Wednesday, October 30, 2019

Supreme court cases and the concept of Federalism. How they relate to Essay

Supreme court cases and the concept of Federalism. How they relate to the Federalists 10, 46 or 78 arguments - Essay Example Raich (2005), South Dakota V. Texas (1987) and Lawrence V. Texas (2003). Moreover, the discussion will also highlight how these cases relate to the Federalists 10, 46 or 78 arguments. The case of Gonzalez v. Raich (2005) is mainly related to the legal medical use of marijuana. In relation to this case, it can be ascertained that during the year 1996, California law passed the ‘Compassionate Use Act’, authorizing the use of marijuana for medical treatment. On the other hand, Controlled Substances Act (CSA) banned the use of the same. This difference in the viewpoints persisting between California law and CSA eventually led towards a conflicting situation. The major issue, which emerged in relation to the case, is mainly determining whether Congress is having the power to regulate marijuana production agreeable to the interstate commerce clause. Specially mentioning, this case addresses the federalism concept in the form of witnessing the involvement of both federal government and individual states concerning the regulation of producing and consuming marijuana (Oyez, Inc., â€Å"GONZALES v. RAICH†). South Dakota v. Dole (1987) is related to the case wherein South Dakota sued district court against Dole and the US government in relation to the violation of Section 158. This particular Section sets the constitutional limits on Congress regarding the power based on â€Å"21st amendment to the US constitution.† In accordance with the South Dakota law, individuals aged 19 and above are permitted to buy beer having 3.2% alcohol. The case illustrates the dispute regarding the state and the power of federal government in relation to the implementation of a minimum drinking usage. Again, the involvement of state as well as the federal government in this jurisdiction issue relates the aforesaid case with the concept of federalism (Thomson Reuters, â€Å"SOUTH DAKOTA v. DOLE, 483 U.S.

Monday, October 28, 2019

Eriksons Theory Essay Example for Free

Eriksons Theory Essay When discussing the development theory, Erikson had been the frontier with many major contributions. Unlike Freud and Piaget, Erikson’s theory of development focused much more on social interactions. While most of us agreed that children do become toilet-trained between ages one and three, Erikson’s theory also went further to acknowledge that children also learn to talk, walk, feed themselves, etc. In order to understand Erikson’s theory of development, we need to focus on three main principles: dynamic balance of opposites, vital involvement and life in time. Dynamic balance of opposites: There are two opposing tendencies in dynamic balance of opposites: dystonic (negative) and syntonic (positive). Erikson believed there were eight stages, and at each one, the individual resolved a crisis between the positive (syntonic) and negative (dystonic) tendencies (Erikson Kivnick 1986). A resolution of crisis does not mean that a person rejects either syntonic or dystonic completely, but rather that a person should find a balance between two of those tendencies. For instance, our American culture has frequently taught parents to never say â€Å"no† to their children because that could potentially damage a child’s self-esteem. However, Erikson would disagree and say that children do need to hear â€Å"no† sometimes to understand that the whole world does not revolve around them. Erikson would also say that telling the child â€Å"no† all of the time is bad as well. Vital involvement depends on the balance of syntonic and dystonic tendencies. Vital Involvement: Erikson developed eight stages of development. First, the trust versus mistrust stage, where infants start to learn that either the world is good and can be trusted, or is bad and can’t be trusted (Erikson et.al 1986). For instance, Erikson would state that babies learn to trust their caregivers for not letting them go hungry, but babies also learn to mistrust their caregivers for yelling at them and not feeding them consistently. Second, the autonomy versus shame and doubt stage where children learn about their own â€Å"selves† which is separate from their caregivers (Erikson et.al 1986). In this stage, children usually develop their own will and desires and apply  them well by saying â€Å"no†. When children start to feel comfortable using â€Å"no† as a way to reach their desires, they have reached the initiative versus guilt stage. In this stage, children learn to internalize values from the elder and also acquire the sense of guilt for wrongdoing. The next stage is industry versus inferiority where children explore the greater world in elementary school and their surroundings. Erikson did pay a lot of attention in the identity versus confusion stage because it focuses on adolescents and their identity crisis. Fidelity is the heart of identity because adolescents share some of their parent’s values, as well as develop their own. The last three stages include intimacy versus isolation, generativity versus stagnation, and integrity versus despair. Each of these stages focuses greatly on the continuity of human development until death. Erikson recognized that there are certain time periods when it might be easier for some to develop and harder for others to develop, depending on the environment that influence them. For instance, some children who faced hardships (family separation, family violence, etc.) might have trouble in certain stages or even all of the stages, depending on where the factors start. Life in time: Erikson referred to his theory of development as epigenesis. Epigenesis is relevant to evolution (the past and the future) and genetics. Erikson explained, â€Å"†¦epi can mean ‘above’ in space as well as ‘before’ in time, and connected with genesis can well represent the space-time nature of all development† (Erikson et.al 1986). Erikson did not refer epigenetic to individual genetic make-up and how it influences individual development. Rather, Erikson was concerned with how personality and behavior is influenced after birth and so on. For instance, my mother has had a hard time adjusting with American culture when we first migrated here from Vietnam. My sister and I started to adapt to the new culture right away—from clothing style, hairstyle, hobbies, etc. in which my mother had a very difficult time to accept. She wanted us to keep our traditional customs at home, as well as outside our home. At first, we felt reluctant because we felt she did not understand the importance of â€Å"fitting-in† at school. However, as we started college, my sister and I started to realize that our culture and traditions are unique and understand where my mother was coming from (Identity/ confusion stage). Conclusion: Erikson had dedicated his life by contributing to developmental psychology in major ways. Erikson’s theory of development is still widely used and studied by many scholars.

Saturday, October 26, 2019

Free Essays - The Importance of Honesty in The Catcher in the Rye :: Catcher Rye Essays

The Importance of Honesty in The Catcher in the Rye "`I'm just going through a phase right now. Everybody goes through phases and all, don't they?'"( pg. 15) In The Catcher in the Rye, by J.D. Salinger, Holden Caulfield is a sixteen year-old who is disgusted at all the phony people in the world. For example where artists sacrifice their art for fame and mothers cry fake tears in movies. The importance of not being phony and being honest is the theme that Salinger presents in this story. Holden had difficulty fitting in at school and around the real world. Holden had a tough time fitting in at his schools because he thought of almost everyone as phonies. "`It's full of phonies, and all you do is study so that you can learn enough to be smart enough to be able to buy a goddam Cadillac some day, and you have to keep making believe you give a damn if the football team loses, and all you do is talk about girls and liquor and sex all day, and everybody sticks together in these dirty little goddam cliques' (pg. 131)." He seems to have a history of expulsion and failure at various schools because of his lack of ability to cope with others. Ordinary problems of his had turned into major conflicts with other students. "I hate fist fights. I don't mind getting hit so much - although I'm not crazy about it, naturally - but what scares me most in a fist fight is the guy's face. I can't stand looking at the other guy's face, is my trouble. It wouldn't be so bad if you could both be blindfolded or something. It's a funny kind of yellowne ss, when you come to think of it, but it's yellowness, all right. I'm not kidding myself. (pg. 90)" Holden got into a fight with his roommate at school because he was going out with his ex-girlfriend. He's afraid that the guy is taking her from him, even though he's not with her anymore. These are problems that are normal, but Holden has trouble dealing with them. Holden's problems in the real world were too much for him, he had to make up things to make himself seem better than what he was.

Thursday, October 24, 2019

Kudler’s Human Resource Information System: Case Study

Kudler’s Human Resource Information Systems (HRIS) System is not efficient. Kudler does use Intuit which is one of the best payroll processing software to have. Intuit stores the basic information needed for payroll: personal information, pay rate, tax exemptions, hire date, seniority date and organizational information. In addition to Intuit storing information, the store manager keeps an Excel spreadsheet that displays job analyses, salary surveys and individual compensation decisions (HRIS System, n.d., para 6). All this information is needed the purposes of processing payroll correctly and making sure Kudler is in line with the guidelines given the IRS. In order to change any information within Intuit, a written document must be provided to the accounting clerk. Then the clerk will manually enter the changes into the system. The clerk also maintains a paper file with the tax forms for each employee. This file contains all the original forms for the employee data. Workers’ compensation is managed by a third party company that keeps their own records decisions (HRIS System, n.d., para 6). Employees must manually fill out timesheets each week. This paper document is then approved by the store manager and then is faxed to the accounting department decisions (HRIS System, n.d., para 6). Any corrections made to the timesheets must be approved by the employee’s direct supervisor and store manager. The store manager has the employee files for all employees that work in the store instead of having a central filing area. These paper documents are stored in a locked filing cabinet. The documents that are stored in this filing cabinet consist of: job application/resume, performance reviews, I-9 forms and any disciplinary memos or performance management issues decisions (HRIS System, n.d., para 6). These types of files should not all be contained in one area by the store manager. In order for an employee to ask for time off they must speak with their managers verbally. The managers are then responsible for tracking for any requests since there is no automated system decisions (HRIS System, n.d., para 6). Therefore, depending on the manager dictates what of method they use. Store managers are mostly in charge of hiring new employees with the assistance of the HR recruiter. Then after interviews are done and individuals are hired, the applications of the ones not hired are stored by the HR department. The HR assistants keeps all information about complaints, grievances, etc locked in a file at the HR headquarters. In reviewing the above information about Kudler their overall HRIS is doing more work than necessary. As previously stated Kudler does not have any automated systems to complete any of the work aside from Intuit. Kudler is still using paper documents to store sensitive information. SolutionsKudler will incorporate Accero Cyborg Self Service which consists of three modules: Employee Self-Service, Benefits Self-Service and Manager Self-Service (Empower Employees and Managers with Accero Self Service, n.d., para 2). This product is completely online and will greatly decrease the need for paper documentation.With the introduction of Accero it will alleviate a lot work that the HR department handles (Empower Employees and Managers with Accero Self Service, n.d., para 2). All information that is stored in files on paper will be put input into the system. This will allow for HR to not have to continually fill out paperwork whenever there are any changes within the department.Employee and Benefits Self-Service will allow for employees to update and view their personal information (Empower Employees and Managers with Accero Self Service, n.d., para 2). They will also be able to view paychecks and manage payroll options. Employees will also be able to see their benefits information and update if necessary.Manager Self-Service allows for managers to quickly view employee profiles, access to HR data 24x7x365, access handbooks and procedure manuals (Empower Employees and Managers with Accero Self Service, n.d., para 2).Kudler will also incorporate a new online recruiting system call Kenexa 2x BrassRing. The software will allow Kudler to post jobs and maintain resumes within the system. Applicants will be able to create a profile and apply to jobs. HR will view the applications submitted and contact the appropriate manager. Managers will be able to view the subm itted resumes as well if needed. If the applicant is not chosen, their resume will stay in the system for up to 90 days. Then the applicant will need to resubmit their resume.To help with the vast transition from paper to online Kudler will also incorporate a new online training course system call WebCourse. This will allow for all employees of Kudler to be trained per the specific department they work in.Reference http://www.webcourse.com/elearning.html

