Saturday, August 31, 2019

General Appliances Essay

Introduction:The General Appliance Corporation is a manufacturer of all types of home appliances. The company has a decentralized, divisional organizational structure, which consists of four product divisions (electric stove, laundry equipment, refrigeration and miscellaneous appliance division), four manufacturing divisions (chrome products, electric motor, gear and transmission and stamping division) and six staff offices (finance, engineering, manufacturing, industrial relations, purchasing and marketing staff). The staff offices do not have functional authority over the divisional general managers, who are each responsible for their own divisional personnel. The manufacturing division made approximately 75 percent of their sales to the product division. In addition, the parts made by the manufacturing division is designed and engineered by the product divisions. Since the eight divisions are expected to act like independent companies, the transfer prices are negotiated amongst themselves. But, if two divisions could not agree on a price, they submit the dispute to the finance staff for arbitration. The product division does not have the power to decide whether to buy from within the company or from outside. If there was a disagreement with the sourcing, the manufacturing division could appeal to the purchasing staff to reverse the decision. Problem:At the General Appliance Corporation, the purchasing staffs are the personnel that decide which part would continue to be manufactured within the company (org. chart may need to be revised). When the part is decided to be manufactured internally, the manufacturing division must hold the price at a level the product (purchaser) division could purchase it outside. Currently, the managers do not have the freedom to source and choose the alternative that is in their best interest, even though an alternative for sourcing does exist. The three problems that exist in the company are:-Determining a transfer price that includes the extra $0.80 per unit spent on developing the new quality standards. Also, the arbitration committee should determine whether the appearance is a subjective or objective matter. -An excess capacity (supply is greater than demand) caused a temporary  decrease in the selling price. -The standard price used for calculations of the total cost, profit and proposed price is determined from the price given in a competitor’s proposal – this is not a definite price. Investment Centres – don’t know when to produce or when to outsource (what role does innovation or engineering for lower costs play?)For each case, calculate if it’s better to outsource or manufactureArbitration committee which considers all â€Å"staff† functionsDo something quick & fast (cheap) and easy to doAnalysis:Stove Top Problem – Survey has shown that the company’s reputation as a producer of quality products has deteriorated, and resulted in the Chrome Products Division implementing quality improvements to the stove tops. Chrome has proposed to increase the price of the stove top by $0.90; $0.80 represents the additional costs of quality improvements and a $0.10 profit mark-up. The Electric Stove Division does not see the improvements as necessary changes since there is no change in engineering specifications, the changes made were never requested or approved, consumers may not even notice or want the change, and believes that the improvements made will only bring the quality level of the stove tops to the competitor’s level. Ultimately, Electric Stove sees these quality changes as being more subjective rather than objective. The engineering department of the manufacturing staff has verified that the new improvements were of superior quality then of their competitors and the costs were reasonably allocated. Thermostatic Control Problem – Electric Motor Division has been able to consistently reduce the price of the thermostatic control units to mirror the price of Monson Controls Corp. from $3.00 in 1984 to $2.40 in 1987. Monson has decided to further reduce their price to $2.15, which according to the general manager of Electric Motor Division, would result in selling at a loss rather than a profit. The GM believes that they are just as efficient as Monson, therefore Monson must be selling at a loss at $2.15. Laundry Equipment and the Refrigeration Division both require a total of 120 000 units for their division (100 000 units for Laundry and 2 000 units for Refrigeration). Refrigeration has made an agreement with Electric Motor that  they will be able to competitively source to the lowest bidder, in this case, Monson for $2.15. Laundry Equipment believes that for such a large order, they could probably obtain a lower price than $2.40 if they were to outsource. In reviewing this dispute, the Finance Staff stated that there was excess capacity in the market that results in soft prices. The purchasing staff believed that Refrigeration could purchase their requirements at $2.15 for the next year but if the corporation’s orders were all place externally, the price would rise to $2.40 through increase in demand or limited supply. Considering the 120 000 units of thermostatic control that is required by both the Laundry Equipment and the Refrigeration Division, and the fact that their requirement is large enough to increase Monson’s price of $2.15 to $2.40, General App. will have to outsource and purchase from within. Assuming that the more units General App. outsources, the price will gradually increase due to the increase in demand. The best combination of outsourcing and purchasing from within would be to outsource 60 000 units at an estimated price of $2.25 and purchase 60 000 units internally for $2.40. This would cost the organization $279 000, a savings between $1 000 and $9 000. The average price per unit is $2.325, less than the cost of the market price if the required volume was entirely outsourced. It is also less then purchasing the entire volume internally. This would result in Laundry Equipment saving $7 500 and costing $3 500 to Refrigeration as oppose to purchasing their required volume at $2.15. Transmission Problem – Laundry Equipment has previously entered into an agreement with Thorndike Machining Corp to purchase one-half of its transmission for 10 years. Two years before the expiration of the agreement, General App. decided to manufacture their own transmissions to extend their capacity. Thorndike proposed a price reduction of $0.50 consistently for the next two years with a new economy transmission unit at a price of $10. The Gear and Transmission Division estimates that they can replicate a comparable model of the economy transmission at a competitive price of $9. The Gear and Transmission Division’s proposal failed to eliminate the cost of design features of $0.50 per unit. This would bring the proposed total  unit cost for G&T from $11.66 to $11.11. This error makes Thorndike’s proposed price of $11.21 appear more favourable. Bibliography: Anthony, Robert N., and Vijay Govindarajan. Management Control Systems. New York: McGraw-Hill/Irwin, 2000.

Friday, August 30, 2019

Dissociation Constant Weak Acids Essay

Introduction: The dissociation constants of weak monoprotic acids were determined with the aid of a buffer and pH meter. Experiment: This experiment was performed according to the procedures as provided in the Chemistry 111B laboratory manual: Po, Henry and Senozan, N. â€Å"General Chemistry Experiments Chemistry 111B†, 8th Ed., 2004 Hayden-McNeil Publishing, pp 80-88. To determine the dissociation constants of weak monoprotic acids (HX and HY), a buffer was needed to calibrate the pH meter. According to the manual, all four solutions to the experiments had to be carried out first before the calibration was performed. The following materials were obtained to conduct the parts of the experiment: 1) several 10-mL and 50-mL graduated cylinders to measure the volumes of acid and base, and 2) a thermometer to record the temperature of the solution. In the first half of the experiment, the Ka of HX had to be used and determined and in the second half, the Ka of HY was utilized and established using the same procedure. In the first part of the experiment, the pH and temperature was to be measured of a 10 mL sample of 1.02 M HA (when conducting the second half of the experiment, the concentration of HY was 1.00 M). The second part of the experiment was to add 20 mL of 1.0 M NaA to 10 mL of 1.00 M HA, and to draw 10 to 15 mL of the solution to measure the pH and temperature. For the third part of the experiment, 10 mL of the  remaining buffer from part 2 was diluted with 50 mL of distilled water. The pH and temperature was measured for this part of the experiment. The last part of the experiment was to mix 10 mL of NaOH to 25 ml of HA (both HX and HY had a concentration of 1.00 M, and the NaOH concentration was 1.00 M), and to measure the pH and temperature of the solution. When all the solutions were stirred and measured for, the pH meter was to be calibrated. The first step was to obtain a packet of perpHect pH 4.01 buffer  and set up the open packet in a beaker. The next step was to place the pH meter into the buffer and calibrate the reader that was connected to the meter. When the reader was calibrated to a pH of 4.01, the solutions were ready to be determined. After each measurement in the solution, the pH meter had to be cleaned with a few drops of distilled water and calibrated back to 4.01 in the buffer pouch. Results and Discussions: In the first half of the experiment using HX, the pH reading for the first part of the experiment was 2.36 and the temperature was 26 C. When equilibrium was reached, it was calculated (on data sheet) that the Ka was 2.03 X 10 .In the second part of the experiment, the pH was 4.94 and the temperature was 28 C. The Ka was found to be 2.07 X 10 . For the third part of the experiment, a 4.47 pH was measured from the solution and a temperature of 27 C. The Ka for this part was 2.57 X 10 . Lastly, the pH of the solution for part 4 was 4.47 and had a temperature of 27 C with a Ka reading of 2.29 X 10 . For the second part of the experiment dealing with HY, readings of 1.95, 25 C, and 1.27 X 10 were measured for pH, temperature, and Ka, respectively. In the second part of the experiment, the pH reading was 2.94 with a temperature of 26 C and a Ka of 2.31 X 10 .In the third part of the experiment, a pH measurement, temperature, and Ka values were found to be 2.95, 26 C, and 2.32 X 10 , respectively. In the last part of the experiment, the pH reading was 2.58 with a temperature of 27 C. The Ka for this particular solution was 1.78 X 10 . Assumptions that were made from this experiment was that the Ka values for HX and HY were similar except for part 1. Part 1 was excluded in the averages in the data sheet because since no base is present in the solution, a different Ka value will be given then the other solutions which had base in the solution. Also, since the solutions of the experiment were prepared first before calibrating the pH meter, the group received a better pH reading because the pH of the solutions were measured one after the other. Conclusion: In the experiment, it was seen that the dissociation of weak monoprotic acids were constant for HX and for HY given from the Ka values.

