Thursday, August 27, 2020

Employment Law Essay Example | Topics and Well Written Essays - 2250 words - 1

Work Law - Essay Example Congruity may request changing the gear, conditions, or work environment, for example, recruiting a gesture based communication mediator for hard of hearing and quiet specialists, offset with cost, attainability, and whether alterations can be started to dispose of the weight to the debilitated worker (Barnes et al. 1998). Be that as it may, the hypothetical result of enactment against separation is muddled. By giving them beneficial benefits, crippled people are progressively able to work or give work. However more prominent expected uses may debilitate businesses from utilizing impaired laborers (Oliver 1995). Without effective execution techniques, bosses will endeavor to avoid such extra expenses. Such usage can either be casual, for example, ‘name and shame’, or formal, for example, through ‘tribunals and courts’ (Massie 1994, 92). The Disability Discrimination Act 1995 made rules to prevent oppression impaired people. It portrays an incapacitated people as a person with mental or physical impedance which has an extensive and lasting harming sway on his/her ability to perform typical every day life exercises (Great Britain 1995). Part II of the Act which was authorized in 1996 is grounded on the way of thinking that impaired people ought not be victimized in the working environment or business or when searching for business (Barnes et al. 1998). DDA 1995 specifies that, as previously mentioned, managers may need to experience handy changes if their business rules or working environments arrange debilitated people at a significant hindrance corresponding to genuinely capable people (Great Britain 1995). This includes the arrangement of supporting administrations or helps. Regardless, there has been no precaution commitment to prompt these progressions under the enactment. DDA 1995 at first encompassed businesses with at any rate 15 laborers (Barnes et al. 1998). Since 2004 this resistance has been

Saturday, August 22, 2020

Steam engine essays

Steam motor expositions In 1698 an extraordinary innovator named, Thomas Savery made the primary steam motor. He was chipping away at an issue siphoning water out of coalmines. This machine he utilized comprised of shut vessel loaded up with water which was made into steam. It constrained the water upward and out of the mine. It made some like a vacuum and sucked more water out a base valve. Afterward he began to work with Thomas Newcomen on a barometrical steam motor. Later on in 1748 John Schuylers copper mine utilized the main steam motor in America. Flooding shut down the mine in Passaic, New Jersey. Schuyler paid Jonathan Hornblower 1000 pounds to transport him a steam motor and mechanics to set it up from Britain. So in 5 years the motor showed up in 1753. The footing motor is the primary kind of motor utilized in the fields in Britain. Be that as it may, they were not self impelled at this point so they should have been pulled by ponies. They were utilized for the ranch hardware and to work sawmills. In the twentieth century they were as yet utilized. The vehicles were made with bigger steam motors for substantial haulage. They likewise had a 3-speed outfitting and sprung on both front and back axles. When voyaging longer there was an enormous water tank under the vehicle. The motors could pull as much as 120 tons. There were additionally tractors that were mainstream pulling lumber and the motors were less then 5 tons. The most well known tractor was the Garret 4CD. Mining engineer Richard Trevithick of Cornwall assembled the primary self-moving motor. He committed his entire like of improving the steam motor and other motor manufacturers were Aveling, Burrell, Clayton, Fower, and Garrett. Thomas Savery was an English military architect who was the main innovator of the steam motor and got the thought from Denis Papins pressure cooker. Some of Saverys innovation was the odometer for ships, a gadget that deliberate separation voyaged Thomas Newcomen was an English metal forger designed the barometrical steam motor. ... <!

