Wednesday, July 31, 2019

Obamacare: a Threat to America

President Barack Obama has been written into the history books for becoming the first African American president of the United States. The president plans on changing history again by bringing universal health care into the United States, which has won him much popularity among Democratic voters. President Obama’s speeches are adored by his fans but raise many red flags for the majority of America. Major concerns Americans have with President Obama’s two proposed health-care bills are that health-care options will no longer be available, the real cost of Obamacare, and small businesses.As many Americans believe Presidents Obama’s health-care plan is what the United States has needed for decades, considering he did get elected, his polices will prove to be a bane for the United States. The main concern for many Americans about the Obama’s Health-Care plan is the fact that they will lose the freedom to choose. Choosing health-care benefits, doctors, and high -deductable coverage is important to every insured American citizen, so why would Obama change that?In his speeches, Obama has promised Americans that they will be able to keep their existing health-care coverage but the proposed bills tell a different story. Both bills necessitate that Americans buy approved plans that have a number of universal benefits or face penalties. Even with a five year grace period given to big employers to convert to the new plans, there will be no options if the bills are passed. Choosing what benefits are included in one’s health-care plan often times saves money that could put food on the table for a struggling family.Several states have already imposed a list of required benefits for health-care plans; everyone from â€Å"chiropractors to alcohol-abuse counselors† competes to be included on lists of required benefits (Tully). This competition is one reason health-care costs continue to rise. A few of the mandated benefits of the bills in clude coverage for prescription drugs, substance-abuse services, mental-health services, as well as insuring â€Å"children† until they reach 26 years of age. Before the bills are finalized, the Department of Health and Human Services will hire â€Å"experts† to complete he list (Tully). Thus, nobody will know exactly what this standardized list of benefits will include until the bills are passed. For some Americans, choosing their doctors is very important. Whatever the reason, some people feel more comfortable around certain doctors than others. Why would Obama take away such a simple freedom? With passing of the bills, Americans will be assigned primary care physicians who then will assign patients to specialists, if needed. It is up to the â€Å"gate-keeper† which specialist the patients sees and when.Of course, the choice is to be made on which route is the most â€Å"cost-effective† (Tully). The situation only gets worse when primary care physicians deny patients care, and still get paid. Another freedom Obama’s Health-Care bills will strip from Americans is the choice of high-deductable coverage. Currently about 5 million Americans take advantage of Health Savings Accounts (HSA) offered by their employers (Tully). These work when an employee puts money into the account, requiring the employer to make an equivalent deposit.Employees use Health Savings Accounts to pay for high-deductable coverage plans which, in turn, they use to cover several-thousand dollar medical bills. With high-deductable plans, patients are to cover regular doctor visits themselves; HSAs help cover these bills as well. The proposed bills cause great concern to HSA participants for the simple fact that they will no longer be able to choose a plan with â€Å"stripped† benefits. To rub salt on an open wound, John Goodman of the National Center for Policy Analysis says, â€Å"The government could set extremely low deductibles that would elimin ate HSAs..And they could do it after the bills are passed. † Mandating minimum benefit packages will only drive up medical costs for those who now rely on HSAs to cover medical expenses, ending â€Å"consumer-driven† care (Tully). By eliminating money coming in from independent consumers instead of big insurance companies, the proposed bills will snuff out any type of market health-care now has. Another major concern for Americans about Obamacare is a topic President Obama would rather not mention: cost.According to the Congressional Budget Office, the price tag of the bill coming from the Senate Health Committee would be approximately $1 trillion spanning ten years, and that would only cover a small portion of uninsured Americans. Even worse, the Congressional Budget Office estimates another bill from the Senate Finance Committee at over $1. 6 trillion (Reich). These numbers come at the worst possible time when the United States deficit has reached an all-time high at over $14 trillion as of January (Sahadi).This begs the question, how does Obama expect to pay for these tremendous bills? The answer: Obama plans to raise taxes. Though Medicare cuts and increased taxes will pay for much of the immediate â€Å"overhaul,† according to the proposed bills, the first sign federal tax credits will not be seen until 2013. Only eligible small businesses, up to 25 employees, can receive very limited tax credits up to 35% towards employee health coverage, which Obama hopes will persuade small businesses to offer employee health-care plans (Fox News).But in reality, the cuts affects only one-third of small businesses, leaving the nearly rest of America to get insurance through their big business employer or buy it themselves (Danner). The United States is less than $300 billion away from our debt ceiling, what would another $1 trillion in debt do to our country? Experts predict â€Å"crippling† results. Even in the best case scenario, the value of U. S. bonds and currency would be destroyed. If the U. S. did default, markets around the world would see the effects (Sahadi). If the U. S. overnment is about to lose the ability to pay its own bills, why is the president trying to reform health-care knowing it will add to the already outstanding debt? Small business are another key concern for Americans as President Obama is pushing harder than ever for his proposed health bills. In his campaign Obama ensured Americans that his bills will include benefits for small business, however that is not the case. Looking closely, the proposed tax credits for small businesses will put each small business through a series of tests to decide whether it is eligible for the credit and how much they could receive.With less than one-third of small businesses fully eligible under the restrictions, President Obama’s Health-Care plan will leave Americans with few options when it comes to health-care. Even more, the president neglects to me ntion is that his tax credits for small business are only temporary, six years at the most (Danner). After the credits run out, small businesses will be forced to pay full price for employee health costs, driving up the cost of business dramatically.Businesses that cannot afford the full price tag of employee coverage and newly imposed taxes will have no choice but go out of business. Small businesses created 64% of all new jobs in the last 15 years; the idea of unemployment taking another dramatic rise caused by the closing of numerous small businesses is something the current economy of the United States cannot handle (SBA. gov). There is no doubt Americans like President Obama but when a record number of Americans lose their jobs because of his bills, what will Americans think of him then?There is no doubt President Obama is an excellent speaker but his way with words hides truths that Americans need to know. Now that these truths have leaked out to the public, Americans are conc erned about many different aspects of the president’s proposed bills. Understand, the idea of every American citizen having health insurance sounds great to everybody, but at what cost? Major concerns of American citizens are that health-care options will no longer be available, the real cost of Obamacare, and small businesses.President Obama’s promise that Americans could keep their current plans has been proven bogus, he has neglected to mention the tremendous costs of his proposed health-care bills, and these bills could irreversibly damage the American economy; is Obama the change that America was searching for? As his 2,000 page documents conceal the truths behind his proposed ideas, President Obama’s health-care plan has proven itself to be yet another bane that could very possibly be placed on top the United States’ already weighted shoulders.

Tuesday, July 30, 2019

Obesity in Children Essay

Conclusion Because the rate of childhood obesity is increasing at a disturbing rate, experts fear that this will cause a remarkable load of illness in the future of our children even now a growing number of diabetic young adults is becoming a norm. Preventing, identifying and treating of children and adolescents who are obese are becoming a core medical intervention priority for the government and all concerned institutions. Since there is not clear answer as to how and why children become obese and currently a variety of reasons blamed for this obesity including genetics, culture, habits, individual practice, parental practice, sedentary lifestyle, poor eating habits and such. Research at the molecular level has been progressing, but there is no actual understanding as to the whole image from a biological viewpoint. One might realize that there is no singular factor that can be blamed for a child becoming overweight or obese, it is a combination of factors that plays a role in promote obesity. The increasing obesity rates not only in adults but also in children these trends, in conjunction with obesity’s medical, psychological, and economic effects, emphasize the need for interventions and policy advice aimed at preventing obesity. Directives to remove soft drinks from public schools have started in some cities but despite the variety and number of researches done on the topic of obesity one may note that it remains to be a critical health problem. It seems that there are no enough intervention programs that have taken place in order to curve the problem. It is noted that not enough is being done in order to stop the rising trend of obese children but time has come that it must be addressed as a rising and critical problem that needs immediate attention if we are to cultivate healthy children. It will be noted that as children are obese and they are reaching their adolescence, the decrease in physical activity and the predilection to junk foods, fast foods and such also decreases the mental capacity of the child in a sense that they are more apt to laziness because of decreased energy rather go to school and participate in class, most of them are sleepy and usually uncomfortable in their own skins. It is of note that this problems if persistent will make for a bleak future for our children, since the society is cultivating lazy, fat children who will turn out to be lazy fat adults. One can imagine how it would be like in the future. Promotion of a healthy lifestyle not only for our children but for ourselves as well should be a major thrust of the government if curving the current situation is to be achieved. The thought at a young age children will be subjected to diseases and concern that is normally associated with the elderly and geriatric patients should be carefully considered and rejected. In developing an afterschool wellness program the author notes that it is not as simple as devising exercise plans for the children. It is a holistic approach that requires a multifaceted planning that includes education, healthy diet plans and the actual activity period. And it is also noted by the writer that in order to curve obesity in children, drastic measures must be employed not only by the obese children themselves but the whole family and the whole community. Developing healthy eating habits and leisure activity changes require changes that involve the family in order for the child not feel left out or forlorn. It is also of note that simple family physical activities will help curve obesity. One may realize that everything starts out at home and spilled over to the school then to the community. If we wish to curve obesity in children and protect our children’s health it is imperative that the community in particular and the nation in general work hand in hand so that attention maybe given and directives to promote healthy eating in schools and within the community be fostered and community get togethers that involves physical activities, community dances in the park, weekend exercise program for the community can be facilitated by the general community so that everyone may take part in keeping the family and our children healthier and live fuller lives. References: Abbott Laboratories (2003) MERIDIA (sibutramine hydrochloride manohydrate). Product information. In Physician’s Desk Reference. Montvale, NJ, Thompson PDR, 2003, p. 475–480 Blocker D & Freudenberg N (2001) Developing Comprehensive Approachesto Prevention and Control of Obesity Among Low-Income, Urban, African-American Women, Journal of the American Medical Women’s AssociationVol. 56, No. 2 pp. 59-64 Bray GA: Use and abuse of appetite-suppressant drugs in the treatment of obesity. Ann Intern Med 119:707–713, 1993 Centers for Disease Control, (1997) Guidelines for School and Community Programs to Promote Lifelong Physical Activity Among Young People. Morbidity and Mortality Weekly Report 1997; 46 (RR-6); 1-36 Center for Disease Control (2007) Body mass index. Retrieved 22 April 2008 from http://www. cdc. gov/nccdphp/dnpa/bmi/index. htm Davidson MH, Hauptman J, DiGiorlamo M, Foreyt JP, Halstead CH, Heber D, Heimburger DC, Lucas CP, Robbins DC, Chung J, Heymsfeld SB: Weight control and risk factor reduction in obese subjects treated for 2 years with orlistat: a randomized controlled trial. JAMA 281:235–242, 1999 Dietz, W.H. , & Gortmaker, S. L. (1985). Do we fatten our children at the television set? Obesity and television viewing in children and adolescents. Pediatrics, 75(5), 807-812. Dietz, W. H. (1983). Childhood obesity: Susceptibility, cause, and management. Journal of Pediatrics, 103(5), 676-686. Dr. Paul. Retrieved 27 April 2008 from http://www. drpaul. com/illnesses/overweight. html ExRx. net. Retrieved 26 April 2008 from http://www. exrx. net/FatLoss/ChildObesityIntervention. html Epstein, L. H. , Wing, R. R. , Koeske, R. , & Valoski, A. (1987). Long-term effects of family-based treatment of childhood obesity. Journal of Consulting and Clinical Psychology, 55(1), 91-95. EJ 352 076. Freudenberg N, Eng E, Flay B, Parcel G,Rogers T, Wallerstein N. Strengthening individual and community capacity to prevent disease and promote health: In search of relevant theories and principles. Health Educ Q. 1995;22:290-306. Gortmaker, S. L. , Dietz, W. H. , Sobol, A. M. , & Wehler, C. A. (1987). Increasing pediatric obesity in the United States. American Journal of Diseases of Children, 141, 535-540. Graves, T. , Meyers, A. W. , & Clark, L. (1988). An evaluation of parental problem-solving training in the behavioral treatment of childhood obesity. Journal of Consulting and Clinical Psychology, 56(2), 246-250. James WP, Astrup A, Finer N, Hilsted J, Kopelman P, Rossner S, Saris WH, Van Gaal LF(2000) Effect of sibutramine on weight maintenance after weight loss: a randomized trial. Lancet 356:2119–2125, 2000 Litchfield R, Nelson D, Koch J, (2004), Guide to healthy kids: What parents can do, Iowa State University – University Extension. Iowa. Kien C, Chiodo A (2003) Physical activity in middle school-aged children participating in a school-based recreation program. Archives of pediatrics and adolescent medicine 157(8):811-5 Lohman, T. G. (1987). The use of skinfolds to estimate body fatness on children and youth. Journal of Physical Education, Recreation & Dance, 58(9), 98-102. McLeroy KR, Bibeau D, Steckler A, Glanz K. (1988) An ecological perspective on health promotion programs. Health Education Q. 1988;15:351-377. National Heart Lung and Blood Institute (1998) Clinical guidelines on the identification, evaluation, and treatment of overweight and obesity in adults: the evidence report. Obesity Research 6:51S–210S National Institute of Health, NIH Publication No. 97-4096 retrieved 26 April 2008 from http://adam. about. com/care/weightloss/weight_child. html. Roberts S, Savage J. , Coward W. , Chew B. , & Lucas, A. (1988). Energy expenditure and intake in infants born to lean and overweight mothers. The New England Journal of Medicine, 318, 461-466. Ross, J & Pate R. (1987). The National Children and Youth Fitness Study II: A summary of findings. Journal of Physical Education, Recreation and Dance, 58(9), 51-56. EJ 364 411 Serdula, MK, Ivery, D, Coates, RJ, (1993) Do obese children become obese adults? A review of the literature. Preventive Medicine 1993; 22: 167-177. St. Vincents Health (2004), Bariatric weight loss center of excellence, Retrieved 27 April 2008 from http://www.stvincent. org/ourservices/bariatrics/about/causes/default. htm Sjostrom L, Rissanen A, Andersen T, Boldrin M, Golay A, Koppeschaar HPF, Krempf M: Randomized placebo-controlled trial of orlistat for weight loss and prevention of weight regain in obese patients. Lancet 352:167–172, 1998 The National Association for Sport and Physical Education (NASPE). NASPE releases first ever physical activity guidelines for pre-adolescent children. 1-2. 5-13-1998. NASPE. Wadden TA, Berkowitz RI, Sarwer DB, Prus-Wisniewski R, Steinberg C (2001) Benefits of lifestyle modification in the pharmacologic treatment of obesity: a randomized trial.Archives of Internal Medicine 161:218–227, 2001 Whitaker, RC, Wright, JA, Pepe, MS, Seidel, KD, Dietz, WH. (1997) Predicting obesity in young adulthood from childhood and parental obesity. New England Journal of Medicine 1997; 337: 869-73. Wolf, M. C. , Cohen, K. R. , & Rosenfeld, J. G. (1985). School-based interventions for obesity: Current approaches and future prospects. Psychology in the Schools, 22, 187-200. Understanding Childhood Obesity (1999) Jackson: University Press of Mississippi, Yanovski SZ, Yanovski JA: Obesity. N Engl J Med 346:591–602, 2002.