Night World : Daughters of Darkness Chapter 4

What a difference a day made. Somehow, in the hot, hazy August sunlight the -next morning, Mary-Lynnette couldn't get serious about checking on whether Mrs. Burdock was dead. It was just too ridiculous. Besides, she had a lot to do-school started in just over two weeks. At the beginning of June she had been sure summer would last forever, sure that she would neversay, â€Å"Wow, this summer has gone by so fast.† And now here she stood in mid-August, and she was saying, â€Å"Wow, it's gone by so fast.† I need clothes, Mary-Lynnette thought. And a new backpack, and notebooks, and some of those little purple felt-tip pens. And I need to make Mark get all those things, too, because he won't do it by himself and Claudine will never make him. Claudine was their stepmother. She was Belgian and very pretty, with curly dark hair and sparklingdark eyes. She was only ten years older than MaryLynnette, and she looked even younger. She'd been the family's housecleaning helper when Mary Lynnette's mom first got sick five years ago. MaryLynnette liked her, but she was hopeless as a substitute mother, and Mary-Lynnette usually ended up taking charge of Mark. So I don't have time to go over to Mrs. B.'s. She spent the day shopping. It wasn't until after dinner that she thought about Mrs. Burdock again. She was helping to dear dishes out of the family room, where dinner was traditionally eaten in front of the TV, when her father said, â€Å"I heard something today about Todd Akers and Vic Kimble.† â€Å"Those losers,† Mark muttered. Mary-Lynnette said, â€Å"What?† â€Å"They had some kind of accident over on Chiloquin Road-over between Hazel Green Creek and Beavercreek.† â€Å"A car accident?† Mary-Lynnette said. â€Å"Well, this is the thing,† her father said. â€Å"Apparently there wasn't any damage to their car, but they both thought they'd been in an accident. They showed up at home after midnight and said that something had happened to them out there-but they didn'tknow what. They were missing a few hours.† He looked at Mark and Mary-Lynnette. â€Å"How about that, guys?† â€Å"It's the UFOs!† Mark shouted immediately, dropping into discus-throwing position and wiggling his plate. â€Å"UFOs are a crock,† Mary-Lynnette said. â€Å"Do youknow how far the little green men would have to travel-and there's no suchthing as warp speed. Whydo people have to make things up when the universe is just just blazing with incredible things that are real-â€Å"She stopped. Her family was looking at her oddly. â€Å"Actually Todd and Vic probably just got smashed,† she said, and put her plate and glass in the sink. Her father grimaced slightly. Claudine pursed her lips. Mark grinned. â€Å"In a very real and literal sense,† he said. â€Å"We hope.† It was as Mary-Lynnette was walking back to the family room that a thought struck her. Chiloquin Road was right off Kahneta, the road her own house was on. The road Mrs. B.'s house was on.It was only two miles from Burdock Farm to Chiloquin. There couldn't be any connection. Unless the girls were burying the little green man who'd abductedVic and Todd. But it bothered her. Two really strange things happening in the same night, in the same area. In a tiny, sleepy area that never saw any kind of excitement. I know, I'll call Mrs. B. And she'll be fine, and that'll prove everything's okay, and I'll be able to laugh about all this. But nobody answered at the Burdock house. The phone rang and rang. Nobody picked it up and the answering machine never came on. Mary-Lynnettehung up feeling grim but oddly calm. She knew what she had to do now. She snagged Mark as he was going up the stairs. â€Å"I need to talk to you.† â€Å"Look, if this is about your Walkman-â€Å" â€Å"Huh? It's about something we have to do tonight.† Mary-Lynnette looked at him. â€Å"What aboutmy Walkman?† â€Å"Uh, nothing. Nothing at all.† Mary-Lynnette groaned but let it go. â€Å"Listen, Ineed you to help me out. Last night I saw something weird when I was on the hill†¦.† She explained as succinctly as possible. â€Å"And now more weird stuff with Todd and Vic,† she said. Mark was shaking his head, looking at her in something like pity. â€Å"Mare, Mare,† he said kindly. â€Å"You really are crazy, you know.† â€Å"Yes,† Mary-Lynnette said. â€Å"It doesn't matter. I'm still going over there tonight.† â€Å"To do what?† â€Å"To check things out. I just want toseeMrs. B. If I can talk to her, I'll feel better. And if I can find out what's buried in that garden, I'll feel a wholelotbetter.† â€Å"Maybe they were burying Sasquatch. That government study in the Klamaths never did find him, you know.† â€Å"Mark, you owe me for the Walkman. For whatever happened to the Walkman.† â€Å"Uh†¦Ã¢â‚¬  Mark sighed, then muttered resignedly.†Okay, I owe you. But I'm telling you right now, I'm not going to talk to those girls.† â€Å"You don't have to talk to them. You don't evenhave to see them. There's something else I want youto do.† The sun was just setting. They'd walked this roada hundred times to get to Mary-Lynnette's hill-the only difference tonight was that Mark was carryinga pair of pruning shears and Mary-Lynnette had pulled the Rubylith filter off her flashlight. â€Å"You don't reallythink they offed the old lady.† â€Å"No,† Mary-Lynnette said candidly. â€Å"I just want to put the world back where it belongs.† â€Å"You want what?† â€Å"You know how you have a view of the way theworld is, but every so often you wonder, ‘Oh, myGod, what if it's really different?'Like, ‘What if I'm really adopted and the people I think are my parentsaren't my parents at all?' And if it were true, it would change everything, and for a minute you don't know what's real. Well, that's how I feel right now, and I want to get rid of it. I want my old world back.† â€Å"You know what's scary?† Mark said. â€Å"I think Iunderstand.† By the time they got to Burdock Farm, it was full dark. Ahead of them, in the west, the star Arcturus seemed to hang over the farmhouse, glittering faintly red. Mary-Lynnette didn't bother trying to deal withthe rickety gate. She went to the place behind the blackberry bushes where the picket fence had fallen flat. The farmhouse was like her own family's, but with lots of Victorian-style gingerbread added. MaryLynnette thought the spindles and scallops and fretwork gave it a whimsical air-eccentric, like Mrs. Burdock. Just now, as she was looking at one of the second-story windows, the shadow of a moving figure fell on the roller blind. Good, Mary-Lynnette thought. At least I know somebody's home. Mark began hanging back as they walked down the weedy path to the house. â€Å"You said I could hide.† â€Å"Okay. Right. Look, why don't you take thoseshears and sort of go around back-â€Å" â€Å"And look at the Sasquatch grave while I'm there? Maybe do a little digging? I don't think so.† â€Å"Fine,† Mary-Lynnette said calmly. â€Å"Then hidesomewhere out here and hope they don't see you when they come to the door. At least with the shears you have an excuse to be in the back.† Mark threw her a bitter glance and she knew she'dwon. As he started off, Mary-Lynnette said suddenly, â€Å"Mark, be careful.† Mark just waved a dismissive hand at her without turning around. When he was out of sight, Mary-Lynnette knockedon the front door. Then she rang the doorbellitwasn't a button but an actual bellpull. She could hear chimes inside, but nobody answered. She knocked and rang with greater authority. Every minute she kept expecting the door to open to reveal Mrs. B., petite, gravelly-voiced, blue-haired,dressed in an old cotton housedress. But it didn't happen. Nobody came. Mary-Lynnette stopped being polite and began knocking with one hand and ringing with the other. It was somewhere in the middle of this frenzy ofknocks and rings that she realized she was frightened. Really frightened. Her world view was wobbling.Mrs. Burdock hardly ever left the house. She always answered the door. And Mary-Lynnette had seenwith her own eyes that somebody was home here. So why weren't they answering? Mary-Lynnette's heart was beating very hard. She had an uncomfortable falling sensation in her stomach. I should get out of here and call Sheriff Akers. It's his job to know what to do about things like this.But it was hard to work up any feeling of confidence in Todd's father. She took her alarm and frustration out on the door. Which opened. Suddenly. Mary-Lynnette's fist hit air and for an instant she felt sheer panic, fear of the unknown. â€Å"What can I do for you?† The voice was soft and beautifully modulated. Thegirl was just plain beautiful. What Mary-Lynnette hadn't been able to see from the top of her hill was that the brown hair was aglow with rich chestnut highlights, the features were classically molded, the tall figure was graceful and willowy. â€Å"You're Rowan,† she said. â€Å"How did you know?† You couldn't be anything else; I've never seen anybody who looked so much like tree spirit. â€Å"Your aunt told me about you. I'm Mary-Lynnette Carter, Ilive just up Kahneta Road. You probably saw my house on your way here.† Rowan looked noncommittal. She had such a sweet,grave face-,and skin that looked like white orchid petals, Mary-Lynnette thought abstractedly. She said, â€Å"So, I just wanted to welcome you to the neighborhood, say hello, see if there's anything you need.† Rowan looked less grave; she almost smiled and her brown eyes grew warm. â€Å"How nice of you. Really. I almost wish we did need something †¦ but actually we're fine.† Mary-Lynnette realized that, with the utmost civility and good manners, Rowan was winding up the conversation. Hastily she threw a new subject into the pool. â€Å"There are three of you girls, right? Are you going to school here?† â€Å"My sisters are.† â€Å"That's great. I can help show them around. I'll be a senior this year.† Another subject, quick, MaryLynnette thought. â€Å"So, how do you like Briar Creek? It's probably quieter than you're used to.† â€Å"Oh, it was pretty quiet where we came from,†Rowan said. â€Å"But we love it here; it's such a wonderful place. The trees, the little animals. . .† She broke off. â€Å"Yeah, those cute little animals,† Mary-Lynnette said. Get to the point, her inner voices were telling her. Her tongue and the roof of her mouth felt like Velcro. Finally she blurted, â€Å"So-so, um, how is your aunt right now?† â€Å"She's-fine.† That instant's hesitation was all Mary-Lynnette needed. Her old suspicions, her old panic, surged up immediately. Making her feel bright and cold, like aknife made of ice. She found herself saying in a confident, almost chirpy voice, â€Å"Well, could I just talk to her for a minute? Would you mind? It's just that I have something sort of important to tellher†¦.† She made a move as if to step over the threshold. Rowan kept on blocking the door. â€Å"Oh, I'm sosorry. Butwell, that's not really possible rightnow.† â€Å"Oh, is it one of her headaches? I've seen her in bed before.† Mary-Lynnette gave a little tinkly laugh. â€Å"No, it's not a headache.† Rowan spoke gently, deliberately. â€Å"The truth is that she's gone for a few days.† â€Å"Gone?† â€Å"I know.† Rowan made a little grimace acknowledging that this was odd. â€Å"She just decided to take a few days off. A little vacation.† â€Å"But-gosh, with you girls just getting here†¦Ã¢â‚¬  Mary-Lynnette's voice was brittle. â€Å"Well, you see, she knew we'd take care of thehouse for her. That's why she waited until we came.† â€Å"But-gosh,† Mary-Lynnette said again. She felt aspasm in her throat. â€Å"Where-just where did she go?† â€Å"Up north, somewhere on the coast. I'm not sure of the name of the town.† â€Å"But . . .† Mary-Lynnette's voice trailed off. Back off, her inner voices warned.Now was the time to be polite, to be cautious. Pushing it meant showing this girl that Mary-Lynnette knew something was wrong with this story. And since somethingwas wrong, thisgirl might be dangerous†¦. It was hard to believe that while looking at Rowan'ssweet, grave face. She didn't look dangerous. But thenMary-Lynnette noticed something else. Rowan was barefoot. Her feet were as creamy-pale as the rest ofher, but sinewy. Something about them, the way they were placed or the clean definition of the toes, made Mary-Lynnette think of those feet running. Of savage, primal speed. When she looked up, there was another girl walking up behind Rowan. The one with dark golden hair. Her skin was milky instead of blossomy, and her eyes were yellow. â€Å"This is Kestrel,† Rowan said. â€Å"Yes,† Mary-Lynnette said. She realized she was staring. And realized, the moment after that, that shewas scared. Everything about Kestrel made her thinkof savage, primal movement. The girl walked as if she were flying. â€Å"What's going on?† Kestrel said. â€Å"This is Mary-Lynnette,† Rowan said, her, voice still pleasant. â€Å"She lives down the road. She came to see Aunt Opal.† â€Å"Really just to see if you needed anything,† MaryLynnette interjected quickly. â€Å"We're sort of your only neighbors.† Strategy change, she was thinking. About-face. Looking at Kestrel, she believed in danger. Now all she wanted was to keep these girls from guessing what she knew. â€Å"You're a friend of Aunt Opal's?† Kestrel asked silkily. Her yellow eyes swept Mary-Lynnette, first up, then down. â€Å"Yeah, I come over sometimes, help her withthe†-oh, God, don't say gardening-â€Å"goats. Um, I guess she told you that they need to be milked everytwelve hours.† Rowan's expression changed fractionally. MaryLynnette's heart gave a violent thud. Mrs. B. would never,everleave without giving instructions aboutthe goats. â€Å"Of course she told us,† Rowan said smoothly, justan instant too late. Mary-Lynnette's palms were sweating. Kestrelhadn't taken that keen, dispassionate, unblinkinggaze off her for a moment. Like the proverbial birdof prey staring down the proverbial rabbit. â€Å"Well, it'sgetting late and I bet you guys have things to do. I should let you go.† Rowan and Kestrel looked at each other. Then theyboth looked at Mary-Lynnette, cinnamon-brown eyes and golden eyes fixed intently on her face.Mary-Lynnette had the falling feeling in her stomach again. â€Å"Oh, don't goyet,† Kestrel said silkily. â€Å"Why don'tyou come inside?†