Wednesday, October 23, 2019

Social Media at Ibm and a Case Study of Yammer at Deloitte

IT InfrastructureSession 01 Social Media at IBM IBM has been aggressively using social media to tie its far-flung and huge workforce together and, without a doubt, also with a mind towards selling these technologies as part of its service offering. IBM’s Beehive Social Network is a glimpse of how social networks might be used and received in the future. It is an Internet-based social networking site that gives IBM staff a â€Å"rich connection to the people they work with,† both professionally and personally.Using it, employees can make new connections, track current friends and co-workers, and renew contact with people they have worked with in the past. In the first nine months of use, over 35,000 registered IBM employees created over 280,000 social network connections to each other, posted more than 150,000 comments, shared more than 43,000 photos, created about 15,000 ‘Hive5s,’ and hosted more than 2,000 events. Beehive seems to be succeeding â€Å"to h elp IBM employees meet the challenge of building the relationships vital to working in large, distributed enterprises. †Ref: IBM Watson Research Center (2008) â€Å"Project: Beehive†, available at http://domain. watson. ibm. com/cambridgeresearch. nsf/0/8b6d4cd68f, last accessed 28 Feb 2013. A Case Study of Yammer at Deloitte Social media technologies are making fast inroads into organisations. In the context of knowledge intensive work the propositions of improving communication, information sharing and user involvement seem particularly promising. However, the role and impact of social technologies in enterprises in general, and knowledge work in particular, are still not well understood, despite emerging scholarly works in this field.Our case investigates emerging communicative work practices on the Enterprise Social Networking platform Yammer within Deloitte Australia. We uncover a set of emerging practices enabled by the platform within the case company and reflect on our results in the context of the knowledge-intensive nature of professional service work. We find that Yammer in the case company has become 1) an information-sharing channel, 2) a space for crowd-sourcing ideas, 3) a place for finding expertise and solving problems, and most importantly 4) a conversation medium for context and relationship building.Ref: Riemer, K, Scifleet, P & Reddig, R (2012), â€Å"Powercrowd: Enterprise Social Networking in Professional Service Work: A Case Study of Yammer at Deloitte Australia†, available at http://hdl. handle. net/2123/8352, last accessed 28 Feb 2013. 1. What aspects of social media technologies do the above case studies illustrate? †¢ Information sharing †¢ Communication †¢ Joint problem sharing †¢ Discussion forums †¢ Networking †¢ Events management †¢ Generation of ideas/innovation 2. What other examples of the use of social media technologies for corporate communication are you aware of? Face book for marketing, discussion boards, event notification †¢ Dropbox for document sharing, joint authorship †¢ Google docs for document sharing, joint authorship †¢ Google talk, Skype for voice and video communications †¢ Linkedin for networking, profile, job seeking, employ seeking, outsourcing †¢ Share-point for document sharing, discussion board, joint authorship 3. To what extent can / should an IT Infrastructure Manager control the extent and mode of use of social media technologies? Can / Should Control Use |Cannot / Should Not Control Use | |Control access to some social media, such as personal email |Access to information | |accounts that deliberately bypass corporate mail pathways |Use of personal communication devices, especially for personal | |Access to and storage of certain type of content (pornography,|communication | |racial, anti-social) |Downloading of apps to non-corporate devices | |Privacy of corporate data – identifying realms of privacy: |Communication outside of work hours | |confidential, internally confidential, public, potentially |External threats – hacking, invasion, blocking, loss of | |public |external security | |Censorship of inappropriate non-professional communication – | | |through policies & governance | | 4. What are some implications of these developments in the use of social media technologies for the management of existing corporate IT infrastructures? †¢ The company needs to choice between hard censorship approach, or open communication sharing approach Need to provide training and education for staff to understanding guidelines and penalties †¢ Need protection against external threats by between fire-walls and software management †¢ Need a communication policy framework that covers all aspects of information communication, storage, access and use within the company †¢ Need to have staff sign communication agreements, based on these policies and comp letion of training and education †¢ Want a better understanding of what social media are used in the company, how they are currently used and how they may be used 5. Are social media technologies really any different from the technology used in existing corporate IT infrastructures? Social Media Technologies ARE Different |Social Media Technologies AREN’T Different | |Global scope of communication and exposure |Underlying motivations are similar | |Policies of social media providers |Underlying mechanisms and technology are the same | |Motivation of social media – recognition, networking, |Accessibility is the same | |crowd-sourcing, accessibility, to make money |Company needs to manage different levels of access and rights | |Relative to the existing infrastructure of the organisation |to publish company information | |Higher functionality has a different purpose | | |Based on equity of access and right to publish | | Social Media at Ibm and a Case Study of Yammer at Deloitte IT InfrastructureSession 01 Social Media at IBM IBM has been aggressively using social media to tie its far-flung and huge workforce together and, without a doubt, also with a mind towards selling these technologies as part of its service offering. IBM’s Beehive Social Network is a glimpse of how social networks might be used and received in the future. It is an Internet-based social networking site that gives IBM staff a â€Å"rich connection to the people they work with,† both professionally and personally.Using it, employees can make new connections, track current friends and co-workers, and renew contact with people they have worked with in the past. In the first nine months of use, over 35,000 registered IBM employees created over 280,000 social network connections to each other, posted more than 150,000 comments, shared more than 43,000 photos, created about 15,000 ‘Hive5s,’ and hosted more than 2,000 events. Beehive seems to be succeeding â€Å"to h elp IBM employees meet the challenge of building the relationships vital to working in large, distributed enterprises. †Ref: IBM Watson Research Center (2008) â€Å"Project: Beehive†, available at http://domain. watson. ibm. com/cambridgeresearch. nsf/0/8b6d4cd68f, last accessed 28 Feb 2013. A Case Study of Yammer at Deloitte Social media technologies are making fast inroads into organisations. In the context of knowledge intensive work the propositions of improving communication, information sharing and user involvement seem particularly promising. However, the role and impact of social technologies in enterprises in general, and knowledge work in particular, are still not well understood, despite emerging scholarly works in this field.Our case investigates emerging communicative work practices on the Enterprise Social Networking platform Yammer within Deloitte Australia. We uncover a set of emerging practices enabled by the platform within the case company and reflect on our results in the context of the knowledge-intensive nature of professional service work. We find that Yammer in the case company has become 1) an information-sharing channel, 2) a space for crowd-sourcing ideas, 3) a place for finding expertise and solving problems, and most importantly 4) a conversation medium for context and relationship building.Ref: Riemer, K, Scifleet, P & Reddig, R (2012), â€Å"Powercrowd: Enterprise Social Networking in Professional Service Work: A Case Study of Yammer at Deloitte Australia†, available at http://hdl. handle. net/2123/8352, last accessed 28 Feb 2013. 1. What aspects of social media technologies do the above case studies illustrate? †¢ Information sharing †¢ Communication †¢ Joint problem sharing †¢ Discussion forums †¢ Networking †¢ Events management †¢ Generation of ideas/innovation 2. What other examples of the use of social media technologies for corporate communication are you aware of? Face book for marketing, discussion boards, event notification †¢ Dropbox for document sharing, joint authorship †¢ Google docs for document sharing, joint authorship †¢ Google talk, Skype for voice and video communications †¢ Linkedin for networking, profile, job seeking, employ seeking, outsourcing †¢ Share-point for document sharing, discussion board, joint authorship 3. To what extent can / should an IT Infrastructure Manager control the extent and mode of use of social media technologies? Can / Should Control Use |Cannot / Should Not Control Use | |Control access to some social media, such as personal email |Access to information | |accounts that deliberately bypass corporate mail pathways |Use of personal communication devices, especially for personal | |Access to and storage of certain type of content (pornography,|communication | |racial, anti-social) |Downloading of apps to non-corporate devices | |Privacy of corporate data – identifying realms of privacy: |Communication outside of work hours | |confidential, internally confidential, public, potentially |External threats – hacking, invasion, blocking, loss of | |public |external security | |Censorship of inappropriate non-professional communication – | | |through policies & governance | | 4. What are some implications of these developments in the use of social media technologies for the management of existing corporate IT infrastructures? †¢ The company needs to choice between hard censorship approach, or open communication sharing approach Need to provide training and education for staff to understanding guidelines and penalties †¢ Need protection against external threats by between fire-walls and software management †¢ Need a communication policy framework that covers all aspects of information communication, storage, access and use within the company †¢ Need to have staff sign communication agreements, based on these policies and comp letion of training and education †¢ Want a better understanding of what social media are used in the company, how they are currently used and how they may be used 5. Are social media technologies really any different from the technology used in existing corporate IT infrastructures? Social Media Technologies ARE Different |Social Media Technologies AREN’T Different | |Global scope of communication and exposure |Underlying motivations are similar | |Policies of social media providers |Underlying mechanisms and technology are the same | |Motivation of social media – recognition, networking, |Accessibility is the same | |crowd-sourcing, accessibility, to make money |Company needs to manage different levels of access and rights | |Relative to the existing infrastructure of the organisation |to publish company information | |Higher functionality has a different purpose | | |Based on equity of access and right to publish | |

