Wednesday, July 31, 2019

HIV Patients Should Have Equal Access to Kidney Transplantation Essay

HIV infection may be obtained by patients receiving renal replacement therapy (RRT) through blood transfusions, renal allograft, sexual contacts, or needle sharing of drug addicts. Viral infection or HIV-associated nephropathy can cause renal failure. In the early 1980’s, prognosis of patients with the acquired immunodeficiency syndrome (AIDS) was very low, and survival rate of HIV-infected individuals with ESRD was miserable. Accordingly, several people even doubted the worth of providing continuance dialysis to patients with AIDS. Due to progress in diagnostic techniques in serologic and viral markers of disease, and use of extremely efficient antiretroviral agents, the prognosis of HIV-positive individuals has radically improved. Today, skills and knowledge in hemodialysis are effective modes of therapy and many centers, though some are reluctant, are now starting to practice renal transplantation in HIV-infected patients. Human Immunodeficiency Virus HIV infects CD4+ T cells, making the immune system weak as these cells malfunctions. Abnormal activation ofCD8= T cells may contribute to the loss of both CD4+ AND CD8+ T cells through apoptosis, which may represent a major cause of infected and non-infected cell death in HIV infection. Many HIV-infected individuals proliferative responses to recall antigens, irradiated stimulator peripheral blood mononuclear cells from healthy, unrelated donors, or T cell mitogens (Roland & Stock, 2003). HIV infection can worsen existing renal disease and can trigger pathologically distinct disease named HIV-associated nephropathy (HIVAN), a focal segmental glomerulosclerosis (FSGS) associated with severe cystic tubular lesions, leading to chronic renal failure. Renal syndromes include: fluid and electrolyte malfunction, proteinuria, nephrotic disease, progressive azotemia, inflamed kidneys, and fast succession to end stage renal disease (ESRD). HIV-infected patients who developed renal disease have short survival span. Transplantation process may increase the risk of HIV-infected patients in accelerating the depletion and dysfunction of their CD4+ T cells, which may further result in the development of more serious and complicated disease, such as AIDS, making HIV replication harder to control. On the other hand, immunosuppression might reverse the immuno-pathology associated with HIV disease (Roland & Stock, 2003). End Stage Renal Disease  When the kidney totally lost its ability to filter waste from the circulatory system, renal failure finally meet the end stage renal disease or ESRD, the final stage of nephropathy or the premeditated degeneration of the kidneys. In 1998, over eighty-six thousand patients received therapy for treating ESRD in the United States. Autonomously, Medicare expenditures rose to 12. 9 billion dollars from 12 billion in 1998. The total cost of ESRD program through medicare was 17. 9 billion and is now projected to be 28. 3 billion dollars by 2010 (Winsett et al, 2002). The most common causes of ESRD include diabetic nephropathy, systemic arteral hypertension, glomerulonephrities, and polycystic kidney disease. In the case of ESRD, GFR declines to less than 10mL/min/m2, once it declines to that level, the normal hemeostatic function of the kidneys can not be sustained anymore. Whatever the cause, if untreated, ESRD may cause severe infection and even death to the patient. When the kidney function decline to less than twelve percent to fifteen percent, the patient survival will depend on the kidney transplantation and the therapies associated to it (Winsett et al, 2002). Chronic Dialysis versus Kidney Transplantation According to the New England Journal of Medicine (1999), transplantation is superior in saving life than long-term dialysis. The mortality rates were analyzed among over 200, 000 patients who underwent dialyses for ESRD and only twenty-three thousand received a kidney. Based on the research, patients who undergo transplantation live twice more than the projected years of life of patients who remained on the waitlist having dialysis. A successful transplantation improves the quality of life and lessens the mortality rate for many patients. Moreover, it consumes less time and energy. However, this procedure may cause bleeding, damage, and infection to other organs inside the body, even death can occur. That is why after transplantation, patients must undergo immunosuppression process for a lifetime period to monitor signs of rejection (Berns, 2007). Despite the greater risks, when it comes to quality and length of life, a transplanted kidney is more preferred. It’s man over machine. Statistics Over ten thousand kidney transplantations are being performed each year on patients with ESRD. Records show that patients who undergo kidney transplantation live longer than those who are just taking dialysis; but eight to nine patients on the waitlist die every day due to scarcity of organs to be used in the transplantation. Cadaveric kidney supply has an average of more than two years to come, and only 15-20 % of patients in the list were granted to receive them. The condition of renal failure and what causes them have direct effects on the transplantation rates of patients. Individuals with cystic kidney disease (25. 5%), obstructive nephropathy (24. 9%), and glomerulonephrities (23. 2%) have the utmost successful transplantation rate while patients having diabetes (13. 3%) and hypertension (8. 5%) have the lowest rates (Wallace, 1998). Why transplantation should be considered in HIV-infected patients? Organ malfunction has been the principal grounds of morbidity and mortality of HIV-infected patients, AIDS-related complication is only secondary. Before, immunosuppression was thought to be an unconditional contraindication in the circumstance of HIV infection, now, it is gradually more valued that immune activation is a major aspect of HIV pathogenesis. Consequently, immunosuppression has advantageous effects in people with HIV infection through temperance of immune activation or reduction of HIV reservoirs. Some specific immunosuppressant agents also have antiviral properties or interact synergistically with certain antiretroviral agents (Roland & Stock, 2003). Reasons for reluctance of performing Kidney Transplantation for HIV-infected patients: In a survey conducted to 248 renal transplant centers in The U. S. in 1998, 148 requires HIV testing of prospective kidney recipients and that the vast majority denies patients with HIV to undergo transplantation. Most centers believe that transplantation is not suitable for HIV-infected patients (Spital A. , 1998). Before, chronic dialysis was the only option for treating ESRD of HIV-infected patients for fear of increased morbidity and mortality due to therapeutic immunosuppression. The allocation of cadaver kidneys to these patients was also considered improper due to expected inferior patient graft survival (Anil Kumar et al. , 2005). Also, according to the research led by Professor Andrew Grulich from the University of the New South Wales’ National Centre in HIV Epidemiology and Clinical Search (NCHECR), immune deficiency is responsible for the increased risk of contracting several types of cancer than the general population. HIV patients are eleven times more expected to develop Hodgkin’s lymphoma while there is almost four times the risk for those who had transplants (Staff Writers, 2007). Professor Grulich further proposed that people’s immune system must be maintained at a higher level through the use of anti-retroviral drugs. The main historical exclusion of HIV-infected patients with ESRD was rooted in the coherent basis that immunosuppression necessary for organ transplantation would aggravate an already immunocompromised state. Although there were numerous initial reports signifying worse outcomes after solid organ transplantation in HIV seropositive recipients, there have been reports as well suggesting there were no unpleasant effects of HIV infection on allograft survival (University of California, 2007). Indeed, there have been two reports of HIV-infected patients going through liver or renal transplantation who demonstrated normal graft function for at least eight years following the transplant. The HIV status of the two was unknown at the time of transplantation; therefore no endeavors were prepared to adjust immunosuppressive therapy. The distinction in these studies may recount to differences in the time of HIV acquisition, with those of longstanding HIV infection prior to transplantation having a faster end relative to those who acquired HIV infection at the time of transplantation. Regardless of standard cyclosporine-based immunosuppressive treatments, there was no proof of OI or progression to AIDS in the first eight years following transplantation (Roland & Stock, 2003). There are multiple other reports of patients with HIV who had gone through transplantation and demonstrated long-term graft survival in the presence of immunosuppression with variable rates of developing AIDS or death. Six of eleven renal allografts were functioning at a mean follow-up of thirty-one months (Roland & Stock, 2003). Effects of Immunosuppressant Agents In order to avoid rejection reaction of the body against transplanted organs, immunosuppressant drugs are being taken to block the immune system from attacking the transplanted organ and preserving its function. As side effect, these drugs can help in HIV progress to AIDS. However, recent studies show that these drugs can also contribute in the reduction of HIV. Inactive T lymphocytes serve as a vital reservoir for HIV regardless of HAART. Immunosuppression may affect the reservoir of HIV-infected cell that persist throughout HAART through reduction of cell-associated HIV by either direct inhibition of viral replication, potentiation of HAART effects, or exhaustion of infected cells and lessening in the accessibility of permissive target cells by preventing T-cell activation. Otherwise, improvement in viral reservoirs can be caused by reduced immune management of HIV-expressing cells (Roland & Stock, 2003). Ethical and Medical Issues Organ shortage is one of the ethical issues in organ transplantation. One distributive fairness criteria is equal access which include length of time waiting (first come, first saved basis), and age (youngest to oldest). The supporters of this criteria has a strong belief that since kidney transplantation can save live, it is an important remedial practice and worth offering to anyone who needs it (Center for Bioethics, 2004). The second type is the maximum benefit, aiming to maximize the quantity of successful transplants. The maximum benefit criteria include medical need (the sickest people are being prioritized for a transplantable organ), and probable success of a transplant (giving organs to the person who will be most likely to live the longest). People who support the maximum benefit philosophy aspire to avoid the wasting of organs, which are quite scarce, so that the greatest benefit is derived from every available organ (Center for Bioethics, 2004). During the Pre-HAART era, HIV-infected patients have a very poor prognosis, many people believes that it would be a waste to use the limited supply of organ to those group of patients that is why many transplant centers are reluctant to practice the transplantation. However, now that the HAART has been launched and the mortality and morbidity rate has been decreasing, it would be unethical to withhold this option in the absence of evidence that it is either unsafe or ineffective. Advancement in HIV Therapy: HAART era Highly Active Antiretroviral Therapy (HAART) has been the primary improvement in the treatment of HIV-infected patients in the previous decade. Numerous studies and observations had proven that advantageous outcomes of HAART also include improvement of HIV-related renal complications. Virologic and histologic evidences imply that HIVAN perhaps the result of HIV-1 reproduction in the kidney. The potential relation of HIVAN with HIV-1 replication in the kidney is associated with epidemiologic and medical records showing that HAART may improve HIVAN. On the other hand, from nephrologist’s perspective, one effect of this achievement has been the emergence of new kidney diseases related to (1) enhanced management of the HIV infection and (2) the prospective nephroxicity of antiretroviral treatments. According to the studies of MD Roland and Stock, medical tests have confirmed apparent survival benefits linked with the use of protease inhibitor (PI)-containing or non-nucleoside reverse-transcriptate inhibitor (NNRTI)-containing regimens (HAART). Epidemiologic statistics show reduced mortality, hospitalization rates, and opportunistic infection (OI) incidence associated with HAART. There have been vivid decline in new AIDS-related OIs, the majority of which are now occurring in people with low CD4+ T cell counts and those who are not receiving medical care (University of California, 2007). Epidemiologic and modeling information sustain the clinical trial efficacy data, signifying that HAART has a considerable effect on medical result (Roland & Stock, 2003). Survival Rate Using the United States Kidney Data System (USRDS) data, the Journal of the American Society of Nephrology analyzed and studied these inputs to find out whether recipient HIV serologic status remains the primary factor in graft and patient survival in modern clinical transplantation. Ninety-five percent of the HIV-infected patients survived after transplantation and only 4. 3% died. Although in the earlier USRDS studies of kidney recipients before the introduction of HAART, the results showed that HIV-infected recipients had a survival of eighty-three percent while the uninfected patients have eighty-eight percent survival rates. While endurance records of HIV-infected and HIV-uninfected patients is almost the same, selection bias may have occurred, prioritizing the healthier patients than HIV-infected individuals. Also, in the studies of MD Roland, data showed that graft survival and rejection rates of HIV-infected patients who had gone through transplantation were similar to those HIV-negative patients (Roland & Stock, 2003). Studies and Observations Methods. This study aims to observe safety and success of kidney transplantation, and learn the effects of immunosuppressant treatments on HIV infection, with the approval of the Institutional evaluation board of two universities: the Drexel University College of Medicine and Hahnemann University Hospital. Forty-five recipients with HIV infection from February 2001 to January 2004 were observed. Patient inclusion criteria were maintenance of HAART, plasma HIV-1 RNA of