Thursday, August 29, 2019

The development of institutional investors, and their growing Essay

The development of institutional investors, and their growing dominance as owners of modern corporations, has had a deep impact - Essay Example The concern is that deficiencies in the monitoring of institutional shareholders have led to a quality of oversight far below that which is required, being reactionary and passive in the exercise of their voting rights. They are perceived to be ineffective in challenging boards, relegating their decisions to proxy advisers or alternatively constraining management to decide in favour of short-term financial profits at the expense of more prudent long-term benefits. This study conducts an inquiry into the academic literature on the role currently played by institutional investors in corporate governance. The study may provide insight into the control and accountability procedures in the large domestic and foreign corporations, since these are the entities which cause the greatest damage in every global financial crisis. Defining corporate governance Corporate governance is ‘the system of laws, rules, and factors that control operations at a company.’2 It has developed into a major area of concern because potential conflicts of interest (otherwise known as agency problems) tend to arise among stakeholders in the corporate structure. It generally assumes the inevitability that ownership and control are separate in public corporations, where management which exercises control over operations acts as agents of the owners or shareholders. Agency problems tend to arise from two sources: (1) the differences in the goals and preferences among the stakeholders; and (2) the lack of perfect information among stakeholders about each other’s knowledge, actions, and preferences. Corporate governance consists of the set of structures that define the boundaries for firms’ operations. Among the factors influencing corporate governance are the board of directors, laws and regulations, labour contracts, the competitive environment, and the market for corporate.3 The board of directors is the significant driver of internal control in the governance of the corporation because it has the right to hire, fire, and compensate managers. The party which drives the external control mechanism of corporations, however, would be the institutional investors who own equity in the corporation. In light of the recent financial crisis, institutional investors are gaining increasing importance due to what is perceived to be the failure of the board of directors to maintain sufficient internal control over the corporation. The effectiveness of their control, however, is still a matter of debate due in part to the difficulty of isolating and identifying those changes in corporate conduct that are attributable directly to the workings of the institutional shareholders. The formulation of corporate governance guidelines is the means by which a firm may seek to reduce agency costs (the consequences of the separation of ownership and control). Agency costs come in the form in the cost of hiring management personnel, and from costs incurred due to divergenc e in the acts of management from the wishes and interests of the owners of the business. Institutional share

Wednesday, August 28, 2019

Plato The simile of the cave Essay Example | Topics and Well Written Essays - 2250 words

Plato The simile of the cave - Essay Example At the time of its composition, scholars struggled to explain human psychology and the workings of the human mind. A tag of war between empirical psychologists and those that believed in reason led to numerous debates and this composition aims at addressing the situation at hand. The allegory is part of a series of publications, collectively titled The Republic, which address various aspects of human behaviour including; morality and justice. In previous and subsequent publications, the author uses the same style of presentation to explain human behaviour, and his view on various issues affecting human beings. At the time of publishing The Republic, Plato doubled up as a renowned philosopher and mathematician among the Greeks. Plato drew inspiration from other established scholars such as Pythagoras and through his numerous travels to Egypt, Syria, Libya, and Sicily. The main themes in the simile are ignorance and humans, as depicted by the enslaved characters and their understanding of things. The following analysis of the work by Plato aims to explain the analogies purported in the simile, the plot and the elements of literature used by the author. The analysis will go over the plot of the simile to uncover the intended message from the hidden nature in which the author delivers it. The allegory begins with a group of prisoners chained at their hands and necks. They cannot change the direction in which they are facing and are forced to constantly stare at a wall. Behind the prisoners is an elevated wall, and a pathway constructed in such a way that the prisoners cannot see people using the path, but can see shadows of what they are carrying cast upon the wall they are facing. Further behind the pathway is an elevated fire, blazing at a distance such that shadows of the prisoners, as well as elevated goods carried by passers-by, are cast upon the wall in front of the prisoners. The narrative

Tuesday, August 27, 2019

A liereature review of the pharmacological interventions for narrow Essay

A liereature review of the pharmacological interventions for narrow complex tachycardias that are used in the emergency setting - Essay Example The researchers collected demographics on the patients, including history, medications, vital signs, and ECG readings. This study revealed that out of the 41 patients included in this paper, 31 were correctly diagnosed with PSVT, one had sinus tachycardia, and nine had atrial fibrillation (Furlong, et.al., 1995, p. 383). In the 31 cases diagnosed with PSVT, 28 successfully had sinus rhythm after the administration of adenosine. This represents 90.3% of the population being studied (Furlong, et.al., 1995, p. 383). For patients who were converted to sinus rhythm, 16 of them were given a single dose of adenosine, nine of them were given one additional dose of adenosine, and three later required two additional doses of adenosine (Furlong, et.al., 1995, p. 383). None of the patients given adenosine reverted to PSVT after administration of adenosine; there was also no difference in length of asystolic pause or in the outcome which was seen between the actual PSVT and the AF cases receiving adenosine (Furlong, et.al., 1995, p. 383). No significant negative side effects were also seen in the patients given adenosine. This study concluded that adenosine can be an effective emergency treatment of narrow complex tachycardia, and it can also be safely administered without the necessary physician control. The authors recommended that this drug must be used as directed by the manufacturer and it is actually a valuable prehospital diagnostic adjunct in patients with atrial fibrillation (Furlong, et.al., 1995, p. 383). In 2008, a paper by Ertan, et.al. (pp. 386-390) sought to assess the proarrhythmic potential of adenosine in terminating or treating supraventricular arrhythmias otherwise known as narrow complex tachycardia. This study was conducted as a retrospective paper reviewing the records of all patients who underwent adenosine treatment for the termination of supraventricular tachycardia. Patients who

Monday, August 26, 2019

Social Ecology Essay Example | Topics and Well Written Essays - 250 words

Social Ecology - Essay Example The arguments of Holmes favor natural ecosystems. However, the author of this passage holds that human and non-human populations are equally crucial. Attfield points out that people should create an environment that embraces nonhuman and human coexistence (296). Robin asserts that sustainable development does not conflict with efforts to protect ecosystem. Robin Attfield agrees with Holmes on the aspects of preserving the wild species. He contends that people should preserve the current wildlife and natural habitats. However, Robin differs with Holmes on the best ways to preserve the natural ecosystem. Attfield asserts that human population should not move from their residential areas where there is peaceful coexistence with wildlife (297). The argument of the author contradicts the stand of Holmes that requires people reside away from natural reserves (296). Holmes argues that increasing human population poses a danger to the ecosystem. He argues that parents should have two children and should do away with extra ones. However, Robin asserts that every child there is an intrinsic value of life. The author argues that there are natural measures that control human population such as death. Robin points out that overcrowding can have indirect effects to natural resources (Attfield

Sunday, August 25, 2019

Critically assess the impact of Taylor and Ford on organizations today Essay

Critically assess the impact of Taylor and Ford on organizations today - Essay Example The scientific approach had been quite significant during the industrialization era. However, in today’s organizations it is facing a decreasing impact owing to the knowledge of experienced managers that all situations and people should not be handled the same way. The emergence of numerous variables and environmental uncertainties has led many organizations to use the contingency approach. Scientific management aims to determine one best way for a job to be accomplished. Fredrick Taylor is a significant contributor to the development of this theory. His work at Midvale and Bethlehem Steel Industries stimulated the interest in him to improving efficiency. Taylor defined four principles of management which he sought would create mental revolution among the managers and workers (Cobley, 2009). His principles involved the development of a true science of management, scientific selection of workers, scientific education and development of workers and intimate friendly relationship between the workers and employers. Heames (2010) explains how using these principles enabled Taylor to define one best way for doing each job and achieve improvements in productivity, which was consistent in the range of 200 percent. He affirmed the role of workers to perform as they were instructed while the manager’s roles were to plan and control. The mass production model which bears the name of its pioneer, Ford, dates back to the first moving assembly lines creation that were put into action at Ford’s Model T plant. The labour productivity increased tenfold permitting stunning price cuts. This ensured mass manufacturing at a price low enough that a common man could afford to buy (Daft, 2010:97). Fordism production involved an intensified division of labour and increased coordination and mechanization of large-scale manufacturing to achieve a steady production flow. They also used less skilled labour to perform tasks that were least specified by the management. T he control over the pace and intensity of work owing to the potential for heightened capitalist were inclusive to Fordism (Wagner, 2009). According to Frey (2008), separation of thinking and working is one of the impacts that resulted in the essence of Taylorism where managers had to decide what the workers should do. The worker would have got used to their action when they had thought of it and tried to improve on it (Down, 2012). The relationship between the worker and the manager known as social-technical relation has different demands in that the planning department wanted efficiency in the production process but the workers wanted to have commensurate payment. Although it improved efficiency and profitability to organizations while making the management’s systematic workers felt differently in terms of satisfaction and motivation (Frey, 2008:185). Workers and employer relation’s importance was recognized by Ford. He introduced an eight-hour workday and offered hig her wages. This impacted on employee motivation, and thus job satisfaction. This, in turn, made workers to improve on their skills, quality of life and enhance job satisfaction (Pacharapha, 2012). In Fordism the management was considerably hierarchical, and the power of the company was only vested in the top management. Application of scientific principles on machines to

Saturday, August 24, 2019

Berkshire Hathaway Inc Essay Example | Topics and Well Written Essays - 500 words

Berkshire Hathaway Inc - Essay Example Buffett claims that the prices of gas have to increase in order for the company to have the ability to pay its debts. He does not end the interview without mentioning that he made a big mistake by purchasing BNSF because the energy future was facing bankruptcy simply because of their unpaid loans that were maturing. However, Buffett always has plans to reduce prices of gas in the future, such as seen when he agrees to a purchase price, which is the first solar plant, which will be offering the cheapest electricity in the U.S. Therefore, NV energy agrees to give just $0.0387/KWh for solar electricity that is from the 100 MW play a solar 2 projects which are being in U.S by the thin film company first solar. In addition to that, the NV energy power price is now entitled to be as low as possible.Buffett usually emphasizes on investing in companies, which will be more profitable for several decades, this is seen through the Suncor Company, which is profitable in all environments as when oil profits are lower, the initial downstream profits of the company tend to help in compensating their upstream losses. Rail freight and truck freight is almost the same, but the only difference depends on the commodity being transported, maximum speeds, loading and also stopping patterns like braking (Lei, n.d.). However, in most cases, rail freight is normally more energy efficient than the truck because of the low rolling resistance of the steel wheel that moves on a steel rail.

