients from the first time s/he enters the door of the healthcare environment, through assessments, appointments, surgery or any other treatment, as well as discharge of patients from hospitals. Therefore a focus on falls prevention is essential. For this reason author has chosen to focus on this topic. It defines risk and then identifies and explains the nurse’s role in risk assessment and management of elderly people in the hospital and nursing home settings. The essay will highlight why people experience falls, the different the contributing factors that can affect their balance whilst in a professional care setting.   The risks are and how risk management can be used to prevent older people who are in hospital falling as a result of residing within this environment are critically discussed. To do so key measures in place that aim to minimise risk and maximise patient safety in the clinical environment are therefore evaluated. One of the methods this essay will examine is the five HSE steps of how to manage risk in the working environment in practice. There will be an in depth analysis of two different case studies of the STRATIFY risk assessment tool, to show the weaknesses and strengths of this tool. The essay w ill explore the difference education and training can have on the quality of care. The Health and Safety Executive (HSE 2006) state that every day in our life we come across risks. It may be in or outside our homes, as well as in the working environment. Kennedy (2008) states that risk can be described as an episode where something valuable or someone can be affected or damaged and where there is uncertainty of the outcome. Leyshon (2005) have stated that before any action to manage it, risk must be identified in the first place. To improve the health and safety environment in the work place assessing, measuring and controlling risk is therefore essential. The Department of Health (2006) state that ten percent of patients admitted to hospital will be negatively impacted as a result of an avoidable error separate to the original reason that they were admitted. They also state that risks could be reduced by as much as 50%if lessons from previous risk incidents were recorded and analysed. This would therefore serve to reduce the possibility of the same mistake recurring. Tingle (2006) provides further support to this by adding that if lessons were learned from previous incidents it would also help to save costs to the NHS. According to Mitchell (2009), falls can cost the NHS upwards of 1.7 billion pounds a year. Therefore, nurses can have a significant impact on this by promoting patient safety in the NHS to improve care for patients and protect them from any harm, whilst saving money. According to the Nursing and Midwifery Council (NMC) (2008) code of conduct the nurse is responsible for taking care and treating patients with dignity and respect whilst reducing the risk of further harm. Leyshon (2005) suggested that the areas to be focused on in an effort to reduce risks and to protect patients from harm are to assess the work environment and appropriately manage the known risks, as well as being aware of, and minimising, other probable risks. The goal to minimise risk in the healthcare setting means that nurses and other healthcare professionals should critically evaluate past events that have had a negative effect on practice and there should be focus on vulnerabilities and how risks can be managed. Mills and Bowker (2007) further state that there are many ways to assess risk in the health care environment. However, they highlight a simple understanding of the risk assessment tools can help staff develop better understanding of the advantages of successful risk assessment. The Health and Safety Executive (HSE) (2006) identify five easy steps to assess risk in any work place environment which has also been successfully put into practice. The first step is to identify the risk, recognize strengths and weakness to reduce risk and reach the aim using a method, such as a risk check list. Nazarko (2005) also agrees that risk needs to be identified in the first place and then we can take care of those who are at risk to minimize risk. The HSE (2003) states that, the second step is to assess who may be harmed and how using appropriate risk management tools, such as a scoring system, which are individual for different risk assessments. The third step is to evaluate the risk.   Accordin g to Young and Woodock (2011) an important question is whether the hazard can be eliminated altogether by removing it.   If this is not possible it must be controlled so as to reduce the chance of harm. According to Waterhouse (2007) the fourth step of HSE risk management is the recording method. The most important part of this method is identified as keeping a record of the patient’s risk assessment. This way, safety is improved and it is shared amongst colleagues as essential practice to protect patients from harm. This also applies to the NMC code of conduct (2008) as good practice, such that information must be shared with colleagues to maintain the safety of those for whom nurses are taking care. The last step of risk assessment is the review which must occur on a daily and ongoing basis to protect patients from hazards. This is constantly monitored to determine progress and changes to their condition. There may be some improvement or adversely, there may be some changes with patient’s health and risk assessments. Therefore it is vital that they must always be accurately recorded and kept up to date. Fullbrook (2007) agreed with these studies, adding that from the nurse’s point of view, assessment is the most important part of risk management. Nurses assess all of the issues that can have an impact on clinical practice and the nurse will often be the first to identify potential difficulties in their working environment, as they are there on a daily basis. According to Hughes and Marshall (2009) risk can be separated into three categories: long-term, medium term and short term. Dependant on the risk classification, the implementation of measures to mitigate the risk vary, according to the size and complexity of the task. These issues in risk are particularly relevant to management of falls in healthcare environments. A study by Pountney (2009b) shows that falls mostly occur in either the morning or evening time due to medication such as night sedation, make them unsteady, visiting the toilet – incontinence first thing in the morning as well as inappropriate shoes making elderly people’s mobility unsteady. Therefore as a result of this, nurses and other healthcare staff must spend more time with those patients, at these times, to protect them from harm. Nazarko (2007) stated that people in hospital who are inpatients are individuals and all of them have a different reason for being in care.   