Tuesday, July 30, 2019

Mcbride Financial Service Essay

The purpose of this paper is to develop a marketing plan for McBride Financial Service. The paper will include what type of market research McBride should undertake. The various types of media Mcbride should use in the marketing plan. This paper will cover McBride’s target markets and explain why they are targets for McBride Financial Service. This paper will also cover what the considerations are for McBride to conduct a portion of their marketing on the Internet. Market research is a technique used to determine the acceptance of a product or service within different demographics. In the book Marketing: An Introduction market research is defined as [a systematic design, collection, analysis, and reporting of data relevant to a specific marketing situation facing an organization](Armstrong, 2011). A company can use market research to develop a target audience to help them pinpoint a specific demographic to market in. There are several forms of market research that McBride can use to help develop their marketing plan. The first would be online market research that will consist of Internet surveys and online focus groups. Online market research is easy for people in every demographic to participate in from home eliminating the need to travel to participate in focus groups. Internet surveys are taken online and the person filling out the surveys avoid the hassle of mailing the surveys back by simply clicking submit. Telephone interviewing is one of the fastest ways for a company to gather information for market research. Telephone interviewing is more personable than mail or Internet surveys and would be recommended for McBride Financial Services. An effective marketing plan should include using various types of media to advertise the goods or services a company offers. Types of media include radio, television, outdoor media, Internet, magazines, and newspapers. McBride Financial Service has many options to choose from concerning marketing media to advertise their organization. Television ads are seen by the most people, but they are also cost the most money to obtain a prime spot. Radio can target specific audiences at a lower cost but a company needs to buy time on several stations to obtain good reach. It is recommended that McBride incorporate a mixture of media in their marketing plan. These following types of media will be included television, radio, Internet and, magazines. Television as mentioned earlier in this paper is the best form of advertising so McBribe cannot hope to have a good marketing plan without it. Television ads will not be the main form of media because of the high cost. Because one of McBride’s target markets is retirees they will be buying ad space in retirement magazines like AARP. This will allow McBride to focus in on retired people or are getting close to retirement. Newspapers are a dying form of media so McBride will avoid buying ad space in any of them. This section of the paper will focus in on why Mcbride should consider conducting a major portion of their marketing via the Internet. The Internet is a major influence in society today with millions of people surfing the web every hour. This is an opportunity that McBride needs to take advantage of to capture the attention of an ever-growing population on the Internet. Buying ad space on a website is inexpensive compared to television and radio that is a major advantage for McBride. Ad space on major Internet sites is a â€Å"double edge sword† for McBride’s marketing plan. The first is that people will see the ads every time a person opens his or hers favorite website. The second would be a direct link to McBride’s website allowing even more exsposer for the company’s services. This section of the paper will cover McBride’s target market. Entrepreneur. com defines a target market as a specific group of consumers at which a company aims its products and services (â€Å"Target Market†, 2011). The site continues to write that target customers are those most likely to buy from a company. McBride has a target market shown on the home page of their website and it consists of professionals purchasing primary or secondary properties, retirees purchasing primary or secondary properties and families or individuals purchasing recreational properties. It seems like every adult in the world would fit into McBride’s target market that is not a bad target market, but it may be a wise move to narrow it down. Sticking with retired and professionals purchasing property would allow McBride to maintain a manageable target market. If the target market is too big McBride would have to cater their marketing media budget to too broad a campaign. McBride’s target market is anybody who is looking to buy property whether it be primary or secondary. In conclusion this paper has described a marketing plan that can be implemented by McBride Financial Service. The marketing plan will include market research strategies such as Internet surveys and telephone interviews aimed at collecting information. The media will play a part in McBride’s market in the form of television, radio, and Internet ads. The considerations for McBride to conduct a portion of their marketing online were covered in this paper. Finally the target markets for McBride Financial Service were discussed at the end of this paper.

Monday, July 29, 2019

Modernity versus Westernization Essay Example | Topics and Well Written Essays - 4250 words

Modernity versus Westernization - Essay Example Modernity is the concept by which there is a discontinuation of the past from the present. This discontinuity arises from social and cultural changes which occur through progress or decline. The premise is life in the present is different from life in the past. This is a view held globally and clashes with tradition which stipulates that the present is a continuation of the behaviour and events of the past and continue to be repeated. Modernity is viewed as a problem since it challenges and replaces the traditional way of life. It results in alternatives and unmanageable changes and that the present is merely a period of transition and is not directed towards a specific future goal. The changes happening at the present and in which will happen in the future are seen as products of forces beyond our control. Modernity presents a vast selection of alternatives such as in lifestyle and historical possibilities. In contrast, traditional culture offers the present a certain number of alte rnatives. The proliferation of alternatives is often seen as a threat to tradition and efforts are made to limit these alternatives.Westernisation is a form of modernity. There is discontinuity between the past and the present. However, there occurs a specific phenomenon in westernisation wherein traditional societies come under the influence of western culture. Western culture permeates and influences industry, technology, politics, law, economy, lifestyle, values, religion, and almost every niche and aspect of society. It had accelerated its influence throughout the world these past few centuries. It is related to the process of acculturation wherein changes happen within a society or culture when two different groups come into constant and direct contact with each other. The result are changes in the cultural patterns of one or both groups. In the case of westernisation, the changes in cultural patterns occurs in native societies as they come into contact with western cultures an d are exposed to their influences. B. Religion and social movements Many studies have shown that religion helps to mobilize resources for groups and organizations that are engaged in democratic movements or safeguard the interests of marginalized sectors. It provides much needed social capital and democratic skills that are requisites in democratic participation. As political alternatives and political discussions happen in civil society, religion provides sustaining support to it. Christian Smith's "disruptive religion" takes notice of the "religious assets for activism", many being cultural assets. His work shows that religion is important in social protest. His study on U.S. religious resistance to counterinsurgency activities in Central America gives insight on the moral outrage which served as the basis for "insurgent consciousness". Smith showed how certain individuals were made receptive to mobilization with religion moulding their sensibilities such that their violation results in outrage. Religious networks also made people "subjectively en gageable" to mobilization. Smith sees people as moral beings who try to create their lives out of external tensions and divisions (Wood 1995). Many of the changes that have occurred worldwide these past four decades can be attributed to or in part effected by religion. Many religious leaders have not only served as proponents or initiators, but have paid dearly with their lives. Religious nationalism has become active these recent decades, connecting religious convictions with the population's political and economic destiny. Many nationalist movements have incorporated the revival of traditionalist religious doctrines in their national identity and leadership. Among the strongest forces in religiously influenced social movements is Islamic nationalism which has influenced both national and international politics. The encroachment of western influence into the Muslim world during the 19th century spurred movements seeking the restoration of

Sunday, July 28, 2019

Nuclear Power Research Paper Example | Topics and Well Written Essays - 750 words