Monday, July 29, 2019

Historical and Contemporary Perspectives of Aging in the Work Place Research Paper

Historical and Contemporary Perspectives of Aging in the Work Place - Research Paper Example Such classifications also tend to associate individuals of the same groups with particular characteristics ranging from physical to social characteristics. This inherently leads to different perspectives held by the society concerning aging; and is particularly inherent in the workforce. Individuals of different ages are perceived differently in the workforce and the perceptions significantly vary across history, with the historical perspective of aging differing from the contemporary perspectives (Armstrong-Stassen & Schlosser, 2011). The United Nations indicated that the world’s elderly population exhibits the fastest growth rate ever. The projections indicated that by the year 2050, more than two billion people will be aged 60 and over (Brooke, Taylor, Mcloughlin & Biase, 2012). The aging populations particularly in the workforce have been described by terms such as ‘old age tsunami’ and ‘demographic time bomb’. The apocalyptic language indicates that historically, the elderly population has been small compared to the contemporary society. Those who are 60 and above are hugely talented, have the relevant experience as well as the necessary skills and knowledge. The most likely challenge that will arise in the future will, therefore, be how to maintain and capitalize on the potentiality of this age group without disposing them away in retirement. This has seen efforts by countries such as Germany and France to increase the retirement age to 62 from 60 by 2018 (Brooke, Taylor, Mcl oughlin & Biase, 2012). Historically, the elderly in the workforce have been largely subjected to voluntary or forceful retirement and entrenchment. This was in effort to accommodate the growing youth populations with better talents, skills and knowledge and who have undergone better training and educational courses. In the contemporary society, the then youthful population is now increasingly making up the elderly population. With their essential capacities, the

Sunday, July 28, 2019

Oraganzation behavior Essay Example | Topics and Well Written Essays - 750 words

Oraganzation behavior - Essay Example Moreover, with respect to the question of what role common sense and intutino plays with regards to the management of individual team members, it must be understood that whereas studies in management and organizational behavior can go a long way in helping to delineate the correct path that should be taken, there is no substitute for common sense and intuition (Rostein 17). However, with that being said, it must be stated that both common sense and intuition are subjective human interpretations of the world; so they are not useful in each and every situation and should not be trusted to apply to each individual in the same way that it does to the individual manager/leader who employs it. 2. One of the first perceptional biases that can be noted is with regards to how the United States press is so keen to take statements out of context and perceive them to be something that they are not. This was recently noted with regards to President of Russia’s opinion editorial in the New York Times concerning Syria. However, instead of taking this op-ed for what it was, the American press instead sought to sum up the entire opinion editorial by emblazoning headlines with phrases such as â€Å"Putin laughs at American Exceptionalism†; a statement that was ludicrous compared to what was actually said by the Russian President (DeWayne 1). Another recent news bias is with regards to the expectation that the gunman in the Washington DC shootings must have been a Muslim; prior to any information coming out as to who he was and why he might have done such a thing. Finally, sticking with the motif of the news, it can also be noted that a strong perceptional bias exists with regards to the conflict in Syria. 3. Firms such as Yahoo have recently found it difficult to juxtapose the creative energies and talents of a multigenerational workforce. As many firms have noted, seeking to maximize the potential of a diverse group of people does not allow for any one approach to be used by itself. In this way, some of the tech giants, Yahoo, Microsoft, Google, and others, have opted for created a more relaxed atmosphere where millenials and other inter-generational employees can work at their own pace without the more rigid and structured approach that had been deemed so useful to the past generation of employees (Jain et al. 47). Rather than seeing this as good or bad, it is necessary for the individual to merely understand such a reaction as one that seeks to take into account the needs of different individuals and seeks to maximize utility and productivity accordingly. 4. Without question values affect the way in which individuals integrate with different situations. However, rather than making the mistake of viewing values as synonymous with attitude, it must be understood that an individual’s attitude is likely to change and morph at various times throughout their professional career; however, values are more innate and are unlikely to experien ce a major shift as an individual progresses within their career. Nevertheless, attitude is one of the most important factors of performance and happiness/job satisfaction. One distinct situation stands out in my own mind with regards to a given task

Saturday, July 27, 2019

Web Development Essay Example | Topics and Well Written Essays - 2000 words

Web Development - Essay Example As the house is nearly due the opening, he requested a live-functioning web site in high standard, with user friendly and easy navigation characteristics. In this report, the experience of developing the RS Holiday House website is reflected and based on the skill areas learned in the workshop sessions. The project goal was, also to explore alternate techniques, implement functions using HTML5, CSS3, and JavaScript and allow us to submit online by making the website more user-friendly. The priority area was to develop a website to display information about the business that the RS Holiday House offers and the ability to book a reservation. The creation process is represented in the plan outlined below. The process of web development varies from developing the easiest static pages with plain text to the highly complex web based electronic businesses, social network website or Internet applications (Alexander, 2009), (Shelly, Cashman, & Vermaat, 2005), and (Shelly, Cashman, & Vermaat, 2005). The planning process begins with the consultation between the client and the developer. In this phase of the website development, I have gathered customer requirements. At this stage, a discussion was carried out with the customer regarding his requirements. I also analyzed the main areas that will be addressed or covered in the website. This process was a good practice which, I have learned in the project conducted earlier on in week three. During this period, I had the opportunity to try out both sides of a client and a developer role. Knowing now how to ask right questions to find out clients requirements helped me to know how to prepare myself for this project. The outcome of the client-deve loper consultation was that the website should work on the highest standard. It should also be simple but, modern. One of the client’s requirements was that the customer would be able to book a reservation right away from the website. As the business

MGT 7 Assignment Example | Topics and Well Written Essays - 250 words

MGT 7 - Assignment Example In this case the firm strives to drive down cost for every single production components ranging from labour costs to sourcing of raw materials. To accomplish cost leadership the firm usually requires production on large scale so as to capitalize on â€Å"economies of scale†. Production in large scale means that the company will naturally appeal to a wider aspect of the given market. Cost leadership is therefore a wide scope strategy. A business practicing cost leadership gains competitive advantage through reduction of production costs, thus increasing profit margins on every sale since the company trusts that its trademark can control a premium price. Secondly a firm can reduce production costs and pass on the cost savings to consumers hoping to boost sales as well as market share. Examples of companies practicing cost leadership include Wal-Mart Stores which implements everyday low prices so as to attract consumers. This idea of reduced prices is aimed at providing products at cheaper rate than competition on a frequent basis as opposed to relying to sales. Thus Walmart achieves this due to its efficient supply chain in addition to its large scale. The second example of a firm using cost leadership is IKEA which is a Swedish leader in furniture making. This company provides cheap but classy furniture. IKEA manages to offer low prices by sourcing its materials in countries with low-wage as well as providing extremely simple service level. The third company utilising cost leadership is Southwest Airlines. The airline managed to provide the lowest achievable prices by becoming more effective than conventional airlines. Southwest Airlines thus minimizes the time their planes use while on tarmac so as to have them flying, thus keeping profits up. In addition, they provide very little in terms of extra thrills to their customers, but instead trickle down the

