Monday, September 30, 2019

A Prospective Cross Sectional Study Health And Social Care Essay

The importance in measuring the acceptableness to users of a Picture Archiving and Communication System in the infirmary connotes advancement by supplying quality images with good satisfaction than utilizing movie. In trauma instances, this will give advantage to occupants in the appraisal as early diagnosing is necessary. Besides in the Ob-Gyne section medical clearance affecting chest skiagraphy so that contemplated surgical processs can be done. This statement is still non proven, therefore survey on the impact of PACS on clinician shall function the intent. In our scenes, up until December 2011, determinations at the exigency room that rely on the skiagraphy entailed some waiting clip as what normally happens in film-based skiagraphy. The debut of PACS promises to alter this scenario in favor of quicker image handiness movie developing is omitted in the procedure. Quicker handiness of the radiogram due to the presence of networked computing machine system of sharing the digital images.AimDATA SUBSTRATESOPERATIONALLY DEFINED VARIABLESAnalysisTo find the impact of filmless imaging on the frequence with which physicians entree radiology images.Data assemblage sheetFrequency of the entree of doctor to radiology imagesQuantitative variable like frequence shall be analyzed utilizing mean and standard divergence.To measure clinician perceptual experience of image handiness with the usage of Picture Archiving and Communication System ( PACS ) .Data assemblage sheetPercept of clinician on image handinessQualitative variable will be analysing uti lizing proportion.Relationship of Research Objectives, Data Substrate, Operationally Defined Variables and Data AnalyIntroductionI. BACKGROUND OF THE STUDY:Filmless imagination is a construct which has changed health care. Picture Archiving and Communication Systems ( PACS ) are described as the â€Å" centralised depository for all imagination informations and diagnostic images ( eg, x-rays, CT scans, MRI scans ) and radiology studies electronically to clinicians at the point-of-care, contradicting the demand for a film-base.1 Diagnostic imagination is a cardinal constituent of information impacting the attention a patient receives. Picture Archive and Communication Systems ( PACS ) are comprehensive webs of digital devices designed for acquisition, transmittal, storage, show, and direction of diagnostic imagination surveies. The construct of a digital image communicating and show system was devised in the 1970s, with the initial conference on PACS designs launched in 1982 ( Huang , 1999, 2003 ) . The U.S. Army Medical Research and Materiel Command installed the i ¬?rst large-scale PACS in the United States called the medical diagnostic imaging support system in 1992 ( Smith et al. , 1995 ) .2 Over the last 30 old ages PACS been developed for the intent of making more efficient and effectual health care. The construct of PACS was originally developed to better efficiency non merely in the radiology sections but besides in other sections like the exigency room. A figure of surveies have been conducted to find if PACS achieves its ends of bettering efficiency and effectivity within wellness systems. These surveies focus on its impacts on work flow, functions, patient results, and costs, with variable decisions. 3 Digital skiagraphy, this is the first movie free X ray imaging system in Mindanao. DDH ( Davao Doctors Hospital ) upgraded to CR ( Computed Radiography ) and implemented PACS ( Picture Archiving and Communication System ) for all imaging modes ( CT, MRI, Ultrasound, and Radiography ) . In trauma instances, this will give advantage to occupants in the appraisal as early diagnosing is necessary. Besides in the Ob-Gyne section medical clearance affecting chest skiagraphy so that contemplated surgical processs can be done. In this survey, the occupants will give their appraisal on how PACS give impact to their work patterns in the exigency section in bettering clinical decision-making, and easing more efficient patient attention processes.II. REVIEW OF RELATED LITERATUREA Although the construct of image archiving and communications systems ( PACS ) was developed in Europe during the latter portion of the 1970s, no working system was completed at that clip. The first PACS executions took topographic point in the United States in the early 1980s, e.g. at Pennsylvania University, UCLA, and Kansas City University. Some more or less successful PACS developments besides took topographic point in Europe in the 1980s, peculiarly in the Netherlands, Belgium, Austria, the United Kingdom, France, Italy, Scandinavia, and Germany.4 PACS was expected to revolutionise and streamline the bringing of health care, helping communicating between radiotherapists and clinicians, bettering clinical decision-making, and easing more efficient patient attention processes. A In the USA 76 % of infirmaries reported utilizing PACS in 2008, A and in England and Scotland a national roll-out of PACS has been completed with the balance of UK infirmaries implementing it by 2012.A With the integrating of PACS into a figure of medical units outside radiology, the exigency section is one clinical country where PACS has the possible to significantly alter work patterns. The exigency section is a ‘complex ‘ and ‘data-rich environment'A where clinicians continuously multi-task and utilize multiple information beginnings in order to supply optimal attention for critically sick patients. Images are built-in to patient attention, A with high volumes of imaging surveies conducted daily.A Rapid entree to these to back up decision-making can be of important importance. With the potency for imaging consequences to impact dramatically on a patient ‘s attention, the ED provides a good scene to measure how PACS can impact on and take to innovation in clinical work practices.5 In 2010, a survey done by I.M. Hains et Al assessed the grounds of PACS impact on ICU clinicians through a systematic literature reappraisal of 11 ( 11 ) English linguistic communication publications in the USA and UK. The survey revealed a positive impact potency for PACS on clinician ICU work patterns and patient attention. The survey besides showed that PACS elicits positive impact potency on efficiency of work patterns, work associated with clinical determination devising and communicating patterns. PACS engineering offers wellness attention providers the possible for long-run cost nest eggs in radiology services by extinguishing the disbursal of movie processing and storage, among other things. Quick image handiness with PACS in SPMC will do it easier for radiotherapists to pull off patient test work flow and will assist surgical occupants in the early diagnosing and intervention