As they are unwell and are often extremely weak they may be at risk of falls. There are many factors that can affect body balance and cause falls, such as age, disease or medication. Some of them may have some obstacles to stop them being fully mobilized like catheter in-situ, drip stand, and as a result of their injuries they may be confused which makes it even harder for them to be mobile with those obstacles. Therefore it is important for nurses and other staff   to have better contact with those patients to provide the best possible care of patients be observed to reduce and minimize the risk of falls. Swann (2010) also added that unsafe clinical areas like broken and wet floor can cause falls. Barker et al (2010) stated there are many assessment tools in the hospital setting to help prevent falls and there are key measures to successful prevention, recommended by many clinical practice guidelines. However those tools are not effective if they are not used appropriately and if healthcare professionals do not evaluate them. Therefore it is the nurse’s responsibility for updating these tools, as assessment is on-going process and patient’s conditions may change. Oliver et al (2008)   advise that 10 years ago there was a practice   risk a assessment tool for rehabilitation published and delivered in the UK for elderly as well as for acute wards known as the St Thomas’ Risk Assessment Tool (STRATIFY). This fall risk assessment tool is to identify high or low risk of falls and have been designed in five simple scoring systems from 0- 5 to predict who may be at risk of falls. According to Kennedy (2010) nurses should have special training to use the STRATIFY risk assessment tool which will raise awareness when used in practise to prevent patients from falls to protect them from further harm or injury. Milisen et al (2007) described in their purposive multicenter study where they evaluated the effectiveness of the STRATIFY fall assessment risk tool. The study was carried out in six Belgian hospitals, the sample size was 2,568 participants mixed female and male and the average age was 67.2 ranging between plus and minus 18.4. The study was carried out in a four surgical, eight elderly and four medical units. The findings of this study show the effectiveness of the STRATIFY tool in the admission of patients in medical and surgical settings for patients younger than 74 show that assessment predict risk of falls well for this age group category. However it was not as successful when measured against an older population, above of 75-85 age range that are admitted in the elderly ward. For older patients with prolonged residential hospital care, it is unclear whether repeated use of the STRATIFY tool would enhance its clinical effectiveness. Furthermore, the study identified   that the risk of falling, as measured on admission is not static and as a result the risk of falling during their subsequent hospital stay must be calculated and updated on a weekly basis. Smith et al (2006) did a similar study on the STRATIFY assessment tool for patients recovering from strokes.   Six stroke units in North of England with 359 participants were selected where they used this assessment.   Every member of staff was trained to use the tool. They average stay was 28 days and the age range was between 34 and 100 years.   Within this group, STRATIFY underperformed as a predictor of falls occurring in the 28 days following the initial assessment. Using the currently recommended score threshold (2 or more as high risk), STRATIFY was found to be inaccurate with a sensitivity rating of just 11.3%. The optimum STRATIFY threshold for our stroke patients was a score of one or more, but even optimising the risk indicator resulted in a sensitivity of just 60% and this was achieved at the expense of specificity.   This study also highlights that some of the questions were not appropriate for all stroke patients as they were not applicable such as mobility ques tions as well as the amount of falls since they have been admitted to hospital. Nazarko (2008) stated that there are further methods to manage risk management in falls and one of them is to assess the location of the nurse’s station which can play a crucial role in risk management especially amongst the elderly population. If patients are located in single rooms and out of sight from nurses and other healthcare staff, there is a greater risk in falls as staff are unable to identify those at risks and react as speedily to patients who are in need of assistance. For this reason, most of the patients hospitalized in wards who may be at risk of falls are moved closest to the nursing station, to assist nurses’ visibility and reduce the impact of falls. However, it is not possible to implement this practice in nursing homes with single rooms or any other wards where patients are located in single rooms. Downing (2011) states that there are more interventions that serve to improve patient care,   particularly amongst the elderly, such as the electronic alarm device which is located on the patient’s bed or chair. Every time the patient attempts to get up it will sound so that healthcare assistants can assist the patient before any fall can occur. These devices can help with high-risk patients who are confused or have got dementia. Pountney (2009a) also recommends the alarms which can be used for patients whosuffer from dementia or are confused and also add that light sensors can improve people from falls. According to Nazarko (2006), bad vision could be a major impact on patient’s falls, as up to 74% admitted patient from falls had a poor vision. Therefore falls cannot be removed but management may improve quality of life for those patients to use those light sensors, especially if patient is located in single rooms out of sings of nurses. Another option, Vitamin D supplements, are   identified as having a role to play in mitigating the impact of falls, as Vitamin D make bones stronger and as a lack of Vitamin D can have a affect on weakness of muscle and bones. The NHS National Institute for Clinical Excellence (2004) however, do not recommend Vitamin D asthey feel there is inconclusive evidence advocating its use. According to Help the Aged (2004) risk assessments and monitoring will not guarantee to stop people from falling, however nurses will be able identify through assessment of potential risk to minimise this and improve patient safety with appropriate action taken. Pountney (2009a) further emphasises that the requirements of risk management must be weighed against the need to empower patients to remain independent and must not overpower the quality aspects of their everyday routine. The aim is to minimize patients from injury but also to encourage their mobility for better quality of life. Therefore managers have got a responsibility for managing risk against effective policy, ensuring staff are fully trained, as well as fostering a good environment to minimize risk of falls to support patients’ well being, as well as quality of life Pountney (2009b) Nazarko (2009) states some patients with conditions generally affecting the elderly such as MS and Parkinsons  disease may have many falls but if the opportunity to walk is removed to prevent falls, it is regarded as more harmful as the patient will have reduced confidence and independency. Nazarko (2009) agrees withSwan (2007) that most of the falls that occur in hospitals are not major injuries, however any falls can have a major impact on each patient as they may lose their confidence as well as dignity.   The patient’s quality of life may change dramatically as they may not be able to undertake daily activities. A loss of confidence and the inability to undertake daily routine can make the patient weaker as well as make the patient feel more isolated (Nazarko 2009). Pountney (2009) state that a lack of training of staff on falls can have a negative impact on patients which will cause inappropriate practice, but also further state that this can cause the unwanted implication to staff, where nurses will have to deal with complaints and increased workload, which leads to increased anxiety. According to Mitchell (2007), one of the major management tools to prevent falls is through the education of staff, as well as patients. Therefore nurses and other healthcare professionals who have contact with patients must have easy access to the tools, whether e-learning or manual.   