Musicians The 27 Club Professor Ramos Blog

Artists The 27 Club Musicians’ The 27 Club At the point when individuals here ‘27 Club it is uncommon for somebody to try and think about it. The 27 Club was made in the 1970’s. It was made after 4 extremely renowned performers lamentably kicked the bucket between the long stretches of 1969-1971. Significantly after those demise it didn’t bring a lot of consideration. The possibility of the 27 Club didn’t get everyone’s consideration until 1994 when Kurt Cobain kicked the bucket. At the point when the making of this club started it began with accepting that these craftsmen made a Satanic agreement. Others obviously accepted they were simply suicides. At the point when you put more idea into it you can generally concur that drugs and awful pasts have such a great amount to do with them. The acclaim may have given them everything they could have envisioned about, however it likewise gave them more to worry about like how individuals saw them and attempting to accomplish beyond what they could d eal with to keep the consideration of their fans. It isn’t all silly buffoonery in any event, when you have the notoriety.  There are such a significant number of individuals with regards to the 27 Club, yet when somebody makes reference to the club 6 individuals spring up into the discussion. The individuals include: Brian Jones, Jimi Hendrix, Janis Joplin, Jim Morrison, Kurt Cobain, and Amy Winehouse. The main part to be placed into the 27 Club was Brian Jones. He was conceived on February 28,1942. At the point when Jones was 3 years of age his multi year old sister passed on of Leukemia. From that point forward his life was constantly rotated around her passing. He is most popular as the individual from the Rolling Stones band. They made the band in 1962. As the band started playing various gigs and making music Jones started getting a handle on left which at that point prompted use medications and drink unreasonably. Jones started kicking rough and off having emotional episodes in any event, when in front of an audience. Sooner or later Jones got awful that he even got captured. That’s prompted the remainder of the individuals to settle on the important choice of requesting that he leave the band. So in 1969 Jones was formally approached to leave the band. Obviously this prompted Jones getting discouraged and he didn’t discover anything he sufficiently minded to li ve any longer. On July 3, 1969 Jones overdosed and was found at the base of his pool. Jimi Hendrix was likewise one of the main individuals to join the club. Jimi was conceived from a high schooler mother on November 27,1942. He didn’t have a decent adolescence. His mother was a medication someone who is addicted and his dad was a consumer. When Jimi’s father saw that he was left given he never let him overlook that he was a devil’s youngster. His folks never appeared to get along, he grew up observing them contending. He wound up being ricocheted around to his family members with his two more youthful siblings. His mother wound up biting the dust when Jimi was 15 years of age. Jimi instructed himself to play the guitar. He began medications and liquor youthful to manage of his dad and obviously his mother’s demise. That didn’t prevent him from accomplishing to follow his fantasy. He got so much popularity in light of his guitar aptitudes. He was in the long run known to be the Ultimate Guitarist. All the distinction brought mental s elf view issues and Jimi began to once again work himself attempting to make more music and give his fan more than he had the option to. This obviously had Jimi utilizing more medications to either keep awake or manage the pressure. He kept on suffocating himself in liquor and medications until he overdosed on September 18,1970. Janis Joplin was conceived on January 19.1943. She really rolled out a major improvement in the music business for ladies. She was known as the First Lady of  Rock’N’Roll. When Janis was more youthful she was quite known as the rebel. Dissimilar to the various children at school she didn’t think dark individuals were any unique. When in school Janis was tormented in light of the fact that she had terrible skin inflammation. In spite of the fact that she attempted to overlook the harassers it didn’t influence her intellectually. She was casted a ballot the Ugliest Boy in school. At the point when she went to High School Janis started utilizing medications to manage the harassers. Janis definitely realized she needed to be well known. She wanted to sing and she went out to look for her chance. She ricocheted to and fro from her home to different states attempting to discover her chance, however flopped without fail. Rock wasn’t known from having lad ies in the music business, so made it hard for Janis. She was at that point a substantial consumer, yet the persistent bombed endeavors to accomplish notoriety prompted her taking medications. She at long last made her success yet when she performed she was apprehensive so she drank and took sedates before strolling up in front of an audience. Janis was at that point harassed for what she looked like in school so notoriety exacerbated it when it came to thinking about her mental self view. She overdosed on heroin on October 4, 1970. Jim Morrison was known to be a smart, yet languid child when it came to class. He was more on December 8,1943. His was in the Navy was amazingly severe. When Jim was around 5 years of age he was in the vehicle with his family when they passed by an awful slammed truck. They drove by dead bodies out and about and a portion of the bodies were really destroyed in pieces. Jim always remembered that picture and really composed the tune PeaceFrog. Growing up Jim’s father was a severe man with numerous principles. Jim was to a greater degree a free soul and started defying his dad. He started to drink to manage his dad. At the point when he chose to go the film school his family was incredibly unsupportive. He started doing music and it turned out to be more worry for Jim. He started to utilize medications and more liquor to manage his own life as well as his open life. He joined The Doors Band. When Jim was in front of an audience he started to have fierce upheavals. Jim realized he was deteriorating, so he took a break from the band so he could attempt to get himself together. When taking that break it brought more discouragement for Jim. He didn’t stop the medications and he began drinking throughout the day. On July 3, 1971 Jim was discovered dead, overdosed on heroin in his bath. Kurt Cobain is best know as the part on The Nirvana Band which was made in 1988. Kurt was conceived on February 20,1967. Kurt’s guardians got separated and he got isolated from his more youthful sister. This was a colossal change for a little youngster particularly when not knowing when you will see you sister. This caused Kurt to feel forlorn and his parent’s remarried rather quickly.He started having mental self portrait issues at a youthful age. When Kurt was a high schooler he found a dead body dangling from a tree. He discovered medications when he moved in with his mother. In 1992 Kurt wedded Kourtney. They before long had a little girl. Kourtney was an overwhelming medication client which make Kurt keep utilizing drugs. His cousin started seeing the measure of medications Kurt was utilizing and cautioned him that enslavement and psychological instabilities. Kurt didn’t focus on his cousin’s notice. In 1993, Kurt intentionally overdosed on drugs yet he was discovered soon enough to spare him. He didn’t need to live any longer and having the acclaim thus much consideration made him need to leave this world sooner. He composed a self destruction note upon the arrival of his passing and he expressed, â€Å"it’s preferable to wear out over blur away.† In his note he additionally left a couple of words for his little girl who he adored, however he just wasn’t sufficiently able to remain on earth any longer. On April 5,1994 Kurt put a firearm to his mouth and in a split second finished his torment. We at that point have Amy Winehouse who was really one of the later lost life. Amy Winehouse was conceived on September 14,1983. Amy was daddy’s young lady from the day she was conceived yet when she was 9 years of age her dad left to live with his new sweetheart. This left Amy’s mother battling as a single parent who Amy despised. Amy appeared to have hatred towards her mom since her dad left. When Amy was in school she really started taking antidepressants and she would self-damage to catch eye. When Amy was in her 20’s she was an incredibly overwhelming consumer. Amy got ready for marriage and wedded  Blake Fielder-Civil in 2007. Blake he utilized heroin and different medications; in the long run he got Amy utilizing them too . Blake before long turned into her provider for the medications. Blake and Amy in the end got separated following 2 years on the grounds that the medications began turning into the one thing destroying their marriage. Amy proceeded obv iously after the separation which is the point at which she was sent to the medical clinic over overdrinking. Her PCP cautioned her that she would confront demise in the event that she didn’t look for help. That cautioning didn’t truly stay with Amy, she despite everything kept on utilizing drugs attempting to manage the acclaim, confidence and despondency. She once disclosed to her companion Alex Hainsand she felt that she was going to join the 27 Club. Amy began having seizures brought about by the measure of medications she was utilizing. Amy quit focusing on her music vocation and all she thought about was the medications and liquor. Everybody around her started to saw how depleted she was by all accounts. Amy kicked the bucket on August 7, 2011 from overdose when she blended courageous woman, cocaine, delight, ketamine, whisky, and vodka. These performers are still associated with having astounding abilities. They had troublesome circumstances to manage since early on and accept that possibly a little popularity can fix everything. Their past frequented them even with all the consideration that they got. The music business didn’t help them either giving them the measure of pressure and work a solitary human can’t handle. Such an excess of driving  to the utilization of medications. Trusting that possibly only for a brief timeframe they won’t feel depleted, focused or the torment from an earlier time. We lost these skilled individuals way too early in light of the fact that they couldn’t see the importance of living any longer. Individuals are as yet attempting to make sense of why it is that they kicked the bucket at 27. The rundown for the 27 Club keeps on developing still no precise response to why these specialists surrender their life at that age. Fans lost their cherished performers and not for second did these craftsman permit their fans to see the agony they held inside until their last day. Work Cited â€Å"Amy Said She Always Knew