Friday, July 26, 2019

Watch a relational development film and write about it Assignment

Watch a relational development film and write about it - Assignment Example p between the two provides a study piece for the Mark Knapp’s relational development model that bases on a number of perspectives reliant on a ten-step process that is majorly consisting two phases. The details of the study below explain the relationships in the film based on the Mark Knapp’s model. For the effective development of communication, all the steps involved in the theory need doing. The steps will have each done at a time to provide for a strong and effective relationship. Despite the nature of the relationship, Mark Knapp believes that at one time it dissolves as detailed in the last phase that deals with coming apart. The film provides a true picture of these as will be reveled further in the essay. The first phase of the model is the coming together part that details the five major steps that involve the initiation, the experimentation, intensifying aspects, integration and bonding of the people. The initiation stage provides for the first impression made that involves meeting for the first time and creating an impression on each other. In the film, Jack first sights Rose from a distant and the friends discourage him considering the social class differences between the two. Despite these, an opportune time presents itself as Rose attempts to jump off the ship from which Jack pulls her over making the first impression on each other. The stage of their first meeting details initiation stage as per Mark Knapp. This stage forms the basis of every relationship. The second stage provides for experimentation through which the two parties start learning each other and get more comfortable. This stage leads to the third stage on intensifying in which experimentation continues. The stage provides for the clarity of any mutual coordination in the development of the relationship and will have a consideration of an emotional affection developing with attachment between the parties. The mutual connection between Rose and Jack works to provide for their

Thursday, July 25, 2019

Employee Empowerment Essay Example | Topics and Well Written Essays - 750 words - 1

Employee Empowerment - Essay Example (Kotelnikov, 2008) In relation to the importance of employee empowerment within a flat organization, several strategic ways that will effectively prepare employees to become empowered and self-efficient as an individual employee and in group decision-making process will be thoroughly discussed. Employee empowerment is about enabling employees to make important decision-making without having the need to go through several management layers for approval. For employees to be able to make quick and effective decisions, employered employees are expected to have the following characteritstics: (1) innovativeness; (2) creativeness; and (3) resourcefulness (Chaturvedi, 2008). knowledge and skills development which can be acquired by making each employee undergo proper training programs, it is important for managers and organizational leaders to be able to develop and implement an effective organizational learning culture. Organizational learning is actually referring to the ability of employees to acknowledge the importance of learning and eventually develop a continuously learning habit to enable them to transform into a more competitive individual. (Columbia University, 2008) As a result of having an effective organizational learning culture, competitive and empowered employees are expected to be able to continuously learn new skills and be able to easily adopt with the changing market environments. The transformation of organization practice from a traditional high bureaucratic organizational structure into a flat organizational structure can result to a lot of organizational conflict because of the possibility that some of the existing employees may have resistance to major organizational change. For this reason, managers should have a good leadership and communication skills to enable the leaders to easily control and convert internal organizational pressures into positive employee behavior and acceptance to

Wednesday, July 24, 2019

Performance Evaluation Paper Essay Example | Topics and Well Written Essays - 750 words

Performance Evaluation Paper - Essay Example Secondly, in his evaluation the manager used terms that were not effective in the evaluation process. Instead of using the terms such as medium or low-medium, the manager could have used evaluation ratings such as outstanding, meets expectations, exceeds expectations, below expectations or unsatisfactorily (Robbins and Judge, 2007). In this way, it was possible for the manager to rate the engineer’s attitude. Thirdly, the current evaluation form used by the manager does not suggest methods of improving the negative aspects of the employees. Part A 1. Definition of the most commonly-used sets of evaluation criteria in organisations Productivity This is the volume of products or services that an employee produces during his or her duties. Employers mostly reward highly productive employees to motivate them and enhance higher productivity. Quality It means the originality of the work done by the employees. It portrays the innovativeness of an employee. Consistency This means prod uction of similar quality and quantity of work. Employers measure constituency by comparing the previous and the current evaluations. Attendance This is the rate at which the employees report to work. It involves checking the attendance records and valid reasons for absenteeism. Adherence to policy It means the extent to which the employees abide to the procedures that are set by the company. Part B. The relative value of the commonly-used evaluation criteria defined in Part A 1 As mentioned in the previous section, employers are keen to reward the employees who portray significant productivity thus motivating them to work hard. Even though the amount of products by the employees is a major evaluation criterion, it should not compromise the quality of the products. This is the major reason as to why managers evaluate the quality of the work done by employees. In the same way, consistency ensures that employees who depicts waxes and wanes during their duties are noted and adequate tr aining done to ensure they maintain unswerving performance (Robbins and Judge, 2007). Attendance ensures that employees are there when they are needed by their employers. Employees who are consistently at work are highly desired by the employers and their co-workers. Adhering to policies set by a company ensures employees’ safety and an improved working environment. Part C. Advantages of including supervisors, peers, and subordinates in the evaluation process It ensures that the ratings are anonymous. In this way, individuals provide open and honest evaluation that cannot be singled out from the multiple sources. In addition, inclusion of the various stakeholders ensures that ratings portray multiple perspectives that are ignored by the top-down technique of evaluation adopted by the traditional appraisals. In the same way, including supervisors, peers, and subordinates during evaluation saves time and it provides helpful performance feedback (Thomas, 1987). This is due to th e fact that there are no comparisons between workers, no goals and there are no figures involved in the process. Part D. Disadvantages of including supervisors, peers, and subordinates in the evaluation process One of the major disadvantages of including supervisors, peers, and subordinates in the evaluation process is that the possibility of giving dishonest feedback is high. For example, subordinates may give dishonest feedback

Tuesday, July 23, 2019

Critically assess the elements of a successful e-commerce regulatory Essay

Critically assess the elements of a successful e-commerce regulatory model - Essay Example In the last 5 years, the government has contended that the introduction of several layers of regulation based on EU legislation into UK law has increased customer confidence in e-businesses3 and increased these businesses standards of good practice. The implementation of the Distance Selling directive into UK law was to inspire confidence and increase transactions in cross-border shopping, including the internet. The regulation cannot be contracted out and any inconsistencies between the terms of the contract and the regulations would make the contract void. It does not cover contracts relating to auctions, financial services or property and partial exemptions for accommodation, transport, catering or leisure services and goods intended for everyday consumption supplied by regular roundsmen. This information must comply with the principles of good faith in commercial transactions and the principles governing the protection of minors. However, Consumers Internationals5 research revealed that 1 in 5 sites failed to give clear total cost of the transaction despite the fact that the price of goods and services including all taxes must be provided. They have also found very few sites actually providing written information on the right to a contract withdrawal. Subject to the following exceptions , once the supplier has met his obligations relating to the provision of information, the consumer has at least 7 working days to cancel the contract without penalty (the cooling-off period6) : If the supplier fails to meet his obligations to provide information, this period is extended by 3 months. He also has 30 days to repay the amounts paid by the consumer and, in certain cases, may deduct from the refund the costs of recovering the goods. If the consumers payment card was fraudulently used, he may request cancellation of payment and reimbursement of the amounts paid. The burden of proof lies on the card issuer

Monday, July 22, 2019

Lodging in Canada Essay Example for Free

Lodging in Canada Essay Real estate is classified as one of the greatest personal financial assets one can own in Canada. Some statistics have estimated that, more than 70 percent of Canadians posses their own personal homes (Alexander, 2006). The value of all residential homes in the country is estimated to amount to more than 2 trillion dollars. Given the current demand for personal homes, the future financial plans of most Canadians includes the value of owning homes. The increased desire for most people to own personal homes and yards has been attributed to the various demographic and market factors. Some of these factors include; an aging population and a low inflation economy which has been sustained over time. Demographic factors have been cited as the greatest contributors to the current demand for personal housing in Canada. Statistics show that, Canada experiences a medium growth in its population and medium rates of immigration as well. The high number of people who are retiring from their jobs and retracting back to their homes has increased the demand for personal homes in the country. In addition, the demand for residential homes has also risen as a result of the net growth rate of household formation. However, this rate is expected to decline from the current 1. 4 percent to around 0. 8 percent by the year 2030 as a result of an aging population in Canada (Alexander, 2006). As much as these factors have led to an increased growth in the number of personal homes and residential estates, the same factors are likely to result into higher home prices in the near future. For this reason, the average price of personal homes is expected to increase by about 4 percent per annum over the next 20 years or so. The future trend for personal housing is also expected to change in the next few years due to the increased reliance of Canadas population growth rate on immigration. Initially, Canadian immigrants preferred rental accommodation but this trend has recently changed, as most immigrants now seek to own their own personal homes. In this case, the rate of household formation is bound to increase. However, some demographical statistics suggest that, the rate of new homes construction is bound to go down in future as a result of an aging population. In this case, it is predicted that the rate of personal housing is likely to reduce from 175,000 housing units per year as it stands today to around 125,000 housing units per year in the year 2030 (Alexander, 2006). Historically, those Canadian cities with a problem of land scarcity have been found to posses the highest demand for personal housing. These cities which include Vancouver, Toronto and Montreal have hence been found to have the highest price gains in house prices over the past two decades or so. By the year 2030, the housing demand in these cities is expected to increase above the current national average, especially in Toronto and Vancouver, due to the increased rate of immigrant growth. Other cities in Canada which are expected to experience a rise in housing demand in the near future include Edmonton and Calgary, as a result of more stable conditions in the labour market. On the other hand, a few cities are likely to experience lower housing demands than in the past, due to less supportive demographics presented by the low population growth. It can thus be concluded that, though the current demand for personal homes in Canada is quite high, the future number of new housing levels is likely to be moderate the demand for more personal houses is bound to increase, due to the aging Canadian population. The entry of new house levels is largely dependent on the rate of immigration and in this case, any slight increase in the number of immigrants will shift the demand for housing to a high end. Reference. Alexander, C. (2006). Long-term outlook for Canadian homes. Canada Special Reports. Retrieved on 21 November, 2008, from http://www. td. com/economics/special/ca0906_home_prices. jsp.