Nuclear Power - Research Paper Example In this reaction, the heavier and unstable nuclei breakup into corresponding smaller nuclei releasing a large amount of energy (nearly infinite amount of energy). The two corresponding nuclei split into other lighter nuclei again releasing large amount of energy. Thus the reaction continues until all the radioactive material releases energy. The energy released in the process is the thermal energy, which is then converted to the electrical energy by utilizing the procedure utilized in the thermal power plant. The process involves the generation of steam, heating the steam to 600 degrees and then utilizing the steam to run the turbine that runs the generator. The energy released in the nuclear reaction sometime become excessive than the required amount. In this way, there is a need to remove the excess energy from the reactor to prevent any reaction. To control the evolution of heat in the reaction several methods are adopted like utilizing the water as a coolant to dispose off the ex cess thermal energy, utilizing neutron moderator, molten salt or liquid metal. The most common method is to utilize the water while neutron moderator that slows the reaction down is also utilized. Graphite is a type of neutron moderator that is mostly used in the nuclear reactor. Cooling towers construction method is utilized for the power plants that are far from the shores. A nuclear power plant has seven major components. The most important is the nuclear fuel that is mostly Uranium. The second important component is the moderator that slows the reaction. Mostly heavy water and graphite are utilized to work as moderator. Control rods are also important component that absorb the neutrons and control the thermodynamics of the reactor. Elements such as cadmium, hafnium or born can be utilized in the control rods. Coolant is also an important factor that constantly maintains the thermal energy of the reactor. A liquid (mostly water) or a gas circulates through the core to remove the excess heat from the reactor. Pressure vessel or pressure tubes are also important component of the nuclear power plant. Reinforced steel is utilized in the component to resist the pressure of steam, hold the fuel and convey the coolant and moderator to the nuclear power plant. Steam generator is utilized in the Pressurized Water Reactor (PWR) where a part of cooling water is converted to steam to run the turbine. The cooling system is separated from the primary core compartment (World-Nuclear. Association, 2012). Containment is the structure around the reactor core that protects the reactor from outer environment and outer environment from the reactor. There are many advantage and disadvantages of the nuclear power. The most important benefit of the nuclear power is that the nuclear power is free from the green house gas emissions. Another advantage of the nuclear power is that it is the most concentrated form of power and a kilogram of nuclear fuel yields as much power as a ton of coal, thus minimize the solid wastes. Nuclear power is the type of power that is best capable of providing the base load (Moens, 2012). However, the major disadvantage of the nuclear power is that it has the largest capital cost that any other power generation system would have, which rises the per kilowatt cost of the power. Another disadvantage is that the

Saturday, July 27, 2019

Midterm Essay Example | Topics and Well Written Essays - 1750 words

Midterm - Essay Example Teachers who scored high in the survey were contacted through an individual interview, which was a blend of intrinsic and extrinsic motivation. This study increased the research about motivation among teachers, and supported future studies related to motivation among teachers in urban schools and the influence of demographic characteristics upon their decision to stay. Central questions that this study sought to answer were: Are science teachers in urban setting intrinsically motivated about persisting in urban schools? Do years of experience/race affect science teachers’ motivation (autonomy, relatedness, and competence)? How the decision to stay was affected by science teachers’ practice and identity? These questions were answered based on results of the Intrinsic Motivation Study. The results of this study suggested that teachers have intrinsic motivation as well as extrinsic motivation. It was found that years of experience and ethnicity did not affect teachers†™ motivation to stay and teach in urban schools. Chapter 5 provides a full account of the data and results of the study. The following paragraphs provide a summary of the findings of the study, discussion, implications, and recommendations for future research. Interpretation of Findings Survey The majority of teachers did not agree on reporting which intrinsic motivation factors were more important to them. There might be other motivational reasons (extrinsic or intrinsic) that result in their job persistence. In this study, I only investigated the autonomy, relatedness, and competence among science teachers. I recommend future researchers to do compression between extrinsic and intrinsic motivation among teachers, which will give a better vision about the motivational factors. Next, findings from the analyses revealed that none of the dependent variables were impacted by the independent variable. The results from ANOVA indicated that it could not attribute differences in intrinsi c motivation and working experience to either ethnicity or teaching experience. The independent variables that were studied did not significantly affect the majority of science teachers’ intrinsic motivation. In terms of years of experience, the findings came to an understanding of Huang and Moon (2009), who found that after 21 years of teaching experience, student achievement dropped. In this study, 36.2% selected a general response, indicating more than 15 years of teaching experience. Also, The National Board for Professional Teaching Standards (NBPTS) certification found that many teachers were still in the stage of gaining proficiency and improving their effectiveness after an average of 11 years of teaching. So, experience might not be a precise variable to test competence, autonomy, and relatedness. Hence, it is recommended for future researches to find the experience more valuable by conducting such a study which compares beginners with stayers. In terms of the ethnic ity, the majority of teachers were white as 68.1% of them indicated having White/Caucasian ethnicity. The high percentage of Caucasian ethnicity was likely to bias the data; however, my data supported The National Education Association (2007), which reported that more than 38% of schools across America do not have teachers of color in

Friday, July 26, 2019

Solar Power Industry Essay Example | Topics and Well Written Essays - 1000 words

Solar Power Industry - Essay Example The success of U.S oil production company, Shale, has caused various producers sleepless nights. GCC countries are greatly concerned with this ‘unhealthy’ trend that is hurting their economies badly. Augustine (2013, December 9) reports that many cities and countries in the GCC such as Doha, Qatar have undergone massive development due to high oil prices. This article piqued my interest as it focuses on the future and affects every country. Also, it spots various loopholes in the developing countries. Further,it proposes various measures that the young citizens of various developing countries should put to task to ensure their respective countries are at par with global standards in various sectors such as technology, education, and the service industry in the future. In an effort to explore the on-surface effects, as well as the extended market effect, I will explore various microeconomic concepts such as the theory of the firms, consumer theory, and the demand and supply side of the market. The ease with which new firms enter market imposes great threat to existing firms and the future of such industry (Perloff, 2011, p. 154). This can result to possible exit of other firms in the event a firm that enjoys great economies of scale engages in unhealthy business competition. Shale company successful positioning in the market due to high technology it employs in mining has made it increase its output with the current level of inputs. It experiences increase return to scale due to efficiency with which it conducts its operation. Consequently, it can decide to lower the prices of its product and this will impact negatively on the future of other firm, and various positions they hold in the market. A single firm’s action in a competitive market affects other firms. The global oil price is expected to fall below $100 a

Manging Financial Resources and Decisions Assignment - 1

Manging Financial Resources and Decisions - Assignment Example (NEEDHAM. 1995) Each source of finance has its cost which is an important factor to consider in choosing the source of finance. Equity capital as a source of finance, through ordinary and preference shares has a cost of share in the company’s holding and dividend payments have to be made to the shareholders. Retained profits as a source of finance potentially involve no cost to the company. Debentures are another important source of finance which has interest payments to be made to the debenture holders. Bank finance and overdraft facility by the banks also involves payment of interest to the banks. On the other hand specific assets can be funded by hire purchase and leasing which will involves rental payments to the lessor. The company can also use its trade debtors for short term source of finance which could be done by factoring. This could involve an amount of payment to the factoring company and in some cases loss of reputation as the factoring company may not treat the debtors well. (D RANSFIELD. 2004) Mr. Singh needs finance to fund the premises and start up his business. He might not require additional money for starting up of this business as he already got a redundancy payment. To finance the premises Mr. Singh can obtain a mortgage loan from any bank and financial institution. This is the most appropriate source of finance for the premises, land and buildings. The lending institution will process the loan and Mr. Singh would get to start his business immediately and can repay the loan over the years as his business gets stronger. (NEEDHAM. 1995) A public listed company has many options to be used as a source of finance. The company could raise  £ 5 million by either equity finance or debt finance. There will be various factors that need to be considered for both the options. For equity financing the company has to see its authorized share capital before issuing new shares. For debt financing

Thursday, July 25, 2019

Volunteer and wildelife Tourism Assignment Example | Topics and Well Written Essays - 250 words

Volunteer and wildelife Tourism - Assignment Example Some of the animals which are hunted for trophy in Canada, include the polar bear, Canadian moose, Canada whitetail deer, Canada ducks and many others. This act of trophy hunting has its own impacts socially, economically and even environmentally. The impacts are categorized as either positive or negative impacts to the society, environment and the economy (Novelli, 2005). The advantageous effects of trophy hunting include infrastructure development, which entails a reliable transport system, rural development and increased job opportunities. The job increase is witnessed since many people are needed to protect the wild game. Increased contribution to the Gross Domestic Product (GDP) and government revenue from the businesses related to trophy sales is also another advantage that is accrued from trophy hunting (Novelli, 2005). Noise pollution from the machines used, creation of illegal roads in protected zones and impacts on the sanitation and water resources which affect both the wild game and the aquatic life are some of the disadvantages of trophy hunting (Novelli,