Friday, August 23, 2019

Journal Entries and Comparisons to Semester II Domains of Study Coursework

Journal Entries and Comparisons to Semester II Domains of Study - Coursework Example This would potentially ensure huge savings in time for the Company as well as a more efficient informational process for the Company, through a much more efficient execution of the leadership process in so far as communication is concerned. I also discovered this when communication issues cropped up during the execution of our Power Point project. The problem here was the breakdown in communications, so that members of the team did not have the information that they needed to integrate their efforts harmoniously with the other members of the team. This illustrates how the objective of working towards a common goal could have been improved if one of us has assumed the leadership role at first and during the initial meeting, established what information each member of the group would communicate to the others, as well as the frequency of that communication. In the absence of a leader and a well developed policy on communication, we faced problems in coordinating our efforts. The four c ore aspects that a good manager must take into consideration in managing his team members effectively are as follows: (a) select a person (b) set expectations (c) motivate the person and (d) develop the person (Buckingham and Curt, 1999). Good leadership constitutes the modification and adaptation of these aspects, for instance by selecting someone for talent not just for experience, intelligence or determination; while setting expectations, focusing only on the outcome rather than the method, while motivating, focusing on strengths rather than weaknesses and when developing the person, finding the right fit rather than merely pushing up the rungs of the ladder. I found this to be true in the management of my program for teen mothers; for example this program has helped to identify and motivate youngsters who were previously uninterested in work. By focusing on outcomes, as I did during my visit to the hospital with Amber, I was able to demonstrate to her – without a word bei ng said – the reality of being a mother and it may have also motivated her to work harder at her job because of the realisation that she needed to earn money for the huge investments that would be required in raising the child. It also produced a positive motivation because it focused upon identifying her strengths as a potential mother rather than seeing her pregnancy as a potential weakness that needed to be overcome. In the context of hiring employees, Lawler (2003) has pointed the example of Southwest Airlines, which bases its hiring decisions on a realistic preview, making its employees tell jokes and make announcements, thereby simulating the actual job environment that employees will encounter. When I took Amber with me into the wards, I was exposing her in a similar manner to what she would be exposed to after giving birth, thereby providing me with a good estimation of how she was likely to react. In a similar way, when I got the insurance company involved in dealing with Rick’s recovery after he was moved out of the ICU, I met Mrs McDonnel from the insurance company, who was the most professional, organized woman I had ever met. This woman was a typical example of good hiring by her employers, in accordance with the policy practiced by

Thursday, August 22, 2019

JBS Report Assignment Example | Topics and Well Written Essays - 1250 words

JBS Report - Assignment Example The changes are as shown in the income statement. When calculating the BEP for JBS, there is a challenge of classifying costs. It is very difficult to divide the costs categories as either a variable or a fixed cost. Consequently, the variable cost does not change proportionally to JBS revenue at each activity level. For instance, the revenues gotten from fee might change if the recruitment of students is changed. It is also difficult to categorize the faculty member as variable costs because there is high possibility of recruiting part-time staff. Consequently, there is a challenge attached to the time. Determining the time over which the variable and fixed cost relationship holds the status of the company is difficult to find out. Over a short time, the costs are viewed as fixed, but in the end, some of costs considered as fixed are now variable. To evaluate the progress of JBS towards its mission, will use performance indicators and measures. The company will use the balance sheet, income statement, profit and loss account, and cash inflows of the previous year’s result to measure its performance. The data will be extracted from the relevance sources and then converted to financial ratios. This analysis involves incorporating both the financial and non-financial information into the evaluation. Additionally, the evaluation will seek the help of scorecard and benchmarking indicators. In Benchmarking, the institution will incorporate the comparative data in measuring the performance. The method takes the internal form where comparisons are done between various units within the institution. The technique will also take the functional form, where comparisons are conducted with the trusted external practitioner despite the market. Additionally, the institution will take the competitive form where the comparisons are

Week 3, Checkpoint, Sequential and Selection Process Control Structure Essay Example for Free

Week 3, Checkpoint, Sequential and Selection Process Control Structure Essay Week 3, Checkpoint, Sequential and Selection Process Control Structure Payroll tax Calculation System Requirements -Salary Range 1 is 0.00 -1,499.99 -Salary Range 2 is 1,500.00-2,999.99 -Salary Range 3 is 3,000.00-4,999.99 -Salary Range 4 is 5,000.00-7,999.99 -Salary Range 5 is 8,000.00-14,999.99 -If the Salary Range is greater than 0.00, then the tax base is 0.00 plus 15% of the amount over 0.00 (amount-0.00*15%+0.00) -If the Salary Range is greater than 1,500.00, then the tax base is $225.00 plus 16% of the amount in excess of 1,500.00 (amount -1,500.00*16%+225.00) -If the Salary Range is greater than 3,000.00, then the tax base is 5. 00 plus 18% of the amount in excess of 3,000.00 (amount-3,000.00*18%+465.00) -If the Salary Range is greater than 5,000.00, then the tax base is $825.00 plus 20% of the amount in excess of 5,000.00 (amount-5,000.00*20%+825.00) -If the Salary Range is greater than 8,000.00, then the tax base is $1425.00 plus 25% of the amount in excess of 8,000.00 (amount-8,000.00*25%+1425.00) Input-Process-Output Chart Input Process Output (keyboard) Get the amount of salary earned GrossSalary (integer) Salary (integer) Calculate the total tax and adjusted net salary GrossSalary (integer) BaseTax (float) AddlTax (float) TotalTax (float) NetSalary (float) GrossSalary (integer) BaseTax (float) AddlTax (float) TotalTax (float) NetSalary (float) Display the Gross Salary, Base Tax, Additional Tax and Adjusted Net Salary (output to screen) FLOWCHARTs Main Module Calculate Net Salary Module DisplayGrossSalaryBaseTaxAdditionalTaxNetSalary Module PSEUDOCODE Main Module Declare GrossSalary as Integer Declare BaseTax as Float Declare BaseSalary as Float Declare AddlTax as Float Declare TotalTax as Float Declare NetSalary as Float Print â€Å"Enter the amount of the Gross Salary earned† Input GrossSalary Call CalculateNetSalary Module Call DisplayGrossSalaryBaseTaxAdditionalTaxNetSalary Module End Main Module CalculateNetSalary Module NetSalary = GrossSalary – BaseTax – (GrossSalary – BaseSalary * AddlTax) If GrossSalary 0.00 1,500.00 Then BaseTax = 0.00 BaseSalary = 0.00 AddlTax = (Gross Salary – BaseSalary) * 0.15 End if If GrossSalary 1,500.00 3,000.00 Then BaseTax = 225.00 BaseSalary = 1,500.00 AddlTax = (Gross Salary – BaseSalary) * 0.16 End if If GrossSalary 3,000.00 5,000.00 Then BaseTax = 465.00 BaseSalary = 3,000.00 AddlTax = (Gross Salary – BaseSalary) * 0.18 End if If GrossSalary 5,000.00 8,000.00 Then BaseTax = 825.00 BaseSalary = 5,000.00 AddlTax = (Gross Salary – BaseSalary) * 0.20 End if If GrossSalary 8,000.00 15,000.00 Then BaseTax = 1,425.00 BaseSalary = 8,000.00 AddlTax = (Gross Salary – BaseSalary) * 0.25 End if If GrossSalary 15,000.00 Then BaseTax = 1,425.00 BaseSalary = 8,000.00 AddlTax = (Gross Salary – BaseSalary) * 0..25 End if GrossSalary – BaseTax – (GrossSalary – BaseSalary * AddlTax) End CaclulateNetSalary Module DisplayGrossSalaryBaseTaxAddlTaxNetSalary Module Print â€Å"Employee Gross Pay, Tax and Net Pay Breakdown† Print â€Å"Gross Salary† GrossSalary Print â€Å"Base Tax† BaseTax Print â€Å"Additional Tax† AddlTax Print â€Å"Net Salary† * NetSalary End DisplayGrossSalaryBaseTaxAddlTaxNetSalary Module Test Values Input Expected Output Comments Salary = 0.00 Tax = 0.00 Lowest salary in salary range 1 Salary = -1,000.00 Error Message Out of range condition Salary = 1,000.00 Tax = 150.00 Midrange salary in salary range 1 Salary= 1,499.99 Tax = 225.00 Highest salary in salary range 1 Salary = 1,500.00 Tax = 225.00 Lowest salary in salary range 2 Salary = 2,250.00 Tax = 345.00 Midrange salary in salary range 2 Salary = 2,999.99 Tax = 465.00 Highest salary in salary range 2 Salary = 3,000.00 Tax = 465.00 Lowest salary in salary range 3 Salary = 4,000.00 Tax = 645.00 Midrange salary in salary range 3 Salary = 4,999.99 Tax = 825.00 Highest salary in salary range 3 Salary = 5,000.00 Tax = 825.00 Lowest salary in salary range 4 Salary = 6,500.00 Tax = 1,095.00 Midrange salary in salary range 4 Salary = 7,999.99 Tax = 1,425.00 Highest salary in salary range 4 Salary = 8,000.00 Tax = 1,425.00 Lowest salary in salary range 5 Salary = 11,500.00 Tax = 2,300.00 Midrange salary in salary range 5 Salary = 14,999.99 Tax = 3,175.00 Highest salary in salary range 5 Salary = 15,000.00 Tax = 3,175.00 Salary that exceeds the highest salary in salary range 5 by 0.01 Salary = 100,000.00 Tax = 24,425.00 Salary that exceeds the highest salary in salary range 5