for injury instances. Political action committee in the infirmary connotes advancement by supplying quality images with good satisfaction than utilizing movie.III. RESEARCH QuestionWhat is the impact of PACS on surgical occupant ‘s direction of ER patients?IV. SIGNIFICANCE OF THE STUDYImproves more timely patient attention and allowing clinicians to do determinations more rapidly.V. OBJECTIVESTo measure the impact of image file awaying and communicating systems ( PACS ) as perceived by the surgical occupants at the exigency section. To find benefits, disadvantages and jobs of PACS as perceived by ER surgical occupants.VI. METHODOLOGYStudy Design: Prospective Cross-sectional Survey Puting: The survey shall take topographic point in Southern Philippines Medical Center – Emergency Department, Bajada, Davao City, from May-June 2013 Independent variables: Age, sex, section Dependent variables: 1 ) continuance of ER rotary motion ; 2 ) impact of PACS on surgical occupant ‘s appraisal ; 3 ) surgical occupant ‘s perceptual experience of image handinessParticipantsInclusion Standards: Surgical occupants at ER Department Exclusion Standards: Surgical Residents who refuse to give informed consent.VII. Sampling CRITERIAA convenient sampling of surgical occupants falling under inclusion standards with consent shall be included for research.IX. DATA GATHERING/METHOD:Data will be gathered utilizing a questionnaire adapted from The Norfolk and Norwich University Hospital J.R PILLING.6 The questionnaire makes usage of a five-point Likert graduated table to measure surgical occupants ‘ positions on quality of images. There where besides three unfastened ended inquiries included to arouse responses on occupants perceived advantage, disadvantages and jobs with the usage of PACS. The questionnaire uses a combination of responses to statements and inquiries, graduated from 1 to 6, and some chances for free sentiment. Those who give informed consent will reply the questionnaire for about 5-7 proceedingss. All the information that will be used in this survey will be collected by the research worker, Dr. Leil ani Ching. Surgical occupants will be interviewed at their most convenient clip.Ten. SAMPLE SIZE COMPUTATIONThe survey topics ( aim population ) of this research are all surgical occupants who use PACS in measuring trauma instances in the Emergency Department. Hence, no sample size calculation will be used.Eleven. DATA HANDLING ANALYSISData for this survey will be analyzed and gathered utilizing Epi-info version 7. The uninterrupted variables will be summarized utilizing mean and standard divergence while impact and perceptual experience will be summarized utilizing frequence and per centum.Twelve. DEFINITION OF TERMS1. Impact- The step of both the tangibleA andA intangibleA effects and influences of the Picture Archiving and Communication Systems upon the surgical occupants utilizing it. Questions that ask about the utility and image quality of PACS ( Question no. 1-6 ) will be analysed to measure impact. 2. Perception- TheA processA by which surgical residentsA perceives and buttockss image and informations handiness when utilizing the Picture Archiving and Communication Systems. Questions that ask about participant ‘s point of views ( Question no. 7-10 ) will be analysed to measure perceptual experience.Thirteen. Ethical ConsiderationPrior to enlisting in the plan, the consent of the participant must be obtained.Ethical motives ReviewThe advocates of the survey will procure an blessing from the Cluster Ethics Research Committee of The Southern Philippines Medical Center prior to making the research.Informed Consent: FormA written consent is obtained from the possible participants who will be invited to reply the study questionnaire.Informed Consent: SignerThe signature of the participant should look in the consent signifier.Informed Consent: WitnessNo informant will be required in order for the informed consent to be adhering.Informed Consent: Proxy ConsentThere will be no pro xy consent aside from that of the participant will be allowed.Informed Consent: ProcedurePrior to subscribing the consent signifier, the possible participants are informed about the survey principle and aims.Informed Consent: Timing and VenueThe informed consent will be taken prior to the disposal of the questionnaire. It will be done in Southern Philippines Medical Center after office hours.Disclosure of Study Objectives, Risks, Benefits and ProceduresThe participants will be informed of the survey aims and what is expected of them. They will besides be told that there are no hazards involved in the survey and that there will be no direct benefits to them as survey participants.Renumeration, Reimbursement and Other BenefitsNo renumeration or reimbursement will be given to the participants.ConfidentialityThe research workers will non unwrap the individualities of the participants at any clip. Merely the chief advocate of the survey has the personal information of the participants.In vestigator ‘s DutyIt is the research worker ‘s duty to guarantee the confidentiality of any information obtained during the research.Specimens ManagingN/AVoluntarinessThe participants have the right to decline to take part in the survey.Alternate OptionsIf participants decide non to take part in the survey, their determination will be respected and will non impact their employment or their regular public presentation rating.PrivacyParticipants will non be contacted by any agencies after they have answered the questionnaire.Information on Study ResultsThe participants will hold entree to their informations. After the information has been analyzed, the overall consequences will besides be made known to the participants.Extent of Use of Study DataAt present there are no intended programs to utilize the informations aside from the aims stated in the protocol.Authorship and ContributorshipThe chief research worker is the chief writer of the survey.Conflicts of InterestThe chi ef research worker and co-author declares no struggle of involvement.PublicationThe research may be submitted for national and/or international publication.FundingThe chief advocate of the survey is utilizing personal financess to carry on the survey.Duplicate Copy of the Informed Consent FormA duplicate transcript of the informed consent signifier will be provided to the participants of the survey. Extra transcripts can be made on petition.Questions and Concerns Sing the SurveyThe participants will be encouraged by the chief research worker to voice out concerns about their engagement in the survey.Contact DetailssThe participants of the survey will be provided with the cellular telephone figure of the chief research worker. The chief research worker is besides available for inquiries, remarks and concerns about the survey.