Wednesday, July 24, 2019

Policy Analysis Essay Example | Topics and Well Written Essays - 1000 words - 1

Policy Analysis - Essay Example The center sought to consolidate the country’s security resources such as personnel, databases, and infrastructure in the fight against terrorism. This way, the process of tracking, apprehending and litigating terrorists become easier and faster possibly creating a safer society for the American population. Rule Terrorism is the greatest threat to the American development and often jeopardizes the country’s ability to provide her citizens with the quality of life it espouses on its bill of rights. Terrorism is the worst international crime that seeks to instill fear on a country’s population thereby sparking revolt against the serving government. Terrorists operate on the principles of mass destruction and murder thereby instilling fear on the citizens owing to their government’s ability to protect them. Such are likely to stifle the government’s operations thus causing constitutional crises in the country. With an elaborate understanding of the abi lities of terrorism and the intent of terrorists, the country developed the Homeland directive in order to increase protection on the American president. The United States of America is the global super power with the best economy and the strongest military apparatus in the world. With such titles, the citizens of the country therefore feel entitled to several life provisions such as increased longevity owing to the government’s ability to provide a safe and secure environment. The president of the United States of America is an international figure of both power and authority. Should terrorists access and cause injury to such a figure, it would portray the country’s inability to protect its institutions of power thus imply that the citizens are most vulnerable. The country invest billions of dollars in guaranteeing the safety of her presidents in order to prevent the recurrence of the murder of serving presidents as witnessed with two historical figures. Application H omeland is the security outfit mandated with the internal protection. The security outfit has an unprecedented amount of resources to carry out extensive research on battering the state of security in the country. The homeland security presidential directive 6 provides the security outfit with the ability to monitor the activities of the citizens and every other person migrating into the country in order to determine the terrorists networks and their supporters. The directive provides for the establishment of a terrorist screening center administered by the Federal bureau of investigation, which is the country’s biggest security apparatus with access to the international security contraptions has the ability to keep the country safe from both internal and external threats. Several security bodies in the country approved the development of the terrorist center in order to integrate the operation of the previously segmented security apparatus that often resulted in confusion of jurisdiction in the country. After the 9/11 incident, the government determined the potential of the country’s enemies and therefore developed a number of security institutions to help create a safer nation. The 9/11 commission approved the development of the screening center since such would pool the country’

Tuesday, July 23, 2019

6340 week 1 posts Assignment Example | Topics and Well Written Essays - 250 words

6340 week 1 posts - Assignment Example The questions you have raised shed are amazing because you bring out an aspect of research and teaching experience of the faculty that are existing which have not been discussed by others and none of the advertisements I have encountered mention any of that. I however wonder if you would explain why there is need to know the experience of the existing faculty and what relevance that information has on the roles of the nurse educator (OShea, 2002). I also think a secondary research will provide some of that information. The first job’s requirement of employing a US citizen is not only limiting but also prejudicial because US is composed of many nationalities some of whom are more educated and qualified and I have an experience of that. In addition to the questions about accreditation of the institution, the accreditation of the nurse educator who will be employed there may be questioned later by future employees and hence should be a point of concern for the applicants (National League for Nursing Certification Governance Committee, 2005). Further information especially about accreditation can be obtained from websites of higher education in that

Monday, July 22, 2019

IT Ethics and Security Essay Example for Free

IT Ethics and Security Essay The bill of Children’s Internet Protection Act or CIPA is included in the United States Congress and is recommended to keep a tight rein on children’s disclosure to obscene websites and explicit material available on the internet and online. This bill was proposed by the Senator of Arizona, Mr.  John McCain who wanted CIPA to be in United States Senate in the year 1999; however it was not included until various other delegates launched it in the United States House of Representatives, subsequent to which an absolute version was made and passed on the 15th December, 2000 after President Bill Clinton brought it into Law on 21st December, 2000 which after a few years on 23rd June, 2003 finally got defended by the Supreme Court of United States of America (US District Pennsylvania, 2010). This law requires the schools and public libraries to use internet safety filters for the reception of certain national financial support. Therefore the Supreme Court of United States of America has followed on constitutionality CIPA and has been providing them with the relieves to acquire reasonably priced telecommunications and Internet (Willard, 2007). Supreme Court of United States of America’s ruling on CIPA The purpose of CIPA was to provide the libraries and schools of the USA with support for internet and telecommunication facilities and this has been followed perfectly since the Supreme Court of USA approved it however it has certain limitation. A legal apprehension for instructors is lawsuits brought through anxious parents and associations. Through certain internet filters the minors can be saved from the explicit content on the internet which may rot their minds at a very early age so this helps in preventing the data of school from being seen by some other sources and, therefore from all points provide maximum security to the children and their families (US District Pennsylvania, 2010). As mentioned there are certain limitation to the support program which includes that as per CIPA, schools and libraries under CIPA do not obtain the concession accessible through the E-rate program, which is a concession that provides the facility of internet to schools and libraries, until they confirm that they have all the internet security measures in place which include the filter of blockage of pictures which are obscene, which may contain explicit material or certain data which might be bad for the children’s mind, therefore the schools which have CIPA facility need to have proper monitoring system which is too under check of the USA authorities jus in case of any violation (Willard, 2007). Also the educational institutions and libraries under the watch and aid of CIPA have to implement an authority and are inquired about to check the children while they use the internet, send any electronic mail or use some kind of chatting resource through the web while special check on certain hacking or misuse of internet by a minor is done and all the information is under supervision of the authorities however it does not need tracing of internet and the websites used by the children or any adult during the subjection to CIPA as it can be done by the supervisor of the place where the internet is being used (US District Pennsylvania, 2010). Hence this has been one of the greatest steps taken by the United States government and surely has a brilliant positive effect on the minors as they not only learn the use of internet but are also protected through it. Conclusion The united states government has always taken steps for the betterment of its citizen and the ones through which they can be benefitted therefore this step of CIPA ruling under the Supreme Court of the USA deserves appreciation and especially the people who donate funds to help the schools and libraries running and provide facilities the young minds