Friday, August 21, 2020

The Secret Service Essay Example For Students

The Secret Service Essay The Secret Service was made in 1865 as a government law authorization office inside the Treasury Department. It gets its legitimate authority from Title 18, United States Code, Section 3056. It was built up for the express motivation behind halting duplicating tasks which had jumped up in this nation following the presentation of paper money during the Civil War (Treasury, 2002, Online). The Secret Service keeps up its job as gatekeeper of the uprightness of our money, however today additionally explores violations including United States protections, coinage, other government issues, credit and platinum card misrepresentation, and electronic supports move extortion. The most clear of its different exercises is official assurance, which started after the death of President McKinley in 1901(Treasury, 2002, Online). We will compose a custom exposition on The Secret Service explicitly for you for just $16.38 $13.9/page Request now During the 1800s, Americas money related framework was complicated. Bills and coins were given by each state through individual banks, which created numerous kinds of legitimate money. With such huge numbers of various types of bills available for use, it was simple for individuals to fake cash. The Secret Service authoritatively went to take a shot at July 5, 1865. Its first boss was William Wood. Boss Wood, broadly known for his valor during the Civil War, was exceptionally fruitful in his first year, shutting more than 200 forging plants. This achievement demonstrated the estimation of the Secret Service, and in 1866 the National Headquarters was set up in the Department of the Treasury working in Washington, D.C (Treasury, 2002, Online). During the night of that day President Lincoln built up the Secret Service, he was killed at Fords Theater in Washington, D.C., by John Wilkes Booth. The nation grieved as news spread that the President had been shot (White House, on the web). It was the first run through in our countries history that a President had been killed and it was the explanation that the Congress in the end, after two increasingly presidential deaths, added Presidential insurance to the rundown of obligations performed by the Secret Service. Since 1901, each President from Theodore Roosevelt on has been ensured by the Secret Service. In 1917, dangers against the President turned into a lawful offense and Secret Service assurance was expanded to incorporate all individuals from the First Family (White House, on the web). In 1951, security of the Vice President and the President-elect was included. After the death of Presidential applicant Robert Kennedy in 1968, President Lyndon B. Johnson (1963-1969) approv ed the Secret Service to secure every Presidential competitor. Throughout the years, the Secret Services work has kept on changing and develop. Its capacities include: Protecting the President and Vice President and their families, contender for those workplaces, previous Presidents and their families, and visiting heads of outside states and governments; Enforcing laws against falsifying cash, coins, or protections of the United States; Enforcing laws against misrepresentation or imitation of Government checks or securities, and different protections and commitments of the United States; Investigating credit and platinum card extortion, PC misrepresentation, and electronic store move misrepresentation; Furnishing physical security for the White House, the Main Treasury Building, and remote international safe havens and missions in Washington, New York and different urban communities. (Treasury, 2002, Online). These capacities are straightforwardly reflected, beneath, in their state ment of purpose and fall into two particular classes the analytical strategic the defensive crucial. The United States Secret Service is commanded by resolution and official request to do two noteworthy missions: security and criminal examinations. The Secret Service ensures the President and Vice President, their families, heads of state, and other assigned people; explores dangers against these protectees; secures the White House, Vice Presidents Residence, Foreign Missions, and different structures inside Washington, D.C.; and plans and executes security structures for assigned National Special Security Events. The Secret Service additionally explores infringement of laws identifying with forging of commitments and protections of the United States; budgetary wrongdoings that incorporate, however are not restricted to, get to gadget extortion, monetary establishment misrepresentation, wholesale fraud, PC misrepresentation; and PC put together assaults with respect to our countries money related, banking, and media communications framework. Assurance remains the Secret Services essential strategic. The Secret Service Uniformed Division partakes in achieving this crucial its security of the White House and its prompt environmental factors, just as the living arrangement of the Vice President, and more than 170 outside international safe havens situated in Washington, D.C. Initially a power contained a couple of individuals from the military and the Metropolitan Police Department, it started formalized security of the White House and its grounds in 1860. This unit was under the course of the White House Military Aide until July 1, 1922 when President Warren G. Harding provoked the foundation of a White House Police Force. It was not until 1930, after an obscure gatecrasher figured out how to stroll into the White House lounge area, that President Herbert Hoover perceived the requirement for the White House Police and the Secret Service to unite. President Hoover needed the Secret Service to only control each part of Presidential security; hence, Congress set the management of the White House Police under the bearing of the Chief of the Secret Service. In 1970, Public Law 91-217 extended the job of the White House Police, recently named the Executive Protective Service, to remember insurance of political missions for the Washington, D.C.,area. Congress later included the security of the Vice Presidents close family to the Executive Protective Services developing obligations in 1974. After a few name amendments, the power formally received its present name, the United States Secret Service Uniformed Division in 1977. The Special Agent Division helps with the Secret Services defensive strategic their work with individual security. Operators in this division are answerable for the government assistance, security, and insurance of certain qualified people. The Secret Service defensive strategies are commonly the equivalent for all people secured. Changeless protectees, for example, the President and the First Lady, have subtleties of specialists relegated to them. Brief protectees, for example, applicants and outside dignitaries, have subtleties of specialists on impermanent task from Secret Service field workplaces. The Secret Service doesn't talk about strategies or means in any detail, anyway as a rule, the development group overviews each site to be visited. From these reviews, the individuals decide labor, hardware, medical clinics, and departure courses for crises. Fire, salvage, and other open assistance work force in the network are alarmed. An order post is built up with full interchanges offices. The help of the military, government, state, region, and neighborhood law implementation associations is an imperative piece of the whole security activity. Before the protectees appearance, the lead advance operator facilitates all law requirement agents partaking in the visit. Faculty are presented and are alarmed on explicit issues related with the visit. Knowledge data is talked about, recognizable proof indicated, and crisis alternatives sketched out. Preceding the appearance of the protectee, checkpoints are set up, and access to the made sure about region is restricted. During the visit, Secret Service and neighborhood law authorization faculty structure a system of help for individuals from the detail encompassing the protectee. The Secret Service order post goes about as the correspondence community for defensive exercises, screens crises, and keeps all members in contact with each other. After the visit, specialists break down each progression of the defensive activity, record uncommon occurrences, and propose enhancements for what's to come. Defensive research is a necessary part of all security activities. Operators and pros alloted to defensive research assess data got from law requirement/insight organizations and an assortment of different sources with respect to people or gatherings who may represent a risk to Secret Service protectees. They audit faulty letters and messages got at the White House and keep up a 24-hour activity to get, arrange and disperse insurance related data. While the vast majority partner the Secret Service with Presidential assurance, their unique command was to examine the duplicating of U.S. currencywhich they despite everything do. The Secret Services essential analytical crucial to protect the installment and money related frameworks of the United States. This has been truly cultivated through the authorization of the duplicating rules to protect the trustworthiness of United States money, coin and monetary commitments. Since 1984, their insightful obligations have extended to incorporate wrongdoings that include monetary organization extortion, PC and media communications misrepresentation, bogus distinguishing proof archives, get to gadget extortion, advance expense extortion, electronic supports moves, and illegal tax avoidance as it identifies with their center infringement. Three unique divisions help the Secret Service in achieving this analytical strategic Special Agent Division, the Financial Crimes Division, and the Forens ic Services Division. Because of my own advantages, I found the Forensic Services Division especially intriguing. Criminological inspectors in the Secret Service Forensic Services Division (FSD) give investigation to addressed records, fingerprints, bogus ID, Visas, and other related measurable science regions. Exa