Anchoring-Annual Day Essay

These virtual characters then do things that people in the real world do, such as having sex. Depending on your preferences, you can have sex with someone who is older or younger than you – perhaps much older or younger. In fact, if your virtual character is an adult, you can have sex with a virtual character who is a child. If you did that in the real world, most of us would agree that you did something seriously wrong. But is it seriously wrong to have virtual sex with a virtual child? Some Second Life players say that it is, and have vowed to expose those who do it. Meanwhile, the manufacturers, Linden Labs, have said they will modify the game to prevent virtual children from having sex. German prosecutors have also become involved, although their concern appears to be the use of the game to spread child pornography, rather than whether people have virtual sex with virtual children. Laws against child pornography in other countries may also have the effect of prohibiting games that permit virtual sex with virtual children. In Australia, Connor O’Brien, chair of the criminal law section of the Law Institute of Victoria, recently told the Melbourne newspaper The Age that he thought the manufacturer of Second Life could be prosecuted for publishing images of children in a sexual context. The law is on solid ground when it protects children from being exploited for sexual purposes. It becomes much more dubious when it interferes with sexual acts between consenting adults. What adults choose to do in the bedroom, many thoughtful people believe, is their own business, and the state ought not to pry into it. If you get aroused by having your adult partner dress up as a schoolchild before you have sex, and he or she is happy to enter into that fantasy, your behavior may be abhorrent to most people, but as long as it is done in private, few would think that it makes you a criminal. Nor should it make any difference if you invite a few adult friends over, and in the privacy of your own home they all choose to take part in a larger-scale sexual fantasy of the same kind. Are computers linked via the Internet – again, assuming that only consenting adults are involved – so different from a group fantasy of this kind? When someone proposes making something a criminal offense, we should always ask: who is harmed? If it can be shown that the opportunity to act out a fantasy by having virtual sex with a virtual child makes people more likely to engage in real pedophilia, then real children will be harmed, and the case for prohibiting virtual pedophilia becomes stronger. But looking at the question in this way raises another, and perhaps more significant, issue about virtual activities: video game violence. Those who play violent video games are often at an impressionable age. Doom, a popular violent videogame, was a favorite of Eric Harris and Dylan Klebold, the teenage Columbine High School murderers. In a chilling videotape they made before the massacre, Harris says â€Å"It’s going to be like fucking Doom†¦. That fucking shotgun [he kisses his gun] is straight out of Doom! There are other cases in which aficionados of violent videogames have become killers, but they do not prove cause and effect. More weight, however, should be given to the growing number of scientific studies, both in the laboratory and in the field, of the effect of such games. In Violent Video Game Effects on Children and Adults, Craig Anderson, Douglas Gentile, and Katherine Buckley, of the Department of Psychology at Iowa State University, draw these studies tog ether to argue that violent video games increase aggressive behavior. If criminal prosecution is too blunt an instrument to use against violent video games, there is a case for awarding damages to the victims, or families of the victims, of violent crimes committed by people who play violent video games. To date, such lawsuits have been dismissed, at least in part on the grounds that the manufacturers could not foresee that their products would cause people to commit crimes. But the evidence that Anderson, Gentile, and Buckley provide has weakened that defense. Andre Peschke, editor-in-chief of Krawall. e , one of Germany’s leading online computer and video game magazines, informs me that in ten years in the video game industry, he has never seen any serious debate within the industry on the ethics of producing violent games. The manufacturers fall back on the simplistic assertion that there is no scientific proof that violent video games lead to violent acts. But sometimes we cannot wait for proof. This seems to be one of those cases: the risks are great, and outweigh whatever benefits violent video games may have. The evidence may not be conclusive, but it is too strong to be ignored any longer. The burst of publicity about virtual pedophilia in Second Life may have focused on the wrong target. Video games are properly subject to legal controls, not when they enable people to do things that, if real, would be crimes, but when there is evidence on the basis of which we can reasonably conclude that they are likely to increase serious crime in the real world. At present, the evidence for that is stronger for games involving violence than it is for virtual realities that permit pedophilia.

Saturday, September 28, 2019

Cars Enslave Us Rather Than Liberate Us Essay

How much effort do you put in travelling to school or workplace each week? Created in 1870, cars have been one of the most useful and spectacular inventions of human beings. The society we live in has recently became completely reliant on these fuel-burning vehicles. It is widely discuss whether cars are a blessing or a real nightmare that may lead people astray. As a young driver, I firmly believe in the liberating power of cars. Not only do they facilitate life, but also encourage to broadens one’s horizons, which may be justified in the following essay. To begin with, cars allow people to travel from place to place with no limits. Basically, they give a perfect opportunity for those who live in the suburbs and have no access to the public transport. Living far away from the city requires the involvement of other people, typically parents, who drive their children to various places. Otherwise, how would they be able to develop and participate in some additional activities, like volunteering or learning to play the violin? It is important to stress that these ingenious machines may give people the fantastic experience of travelling round the world without worrying about covering long distances having a place to sleep when one is on the way! Furthermore, cars have an unquestionable advantage over the means of public transport. Given the choice between walking in the rain to get to the bus station or taking a car and driving directly to one’s destination, who would not prefer the latter? Rarely do people claim that cars are less convenient or luxurious that buses owing to having the air-conditioning system or soft seats. What is more, there is little possibility of getting stuck in the crowd or being exposed to delay or robbery. Surprisingly, people who travel with the use of public transport are more likely to be late and to demonstrate continual anxiety. On the other hand, cars are very expensive to maintain. They burn a lot of fuel and, therefore, force people to be more restrictive about their expenses. However, public transport is not free too. For a five-member family, it is quite more beneficial to have a car since it not only saves money, but also a lot of free time that can be spent on more pleasant activities. To conclude, living without a car appears to have a lot of serious disadvantages. It strikes me that these vehicles save a lot of time and do not put any demand to subordinate to timetables. To my mind, they liberate us rather than enslave us.