Whichever one is more suitable for the individual and encompasses as minimum basic skills to maintain acceptable practice. To provide best practice in falls prevention, audits must also be carried out on a regular basis. The author used examples to explain why they chose risk management in falls as a topic.This essay explained what risk is and how risk must be identify before any action is taken. The evidence has also found that if we learned from previous mistakes risk could be reduced as improving patient safety which ultimately reduces costs. The five easy steps of HSE risk assessment were highlighted as best practice throughout the healthcare setting. This statistics provided from England and Wales as well as statistics from Scotland, demonstrated the widespread issue that falls are a major problem for the elderly population outside as well as inside of the hospital settings. Moreover various study show that most falls happening in nursing homes. The essay also focused in-depth at two studies analysing the effectiveness and appropriateness of the STRATIFY risk assessment tool. Both studies were using the STRATIFY assessment risk tool in different healthcare settings. Furthermore studies show that STRATIFY assessment risk is successful for the younger population but not as successful with older population over 75 and also that it did not appear to be helpful with stroke patients as some questions were inappropriate. There was a focus on how falls could be prevented as there are so many different reasons for patients having a fall. For some of them it could be due to their illness, medication, nursing station location, whether it is morning or night. This essay illustrates the critical role nurse’s play in providing the best possible care and support to patients. Nurses should be specially trained and educated to provide the best care to minimise patients from falls and maximize patients protection. References: Barker, A., Kamar, J. Graco, M. 2011, â€Å"Adding value to the STRATIFY falls risk assessment in acute hospitals†, Journal of Advanced Nursing, vol. 67, no. 2, pp.   450-7. Department of Health. 2006, â€Å"Safety First: a report for patients, clinicians and healthcare managers† [online]. Available from: dh.gov.uk/prod_consum_dh/groups/dh_digitalassets/@dh/@en/documents/digitalasset/dh_064159.pdf [Accessed 22nd March 2011]. Downing, W. 2011, â€Å"Preventing falls: how to monitor risk and intervene†, Nursing Residential Care, vol.13, no.2, pp. 82 – 84. Fullbrook , S. 2007, â€Å"The duty of care 2: risk assessment and risk management†, British Journal of Nursing, vol. 16, no. 2, pp.112 – 113. Health and Safety Executive. 2006, â€Å"Five steps to risk assessment† [online]. Available from: hse.gov.uk/pubns/indg163.pdf [Accessed 2nd March 2011]. Help the Aged. 2004, â€Å"Preventing Falls; Managing the risk and effect of falls among older people in care homes† [online]. Available from: housingcare.org/downloads/kbase/2312.pdf [Accessed 2nd March 2011]. Hughes, R. Marshall, R. 2009, â€Å"An introduction to risk management in residential care†   Nursing Residential Care, vol.11, no. 7, pp. 356 – 358. Kennedy, K. 2010, â€Å"A critical analysis of the NSF for Older People standard 6: falls†, British Journal of Nursing, vol. 19, no. 8, pp. 505 – 510. Kennedy, S. 2008, â€Å" The health professional’s role in helping patients understand the concept of cardiovascular risk†, British Journal of Cardiac Nursing, vol. 3, no. 11, pp. 522 – 526. Leyshon, S. 2005, â€Å"Principles of risk management in community nursing†, British Journal of Community Nursing, vol. 10, no. 7, pp. 330-333. Milisen, K., Staelens, N., Schwendimann, R., De Paepe, L., Verhaeghe, J., Braes, T., Boonen, S., Pelemans, W., Kressig, R.W. Dejaeger, E. 2007, †Fall prediction in inpatients by bedside nurses using the St. Thomass Risk Assessment Tool in Falling Elderly Inpatients (STRATIFY) Instrument: a multicenter study†, Journal of the American Geriatrics Society, vol. 55, no. 5, pp. 725-33. Mills, H. Bowker, E. 2007, â€Å"Conducting a risk assessment in neuroscience practice: principles and procedure†, British Journal of Neuroscience Nursing, vol. 3, no. 5, pp. 223 – 226. Mitchell, E. 2009, â€Å"The impact of falls on residents and staff: managing riskâ€Å", Nursing Residential Care, vol.11, no.5, pp. 258 – 260. National Patient Safety agency (NPSA). (2007), â€Å"Slips, trips and falls in hospitals† [online]. Available from: nrls.npsa.nhs.uk/resources/?entryid45=59821 [Accessed 24th March 2011]. Nazarko, L. 2005, â€Å"Reducing the risk of falls among older people†, Nursing Residential Care, vol. 7, no. 2, pp. 67 – 70. Nazarko, L. 2006, â€Å" Falls prevention in practice: guidance and case study†, British Journal of Community Nursing,   vol. 11, no. 12, pp. 527 – 529. Nazarko, L. 2007, â€Å"Reducing the risk of falls in the care home†, Nursing Residential Care, vol.9, no.11, pp. 524 – 526. Nazarko, L. 2008, â€Å"Falls part 3: environmental risk factors†, British Journal of Healthcare Assistants , vol. 2, no. 10, pp. 487 490 . Nazarko, L. 2009, â€Å"Falls part 6: risk management†, British Journal of Healthcare Assistants, vol. 3, no. 2, pp. 87 – 90. NHS Great Glasgow and Clyde, 2011, A Home Checklist Which Can Save Lives. [online]. Available from: nhsggc.org.uk/CONTENT/default.asp?page=s1192_3newsid=11231back=s8_1 [Accessed 4th March 2011]. NHS National Institute for Clinical Excellence . 2004, â€Å"Falls: the assessment and prevention of falls in older people† (Clinical Guidelines 21). [internet]. London, NICE (Published 2004). Available at: nice.org.uk/nicemedia/pdf/CG021publicinfoenglish.pdf [Accessed 24th March 2011]. Nursing Midwifery Council, 2008. [online]. Available from: nmc-uk.org/About-us/Policy-and-public-affairs/Politics-and-parliament/Policy-areas/ [Accessed 2nd March 2011]. Oliver, D., Papaioannou, A., Giangregorio, L., Thabane, L., Reizgys, K., Foster. G., Age Ageing, 2008, â€Å"A systematic review and meta-analysis of studies using the STRATIFY tool for prediction of falls in hospital patients: how well does it work?†, Age and ageing (published electroncly) vol. 37, no. 6, pp. 621-627. Perreault, A. Bourbonnaise, F. F. 2005, â€Å"The experience of suffering as lived by women with breast cancer†, International Journal of Palliative Nursing, vol. 11, no.10, pp. 510-519. Pountney, D. 2009a, â€Å"Identifying and managing the risks of falls in the nursing home† Nursing Residential Care, vol. 11, no. 12, pp. 618 – 620. Pountney, D. 2009b, â€Å"Preventing and managing falls in residential care settings†, Nursing Residential Care, vol.11, no.8, pp. 410 414 .      Swann, J. 2007, â€Å" Reducing the risk of falls: Part one†, Nursing Residential Care, vol. 9, no. 3, pp. 120 – 122. Tingle, J. 2006, â€Å"Improving patient safety in the NHS†, British Journal of Nursing , vol.15, no. 4, pp. 86. Waterhouse, C. 2007, â€Å"Development of a tool for risk assessment to facilitate safety and appropriate restraint†, British Journal of Neuroscience Nursing,   vol. 3, no. 9, pp 421 – 426. Weaver, D. 2008, â€Å"Effective strategies in managing falls prevention†, Nursing Residential Care, vol.10, no.5, pp. 217 – 222. Young, A. Woodcock, R. 2011, â€Å"Violence risk assessment in mental health practice: part 1†, British Journal of Healthcare Assistants, vol.5, no. 1, pp. 31 – 34.