Tuesday, October 22, 2019

Gloster Meteor - Gloster Meteor Jet

Gloster Meteor - Gloster Meteor Jet Gloster Meteor (Meteor F Mk 8): General Length: 44 ft., 7 in.Wingspan: 37 ft., 2 in.Height: 13 ft.Wing Area: 350 sq. ft.Empty Weight: 10,684 lbs.Loaded Weight: 15,700 lbs.Crew: 1Number Built: 3,947 Performance Power Plant:2 Ãâ€" Rolls-Royce Derwent 8 turbojets, 3,500 lbf eachRange: 600 milesMax Speed: 600 mphCeiling: 43,000 ft. Armament Guns: 4 Ãâ€" 20 mm Hispano-Suiza HS.404 cannonsRockets: up to sixteen 60 lb. 3 in. rockets under wings Gloster Meteor - Design Development: Design of the Gloster Meteor began in 1940 when Glosters chief designer, George Carter, began developing concepts for a twin-engine jet fighter. On February 7, 1941, the company received an order for twelve jet fighter prototypes under the Royal Air Forces Specification F9/40 (jet-powered interceptor). Moving forward, Gloster test flew its single-engine E.28/39 on May 15. This was the first flight by a British jet. Assessing the results from the E.38/39, Gloster decided to move forward with a twin-engine design. This was largely due to the low power of early jet engines. Building around this concept, Carters team created an all-metal, single-seat aircraft with a high tailplane to keep the horizontal tailplanes above the jet exhaust. Resting on a tricycle undercarriage, the design possessed conventional straight wings with the engines mounted in streamlined nacelles mid-wing. The cockpit was located forward with a framed glass canopy. For armament, the type possessed four 20 mm cannon mounted in the nose as well as the ability to carry sixteen 3-in. rockets. Initially named Thunderbolt, the name was changed to Meteor to prevent confusion with the Republic P-47 Thunderbolt. The first prototype to fly took off on March 5, 1943 and was powered by two De Havilland Halford H-1 (Goblin) engines. Prototype testing continued through the year as various engines were tried in the aircraft. Moving to production in early 1944, the Meteor F.1 was powered by twin Whittle W.2B/23C (Rolls-Royce Welland) engines. In the course of the development process, prototypes were also used by the Royal Navy to test carrier suitability as well as sent to the United States for assessment by the US Army Air Forces. In return, the USAAF sent an YP-49 Airacomet to the RAF for testing. Becoming Operational: The first batch of 20 Meteors were delivered to the RAF on June 1, 1944. Assigned to No. 616 Squadron, the aircraft replaced the squadrons M.VII Supermarine Spitfires. Moving through conversion training, No. 616 Squadron moved to RAF Manston and began flying sorties to counter the V-1 threat. Commencing operations on July 27, they downed 14 flying bombs while assigned to this task. That December, the squadron transitioned to the improved Meteor F.3 which had improved speed and better pilot visibility. Moved to the Continent in January 1945, the Meteor largely flew ground attack and reconnaissance missions. Though it never encountered its German counterpart, the Messerschmitt Me 262, Meteors were often mistaken for the enemy jet by Allied forces. As a result, Meteors were painted in an all-white configuration for ease of identification. Before the end of the war, the type destroyed 46 German aircraft, all on the ground. With the end of World War II, development of the Meteor continued. Becoming the RAFs primary fighter, the Meteor F.4 was introduced in 1946 and was powered by two Rolls-Royce Derwent 5 engines. Refining the Meteor: In addition to the chance in powerplant, the F.4 saw the airframe strengthened and the cockit pressurized. Produced in large numbers, the F.4 was widely exported. To support Meteor operations, a trainer variant, the T-7, entered service in 1949. In an effort to keep the Meteor on par with new fighters, Gloster continued to improve the design and introduced the definitive F.8 model in August 1949. Featuring Derwent 8 engines, the F.8s fuselage was lengthened and the tail structure redesigned. The variant, which also included a Martin Baker ejection seat, became the backbone of Fighter Command in the early 1950s. Korea: In the course of the Meteors evolution, Gloster also introduced night fighter and reconnaissance versions of the aircraft. The Meteor F.8 saw extensive combat service with Australian forces during the Korean War. Though inferior to the newer swept-wing MiG-15 and North American F-86 Sabre, the Meteor performed well in a ground support role. In the course of the conflict, the Meteor downed six MiGs and destroyed over 1,500 vehicles and 3,500 buildings for a loss of 30 aircraft. By the mid-1950s, the Meteor was phased out of British service with the arrival of the Supermarine Swift and Hawker Hunter. Other Users: Meteors continued to remain in the RAF inventory until the 1980s, but in secondary roles such as target tugs. During the course of its production run, 3,947 Meteors were built with many being exported. Other users of the aircraft included Denmark, the Netherlands, Belgium, Israel, Egypt, Brazil, Argentina, and Ecuador. During the 1956 Suez Crisis, Israeli Meteors downed two Egyptian De Havilland Vampires. Meteors of various types remained in frontline service with some air forces as late as the 1970s and 1980s. Selected Sources Military Factory: Gloster MeteorHistory of War: Gloster MeteorRAF Museum: Gloster Meteor

Monday, October 21, 2019

Helicopter Aerodynamics essays

Helicopter Aerodynamics essays Helicopters are the most versatile aircraft today because of their ability to use three-dimensional space. Their flexibility allows them to fly backwards, hover, and rotate in air. This makes helicopters a lot more complicated than other aircraft aerodynamically and from a pilots point of view. A modern helicopters power source comes from a turbo-shaft engine, which does not produce thrust. Instead they create mechanical power to drive a shaft that connects to the main rotor. The shape of the turbine blades determines whether thrust is used to drive a shaft, or if most of the thrust is used to propel the aircraft and send a small amount of drive power to the compressor. In helicopters they are used the drive the shaft. These engines are light, powerful, and economical. To get the power from the turbo-shaft engine to the main rotor, a gearbox transfers the engine power to a transmission. The transmission reduces the revolutions per minute (RPM) from thousands to one-hundreds. This increases the torque so it can be accepted by the rotor system. The transmission gives direct power to the rotors. The tail rotor is powered the same way. Once the main rotor is in motion is acts as a wing to create lift. The rotor wings on a helicopter are shaped the same as an airfoil on an airplane, but a lot narrower so they can spin faster. If the rotor wings are rotated to give a slight angle of attack lift is created. When the helicopter leaves the ground the body will spin with the rotor because there is no counter acting force. This is where the tail rotor comes in. The tail rotor produces sideways thrust that counteracts the engines ability to spin the body. To control the helicopter both rotors have to be adjustable. Symmetrical airfoils have identical upper and lower surfaces. They are suited to helicopters because they have almost no center of pressure travel. Travel remains constant under different angles of attack, a...

Sunday, October 20, 2019

Learn How to Conjugate the French Verb Habiter (to Live)

Learn How to Conjugate the French Verb Habiter (to Live) French verb conjugator habiter Present Future Imperfect Present participle j habite habiterai habitais habitant tu habites habiteras habitais il habite habitera habitait nous habitons habiterons habitions vous habitez habiterez habitiez ils habitent habiteront habitaient Pass compos Auxiliary verb avoir Past participle habit Subjunctive Conditional Pass simple Imperfect subjunctive j habite habiterais habitai habitasse tu habites habiterais habitas habitasses il habite habiterait habita habitt nous habitions habiterions habitmes habitassions vous habitiez habiteriez habittes habitassiez ils habitent habiteraient habitrent habitassent Imperative tu habite nous habitons vous habitez Verb conjugation patternHabiter  is a  regular -ER verb  that begins with  h  muet

Saturday, October 19, 2019

Engineering Ethics Beyond Engineers' Ethics Essay

Engineering Ethics Beyond Engineers' Ethics - Essay Example These concepts are Act Utilitarianism, Rule Utilitarianism, Golden Rule, Rights (Human Rights), moral responsibility ; malpractice, reasonable care, and moral personality. Basart and Serra begin their article by summarizing the main tenets of conventional engineering ethics. Basart and Serra affirm that the conventional engineering Ethics is mostly focused on engineer’s ethics, in other words, engineering ethics is mainly based on giving the engineers the professional directives on the right conduct in their engineering prrofession. Basart and Serra goes on to explain that, since the practice of engineering involves a complex network of interrelationships between the individual engineers, their employers, organizations, and other groups, there is the need to have engineering ethics that would act as a guide for all the â€Å"stake-holders† in the engineering practice/profession. In the conventional engineering ethics, the engineering ethics that we studied in class, the engineer’s ethics and the engineering ethics are taken as one and the same thing. The result of this is a holistic ethics that enables the individual engineers to act responsibly as individuals, and to make good moral judgements on any ethical dilemma that may arise in their complex relationships in the engineering practice/profession. Having articulated the position of the conventional engineering ethics, Basart and Serra critiqued the traditional engineering ethics and stated that the conventional engineering ethics is not the best engineering approach in the modern interrelated world (Basart, and Serra, web). Basart and Serra argue that in the modern world, technology has alienated us from nature, thus leading to new ethical challenges that the conventional engineering ethics does not address. For this reason, Basart and Serra argue that the best approach to engineering ethics in the modern world is constant dialogues, among

Friday, October 18, 2019

Theory of Dispute Resolution - Essay Case Study

Theory of Dispute Resolution - Case Study Example According to the law of supply of goods and services, there are certain implied terms during the transfer of goods from the transferor to the transferee, most important being that the goods transferred are of good quality and fitness. This means that the transferor of goods has the obligation to ensure that all the goods transferred to the transferee are of satisfactory quality, and therefore, will perform their desired functions without fail. Thus according to this law, the transfer of faulty goods from the seller to the buyer is an offense. According to the facts of this case, Frontway Clutches Ltd. Sold repair parts to Mr. Conn, who is a garage owner, which turned out to be faulty, and thus inappropriate to fulfill their intended purpose. Consequently, he bears the responsibility of compensating the other party, namely Mr. McScrooge. However, the facts under this case are complicated by the fact that the substance or the commodity under dispute is unavailable for examination, whic h is an essential step towards proving the inappropriateness of the commodities supplied by Frontway Clutches Ltd. While Frontway Clutches Ltd. could be required to compensate Mr. ... McScrooge’s van, then he might bear the responsibility. Additionally, the burden of responsibility would even be bigger for the supplier, if the supplier was aware that the clutches that were sold to Mr. Conn were faulty. Therefore, while the substance of this case would majorly revolve around the quality and fitness of the commodity sold, the law would also be interested in discovering the intentions and the awareness of the parties involved in the sale and fixation of the car clutch. Liabilities of the parties involved Mr. Conn is the ultimate center of conflict, in this case, considering that he is the one responsible for fixing the clutch that failed in Mr. McScrooge van, while on the other hand, he had received the clutch from Frontway Clutches Ltd., without suspecting that the clutches had any problem.  