Friday, September 27, 2019

My First Speech Experience Essay Example | Topics and Well Written Essays - 750 words

My First Speech Experience - Essay Example Within the next few paragraphs I shall look into what makes for a well structured speech and the other aspects of speech delivery that I can improve upon. My critique shall help to answer the following questions: 1. How did I prepare for my speech? How did I feel as I delivered the speech in front of the class? 2. What were my weak and strong points? 3. What would I do differently next time I deliver a speech? I chose to prepare for my speech by memorizing the content. I felt that by doing so I would be able to maintain eye contact with my audience and quite possibly lessen the nervousness that I would be feeling by being able to lock my eyes onto a particular target and concentrate on the target in the audience to help ease my tension. There was however, one drawback to my memorizing the whole speech. Once I got distracted and lost track of my thoughts, I froze and was almost unable to continue with my speech as I had to quickly start over the speech silently in my head so I could continue from what I felt was the point where I stopped. In order to prepare for the actual delivery of my speech, I spent numerous hours preparing by practicing my delivery in front of my classmates. I also made it a point to rehearse with a classmate from my speech class. He recorded my delivery and we reviewed the material after I delivered my speech in order to find my weak points then we went back and worked on those target areas for further improvement.

Thursday, September 26, 2019

Costume designing for the media Essay Example | Topics and Well Written Essays - 3500 words

Costume designing for the media - Essay Example Unlike other fashion and costume designers, in most instances those who work within the media industry are not able to work totally in isolation with their own ideas, they cannot just work within their own imagination. There will also be a requirement for the finished costumes produced to have paid regard to the input from a number of other department and individuals within the particular Film, TV and Theatre project. Film, Television and Theatre production companies and organisations consider costume design to be an integral and important part of the process of production. However, each of these individual media elements will impose a different approach and requirement upon the designer. However, as is the case with an actor's poor performance, costume design and construction that falls short of the standard and quality demanded will also have the affect of devaluing the final production. The hypothesis for this particular research to identify the specific issues that face costumer designers, both in the UK and the USA, when they are involved with design work for Film, Television and Stage. ... tume design, including what the term means, adding to definitions from a number of sources, including The Royal National Theatre (2006), the Designers guild factsheet (2006) and other articles (2006). Secondly, the paper will explain the intricate process of costume design with particular reference to the three entertainment medias outlined previously. This will cover the process from original drawings, (Huaixiang 2004), management and supervision of the designs, through to the making of the finished product. An integral part of this process contains a study of how the designer's work needs to interact with the original script, continuity issues relating to the actors make-up and hair styling, and the communication needed with all the other stakeholders attached to the project. A further element of this aim is to consider the ethical image the finished costumes should convey to the audiences. Our final aim is to study and identify the different issues and requirements demanded of the designer when working for the Stage and Theatre, as compared with those existing in the Film and Television mediums. Within all of these aims our purpose is also to identify this sector of the industry and its performance in the U.K. as well as the U.S.A. The specific objectives for the outcome of this paper can be identified in three distinct statements. 1) To provide a greater understanding of the intricate and varied processes of costume designing as it is performed within the entertainment mediums, as distinct from the general design industry 2) To identify the issues that impact upon costume designing in these industries, and show how the process itself forms an integrated part of the overall production package. 3) Analyse and explain the key differences that exist between

Overview of the iPhone Research Paper Example | Topics and Well Written Essays - 1250 words

Overview of the iPhone - Research Paper Example It was a GSM phone and had a button placement that is now consistent. (iMore) After that followed seven more generations of the iPhone each accompanied by a major release of the iOS. One year and a half later iPhone released its second generation of 3G and reviewed the hardware .the phone also added GPS capabilities. Some of the hardware improvements for iPhone 3GS that included a faster processor and a camera with a high resolution capable of recording 480p video. However, the phone had a few problems with its charger but overall it managed to make massive sales. (iMore) After that, it saw the release of other iPhone 4 models. iPhone 4 featured a front camera to enable video calling, a higher resolution of 960 x 640 and a rear camera of 5megapixels with 720p video capture. iPhone 4S upgraded its hardware to A5 dual-core processor and an upgrade of the camera to 8 megapixels with the ability to record a 1080p video. A voice control scheme by the name of Siri was employed. The next release was iPhone 5 which was an improvement of the iPhone 4.The iPhone 5 had an A6 dual-core processor, hosted LTE (Long-Term Evolution) support and increased the display size to 4 inches. An improvement to the iPhone 5 was released by the name of iPhone 5S. It had an A7 64-bit dual processor and an upgraded camera with two LED flashes. A fingerprint scanner with touch id incorporated to the home button. iPhone 5C features a casing made of polycarbonate and a rear well-lit camera. Apples latest iPhone release is the iPhone 6 and the iPhone 6 Plus. The iPhone 6 has a screen size of 4.7inches while the iPhone 6 Plus has a screen of 5.5 inches. Both this models feature new A8 processor chip and motion coprocessors.

Wednesday, September 25, 2019

Unit9 Essay Example | Topics and Well Written Essays - 250 words - 1

Unit9 - Essay Example The course met my expectations as I was set on learning about analysis of policies and the in-depth detail was provided. The progress so far has been overwhelming. I did not expect that at this point I would have made much progress and learnt the much I have but the truth is that am way ahead and am immensely impressed by this progress. Despite the overwhelming progress and the making of leeway in the course, I still wish most of the concepts about the public policies analysis could have been carried out in slower manner to give time to really understand them since they impact directly on our day to day lives. All in all, the much taught though shallow still was good. To those students undertaking this course next year, I would advise them to start early preparations of trying to understand (though not fully) the main concepts in the course. This is in order to enable them have many questions which in the end makes the course be detailed with as many real life examples as possible hence making the course much more relevant to them. More interactive time and open forums with the tutor where debates about the course topics would have arisen and therefore made the course less intense would have been appreciated. This is because interactive time provides an avenue and time to get up close with the course instructor and hence opening communication channels to the shy students who are not so comfortable in intense classroom lectures and do better in an open forum sort-of discussion. Reuters. â€Å"Consumer Spending Rises as Jobless Claims Hold Steady.† The New York Times, 30th August, 2012. Retrieved from:

Tuesday, September 24, 2019

Information security management framework Research Paper - 2

Information security management framework - Research Paper Example In regards to the security of information and networks, policies typically cover a single aspect such as the acceptable utilization of computing facilities in a learning institution (Singh, 2007). On the other hand, standards are thorough and comprehensive statements of the aspects that members of an organization are supposed to participate in in order to abide by the set policies. They may exist in the form of requirements specific to systems or procedures, which are supposed to be adhered to by everyone. For instance, the employees may wish to use their personal mobile devices in the workplace; in this case, the standards set for the connection of the mobile devices to the network run by the organization must be adhered to precisely (Laet & Schauwers, 2005). Additionally, guidelines are literally groups of system or procedural specific recommendations that govern nest practices but are not must-follow controls. Nevertheless, reference to standards and guidelines is seen as an efficient and effective aspect of a good security policy. All the documents listed have varying target audiences in a company and thus they are not supposed to be combined into a single document. Rathe r, there should be a number of documents, which will collectively develop the concept of an information security policy framework thereby making the security policy the most important document

Monday, September 23, 2019

Responsible Management Essay Example | Topics and Well Written Essays - 1000 words

Responsible Management - Essay Example It is important for every organization to consider the social, economic and environmental systems in which it is operating. In the long-run it is the corporations that develop a long-term vision for their business along with fulfilling their responsibilities towards the society which are able to sustain their development in the economy (Albareda, 2008; Crane et al., 2008). Due consideration of the environment in which the organization is operating will help to ensure that all the functions of the organization are conducted in the right perspective and in an ethical manner. When an organization accepts its involvement in controlling the economic resources of the society, the management will automatically be accountable to the society about the assets used. This level of accountability needs to be conducted on fair grounds and in a sincere manner by the organization. Even in cases where the organization faces losses, it should still maintain its accountability and not indulge in any false practices or excuses. In order to help managements fulfill their social responsibilities several models have been proposed and one such concept is the ‘Triple Bottom Line’ (TBL) (Park & Stoel, 2005). The introduction of this concept acted as a vehicle for proper and clear reporting of the corporation’s environmental, economic and social performance (Ketola, 2009). Performances related to the environment and social concerns can be monitored with the help of this concept. TBL has grown in popularity as it assists an organization in determining the extent to which it is successfully meeting its responsibilities towards the community. The concept of TBL has given a direction to the management in developing the goals and objectives of the organization according to its business environment. By following the guidelines specified in the

Sunday, September 22, 2019

How Many Watts Solar Panel Do You Ned to Charge 12v Battery Essay Example for Free

How Many Watts Solar Panel Do You Ned to Charge 12v Battery Essay The wattage of the panel will determine How Many Hours of sunlight youll need to charge the 12 volt battery, so the next piece of information you need to consider is: what are you going to use that 12v battery for, and how quickly do you need it charged up? Heres the math- To figure out how many hours it will take to charge the battery, first figure out the output of the solar panel by dividing its WATTS by its Volts, which will give you its output in AMPS. So. . a 15 watt panel DIVIDED by 12v = 1.25 amps Next, read the Amp Hour rating on your 12v battery. If we use a 50 amp hour battery for this example. . . DIVIDE 50 amp hours [required to fully charge the battery] by the 1.25 amp output of the solar panel = 40 hours of direct sunlight to charge the battery. Then add another 10% of time to his number, so figure 44 hours. Some more examples: 5watt/12vpanel=.42amp and 50amp hr/.42amp=119 +10% = 131 hours of sun 30watt panel works out to 22hours. 50watt=13hrs 80watt=about 8 hrs. Of course all of these times are based a 50amp hour 12v battery. BTW, Im no expert i just found this equation online 5 mins ago because i was wondering the same thing myself. . Now could anyone tell me how figure out quickly my computer or light or whatever will drain that 12v battery To determine how quickly your battery will drain, lets assume that same 50AH battery. You wish to run 2-5W 12V lamps for about four hours each evening and use your small laptop for an hour which has a 50W draw at 18V, so about 80W at 12V. Your use will be 80W/12V=6.7AH + ((2*5W)/12V)*4 hours=3.2AH, or a total of about 10AH per evening. If you allow the battery to discharge to 50% before wanting to recharge it, you can run as described for about 3-3 1/2 evenings per week. If you concurrently have a 30W solar panel charging the battery for 4 hours per day, you will be keeping the battery fully charged it (you will be putting back 10AH per day). This allows for a couple of cloudy days. Hope this answers your question. Remember, watts/volts=amps. Multiply each load by the number of hours you need it to run to get ampere-hours. Add all these results together to determine the total draw on the battery.