Globalisation and HRM

Globalisation and HRM This assignment discusses on the link between globalisation and HRM. It explains how HRM practices like recruitment and selection should be carried out in order to improve organisation performance and enhance important corporate aspects like how to dominate the global market. Human Resource Management is act of dealing with people in an organisation how to manage their behaviour and activities to increase profits. According to Decenzo and Robbins, (2004), and Bernardin, (2003), Human resources management (HRM) is the function within an organisation that focuses on recruitment of management and providing directions for the people who work in the organisation. Human resources management can also be performed by line manager and deals with issues related to people such as performance management, hiring, wellness, benefit safety, compensation, training and communication. In addition, HRM is the sense of getting things or work done through people. Its an essential part of every managers responsibilities, but many organisations find it advantageous to establish a specialist division to provide an expert service dedicated to ensuring that the human resource function is performed efficiently. Also how HRM processes should be in order to cope with global issues. The effect of globalisation on recruitment and selection is seen clearly now that organisations need to recruit people that are able to work in global situations and contribute to the global environment. According to Castells M, (2000), Globalisation is an inevitable phenomenon in human history that has been bringing the world closer through the exchange of products, information, goods, culture, services and knowledge. Over the last decades the pace of this global integration has become much faster and dramatic because of unprecedented advancements in science, communication, transport, technology and firms. So HR managers should understand how to cope with all these changes especially as many people prefer to get high quality products if they are offered from abroad. If companies understand this, they will reach organisational goals effectively. Saiyadain M (2004) According to Globalisation has contributed to various competencies which organisations have found effective to improving profit. Other positive aspects include financial organisation situations; where the developing counties have benefited from developed countries and financial organisations such as IMF (International Monetary Fund) and WTO (World Trade Organisation), where by these organisations invest money or commerce loans to the financial organisation. Also, globalisation has created thousands of jobs around the world and also has contributed to the growth of the worlds economy. In other contribution, globalisation has been effective to providing access to technological improvements and has also led to the reduction of barriers to trade. A market is what a business targets to benefit from by satisfying consumer needs. According to S. Skinner, (1998), a market is a social arrangement that allows buyers and sellers to discover information and carry out voluntary exchange of goods and services. Its one of the two key institutions that organize trade, along with the right to own property. Its importance to globalisation is to make the producer know what consumers of the market need at the moment in terms of satisfaction and organisation practices. Globalisation has made organisations to participate in local and international markets to improve quality of trade and the level of business operations. HRM needs to work on practical matters that affect their business because they need to cope with everyday changes and balance internal and external issues. There are issues over importance of communication or culture. These include issues about the rate of importance between background culture and adopted culture. However, it sometimes depends on the situation of the company. Contribution of the employee depends on the environment he or she is in. In case employing someone from a less developed country, training would be right measure for improvement. However, if he person is from a more developed region, then the HR department may want to just tech the person how to cope with the environment and the individual will be able to participate fully in everyday business. Capon C, (2004), Capon C, (2004), states that Development of global telecommunication infrastructures has led to success in establishing stable communication through service such as cell phones, internets, and satellites in the developing countries such Kenya, Uganda and Somalia. This has provided a link of third world countries to developed nations thus reducing world poverty. This point shows how important HRM is to the world, as recruiting the right person to telecommute can change the world. Globalisation has made trade liberalization; whereby every one can gain the movement to lower trade barriers and to open the world trade. It has increased the growth of goods and services, where people have got more income to improve the living standard in the society. Foreign competition is increasingly extending beyond the goods firms. Outsourcing of services in dorks, such as call centers. Its important to the business due to less cost. but is it morally acceptable by your customers. It improves cultural awareness between organisations, where it brings employees of different background of culture to work together without any conflict in the working environment. Saiyadain M (2004 Even though there are positive aspects, there are also negative issues that globalisation can cause. These include; Environmental pollution increases with globalisation as countries manufacture more products to satisfy demand. Also there is increase of carbon emissions to the atmosphere, whereby people are always traveling from one place to another, for example when and individual is assigned to work globally, he or she will have to travel by air thus contribute to air pollution. HR managers should act responsible and protect the environment. This could be done by limiting the number of trips carried out by the employees if possible, and also using transport means which are more environmental friendly. Capon C, (2004), Globalisation encourages development in already developed countries therefore leaving less developed countries to become poorer. Recruitment is the process of identifying that the organisation or company requires employing someone to the point at which application forms for the post have arrived at the company. According to Saiyadain, (2004), recruitment is the process where the organization gets people to work for them so as to be part of the organisation functions. A successful recruitment depends upon finding the right people with the necessary skills, knowledge, experience and qualifications to do the work required together with the ability to make a positive contribution to the values and aims of the company or organisation. Mendenhall M, (2007), Selection then consists of the processes involved in choosing from applicants, suitable or the right person to fill the post needed in the organisation with the right qualification. The selection process needs to be well carried out because HR managers may choose the wrong people and leave the right people. Matthewss J et al, (2004), states that, recruiting people who are wrong for the for the organisation can lead to increased labour turnover, increased costs for the organisation and lowering of morale in the existing workforce. Such workers are likely to be discontented, unlikely to give of their best and end up leaving voluntarily or involuntarily when their unsuitability becomes evident. They will not offer the flexibility and commitment that many companies seek. Managers and supervisors will have to spend extra time on further recruitment exercises, when is needed in the first place is a systematic process to assess the role to be filled and the type of skills and abilities needed to fill it. Most recruitment systems will be simple with stages that can be followed as a routine whenever there is a vacancy to be filled and which can be monitored and adapted in the light of experience. According to Dessler, (2005), The organisation should be aware that the provision of the disability discrimination Act 1995 not only makes it unlawful to discriminate against disabled individuals without justifiable reason but also require employers to make reasonable adjustments to the workplace arrangements. Brewster C et al, (2007) states that The employer has the legal responsibility to ensure that no unlawful discrimination occurs in the recruitment and selection process on the groups of race, age and religion. Equality of opportunity is an integral part of the recruitment and section process, and to these end employers may offer encouragement and training to any under represented group of workers. For example to the management development of woman who are under- presented in management grades. The world in which human resource managers exist and with which they interact is continually changing, generating new issues and challenges for HR managers to consider during recruitment. There are specific qualities that managers should look at when recruiting for specific functions in the organisation. With the increase in intensified competition among organisations in aspects of performance, productivity and competent expertise, HRM managers are faced with a challenge of recruiting professional staff to have a competitive advantage in the market. According to Porter M (1998) Competitive advantage is an advantages ove competitors gained by offering cunsumers greater value, either by means of lower prices or by providing greater benefits and services that justifies higher prices Although recruitment has always held an important place within organisations the growing demand for highly skilled staff has meant that effective recruitment practices are now becoming a considerable resource of competitive advantages used to improve performance. This recruitment and selection learning module is designed to prepare individuals and trainers to introduce effective recruitment and selection systems. In addition the learning pack clearly outlines how to introduce a supporting measurement system for the recruitment process to maximize both individuals and organisations efficiency. Capon C, (2004), states that, With the increased pace in globalization, organisations are now operating under a multicultural environment. Hence organisations face a challenge of recruiting knowledgeable, talented, and skilled employees from different background as they are able to manage internationally. Multicultural environments boost business performance since there are different views from participants. Capon C, (2004), states that, Moreover, the riding wave of technological innovation forces the HRM managers to recruit staff who posses the acquired knowledge need to operate new machinery, equipment which are equipped with the new knowledge E.g. the use of email and internet as tools of information provision and communication, the use of computer databases to hold staff information and generate reports. Pareek U, (2004), states that, Furthermore, with global standardization of policies practices and HRM philosophies, the HR needs to diversify their strategies. Also organizations need to react in a way that is satisfactory to both the employees and consumers. For example, HR manager should emphasize on employing people who know proper hygiene when preparing food for the customers, in three years ago MacDonalds food chain received complaints from his customer that the food prepared was not good for the health of people, whereby their food contained a lot of fat and other unhealthy contents. Thus individuals who used to be loyal customers had a risk of becoming obese. At the same time, workers left their work due to the complaints from customers. MacDonalds therefore lost a lot of customers in a certain point as before, but after sometime, they changed the way of preparing their food and how they offer their services, then the number of customers also increased much more than the previ ous. According to Bernardin, (2003) Meeting the expectations of the law, the employer has the legal responsibility to ensure that no unlawful discrimination occurs in the recruitment and selection process on the grounds of sex, race, disability, sexual orientation, age and religion. Equality of opportunity, its an integral part of the recruitment and selection process and to this end employers may offer training and encouragement to any under represented groups. Brewster C et al, (2007) states that, Employees and their representatives will also have an interest in fair, non discriminatory recruitment and selection policies, and they should be fully consulted when new procedures are introduced or existing procedures reviewed. The sex discrimination Act 1975, the race relation Act 1976 and 2000, the employment equality regulations and the disability discrimination ACT 1995 set out the legal requirements for employers. Capon C, (2004), States that, The organisations should be aware that the provisions of the disability discrimination Act 1995 not only make it unlawful to discriminate against disabled individuals without justifiable reason but also require employers to make reasonable adjustments to the workplace or working arrangements. Detailed guidance is available in the code of practice on the elimination of discrimination in employment. Robert et al (2004), and Dessler, (2005), Some of the issues which make the link between HRM and Globalisation more intensified include the rate at which the HR manager responds to Global-economic activities. For example if there is an absolute market in a different country, the HR department is responsible for defining means of which the business will perform in order to capture the market, including recruiting the right people for the job, and training them for them to learn how to develop. Pareek U, (2004), In conclusion, responding to intensified competition is crucial for an organisation since without competition its difficult to progress and offer excellent services. As a HR manager, understanding this concept will help the manager in defining exactly what the organisation prefers in terms of who to employ, and as a result, the right people will be employed for the job thus generate profit. In addition, the profit will even be high since the global economy has offered more market share to businesses. Reference Capon C, (2004), understanding organisational context 2nd Edition, Pearson education limited England. Brewster C et al, (2007) international human resource management, 2nd chartered institute of personnel and development, London. Pareek U, (2004), designing and managing human resource systems 3rd edition, Vijay Primlani, New Delhi. Mendenhall M, (2007), international human resource management, 4th Edition, Routledge, London. Matthewss J et al, (2004), human resource development 3rd edition Kogan page, New Delhi Decenzo, D and Robbins, S (2004), Personnel/Human Resource Management, Third Edition, Prentice Hall Inc, New Delhi. S. Skinner, (1998), Marketing, Houghton Mifflin, USA Bernardin J, (2003), Human Resource Management, Third Edition, Tata McGraw- Hall, New Delhi Robert C, et al (2004), Managing Human Resource, Third Edition, Pearson Education Inc, New Delhi Dessler G, (2005),Human Resource Management, Ninth Edition, Pearson Education, New Delhi Porter, M, (1998), Competitive Strategy, Free Press, USA Saiyadain M (2004), Human Resources Management, Third Edition, Tata McGraw- Hall, New Delhi