Friday, November 22, 2019

The Cabinet Essay Example | Topics and Well Written Essays - 500 words

The Cabinet - Essay Example The 1962 cabinet represented high family-based ties in the political arena. Even though members of the cabinet had different personalities and backgrounds, they share close family relationships in one way or another. For example, the Al-Asabah family and the larger Asil family held a significant proportion of the cabinet over the aforementioned period. Majority of cabinet members came from influential Kuwaiti families. In this respect, dominant cabinet ministers also represented some of the most influential families in the history of Kuwait. Over and above family-based monopoly in the cabinet, a significant number of cabinet members were well off compared to the rest of the population. Majority of cabinet ministers came from wealthy families, and most importantly, they were wealthy themselves. This made them even more influential as far as the politics of the country were concerned. In addition, more than 50% of ministers in Kuwait were in their 30s or 40s in terms of age. This made the 1962-1988 Kuwait cabinet one of the most youthful around the world. Even as Kuwait made critical progress politically, education and literacy levels were still a challenge to the larger populace. Cabinet members had basic education, but most of them lacked advanced academic and professional experience. For example, the number of engineers in Kuwait was significantly low at a time when the newly independent nation was striving to invest heavily in technological development. In 1962, engineers were less than ten in the entire Kuwaiti population. Critical disparities were also evident in regards to where ministers attended their school. Cabinet members with basic primary education attended school locally, and so did members who had secondary education. College and university degrees, however, required that education be accessed outside Kuwait. This shows that some Kuwaiti

Wednesday, November 20, 2019

The significant of 'GUANXI' towards contractors to endure in the Essay

The significant of 'GUANXI' towards contractors to endure in the construction industry - Essay Example There is one slight problem, however, which concerns business ethics and sense of fair play. When you work your way into the good graces of a client by establishing the personal connections of guanxi, you effectively shut out of this loop other contractors who are not into the practice, which is neither fair nor just. In addition, guanxi is often established by extending favors or giving gifts, which takes on the appearance of bribery and corruption. All the above postulates - the increasing interest of Western management scholars, the distinct significance of guanxi in the multi-faceted construction industry, the thin line that separates it from bribery and corruption - make guanxi an interesting study area for anyone seeking new management tools that could provide control and efficiency in an otherwise intractable industry. This is what Project Management in Construction is all about. Personal connections in guanxi are looked upon as a necessary condition for doing business successfully in China. The actors in the guanxi relationship may purposefully create or accidentally discover the affinity as they look for shared experiences to establish a common social identity. This then sets the stage for the guanxi interactions, which may be expressive or instrumental. Expressive interactions refer to socially oriented activities, while instrumental activities are pragmatic transactions and exchanges related to work and business. After the two persons become familiar through common bases, they proceed to engage in a wide variety of transactional activities to move from an outer to an inner circle. (3) 3. Relevance to the Course Guanxi has attracted the attention of Western management scholars who saw its rich potential as a business formula for success not only in China but elsewhere. This interest is evidenced by the frequent and copious mention of guanxi in popular and academic literature that no longer requires literal translations. There is a strong possibility that such fascination with the Chinese principle prompted the

Monday, November 18, 2019

Adult Learners in Higher Education and Training Assignment - 1

Adult Learners in Higher Education and Training - Assignment Example alcolm Knowles was one of the most active adult educators who claimed that learning contracts is the best tool in achieving study goals he sets out for adult learners. Even though contract learning might be one of the most valuable tools for learning in adults it is not always the most useful. In those cases where learners do not have much knowledge about their subject, its depths and its prospects, students are not in a very sound position to make strategies and commitments about the goals they set for themselves in a contract. The main objective of contract learning for Knowles was structuring the learning process in its best and most fruitful way where the content of the educational material is replaced by the process. Students get involved in the study process and they comprehend everything with an active approach. Contract learning puts a sense of responsibility on student and they feel more in control of what they would want to learn instead of feeling ‘being stuck’ with studies. Contract learning is also effective in student groups comprising of students with different backgrounds. This tool reduces the problems due to such difference in