Wednesday, August 21, 2019

The Dangers Of Cyber Bullying

The Dangers Of Cyber Bullying Todays children and young people have grown up in a world that is very different from that of most adults. As mobile phones and internet use become increasingly common, so has the misuse of technology. Many young people experience the internet and mobile phones as a positive, productive and creative part of their activities and development of their identities; information communication technologies support social activity that allows young people to feel connected to their peers. This research will explore the various ways that cyber bullying has become prominent in todays youth. Bullying does not only prevail in schools now, but also in the Internet. Todays technology and internet play a major role in cyber bullying. Every day of our lives we are exposed to the benefits of technology; innovations such as mobile phones enable us to communicate, and collaborate more effectively than before. However, in the possession of those who wish to inflict harm upon others, these inventions can be leveraged for nefarious purposes. One severely dangerous and unfortunately obscure application of technology is cyber bullying. Cyber bullying is when a child or teen is threatened, humiliated, or harassed by another child or teen using the internet, mobile phones, or any other digital technology. Cyber bullying involves the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, intended to harm (Belsley). Cyber bullying has been used to augment bullying that is occurring in school. The major differences between cyber bullying and traditional bullying are that the bully does not have to see the victims reaction to the harassment, the victim can remain anonymous, the harassment can occur at anytime, and the audience has the potential to be worldwide. Parents are not currently familiar with cyber bullying, but this aspect of cyber bullying will change with time. Many of the strategies that were successful with traditional bullying could be applied to cyber bullying. If adults become involved in this kind of behavior, it is called adult cyber-harassment (YoungWomensHealth). This is a far cry from the bullying behavior from days gone by. I interviewed people from two different generations. Carrie was in high school in the late 1940s. Alana: Was your school setting similar to that of today? Carrie: No, we were all taught in a one room schoolhouse. Grades one to seven learned lessons together. Alana: Was there any bullying going on back then? Carrie: No. Just chiding or what some folks call doing the dozens. Children were accustomed to behaving. They cared about what their parents thought. They never wanted to embarrass their parents. It was respectful almost all of the time. Alana: Did any child kill themselves over being picked on? Carrie: No. Never. Alana: Thank you for your input. Aishah was in high school in the 1980s. Alana: How were children bullied when you were in school, and was there a lot of it? Aishah: Oh yeah. There was bullying back in those school days. It wasnt viscious like it is today, though. Alana: What did children do or say? Aishah: They would write ugly messages on bathroom stalls and student desks or pass ugly notes in class. Alana: Did anyone fight over rumors and name-calling? Aishah: They fought and were friends the next day. Alana: You all used computers. Who was bullied by computer? Aishah: Please, not too many people had a home computer. They were kind of expensive back then, and we played Space Invaders and one other game on them. Thats it. Alana: Did teens and pre-teens have cell phones or other electronic communication devices at that time. Aishah: Oh absolutely not. Those were very expensive back then, as were the charges. Only doctors, lawyers and drug dealers carried cell phones and pagers. Alana: Does it seems as though all of the new electronic forms of communication have contributed to cyber bullying. Aishah: I do. 100 percent! Numerous physical and mental ailments can ensue from online harassment in youth and adults all over the world. Whereas traditional bullying is confined usually within school boundaries, cyber-bullying can take place at any time or place, even in the privacy of ones home. Therefore, students who are electronically engaged can be cyber bullied at any time. Options for escape are extremely limited, with the principal options being either to cease using the Internet or ignore the harasser. Preliminary research by Willard suggests cyber-bullying may produce even more damage to youth, with such consequences ranging from low self-esteem, anxiety, anger, depression, school absenteeism, poor grades, an increased tendency to violate against others, to youth suicide (Willard). Examples of cyber bullying are sending threatening or offensive e-mails, instant messages, or cell phone text messages directly to the victim (WiredKids). Some cyber bullies berate their intended victims by sending mass e-mails, or text messages, to a large group of their peers to humiliate them. The appeal of using instant messaging, email or other communication platforms for bullies is the advantage of covert humiliation. Users can hide behind their IP address, which is little accountability for their actions, and the probability of the abuse being traced to an individual culprit being slim to none. Temporary email accounts and pseudonyms in chat rooms, instant messaging programs, and other Internet venues can make it very difficult for individuals to determine the identity of aggressors. The nature of much of this of this cruelty also prevents blame from being duly laid. The phenomena deals more with the ability to reach such a wide audience and humiliate, threaten, or virtually destroy the reputation of another with a single click of a mouse or the send button on a mobile phone. Although rumors spread fast with word of mouth, they are not able to reach as many people in such a short period of time as they would with text messaging. It is very difficult to defend oneself from cyber bullying when the audience is vast, and the perpetrator is often anonymous. Those who bully others seek to establish power and control over others that they perceive to be weaker than them (Belsley). The motivation of bullies is sometimes due to a lack of confidence and a desire for control. Bullying on the computer is quite cowardly, because the perpetrator wont confront their victim in person. The lack of face-to-face interaction in cyber bullying, reduces empathy in bullies and the fear of getting caught. Cyber bullying is strange thing. Although there is no physical violence, cyber bullying can be more frightening to the targets because there are, potentially, an unlimited number of witnesses. When bullying is anonymous, targets are unaware of whom to watch out for or respond to attacks; which can lead to feelings of helplessness. Over half of teenagers who are targeted by cyber bullies never actually report it. Cyber bullying often occurs away from adults. Therefore, witnesses or bystanders to cyber bullying have a very important role to play when it comes to putting an end to it. They represent social consensus and in this capacity, have an important role to play in stopping or supporting cyber bullying (BeWebAware). The latest technologies used by cyber bullies are camera phones, built-in digital cameras into the phones, add new dimensions to the problem. Cyber bullies use them to take pictures of a victim in the restroom or locker rooms and post them on the web or send them to others through e-mail or picture messaging on a cell phone. Violent fights at schools are captured by students on their mobile phones and then sent to others or posted on websites like YouTube, MySpace, or Face book for others to view and comment on, causing harm to the victims. Now school administrators and teachers are being asked to oversee students in cyberspace, which anyone can access just about anywhere, anytime, day or night (Franek). If the offending media is a video file of a schoolgirl in a compromising situation that is being shared from phone to phone, is everyone who has a copy of the file worthy of punishment? It is these issues, and many more that have prompted a timely increase in the awareness of cyber b ullying. On social networking sites, they allow you to tag the names of people who appear in a photo. This simple act can lead to cyber bullying, as these photos will appear in any search engine under the persons name, allowing the victims to be exposed. Children and teens write messages for all of their friends to see in blogs. However, kids sometimes use these blogs to damage one anothers reputations or invade their privacy (WiredKids). Sometimes teens set up fake profile pages, impersonating others, degrading them and saying things designed to harm and humiliate them. MySpace is the number one social networking site for high school age students and younger. Most kids use MySpace to set up profiles and share information about themselves, their favorite music, Hollywood stars and other interests with kids in their school or neighborhood. For most, MySpace represents a fun form of self-expression that utilizes the latest online technology. However it is executed, cyber bullying on MySpace remains a significant problem. While many chalk it up to kids being kids, more and more are starting to realize that a nasty post on someones MySpace page is as bad or worse that a taunt yelled across the schoolyard. Facebook is similar to MySpace except that it is geared towards a slightly older audience, the music and customization functionality is a lot less robust than found on MySpace, but is still being used by cyber bullies to harass their classmates and ex-friends. The rules of engagement are similar to those found in MySpace. People will either use their own profile to harass others, or create fake identities and build profiles to harass other people or dupe them into thinking another person is interested in them, romantically or as a friend. When on Facebook, sometimes you get requests from people you dont know through your friends. Many teens want to seem popular so they accept the unknown people, to expand their friends to try and get as many as possible. When a friend doesnt like something youve said or done, they can bad mouth you to the people that are on your friends list. One of the fastest growing social media enterprises, Twitter, allows people to follow one another by posting regular updates about their activities. Twitter is seeing a growing number of cyber bullying incidents as more and more kids figure out how to post hateful, harassing information about their friends and deliver it via Tweet to as many followers of the site as they can. In the most extreme cases of cyber bullying, many kids are going to the trouble of building entire websites from scratch in order to use them to humiliate another individual. A common method for doing this is to buy a URL from godaddy.com that humiliates the target such as: www.ambersisugly.com, then fill it with unkind postings and photos. Photoshopping a person into uncompromising positions is a highly used form of cyber bullying, then spreading word about the site to others via email, social networking, etc. Many kids today are playing interactive games on gaming devices such as X-Box Live and Sony Play Station 2 Network. Multiplayer online games and virtual worlds can be venues for harassment and cyber bullying. These gaming devices allows teens to communicate by chat and live Internet phone with anyone they find themselves matched with in an online game. Sometimes the kids verbally abuse the other kids, using threats and crude language. Sometimes they take it further, by locking them out of games, passing false rumors about them or hacking into their accounts (Willard). Yet, interactive gaming is what kids and teens enjoy the most. And what used to be a solitary and isolating activity is now a community and social activity. As entertaining as interactive gaming is, parents should be aware that their children can speak, using their own voice, with strangers online. Xbox comes with built-in parental controls, which prevent the child from using voice chat until the parent feels they are able to handle it safely. They need to be aware that networked gaming devices offer voice chat (WiredKids). They also need to understand that many other interactive voiced games can be accessed online using an ordinary headset. Some teens who get involved in cyber bullying dont realize the impact or consequence of what they say online or in a text message. They may feel that saying something online or via a text message is not as bad as if they said it in person. The bully then sits back and gains gratification from seeing others engage in destructive behavior towards each other (Field). It may even start out as a joke. Others use cyber bullying because they dont have the courage to say something face to face. Either way you look at it, cyber bullying is wrong because the remarks are usually untrue, very hurtful and can be damaging to the victim. If educators and administrators could create and use blogs to educate students about cyber-bullying in language that students can understand and to which they can relate, it may be a more appropriate medium for implementing guidelines as opposed to the more traditional and older-fashioned approaches. Web blogs represent a new medium for computer-mediated communication that may offer discernment into the ways of young peoples self-expression and relationships in peer groups. Schools need to educate students and parents about cyber bullying. They need to inform parents and students of acceptable computer use policies in writing at the beginning of the school year and strictly reinforce these policies throughout the school year. It is recommended that there be a clause in the policy allowing school officials to discipline students for violating the acceptable use policies when not using school computers under certain circumstances (COPS). The policies should be posted visibly in areas where computers will be used by students. A penalty for students violating any acceptable policy should be suspension of their computer privileges. All children and teens have a way of showing their emotions or signs that something is wrong. Parents and teachers sometimes mistake these signs as normal behavior. It is not until this behavior gets out of hand or creates problems, that someone grows concerned and begins to ask questions. Signs that a child is being cyber bullied can vary. A few things to look for are: signs of emotional distress during or after using the internet, withdrawal from friends and activities, avoidance of school or group gatherings, slipping grades and acting out in anger at home, or changes in mood, behavior, sleep, or appetite (KidsHealth). Children who are victims of cyber bullying normally do not tell anyone, because they feel afraid or are embarrassed. There have been many high profile and tragic incidents in the media in recent years which have linked adolescent suicides to experiences with cyber bullying. The connection between suicide and interpersonal aggression is certainly nothing new, as a number of studies have documented the association between bullying and suicide. Those who experience bullying, and those who bully, report higher levels of suicidal ideation and are more likely to have attempted suicide. Some people who end their lives or attempt suicide might be trying to escape feelings of rejection, hurt, or loss. Others might be angry, ashamed, or guilty about something. Some people may be worried about disappointing friends or family members. And some may feel unwanted, unloved, victimized, or like theyre a burden to others (KidsHealth). The following is an account of real-life examples. Thirteen-year-old Megan Meier of Dardenne Prairie, Missouri was, by all accounts, a sweet, loving young lady. Megans parents vigilantly monitored Megans Internet use, going so far as refusing to give Megan access to her own MySpace account unless one of them was there to input the secret password. Shortly before her fourteenth birthday, a cute boy name Josh sent Megan an electronic request to be added as a friend to her MySpace account. For the next six weeks, Megan and Josh exchanged on-line correspondence and Megan began to have a rosier outlook on life as there was now a cute boy who thought she was pretty; Megan had suffered for years with weight issues and depression. Suddenly, and inexplicably, Megan received a message from Josh ending their on-line relationship because he had heard that she was not nice to her friends. Josh had also shared some of the private content of their prior conversations with other classmates on MySpac e which led those classmates to launch an online attack against her, calling her vicious names. Later that evening, Megans mother found her hanging by a belt in her bedroom closet; she died the next day. Sadly, Megans story gets much worse. Weeks later it would be revealed that Josh was an imaginary persona, allegedly created by the mother of one of Megans former friends. The mother, the former friend, an eighteen-year-old employee of the mother, and several other of Megans classmates all took turns pretending to be Josh, writing messages and causing Megan to reveal personal and private information to an audience that she believed was a cute boy that liked her (Pokin). Eerily similar, is the story of thirteen-year-old Ryan Halligan of Essex Junction, Vermont. Ryan had struggled during his early years in school and had self-esteem issues as a result. Beginning in the fifth grade, he was bullied by another boy in school. The bullying persisted until seventh grade when Ryan was able to fend for himself during a physical altercation with the bully. After that, Ryan and the bully became friends and Ryan revealed potentially embarrassing confidences to the boy. The boy then revealed these stories to classmates via the Internet, starting rumors about Ryans sexual orientation. Later that summer, Ryan began chatting on-line with one of the most popular girls in school. Like Megan Meier, he felt comfortable enough with the girl to discuss topics that he would not necessarily want others to know about. When the school year began, Ryan approached the girl only to be rejected in front of her friends. She informed Ryan that the on-line relationship had been a joke, and that she had shared the contents of their chats with her friends. Unable to deal with the humiliation, Ryan committed suicide (Halligan). These are extremes but far from unique examples of devastation wrought by cyber bullying. Since Halligan and Meierss death, more and more children are logging onto the internet, so its likely that online bullying, including sending threatening messages, displaying private messages and posting embarrassing video and photos online, is also increasing. There are no laws that specifically address cyber bullying. Cyber bullying offences can fall under other laws depending on the state. Victims of cyber bullying should not respond to the cyber bully, as the situation can escalate into serious incidents offline. Keeping electronic and printed evidence to document incidents and reporting serious incidents to law enforcement officials is recommended. What can you do to protect yourself and your family from the consequences of cyber bullying? First, get involved with your childs online activities. Require that all passwords be divulged to you, and make it a policy to audit regularly. If your child has an online web page, such as those on MySpace, visit it often to see what he or she is posting. This includes both the parents of the bullies and the victims. Next, there needs to be frank talk to other parents about what is going on in your childs online life. You would be surprised how much other parents could tell you about your own child. Finally, if your child is bullying someone, make sure he knows the potential educational, criminal or financial consequences of such behavior. If you discover that your child is a victim of bullying, consider having her see a counselor to ensure that there are no issues that would cause her to crack under the pressure. Although most kids are able to live through the ordeal, there are some kids such as Megan and Ryan who may have underlying issues that need to be addressed (Curier). Finally, if your child is being ridiculed for an issue that could be easily improved with the proper attention, parents should not delay in getting help for the youngster. This issue is not going away, and begs for much more attention and a host of solutions to cease what is definitely one of the most troubling trends of our times.