Sunday, July 21, 2019

Smartphone Operating Systems: Evaluation Enhancements

Smartphone Operating Systems: Evaluation Enhancements Muneer Ahmad Dar Javed Parvez Abstract—The increasing number of mobile operating systems that operates the small hand held devices called the Smartphone, has become integral part of our lives. The openness of these new environments has lead to new domain of apps and markets and has enabled greater integration with existing online services like e-banking etc. Smartphone makers are competing in turns to trump each other for storage, processor speed, platform compatibility and camera megapixels but it’s the largely software the mobile OS that makes the biggest difference to the popularity and market share of Smartphone. This paper evaluates the popular Smartphone Operating Systems with the purpose of understanding the user friendliness, popularity, user privacy and security and accessibility with the wide range of apps. Our research focused on the advantages and limitations of the Smartphone operating systems with the intension to find out if one of them has an edge on the other and finally we propos e the enhancements so as to make them more user friendly and secure. Keywords: mobile Operating Systems; Smartphone; Apps; Processor speed; Megapixels; Security; Accessibility. Introduction Smartphone have become indispensible part of our life and everyone who uses it is getting addicted. Smartphone provides a wide variety of apps ranging from social networking to GPS based location searching that are useful for everyone in their day today tasks. In a study of 1,600 people including managers and professionals [1], Leslie Perlow, found that: 70% people said they check their Smartphone within an hour of getting up. 56% check their phone within an hour of going to sleep. 48% check over the weekend, including on Friday and Saturday nights. 51% check continuously during vacation. 44% said they would experience a great deal of anxiety if they lost their phone and couldnt replace it for a week. With these many professionals becoming dependent on Smartphone, which has necessary components of the computing platform: an operating system, applications and hardware. The main component of a Smartphone on which its functionality depends is the operating system ASmartphone,tablet or any other digitalmobile device is operated by the Operating system called the mobile OS. Modern mobile operating systems includes all the features of apersonal computeroperating system and in addition to that includes the features like atouch screen,cellular,Bluetooth,Wi-Fi,speech recognition,voice recorder, GPS mobile navigation,camera,video camera,music player etc. The Smartphone operating system (OS) development has grown to include competitors such as Google, Microsoft, Apple, Symbian, and Palm with each of them trying to make it more user friendly and secure. Although these operating system platforms are trying their best and have come achieved a lot since their inception, none of these Smartphone companies provide a mobile OS that is ideal and satisfies all the users in terms of user friendliness and privacy. They claim that their platforms perform the best in all situations and will certainly not advertise any weakness with their Operating systems. This makes it difficult for end users particularly to a novice user to know which platform is best suited for their need. In this paper, we perform a comprehensive analysis of each mobile operating system in order to identify the strengths of one Operating System over other operating system. Section II gives the overview of various Smartphone operating systems. In section III we identify the limitations of mobile operating systems. In section IV we propose the enhancements which could be implemented in the Smartphone Operating Systems and finally we draw our conclusions in section V. Smartphone Operating Systems ANDROID Andy Rubin, Google’s director of mobile platforms, commented â€Å"There should be nothing that users can access on their desktop that they can’t access on their cell phone.† [1]. with this vision the popularity of smart phones having Google’s Android Operating System is continuously on the rise in the 21st century. .Android is a comprehensive operating environment based on Linux kernel, it is also a layered system; the architecture of Android system is shown as in picture [3]. Applications layer is the site of all Android applications including an email client, SMS program, maps, browser, contacts, and others. All applications are written using the Java programming language. Application framework layer defined the Android application framework. All Android applications are based on the application framework. The Android application framework including: A rich and extensible set of Views that can be used to build an application with beautiful user interface, including lists, grids, text boxes, buttons, and even an embeddable web browser. A set of Content Providers that enable applications to access data from other applications (such as Contacts), or to share their own data. A Resource Manager that provides access to non code resources such as localized strings, graphics, and layout files A Notification Manager that enables all applications to display custom alerts in the status bar. An Activity Manager that manages the lifecycle of applications and provides a common navigation back stack.[1]. Figure 1: Android System Architecture [3] Some of the advantages of Android over other Smartphone operating systems is listed as under. The ability to run tens of thousands of apps just like the iPhone but with choice of phone models that you can choose from. The choice of with or without physical keyboard, shape, color, phone size, screen size, manufacturer, features, and phone carrier. No more monopoly by one company on one carrier. Android allow developers/programmers to develop apps (applications) in what is known as application without borders. Android is beginner friendly and supremely customizable the more you use Googles services, the more Android will shine Android has the majority of the market and the user experience is improving quickly. Google’s Android Now checks your location and calendar to automatically show you relevant info e.g. traffic to work, cafes, and flight details and lets you search with natural voice commands and replies with natural speech. Android is an open source service. This means that it’s free and anyone can use it. Anyone can modify and improve the software making it more effective and personalized. Applications are freely made and designed for Android by numerous app developers all over the world and these apps are offered for free on the Android market place. This feature of open source has also attracted mobile phone producers to manufacture phones using Android OS Android is not just an operating system designed for individuals but it also fulfills your business needs at the same time. Android market place offers numerous apps that are specially designed to manage your business. Now you can have a closer look at your business processes on the go with the help of these apps. IPHONE OS iOS is the mobile operating system developed by Apple Inc. It is the second most commonly used operating system behind Google’s Android. Unlike Android it can be installed only on Apple’s hardware. The iPhone OS has seen a rapid rise in popularity and garnered a large and dedicated user base. The iPhone OS has risen so far and so fast primarily due to the innovations on user interface and availability of 3rd party applications [11]. Unlike the Android security architecture, iOS security model provides different philosophy for achieving mobile device security and user’s protection. The iOS application platform empowers developers to create new applications and to contribute to the application store. However, each application submitted by a third party developer is sent to the revision process. During the revision process the application code is analyzed by professional developers who make sure that the application is safe before it is released the application store. However, such an application, when installed, gets all the permissions on a mobile device. Application might access local camera, 3G/4G, Wi-Fi or GPS module without users knowledge. While Android lets each user handle its own security on their own responsibility, the iOS platform makes developers to write safe code using iOS secure APIs and prevents malicious applications from getting into the app store. The iOS security APIs are located in the Core Services layer of the operating system and are based on services in the Core OS (kernel) layer of the operating system [14]. Application that needs to execute a network task, may use secure networking functions through the API called CFNetwork , located in the Core Services layer. The iOS security implementation includes a daemon called the Security Server that implements several security protocols. The Security Server has no API with public access. Instead, applications use the Keychain Services API, the Certificate, Key, and Trust services API, which in turn gets access with the Security Server. SYMBIAN The Symbian OS was designed specifically for mobile devices with its small memory footprint and consumes low power. It is an open OS, enabling third party developers to write and install applications independently from the device manufacturers. An extensive C++ API is provided which allows access to services such as telephony and messaging, in addition to basic OS functionality. The Symbian OS was designed so applications could run for years without losing the user data. Also the OS has the capability of being platform independent and can run on more than one hardware platform [6, 7, 8, 9]. WINDOWS MOBILE This platform is based on Windows CE (WinCE). WinCe is a compact OS specifically designed for pervasive devices. It is focused on providing a consistent interface for applications on various hardware platforms which emphasizes portability by providing the user with the Win32 API. The hardware platforms include Packet PCs, Smartphone, Portable Media Centers, and even onboard computers in automobiles. The Windows Mobile platform was designed for flexibility and with the developer in mind. For that reason it was designed to support lots of preemptive multitasking. It supports a whopping 256 priority levels for threads and up to 32 processes. It supports all of the standard mutual exclusion and synchronization methods you would expect from a desktop PC. This functionality makes it ideal for a Smartphone because the users typically demand multitasking and want to be as productive as possible [4, 7, 8, 9 ]. PALM OS Palm OS is a proprietary operating system originally developed by Palm Inc. In the early versions (preà ¢Ã¢â€š ¬Ã‚ Garnet), the Palm OS was primarily utilized in Palmà ¢Ã¢â€š ¬Ã‚ developed Personal Digital Assistant (PDA) mobile hardware units. At one point, Palm PDAs with the Palm OS held 85% of the market share in the mobile device market [12]. However, in recent years, Palms market share has been in decline, mostly due to the stagnant nature of the OS development and has yielded the leading position to Symbian [6, 7, 8, 12]. Limitations of Mobile Os As discussed in the previous sections, the mobile operating systems are competing for the major market share and are claiming to be the best for the users, yet they have number of limitations in their platforms which for obvious reasons they are not disclosing to their users. The malicious apps aimed at mobile devices have risen from about 14,000 to 40,000 in less than a year. This rise in the malicious apps requires the strong OS. The limitations of the Mobile operating systems are listed as under: All or No Permission: A user cannot grant single permissions, while rejecting others in order to install the app. Among the list of permissions an app might request a suspicious permission among the other legitimate permissions, will still be able to confirm the installation. Mobile devices may download malware which the mobile OS is not able to trace. The novice users may download apps that contain malware unknowingly because it can be disguised as a well known game, security patch by OS, utility, or other useful application. It is difficult for users to tell the difference between a legitimate app and one containing malware. Often, the users of the app cannot judge the appropriateness and legitimacy of permissions for the app in question. In some cases it may be well understood, for example when a chess game app requests the privilege to reboot the Smartphone or to send SMS messages. In many cases, however, users will simply not be able to understand the appropriateness of the permission. Functionality, which is supposed to be possible only given the appropriate permissions, can still be achieved with less number of permissions or even with none at all. In case of the iOS , the user is not at all informed about any of the permissions. The app can access any of the resources without the permission of the user. Resistance of Android and iOS against various attacks. Proposed OS Enhancements In order to enhance the security of the mobile operating systems we propose the following Enhancements: Need Based Permission System (NBS): The Need-Based Security (NBS) system designed to enhance the privacy of the user at run time. The main advantage of the proposed NBS system is that the user is informed about the authorized and unauthorized access of the resources at run time. The NBS system can be implemented in the operating system to provide the permissions at run time. Currently the Os is either including all the permissions without the information of the user as in case of iOS or it forces the user to accept all the permissions at install time as in case of the worlds popular OS Android. The most important file AndroidManifest.xml which lists the permissions of the app can be modified at run time by providing the need based permission system whenever the app is asking for the permission the user may be informed at that moment. For example, let us examine the Dial Kashmir app available on Google Play which gives all the details of Tourist places in Kashmir and contact details o f important places like universities, government offices etc. The main permission this app may require is the INTERNET. If it includes MANAGE_ACCOUNTS which is the permission that allows the app to retrieve the user account information from the phone, our operating system will get the permission from the user at run time to access the resource and if user allows then only the permission will be granted. The main advantage of our NBS system is that it gives freedom to the users and the programmers to write a code which does not result in usability issues. Need based permission system and getting permission approvals at run time is a relatively new but promising approach as it gives lot of freedom to the novice users. Security API: In order to deal with the malicious apps downloaded by the user, we propose a security API which can be integrated with the existing security framework of mobile operating system. The objective is to provide security against the Apps which are installed by the end user and is given all the permissions at the time of installation. This enhanced security has the desirable property of not disturbing a regular user in any noticeable way. In fact, the user need not even be aware that the Security API has been applied. We have to prevent the modification and access of data from mobile phones by other external malicious applications unknowingly. We propose an API which will enhance the security of existing Android Framework. The first step in our proposed security API is implemented by adapting an encryption technique utilizing Advanced Encryption Algorithm (AES) and applying it to all the personal files in the Smartphone. File operations offered by the proposed Security API should aid in the detection of potentially malicious Apps whose behavior matches that of Malware. Malware recognition is usually achieved by signature matching, heuristic analysis, or comparing hash-values Fig 4: Sequence Diagram of the System Conclusion The increasing trend of Smartphone usage by individuals of all ages has brought forward stiff competition between different Smartphone OS’s and Google’s Android OS. However, recent researches and reports revealed that the novice users are not secure on these platforms because of the limitations of these OS. We found different types of limitations in various mobile Os and particularly in Android and iOS which are the leading mobile Operating Systems. We found that there is a major need of modification in the permission based model of security system and we strongly recommended the implementation of Need based security system in the mobile operating systems so that the novice user can be informed at run time about the access to its various resources. References Perlow, L.A.: Sleeping with your smartphone:how to break the 24-7 habbit and change the way you work, Harvard Business review press, 2012. Kataria, A.; Anjali, T.; Venkat, R., Quantifying smartphone vulnerabilities,Signal Processing and Integrated Networks (SPIN), 2014 International Conference on, vol., no., pp.645,649, 20-21 Feb. 2014doi: 10.1109/SPIN.2014. Bornstein, Dan. 2008. â€Å"Dalvik VM Internals†. http://sites.google.com/site/io/dalvikà ¢Ã¢â€š ¬Ã‚ vmà ¢Ã¢â€š ¬Ã‚ internals> Delac, G.; Silic, M.; Krolo, J., Emerging security threats for mobile platforms,MIPRO, 2011 Proceedings of the 34th International Convention, vol., no., pp.1468,1473, 23-27 May 2011 Muneer Ahmad Dar and Javed Parvez.: â€Å"A Novel Strategy to Enhance the Android Security Framework†.International Journal of Computer Applications91(8):37-41, April 2014. Published by Foundation of Computer Science, New York, USA. Cleron, Mike. â€Å"Androidology à ¢Ã¢â€š ¬Ã‚  Part 2 of 3 à ¢Ã¢â€š ¬Ã‚  Architecture Overview. 11 November, 2007. http://www.youtube.com/watch?v=fL6gSd4ugSI> Cleron, Mike. â€Å"Androidology à ¢Ã¢â€š ¬Ã‚  Part 3 of 3 à ¢Ã¢â€š ¬Ã‚  Architecture Overview. 11 November, 2007. http://www.youtube.com/watch?v=MPukbH6Dà ¢Ã¢â€š ¬Ã‚ lY> . [8] DeviceForge.com. 2006. â€Å"Sun blesses Java phone†. http://www.deviceforge.com/news/NS6109398413.html> (accessed 14 April 2009). Dilger, Daniel E. iPhone 2.0 SDK: The No Multitasking Myth. 13 March 2008. Roughly Drafted Magazine. http://www.roughlydrafted.com/2008/03/13/iphoneà ¢Ã¢â€š ¬Ã‚ 20 sdkà ¢Ã¢â€š ¬Ã‚ theà ¢Ã¢â€š ¬Ã‚ noà ¢Ã¢â€š ¬Ã‚ multitaskingà ¢Ã¢â€š ¬Ã‚ myth/> (accessed 8 February 2009). Dilger, Daniel E. â€Å"iPhone OS X Architecture: the Mach Kernel and RAM.† 13 July 2007. Roughly Drafted Magazine. http://www.roughlydrafted.com/2007/07/13/iphoneà ¢Ã¢â€š ¬Ã‚ osà ¢Ã¢â€š ¬Ã‚ xà ¢Ã¢â€š ¬Ã‚ architectureà ¢Ã¢â€š ¬Ã‚ theà ¢Ã¢â€š ¬Ã‚ machà ¢Ã¢â€š ¬Ã‚ kernelà ¢Ã¢â€š ¬Ã‚ andram/> Faas, Ryan and David Haskin. â€Å"Review: Which smart phone OS works best?†. http://www.computerworld.com/action/article.do?command=viewArticleBasicarticleId=9117021 [14]. Apple inc., iOS Reference Library, Security Overview, http://developer.apple.com/library/ios/#documentation/Security/Conceptual/Security_Overview/Introduction/Introduction.html#//apple_ref/doc/uid/TP30000976-CH201-TPXREF101