Memories of My Melancholy Whores by Gabriel Garcia Marquez Essay

Memories of My Melancholy Whores by Gabriel Garcia Marquez - Essay Example As far as the ages of the two characters are concerned it is more than the gap of a father and daughter. Can a grand father indulge in wild love with his grand daughter? Then, what is love? That is what the creator of the novel has attempted to establish throughout the work. Thus the word ‘melancholy whores’ is best suitable term that fits right to express the author’s experience of a sorrowful joy. Lust is the dais on which love has to be adorned and admired. Unfortunately the empty dais is adorned everywhere. Love is ‘caring’. Anything associated with caring is love but how lust is construed as something connected with love? It is naturally an instinct prevalent in all beings that is meant for mutual attraction. Gabriel Garcia Marquez in his Memoirs of My Meloncholy Whores has splendidly marked this difference. To bring about the contrast into the light he has prudently selected a love of an elderly old man falling in love with a young girl that too a whore. A perfect selection to highlight the contrast is personified by the age gap of the lead characters in the fiction. Gabriel put that lust is purely biological for which he portrayed the unnamed protagonist of the fiction to pay for every experience of his aphrodisiac experience. Can one love his pair of shoes, which carries its owner throughout its life? Then how the male dominant society pretends to have love d women who are considered objects of desire? It is utterly mean and non-altruistic. Gabriel in the fiction has softly hinted this apparent contradiction in any society. Gabriel’s conventional style of telling stories not in first person is purposefully over ruled in this case of Memoirs of My Meloncholy Whores. The narrator of this story has been given the complete right to wield his bold stick of tearing the masquerade of the society that cunningly lauds woman hood and

Thursday, October 17, 2019

Understanding the career and role of health insurance professionals is Essay

Understanding the career and role of health insurance professionals is essential - Essay Example So this suggests that an accounting oriented job profile will suit me well. Having identified this possible career direction, I am yet open to explore other interesting options. I believe that sales and customer services are challenging options requiring dynamism and enterprise on part of the aspirant. As of now I only have limited exposure to health insurance. I’ve visited the websites of industry organization such as AAPC and AHIMA and carried out some preliminary research. I discovered to my pleasant surprise that the AAPC site is rich in learning resources. These include industry publications, peer-reviewed journals, relevant events and news, practical and learning tools, etc. I hope to consolidate my knowledge through a mix of practical experience and theoretical understanding through the duration of the course. I would ideally need a mix of I discovered that a career in health insurance offers opportunities for continuing education. Over the years the industry has embraced information technology for its processes. So keeping up-breast with latest advances in IT is a good idea. Keeping with this view, AAPC and AHIMA offer several diploma courses and supplementary training. I realize that no amount of training and theoretical learning is a substitute for real work experience. So even as I approach the course with enthusiasm, I am gearing up for lifelong learning in the actual business environment. Finally, health insurance professionals are not as well paid on average as doctors or engineers. However, the industrious professional can reach great heights. Those professionals who approach their job responsibilities with sincerity and honesty are most likely to

Impact on management science Essay Example | Topics and Well Written Essays - 2750 words

Impact on management science - Essay Example To answer this question it is necessary to examine the nature of HRM and its role in strategic organizational development and planning. Whilst top management must always accept the need for innovation there is still the decision as to which opportunities it wishes to develop in relation to its resources and those it chooses not to pursue. An effective business strategy depends upon the successful management of opportunities and coordination of HR in order to create a competitive advantage. Taking into account that HRM is not an independent part of business, it is possible to assume that HRM is a strategic activity aimed to respond effectively to changes and business transformations. The basis strategic HRM is that every manager is given a clear idea of the results expected. The human resources function is now highly specialized and perhaps can be said to be at the centre of conflict between labour and capital. They in effect operate on the 'boundary' between the workforce and the organization. Human resource management is that part of the process of management that is concerned with the maintenance of human relationships and ensuring the physical well-being of employees so that they give the maximum contribution to efficient working. It is obviously closely related to the management process as a whole and each functional manager and supervisor applies the principles effectively. Departmental managers, by effective leadership, ensure human resources policy is adhered to and department activities are successfully carried out. Michael Armstrong (2003) proposes the following definition of HRM: " the concept of HRM could be regarded as a philosophy governing how employees should be treated in the interests of the organization. But this philosophy can be applied in many different ways and there is no single model which can be used to describe HRM (p 23)" A logical approach to the consideration of this function is to look first of all at the problem of overall company organization and manpower planning, then the operations necessary to implement the plan, that is, recruitment and selection, training and development, and wage and salary administration. Other aspects of human resource management include industrial relations and the law of employment, welfare and safety, and other employee services. The importance is that the process of HRM is extremely important and continues to advance rapidly and change becomes imperative. When an organization develops a highly committed work force, coupled with enlightened management, its self-managed multifunction teams will be able to take on the challenges of the future (Price, 2004). Driven Forces of Strategic Intent to Planning Social Change as a Driven Force of Strategic Intent in HRM Social change creates new HR policies and training needs. For example, as more people travel abroad and experience the high levels of customer service in North America and the Far East they become more demanding in their expectations for customer service at home. As a further example, in society women's right to occupy jobs at the highest levels in companies and institutions. Both these examples indicate the need for HR training, the first in customer care skills and the second in management skills for women. In this situation, training is a strategic tool of the entire organization realized

Wednesday, October 16, 2019

Understanding the career and role of health insurance professionals is Essay

Understanding the career and role of health insurance professionals is essential - Essay Example So this suggests that an accounting oriented job profile will suit me well. Having identified this possible career direction, I am yet open to explore other interesting options. I believe that sales and customer services are challenging options requiring dynamism and enterprise on part of the aspirant. As of now I only have limited exposure to health insurance. I’ve visited the websites of industry organization such as AAPC and AHIMA and carried out some preliminary research. I discovered to my pleasant surprise that the AAPC site is rich in learning resources. These include industry publications, peer-reviewed journals, relevant events and news, practical and learning tools, etc. I hope to consolidate my knowledge through a mix of practical experience and theoretical understanding through the duration of the course. I would ideally need a mix of I discovered that a career in health insurance offers opportunities for continuing education. Over the years the industry has embraced information technology for its processes. So keeping up-breast with latest advances in IT is a good idea. Keeping with this view, AAPC and AHIMA offer several diploma courses and supplementary training. I realize that no amount of training and theoretical learning is a substitute for real work experience. So even as I approach the course with enthusiasm, I am gearing up for lifelong learning in the actual business environment. Finally, health insurance professionals are not as well paid on average as doctors or engineers. However, the industrious professional can reach great heights. Those professionals who approach their job responsibilities with sincerity and honesty are most likely to

Tuesday, October 15, 2019

Encounter point Movie Review Example | Topics and Well Written Essays - 1250 words

Encounter point - Movie Review Example ed activities that occur behind the scenes, from regular citizens, to improve social and political relationships between Palestinian and Israeli peoples. There is no real effort to show that one side or the other is more dedicated toward peace or that one particular political side is more aggressive in continuing violence. The film, instead, attempts to simply show the frustrations and social anxieties that come from ongoing war and how they impact thoughts, emotions and the family structure; not to mention community relationships. There is one scene in the movie where there are members of both the Palestinian group and the Israeli culture that are working together in what is referred to as the Bereaved Families’ Forum which attempts to group these people together to discuss different misunderstandings and open positive dialogue between both political groups. It shows how similar both groups are in relation to their desires to achieve peace and avoid ongoing violence that continues to disrupt positive relationships. â€Å"Encounter Point† is a hopeful film that shows that many of the problems between these two groups come from simple misunderstandings and that there are members of both groups that are ready to pave the way toward peace. The film attempts to give a symmetrical view of the importance and needs of both political parties, therefore the interests of both are represented sufficiently throughout the film. One of the main advantages of this film is that is does not involve political parties and their own high-level interests, instead it shows the plight of this conflict from the viewpoint of those most affected by it: the regular community citizen. The filmmakers decided â€Å""politicians come and go but whats happening on the street is whats most important." (Freeman, 2010, p.1). This film recognises that showing political viewpoints would give this film an unbalanced view and would be more of a political documentary than a piece of sociology work that

Particular audience Essay Example for Free

Particular audience Essay It is confidence building to remember that all experts were at one time students and entry-level members in their career fields. With this in mind it will help to alleviate some of the stress and anxiety you might feel when you first make contact with them. There are many possible avenues to locating and interviewing an expert. However, there are key tactics that can be utilized in order to increase your chances of landing your first choice. This brief essay will outline a plan of action in order to increase the odds of finding success with your expert interview. To begin, make a list of possible experts relevant to your subject. Some of the best ways to find these experts are in calendar of events in newspapers, magazines and on television. By keeping your options open you can rest assured that if for some reason one of the experts does not wish to participate, you will at least have back-up options. The next key, after locating your expert and establishing a method of contact – whether online of offline – is to establish your credibility. Tell them or send them a link to where they can find examples of your work, or of the institution that you represent. This will show them that you are legitimate and that your will reach a particular audience. Once you have established a working relationship you need to set a date and time. Remember that you are asking for their time, so be as flexible and accommodating as possible without compromising your deadline. When the interview comes, be prepared. Have your recording equipment ready and make sure you have done your research so that you can ask insightful questions. The more prepared you are, the more relaxed you will be. At the conclusion, let them know you will send them a copy of the interview for their records and thank them for their time.