Marketing Segmentation Essay Example for Free

Marketing Segmentation Essay 1. Geographical segmentation: The market is divided according to geographic criteria like nation, state, religion, countries etc. Geographic data create accurate profile of specific. For eg: in rainy season sells rainy clothes (like raincoat, umbrella etc) 2. Demographic segmentation: it divide to the market into groups according to variable in age, family, gender, size of family, income of the consumers etc 3. Psychographic segmentation: It is a science which use in better understands all consumers according to their life style, personality, value and social-class. I am doing job in Bajaj Company, after this company has monopolised in almost all field either in the field of manufacturing bikes or bulb, tube light etc. Earlier, the customers were not fond of verities because there were not too many verities in the market and less competitions, but, in present time a huge competition has been taken place that for survive in the market every companies should be update with their products, otherwise rival companies will lead them. If we talk about the bike fashion we see that our youngsters like those bikes which must not be strong in pickup (60 km/h with few minutes) as well as good looking means it looks different from others, besides this, old agers want those bikes which run comfortably that they ride normally, to keep this in their mind all companies like hero Honda release many bikes like Hero stunner, CBZ, Karizma for young generations. While, for old agers they released Slender, Passion, CD dawn etc, in same pattern Yamaha release Yamaha R15 which cost is almost Rs. 15,000 in present time, but give a good look which attract the customers. So, after much research on these companies, Bajaj Company wants to release such bike series which is not only for young as well as senior can use it, so this company manufactured lots of bikes Pulsar and discover series for youngsters which not only good looking but also having that price which every customers can afford and easily buy the products and it also give good mileage than others companies bike, and from the point of view senior, whose ages is 40 years and above, they release Platina with self start facilities which is easy in riding. By all these information I want to describe that Bajaj Company segmented it products in various categories according to customers’ demand that’s why this company is going extremely good and successful in satisfied to consumers. If we talking about bulb, tube lights, this company manufactured the bulbs, CFLs, tube lights which not give perfect light but also take few electricity and go long times. Especially CFLs which cost are high but it work beyond one years and it takes less electricity and give light so much as a 40 watt tube light gives. There are many designs of CFLs has been released in the market which selling is more than bulbs and tube lights. So according to customer’s choice and willing Bajaj Company put down stylish CFLs in the market which attract consumers with its designs but also reduce the electric bill of customers and supplies good light over all houses. So like this the company segmented it electric accessories in various styles, according to customers willing and choice. Marketing Plan Marketing plan is a marketing strategy which involves marketing plans for a firm’s marketing activities. Marketing planning process is process of business planning; in marketing plan all the firm’s keep an eye on all marketing activities as well as competitors and they also come to know the view of the customers about their products like they are satisfied with their products or not, if not, know the reason of disliking and what they want improve in the products etc, because satisfaction of consumers is very important, after all whole marketing processes and successes are depend only upon customers. They are the important part of business. For e. g. if we talking about auto mobile all companies like Hero Honda, Yamaha, Bajaj etc, manufactured ordinary bikes( like Hero Honda released CD 100 later Splendour , Yamaha CX 100 and Bajaj released scooters and later Bajaj Boxer) but, there were some problems and deficiency took place in the bikes like the capacity of the engine was not good that was giving low mileage, pick up was ordinary and ordinary looks etc, after looking and analysing all problems of customers all companies manufactured those bikes which are giving good mileage, capacity of engine is very good and all are stylish as customers wanted. For e. g. :- Bajaj released discover series, pulsar series, Hero Honda released Passion, Passion plus, CBZ, Karizma etc, Yamaha released Yamaha R15 (but it is too costly), TVS manufactured Apache etc. Beside these, all companies also release scooty for college going girls. Because they knew that all ladies can’t ride the bikes that’s why to keep in mind the facilities of girls they produced scooty which is very light with self start facilities, without gears. These products became very popular among the girls, not girls even boy also taking ride of the scooty many times. Like this all companies conduct a SWOT (strengths, weakness, opportunities, threats) means they research on the behaviour, likes, dislikes, what are the deficiencies in the product, what else and what new their customers want in their products and what other companies provided to customers and do better than them.