How to Choose the Strong Topics For a Literary Analysis Essay

How to Choose the Strong Topics For a Literary Analysis EssayYou should be able to categorize the given topics for a literary analysis essay as strong or weak based on their relevance to the paper. This is the basic idea behind categorizing the topics for a literary analysis essay, and this technique will help you determine if the topics are relevant to the paper or not. But first, it's best that you keep these things in mind:* Strong topics should be chosen. You should choose the topic that you feel is important. Strong topics are the ones which are more likely to lead to meaningful discussions among your readers.* Strong topics should also have the most weight to them. Each of the strong topics should be placed accordingly on the papers.* The topics in the paper should also have strong topics in them. Strong topics are topics which are already in the minds of the readers when they first read your paper.* The strong topics should also be relevant to the paper. This means that you sh ould not forget to include the strong topics in the paper, you should however make sure that the relevance of the strong topics to the paper is still preserved. The relevance of the strong topics to the paper is determined by how valuable they are to the overall thesis of the paper.* The topics in the paper should also be relevant to the paper. This means that you should avoid including the topics that may get redundant if included in the paper. Also, the topics in the paper should also be relevant to the thesis.* There should be some links from the strong topics to the thesis. The connections between the strong topics and the thesis should be made. But this doesn't mean that the connections are only present in the conclusion of the paper.* If the strong topics are chosen, the topics in the paper should also be relevant to the thesis. However, if the strong topics are chosen, the other strong topics should also be considered. They should then be placed accordingly on the paper.