Saturday, November 16, 2019

Supply Chain Management Case Study: Turkish Airline

Supply Chain Management Case Study: Turkish Airline At present, many companies are usually seeing their profits and income slip through their fingers as result of the of process gaps existing in various departments. As clienteles, staffs, partners or dealers move through a companys business processes, new publically conscious tools can inhibit them from getting stuck in multifaceted processes. Therefore, there is a need for synchronizing and integrating various processes which include; operation process, market process, production and procurement process. If not, a lack of synchronization and integration of various business processes can deny many of the vital benefits resulting from employing commercial process management and business instructions management or any other solutions that guarantee operational competence and efficiency. Before looking at how Turkish airline can Synchronize and integrate operation process, market process, production and procurement process, there is a need for defining what is meant by each of the processes; Marketing process This is the marketing model that any company must find a way to realizeunsatisfiedconsumer needs and bring to market goods and services that fulfill those desires. The procedure of doing so can be exhibited in a series of steps that ensure unsatisfied consumers fulfill their desires. Operational processes These are the processes that ensure consistenttactic to all activities accomplished. There is no anycompany that can afford several ways to undertake activities, nor can it afford extraopenings to encouragedisaster from lack of documented and well-definedoperational process. Production process Production process is focused with transmuting a variety of inputs into yields that are essentialto the market. All production process encompasses a sequence of networks in a production chain. In every stage, value is added during production process. Procurement process This is a process thataida firm in acquiring goods and services from peripheral dealers. Having looked at the meaning of operation process, market process, production and procurement process, it is very clear that all this processes are very vital in the operation of any organization. Therefore, Turkish airline can Synchronize and integrate these processes in the following ways: In order for Turkish airline to Synchronize and integrate these processes at the correct time at the right place at the right quintets, so they can shrink the cost and upsurge customer services fulfillment simultaneously, they need to do matching. Matching is the process of collecting and relating all the similar activities in the organization. Through matching process, Turkish airline will be able to synchronize and integrate all the company processes. This will be done by putting all the related activities in every process then relate them. This will ensure employing a certain group of workers to work in those clustered processes from different departments (processes) in the company. This will help Turkish airline save a lot of money due to the reduction in the number of employees. This is because; one employee can work in different department within the same airline. Apart from synchronizing Market, operation, production and procurement processes, integration process would be very important integration in order to reduce operation cost and increase customer satisfaction. Integration, in Turkish airline, can be done by investigating affiliations across a corporate compendium in order to formtaxonomiesand unifyprocesses into a standardized system. To do this, it will include both merging and matching methods. Through integration, processes within the airline which are closely related will be unified thus forming one standardized system. This will help in saving time in saving customers, lower operation cost due to reduction in the number of employees and also be able to increase customers satisfaction due to the existence of a standardized system of operation. Outsource the Catering Since Turkish airline is a very big airline, it must outsource some services like catering because this is the service that requires a lot of working strategies. Turkish airline should therefore identify large company of caterers who have their in-house experts for nearly everything that is required to done in catering department in Turkish airline. It would be a way forward for Turkish airline to hire outside experts for special catering services that are required in order to cater for various kinds of the customers travelling in Turkish airline. By employing this catering company, the Turkish airline should divide the kind of miles to be offered to the travellers travelling in Turkish airline. This will ensure that customer only chose their preferred meal from the available set of food items and drinks available for every type of schedule. This will ensure that there is catering services for breakfast, lunch and dinner which will depend on the schedule of the airline. In doing this, Turkish airline will be able to save a lot of money by ensuring only food items prepared are suitable a certain type of travel schedule. It will also avoid inconvenience of the customers ordering something which is not available. Also, this will increase customer satisfactions since customers will be choosing items available in the menu for a certain schedule of the airline. This will help market Turkish airline since customers will be satisfied by the services being offered by the Turkish airline. This will therefore increase the number of returning customers and also help Turkish airline attract other new customers through the good thing being said by the old customers of Turkish airline. Supply Chain Management Supply chain management means the oversight of information, finances and materials as they shift in a procedure from the supplier to the manufacturer to the wholesaler to the retailer and to consumers. Supply chain management engrosses integrating and coordinating the flows both among and within companies. It is believed that, the final goal of all efficient supply chain management systems is to lower inventory, with the presumption that, all products are readily available when they are needed. Supply chain management surge can be subdivided into three key flows: The information flow The product flow The finances flow Products flow involves the faction of goods from the supplier to the customer, and all customers returns or service necessities. The data flow involves conveying orders as well as updating the delivery status. The financial flows consist of payment schedules, title and consignment ownership and credit terms provisions. There exist two key types of supply chain management software: execution applications and planning applications. Planning applications make use of advanced algorithms to examine the most appropriate means to fill orders. Execution applications pursue the physical characteristics of goods, materials management, and the financial information engrossing entire parties. Some supply chain management applications are focused on open information models, which support the distribution of information both outside and inside the enterprise. This is known as the comprehensive enterprise, and may include main suppliers, end customers and manufacturers of a particular company. This shared information might reside in variedÂÂ  data warehouses or database systems at several different companies and sites. By giving out the data upstream with the companys suppliers and the downstream with the companys clients, supply chain management applications have the capability to upgrade the market-to-time products, allow all parties and reduce costs in the supply chain management to better manage the current resources as well as plan for future necessities. Supply Chain In early 2008 AMR Research (2008b) reported that, firms in the Supply Chain Top 25 reported an average total stock market return for 2007 of 17.89%, while the Dow Jones Industrial Average (DJIA) had average returns of 6.43% and the SP 500 index had average returns of 3.53% during the same period (Hauser 2010, 446-462). At the time the Supply Chain Top 25 included firms in the computer, electronics, automotive, retail, beverage, health care, apparel, and pharmaceutical industries, indicating a widespread recognition of the value of effective supply chain practices. Later in 2008, when the stock markets were down substantially, the Supply Chain Top 25 was down significantly less than the DJIA and SP 500 indices (Hambrick 2009, 193-206). But it is not all good news for firms participating in supply chains. The downside of ineffective supply chain practices can have a substantial negative effect on firm performance as well. In a study of supply chain glitches, Holbrook (2007) found that when publically traded firms experienced supply chain disruptions, the average abnormal financial returns to firms over the subsequent two year period was close to -40%, and the equity risk of the firms increased at the same time. But supply chain problems are not limited to supply disruptions. Being introduced the design for the new 787 Dreamliner several years ago, but has had numerous production problems with supply availability, collaborative design and development challenges, and problems developing new materials for production (Holbrook 2007, 21-71). In a different industry, Ericsson experienced a supplier problem when a small fire eliminated supply of a critical cell phone chip, and the firm never recovered (Hauser 2010, 446-462). There are many examples of how firms have suffered from ineffective management of supply chains, but regardless of the specific causes firms recognize that mere participation in competitive supply chains does not mean the firm will gain potential benefits. These issues present a conundrum: why do some firms gain significant advantage for supply chains, while others do not and may even underperform relative to their competition? Why is this important? Because planning and implementing effective supply chain practices requires managers to make decisions today that affect how well firms will perform in the future, and the costs of poor decisions today have dramatic effects on future firm performance (Harland 2003, 51-62). Supply chain analysis Why do some firms achieve success with their supply chain practices while others underperform to their potential? One potential answer to this puzzle lies in understanding the difference between the breadth of an overall supply chain versus the effective span of control or influence that a firm has on its particular supply chain, and how the span of influence can be used to competitive advantage. For example, Toyota and Wal-Mart have worked to extend their span of control in supply chains beyond their immediate suppliers while working to implement strategic information systems that provide increased visibility of information in their supply chains to help improve flow of product, reduce inventories, and reduce overall supply chain costs (Hambrick 2009, 193-206). This increased visibility also provides early warning of problems that may be developing in the supply chain, providing additional reaction time that may mean the difference between a supply disruption and effective performance. The value of increased visibility has strategic benefits to firms. Some firms, particularly large firms that have the power of high purchase volumes to induce suppliers to participate in supply chain initiatives may do very well in return. But there are limits on span of control in multi-firm relationships and many firms do not achieve the ability to increase their span of control and leverage in supply chains (Habib 2007, 589-606). If a firm has a low-cost strategy, then the firm should optimize and coordinate the supply chain by having frequent and timely deliveries from suppliers to reduce the required level of inventory and achieve low cost. There are two types of generic strategies to achieve a competitive advantage: low-cost and differentiation strategies. A low-cost strategy enables a firm to design and produce a product more efficiently than its competitors. A differentiation strategy allows a firm to offer a variety of products to the customer with reliability and responsive services (Gutman 2002, 60-72). Functional products which are considered to have stable and predictable demand require an efficient process (efficient chains) to supply that product. On the other hand, innovative products which are considered to have unpredictable demand require a responsive supply chain. This match between product type and supply chain strategy will result in a better profit margin for the organization. An efficient supply chain strategy aims at cutting cost and eliminating non-value activities (Gordon 2007, 396-415). A responsive supply chain strategy tends to focus on being flexible and responsive to changes in customers demand. An agile supply chain strategy combines both risk-hedging and responsive supply chain strategies. In other words, it aims at being flexible and responsive to customers while pooling and sharing resources among suppliers (Glazer 2006, 1-19). Effective Supply Chain Span of Control What happens when a firms effective span of control in a supply chain is less that the span of the total supply chain? If the firm cannot see problems that occur beyond its supply chain span of control, the unforeseen problems can affect business continuity and supply chain performance with no prior warning. The Ericsson example above, where the customer was not aware of the extensive contamination of the chip production plant that resulted in months of delays, is but one example. And increased visibility is not a panacea. In 2003, When Apple was planning to launch its G5 computer using chips from IBM, the launch was delayed by a multi-state power outage because Apple was using a single source strategy in its supply chain for the CPU processor chip (Ghoshal 2007, 425-440). These issues of visibility, control, and coordination all fall under the realm of SCD. They require investments in developing specific capabilities that substitute for the internal control that would be available through vertical integration (Ganesan 2007, 1-19). This observation suggests that superior SCD provides another potential answer to the puzzle of why some firms performance better than others through the use of effective supply chain strategies. This leads to a discussion of SCD (Galunic 2010, 215-255). Capabilities As previously noted, when firms develop specific capabilities in supply chains these capabilities influence how the supply chain performs. Thus, once a capability is implemented it changes the behavior of the system. When the underlying behavior of a organizational system is systematically influenced, it is said to have properties that are identified with that behavior (Christopher 2007, 1-10). For example, firms develop capabilities to improve responsiveness in uncertain environments, and once successfully implemented these firms are said to have agility. Agility is one of many properties that have been identified in supply chains, as noted below. To build on this introduction to properties the discussion turns to defining the term properties and then examples of properties are provided within a supply chain context (Child 2005, 1-22). Supply Chain Relationship Structure Costs and benefits In choosing an SCRS, for every benefit there is a corresponding cost. With a modular SCRS, the expected increase in flexibility and responsiveness comes at the cost of more relationships to manage, more suppliers to qualify, more inter-firm interface standards to define/gain acceptance, and a spread of purchase volume commitments to more than one company, resulting in lower purchase volume leverage. For a firm employing a modular SCRS, the benefits of lower switching costs and responsiveness are traded-off by lower visibility to identify potential problems and the loss of lower total system costs that are available through more extensive coordination and communication practices (Holbrook 2007, 21-71). For an integrated SCRS, the advantages of higher visibility, improved coordination, lower inventories, and lower system cost come at the expense of investments in more integrated information systems, more human capital to maintain closer relationships, and lower flexibility and higher switching costs during dynamic competitive environments. When relationships are switched in an integrated SCRS, the new relationships and integrated processes have to be integrated over time, increasing investments in new suppliers and increasing human capital to aid in the transition. In addition, if a firm over-invests in a relationship, it negates some of the performance benefits, particularly financial performance (Harland 2003, 51-62). If a firm under-invests, it loses some of the potential benefits. Thus there are trade-offs that firms must consider between increased coordination and investment, and between control versus flexibility during environmental change. These SCRS-related costs and benefits need to be placed in the context of a firms desired strategic outcome.