Saturday, September 21, 2019

Artificial Intelligence in Business Applications

Artificial Intelligence in Business Applications Artificial Intelligence and Robotics Business functions that can/cannot be automated INTRODUCTION Computer systems today are a part of almost all businesses; this is because they provide us, along with the added use of the Internet, with a variety of means that made business operations easier, productivity higher, and communication processes faster. Computers and the programs (or the software applications that are installed on them) along with the robotic systems do a great amount of the tasks that were previously performed by the employees and/or workers themselves. This transformation, towards an automated work environment, saved businesses a lot of unwanted expenses, a lot of time, and caused profits to increase steadily. Computers substituted, in different business structures, classical machines and tools, such as the calculator, the fax, the telephone, the photocopier and many more. The automation of different business functions led many organisations and companies to a higher level in what concerns production and management. But the point that should be understood is that even though many processes and functions related to businesses and organisations have been automated, there are still many aspects that are not, or that cannot be, automated for a wide range of reasons. BUSINESS FUNCTIONS The main objective of any business is to achieve success. To be able to reach success, an organisation needs to have an effective structure because any entity depends exclusively on two factors which are management and use of information. An efficient use of information systems can allow an easier and faster access to data that are essential for the workflow and for the quality of that work and, therefore, can assist the management in performing its duties in the best possible manner and in making the right decisions at the right times. In order to achieve such objectives, specific business functions should be established and specific tasks should be performed. Every kind of business and every organisation, depending on the nature of their operations, the products or services that are provided by them, their geographic location, and depending on the management and production schools that they relate to, have different business functions, but there are certain generic functions that apply to all kinds of businesses all over the world. These functions are usually general management, information management, operations management, marketing, finance and accounting, and human resources. Lan and Unhelkar (2005) identify the various generic business functions by stating that they are the function of Management and Administration which is the department whose tasks are to â€Å"corporate resources, corporate image, quality in all aspects, industrial relations, stakeholders relations, productivity, [and] promotion,† the function of Human Resources that should deal with â€Å"job analysis, position classification, employee training, employee selection, employee auditing and promotion† in addition to other related tasks, the function of Finance and Accounts that is responsible for â€Å"the capital operations required by the entire enterprise activities the funds required by management, administration, sales, marketing, human resources, [and] purchasing,† the function of Purchase and Procurement, the function of Sales and Marketing, and the function of Customer Care or Customer Support. According to another source, â€Å"business functions are universal and apply to every type of business. The most essential business functions are marketing, operations (production of goods and services), finance, and human resource management† (Plunkett, Attner, and Allen 2005). Here, we find a view according to which all functions are the same regardless of the type of business. The main question is to understand whether the above mentioned functions can be in whole or in part automated and/or computerised. In other words, can all the tasks concerning the business functions be transferred to intelligent electronic or robotic agents reaching the level of efficiency and proficiency in which humans are capable of performing them? AUTOMATION AND ARTIFICIAL INTELLIGENCE In order to understand if all (or only some) business functions can be automated, it is important to understand the meaning of the concept itself. According to MSN Encarta (2005) automation is a â€Å"system of manufacture designed to extend the capacity of machines to perform certain tasks formerly done by humans, and to control sequences of operations without human intervention. The term automation has also been used to describe non-manufacturing systems in which programmed or automatic devices can operate independently or nearly independently of human control. In the fields of communications, aviation, and astronautics, for example, such devices as automatic telephone switching equipment, automatic pilots, and automated guidance and control systems are used to perform various operations much faster or better than could be accomplished by humans.† For us to reach such a system, a certain computerised aspect should be developed; an aspect which enables machines to execute given tasks according to the desired level. For such an objective, experts and programmers should be able to produce information systems that possess some of the characteristics of intelligence; this is why such systems are referred to as systems of artificial intelligence, or simply intelligent machines; in other words, computerised systems that are pre-programmed to perform a certain mission with the same level of accuracy of a trained human being. It is the science of creating machines that are intelligent, and in a more specific context, intelligent computer software-programs functioning according to the present hardware. It attempts to comprehend the mechanisms in which human intelligence works and then imitates it in the way the prospective intelligent machines should work, avoiding the limitations of biologically related weaknesses. Bailey (1992) describes his understanding of intelligence as the ability to reason or have a logical thinking, and to have an effect on the environment; this will require a good level of knowledge that should be acquired. To be able to simulate humans, machines should possess the capability of understanding the world. Computers, or intelligent machines, should be knowledgeable on a level that is even deeper and more detailed than we are Depending on knowledge, intelligent machines (or computers or robots) will be in a position to answer any of our questions, they could perform any task efficiently, and they can solve complex and difficult problems much more rapidly. Bailey also states that another important feature that intelligent machines should have is connectivity to each other all around the world through the use of networks, which will make it even easier for them to gain more knowledge and to communicate it to one another. Then there is another feature that is the ability to establish an effective level of communication between intelligent computers and humans through both written and verbal means and not through commands typed through a keyboard and a screen. Finally Bailey puts the physical qualities, such as vision, hearing, as the final of his desired intelligent computer or robot through the use of visual and auditory sensors similar to, or better than, those of humans. AUTOMATING BUSINESS FUNCTIONS The organisational structure is the setting that defines all the departments of the organisation, identifies the responsibilities and duties of each department, regulates the relationship between the various departments and explains how each of them should interact with the others in the way that guarantees the achievement of the desired outcome. As Clarke and Anderson explain, â€Å"an organizational role is defined as a set of functions together with a set of obligations and authorities. The same human or artificial agent can play several roles† [within that specific organisation] (187). The various tools of Information Technology can assist the company in gathering, elaborating, processing, storing/documenting, and distributing all the information that is needed for planning, decision making, and control. The use of computers and the simplicity they offer are important elements in what concerns the enhancement of all the mentioned processes. This fact explains how information technology influences the way in which organisations tend to arrange the tasks and processes within them. Ross (2003) explains that â€Å"information technology (IT) has progressively become key link integrating the business enterprise and its logistics capabilities with its customers and supplies Simply, the organization’s ability to create, collect, assimilate, access, and transfer information must be in alignment with the velocity of the activities necessary to execute effectively supplier, customer service, logistics and financial processes.