Thursday, July 2, 2020

Project Assignment Statistic and Business Research Methods - 1925 Words

Project Assignment: Statistic and Business Research Methods (Essay Sample) Content: Statistic and Business Research MethodsName:Subject:Date of Submission:Statistic and Business Research MethodsIntroductionThe use of mobile phones is rapidly increasing with recent reports recording an increase in the demand for smartphones. As Osman, Talib, Sanusi, Yen, and Alwi (2012) reveal seventy percent of the global population owns at least a single mobile phone. The author further asserts that children in America are likely to own a mobile phone than a book. This owes to the reality that 85 percent of children in America own a mobile phone while seventy-three percent of American children own a book. Critical to the discussion is the fact that the development of smartphones has resulted in an increase in the demand for such mobile phones. As evidenced, Kantar Worldpanel (2014) reveals that fifty-five percent of American mobile phone users own smartphones. Clearly, the subject of smartphone usage is attracting a lot of attention from scholars and practitioners. In support of this, scholars such as Nagarkoti (2009), Malviya, Saluja, and Thakur (2013) have made publications on the subject in question.Evidently, the recent demand for smartphones is alarming and explains why many scholars are focusing on the subject of smartphones. Critical to the discussion is the fact that the demand and use of smartphones are high among teenagers and young adults. This owes to the reality that Arif and Aslam (2014) reveal that sixty-three percent of North American undergraduates prefer to use smartphones. It follows that understanding factors affecting consumer behavior in the smartphone industry would aid smartphone producers to customize their products based on the market demand. As a result, this paper examines the factors affecting the consumption of smartphones by university students. It is important to note that this paper does not provide the results of the study. Instead, it outlines a methodology that could be used to examine factors affecting the consumption of smartphones by university students. Consequently, the paper includes a literature review, a methodology, and the research process.Literature ReviewEvidently, previous scholars have examined factors affecting consumer behavior in the smartphone industry. For instance, Arif and Aslam (2014) used structural equation modeling to examine factors affecting student dependence on smartphones. Their results revealed that social influence, social need, and convenience significantly influence student dependence on smartphones. In a different study in Malaysia, Lay-Yee, Kok-siew, and Fah-yin (2013) reveal that brand convenience, price, and product design, do not have a significant effect on consumer behavior while student dependency on smartphones has a significant effect on consumer behavior. It is notable that Tunmibi, Aregbesola, and Asani (2015) also conducted a study on the factors influencing consumer behavior in the smartphone industry. Vital to the debate is the fact the study was a descriptive study that described the factors, but did not establish how the factors influence consumer behavior.Malviya, Saluja, and Thakur (2013) also examined the factors influencing smartphone purchase among consumers in the smartphone industry. It is notable that distinct from other publications, Malviya, Saluja, and Thakur (2013) examined factors influencing consumer behavior after controlling for the brand as a confounding variable. Their results indicate that social influence and status symbol explain while some consumers prefer using Apple Smartphones. Analogously, price, durability, battery life, and operating system influenced how consumers purchase Samsung Smartphones, while operating system explains why some consumers prefer HTC smartphones. Evidently, existing publications on the subject in question explain factors influencing the purchase of smartphones among consumers. However, the publication from Lay-Yee, Kok-siew, and Fah-yin (2013) conflicts other publ ications. This implies that further studies should be conducted.Research Questions and HypothesesIn order to conduct the study, the researcher will rely on a set of research questions and hypothesis, which will offer directions on how to conduct the study. Specifically, the researcher will rely on the following research questions. 1 Does gender influence how consumers purchase smartphones among university students? 2 Does dependency on smartphones influence how consumers purchase smartphones among university students? 3 Does price influence how consumers purchase smartphones among university students? 4 Does a smartphone brand act as a confounding variable on the factors that influence how consumers purchase smartphones among university students?Considering the set of research questions formulated by the researcher, the researcher will rely on the following hypotheses to make a conclusion on the research questions. 1 Gender does not influence how consumers purchase smartphones among university students. 2 Dependency on smartphones does not influence how consumers purchase smartphones among university students. 3 Price does not influence how consumers purchase smartphones among university students. 4 Smartphone brand does not act as a confounding variable on the factors that influence how consumers purchase smartphones among university students.Operational DefinitionsAn operational definition is an important aspect when conducting a study because it enables the researcher to measure variables used for the study. It follows that the researcher will measure gender as male and female. Additionally, the researcher will measure dependency using a Likert scale. Specifically, study participants will be required to rate the magnitude of how dependency on smartphones affects their decision to purchase smartphones (on a scale of 1 to 5). Explanations on the different ratings will be provided to help the study participants understand how to rate their level of dependence on smartphones. It is also important to note that price will be measured as a categorical variable because the study participants will be required to identify whether or not price influences their decision to purchase smartphones. Ultimately, the brand will be measured by categorizing the different types of smartphones available in the market. The types of brands used in the study will include Apple, Samsung, Sony, Lg, and Others.Research MethodologyAn experimental study design will be used to conduct the study with an aim of understanding the factors influencing consumer behavior in the smartphone industry. This owes to the reality that Ray (2012) argues that an experimental study design is appropriate when the researcher intends causal relationships between variables. It may be argued that an exploratory study design could be used for the study, but previous publications on the subject have already established useful methodologies for conducting the study. As a result, the researc her will emulate their methodologies to identify causes for the conflicting conclusions from the studies. It is important to note that the study will be using human subjects to respond to questionnaires implying that the researcher will only be faced with financial constraints while conducting the study. The researcher also acknowledges that the experiment could be hampered by human errors, implying the researcher will be keen to avoid errors.Instrumentation and SamplingAs mentioned earlier, the researcher will use questionnaires to collect data from the study participants. It follows that the researcher will collect data from the university using an appropriate sample size. Considering that the institution has a population of two thousand students, the researcher will use a sample of three hundred and twenty-two students, which was calculated at a five percent level of confidence. The sample will be selected using simple random sampling with the aid of a sampling frame. Data collec ted from the field will be cleaned in Excel and analyzed using SPSS. Specifically, the researcher will use a T-test and an ANOVA test for to accept or reject the hypothesis. It is notable that the T-test will be used to reject or fail to reject the hypothesis of the first three research questions. Similarly, the ANOVA test will be used to reject or fail to reject the hypothesis of the last research question. Ultimately, it is crucial to note that all the tests will be conducted at a ninety-five percent level of significanceResearch ProcessAfter data cleaning and preparation is complete, the researcher will use the Cronbach alpha to examine whether the data collected can provide credible and reproducible conclusions. Further, the researcher will confirm that the data collected meet the required assumptions. Specifically, the researcher will ascertain that the data meets assumptions such as normality, homogeneity of variances, no significant outliers, a dependent response variable, an d continuous or categorical independent variables. It is important to note that the dependent for both research questions will be the number of mobile phones while independent variables will be customized based on the type of test being conducted. For instance, the independent variable for the first research question will be gender; the independent variable for the second research question will be dependency on smartphones; while the independent variable for the third research question will be the price. Ultimately, the independent variable for the last research question will be the type of phone owned by the study participant. The results from the analysis will be interpreted and reported in a scholarly journal.Expected OutcomesConsidering evidence from previous studies, it is expected that dependency on smartphones will be a significant predictor of consumer behavior in the smartphone industry. Thi...