Wednesday, November 13, 2019

Beowulf :: Epic of Beowulf Essays

Beowulf, the Hero The epic poem Beowulf, which was told from generation to generation honoring modern Anglo-Saxon beliefs, describes a heroic man who saves a village in their time of need. By definition a hero is a man of exceptional quality. Exceptional quality doesn’t even begin to describe the man that is Beowulf. Beowulf has many heroic characteristics from his super human strength to victoriously slaying monsters and other ferocious beasts. He has excellent leadership skills and commonly boasts of his achievements. Beowulf emerges as the true Anglo Saxon hero; who risks his life for the lives and well being of others. Others perceive Beowulf as a hero through his physical strength and stories of his glorious feats. Through all of the battles Beowulf fought he lost only two, and his last defeat would be the death of him. The first battle Beowulf lost was his competition with Breca. Unferth was an unbeliever of the strength and determination of Beowulf. Unferth taunted Beowulf one night only to be, in return, taunted back. "Are you the Beowulf that strove with Breca†¦risking your lives on the lonely deep†¦of ocean swimming with out-streched arms†¦with plowing shoulders parted the waves†¦seven nights you toiled in the tossing sea†¦his strength was the greater, his swimming the stronger!" (389-400). As Beowulf explained in his feud with Unferth, "We gripped in our hands naked swords, as we swam the waves, guarding us from the whales’ assault†¦freezing squalls, and the falling night†¦down to the bottom a savage sea beast fiercely dragged me†¦and so I was granted to slay with the sword edge nine of the nicors" (413-443). Basically Beowulf is trying to explain that the only reason he lost to Breca was because he had been swimming for seven days straight and he stopped along the way to kill nine sea creatures to make it easier for other travelers of the sea to get by. This was one of the first heroic acts Beowulf preformed. Through the eyes of an Anglo Saxon, Beowulf saved them from having to deal with the sea creatures, because the sea plays a major role in the life of the Anglo Saxon’s. Beowulf came to rescue the Anglo Saxon’s from a ferocious monster who was terrorizing their town. Beowulf’s uncle is king of the Geats and so he is sent as an emissary to help rid the Danes of this monster, Grendel.