Sunday, July 21, 2019

Advantages And Disadvantages Of Interlock Parity Information Technology Essay

Advantages And Disadvantages Of Interlock Parity Information Technology Essay Detecting and correcting errors is the major problem for handling on chip errors. For this purpose error detection and correction techniques are used which are suitable for NoC. Error control codes are used to detect single or multi bit errors. Errors correcting schemes put an overhead of extra hardware on the system. Most of the coding techniques are used to correct single bit error. Due to the increase in size and complexity of very large scale integrated (VLSI) chips the problem of multi bit errors have been increased, so to over come the problem of multi bit errors, researchers have explored various multi bit error detection and correction techniques. Multi bit errors can completely corrupt the packets which need to be discarded and retransmitted. As on chip errors are more dangerous than off chip networks more over on chip resources like storage and processing are limited, therefore techniques that take care such limitations are more appropriate for NoC. Here we are going to introduce a new error detection technique. This technique has the limitation of only detection of errors. We compare this technique with few other error detection and correction techniques and deduce the results about our purposed error detection techniques. We purpose the name of new error detection technique as Interlock Parity. In the next section the complete introduction and proposed format of the Interlock Parity is given. Next we look some advantages and disadvantages of Interlock Parity technique. 5.2 Interlock Parity This is a new purposed technique to detect the bit errors on the network on chip communication. This technique is designed to work with 32 bits of data word. After 8 bits of data next bit is fixed for parity bit. Similarly after that 8 bits the next bit is again fix for parity bit and in this way 32 bits of data include 4 parity bits. We name these parity bits as P1, P2, P3 and P4. The option for choice of even parity or odd parity is open i.e any method is used to fix the parity bit, but all 4 parity bits must follow the same parity scheme either even or odd parity checking. Similarly we name the first 8 data bits as d1, second data bits as d2, third data bits as d3 and last portion of data bits as d4. So after the induction of parity bits our date packet size will increase from 32 bits to 36 bits. Keep in mind there are few additional bits are reserved for the purpose of control information discuss in detail later in this chapter. Following figure 5.1 shows the packet layout of the Interlock Parity scheme. Header d1, Data bits (8 bits) P1 d2, Data bits (8 bits) P2 d3, Data bits (8 bits) P3 d4, Data bits (8 bits) P4 Figure 5.1 Interlock Parity packet format If number of 1s in d1 is even then P1 = 0 other wise 1. Next if number of 1s in d2 is even then the value of P2 is set to zero and bit value of P3 and P4 will be set according to the number of 1s in d3 and d4. More generally we can write as even then Pi = 0. where 1 à ¢Ã¢â‚¬ °Ã‚ ¤ i à ¢Ã¢â‚¬ °Ã‚ ¤ 4 If No. of 1s in di = odd then Pi = 1. where 1 à ¢Ã¢â‚¬ °Ã‚ ¤ i à ¢Ã¢â‚¬ °Ã‚ ¤ 4 Data block is transferred form source to the destination according to the control information header. At the destination first of all value of Pt is checked and if the Pt value is correct then the packet is accepted for further processing, in case of detection of some error in Pt bit value, process of evaluation of Pi values started. Each Pi value is checked according to the data present in di block. If there found any mismatch among di and corresponding Pi then di is discarded and retransmission request of that particular di is generated to resend the data. This reduces the probability of frequent bit flips in the data blocks. 5.3 Advantages and Disadvantages of Interlock Parity 5.3.1 Advantages of Interlock Parity Scheme Easy to calculate parities due to limited computation resources in NoC. In case of bit flip error detection only a limited portion of data needed to be retransmitted with in the packet. Easy to locate erroneous portion of data. Due to the probability of occurrence of multiple bit flip errors this technique of Interlock Parity restricts the multiple error occurrences in a byte size data. 5.3.2 Disadvantages of Interlock Parity Scheme Have to calculate 4 parity bits. Limited to detect errors if only single bit or odd number of bits flipped. Unable to detect errors if even number of bit flips occurred. This technique is not suitable for multiple errors. Errors correction is not possible at the receiver side. 5.4 Packet Format In this section we describe and closely look the format of the Interlock Parity scheme. Packet is divided into two portions. First portion is known as header and contains all the necessary information which uses to transfer packet from sender to the receiver. The second portion of the packet is known as data portion. In this section of the packet data is divided into 4 different parts along with the parity of each part. 5.4.1 Header Portion Header portion contains the following information. Source Address Destination Address Packet Number Data Portion Number Control Information Source Address field contains the information about the source and 5 bits are reserved for the source address. Destination address is the address of the destination and 5 bit are reserved for the destination address. Packet number denotes the number of the packet which is 10 bit long address. Data portion number denotes one of the four data portions in the date portion part. It can assume at the maximum 2 bits as we have maximum 4 data portions in our packet. 6 bits are reserved for control information can be used for future purpose or depend upon the routing algorithm requirements. Following figure depicts the structure of the header portion of the Interlock Parity packet format. Header Source Address Destination Address Packet Number Data Portion Number Control Information 5 bits 5 bits 10 bits 2 bits 6 bits Figure 5.2 Interlock Parity packet header format 5.4.2 Data Portion Data portion of the Interlock Parity packet format is divided into 4 parts. Each part is 9 bits long divided into 8 bits for the data and 1 bit for the parity bit corresponding to the data bits associated with the parity. In this way total size of the data portion along with parities is 36 bits. Following figure shows the structure of the data portion of the Interlock Parity packet format Data Portion d1 P1 d2 P2 d3 P3 d4 P4 8 bits 1 bit 8 bits 1 bit 8 bits 1 bit 8 bits 1 bit Figure 5.3 Interlock Parity packet data portion format. 5.5 Communication Strategy As during the communication of data packets, errors may corrupt the data so there is a need for reliable communication. Fundamentally few capabilities are required to handle the bit errors. Few of these fundamental capabilities to handle presence of bit errors are as mention below Error detection: A mechanism is needed to allow the receiver side to detect the occurrence of bit errors. There should be a mechanism which allows the receiver to detect and possibly correct bit errors. Receiver Feedback: since sender and receiver are typically executing at different nodes. The only way for the sender to know whether packet is delivered correctly to the receiver is by providing explicit feedback to the sender. For this purpose positive or negative acknowledgements are used by the receiver to sender. Retransmission: a packet received in error at the receiver will be retransmitted by the sender. Data packet is generated at the sender and sends to the receiver. At the receiver side checking of errors will take place, if packet received without any errors then it is accepted for further processing other wise packet is discarded. In case of any erroneous bits ARQ strategy will be used to correct the errors. As from the previous section our data portion of packet is divided into 4 data parts so only portion with errors in that data bits is requested to transmit again. We only use not acknowledgement (NAK) packet to communicate to sender for the retransmission of the particular erroneous portion of the data. Following figure shows the structure of the NAK packet format NAK Packet Source Address Packet Number Data Portion Number 5 bits 10 bits 2 bits Figure 5.4 NAK packet format. During the communication it does not allow reassembly or fragmentation at intermediate nodes. These operations can be performed at source and destination. As fragmentation and reassembly is a time consuming process, by removing this functionality from the intermediate nodes and placing it in the source and destination will definitely speeds up the communication. We implement interlock parity for end to end communication. Complete discussion and all the experimental results are presented in the next chapter. Chapter 6 Implementation and Experimental Results As discussed in previous chapters that network on chip provides a practicable way out to counter the incompetence of buses in the present very large scale integrated on chip interconnects. As we know in packet based communication a flipping error of bit(s) can corrupt the data packet which raise a question mark on the correctness and trustworthy of data transfer from source to destination. In the presence of stated problems it is essential to provide some vigorous protective solutions against such problems. As a solution to the above problems, network on chips have been proposed by different researchers to get rid of the ineffectiveness of on chip buses in scaling chips. Later it was discovered that network on chip also faces the same problems of transient faults as faced by VLSI chips. So chips designed with error detection and correction codes require high energy and area overheads as discussed in [65]. On network on chip we have limited resources of computation and storage; it is significant to present solutions which are low cost in term of memory and energy without compromising on reliability and performance. Here we are going to introduce a new error detection technique. This technique has the limitation of only detection of errors, while error correction takes place by retransmission of corrupt data packet. We compare our new purposed technique with few other error detection and correction techniques and deduce the results about our purposed error detection techniques. We purpose the name of new error detection technique as Interlock Parity. Complete introduction of Partial Party technique is given in chapter 5. In the next section the complete introduction about network on chip communication model, interest to use C/C++ and setup about implementation of Interlock Parity is given. We work on the different error detection methods given below, Simple Parity Cyclic Redundancy Check Checksum Mathod Repeated Bit Method along with our newly developed concept Interlock Parity method. We implement and present the implementation and comparative analysis results of Interlock Parity with above mentioned techniques. Major concern of this research is to make a comparative analysis between mentioned techniques in the following areas Encoding Techniques impact over the network throughput. Encoding Techniques impact for power consumption. Delay time comparison for packet delivery from sender to receiver i.e. latency comparison. Instead of using simulator we design our own network simulator designed in C/C++ program for the implementation purpose and get results for analysis. The purpose of personally designed simulator is to gain in depth working knowledge of different encoding techniques. 6.1 NoC Communication Model We use network on chip as 2 dimensional mesh topology with packet level communication. We use a data bus of size 128 bits which is wide enough to simultaneously transfer all bits of data present in the packet in any direction. As we discussed in chapter 5 packet consists of a header and data portion. The header contains identification information about source and destination, packet unique identifier, data portion identifier which varies from 1 to 4. Data portion of the data contains actual data along individual parity bits. Along with data packets we also use NAK packet. Sender will inform only in case of packet received with bit errors. NAK packet is also use to intimate the sender in case of packet loss. For the reasons of simplicity and well suitability for mesh based network on chips we adopt different routing strategies for the result analysis. NAK packet is assumed to have higher priority than data packet. Figure 6.1 2D Mesh [6] Data packet is generated at the sender and sends to the receiver. At the receiver side checking of errors will take place, if packet received without any errors then it is accepted for further processing other wise packet is discarded. We only use not acknowledgement (NAK) packet to communicate to sender for the retransmission of the particular erroneous packet/portion of the data. During the communication it does not allow reassembly or fragmentation at intermediate nodes. These operations can be performed at source and destination. As fragmentation and reassembly is a time consuming process, by removing this functionality from the intermediate nodes and placing it in the source and destination will definitely speeds up the communication. 6.2 Let Us C/C++ Instead of using simulator we design our own network simulator designed in C/C++ program for the implementation purpose and get results for analysis. The purpose of personally designed simulator is to gain in depth working knowledge of different encoding techniques. 6.2.1 Using C/C++ The C/C++ language is based on sequential programming, also suitable for the programming and modeling of concurrent activities. As we know most digital systems and hardware models require a notion of delays, clocks or time, such features are also present in C/C++ as a software programming language. So complex and detailed systems can be easily and comfortably designed in C/C++ language. Finally the data types present in C/C++ are helpful for implementation. To address all these problems new dedicated data types and communication mechanisms are available with C/C++. Basic language elements such as modules, processes, event, channels, and event driven simulator kernel are also present in C/C++. 6.2.2 Advantages of using C/C++ As C/C++ is firm programming language accepted all over the world, C/C++ holds all the features of a complete programming language which makes easier to write complex programs with minimum efforts. C/C++ supports all the data types supported by any language. C/C++ provides the facility of user friendly, which saves lot of money and precious time. C/C++ adds the idea of timing signals which is important to simulate synchronous hardware designs. This facility gives C/C++ an edge over other programming languages. C/C++ supports the design at higher abstraction level; this enables large systems to be modeled easily without worrying the implementation of it. C/C++ also support concurrency and can be used to simulate the concurrent behavior of the digital system. 6.3 Experimental Setup Instead of using simulator we implement Interlock Parity technique along with four other encoding techniques. For the implementation of Interlock Parity scheme, we use 2D mesh network topology. We use (4 X 4) mesh network at the initial stage of the experiment. To transfer all bits of the data simultaneously, we use 128 bits wide data bus in each direction. Figure 6.2 2D (4 x 4) Mesh [6] As we discuss the packet format in the previous chapter in detail. Our packet consists of 2 parts. One is header part and the other is data part also known as payload part. The header portion contains useful information like packet ID, source address, destination address, routing information, total nodes in the network and some control information etc. the payload or data portion holds the original data. Further in our implementation of Interlock Parity scheme, we categorize packets into two classes. Data packets Control packets As data packets hold useful data, while control packets contains information about the reliable delivery of the data packet send from some source to the destination. For the simplicity we only use negative acknowledgment (NAK) control packet. How this mechanisms work is illustrated below If data packet received with out any error at the destination, then accepted and no acknowledgement is send back to the sender. If data packet received with any error at the destination, then packet is discarded and NAK is send to the sender requesting the source node to send the packet again. This research also take care the lost packet impact on encoding technique. 6.3.1 Lost packet If some packet is lost on the way from source to destination, say packet n is lost, NAK is send to sender informing about not receiving the packet n. this packet is resend to destination after receiving NAK about packet n. 6.3.2 Lost NAK packet If some NAK packet lost, then after some time interval same NAK is send again until desired packet received. Following algorithm illustrate the communication between sender and receiver Packet Generate Send to Destination Error Yes NAK Accepted Queued No Figure 6.3 Flow diagram For better result purpose we implement our encoding techniques on the following routing strategies. X-Y routing Path Exploring(P.E) routing Gossip routing 6.4 Experimental Results 6.4.1 Clock Cycles Analysis On over own designed network simulator we first simulate a single packet and compute the computer clock cycles for the following phases of the packet. For the construction of header portion of the packet For the construction of the data portion of the packet Clock cycles required to put encoding check at the packet Clock cycles required to check data integrity at receiver side Clock cycles required for retransmission of packet for unreliable delivered packet In case of packet loss , clock cycles required to enforce the mechanisms to find out lost packet To achieve the above mention objective we send a packet on our designed network simulator. Our network simulator is equipped with reliable, unreliable and packet loss mechanisms. We randomly choose a sender and sender send a packet for randomly chosen destination node. Initially we ignore time for the network traversal and up till now our objective of this module is to gather the clock cycles for the formulation of packet, clock cycles required for enforcing encoding technique , rechecking the integrity of data and clock cycles required to handle the packet loss scenario. To get more accurate result we perform this simulation module for 10 times and average results are presented in the following table 6.1 Sr.No Algorithms Header Portion Data Portion Encoding Technique Reliable Delivery Unreliable Delivery Packet Loss 1 Simple Parity Checking 2 4 1 3 7 6 2 Cyclic Redundancy Check 4 8 10 10 20 13 3 Repeated Bit Method 2 12 2 4 10 8 4 Checksum Method 2 10 5 7 16 10 5 Interlock Parity Checking 3 6 4 6 14 9 Table 6.1 Clock cycle breakdown Clock CyclesFigure 6.4 Clock cycles breakdown The above analysis shows the comparison of clock cycles consumed by different encoding technique for different phases of packet construction and for checking and enforcing the encoding techniques. It is very clear from the above analysis that Cyclic Redundancy Check encoding technique takes longer time to impose the header and data portion part. Similarly CRC technique also takes longer clock cycles for the enforcement of encoding technique mechanisms. Similarly it is clear from the above analysis that checksum method encoding technique takes longer time to impose the header and data portion part. Similarly checksum technique also takes longer clock cycles for the enforcement of encoding technique mechanisms. Our new purposed Interlock parity check technique consume relatively less clock cycles for header and data portion. Thats means packet construction is relatively fast in out new purposed technique. In case of reliable delivery Interlock parity scheme again consume less clock cycles and has an advantage over the CRC and checksum method. While in unreliable delivery checking case Interlock parity scheme again consume less clock cycles and has an advantage over the CRC and checksum method. Lastly in packet loss handling scenario Interlock parity scheme consume 14 clock cycles which is less than from the clock cycles consumed by checksum method and CRC. The other two techniques simple parity and repeated bit method are consuming less clock cycles, but remember these clock cycles are required for the construction and enforcement of encoding techniques only. Network traversal i s not included up till this point of research. Next we present the percentage utilization of clock cycles for the sender node and for receiver node. Following table shows the result comparison for sender and receiver. Receiver Sender Sr.No Algorithms Header Portion Data Portion Encoding Technique Reliable Delivery Unreliable Delivery Packet Loss 1 Simple Parity Checking 28.57 57.14 14.29 18.75 43.75 37.50 2 Cyclic Redundancy Check 18.18 36.36 45.45 23.26 46.51 30.23 3 Repeated Bit Method 12.50 75.00 12.50 18.18 45.45 36.36 4 Checksum Method 11.76 58.82 29.41 21.21 48.48 30.30 5 Interlock Parity Checking 23.08 46.15 30.77 20.69 48.28 31.03 Table 6.2 Clock cycles breakdown for the sender and receiver side. Table 6.2 shows the clock cycles breakdown for the sender and receiver side. These results are also shown graphically in Figure 6.5. This graphical analysis consists of three compariosions Header portion comparision Data portion comparision Implementation of encoding technique During the construction of header portion our proposed technique required little larger time as compared to the other techniques. Reason is that header of our proposed technique require little extra bits to take care about different data segment with in a packet as disscussed in previous chapter. But uptill this point we can tolerate this large time for the construction of header as variance of timings for all techniques range between 10 to 30 clock cycles. As header portion contains small portion of packet so we can accept this drawback of interlock parity scheme. When we look at the data portion timing overhead comparisions, it is very clear that our proposed technique required less amout of time for the construction of data portion in the packet. As data portion consists of more bits of data then it is an advantage of our proposed tehnique for utilizing less clock cycles for the construction of data portion. Finally for the implementation and enforcement of encoding technique our proposed interlock parity checking technique requires comparatively balanced clock cycles. For this comparision we can say that our technique utilize less clcok cycles at the sender side for the administrative steps. Clock Cycles (%)Figure 6.5 Clock cycles breakdown for sender side Similarly at the receiver side we check three different scenarios. Clock cycles required to check whether packet received in reliable delivery Clock cycles required to check the unreliable delivery of the packet Clock cycles required to invoke the verification module about the loss of a packet. These statistics are depicting in the Figure 6.6 below. In this comparison it is clear that all encoding techniques required almost same amount of clock cycles for the implementation of above mention sceneries. Our proposed technique has an advantage of other compared techniques in the case of packet loss. In case of packet loss interlock parity scheme required comparatively less clock cycles to invoke the packet loss module. In case of unreliable packet delivery all mentioned techniques required same number of clock cycles. There is little variation among the encoding techniques which is neglectable. Clock Cycles (%) Figure 6.6 Clock cycles breakdown for receiver side Sr.No Algorithms Reliable Delivery Unreliable Delivery Packet Loss 1 Simple Parity Checking 0.2747 0.3846 0.3571 2 Cyclic Redundancy Check 0.8791 1.1538 0.9615 3 Repeated Bit Method 0.5495 0.7143 0.6593 4 Checksum Method 0.6593 0.9066 0.7418 5 Interlock Parity Checking 0.5220 0.7418 0.6044 Table 6.3 Encoding mechanism checking time measured in seconds Next we present the time required for different encoding techniques at sender side. As we see from the output results given in Figure.6.7 in case of reliable delivery our proposed interlock parity checking technique needs less time as compared to other encoding techniques. In case of unreliable delivery all the encoding techniques require large amount of time as compared to reliable delivery case. In this comparison interlock parity scheme has advantage over CRC and Checksum method. While repeated bit takes approximately same time as taken by interlock parity scheme. Simple parity checking technique is the only technique consume less time as compared to others. Reason is being its simple nature. In packet loss case our proposed technique less time as compared to the other techniques. So after this comparison we can say that interlock parity checking consumed less amount of time. Time Figure 6.7 Encoding Mechanism checking time measured in seconds If we look this comparison in different way, then the following Figure 6.8 gives the comparison of different encoding techniques in the context of reliable delivery, unreliable delivery and packet loss scenario. Simple parity checking encoding technique takes less amount of time as compared to other encoding techniques. In the contrast interlock parity checking technique consume less amount of time as compared to CRC, repeated bit method and checksum method. TimeFigure 6.8 Encoding Mechanism checking Time measured in seconds 6.4.2 Encoding Techniques and Routing Strategies Analysis In the all above discussion we are not considering network delays and routing strategies. To check the performance of encoding techniques we implement these techniques on different network strategies. These routing strategies include Encoding technique with XY routing strategy Encoding technique with PE strategy Encoding technique with gossip routing strategy For better results we further adopt two methods for the enforcement of encoding techniques. One is end to end (E2E) and second is node to node (N2N). In E2E strategy packet is checked only at the destination node, no checking is made at the intermediate nodes. This technique has an advantage of less traffic congestion. While in node to node strategy incoming packet is checked at each and every intermediate node. Packet is discarded as found in error. Forwarding node is intimated and retransmission takes place. This technique faces the problem of network resources and network congestion. We make different comparisons for above mentioned strategies for both E2E and N2N cases. 6.4.2.1 Encoding Techniques and XY (E2E) Routing Strategy Following table 6.4 shows the results of encoding techniques with E2E XY routing strategy. Table 6.4 gives the clock cycles required for different encoding techniques for different cases e.g. reliable delivery, unreliable delivery and packet loss. Sr.No Algorithms Simple Parity Checking Cyclic Redundancy Check Repeated Bit Method Checksum Method Interlock Parity Checking 1 Reliable Delivery 18 40 26 32 27 2 Unreliable Delivery 28 56 40 47 41 3 Packet Loss 27 49 38 41 36 Table 6.4 Encoding technique with XY (E2E) Strategy Figure 6.9(a) present these results graphically. Our proposed technique consumes less clock cycles as compared to other encoding techniques. Simple parity check is the only technique which has advantage over our proposed technique. But interlock parity check technique has advantage over all other techniques other than simple parity check techniques. Clock Cycles Figure 6.9(a) Encoding technique with XY(E2E) Strategy Figure 6.9(b) present these results graphically in other context. In case of reliable delivery our proposed technique consumes less clock cycles as compared to checksum method and CRC. While for repeated bit method case, the comparison is almost same. Simple parity check method has little advantage over interlock as well as other encoding techniques. When we come towards the analysis of unreliable delivery case, this segment takes more time as compared to the reliable delivery scenario. Our proposed technique also consume less clock cycles as compared to other encoding techniques other than simple parity check method. Packet loss case takes more time than reliable delivery but consumes less clock cycle