† As mentioned earlier, many aspects related to the various tasks of businesses are now computerised and/or automated. Accounting and financial processes, for example, are not done only on paper as they once used to be; instead complete computer systems that rely on software applications are those that elaborate, document, communicate, and distribute the various pieces of information among different employees working in different departments. Another example is that related to the processes of sales and marketing which depend heavily on the Internet and the means of communication offered by it. â€Å"Sales force automation modules in CRM [Customer Relation Management] systems help sales staff increase their productivity by focusing sales efforts on the most profitable customers, those who are good candidates for sales and services. CRM systems provide sales prospect and contact information, product information, product configuration capabilities, and sales quote generation capabilitie s† (Laudon and Laudon 2006). For what concerns the accounts and finance function, there are clear indications that many of its tasks have been computerised. â€Å"Large and medium-sized businesses are using ASPs [Application Service Providers] for enterprise systems, sales force automation, or financial management, and small businesses are using them for functions such as invoicing, tax calculations, electronic calendars, and accounting† (Laudon and Laudon 2006). Another form of automation in this context is presented by Sanghvi (2007) as he states that â€Å"online technologies have enabled payroll services to become a popular way for accounting firms to improve client service, enhance loyalty, and gain incremental business Many small business owners turn to their accountant for back-office services while they focus on growing their businesses,† and this means that, through online systems, they can provide the external accountants with all the information needed in order to produce their legally a ccurate and acceptable financial documentation. Concerning human resources management, there are certain computerised systems that are capable of performing the main parts of the process that are related to that function. Torres-Coronas and Arias-Oliva (2005) refer to what they define as e-recruiting; which consists of the â€Å"practices and activities carried on by the organization that utilizes a variety of electronic means to fill open positions effectively and efficiently. The e-recruiting process consists of the following iterative steps: identification of hiring needs; submission of job requisition; approval of the job requisition via a job database; job posting on the Internet; online search of the job database by job seekers, online pre-screening/online self-assessment; submission of applications by applicants directly into an applicant database; online search of the applicant database for candidate selection; online evaluation of rà ©sumà ©/application; interviewing by recruiters/hiring managers; online pre-employment screening; and job offer and employment contract† Another example of a computerised business function, which is auditing, is presented by Caster and Verardo (2007): â€Å"The increasing prevalence of complex computer information systems and electronic data interchanges has made most business transactions electronic in nature Technological advances have altered not only the actual form of evidential matter required to be obtained by auditors, but also the competence of this evidence. Technology has had a significant impact on audit evidence, and existing auditing procedures could be improved in many ways.† The authors indicated that new technologically related regimes of audits have been created to automate the auditing process. Laudon and Laudon (2006) explain that certain businesses took enormous steps towards the automation of the entire processes related to their core activity: â€Å"The management of UPS decided to use automation to increase the ease of sending a package using UPS and of checking its delivery status, thereby reducing delivery costs and increasing sales revenues The technology supporting this system consists of handheld computers, barcode scanners, wired and wireless communications networks, desktop computers, UPS’s central computer, storage technology for the package delivery data, UPS inhouse package tracking software, and software to access the World Wide Web.† The author indicates that the various processes of UPS have improved substantially thanks to the computerisation and inter-connectivity of their functions. When we study the potentials of automation for what concerns business functions, it should be clearly stated that each function is a separate case with its own factors and qualities, which can allow or limit the possibilities of full computerisation of its different processes and tasks. Dorf and Kusiak (1994) state that almost every aspect of the manufacturing process can be automated: â€Å"Most manufacturing operations can be automated. Given the large number of manufacturing processes and assembly operations used in industry (the number is in the thousands) and the many possible ways in which any given operation can be automated.† The authors give different examples of automated systems, such as the Automated Production Lines (which is â€Å"a production system consisting of a series of automated workstations connected by an automatic parts transfer mechanism†), Position and Motion Control Systems (which are required to position â€Å"a work head or tool relative to a work part to accomplish a process†), and the Industrial Robotics (which are â€Å"general-purpose programmable machine possessing certain anthropomorphic characteristics†). When the other business functions are examined, we find that almost every single task within the realm of each function can be automated: Information concerning the major issues related to the business as a whole can be produced by computer systems on regular basis, and passed on to management for examination and study before reaching the right decisions in what concerns the survival and progress of their organisation. Accountancy and financial processes can be completely handled by intelligent systems that can, for example, calculate wages according to working hours, process payments to institutions and banks through electronic means over the Internet, can produce invoices and receipts to customers and suppliers, and can also manage shareholder’s issues. In the human resources function, information and requests can be effectuated electronically, but the final step, which is employees selection, cannot be performed by automated systems; because here the human factor and the hu man inter-activity is, and most probably will always be, the determining point. This is also valid for what concerns sales and marketing, the computerised system can perform all that is needed except the stages related to policy making and to physical delivery of products, as here the human factor is still required. There are certain missing parts if the desired objective is to reach a total automated business; such parts can be overcome only if (or when) we manage to solve deep and important problems in what concerns artificial intelligence. Creating systems that can ‘think’ as humans and can perform tasks related to the human factor will not be a fast endeavour, as we are still in the beginning of what concerns understanding and imitating intelligence. CONCLUSION As mentioned earlier, most of the tasks that are related to virtually all business functions can be computerised and/or automated, but the most important element is still the human factor. At the present level of technology, we are unable to create a fully automated business and we cannot transform an existing business entirely into a computerised one. Some business functions, such as accountancy and information management can be fully automated, some other functions, such as human resources and sales and marketing, can be computerised to a very high level, while other functions, such as general management, cannot be automated. Another reason, beside the technological limitations of the field of artificial intelligence today, is that people (whether customers or suppliers) are still not accustomed to dealing solely with machines. Works Cited Bailey, C. (1992) Truly Intelligent Computers. Coalition for Networked Information [online]. Available from: http://www.cni.org/pub/LITA/Think/Bailey.html>  [cited 13 April 2007]. Caster, P. and Verardo, D. (2007) Technology Changes the Form and Competence of Audit Evidence. The CPA Journal, 77(1), pp. 68-70. Clarke, R. and Anderson, P. (2001) Information, Organisation, and Technology: Studies in organisational Semiotics. Norwell, Massachusetts: Kluwer Academic Publishers. Dorf, R.C. Kusiak, A. (1994) Handbook of Design, Manufacturing and Automation. Hobokin, NJ: John Wiley Sons, Inc. Lan, Y.C. and Unhelkar, B. (2005) Global Enterprise Transitions: Managing the Process. Hershey, PA: Idea Group Publishing Inc. Laudon, J. and Laudon, K. (2006) Management Information Systems: Managing the Digital Firm 10th ed. Upper Saddle River, NJ: Prentice Hall. Microsoft Encarta 2006. (2005) Automation. [CD-ROM]. Microsoft Corporation. Plunkett, W. R. Attner, R. F. and Allen, G. (2005) Management: Meeting and Exceeding Customer Expectations. Mason, Ohio: Thomson South-Western Publisher. Ross, D. F. (2003) Distribution: Planning and Control 6th ed. Norwell, Massachusetts: Kluwer Academic Publishers. Sanghvi, A. (2007) Improving Service Through Online Payroll. The CPA Journal, 77(3), pp. 11. Torres-Coronas, T. and Arias-Oliva, M. (2005) e-Human Resources Management: Managing Knowledge People. Hershey, PA: Idea Group Publishing.