Monday, May 25, 2020

Patton-Fuller Community Hospital - Free Essay Example

Sample details Pages: 10 Words: 2960 Downloads: 2 Date added: 2017/09/22 Category Advertising Essay Type Narrative essay Tags: Community Essay Hospital Essay Did you like this example? Patton-Fuller Community Hospital bhas been in business in the City of Kelsey since 1975. The hospital provides high quality medical care to the citizens of Kelsey and the surrounding area. Some of the services the hospital offers are x-rays, pharmacy, and emergency services for children and adults. â€Å"As one of the first hospitals in Kelsey, the staff is committed to providing a variety of programs that will support the health and welfare of the local community populations† (Apollo Group, 2010). The hospital’s backbone network structure for the entire hospital is 1000Base T. Some of the other individual sections of the departmental network use different standards such as 1000Base F. The areas that use the 1000Base T are responsible for the administrative side of things. These areas are: hospital executive management, human resources, operations, facilities, finance, and IT data center. The areas that use the 1000Base F are responsible for the clinical a reas. They include: radiology, operating rooms, wards, ICU’s, emergency rooms, labs, and pharmacy. For a failsafe, the entire hospital has a complete power backup system that automatically cuts over to a large diesel motor generator set. The hospital uses a network bridge to interconnect its logical network. A network bridge connects multiple network segments at the data link layer, which is Layer 2 of the OSI model. The Data Link Layer enables data to be transferred between network entities and might provide the means to detect and possibly correct errors that may occur in the Physical Layer. The hospital’s network is an Ethernet network. The Ethernet network uses a protocol called CSMA/CD which stands for Carrier Sense, Multiple Access with Collision Detection. The computers that use 1000Base T are networked with Cat. 6 cable. This cable allows for backward compatibility with the Cat. 5 and Cat. 3 cable standards but offers an increase in performance of up to 2 50 MHZ. The computers that use the 1000Base F are networked with single mode fiber because it performs at high speeds without the need to be refreshed and have higher bandwidth than multimode fiber. In order to have access to the Internet, Patton-Fuller utilizes a Cisco Router model 7609. It is connected with an Optical Carrier 1 line that has speeds of up to 51. 84 m/bits. The hospital also utilizes a Cisco ASA 5510 Virtual Private Network which â€Å"enables organizations to securely provide network access to a broad array of users, including mobile and fixed endpoints, remote offices, contractors, and business partners† (Cisco, 2010). With combined use, network traffic will flow smoother. The hospital is using a Cisco 1250 series for wireless access. It supports the 802. 11standard. The access points offer combined data rates of up to 600 Mbps to provide users with mobile access to high-bandwidth data, voice, and video applications regardless of their location, use mult iple-input multiple-output (MIMO) technology to provide reliable and predictable WLAN coverage, and improve user experience for both existing 802. 11a/b/g clients and new 802. 11n clients† (Cisco, 2010). The OSI layers that are directly involved in the networking system of Patton-Fuller are the physical layer, data link layer, network layer, transport layer, session layer and application layer. The physical layer is all of the hardware that the hospital uses. This includes such things as the Apple iMacs, servers, and routers. The data link layer is where the data transfer takes place. The network layer routes the messages using TCP/IP. The transport layer ensures that the data is properly sequenced and transferred without errors. It uses the TCP/UDP protocol. The session layer handles the processes between the client and the server. A common protocol used here is RPC. The application layer enables user applications to work with the network. Some common protocols here are HTTP, SMTP, and POP3. I would recommend that the hospital use the TCP/IP, and HTTP protocols as a standard. Both protocols are reliable and will meet the needs of the hospital. Patton-Fuller’s backbone network structure for the entire hospital is 1000Base T. Some of the other individual sections of the departmental network use different standards such as 1000Base F. The two networks are connected by a network bridge. The network bridge is used to inexpensively and easily connect local area network segments (Microsoft, 2010). The reason a network bridge is inexpensive is that there is no configuration required and you don’t have to purchase additional hardware such as routers and other bridges. The hospital’s administrative network consists of Apple iMACS and thin computers that use 1000Base T with CAT 6 cables. All work stations belonging to Executive Management has Apple iMAC computers with 24† monitors, 2. 4 GHz speed, 2 GB RAM, and a 500 MB hard dri ve. Human Resources, OPNS, and the Finance Senior Managers have Apple iMACS with 20† monitors, 2 GHz speed, and a 350 MB hard drive. All of the systems have OS virtualization and use the MAC Operating System X, Leopard, and Windows XP. OS virtualization allows separate, isolated virtual environments to be used on a single server. The MAC Operating System X is a UNIX system that is both simple and powerful. Leopard further enhanced the system by making it faster and more reliable. Windows XP is a product of Microsoft but it is able to be installed on any MAC using a native version of Microsoft Office. This way users are able to create documents using MS Word, make presentations using PowerPoint, and make spreadsheets with Excel, among other things. All personnel who are only involved in data entry in HR, OPNS, and Finance are only given thin computers made by HP that come with 17† flat monitors. Thin computers only provide access to a network. They don’t have a hard drive, fan, or any other moving parts. They are ideal for hospitals since they offer more secure storage of data than desktops or notebooks. This feature will help the hospital more effectively comply with HIPPA laws. These type of computers are also energy efficient and very reliable. The following are using 1000 BaseF single