Saturday, July 20, 2019

Enron Essay -- essays research papers

In 1984 Ken Lay became chairman and Chief Operator of Houston Natural Gas. It quickly doubled when it bought Florida Pipeline Company. The next year in 1985 Houston Natural Gas merged Internorth Incorporation. With the merger they both combined to own around 40,000 miles of pipeline and shortly after they changed their name to Enron. Around that time Washington was being lobbied by energy corporations to deregulate business and let companies set their own prices. Energy companies said this would not only lead to the end of monopolies but the extra competition would benefit companies and consumers. Over the next several years Washington began to lift controls on who could produce energy and how it was sold. With an influx of new suppliers energy prices were very unstable. With these deregulations Enron was allowed to sell natural gas on an open market such as oranges and wheat. With this new way of business Enron was able to grow into the seventh largest company in the United States with over 25,000 employees in over thirty countries. It became an innovator in gas trading and technological advances in the energy field. In 1990 Enron hired Jeffery Skilling as the company Energy’s Trading Operation Consultant. At age thirty-six Skilling was able to create the â€Å"Gas Bank†. The â€Å"Gas Bank â€Å"is when a company buys large volumes of gas from producers and resells it to industrial customers at long term contracts. This helped stabilize the gas market which was very volatile at the time. It also helped expand gas production nationwide and helped Enron grow to a major player in the energy industry.   Ã‚  Ã‚  Ã‚  Ã‚   As Skilling went up in rank he started to get the company involved in risky investments to make more profit. In an interview with the University of Virginia he said â€Å"We like risk because you make money by taking risk,† This was one of the many reasons which got Enron into financial debt, Skilling also persuaded regulators to allow Enron to use â€Å"market-to-market† accounting. A technique used by brokerage companies for securities trading. It allowed Enron to count long-term contracts as immediate profit although most of the money wouldn’t be coming in for several years. For example if a pipeline in Europe was projected to produce $89 million of profit it would be posted, but there was one problem the pipeline hadn’t been built yet. With the high t... ...ion in profit when they only produced $880 million. They were in true debt for more than $628 million by the end 2000. More than $630 million came from improper accounting and another $296 million in profit came from hidden tax cutting transactions. This sent the stock plummeting from $70 to 60 cents and produced losses of more than $60 billion on paper. With this fall in stock price, Enron filed for bankruptcy on December 2, 2001. Since the fall of Enron and other major corporations, Senate and Congress are now trying to configure a major reform bill which would protect workers and their pensions. President Bush also signed off on a new accounting-reform legislature which creates an oversight board that would investigate and punish accounting violations. Now the last step by the government is putting everyone involved behind bars. Skilling is set to testify before a house committee and has chosen not to invoke the Fifth Amendment as many of the other board members have chosen to do. Fastow has to also testify before congress but will plead the fifth to avoid self incrimination. Kropper, Enron’s director of global market pleaded guilty last weak to the demise of the company.

Friday, July 19, 2019

Tradition in William Faulkners A Rose for Emily and Shirley Jacksons

Tradition in William Faulkner's A Rose for Emily and Shirley Jackson's The Lottery People throughout the world do things for many different reasons. Religion, peer pressure, or tradition are some of the reasons the people do things. In the U.S. we have many traditions such as Christmas. Some people have strange or out of the ordinary traditions. The two short stories ?The Lottery? and ?A Rose for Emily? both portray tradition.   Ã‚  Ã‚  Ã‚  Ã‚  In ?The Lottery?, tradition is showed in three main ways. First, Old Man Warner says, ?there has always been a lottery (Jackson 11).? The town people accept The Lottery because there has always been a lottery. The older people in the town such as Old Man Warner keep the tradition alive with their ideals. Second, The Lottery is held every year. Tradition is upheld in this way because it introduces the younger generation to the tradition. This shows that the lottery is a tradition because traditions happen over and over again. Lastly, tradition is shown with the parifanilia used in the story of ?The Lottery?. The black box used to draw names is a duplicate of the original. The black box is a symbol of what was in the years past.   Ã‚  Ã‚  Ã‚  Ã‚  In ?A Rose for Emily?, tradition is also shown in three main ways. First, Emily does not get courted by anyone. This would not seem to be a normal tradition but in the story her father did not want Emily to become involved with anyone. Emily?s father was not following tradition when doing this because normal t...

Do Gays and Lesbians Threaten the System of Male Dominance? Essay

Do Gays and Lesbians Threaten the System of Male Dominance? "In short, by not complying with their assigned gender roles, gays and lesbians threaten the system of male dominance (Calhoun 157)" A debate is raging in America about who people have a right to marry. In response to lesbians and gays asking for the right to marry, many legislators are writing laws to ban same-sex marriage in their respective states. Even President Bush supports a Constitutional amendment that would ban same-sex marriage (prez.bush.marriage/). Opponents of such legislation do not want discrimination passed into law and are protesting at every opportunity. One must understand the reasons that people want to ban same-sex marriage before he or she can effectively argue about the subject. Many advocates of same-sex marriage bans say that allowing gays and lesbians to marry would degrade the institution of marriage because marriage is only supposed to exist between a man and woman. In addition, allowing same-sex marriage would cause problems for society (Issues and Controversies on File). One theory why opponents may fight against same-sex marriages is that heterosexual marriages have long reinfo rced traditional gender roles within marriage and that allowing same-sex marriages would cause males to lose their authority to subordinate females as heterosexual couples begin to model same-sex marriage gender equality (Calhoun 157). The traditional argument against same-sex marriage states that marriage is defined as the emotional and spiritual union of a man and a woman. According to that definition, a pair of men or women cannot marry. Opponents of same-sex marriage bans, however, argue that marriage is a basic personal and social right and a social contract that is devoid of gender consideration. Cheshire Calhoun states, "the dominant goal of marriage is and should be unitive, the spiritual and personal union of the committed couple" (151). The sexual orientation or gender of the partners does not lessen the importance placed upon entering such a union and need not be used to restrict who can enter into such a union. Heterosexuals have enjoyed the right to marry throughout recorded history, though there have been restrictions placed over who could marry that have been overc... ...at sodomy is immoral or that same-sex unions are immoral, but nevertheless think the state should adopt a neutral position, refraining from criminalizing sodomy and offering legal protection for same-sex unions under domestic partnership laws" (Calhoun 168). Bibliography LOVING ET UX. v. VIRGINIA. http://web.lexis-nexis.com/universe/document? _m=5fc1bb0239c8912aa97d779528e9d62b& _docnum=2&wchp=dGLbVlb-zSkVb&_md5=60c85af0cd3ade6c85561f31ba41bdc7 http://www.cnn.com/2004/ALLPOLITICS/02/24/elec04.prez.bush.marriage/ Calhoun, Cheshire. Feminism, the Family, and the Politics of the Closet: Lesbian and Gay Displacement. Oxford University Press: New York, 2000. Corvino, John. Why Shouldn't Tommy and Jim Have Sex? A Defense of Homosexuality. Rowman & Littlefield: New York, 1997. Issues and Controversies on File. Same-Sex Marriage. Facts on File News Services: New York, 1996. Levin, Michael E. Sexual Orientation and Human rights. Rowman & Littlefield: New York, 1999. B.A. Robinson. â€Å"CONSERVATIVE RELIGIOUS OPPOSITION TO SAME-SEX MARRIAGES†. http://www.religioustolerance.org/hom_marj_c.htm. Sullivan, Andrew. Virtually Normal. Alfred A. Knopf Inc: New York, 1995.