Sunday, October 13, 2019

Link between Sexual Abuse and Feelings of Shame in Victims

Link between Sexual Abuse and Feelings of Shame in Victims Women and Shame: Exploring the Link Between Sexual Abuse and the Shame Experienced by Victims Abstract Change in the culture of the United States and other countries is allowing for more discussion on the topic of sexual abuse, but it has yet to become the norm. Survivors of sexual abuse experience various negative consequences, including shame and posttraumatic stress disorder (PTSD). Shame includes, but is not limited to, feeling trapper, powerless, and isolated (Brown, 2006). PTSD experienced by survivors of sexual abuse can lead one to withdraw and succumb to the negative and detrimental effects of sexual abuse (Wilson & Scarpa, 2014). To reduce the severity of PTSD and combat the negative effects of shame on those who experience it, specifically female survivors of sexual assault, it is suggested that there be a focus on deep and sincere connection provided by supportive women figures and other women who have experienced sexual abuse. This support, in addition to individual and group psychotherapy, may provide the needed empowerment to overcome shame and decrease PTSD symptoms ex perienced by survivors of sexual abuse. Women and Shame: Exploring the Link Between Sexual Abuse and the Shame Experienced by Victims Sexual abuse is disturbingly prevalent, particularly among college students. The American Association of Universities (AAU) found that the prevalence of sexual assault in college was 22.2% for undergraduate women, and, of the women who were in their senior year of college, 27.2% reported having been sexually assaulted during their four years (Cantor et al., 2015). However, disclosing this information has not always been easy and still proves to be a challenge. It is a barrier that is at times insurmountable for victims of sexual abuse. Unfortunately, in the United States today, and all around the world for that matter, the act of sexual abuse is not taboo—exposing it and talking about it is (Turner, 1993). Despite research statistics indicating that 16% of adult American women will experience abuse before the age of 18 (Jackson, Calhoun, Amick, Meddever, & Habif, 1990), society has shied away from the discussion of sexual abuse become commonplace in America. Moreover, sexual abuse and its negative effects are all encompassing and prove difficult to overcome. Sexual abuse can lead to posttraumatic stress disorder (PTSD) and symptoms of depression and anxiety. Sexual abuse also affects the relationships that survivors have with others. Survivors may feel that their experience is a private narrative that should not be shared with others, or they may be concerned that others may not think that what happened to them was truly rape or assault; therefore, victims may not choose to disclose this experience to anyone (Filipas & Ullman, 2001). In order to change this negative thinking, women need to provide deep and sincere connection to female abuse survivors that will allow them to feel supported and empowered. Because feelings such as fear, shame, doubt, and confusion post abuse may lead to avoidance coping and a potential diagnosis of PTSD, understanding the negative effects of sexual abuse is vital to understanding how supportive women can help female victims to overcome feeling trapped, powerless, and isolated. According to the American Psychiatric Association (APA), PTSD is a psychiatric disorder that can occur in people who have experienced or witnessed a traumatic event, including rape or other violent personal assault (â€Å"What is Posttraumatic Stress Disorder,† 2017). People who suffer from PTSD experience disturbing thoughts and feelings related to their traumatic experience for long periods of time after the event has passed. A study done by Feiring and Taska (2005) found that women who had experienced sexual abuse and reported high levels of shame after one year were at greater risk for experiencing high levels of shame after six years, as well. This type of residual shame is characteristic of PTSD in that survivors experience it for long periods of time after their traumatic experience. If more can be done to help survivors of sexual abuse within the first year after their experience, they may be empowered to combat the negative effects of shame and overcome the statistics. This help can be provided through support, understanding, patience, and providing a safe place for survivors of sexual abuse to share their experience. PTSD due to sexual abuse is not the only psychological disorder that affects victims. Research done by Molnar, Buka, and Kessler (2001) found that sexual abuse occurring during childhood was highly correlated with the onset of 14 various psychological disorders in women. In addition, research done by Wilson and Scarpa (2014) indicated that childhood sexual abuse is associated with higher amounts of PTSD symptoms than other forms of childhood abuse. When considering the implications of PTSD, the long-term effects it has on those suffering it, and the potential onset of 14 various psychological disorders (Molnar, Buka, & Kessler , 2001), childhood sexual abuse can lead to a lifelong struggle with mental health and shame if not addressed. Female survivors of sexual abuse can receive the necessary support through deep and sincere connection with other women—connection that is needed to combat PTSD. Sexual abuse is not a one-time action. Sexual abuse of any type leaves one with feelings of worthlessness, shame, and insecurities that require intensive care and effort to overcome. Women cannot be left alone post abuse to question their worth. Researchers have looked to strengthen the link in the relationship between shame and sexual assault in order to provide more clarity for those seeking answers. Studies demonstrated that shame is often a mediator between an experience such as sexual assault and PTSD (DeCou, Cole, Lynch, Wong, Matthews, 2017). While few studies have been done to examine what role social connections play in the recovery process, Hyman, Gold, and Cott (2003) suggested that the most influential predictor of PTSD—self esteem might be able to offset feelings typically experienced with shame. Because shame is a mediator between sexual assault and PTSD, targeting it by means of connection will minimize its power and role in bringing those symptoms to the forefront. In addition, because 70% of sexual abuse victims will tell someone about their experience—typically a friend (Fisher, Daigle, Cullen, & Tanner, 2003), overcoming the barriers that delay disclosure may prove helpful in providing a safer and more supportive environment for survivors of sexual abuse. Survivors may be able to seek the support they need and share the motions that they are feeling in a much more efficient manner (Ullman, Foynes, & Tang, 2001). Because of the safety that close relationships can provide, the focus on their role in recovery must be emphasized, because survivors can benefit by sharing the emotions of that experience instead of carrying them alone. One of the most prevalent emotions felt by victims of sexual abuse is shame. Shame is an intensely painful feeling or experience of believing one is flawed and therefore unworthy of acceptance and belonging. This strong emotion can lead survivors to feel trapped, powerless, and isolated (Brown, 2006). No victim of sexual abuse should have to face these experiences and emotions alone. Although the shame experienced by female victims of sexual abuse can be a difficult psychological construct to measure consistently across sample populations, deep and sincere connections among women, along with individual and group psychotherapy, may play a vital role in empowering females to combat the negative effects of shame. Women who maintain supportive interpersonal relationships post-abuse are uniquely empowered to feel less trapped, powerless, and isolated. Interpersonal Relationships While those directly involved with sexual abuse are the true victims, friends, peers, and family members to whom this negative experience is disclosed are also impacted by the negative consequences. Victims of sexual abuse are typically not prepared for what they experience, and neither are those they reach out to for support. Each person to whom this information is disclosed responds differently. Wile the majority tend to respond positively, there are some who do respond negatively (Ahrens & Campbell, 2000). Some results have shown that negative reactions include, but are not limited to, feelings sorry for the victims, blaming the assault on the victim instead of the perpetrator, and minimizing the seriousness and effect of the event (Popiel & Susskind, 1985). This negative response typically comes from a place of unpreparedness. Sexual abuse has far-reaching effects, and those who are indirectly affected (and their response to the survivors) should be examined. By providing education to peers and familial supports, in addition to providing a safe place for survivors of sexual assault to disclose their abuse experience, peers and familial supports will likely respond in a way that fosters trust, confidence, and courage. According to George, Winfield, and Blazer (1992), the majority (59% to 91%) of sexual assault victims disclose the event to family and friends because they view them as helpful and/or supportive. Very few report the information to formal agencies such as the police, the hospital, or a formal rape center. Research done by Ullman (1996) tested friends of rape victims and determined that participants did not feel more distressed than normal when they were told their friend was a victim of sexual assault. The results further showed that the friends were angry at the perpetrator and wanted to seek revenge but otherwise maintained positive feelings towards the survivor (Ullman, 1996). Because the results can vary from friend to friend, it is imperative that friends, family members, and supporters of survivors of sexual abuse are educated on their role in the process of recovery and healing. Sexual abuse affects more than just those who experience it first hand, it also impacts those who are trusted enough to help bear the weight and seriousness of this horrible experience. Exploring shame, one of the consequences of sexual abuse more thoroughly, will provide clarity to the healing process that survivors of undergo and the important role that women play in empowering female survivors to overcome their experience. Oftentimes, abuse-related shame is created by the secretive context under which it takes place, including threats to stay silent and not disclose the event to anyone and condemnation from the perpetrator towards the victim (Feiring & Taska, 2005). This shame can then lead one to feel trapped, powerless, and isolated (Brown, 2006). Shame requires a sense of self and an ability to compare oneself against a cultural standard (Feiring & Taska, 2005). Having a better understanding of shame will not only allow female survivors of sexual abuse to take steps towards healing, but will also help peers, family members, and friends to support survivors along this path. Feeling Less Trapped The word trapped is often thought of in the context of not being able to escape. Female survivors of sexual abuse often feel trapped by their experience. Researchers found that a consistent result of shame is an avoidance response so severe tat the individual prefers to hide rather than expose themselves (Barrett, Zahn-Waxler, & Cole, 1993). Additionally, shame promotes cognitive avoidance which is an intentional effort to avoid dealing with a stressor (Berliner & Wheeler, 1987). Because shame produces avoidance, both cognitively and behaviorally, survivors, as well as those who support them, need to understand the significant effect that deep and sincere connections can have on survivors while working through abuse-related shame. Turner (1993) stated that â€Å"the process of sharing feelings with others and realizing that other people feel the same way provides a sense of relief and makes people feel less frightened and not so alone† (para. 12). Being able to reach out for h elp and seek connection, the opposite of avoidance, will likely improve the survivor’s ability to overcome shame and empower her to fight the feelings of isolation that she experiences. Feeling Less Powerless As suggested by Brown (2006), sexual abuse survivors find that producing effects strong enough to counter the shame caused by sexual abuse very difficult. Because shame produces so many emotions, survivors have difficulty feeling empowered enough to get to the core of their abuse and begin healing. Survivors are often stuck in the secondary emotions: shame, guilt, anxiousness, helplessness, and hurt (E. Harwood, personal communication, November 1, 2017). In a study done by Berliner and Wheeler (1987), survivors of sexual abuse typically got to the core of their abuse and began healing by gradually exposing their abuse situation through talking about or abreaction, the expression and emotional discharge of repressed emotion (Merriam-Webster Dictionary, 2017). If female survivors of sexual abuse can experience abreaction, in addition to the support of deep and sincere connections with other women, then they may be able to reach the core of their abuse and begin to explore to real emotions that they are feeling. Survivors will likely gain power over their abuse each time it is exposed through the help of therapists, peers, and family supports. Survivors may begin to feel empowered and start to overcome the complexity of the shame that they experience. They may also find the power to keep seeking connections necessary to overcome feelings of isolation. Feeling Less Isolated The confusion, betrayal, and loneliness that survivors of sexual abuse experience are conflicting emotions and tend to run deep. Because sexual abuse can come by means of close friends, family members, trusted individuals (or associates), isolation seems to be the fitting response when considering that a trusted person could be the perpetrator of such acts. Survivors typically need to rebuild trust, and this can be done through forming deep and sincere connections with women among whom they feel comfortable or women who have experienced something similar. Bass and Davis (1988) found that as women speak to each other about past traumatic experiences, they are able to put more distance between themselves and the pain. That ability led survivors to feel less victimized and more connected with those to whom they were talking (Bass & Davis, 1988). If female survivors can come to trust the deep and sincere connections the form with fellow women, ten they will be able to feel less isolated through talking about their experiences. In addition, survivors will likely feel more empathy and sympathy