Tuesday, August 20, 2019

The Role Of Communications In An Organisation English Language Essay

The Role Of Communications In An Organisation English Language Essay Understanding the role of communications in an organization: 1.1: Explain the communication processes used within my organization (TESCO): Communication process is the process of sending data from one source to another intentionally with a meaning perceived by the receiver. If a company wants to survive in the industry then communication plays a vital role. Without proper communication no work can be completed successfully in organization. It is simply passing information from one to another. There are six basic elements of communication process which are sender (encoder), message, channel, receiver (decoder), noise, and feedback. Tesco uses modern communication process where ICT is vital.  Tesco controls and monitor their every aspect of their operation by using ICT, which includes stock, distribution, payroll, communication methods, and so on 1.2: Analyse the purpose of communication process used within TESCO: In Tesco communication helps to achieve its aims and objectives. Although it doesnt help to achieve all of the aims and objective still help to achieve their main aims and objectives such as To make profit To expand To provide good services to the customers To provides jobs Tesco advertise their product thorough brochures, Internet, television to inform people about their product rates and special offers at the stores at the time. Tesco spends lots of money to advertise their products and make sure that have reached their customers. This will attract more customers and enables Tesco to make a profit. Tesco advertises vacancies thorough Internet and newspaper and find a right person for the job to provide good services to the customers. If Tesco makes profit it will help them to expand and create more jobs so advertisements helps Tesco to achieve their aims and objectives such as making profit, expand and creating jobs. Tesco used costly and effective communication method such as demonstration, video in training so that the colleagues can be trained efficiently so they can provide good services to the customers. Tesco used to check their availability of product and order them at right time so they can provide better services. They do not want to disappoint the customers and they advertise their prospectus and advertise their financial performance to attract new shareholders so they can get more money, which will help them expand worldwide. Tesco need to communicate very well because they are running their business at international level. If business wants to expand worldwide or want to create new jobs they need to make profit. Tesco makes 3 million profits a day and serving more than billions of customers per week. Tesco need to check there expire dates and quality of their product so that their customers are not affected. Tesco arranges meeting with the staff so they can discuss and create new ideas and feedback about their services and Tesco used to communicates with customers and take their ideas and complaints to improve their services. Tesco uses to give written warning to their employees and the person who breaches the employment contract and they finally dismiss them they have written evidence and they can use it for future references and they employ the staff that can take care of their customers. Tesco uses overhead projector to analyse the profit forecast with the employees and accountant which is very expensive and Tesco used to arrange meetings with their senior manager so they can get a better decision and to solve problem and this will help them to make profit and expand. Tesco provide walkie-talkie to their security guard to protect their premise and customer belonging in the stores. Tesco use e-mails, mobile phones, and pager and fax to communicate within their employees to pass any urgent information in terms of emergencies such as break down of machines, raw materials needed this will help them to provide good services to the customers. Tesco writes letters to their customer about the nectar value or the amount due to them by the customers. Tesco prepares reports about the company legal obligations, which can be used for future references. 1.3: Analyse communication barriers in TESCO: There can be a few problems with the use of ICT in Tesco.   Faults of computers can slow down the processing systems, fraud can take place and the cost of ICT is very expensive.   But Tesco has the latest ICT equipment and is not getting any major problems.   There ICT system gives them the best support to meet its objectives. Tesco spent about  £133 million on ICT that is about 1.4% of their turnover, this clearly shows that ICT is a great success for the company and is fit for its purpose.  ICT is value for money and very effective in helping Tesco achieve its business objectives. Be able to manage interpersonal communication skills: 2.1 Auditing my Communication Skills: The communication skills that I am used to are: Tone/pitch, Slang, Pace, Gestures, Body language, Listening, Facial expression, Eye contact, Group interactions. 2.2: The use of my communication skills within organizational setting: My tone and pitch was appropriated I did not shout at of my client as this would make him/her angry or even intimidating to talk to me so I kept it at a level that he/she could hear me clearly. I did not used any slangs and jargon because my client may not of understand what I was say so he/she will be confused not only just my clients but others within the group also the only time it is appropriate for me to use slang is when I am talking with my friends. I used appropriate pace I did not talk to fast because people may not heard clearly what I was saying. In order to get my point across I talk slowly  and clearly to that my point could be heard. Gestures- I used appropriate gestures for the other to understand what I was trying to say. Adapted the used of Egan theory of SOLER which stands for Squarely, Open, Lean, Eye contact, Relaxed. I lean forward to show that I was interested in what he/she was saying I kept my contact and I also faced him/her squarely. I had to listen to wha t he/she was saying so that I can summarize my facial expression was welcoming I smiled at him/her to make him/her feel safe and felt I feeling of love and belonging according to Maslow hierarchy of needs I kept my eye contact on the person that was talking to show that I was listening. As I was a group interaction I gave other people time to talk I did not talk over anybody voice. In my group interaction with my client I appeared to be interested and kept good facial expressions.     One 2 one When talking to the child I used the correct tone I did not shout or this would make him angry to I get calmed I also talked slowly and clearly to he can hear what I was saying. I kept good eye contact with the child I listen to what he was saying and I ask him some open question so that he can express himself. I did not stand over him when I was talking or he may feel intimidating. I kept good facial expression mostly my smiling at him. I did not use any slangs or jargon just simple words that he may understand. I also incorporated Maslow by showing love, belonging and safety. I showed hid that he can come and talked to me without by afraid. I played with him nicely and made in happy so that he would know that he is in a safe environment. Care value base I did not shout at the person as they have the right to be treated with respect. I tried to empower them to make their own decision   I done this my asking the seven year old boy what he would like to do. I did not pass any racism comment or else I would be discriminating against their diversity being race religion culture etc. I also gave them the rights to their own beliefs I did not slag them off but I gave them the chance to explain themselves. I maintained confidentiality as this builds trust I done this by not passing important information about the clients to others and also it would breach the data protection act. 2.3: The effectiveness of my communication skills within organizational setting: Communication is the best tool by which a person can express and try to convey its point but it is not necessary that the receiver takes it in the right way as the sender must have perceived.   Why do we learn how to communicate effectively as poor communication and lack of communication skills can lead to misunderstandings, fights, low morale, arguments and change the perception of the audience or the receiver 2.4: A development plan to improve my own communication skills, using feedback from others: Successful communication is not about me and getting what I want; it is about discovering what other people want and need and then adapting my presentation to match their needs. As I practice and develop my skills, I find that people gladly  adopt my ideas because I have subtly helped them to discover them for themselves rather than telling them about them. To development plan to improve my own communication skills, using feedback from others I generally use the following process: Visual- use conversation to describe things check that spectacles are been worn help the person to touch things explain the detail sighted people take for granted Hearing- do not shout, speak normal and clear and make sure your face is visible so that those who can lip read are able to do so write message or use pictures check for hearing aid   Environmental- Check and improve the lighting Change to a quieter setting Work in smaller group if it would help you to see and hear each other more easily. Time- give people more time to talk and understand Be able to manage my workplace communications: 3.1: Improvements to my workplace communications: Improving communication can lead to healthier relationships and further motivation which is much needed in company. From what we can understand, it is hard to measure the motivation of the secretary, which appears quite low. Although it may seem like there are a lot of problems, many other issues are not; for example, poor language skills, hierarchy, and emotional interference. There are two main types of communication; formal and informal. It is important to know which to use for certain information. Formal communication runs through a procedure or protocol whereas informal is quite the opposite, where information is communicated through unreliable sources, such as the grapevine. Communication with the secretary seemed considerably informal; especially at times when it would have been more desirable to be formal. To ensure important information is carried through, it is highly recommended to be formal and use the right medium for communication. 