Thursday, July 18, 2019

How Society Shapes Your Decision for College

Peter Berger refers to the sociological perspective as seeing the general in the particular, meaning sociology helps one see the general patterns in particular people. Well we all know that society can affect our choices in life, whether it be the jeans you buy, the food you eat or the path you choose for your future, society always has a say in it even if it isn't welcomed. My choice to go to college wasn't much of a choice, as far back as I can remember my parents and teachers alike were constantly grooming me for exams and tests and everything I would need to get accepted into and succeed at whatever higher institution I chose. Not that this was a bad thing at all, I'm more than grateful for all of it considering without it I would not be where I am today. The point is, society embeds in your mind that the only way to be successful in todays business world is to go to college, get a degree, and then search for a desk to sit behind for the greater part of the remainder of your life. If that wasn't encouragement enough to keep my grades high and my sights set even higher, looking around at the other students at my school certainly did it for me. I told myself that I would not allow myself to slip and fall into the pattern that all the others around me had or soon would. I was bound and determined to get out of that school, out of my hometown, and away from any negative people or negative energy those people might be harboring. So the easy part was done, my choice had been made, but now the big question: What university do I choose? Being from a middle income family in Texas I knew I wasn't going to attend any Ivy League Institution, but I still wanted to go to an amazing University without bankrupting my parents of course. When I looked at my parents, along with other parents who were equally successful in their careers I noticed they had all gone to Big 12 schools. Again, keeping my parents bank accounts in mind I decided it would be the wisest decision to choose a Big 12 University that was still in Texas to avoid the $30,000 + fee for out of state tuition. Based on my major and who had accepted me so far I had it narrowed down to my top three universities; Texas A&M, University of Texas, and good ol' Texas Tech University. The deciding factor was that Texas Tech and the University of Texas were the only two schools with their own college of communication, but Texas Tech came out on top as the only University in Texas that offered advertising as its own major in its own college. It also didn't hurt that all the people I had grown to dislike from my hometown, if they were even graduating, were going on to UT or A&M, so the fact that Texas Tech was ten hours away from home was just the cherry on top.