from those around them and begin to feel that they are not alone but rather surround by people who understand them and their experiences. They will begin to feel connected. Empowerment through Connection Human beings thrive off of feelings of belonging. On Maslow’s Hierarch of Needs, the need to belong is most important after basic needs and safety and security. Further, it is often said that the opposite of addiction is not sobriety but rather connection. If connection is powerful enough to help one to overcome or avoid addiction completely, how important is it then for one seeking to overcome the shame that comes from sexual abuse? Baumeister and Leary (2000) described the â€Å"need to belong or need to develop and maintain meaningful social bonds as a ‘fundamental human motivation’ that lies beneath a myriad of human interaction and behavior†(P#). On that premise, the desire for connection and feelings of belonging come naturally and should not be ignored. In a study done by Llabre and Hadi (1997) that examined children in Kuwait who had experienced trauma, data showed that girls who experienced trauma and perceived low levels of support experienced the highest levels of PTSD symptoms. By providing support to female survivors of sexual abuse through deep and sincere connection from fellow women, these PTSD symptoms may diminish. Whether survivors of sexual abuse prefer avoidance or connection, as observed earlier, friends and familial support must be understanding. If the proper support can be given to victims soon after the abuse occurs, then they symptoms of PTSD may decrease and the natural desire for connection and belonging will likely be satisfied. That help alone may empower female survivors of sexual assault to push through the shame they feel and move forward through the process of healing. The need for connection is not merely a desire to have friends. Satisfying the need for connection can help one to avoid depression, anxiety, and loneliness. The need for connection also elicits goal-oriented behavior (Baumeister & Leary, 2000). In a study done on 160 women who had experienced sexual abuse in their childhood, women who perceived that they had social support reported a significant reduction in depression and other symptoms of PTSD (Hobfoll et al., 2002). Knowing that a need for connection will inspire goal-oriented behavior and combat depression, loneliness, and anxiety, support provided by women can help to counteract the feelings of isolation and powerlessness that female survivors of sexual abuse experience. By building and strengthening deep and sincere connections, survivors will feel less isolated and be empowered to combat the negative effects of shame. Sharing Experiences   While group therapy and individual therapy are great additions to the therapeutic process, sharing the experience outside of therapeutic groups is an additional support. According to a national study done in Sweden, 46% of all Swedish women surveyed had experienced some form of sexual violence since the age of 15 (Ormon, Sunnqvist, Bahtsevani, Tostensson Levander, 2016). Because of these results, further research was done in a women’s general psychiatric clinic. The follow-up study found that women preferred to share their abuse experiences with their peers more so than with staff (Ormon, Sunnqvist, Bahtsevani, Tostensson Levander, 2016). This research demonstrated that survivors of sexual assault tend to be more willing to disclose their experience to trusted women or those who have experienced something similar. Because of this level of trust that is extended to those without therapeutic licensure, fellow women must be aware of the impact they have o those who wish to sh are their experiences. Deep and sincere connection outside of individual and group psychotherapy may supplement the help that is provided there. While research on the view point of friends and family is minimal, some research has been conducted on the matter. Ahrens and Campbell (2000) reviewed the responses of friends to survivors and found that those to whom the information is disclosed are conflicted by wanting to help and support but feel powerless and unhelpful. These same researchers surveyed college students again and found that women are more empathic, especially if they have their own history of sexual assault, blame the experience on the survivor less often than men, and see more positive changes in their relationship with the survivor (Ahrens & Campbell, 2000). Contrary to these findings, Banyard, Maynihan, Walsh, Cohn, and Ward (2010) cited significant responses indicating that friends to whom sexual assault is disclosed feel anger and distress. Because of the inconsistency in responses to sexual assault, there is a need to continue educating peer and familial supports on the role the play in the healing process. By providing this education and spending more time talking about their role, survivors may be able to find deep and sincere relationships with those to whom they disclose their experience to and will likely be able to overcome the shame that stems from sexual assault. Conclusion A community, a culture, a friend, or a family member that provides safety and refuge for survivors of sexual abuse is positioned at the forefront of changes that need to be made. Sexual abuse is experience by more friends and family than is made known and healthy and positive support is owed to them. While sexual abuse is an emerging topic in the world of open discussions, understanding the trail of negative effects that is left behind in its wake is only beginning to be explored. PTSD experienced by survivors of sexual abuse is long term and fosters feelings of inadequacy and hopelessness. In addition, survivors that experience high levels of PTSD within the immediate year following their experience are likely to maintain that high level for a minimum of six years (Feiring & Taska, 2005). PTSD can also accompany 14 other psychological disorders that women are prone to develop after experiencing sexual abuse (Molnar, Buka, & Kessler, 2001). It is difficult and potentially impossible to determine a fix-all for symptoms and effects of PTSD, but it is not impossible to challenge it. PTSD can be challenged and combatted through deep and sincere connection that allows survivors of sexual assault to feel empowered, heard, and supported. Fortunately for survivors of sexual abuse, studies have also shown that they will often be positively received when disclosing their traumatic experience to friends, family, and trusted figures (Ahrens & Campbell, 2000). Unfortunately, there will be some who perceive them negatively, blame the vent on them, and cut off communication and support (Popiel & Susskind, 1985), but by allowing for sexual abuse to be a commonplace conversation and providing safe settings for that to happen, the negative reactions be minimized further. With this positive support, female survivors of sexual abuse will begin to work through the negative effects of abuse-related shame: feeling trapped, powerless, and isolated. Survivors of sexual abuse, women in particular, need each other. By providing deep and sincere connection to those effected by sexual abuse, they will likely feel empowered to overcome the shame that envelops them, because they will feel connected, they will feel included, and they will ex pose the abuse that they experienced. Additional research on the effects of deep and sincere relationships among women should be conducted to better understand their influence as more is being done to provide help for survivors of sexual abuse. Providing education on the importance of supportive peers and families and the positive effects that they have on victims may decrease the amount of psychological disorders and long-term effects that sexual abuse can leave in its wake. Research should therefore be done that explores more in depth the emotion of shame and the role that it plays n recovery from sexual abuse.    References Ahrens, C. E., & Campbell, R. (2000). Assisting rape victims as they recover from rape: The impact on friends.  Journal of Interpersonal Violence,  15(9), 959-986. doi:10.1177/088626000015009004 American Psychiatric Association. (2017). What is Posttraumatic Stress Disorder? Retrieved from https://www.psychiatry.org/patients-families/ptsd/what-is-ptsd Banyard, V. L., Moynihan, M. M., Walsh, W. A., Cohn, E. S., & Ward, S. (2010). Friends of survivors: The community impact of unwanted sexual experiences.  Journal of Interpersonal Violence,  25(2), 242-256. doi:10.1177/0886260509334407 Barrett, K. C., Zahn-Waxler, C., & Cole, P. M. (1993). Avoiders versus amenders: Implications for the investigation of guilt and shame during toddlerhood? Cognitionand Emotion, 7, 481-505. Bass, E., & Davis, L. (1988).  The courage to heal: A guide for women survivors of child sexual abuse. New York, NY, US: Perennial Library/Harper & Row Publishers. Retrieved from  https://www.lib.byu.edu/cgibin/remoteauth.pl?url=http://search.ebscohost.com/login.aspx?direct=true&db=psyh&AN=1988-97592-000&site=ehost-live&scope=site Baumeister, R. F., & Leary, M. R. (2000). The need to belong: Desire for interpersonal attachments as a fundamental human motivation. In E. T. Higgins, A. W. Kruglanski, E. T. Higgins (Ed) & A. W. Kruglanski (Ed) Eds.), (pp. 24-49). New York, NY, US: Psychology Press. Retrieved from  https://www.lib.byu.edu/cgibin/remoteauth.pl?url=http://search.ebscohost.com/login.aspx?direct=true&db=psyh&AN=2000-12688-001&site=ehost-live&scope=site Berliner, L., & Wheeler, J. R. (1987). Treating the effects of sexual abuse on children.  Journal of Interpersonal Violence,  2(4), 415-434. doi:10.1177/088626058700200407 Brown, B. (2006). Shame resilience theory: A grounded theory study on women and shame.  Families in Society,  87(1), 43-52. doi:10.1606/1044-3894.3483 Cantor,  D.,  Fisher,  B.,  Chibnall,  S.,  Townsend,  R.,  Lee,  H.,  Bruce,  C., &  Thomas,  G.  (2015). Report on the AAU Campus Climate Survey on Sexual Assault and Sexual Misconduct.  Washington, DC: Association of American Universities. Retrieved from  https://www.aau.edu/uploadedFiles/AAU_Publications/AAU_Reports/Sexual_Assault_Campus_Survey/AAU_Campus_Climate_Survey_12_14_15.pdf DeCou, C. R., Cole, T. T., Lynch, S. M., Wong, M. M., & Matthews, K. C. (2017). Assault-related shame mediates the association between negative social reactions to disclosure of sexual assault and psychological distress.  Psychological Trauma: Theory, Research, Practice, and Policy,  9(2), 166-172. doi:10.1037/tra000018 Feiring, C., & Taska, L. S. (2005). The persistence of shame following sexual abuse: A longitudinal look at risk and recovery.  Child Maltreatment,  10(4), 337-349. doi:10.1177/1077559505276686 Filipas, H. H., & Ullman, S. E. (2001). Social reactions to sexual assault victims from various support sources.  Violence and Victims,  16(6), 673-692. Retrieved from  https://www.lib.byu.edu/cgi-bin/remoteauth.pl?url=http://search.ebscohost.com/login.aspx?direct=true&db=psyh&AN=2002-12346-006&site=ehost-live&scope=site Fisher, B. S., Daigle, L. E., Cullen, F. T., & Turner, M. G. (2003). Reporting sexual victimization to the police and others: Results from a national-level study of college women.  Criminal Justice and Behavior,  30(1), 6-38. doi:10.1177/0093854802239161 George, L. K., Winfield, I., & Blazer, D. G. (1992). Sociocultural factors in sexual assault: Comparison of two representative samples of women.  Journal of Social Issues,  48(1), 105-125. doi:10.1111/j.1540-4560.1992.tb01160 Hobfoll, S. E., Bansal, A., Schurg, R., Young, S., Pierce, C. A., Hobfoll, I., & Johnson, R. (2002). The impact of perceived child physical and sexual abuse history on Native American womens psychological well-being and AIDS risk.  Journal of Consulting and Clinical Psychology,  70(1), 252-257. doi:10.1037/0022-006X.70.1.252 Hyman, S. M., Gold, S. N., & Cott, M. A. (2003). Forms of social support that moderate PTSD in childhood sexual abuse survivors.  Journal of Family Violence,  18(5), 295-300. doi:1025117311660 Jackson, J. L., Calhoun, K. S., Amick, A. E., Maddever, H. M., & Habif, V. L. (1990). Young adult women who report childhood interfamilial sexual abuse: Subsequent adjustment.  Archives of Sexual Behavior,  19(3), 211-221. doi:10.1007/BF01541547 Llabre, M. M., & Hadi, F. (1997). Social support and psychological distress in Kuwaiti boys and girls exposed to the gulf crisis.  Journal of Clinical Child Psychology,  26(3), 247-255. doi:10.1207/s15374424jccp2603_3 Merriam-Webster Dictionary. (2017). Abreaction. Springfield, MA: Merriam-Webster. Molnar, B. E., Buka, S. L., & Kessler, R. C. (2001). Child sexual abuse and subsequent psychopathology: Results from the national comorbidity survey.  American Journal of Public Health,  91(5), 753-760. doi:10.2105/AJPH.91.5.753 Ormon, K., Sunnqvist, C., Bahtsevani, C., & Levander, M. T. (2016). Disclosure of abuse among female patients within general psychiatric care: A cross sectional study.  BMC Psychiatry,  16  Retrieved from  https://www.lib.byu.edu/cgibin/remoteauth.pl?url=http://search.ebscohost.com/login.aspx?direct=true&db=psyh&AN=2016-15202-001&site=ehost-live&scope=site Popiel, D. A., & Susskind, E. C. (1985). The impact of rape: Social support as a moderator of stress.  American Journal of Community Psychology,  13(6), 645-676. doi:10.1007/BF00929794 Turner, S. (1993). Talking about sexual abuse: The value of short-term groups for women survivors.  Journal of Group Psychotherapy, Psychodrama & Sociometry,  46(3), 110-121. Retrieved from https://www.lib.byu.edu/cgibin/remoteauth.pl?url=http://search.ebscohost.com/login.aspx?direct=true&db=psyh&AN=1994-26536-001&site=ehost-live&scope=site Ullman, S. E. (1996). Do social reactions to sexual assault victims vary by support provider?  Violence and Victims,  11(2), 143-157. Retrieved from  https://www.lib.byu.edu/cgi-bin/remoteauth.pl?url=http://search.ebscohost.com/login.aspx?direct=true&db=psyh&AN=1997-07861-004&site=ehost-live&scope=site Ullman, S. E., Foynes, M. M., & Tang, S. S. S. (2001). Benefits and barriers to disclosing sexual trauma: A contextual approach.  Journal of Trauma & Dissociation,  11(2), 127-133. doi:10.1080/15299730903502904 Wilson, L. C., & Scarpa, A. (2014). Childhood abuse, perceived social support, and posttraumatic stress symptoms: A moderation model.  Psychological Trauma: Theory, Research, Practice, and Policy,  6(5), 512-518. doi:10.1037/a0032635 Appendix Figure 1. Type of response experienced by survivors of sexual assault when disclosing their experience to family and/or friends. Adapted from â€Å"Assault-Related Shame Mediates the Association Between Negative Social Reactions to Disclosure of Sexual Assault and Psychological Distress,† by C. DeCou, T. Cole, S. Lynch, M. Wong, & K. Matthews, 2017, Psychological Trauma: Theory, Research, Practice, and Policy, (2)9, p. 169.