Monday, November 11, 2019

Should Class Attendance Be Required

Word count 780 Should class attendance be a requirement? Many people ask should class attendance be a course requirement for students in college? There are two different opinions. Some people feel that it should be mandatory for college students to attend there classes everyday. Many other people however feel that students should be able to decide whether they want to go to there class or not. As far as I am concerned, no matter what unless the student is sick or has a family emergency they should be required to attend there classes every day whether the student likes it or not. Generally, students who do not like to attend classes have their own reasons. One of the main reasons is, many students feel they can learn some things better on their own rather than being in a classroom. If a student had to attend a class in which the professor teaches something they have already learned on their own, it would be a pointless. Some students that do not attend class, may feel they are able to learn some things better on their own but they may miss a lot of other important information given during a class. A student who attends all of his or her classes does have an advantage over a student who does not attend. In the first place, college professors often teach students many things that cannot be learned from a textbook. Like easier ways of figuring out a problem, or what something means. Many people believe that college is a place where professors are supposed to teach students what they know. In a textbook, normally there is just a lot of information and knowledge. However, how is the student supposed to understand and develop all this information? Students need to attend class; the professor is the best person to help them with these skills. Some students do not learn by just by reading the textbook, some people need things to be explained to them so they fully understand the concept. If the students went to class, the professor would be able to teach them how to learn, how to absorb information and how to apply what they have learned. When students attend class every day it also teaches them responsibility, discipline, and how to work together with other students. This prepares them for having a job, which requires people to work in groups. School starts at a certain time just like a job. Having to be at a certain place at a certain time also prepares students for getting a job in the real word. College is a lot like having a job. Students need to be responsible, and be in class on time just like people need to be at work on time. Being in class everyday and on time with an assignment-completed helps to prepare them for a career. College classes also teach students how to work with the other students in the class. Many times students will be given group assignments. In this activity, students will have to work with people from different backgrounds who they do not even know. In this situation, they learn how to handle working with people different from themselves, which is a very important factor in the work place. When students do not come to class they tend to miss many important things like discussions, due dates on work given during class, and class work. In college, professors teach student many things during discussions. This is when the professor lectures to the class about important things students need to know. During the discussion is the time to listen, learn and write down every thing the professor has to say on the given subject. If a student is not sitting in class to listen or write down information given by the professor he or she may never understand what was learned that day in class. In addition, students may miss due dates on assignments that were given during class which means the student will receive a zero on the assignment, and that is never good. Class work is a very important part of college. If a student does not attend class to complete his or her class there is a good chance that student will fail. I believe that students should be required to attend classes all the time. Student cannot just learn thing from reading a textbook they need a little guidance also. Professors can teach you the method of how to develop and use knowledge learned. In addition, college prepares you for a job by teaching discipline and responsibility. In short, attendance in all classes should be required.

Saturday, November 9, 2019

How to Pronounce Consonants in Italian

How to Pronounce Consonants in Italian Here are some basic pronunciation rules, tips, and practice words for Italian consonants. All whose pronunciation is similar to, yet distinct from that of the single consonant. This could result in confusion like saying â€Å"andremo - we will go† instead of â€Å"andremmo - we would go.†Italian is a phonetic language, which means that it’s spoken the way it’s written. B, F, M, N, V The consonants not listed below (b, f, m, n, v) are pronounced as in English. The approximate English equivalents are as follows: c before a, o, and u is like the English k. casa - housefico - figcon - withColosseo - Colosseumcane - dogcaffà ¨ - coffee c before -e or -i is like the English sound ch in chest. cena - dinnervoce - voicecibo - foodconcerto - concertcipolla - onionfacile - easy ch (found only before -e or -i) is like the English k. che - thatchimica - chemistryperchà © - becausechilo - kilochi - whochiuso - closedanche - also D d is somewhat more explosive than in English, with the tongue near the tip of the upper teeth but with no aspiration. di - ofdata - datedove - wheredue - twododici - twelvedonna - womanlunedà ¬ - Mondaymoda - fashionundici - eleven G g before a, o, and u is as in the English word go. albergo - hotelgamba - leggusto - tastegonna - skirtgomma - eraserlungo - longguanti - glovesguidare - to drivelingua - tongue g before -e or -i is like the g in gem. gelato - ice creamangelo - angelpagina - pagegente - peoplegentile - kindgennaio - January GH gh (found only before -e or -i) is like the g in go. laghi - lakesmaghi - magicians GLI gli is approximately like ll in million. meglio - betterfigli - sonsfamiglia - familyaglio - garlicfogli - sheets (of paper)bottiglia - bottle GN gn is approximately like ny in canyon. signora - ladysignore - gentlemanbagno - bathsogno - dreamlasagne - lasagnaspugna - sponge H h is silent ho - I haveha - hasahi! - ouch!hanno - they have I l is as in English, but sharper and more forward in the mouth. olio - oillingua - languagesale - saltmelone - melonluna - moonscuola - school P p is as in English but without the aspiration that sometimes accompanies this sound in English. pane - breadpatata - potatopepe - pepperpap - dadponte - bridgepasto - mealpronuncia - pronunciationpsicologo - psychologist QU qu is always pronounced like the English qu in quest. questo - thisquinto - fifthquale - whichquanto - how muchquadro - picturequalit - quality R r is different from the English r; it is pronounced with one flip of the tongue against the gums of the upper teeth. This is the trilled r. ora - nowalbergo - hotelbaritono - baritonearte - artorologio - watchporta - door S s is sometimes like the English s in house. soggiorno - living roomtesta - headstanza - roomfesta - party; holidayposta - mail s is sometimes (but always before b, d, g, l, m, n, r, and v) like the English s in rose. rosa - rosetesoro - treasurefrase - phrasesbaglio - mistakeesercizio - exercisemusica - music SC sc before a, o, or u is like sk in ask. ascoltare - to listenscuola - schoolpesca - peachtasca - pockettoscano - Tuscanscarpa - shoescultura - sculpture sc before -e or -i is like the English sound sh in fish. sci - skipesce - fishconoscere - to knowscena - scenescendere - to descenduscita - exit SCH sch occurs only before -e or -i, and is pronounced like the English sk. pesche - peachestasche - pocketsscheletro - skeletonlische - fishbones T t is approximately the same as in English but no escaping of breath accompanies it in Italian. contento - gladcarta - paperarte   artmatita - pencilturista - touristantipasto - appetizertelefono - telephonetesta - head Z z is sometimes voiceless, like ts is bets. negozio - storemarzo - Marchgrazie - thank youdizionario - dictionary z is sometimes voiced, like ds in beds. zero - zeropranzo - lunchromanzo - novelzanzara - mosquito Note: When ci, gi, and sci are followed by -a, -o, or -u, unless the accent falls on the -i, the -i is not pronounced. The letter -i merely indicates that c, g, and sc are pronounced, respectively, like the English ch, g (as in gem), and sh. arancia - orangegiornale - newspaperciliegia - cherrysalsiccia - sausagecamicia - shirtscienza - science