Wednesday, July 17, 2019

Human Development

deuce strands of gentleman suppuration atomic number 18 hearty and emotional. 2. dickens stages of human cultivation from the grammatical case excogitate be sr. maturity date and adulthood. 3. Nature is what you argon born with, cor replying what you inherit from your pargonnts, an congressman from the case dissect is that Iain and Kirstys daughter has brown nappy hair just standardized Iain. 4. pro coarse is what you apprehend as you nurture up and go through with(predicate) with(predicate) keep an example of nurture from the case study is that Anne is grooming on caring for her invigorated grand-daughter when Kirsty returns to work. . 2 primeval features of behavioural t single and neverthe little(a)-beginning is behavioral and Consequence, Behavioural meaning if a infant compulsions virtu altogetherything and takes a tantrum, and Consequence meaning if they be giving what they want then they get out think that it is the correct personal mann er to come and on that point for do it again. 6. Three key features of the social adopting possibleness atomic number 18 Bonding tykeren connecting with citizenry, like p arnts making them n whiz safe around them and loved.Loss If any(prenominal) unitary dies or goes away, for example a loved one you miss them and come forth to finger of aroma this mind of outlet in life, like an muster out space has arrived that wasnt there forwards. 7. Two ways in which the behavioural approach keep wait on c atomic number 18 workers earn human ripening and behaviour is , it overhauls them listen how to act and respond to a kidskins behaviour and helps them run through how they should play off to something, such as praise them for vertical things just ramify them no it was reproach if they did something wrong. . From the case study you laughingstock understand wherefore Jenny does not want to move into supported accommodation not only because she is happy at po sition but she feels secure and loved at home with her mum, and now thinks that she is getting pushed away as her mum has remarried and is moving in with her new partner. Jenny will feel a hotshot of want oerdue to this and may besides feel misfortune due to only losing her dad both year ago. Staying at home could remind.. human race evolutionHSV 504 homosexual Development-Early repositing Development Dianne Wright Post University Introduction more(prenominal) than human eruditeness specialists cook examined depot going of adults later in life. During the some other(a)(prenominal) liter geezerhood, there withdraw been some studies in sisterrens cognitive in formation and primarily childishness reposition loss. Ernest G. Schachtel conducted studies on why population forget puerility memories as they contract previous(a). He exposit the physical processes that could be intricate in primeval stock loss (Crain, 2005). He was influenced by Sigmund F reuds cognitive supposition (Crain, 2005). Lev S.Vygotsky, besides, exposit childrens primaeval holding growing as a holistic process that involved society, physiological, heathenish, and economical environments. (Vygotsky, 1978) Vygotsky was influenced by Karl Marxs possibility of peoples information, tell Crain (2005). Schachtel was influenced by Sigmund Freud both theorists seemed to agree that children learn to dream up more systematically when prompted by a more lookd person, like their parents and caregivers (Broderick and Blewitt, 2010). earliest people separated from their parents when they were children can turn over fragmented memories of that prior duration.There are a serial of systems involved in remembrance loss (Lerner, Easterbrooks, and Mistry, 2003). Keywords retentivity, culture, puerility, processes, environment HSV 504 gracious Development-Early retentiveness loss Doctor Schachtel utter adults abide their precise ahead of time chil dhood memories. He says the one-time(a) children get, the more primal childhood memories they get (Crain, 2005). Crain (2005) explained that Schachtel utter early on childhood computer repositing loss was cal conduct childish blackout (p. 327). When they were infants people had unabated bewilders however as time passed and other harbour a go at its took their place, they forgot the preliminary memories (Crain, 2005).Most importantly, the foregoing visualises were scattered because they occurred before the child could say. uniform his predecessor Freud, Schachtel tell that to some extent, early hostile and sexual feelings were pent-up because they led to shame (Crain, 2005). Schachtel believed forgetting most early childhood memories was common to either experience people had during early childhood. In addition, children were socialize by caregivers and peers to change their first reply to merriment in order to line up to cultural expectations.Schachtel believ ed that the differences with adults and childrens storehouse loss were with how they experienced their lives. He utter that adults experience their lives primarily through literal associations (Crain, 2005), like seeing a becoming shade of blue and reflection what a pretty color it is. Children before one year of age experience their lives through seek and smell (Crain, 2005). As children grow up, they stimulate to align to the way adults and peers experience the world, yet to maintain the flick of known perceptions of the world (Crain, 2005). Schachtel say that infants experience life with their senses.The most important sense is taste. Babies adopt more taste buds than adults do (Crain, 2005). legion(predicate) times whatever they get to winds up in their mouths. In addition, the sense of smell is important to babies because they learn to attain their female parent by her smell, as rise up as how she tastes. The sense of set is not as important to infants as it i s for older children (Crain, 2005). Schachtel identifies these senses as be senses. Temperature is felt on the frame as hot and cold, they are at heart senses, he express. Sight and earshot are outside senses because they are other centre. fragrance and taste are intimate focused (Crain, 2005). gibe to Schachtel, when adults experience memory categories, they bemuse actually little words to severalise the tasting, aroma and feeling senses in memory (Crain, 2005). When children start to experience life by exploring new things, looking at their body controls for example, adults plough concerned and begin socializing them to respond like themselves (Crain, 2005). Freud verbalise the same closely children being disheartened from examine their body functions (Gay, 1998). However, he said that they are discouraged from that experience by their caregivers (Crain, 2005). It is considered primitive in the west to discriminate establish on smell.To say someones breathing spell smells bad in cosmos is not considered polite, so that sentiment is rarely communicate in public. Yet, body feel is the primary feather smell that would intrigue a very five-year-old child, said Schachtel (Crain, 2005). Their parents tell them that it is not beloved and the child learns to place herself from that sensational pleasure. Schachtel likewise said that with press release of time the highly sensitive sensory(a)(a) experiences are lost to the children because they are quash (Crain, 2005). Schachtel believed that adults are less sensitive to their preferably sensory perceptions due to assimilation (Crain, 2005).The senses make be as either good or bad, and adults bind extensive style labeling things they see, but not food that they taste or odors they smell (Crain, 2005). Schachtel further explains the only adults that would nonetheless have their forward perceptions inherent after parental and peer socialization would be creative individuals li ke sources and painters (Crain, 2005). When a child gets older, more things that were accepted in infancy can acquire less intense because their orientation changes toward the outside senses, sight and touch.Schachtel also said that babies enjoyed the warmth of preservative environments (Crain, 2005). Crain (2005) added that Schachtel was a pioneer in his observations near the loss of early memories. When Schachtel started writing, no one else was mindful that as people got older they lost many of their childhood memories (Crain, 2005). In the eld after Schachtel had written about(predicate)(predicate) early memory loss, there have been several(prenominal) studies that have added to his insights. Crain (2005) also say we could lose memories earlier and faster than Schachtel said we did. Lev S.Vygotsky said that children develop inside their various(prenominal) cultures and societies long before they learn to speak (Crain, 2005). He also observe a childrens ripening inv olved its society, economic status, and physiological maturation. Vygotsky (1978) upset that a childs learning processes where more than subconscious and rational childrens evolution can grow inside every environ rational aspect of their lives. Children learn from caregivers in their respective cultures how to have-to doe with within their environments, noted Broderick & Blewitt (2010).Vygotsky said that children learned how to relate in two stages first when parents memorise them to have-to doe with and then within themselves as they start to interact with their peers (Crain, 2005). Most importantly, Schachtel taught people what processes could dislodge inside the thinking of babies and very progeny children (Crain, 2005). He also believed that parents help children spew their thoughts into words by guessing what they see at particular events, but at a cost of the children losing much of their earlier memories.In this view, Schachtel hold with Vygotsky (Crain, 2005). S chachtel was a pioneer in the study of memory loss of vernal children as they grow older (Crain, 2005). According to Crain (2005), his theory has made the deepest impression on this writer who is a caseworker. As a practitioner that enters legal codes for children that have gone(a) through many kinds of abuse and neglect, one wonders how many of those children are trying to recall their earlier memories of being separated from their parents. round of these young people grew up in their sexual intercourses homes.Those adults told them about their parents and some of the bunch that caused them to be placed in shelter care. Now, they are coming to the procedure requesting to see their closed case records. umpteen of those records have photographs. There are move hearings that impression tape their proceedings for their records. nearly of Vygotskys findings were published abroad lead days after Schachtel published his human increase work (Crain, 2005). Vygotskys theory abo ut childrens cognitive development was not paid attention to because his belles-lettres were prohibited (Broderick & Blewitt, 2010).Today both theorists are analyse because Vygotsky emphasise environmental involvement in cognitive development (Broderick & Blewitt, 2010) and Schachtels theory stressed the mental processes of human development (Crain, 2005). Schachtel and Vygotskys theories agree in that both said that parents, caregivers and other environmental climatels help children in learning new activities. Vygotsky said that since children are learning new things all the time, their abilities gain as they grow older (Crain, 2005).Schachtel said most of childrens socialization comes from parents and peers to conform to their respective societys mode of behavior (Crain, 2005). Vygotskys theory of socio-cultural development resonates with many developmentalists because there has to be more to peoples development than mental processes. A whole series of systems contributes to very early memory functions as children grow up. According to Lerner, Easterbrooks, & Mistry (2003), there have been many studies on cognitive functions and memory.They explained that memory loss of young children as they become adults can be related to a confederacy of processes from neurological to sociological. In addition, there are now numerous studies discussing whizz function with social and physiological developments (Lerner et al. , 2003). Lerner et. al (2003) also explained that age, lifestyle, and education are among other determinants that have influenced the changing relationships in memory processes over a persons life duo. Since Schachtels writings more than cubic decimeter years ago on childrens memory development, there have been many studies on the same subject (Cycowicz, 2000).Human development specialists are discovering new information on memory and cognitive development. According to Wertsch (1985), Vygotskys flora are now canvass because of their holist ic approaches to human development. References Broderick, P. C. & Blewitt, P. (2010). The life span Human development for helping professionals. (3rd ed. ). Pearson Boston, MA. Cycowicz, Y. M. (2000). holding development and event-related brain potentials in children. biological Psychology, 54, (174). Crain, W. C. (2005). Theories of development Concepts and applications. 5th ed. ). Upper commove River, NJ. Pearson learner Hall. Gay, P. (1998). Freud A Life for Our Times. capital of the United Kingdom J. M. tarnish and Sons. Lerner, R. M. , Easterbrooks, M. A. , & Mistry, J. (eds. ). (2003). Handbook of Psychology. 6, 443-461. Hoboken, NJ magic Wiley & Sons, Inc. Vygotsky, L. S. (1978). brainiac and society The development of high mental processes. Cambridge, MA Harvard University Press. Wertsch, J. V. (1985). Vygotsky and the social formation of mind. Cambridge, MA Harvard University Press.Human DevelopmentHSV 504 Human Development-Early Memory Development Dianne Wright Post University Introduction Many human development specialists have examined memory loss of adults later in life. During the past fifty years, there have been many studies in childrens cognitive development and earlier childhood memory loss. Ernest G. Schachtel conducted studies on why people forget childhood memories as they grow older. He described the processes that could be involved in early memory loss (Crain, 2005). He was influenced by Sigmund Freuds cognitive theory (Crain, 2005). Lev S.Vygotsky, however, described childrens early memory development as a holistic process that involved society, physiological, cultural, and economical environments. (Vygotsky, 1978) Vygotsky was influenced by Karl Marxs theory of peoples development, noted Crain (2005). Schachtel was influenced by Sigmund Freud both theorists seemed to agree that children learn to remember more systematically when prompted by a more experienced person, like their parents and caregivers (Broderick and Blewitt, 2010 ). Young people separated from their parents when they were children can have fragmented memories of that earlier time.There are a series of systems involved in memory loss (Lerner, Easterbrooks, and Mistry, 2003). Keywords memory, socialization, childhood, processes, environment HSV 504 Human Development-Early memory loss Doctor Schachtel said adults lose their very early childhood memories. He says the older children get, the more early childhood memories they lose (Crain, 2005). Crain (2005) explained that Schachtel said early childhood memory loss was called infantile amnesia (p. 327). When they were infants people had intense experiences however as time passed and other experiences took their place, they forgot the earlier memories (Crain, 2005).Most importantly, the earlier experiences were lost because they occurred before the child could speak. Like his predecessor Freud, Schachtel said that to some extent, early hostile and sexual feelings were repressed because they led to shame (Crain, 2005). Schachtel believed forgetting most early childhood memories was common to every experience people had during early childhood. In addition, children were socialized by caregivers and peers to change their first response to pleasure in order to conform to cultural expectations.Schachtel believed that the differences with adults and childrens memory loss were with how they experienced their lives. He said that adults experience their lives primarily through verbal associations (Crain, 2005), like seeing a nice shade of blue and saying what a pretty color it is. Children before one year of age experience their lives through taste and smell (Crain, 2005). As children grow up, they start to conform to the way adults and peers experience the world, yet to maintain the characterization of familiar perceptions of the world (Crain, 2005). Schachtel said that infants experience life with their senses.The most important sense is taste. Babies have more taste buds than adul ts do (Crain, 2005). Many times whatever they touch winds up in their mouths. In addition, the sense of smell is important to babies because they learn to identify their mother by her smell, as well as how she tastes. The sense of sight is not as important to infants as it is for older children (Crain, 2005). Schachtel identifies these senses as body senses. Temperature is felt on the body as hot and cold, they are inside senses, he said. Sight and hearing are outside senses because they are other focused. Smell and taste are inside focused (Crain, 2005).According to Schachtel, when adults experience memory categories, they have very little words to describe the tasting, smelling and feeling senses in memory (Crain, 2005). When children start to experience life by exploring new things, looking at their body functions for example, adults become concerned and begin socializing them to respond like themselves (Crain, 2005). Freud said the same about children being discouraged from inve stigating their body functions (Gay, 1998). However, he said that they are discouraged from that experience by their caregivers (Crain, 2005). It is considered rude in the west to discriminate based on smell.To say someones breath smells bad in public is not considered polite, so that sentiment is rarely spoken in public. Yet, body odor is the primary smell that would intrigue a very young child, said Schachtel (Crain, 2005). Their parents tell them that it is not good and the child learns to distance herself from that sensory pleasure. Schachtel also said that with passing of time the highly sensitive sensory experiences are lost to the children because they are repressed (Crain, 2005). Schachtel believed that adults are less sensitive to their earlier sensory perceptions due to socialization (Crain, 2005).The senses become defined as either good or bad, and adults have extensive vocabulary labeling things they see, but not food that they taste or odors they smell (Crain, 2005). Sc hachtel further explains the only adults that would still have their earlier perceptions intact after parental and peer socialization would be creative individuals like writers and painters (Crain, 2005). When a child gets older, many things that were accepted in infancy can become less intense because their orientation changes toward the outside senses, sight and touch.Schachtel also said that babies enjoyed the warmth of protective environments (Crain, 2005). Crain (2005) added that Schachtel was a pioneer in his observations about the loss of early memories. When Schachtel started writing, no one else was aware that as people got older they lost many of their childhood memories (Crain, 2005). In the years after Schachtel had written about early memory loss, there have been several studies that have added to his insights. Crain (2005) also stated we could lose memories earlier and faster than Schachtel said we did. Lev S.Vygotsky said that children develop within their respective cultures and societies long before they learn to speak (Crain, 2005). He also noted a childrens development involved its society, economic status, and physiological development. Vygotsky (1978) stressed that a childs learning processes where more than subconscious and mental childrens development can grow within every environmental aspect of their lives. Children learn from caregivers in their respective cultures how to relate within their environments, noted Broderick & Blewitt (2010).Vygotsky said that children learned how to relate in two stages first when parents teach them to interrelate and then within themselves as they start to interact with their peers (Crain, 2005). Most importantly, Schachtel taught people what processes could happen inside the thinking of babies and very young children (Crain, 2005). He also believed that parents help children put their thoughts into words by recalling what they saw at particular events, but at a cost of the children losing much of their earlier memories.In this view, Schachtel agreed with Vygotsky (Crain, 2005). Schachtel was a pioneer in the study of memory loss of young children as they grow older (Crain, 2005). According to Crain (2005), his theory has made the deepest impression on this writer who is a caseworker. As a practitioner that enters legal codes for children that have gone through many kinds of abuse and neglect, one wonders how many of those children are trying to recall their earlier memories of being separated from their parents. Some of these young people grew up in their relatives homes.Those adults told them about their parents and some of the circumstances that caused them to be placed in foster care. Now, they are coming to the agency requesting to see their closed case records. Many of those records have photographs. There are court hearings that video tape their proceedings for their records. Some of Vygotskys findings were published abroad three years after Schachtel published his human de velopment work (Crain, 2005). Vygotskys theory about childrens cognitive development was not paid attention to because his writings were banned (Broderick & Blewitt, 2010).Today both theorists are studied because Vygotsky stressed environmental involvement in cognitive development (Broderick & Blewitt, 2010) and Schachtels theory stressed the mental processes of human development (Crain, 2005). Schachtel and Vygotskys theories agree in that both said that parents, caregivers and other environmental models help children in learning new activities. Vygotsky said that since children are learning new things all the time, their abilities progress as they grow older (Crain, 2005).Schachtel said most of childrens socialization comes from parents and peers to conform to their respective societys mode of behavior (Crain, 2005). Vygotskys theory of socio-cultural development resonates with many developmentalists because there has to be more to peoples development than mental processes. A whol e series of systems contributes to very early memory functions as children grow up. According to Lerner, Easterbrooks, & Mistry (2003), there have been numerous studies on cognitive functions and memory.They explained that memory loss of young children as they become adults can be related to a combination of processes from neurological to sociological. In addition, there are now numerous studies discussing brain function with social and physiological developments (Lerner et al. , 2003). Lerner et. al (2003) also explained that age, lifestyle, and education are among other determinants that have influenced the changing relationships in memory processes over a persons lifespan. Since Schachtels writings more than fifty years ago on childrens memory development, there have been many studies on the same subject (Cycowicz, 2000).Human development specialists are discovering new information on memory and cognitive development. According to Wertsch (1985), Vygotskys works are now studied b ecause of their holistic approaches to human development. References Broderick, P. C. & Blewitt, P. (2010). The life span Human development for helping professionals. (3rd ed. ). Pearson Boston, MA. Cycowicz, Y. M. (2000). Memory development and event-related brain potentials in children. Biological Psychology, 54, (174). Crain, W. C. (2005). Theories of development Concepts and applications. 5th ed. ). Upper Saddle River, NJ. Pearson Prentice Hall. Gay, P. (1998). Freud A Life for Our Times. London J. M. Dent and Sons. Lerner, R. M. , Easterbrooks, M. A. , & Mistry, J. (eds. ). (2003). Handbook of Psychology. 6, 443-461. Hoboken, NJ John Wiley & Sons, Inc. Vygotsky, L. S. (1978). Mind and society The development of higher mental processes. Cambridge, MA Harvard University Press. Wertsch, J. V. (1985). Vygotsky and the social formation of mind. Cambridge, MA Harvard University Press.