Saturday, October 12, 2019

Physics of Paintball :: physics sport paint paintball gun

There are three main areas of paintball that I will be analyzing. First the way in which a paintball leaves the barrel of a paintball marker. Second the way in which a paintball fly's through the air and lastly how to determine optimum ranges for paintballs. Firing a paintball As you fire the trigger, the paintball is being pushed down the barrel of the marker by the difference in pressure between the CO2 from a tank attached to the marker which builds up behind the ball and the air in front of the ball. There are several other forces which act on the paintball besides the air resistance and the CO2. One is the friction of the ball against the barrel. This frictional force is in no way constant because the shape and the smoothness of the inside of the barrel is not always constant. Likewise, the surface of the paintball is not always smooth. A second force is A spinning force that the C02 imparts on the ball causing a rotational acceleration and also a rolling motion. Once the ball has cleared the barrel there is a significant change in the forces that are acting on the paintball. The imbalance of the pressure behind the ball is gone. So that there is no longer any force pushing the ball in the direction that the muzzle is pointing in. It should be noted that there are many different ways that are employed to get a marker to shoot a paintball out of the marker. Nearly every brand of marker has a different firing system. All have several things in common. They all have some sort of tank with compressed air or C02 or Nitrogen. Then they usually have sort of bolt and hammer system which is cocked back and held in place by a sear which compresses a spring. When the trigger is pulled it releases the sear. The restoring force of the spring pushes the bolt and the hammer forward starting the paintball moving then the C02 is released propelling the ball outward. The flight of a Paintball Once a paintball gets into the air its flight is much like that of a golf ball. There are a verity of forces that act upon the ball once its in the air. The ball always has the force of gravity acting on it. This causes the paintball to travel in an arc and return to the earth.