Wednesday, November 6, 2019

Free Essays on All Quiet On The Western Front

All Quiet on the Western Front By: Erich Maria Remarque This tale of war takes place in a time where death and violence were part of people’s everyday lives. The battles fought during WWI were both brutal and grueling; the fighting lasted for a total of four years. During this time of war many young men were forced to defend their countries and in most cases this resulted in giving up your life in honor of your country. For most of these young it would be the first and last time that they would see combat and were a little naive before entering the war. They had hopes of honoring their countries and defeating the enemy, but during this war many of them came to realize that the battles they were engaging in would turn out to be pointless as neither side was gaining anything from the war. Millions and millions of casualties resulted from this war with no real outcomes except for the fact that many countries population sizes largely decreased. For Paul Baumer the story began when he was convinced to join the army by his schoolmaster when he was just a teenager. A this time I do not thin that Paul knew what he was getting himself into and would learn this listen very quickly once he joined the war. Paul went under strict training and during this time he was able to make new friendships that would come to be all he would have. When Paul was ready he took to the front lines where he would battle in trench warfare. This was a brutal type of warfare that consisted of long intertwining trenches more than six feet into the ground at some spots and was very cold, dirty, disease filled, and bloody. This first look at how the war was really being fought must have scared all of the young men and opened their eyes as to the way war really was, and that war was not as glorious as it would have been made out to be before they got to the front lines. Luckily Paul received guidance from a veteran of war named Stanislaus Katczinsky w... Free Essays on All Quiet On The Western Front Free Essays on All Quiet On The Western Front All Quiet on the Western Front By: Erich Maria Remarque This tale of war takes place in a time where death and violence were part of people’s everyday lives. The battles fought during WWI were both brutal and grueling; the fighting lasted for a total of four years. During this time of war many young men were forced to defend their countries and in most cases this resulted in giving up your life in honor of your country. For most of these young it would be the first and last time that they would see combat and were a little naive before entering the war. They had hopes of honoring their countries and defeating the enemy, but during this war many of them came to realize that the battles they were engaging in would turn out to be pointless as neither side was gaining anything from the war. Millions and millions of casualties resulted from this war with no real outcomes except for the fact that many countries population sizes largely decreased. For Paul Baumer the story began when he was convinced to join the army by his schoolmaster when he was just a teenager. A this time I do not thin that Paul knew what he was getting himself into and would learn this listen very quickly once he joined the war. Paul went under strict training and during this time he was able to make new friendships that would come to be all he would have. When Paul was ready he took to the front lines where he would battle in trench warfare. This was a brutal type of warfare that consisted of long intertwining trenches more than six feet into the ground at some spots and was very cold, dirty, disease filled, and bloody. This first look at how the war was really being fought must have scared all of the young men and opened their eyes as to the way war really was, and that war was not as glorious as it would have been made out to be before they got to the front lines. Luckily Paul received guidance from a veteran of war named Stanislaus Katczinsky w...

Monday, November 4, 2019

Argumentive Eassy Essay Example | Topics and Well Written Essays - 1250 words

Argumentive Eassy - Essay Example Social networking sites, such as Facebook and Myspace, have become the most modern and the most common methods of communication between people, especially for teenagers. While teenagers appreciate the ease in which they are able to communicate with friends and family members, there are many concerns in regard to this newer form of communication. Social networking sites are harming the social skills of teenagers, keeping them from other aspects of their lives, and have proven to be dangerous to their lives and well-beings. With all of these aspects combined, many parents have come to believe that social networking websites are harmful to teenagers. While many people, teenagers especially, believe that Facebook and Myspace are considered to be social networking sites, there are still others, consisting of mainly parents, that feel that social networking is an oxymoron. Through these social websites, teenagers are able to keep in touch with friends, family members, and teachers, as well as being able to meet new people through the many communities via these networking sites. However, the more that teenagers depend on these websites to communicate with others, the less time they seem to spend with friends and family outside of their web-driven social lives. The days of talking on the phone or going to a friend’s house have long since gone with the introduction of these simple communicative tools, making having a social life more convenient to teenagers of this generation. A social life nowadays usually consists of friends meeting each other in various chat rooms or forums on social networking websites to talk. The biggest fear here is that teenagers growing up in this digital generation and putting too much dependency on these websites will begin to lose real social skills, as their methods are now centering more around a computer instead of face-to-face communication, or even a conversation taking place

Saturday, November 2, 2019

The fierce competetion between the conventional and islamic banks at Case Study

The fierce competetion between the conventional and islamic banks at the Kuwait finance bank in Bahrain - Case Study Example This has resulted in the process of tremendous competition in the marketplace. In an effort to sustain in the well connected and highly competitive global marketplace, companies around the world are significantly asking for large loan amounts in order to fuel their organizational growth needs. On the other hand, the consumers in an attempt to maintain a suitable lifestyle are focusing on the process of acquiring financial support for the purpose of acquiring homes, vehicles and other necessary products and services. This is triggering the need for financial support services from banking institutions around the world. However, the banks in an attempt to maintain profits are providing loans on competitive and attractive interest rates. However, talking on this note, it can be said that the effect of macroeconomic factors like slowdown of productivity in the developed countries, credit crunch and Euro Zone crisis are playing significant roles in the process of determining the rate of in terest on the financial loans in banking systems around the world. ... With the growth of business operation in the Middle Kingdom, a particular style of banking was introduced in an attempt to fund the large scale business operations of that time. During those early days of banking, the financial institutions used to charge riba. The riba in various Arabic and Middle East religions dialects is represented and meant as a bite to the pain inflicted upon the debtor (Ahmed 2011) . Riba in simple terms represents the interest rates on a loan (Bakar, â€Å"Riba and Islamic Banking And Finance†). However, with regards to the Islamic Law which is referred as Shari’aa, Muslims were not allowed to deal in riba and it was declared as a highly prohibited action, which will attract sin. As a result of this, when the Europeans of those times focused on developing the trade channels with the Ottoman Empire by doing business through the interest based loan and banking system, the local business community rejected the offers. This led to the formation of a culture among the Muslim community to avoid loans altogether. In the recent times, a lot of development has happened with regards to the initiative taken King Faisal of Saudi Arabia in 1974 to develop a banking system, which follows the Islamic law (Rahman 2010). The years after that followed a generation of a significant amount of interest for the purpose of building and developing a more sophisticated and modernized version of the pre-existing methods related to Islamic banking. It can be said also highlighted in these regards that the process of re-emergence of the Islamic banking system was to some extent fuelled by the desire of the Muslim communities to stay clear of any kind of financial