mode fiber: MRI, CT, X Ray, Mammograms, PET, Nuclear Medicine, and Sonography have their own viewing station. This department uses a UPS to protect the data sent and received here. They utilize an Apple MAC Pro with 2-3 GHz processors, 16 GB RAM, 4-750 hard drive in RAID, a FO network card, 30† cinema displays, imaging software, as well as the MAC Operating system with OS Virtualization. The emergency room has 1 workstation with a portable x-ray machine. It is a MAC Pro with 2 dual 3 GHz processors, 8 GB RAM, 2-750 GB HD RAID, Fiber Card, SuperDrive, 30† display, and the MAC OS with OS virtualization. The regular workstations use a 20 † iMAC with a 2 GHz processor, 2 GB RAM, 350 GB hard drive, SuperDrive, and fiber card. They are operating with the same MAC Operating System with OS Virtualization as the rest of the hospital. The SuperDrive allows for the reading and writing of media stored on different storage devices, such as CD/DVD. The fiber card allows for the prioritization of network traffic which is very important in a hospital because of the nature of some of the emergencies that occur there. The labs and the pharmacy are basically running on the same system as the ER bays with the exception of a 2. GHz processor and 500 MB RAM. The RIS Data Center is also using 1000 BaseF single mode fiber. It is running Apple Cluster Servers with the MAC OS that has remote desktop access. This allows for files to be accessed from home or on the road with the correct credentials. There is 10 terabytes of storage with a 4 GB fiber link. The data workstations are consistent with those in radiology, the labs, and the pharmacy. The RIS Data Center has an UPS (uninterruptible power supply) to protect the performance of the server. The OR, ICU, and Ward floors are using 1000 Base F with single mode fiber technology. The nursing stations and OR stations are using Apple MAC machines with 20† monitors, 2 GHz processors, 2 GB RAM, 350 MB HD, fiber card, SuperDrive, and Wireless. They are using the same OS as the rest of the hospital, the MAC OS X. Each room in the ICS has one network connection per bed. There is a 24 port FO hub per ward for connection to the network. RIS Imaging is using an Apple MAC Pro with 4 GB RAM, 30† flat panel display that is wall mounted, 2-3 GHz dual processors, 750MB HD, and a video and fiber card. The entire hospital is using the same OS. The IT Data Center is using 1000 BaseT technology. The center is using the CISCO Router 7609 and CISCO ASA 5510 VPN Router. Both of these routers have built in redundancy for accessing the Internet. The HIS system compute r is a IBM series mainframe that is using the Linux OS. It is using DB 2 and has 18 processors, as well as 32 GB RAM and AES security which is an intrusion prevention system. There is also a Windows Exchange Server, an Internet Server, and a RAS server. There is a UPS in the data center to protect the servers in case of a power surge. It seems that the only Wi-Fi access in the hospital is for the staff, patients, and maybe the patient’s guests. Since there is only one connection per bed, the access to Wi-Fi seems to be very limited. Perhaps, the hospital could consider using Broadband cellular wireless as an alternative in order to avoid interference with the network already in place which the staff uses and to lower the risk of data getting into the wrong hands. If the hospital does want to expand its use of Wi-Fi for the hospital, it may need to install many more access points. Hospitals have two major obstacles when it comes to Wi-Fi and that is their thick walls and interference caused by medical devices. This is why I would suggest using the broadband cellular technology instead. Something that may be missing from the hospital’s network architecture is a wireless Gateway security system. The hospital should also consider using 802. 1 x for access control to the network. It should also consider using audit controls and a NIDS. To enhance the signal of the Wi-Fi network, the hospital could use directional antennas. Patton-Fuller strives to effectively meet the needs of the patients it serves through the people that it employs. There are several positions available at Patton-Fuller from certified nursing aide to Chief Operations Officer. Each individual has his/her own set of unique responsibilities. The hospital has services such as emergency care, x-ray, Sonography, and pharmacy. Due to the different requirements of the people served at the hospital, the staff has to be diversified and specialized. This diversification may lead to co mmunication problems if the right steps aren’t taken. To ensure the correct steps are taken to counter potential communication problems, the Chief Information Officer is in charge of overseeing the Compliance Program. The officer â€Å"functions as an independent and objective body that reviews Hospital policies and evaluates compliance issues/concerns within the organization. The position ensures that the Board of Directors, management and employees are in compliance with the rules and regulations of federal and state regulatory agencies, that company policies and procedures are being followed, and that behavior in the organization meets the company’s Standards of Conduct† (Apollo Group, 2010). Some of the responsibilities of the CIO is developing, implementing, and maintaining a system-wide Corporate Compliance program, overseeing the Security Officer, the Director of Medical Records and the Director of Q. A. / Risk Management (Apollo Group, 2010). An im portant part of the successful operation of any business is Customer Relationship Management or CRM. Because hospitals â€Å"utilize the services of doctors, nurses, technicians, and other related specialists in the treatment and management of illness, including efforts to preserve mental and physical wellness† (Salesboom, 2010), an effective CRM solution would be ideal. Costs have steadily increased in the medical field and there are ways to find better, more cost efficient services. One way is by purchasing CRM software from Salesboom. This software accommodates the activities of all stakeholders involved; including patients and doctors, pharmaceutical companies and druggists, hospitals and insurance providers. â€Å"Some of the common driving forces for undertaking a CRM solutions in the Healthcare Sector are: †¢Cost and spending constrains The growing proportion of older people and the constant