3.2: Implementation of a plan to improve my workplace communications: To implement a plan to improve my workplace communications following are necessary: I believe there are more things to improve on in my group communication because sometimes it was a lot harder as there was more than one person. It was also harder because there was someone who is a resident and then there were 4 staff members between 20-35. There were a few barriers in this communication because we were outside and it was raining, everyone was cold and also we all had umbrellas covering our faces. My active listening sometimes wasnt very good because everyone was talking over one another, I think that if I had spoken up then I could of grasped what was getting said but because I was only there on placement I thought that I shouldnt but in although who I was talking to should have taken turns in speaking.    My eye contact sometimes wasnt very good because it was raining so there were umbrellas in the way of peoples faces and its harder to use eye contact within a group communication. The reason I didnt use much eye contact was because everyone was speaking over one another so I kept glancing at everyone but my main focus was on someone. This was because I wanted him to feel comfortable although it was cold outside. I didnt use touch in my group communication as I thought it wasnt needed. This was because we were all outside and it was cold. Everyone had an umbrella to themselves so you couldnt really get close enough to anyone to touch them. Although I did help someone get out of his chair when it was time to go back inside. To improve on this I believe I could have helped someone a bit more with getting in and out of his chair because then I would have used touch more appropriately rather than just grabbing at his hand to help him walk inside. I didnt grab at his hand because I knew he could walk on his own with the aid of a walking stick but if he had of asked me to hold his hand then I would have done. 3.3: Develop measures to evaluate success of a plan to improve my workplace communications: It is a necessity Nobody can do without communicating we communicate even if we are silent by our facial expression, or the posture we are sitting etc.   Therefore, we need to know the communication process to communicate effectively. It is a two-way process It includes sending a message and the response to that message. It is not complete unless the receiver has correctly known the message and his response (feedback) becomes known to the sender. It always involves two parties sender and receiver Two or more individual are involved in communication, in the organization point of view it can be upward, downward, horizontal or vertical.   The flow of communication is a circular one It is continuous, on-going process. It is a pervasive function; performed in all types of organizations at all the levels of management. Organization surely cannot do without communication. It is like Bow out of the arrow You can never take back your words whatever you say is already said and already observed by the receiver like for e.g. when we are angry we say things which we are not suppose to say even if we apologize it is irreversible.   That is the reason we have to be careful in saying anything to anybody this goes professionally as well personally. Recommendations and Conclusion Improving communication can lead to healthier relationships and further motivation which is much needed in Johns company. From what we can understand, it is hard to measure the motivation of the secretary, which appears quite low. Although it may seem like there are a lot of problems, many other issues are not; for example, poor language skills, hierarchy, and emotional interference. The crucial problems in the organisation can easily be avoided simply by exercising effective communication practice. This would include understanding different methods, forms and mediums of communication.

Monday, August 19, 2019

The Music Industrys Fear of the MP3 :: Media Delivery Digital Music

Corporate Fear of the MP3 The mp3 audio format is widely championed as the new great leveling format in the music business and the savior of local and unknown performers in the face of conglomerate-owned record labels, portrayed as giant, bloated entities who fear and despise the new format and seek to curtail its popularity and accessibility. In reality, the mp3 format is no different than previous innovations in portable recorded music software -- vinyl, cassette tapes, or compact discs all improve on their predecessors in sound quality and portability -- the mp3's novelty is its extreme accessibility, and once a conglomerate fully realizes the potential with which to exploit the new medium, the format becomes the latest appropriated technology. Corporate fear of the mp3 will only last as long as it takes for someone to figure out how to regulate and enforce the new format. Opposition to the mp3 by large corporations rests on the grounds of property and copyright law enforced by the Recording Industry Association of America (RIAA), the trade group which oversees "the recorded music you enjoy every day" (www.riaa.com). In addition to certifying gold and platinum sales records of albums, the RIAA lobbies against censorship of artists but conversely proposed and enforces placement of "parental advisory/explicit content" stickers on what they judge to be "offending" albums. The RIAA's concern with the mp3 format is how easily the format lends itself to the illegal industry of CD piracy. Added to a personal computer-run CD creator software/hardware package (a CD "burner" plus blank CD-R discs), the mp3's economic use of byte space while preserving digital CD sound quality is a potential gold mine for would-be pirates, and despite RIAA efforts ("confiscation of 23,858 illegal CD-Rs during the first half of 1998, as compared to 87 in the same period last year" ), CD pirates in the U.S. as well as many countries around the world continue to peddle "counterfeit" discs at "flea markets, from street vendors, at swap meets, and in a concert parking lots" (ibid.). The discs are regarded as counterfeit by the RIAA as well as the federal government because duplication of the work, which is copyrighted to the artist, their record label, or both, or others, is a violation of federal copyright law. Such fear over unauthorized duplication is not unprecedented; the proliferation of blank cassette tapes in the 1980s created a similar furor within the industry over

Sunday, August 18, 2019

Greece :: essays research papers

Greece has an area of 50,949 square miles and is located at the southern end of the Balkan Peninsula. The area of Greece is approximately the same as that of England or the U.S. state of Alabama. Greece is located in Southern Europe between Albania and Turkey. The country is bordered to the west by the Ionian Sea, to the south by the Mediterranean Sea, and to the east by the Aegean Sea; only to the north and northeast does it have land borders. The basically Mediterranean climate of Greece is subject to a number of regional and local variations occasioned by the country’s physical diversity. The people of Greece usually experience mild, wet winters and hot, dry summers. In all seasons, especially in summer, the quality of light is one of Greece’s most appealing attractions.   Ã‚  Ã‚  Ã‚  Ã‚  The Greek landscape is conspicuous not only for its beauty but also for its complexity and variety. Greece is dominated by three elements: the sea, mountains, and the lowland. Arms and inlets of the sea penetrate deeply so that only a small, wedge-shaped portion of the interior mainland is more than fifty miles from the coast. Islands make up roughly eighteen percent of the territory of modern Greece. Approximately eighty percent of Greece is mountain terrain, much of it deeply dissected. A series of mountain chains on the Greek mainland enclose narrow parallel valleys and numerous small basins that once held lakes. The last dominant feature of the Greek landscape is the lowland. The lowland makes up about twenty percent of the land area and it has played an important role in the life of the country.   Ã‚  Ã‚  Ã‚  Ã‚  Approximately eleven million people live in Greece today. All but a very small part of the population belong to the Church of Greece (Greek Orthodox Church). The Muslim minority, which constitutes most of the non-Orthodox group, is mainly Turkish. Roman and Greek Catholics account for the rest, except for a few thousand adherents of Protestant churches and of Judaism. In terms of ethnic composition, Greeks make up all but a small part of the total, the remainder being composed of Macedonians, Turks, Albanians, Bulgarians, Armenians, and Gypsies. Despite a rapid rate of growth in the post-World War II period, Greece’s economy is one of the least developed in the European Union (EU). Rates of productivity remain low in both the agricultural and industrial sectors, and the development of the country’s economy has lagged behind that of its EU partners. Greece :: essays research papers Greece has an area of 50,949 square miles and is located at the southern end of the Balkan Peninsula. The area of Greece is approximately the same as that of England or the U.S. state of Alabama. Greece is located in Southern Europe between Albania and Turkey. The country is bordered to the west by the Ionian Sea, to the south by the Mediterranean Sea, and to the east by the Aegean Sea; only to the north and northeast does it have land borders. The basically Mediterranean climate of Greece is subject to a number of regional and local variations occasioned by the country’s physical diversity. The people of Greece usually experience mild, wet winters and hot, dry summers. In all seasons, especially in summer, the quality of light is one of Greece’s most appealing attractions.   Ã‚  Ã‚  Ã‚  Ã‚  The Greek landscape is conspicuous not only for its beauty but also for its complexity and variety. Greece is dominated by three elements: the sea, mountains, and the lowland. Arms and inlets of the sea penetrate deeply so that only a small, wedge-shaped portion of the interior mainland is more than fifty miles from the coast. Islands make up roughly eighteen percent of the territory of modern Greece. Approximately eighty percent of Greece is mountain terrain, much of it deeply dissected. A series of mountain chains on the Greek mainland enclose narrow parallel valleys and numerous small basins that once held lakes. The last dominant feature of the Greek landscape is the lowland. The lowland makes up about twenty percent of the land area and it has played an important role in the life of the country.   Ã‚  Ã‚  Ã‚  Ã‚  Approximately eleven million people live in Greece today. All but a very small part of the population belong to the Church of Greece (Greek Orthodox Church). The Muslim minority, which constitutes most of the non-Orthodox group, is mainly Turkish. Roman and Greek Catholics account for the rest, except for a few thousand adherents of Protestant churches and of Judaism. In terms of ethnic composition, Greeks make up all but a small part of the total, the remainder being composed of Macedonians, Turks, Albanians, Bulgarians, Armenians, and Gypsies. Despite a rapid rate of growth in the post-World War II period, Greece’s economy is one of the least developed in the European Union (EU). Rates of productivity remain low in both the agricultural and industrial sectors, and the development of the country’s economy has lagged behind that of its EU partners.