Friday, October 11, 2019

Southwest Internal Analysis

Southwest Airlines Internal Analysis Introduction This internal business analysis is on Southwest Airlines, which was founded in 1967 by Rollin King and Herb Kelleher. The main focus for Southwest Airlines was to provide low cost flights for their customers, and also have exceptional customer satisfaction. Southwest is a leading airline company that continues to do well in an industry that has been historically challenging. For instance, in the span of two years (2005-2007) five major airlines have filed for bankruptcy.The challenges are great in the airline industry, because competitors are trying to imitate the â€Å"low-cost† offering of Southwest. Many companies have tried to do what Southwest has done, and many have failed to stay in business. Surprisingly, many of those companies were started by ex-employees of Southwest. Southwest currently has a profitability record for the past thirty six years, which is spectacular in such a challenging industry. Herb Kelleher has be en replaced by Gary C. Kelly, as the president when he resigned in May of 2008.Southwest is in the process of expanding the locations they serve so that they can increase market share, and also find ways to cut costs without losing their quality. In order for southwest to continue their consecutive financial success there is a necessity for excellence in the execution process of their strategy. Business Level Strategy The business level strategy (BLS) that Southwest focuses on is Cost Leadership. They are the leading airline in the United States for providing low-cost fares to their broad customer base.Southwest has found innovative ways to reduce cost within their cost structure enabling them to offer lower fares than competitors and still maintain a profit. One way that has helped Southwest save time and money is their standardization of their airline fleet. This tactic is known as the â€Å"one-model-fleet† by the airline. Having a single airplane model in a fleet has allo wed Southwest to â€Å"lower inventory, record keeping and maintenance costs, and it minimizes the number of technical manuals, tools and spare parts. † Another methodology that has layed an important role in their thirty six years of profitability is their fuel hedging practices they’ve practiced since the late nineties. This tactic has saved the company millions of dollars, and in 2007 alone has saved the company 727 million dollars. Another cost saving measure that Southwest has implemented is the use of blended winglets on all of their 737-700’s models. This change is supposed to improve performance by extending the airplanes range, saving fuel, and lowering engine maintenance costs and reducing takeoff noise. More recently, Southwest began to use EcoPower engine wash services.This is going to allow Southwest to save an estimated $20 million dollars in fuel costs. All of these tactics by Southwest are designed to save on expenses that they incur doing busine ss. Many airlines cut cost by laying off employees, but Southwest has established a â€Å"no layoff policy† that is currently still in effect. This shows how committed the company is to their employees, and how they are an integral part of their business. Resources Southwest has plenty of resources that have contributed to their success as an airline company. Their intangible resources have created their competitive advantage in relation to their competitors.The reason for that is the simple fact that their tangible resources are not difficult to replicate. It’s the technique that Southwest uses to connect their resources that has enabled them to be successful in the airline industry. Their tangible and intangible resources are as follows: Tangible: The main tangible resources that Southwest has are its training center, employees, headquarter facility, acquisitions, partnerships, take off and landing spots, frequent flyer reward program, self-service check-in kiosks, a nd their fleet aircrafts.In 1986, Southwest opened a multi-million dollar training center for their flight crews. As all businesses, employees are necessary if you’re conducting business on a large scale. The connection between Southwest and its customers are their employees, which makes the employees role that much more important. Although, the employees are tangible, the culture of the employees is intangible aspect that has been difficult for competitors to imitate. The training center for their employees was an investment Southwest made early on knowing its importance to the long term success for the company.The headquarters for Southwest is another tangible resource, which is located in Dallas. The headquarter similar to many other companies allow top management to effectively communicate the organizational goals of the company. Acquisitions and partnerships that Southwest has completed throughout their duration allow the company to expand their services to more than 64 cities in the United States, and obtain more take-off and landing spots. The frequent flyer program is another tangible resource that Southwest possesses, but interestingly has not had a major impact on Southwest’s bottom line.With the help of IBM, Southwest was able to offer about 250 self-service check-in kiosks. The reason for having the kiosks for their customers was to reduce the amount of time the customers spend in line and to improve the airport experience. In the very beginning, Southwest only had 3 Boeings in their lineup but now they have more than 243 aircrafts in their lineup. Intangible: The main intangible resources that Southwest has are its brand, unique culture, and reputation. Southwest has a brand that is known widely when referencing the airplane industry.The brand that they represent is one that is reliable, convenient, employee centered, customer oriented, and at the same time providing a low cost alternative to their customers. This has helped dramatic ally in their formation of their culture, because even in the beginning their main focus has been on its employees. Southwest has a culture that is unmatched in the industry, and one of the main reasons they have been wildly successful in a challenging environment. Early on Southwest made the decision to sell one of their airplanes rather than laying off their employees to show their loyalty to its employees.All of these factors have enabled the company to maintain a reputation that is respected among the industry. The reputation that they have has enabled them to reap the benefits of being recognized as a leader in the industry. For example, Southwest has earned several Triple Crown awards, which is an award for having the best on-time record, best baggage handling, and fewest customer complaints. Outcomes from Combinations of the Criteria for Sustainable Competitive Advantage: Is the Resource of Capability Valuable? | Is the Resource or Capability Rare? | Is the Resource or Capabi lity Costly to imitate? Is the Resource or Capability Nonsubstitutable? | Competitive Consequences| Performance Implications| No| No| No| No| Competitive disadvantage| Below-average returns| Yes| No| No| Yes/No| Competitive parity| Average returns| Yes| Yes| No| Yes/No| Temporary competitive advantage| Average returns to above-average returns| Yes| Yes| Yes| Yes/No| Sustainable competitive advantage| Above-average returns| Result from the chart: Capabilities The capabilities of Southwest Airlines are the origin of the firm’s ability to create a competitive advantage over other airlines in industry.Southwest focuses on three main functional areas within the organization, which are management, human resources, and marketing. Management The management capabilities of Southwest Airlines are the main reason why the company has been so profitable, utilizing an effective low cost organizational structure throughout the entirety of the company. Using only one type of plane fleet, the Boeing 737 series, which allows minimizing inventory and resources needed for training, maintenance, parts, and is also a very reliable plane.This helps in the quick turnaround times at the gates, which keeps more planes in the air at any given point in time. In the 1990’s Southwest employed an aggressive fuel hedging tactic saving the company millions of dollars in hard times, while still being able to provide low ticket prices to consumers. Another important area management focuses on is the management of human resources that emphasis both employees and customer alike. Human Resources Focusing on customer service, Southwest Airlines opened a multi-million dollar training facility for its flight crews in 1986.The heart of this training facility is to promote human capitol and share knowledge throughout company. By focusing first on their own employees, southwest can ensure that the employees will then focus on the customer. Through motivation and empowerment in the training of its employees, Southwest can provide customers a comfortable experience while retaining employees and making it hard for competitors imitate. This is proven with its Triple Crown Award for best on-time record, best baggage handling, and least customer complaints. MarketingOne way to promote value and differentiate itself from competitors is Southwest’s humorous advertisements. Exercising the LUV ticker symbol, Southwest promotes its customer driven services and prices. While in the late 1980’s Southwest started a rewards program that has retained loyal customers, but has not been proven successful for leisure travelers. With the low cost abilities, timeliness flights, rewards, and focus on the customer, Southwest Airlines has carried out an exceptional marketing strategy. Core Competencies Employee LoyaltyWithin the first two years of operation Southwest suffered huge losses and had to make some major financial decisions. These decisions lead to the selling off an aircraft and keep all of the employees created the â€Å"no lay off policy†. Then in 1973 Southwest was one of the first companies to incorporate profit sharing where employees owned at least 8% of the company stock. This leads to higher employee satisfaction, retention rate, and increases the want for the company to do well, this way the employees focus more on creating value for the customer.Management Skills Southwest Airlines management has tailored numerous sets of activities around a low cost structure creating value for the customer. With short domestic, point-to-point flights, no additional in flight features and no seat reservations allows for a short turnaround time, which makes for less crowded airports and maximizes flight time. Along with fuel hedging and low maintenance costs, the design of these best-fit activities show that the excellent management skills are a core competency that creates a competitive advantage over other airlines.Conclusion Through the inte rtwining of its resources, Southwest Airlines has created a unique set of capabilities and competencies that has continuously allowed successful implementation of its business level strategy. With a focus on low-cost leadership and customer service, Southwest Airlines creates value with reliable on-time departures and a unique company culture. This provides a sustainable competitive advantage that is hard for competitors to imitate and provides a string foundation for Southwest Airlines’ future success.

Thursday, October 10, 2019

Internet Marketing in Business Essay

An effective ‘Marketing Mix’ including all 7 is a way of identifying a businesses achievements of marketing objectives, meeting customer needs, is balanced and consistent, creates a competitive advantage and matches corporate resources. The 7p’s include: product, price, place, promotion, people, process and physical evidence Product: This is first considered in the marketing mix as it all depends on it. This can be a physical product or a service that the corporation is offering to the public. The only way to have a good marketing strategy is by making sure that the ‘product’ is up to standard, promoting every quality part of that good or service. Bikroy promotes their products very effectively as they use picture to enhance the quality of the product itself. They also provide a range of products and service including clothes, accessories, shoes/sandals etc and it provided for men and women. They include brand and designer wear which shows that they have high quality in their product. Bikroy also sells a range of products matching famous celebrity’s outfits that customers would want to buy. Bikroy, online or in their online newspaper provides customers the latest fashion info and what not to wear giving them an advantage to promote their products. Price: This is the total amount a customer pays for the product. It is decided through a number of factors a product have to offer including material costs, product identity, competition, market share and the customer’s perceived value of the product. If other store/business have the same product on stock other businesses may decrease or increase their price for customer satisfaction. Their price for the products vary depending on the product – quality, brand etc. For the designer items it can be expensive, although Bikroy may provide same looking product without the brand name making it affordable. Place: Place represents the location where a product can be purchased. It is often known as the distribution channel. The place can be situated as a physical store or as virtuals stores on the internet. Bikroy.com is rapidly becoming the market leader in the Bangladesh online. All the products are sold ONLINE and not located anywhere else where people can purchase Bikroy items. They does have a warehouse where all stocks are kept and together has a office located in Dhaka. Promotion: Is a way of communication that a business/organisation may use in the market place. It enables the marketer to a advertise the product or service being provided by them. Advertisement is a powerful tool that corporations uses to enhance their products/service to encourage buyers/customers. Promotion has four distinct elements made up of advertising, public relations, word of mouth and point of sale. As their business is purely based upon the internet everything is promoted through the World Wide Web on the website and off. They have promotion on other websites and also Bikroy has developed an application to allow customers to track particular products on its sites through their web browser, whatever websites they are looking at. Bikroy organisation communicates information about their product and service to potential customers by identifying customer details and sends them information through mail, post etc aiming to sell the products. Another advertising method Bikroy use s on their website is that they have added a page of feedback from customers which enables ‘public relation’ which is one of the promotion powerful element. People: It is appropriate to have people in the marketing of services as all people who directly or indirectly influence the perceied value of the product or service, inlcuding knowledge workers, employees, management of the business and also the consumers. People deliver services – they could be any mentioned. People promote and sell products and services. Are their employees, customers – their family and friends, and any other people associated with Bikroy.com. Employees are important to this strategy of marketing mix as in can be those who deliver the products to customers. So they have to polite, helpful and have the knowledge of the business for them to answer any questions provided by the customer. It can also be the employees that answer the phone when any customer calls for any queries. Bikroy.com also have employees updating their website and replying to emails and online comments on their feedback page. Bikroy employees has the knowledge, training and other as pect helping the business with marketing for their business. Bikroy customers are also people that help in them marketing of services as they spread the business information. Process: This is the procedures of activities which lead to an exchange of value. The process should include how customers are handled from first and last point of contact. Bikroy is determined to be number one in the online market. They have thought through their process and kept it clear and have made it customer satisfactory. Bikroy’s strategy consists of aims that has a well-defined process. Bikroy have control of their website, their information/images etc are presented without any doubt intelligibly promotional. Payments are all done through their website online as they are only an online business. Also they have a step-by-step information on how to use and buy off their website, they also have page on delivery information. Here they can track down on where shopping is, know how much is cost to deliver, know when to expect the delievery etc. Physical Evidence: It is the tangible form of the service – this can include how a customer is treated by a staff member, a train ticket, the length of time a customer has to wait for service or their product (depending on the business). A physical evidence is aproof for customer to measure whether he or she has recieved value. As Bikroy.com is an online company their customer has difficulty not knowing how for example a dress will feel, look on them. Bikroy therefore provides annual reports, articles, etc showing them that Bikroy products are worth the value. Bikroy helps customers with their products by giving them full information about the product.