development of new treatments means demand for healthcare is rising. Hospitals can utilize CRM software applications to control costs and more effectively automate operations. †¢Patients and system users are educated – People access the Internet to research medical options, and as a result are better educated and more demanding of service levels in health care settings. †¢Desire to anticipate the needs and drivers in healthcare delivery to meet patient needs. †¢CRM solutions on market Maturing CRM technologies can deliver cost efficient solutions† (Salesboom, 2010). Salesboom CRM software addresses and integrates enterprise requirements from the following three key areas; Operational, Analytical, and Collaborative. The degree of detail and integration is scalable, and can be modified by as needed by the users. There is customer service, support, training, and professional services offered as needed. Information within the system is secure and accessible based on a highly scalable permissions tree. When scaling the access to information on the site, resources are able to be appropriately protected and information resources are able to be opened up for sharing based on organizational need. Furthermore, there is an Audit Trail functionality built into every item into the system. â€Å"This assures system services that can identify any information changes, access and sharing activities (and the owners) on the system. You can access Audit information at any time for review and reporting purposes and to demonstrate due diligence in adherence to legal, financial and medical regulations common in the Healthcare Sector’ (Salesboom, 2010). Salesboom CRM software facilitates organizations in the Healthcare Sector to meet the changing and rigorous protocols from a variety of regulatory agencies that track activities within the sector. These include Environmental, Occupational Safety and Health Administration (OSHA) and the Food Drug Administrations, and various protocols such as Emergency Protocol, Resuscitation Protocols, Research Protocols, and Services Protocols, Patient Rights, Organ and Tissue procurement, etc. Compliance with these protocols and regulations will help avoid errors and potential legal action. Salesboom CRM will deploy a solution that enhances services and processes so the hospital can achieve a positive ROI in as short a time as possible: †¢Software Solution – our team will help develop CRM plan, strategic placement and requirements development †¢Identify and automate business processes †¢Software and/or process customization †¢Integration of CRM Software (with existing software) †¢Cleanse/Import Data †¢Reporting on implementation/deployment †¢Professional Training Services and Support Services† (Salesboom, 2010). Through streamline production and distribution operations, Salesboom CRM implementation guarantees cost containment using front and back end tools as part of standard software offerings . The company guarantees visibility across all areas from finance to manufacturing and across the supply chain within exceedingly generous timeframes. To meet the long term goals of the hospital, Patton-Fuller definitely should implement this new system in order to stay ahead of the game. In today’s times, many businesses are starting to make a Web presence and hospitals are one such business. Some services that Patton-Fuller could make available through a Web Portal are: the ability to subscribe to electronic newsletters, viewing of peoples public information that are currently in the hospital, such as patients’ room numbers, and the ability to purchase hospital uniforms online. Some online services that are available at other hospitals include: the ability to pay bills online, research available positions and fill out applications, and transmit data to doctors from monitoring devices from the comfort of your own home. These services may be used at Patton-Fuller to make things more convenient for patients who owe bills and have mobility limitations, make applying for a job quicker and easier, and allow doctors to receive vital information without requiring a patient to drive all the way to the hospital. The Web Portal could also be expanded to provide outside vendor services such as, Just in Time pharmaceutical replenishment and inventory updates. Just in Time pharmaceutical replenishment will allow the hospital to automatically replenish stock and optimize inventory. These processes will be automated, meaning they are automatically system generated and will result in greater efficiency of handling the pharmacy’s stock. Another online tool that is being used today is social networking sites. The use of such sites may expand the hospital’s community base by exposing information to a multitude of people. Sites such as FaceBook, Twitter, and MySpace are very popular, with the average user having 100+ friends (UOP, 2010). That will result in a lot of exposure. On the other hand, if someone writes a bad review, it could hurt the reputation of the hospital. In conclusion, Patton-Fuller Community Hospital is a reliable place to seek medical treatment if you are in the area. It has a nice size, fairly up-to-date network in place, with the exception of needing more Wi-Fi access and greater security controls. The hospital has a very capable and caring staff onboard and with the adoption of a CRM plan, the limits are endless. Finally, if Patton-Fuller makes a Web portal available, it will be able to reach out to more people and attain a greater customer base. References Apollo Group, Inc. (2010). Patton-Fuller. Retrieved August 16, 2010 from https://ecampus. phoenix. edu/secure/aapd/CIST/VOP/Healthcare/PFCH/IT/ITNetDTop. tm Cisco. 2010. Retrieved August 16, 2010 from https://www. cisco. com/en/US/prod/collateral/vpndevc/ps6032/ps6094/ps6120/prod_brochure0900aecd80402e39. html Microsoft. (2010). Network Bridg e. Retrieved August 23, 2010 from https://www. microsoft. com/resources/documentation/windows/xp/all/proddocs/en-us/hnw_understanding_bridge. mspx? mfr=true Salesboom. (2010). CRM for Hospitals. Retrieved August 30, 2010 from https://www. salesboom. com/products/Hospital-crm-software-solution. html University of Phoenix. (2010). Social Networking Sites. Retrieved September 6, 2010 from University of Phoenix, CMGT 554 website. Don’t waste time! Our writers will create an original "Patton-Fuller Community Hospital" essay for you Create order