Saturday, July 20, 2019

Educatio During The Victorian :: essays research papers

Education During the Victorian Period   Ã‚  Ã‚  Ã‚  Ã‚  Education during the Victorian Period progressed due to several acts and codes over the years. Voluntary schools, which the Church provided, were founded by the Anglican National Society after the grant of 1833 was proposed. The grant went to religious bodies, which were used to build schools. It was the first acceptance by the government to provide the poor with an education. The grant increased to 30,000 pounds in 1839 and then to 100,000 pounds in 1846. These voluntary schools were paid for by private subscription and were spread out over the country.   Ã‚  Ã‚  Ã‚  Ã‚  Gladstone’s Bill of 1870 was the work of W.E. Forster, who was an ardent churchman of Quaker origin. The bill doubled the State Grant to church schools and to Roman Catholic schools so they could become a permanent part of the new educational system.   Ã‚  Ã‚  Ã‚  Ã‚  There were seven elite boarding schools that were defined as â€Å"Public Schools† in the 1860’s by the educational Clarendon commission. They were Eton, Harrow, Westminster, Rugby, Winchester, Charterhouse, and Shrewsbury. They were maintained by private funding and received no profits.   Ã‚  Ã‚  Ã‚  Ã‚  The Code of 1890 made it possible to maintain evening continuation schools, which we think are night schools.   Ã‚  Ã‚  Ã‚  Ã‚  The new schools were known as Board Schools and they were paid for by local rates, or by the local school boards. Church teaching continued in all national schools. Before this, all the churches had to provide the education. The Roman Catholics and the Anglicans wouldn’t let their children go to these schools, though. They felt that these schools did not adequately teach their religious ideas. Board schools were introduced and the Roman Catholics and the Anglicans agreed that these schools satisfied all their educational needs.   Ã‚  Ã‚  Ã‚  Ã‚  The acts of 1876 and 1880 made attendance in schools necessary. During the first few years of Queen Victoria’s reign, 30-50% of the children went to school. The most common schools were Sunday schools. They went there if they weren’t working and while there they learned how to â€Å"read† the Bible. Its primary function was to fit people for their place in the social order. From 1870-1890 the average school attendance rose from 1.25 million to 4.5 million and the money spent on each child was doubled.   Ã‚  Ã‚  Ã‚  Ã‚  After the New County Council was established, an effective step towards a system of secondary education was taken Only 8% of male children received any secondary education.

Friday, July 19, 2019

Ken Wolfs Personalities and Problems Essay -- Ken Wolf Personalities

Ken Wolf's Personalities and Problems Ken Wolf, a professor of history at Murray Sate University and author of Personalities and Problems, wrote with the intent to illustrate the varied richness of human history over the past five centuries. He took various personalities such as adventurers, princes, political leaders, and writers and categorized them in a way for readers to draw lines between them to create a clearer view of world history for himself. Beginning each new chapter with a specific question about worldly concerns and disciplines allowed the readers to relate the topics to broader, more general scenarios of their cultures. Answering the questions in essay form gave examples of how certain cultures/ parts of the world dealt with those issues. The answers that pertained to the questions informed readers about many historical figures without drawing a time line for the course of history and simply reiterating information as in a textbook. Wolf's layout of the book created an interesting, clear, and informative s tudy of world civilizations.   Ã‚  Ã‚  Ã‚  Ã‚  Chapter twelve, about Erasmus and Luther, exemplified the interesting, clear, and informative way in which Wolf created his work. Although there are many other examples in Wolf's book as to how these aspects ring true to his purpose, I chose chapter two as only one reason. The question stated: To what extent is it possible to reform an institution from within? What intellectual and personal qualities cause some people to be more radical than others, and what are the implications of such differences in history (p.113).? After reading the essay, one might say that a person could go as far as possible to make something like reforms happen; but people may stand in his/her way. However, if that person is willing to lose or gain anything, such as excommunication from his/her Church or an increase of enemies, then he/she will extend to the distance needed. The essay answer also informed the reader of more general information, not solely facts on Erasmus and Luther. Reade rs learned that intellect and intelligence are not all that bring historical greatness. Personal qualities such as dominance, determination, perseverance, morality and empathy all play a role in making a difference in history. Some of these qualities can make the situation more radical than expected. Although Erasmus and Luther landed on the... ...ter influence on a large number of people than this slim little volume (p.26).?   Ã‚  Ã‚  Ã‚  Ã‚  Lastly, Hammurabi, a famous lawgiver, would fascinate me. Hammurabi was a strict ruler who?s Code emphasized retaliation, ?an eye for an eye, a tooth for a tooth?. I wonder if his approach to lawgiver and ruler was the best for his society at the time. I would like to engage in conversation about his thoughts on his code and if he believed that it was proven to work. I also would like to ask him, why did he base his code on a class system? Did you feel that you opened the doors for women by allowing them to live with another man under certain circumstances? I would also let him know that even though I do not agree with his Code, he set guidelines for future lawmakers.   Ã‚  Ã‚  Ã‚  Ã‚  Many other characters are important to me; however, these four struck me as very interesting. Questions and reasons for wanting to spend time with them are infinite. The most important question of all for each historical figure in the book Personalities and Problems would be ?what drove them to actually pursue those problems and create such phenomenal solutions, especially when solving the problem would be so difficult

Exploring Teaching Methods that Help Engage Students Essay -- Educatio

Considering a stereotypical class room, the bell rings, students are almost in their seats, and the teacher is demanding their attention. It is hard for the teacher to gain the attention let alone the willingness to learn from their students. No matter what subject is being taught, this has the recipe for boredom from the get go. Any curiosity or imagination for the students has been choked. In order for the teacher to gain the eagerness to learn from his students, he would have to resort to all the mental keenness he could muster. No matter how gifted the teacher, students tend to lose interest in learning in an everyday run of the mill style of class room environment. What creative power or what unusual and highly innovated resource can be implemented into a classroom that has been limited by tradition, a lack of creativity, and monotony? The answer is not a teacher who has an ingenious nature or who is a skilled innovator. The answer relies on the teacher’s methods. There are many different methods that have proved to be effective. Activities such as group lead discussion, group discovery, and teacher lead critical thinking discussions have proved effective in integrating different learning styles (Chick). Another method that will stimulate the imagination, and arouse the analytical side of learners is implementation of audio visuals and visual aids for the introduction, during the lectures, prompts for discussions, and even for the closure of class (Atkinson 2). This is a tool – a resource that needs to be tapped. Lastly, setting up the classroom into groups of desks and even changing the classroom on a day to day basis that will emulate what kind of methods are being used for that day by the teacher keeps lear... ...ary Module. ProQuest. Grafton Library, Fredericksburg, Va. 17 Nov. 2008 Olson, Allan. . "Technology that MOVES Assessment and Student Achievement FORWARD. " MultiMedia & Internet@Schools 1 Nov. 2004: 26-28. Education Module. ProQuest. Grafton Library, Fredericksburg, VA. 13 Feb. 2009 Strassman, Barbara K., and Trisha O'Connell. "Authoring with video." The Reading Teacher 61.4 (Dec 2007): 330(4). General OneFile. Gale. LIRN. 3 Oct. 2008 . Teachable Moments. Morningside Center for Teaching Social Resposibilities. 13 Feb 2009 . Wong, Harry, and Rosemary Wong. How To Be An Effective Teacher: The First days of School Mountain View, CA: Harry K. Wong Publications, Inc, 2004.