Saturday, August 17, 2019

Review of Heavy Oil: Formation, Properties and Recovery

Introduction Oils with highly high densenesss and viscousnesss are termed as heavy oils. They are composed of long and high molecular weight compounds. Heavy oils are categorized with scope that is less than 220API to 100API ( American Petroleum Institute ) gravitation. Heavy oils that are less than 100API are to be referred as the excess heavy oil or Bitumen. The fluctuation between the excess heavy oils and bitumen is non merely the affair of API gravitation or their chemical composings but their Viscosity. The excess heavy oil is a type of oil that may resemble pitch sand bitumens and do non flux easy. They are recognized as holding mobility in the reservoir when compared with pitch sand bitumen which is incapable of mobility under the reservoir conditions. The word pitch sand is used to depict the sandstone reservoirs that are impregnated with a heavy and syrupy black petroleum oil that can non be retrieved through good conventional production techniques. Bitumen, referred as native asphalt i ncludes a broad assortment of ruddy brown to black stuffs of semisolid, syrupy to brittle character that can be in nature with no mineral dross or with mineral affair contents that may transcend 50 % by weight. Bitumen is more syrupy than excess heavy oil at reservoir force per unit area and temperature conditions. Bitumen is immobile and excess heavy oils have some grade of mobility at reservoir conditions. The ultra-heavy or excess heavy oils are denser than that of H2O which has an API gravitation of 100API. While the gravitation units API, do non depict the whole fluid belongingss of the petroleum which is represented by the oil viscousness. Like some petroleums might be of low gravitation but they have comparatively low viscousness at reservoir temperatures when compared with lighter petroleums. Heavy oils occupies scope along the continuum between ultra-heavy oils and visible radiation oils. The above estimations are mentioned by the Energy Information Administration ( EIA ) . EIA revealed that there were 1646 billion barrels of proven militias in 2013. Globally, the recoverable militias of heavy oil and natural bitumen are equal to the staying militias of the conventional oil. Harmonizing to the informations analyzed informations Middle East states dominates in footings of the conventional oil militias while the South America, well the Venezuela leads the universe in footings of the heavy oil militias. Harmonizing to the above representations of conventional oil, heavy oils and bitumen sedimentations, the conventional oil production in Canada has diminution over the past few old ages from 1.2 million bd to 1 million bd including the visible radiation and medium classs oil every bit good as the heavy oil from Alberta and Saskatchewan Fieldss as of 2006. Harmonizing to the Canadian Association of Petroleum Producers ( CAPP ) , during the same period of five twelvemonth span from 2001 to 2006 the entire production from the mined oil littorals and oil littorals produced in situ by the assistance of Steam Assisted Gravity Drainage ( SAGD ) or may be through other methods increased from the 659000 bd in 2001 to 1.1 million bd in 2006 and this estimations might travel every bit high as 4 million bd in 2020. Russia has approximately 246.1 billion barrels of natural bitumen of which 33.7 billion barrels which is about merely the 14 % of entire is recoverable. The staying 86 % can non be rea listically recovered as they exists in distant countries or scattered in many little sedimentations. The nature of heavy oil is a job for recovery operations and for polishing due to high viscousness due to which makes the rendering recovery disbursal and the presence of sulfur content may be high and increases the disbursal of polishing the oil. When compared to conventional crude oil, heavy oil typically has the low proportions of volatile components with low molecular weights and well higher sums of high molecular weight compounds of lower volatility. The high molecular weight fraction of heavy oils are comprised of complex mixture of different molecular and chemical types incorporating a assorted bag of compounds which might non needfully be merely paraffin components or asphaltene components with higher thaw points and pour points that may greatly lend to hapless fluids belongingss and low mobility of the heavy oil. The presence of asphaltene components are non merely the primary cause for the high specific gravitation of the heavy oils nor are the premier cause for production jobs. It is besides indispensable to see the content of rosin components and aromatic components presence in the heavy oil during its recovery and production. Heavy oil, as a resource is ever overlooked due to its trouble and the higher production costs involved in conveying the heavy oil onto the surface from reservoirs. As described by the geochemists that when crude oil beginning stone is generated, the petroleum oil produced by it is non heavy but it becomes heavy after the significant debasement during migration and after the entrapment. Degradation occurs through a assortment of biological, chemical and physical procedures in the earth’s subsurface beds. Bacteria borne by surface H2O metabolise the paraffinic, napthenic and aromatic hydrocarbons into heavier molecules. Formation Waterss besides remove hydrocarbons by solution, rinsing off lower molecular-weight hydrocarbons, that are soluble in H2O. The petroleum oil besides finally degrades by the devolatilization if hapless quality seals allow lighter molecules to divide and get away. The heavy oil typically forms from the younger geological stone formations like Pleistocene , Pliocene and Miocene stones. Those reservoirs possess the tendancy to be shallow deepnesss and less effectual seals in the stone formations. By early periods of 1900s, new progressed oil recovery procedures were deevloped such as Cold Production which is a primary recovery procedure. By executing the Cold Production at reservoir temperatures, the recovery effeciencies range from merely 1 % to 10 % boulder clay it reaches the maximal economical recovery factors. Oilfield companies requires long term investing for heavy oil recovery and due to the ground that heavy oil creates conveyance troubles, is a more dearly-won and polishing techniques for bring forthing marketable merchandises. Therefore their engineering value is assessed by their ability for cut downing its entire cost. Most of the heavy oil Fieldss are shallow makes the boring costs non a dominant factor but the increasing factor of figure of many-sided Wellss and horizontal Wellss makes it to present some costs durng the development phases. Within these costs, the primary costs if for the doing the heavy oil to mobilise by shooting the steam required. Every part in the universe has oil possessing different physical belongingss and is at different phase of procedure adulthood, therefore every part uses different development and production techniques forheavy oil recovery. Mechanism of formation of Heavy oil: As the specific gravitation of reservoir oil lessenings with deepness, API graity additions with deepness. The ripening phenomenon of oil takes topographic point in beginning and reservoir stones which makes the kerogen bring forthing lighter oil with deepness in the latter. Hence, the mean tendency observed worldwide is that the higher API gravitation oil is found at th increasing depths though less oil is produced with deepness. This must be pointed out that these are general tendencies but there are exclusions. There are assorted procedures that change the original oil that is produced during the migration procedure of oil and due to its subsequent accretions. Different procedures inculdes the biodegradation, H2O lavation, oxidization, deasphalting/evaporation and discriminatory migration of the igniter constituents. Biodegradation of the petroleum oils can alter the composings and physical belongingss over a certain geological timescales. Different micro-organisms that are present in the deposits of the oil bearing stones and bearing the crude oil reservoirs. They utilize the hydrocarbons as the beginning of C for their metabolic procedures. That procedure may be aerophilic or anaerobiotic. Largely the hydrocarbons are oxidized into intoxicants and acids. Simple consecutive ironss are prefered, but as the biodegradation continues, more of the complex molecules are increasingly being consumed. The long chained paraffins are oxidized for giving di-acids. Similarly, napthene and aromatic rings are oxidized to di-alcohols. This biodegradation phenomenon consequences in the loss of saturated and aromatic hydrocarbon content, roll uping rosins and asphaltenes and besides lessening of API gravitation which autmatically defines as addition in denseness of the oil. The biodegradation procedure an go thro ugh if the reserrvoir temperatures do non transcend 800to 820. Heavy oils influence on Physical Properties of Rocks During Production:Heavy oils have a shear modulus, act like a solid at low temperatures.They are strongly temperature dependant.Gas coming out of the solution might be it smallest sums can bring forth a big geophysical signature.Heavy oils normally acts as the cementing agent in unconsolidated littorals.During the production, reservoir stone matrix is frequently changed structurally.Physical belongingss of the stones possesing heavy oils are largely teperature dependant and frequence dependant every bit good.Simple Gassmann permutation will neglect in heavy oil reservoirs.Crude oils which chiefly has hydrocarbons or the coompounds consisting H and C merely. Other elements such as S, N and O are besides present in small sums and are combined with C and H in complex molecules. As these oils get heavier and becoome more viscours, their composing becomes complex and they forms concatenation and sheet constructions with the addition in thir molecular weights. Heavy oil, unlike conventional crude oil can non be recovered as an accretion unless there is any reservoir trap and that requires the boundary between the cap stone or any other waterproofing agent, and the reservoir stone by and large be in a bulging upward projection form, but the exact signifier of the boundary varies widely. Many of the oil and gas accumuylations are trapped in the anticlines or domes, these constructions are more conviniently detected than any other types of traps. Heavy Oil Recovery Techniques: Surface excavation: Surface excavation procedure is a wide class of excavation in which dirt and stone overlying the mineral sedimentations are removed. It is the antonym of belowground excavation, in which the overlying stone is left in topographic point, and the mineral removed through shafts or tunnels. Surface excavation began in the mid-sixteenth century [ 1 ] and is practiced throughout the universe, although the bulk of surface excavation occurs in North America. Surface excavation consists of three chief stages. After depriving off and carrying the site’s peculiarly fertile overburden, the pitch sand which is in the signifier of an ore is removed utilizing prodigious power shovels and shit trucks. In the 2nd stage the ore is washed in hot H2O, bitumen, and mulcts. A dissolver is added to the mixture to advance seperation of the bitumen. eventually the residuary mixture of H2O and sand is normally transferred to big deposit basins. The clarate is recycled and the settled solids are used to make full the cavity at the terminal of extraction operations. At the surface, the sites are rehabilitated which includes replacing an replanting the fertile overburden that was stockpiled at the beginning of the the undertaking. Mentions:Schlumberger Oilfield Review Magazine, Autumn 2002