Thursday, July 18, 2019

Literature: Spanish Language Essay

Philippine literature is the literature associated with the Philippines and includes the legends of prehistory, and the colonial legacy of the Philippines. Most of the notable literature of the Philippines was written during the Spanish period and the first half of the 20th century in Spanish language. Philippine literature is written inSpanish, English, Tagalog, and/or other native Philippine languages. ————————————————- Classical literature in Spanish (19th Century) On December 1, 1846, La Esperanza, the first daily newspaper, was published in the country. Other early newspapers were La Estrella (1847), Diario de Manila (1848) and Boletin Oficial de Filipinas (1852). The first provincial newspaper was El Eco de Vigan (1884), which was issued in Ilocos. In Cebu City â€Å"El Boletà ­n de Cebà ºÃ¢â‚¬  (The Bulletin of Cebu), was published in 1890. On 1863, the Spanish government introduced a system of free public education that had an important effect on the ability of the population to read in Spanish and further in the rise of an educated class called the Ilustrado (meaning, well-informed). Spanish became the social language of urban places and the true lingua franca of the archipelago. A good number of Spanish newspapers were published until the end of the 1940s, the most influential of them being El Renacimiento, printed in Manila by members of the Guerrero de Ermita family. Some members of the ilustrado group, while residing or studying in Spain, decided to start a literary production in Spanish with the aim of serving the autonomy and/or independence projects. Members of this group included Pedro Alejandro Paterno, who wrote the novel Nà ­nay (first novel written by a Filipino); the Philippine national hero, Josà © Rizal, who wrote excellent poetry and two famous novels in Spanish: Noli Me Tangere (Touch Me Not), and El Filibusterismo. A potent tool in promoting Filipino nationalism in Spanish was the foundation of La Solidaridad (more fondly called La Sol by the members of the propaganda  movement) in 15 February 1885. With the help of this organ, Filipino national heroes like Josà © Rizal, Graciano Lopez Jaena, Marcelo H. del Pilar, etc. were able to voice out their sentiments. Poetry and metrical romances * Ladino Poems – Were natives of first Tagalog versifiers who saw print: highly literate in both Spanish and the vernacular. * Corridos – Were widely read during the Spanish period that filled the populace’s need for entertainment as well as edifying reading matter in their leisure moments. * Awit – like corridos, these were also widely read during the Spanish period as entertaining, edifying, reading manner in their leisure time. It is also a fabrication of the writers imagination although the characters and the setting may be European. The structure is rendered dodecasyllabic quatrains. Prose The prose works of the Spanish Period consisted mostly of didatic pieces and translations of religious writings in foreign languages. [edit]Dramas [edit]Religious drama * The Panunuluyan– Literally, seeking entrance, the Tagalog version of the Mexican Las Posadas. Held on the eve of Christmas, it dramatizes Joseph’s and Mary’s search for Bethlehem. * Cenaculo – Was the dramatization of the passion and death of Jesus Christ. * Salubong – An Easter play that dramatizes the meeting of the Risen Christ and His Mother. * Moriones – Refers to the participants dressed roman soldiers, their identities hidden behind colorful, sometimes grotesque, wooden masks. * The Santacruzan – Performed during the month of May which have the devotion for the Holy Cross. It depicts St. Elena’s search for the cross on which Christ died. * Pangangaluwa – An interesting socio-religious practice on All Saint’s Day which literally means for The Soul. Secular dramas These were generally held during the nine nights of vigil and prayers after someone’s death, on the first death anniversary when the family members put away their mourning clothes. * The Karagatan – comes from the legendary  practice of testing the mettle of young men vying for a maiden’s hand. The maiden’s ring would be dropped into sea and whoever retrieves it would have the girl’s hand in marriage. * The Duplo – A forerunner of the balagtasan. The performances consist of two teams; One composed of young women called Dupleras or Belyakas; and the other, of young men called Dupleros orBelyakos. * The Comedia – It is about a courtly love between, a prince and a princess of different religions. It is about a Christian-Muslim relationship. * ————————————————- Modern literature (20th and 21st century) The greatest portion of Spanish literature was written during the American period, most often as an expression of pro-Hispanic nationalism, by those who had been educated in Spanish or had lived in the Spanish-speaking society of the big cities, and whose principles entered in conflict with the American cultural trends. Such period of Spanish literary production—i.e., between the independence of Spain in 1898 and well ahead into the decade of the 1940s—is known as Edad de Oro del Castellano en Filipinas. Some prominent writers of this era were Wenceslao Retana and Claro Mayo Recto, both in drama and essay; Antonio M. Abad and Guillermo Gomez Wyndham, in the narrative; Fernando Marà ­a Guerrero and Manuel Bernabà ©, both in poetry. The predominant literary style was the so-called â€Å"Modernismo†, a mixture of elements from the French Parnassien and Symboliste schools, as promoted by some Latin American and Peninsular Spanish writers (e.g. the Nicaraguan Rubà ©n Darà ­o, the Mexican Amado Nervo, the Spaniard Francisco Villaespesa, and the Peruvian Josà © Santos Chocano as major models).

Wednesday, July 17, 2019

Miranda v. Arizona Essay

Early in 1963, a 17 age old womanhood was kidnapped and raped in Phoenix, Arizona. The police force force investigated the case, and in short make up and arrested a poor, and mentally overturned man. The name of this man was Ernesto Miranda. Miranda was 23 years old when he was arrested. On work on 13, 1963, Miranda was arrested based on circumstantial evidence linking him to the kidnapping and the rape. After 2 police officers interrogated him for 2 hours, he signed a exculpation to the rape charge. The form he signed included the following disceptation I do hereby specify that I practise this statement voluntarily and of my own free will, with no threats, coercion, or promises of immunity, and with full knowledge of my legal practiceds, catch any statement I make may be used against me. Miranda was non given a full and effective warning of his rights.He was not told of his right to remain silent and his right to counsel. Miranda was found guilty of kidnaping and rap e and was sentenced to 20-30 years gyves on each count. During the criminal prosecution, Mirandas court-appointed lawyer, Alvin Moore, objected that because of these facts, the exculpation was not truly voluntary and should be excluded.In the end of 1966, The Supreme motor hotel, in a 5-4 decision written by Chief Justice Earl Warren, ruled that the prosecution could not introduce Mirandas confession as evidence in a criminal trial because the police had failed to graduation informs Miranda of his right to an attorney and against self-incrimination. The Supreme Court of Arizona detailed the principles governing police interrogation. Arizona ruled that detained criminal suspects, preceding to police questioning, must be assured of their constitutional right to an attorney and against self-incrimination.

Monday, July 15, 2019

Job Application Letter & Resume Essay

I was introduced to your laid-back society by Mr. brad Earls, maven of your triplet technicians. He has pundit me that champion of your D in all toldas dominances is prosecute to train dependant persons for your proficient escort department.I boast to a greater extent than than a family and a one-half make out in the practiced take hold field, comprehensive of existence the older technician at my employment now, argon Technologies. Although I pro ample no college experience, I brook trus twainrthy hands-on bringing up from a dialog box certified technician, who is all all overly the possessor of the smart set now. He tangle that I was certified luxuriant to train, and later on or so half-dozen months, I was named the rails tech, over the different techs who useed hither long before myself. Our caller has tripled in surface since my turn up date, further I am salve the only in portion tech. occupy government note that in that locat ion get to incessantly been two or more before I was an employee here. Unfortunately, this beingness a small, family have bank line, I am intimately as high up here as I ordain always be. Having original immense nurture from this lower-ranking come with, I pure tone it has vigilant me to pad my familiarity and hold up up to a more favor commensurate one. shadowerdace N. digest(your address)(your dawn numbers)(your electronic mail address) intent To gain a redact in which I am able to maximize my expert skills, superior assurance, course of study development, and didactics experience. professional person arrest are Technologies, August, 2007 to turn in senior Technician end all node issues over the telephone or at their ad hoc locations. wholly technician in procedure for a maturation ISP company with over 1,000 dial-up and piano tuner guests. creditworthy for computing device invigorate on the face at the uniform company. Repaired VoIP phones, routers, PCs and new(prenominal) equipment. Handled all customer complaints in a professional manner. Mended issues with separate companies doing business with ours.Skills adroit in technological support, colossal customer service, tone leaders skills, accel with individualist or teamwork, typeface up to 60 wpm, wise(p) with nearly Microsoft programs (word, excel, powerpoint, access, ect.) and adobe photoshop, reader, and acrobat. skilful in selective information entry, scheduling, billing, ect. (entry take office work). Can rank work load and work in a fast-paced environment. brilliant indite and literal communion skills (detail oriented).preceptUniversity of capital of Arizona Online healthcare establishment two-dimensional naughty civilizeMerit, TexasOrganizations2006 2008Troophelper.comGreenville, Texas offer up