Friday, September 20, 2019

Examining The Explanation For Juvenile Delinquency Criminology Essay

Examining The Explanation For Juvenile Delinquency Criminology Essay For decades, researchers have made numerous efforts to find a thorough explanation for juvenile delinquency. The results of these endeavors have offered possible reasons as being both biological and social (Schmalleger, Bartollas, 2008). It is still unsettled as to what causes have the greatest influence on adolescence crime, but it is undoubted that some factors clearly have an effect. Recent studies have suggested that the direct relationships a child has with concrete social elements, like his family, friends and community, are likely to give some predicate involvement in crime (Schmalleger, Bartollas, 2008). This paper will identify and discuss the environmental influences of family, peer pressure, and community and their effects on juvenile delinquency. Keywords: family, peer pressure, community, juvenile delinquency, environmental influence Much time and energy has been spent in attempting to understand the causes of delinquency. Several theoretical models have been developed to describe the relationship between variables and outcomes as it relates to delinquent behavior. Some studies have pointed to the interaction of risk factors, the multiplicative effect when several risk factors are present, and how certain protective factors may work to offset risk factors (Palermo, 2008). Also, studies have noted that the presence of certain risk factors often increases a youths chance of performing criminal actions (Megens Weerman, 2010). Individual, social, and community factors have currently been identified as risk for juvenile delinquency. Individual factors can be defined as prenatal and perinatal; and studies have revealed that approximately 80% of violent youth offenders, rated high in delivery complications (Schmalleger, Bartollas, 2008). Researchers also continue to suggest that psychological, behavioral, and mental characteristics such as low verbal IQ and delayed language development are also linked to delinquency (Schmalleger, Bartollas, 2008). Social factors, usually defined as family and peer influence are also important in the development of delinquent behavior. It is well documented that children that are maltreated and/or have delinquent friends run a greater risk of developing delinquent behavior themselves (Valdas, 2008). Finally, community factors, which are school policies that attach importance to suspension and expulsion, and youths residing in disorganized or adverse neighborhoods, have been identified as strong factors for increased risk of participating in criminal acts by juveniles (Palermo, 2009). Today, social structure theorists still offer that the cause of juvenile crime is not within the person themselves but is due to external factors. They further believe crime is created by social structures such as poverty, a peer group who believes there is nothing wrong with crime, and/or a racial imbalance in the justice system (Palermo, 2009). Current research has shown an exclusive focus on juvenile conditions in U.S. cities. The focal point continues to be on the complex nature of interdependencies between social conditions and behavior of individuals on one side and ecological context factors on the other side (Palermo, 2009). I suggest that a clear outlook on the efforts required by society, schools, and families to reduce juvenile delinquency is being revealed through these studies to show important factors leading juveniles to delinquency. Family Influence on Juvenile Delinquency Probably the strongest influence in our lives is the family we grew up in. Birth order, personality of our parents, treatment by our siblings, socioeconomic status of the family all shape who we become. These influences, also taught us what society deems as proper behavior. Small children do whatever impulse entered our heads (Regoli, Hewitt, Delisi, 2007). They do not know that it was socially unacceptable to eat with fingers, to play with the vase on the coffee table, to hit another sibling or to break toys (Regoli, Hewitt, Delisi, 2007). These rules and many other were introduced and re-enforced to most people by parents. Historic review of in the fields of humanities and science clearly put forward the family as the foundation of human society (Valadas, 2008).   There is a common joke often told to new mothers and fathers that parents always screw up their kids, it is just a matter of how bad. I suggest that there may be some truth to this adage. Recent studies show that seventy to eighty percent of families are considered dysfunctional by family therapists (Aaron Dalliare, 2010). It is must be noted that sometimes no matter how well intentioned and how well informed parents may be, they cannot know exactly the correct way to rear a particular child. However, many others are intentionally neglectful and not well informed to the detriment of the child. Much evidence supports the proposition that children who are rejected by their parents, who grow up in homes with considerable conflict, or who are inadequately supervised are at the greatest risk of becoming delinquent (Valadas, 2008).   All would agree that adolescence is a time of expanding vulnerabilities and opportunities that accompany the widening social and geographic exposure to lif e beyond school or family; but it all starts within the family (Megens Weerman, 2010).   Researchers agree that family plays a large part in delinquency; thus understanding how the family and how the juvenile within the family works gets to the core of delinquency (Aaron Dallaire, 2010).   In the realm of family functioning there is a theory known as the coercion theory, which suggests that family environment influences an adolescents interpersonal style (Aaron Dallaire, 2010).   Youth with coercive interpersonal style tend to become involved with others that have similar styles, and these relationships tend to increase the likelihood of being involved in delinquent behavior (Aaron Dallaire, 2010).   Thus, understanding the nature of relationships within the family, to include family adaptability, cohesion, and satisfaction, provides more information for understanding youth that are risk (Valada, 2008).   I propose that understanding the cohesiveness of the family may eventually be a predictor for the frequency of delinquent acts because studies have revealed that family behaviors, particularly parental monitoring and disciplining, seem to influence association with deviant peers throughout the adolescent period.    Among  social circumstances which have a hand in determining the future of an individual, I suggest that out of the many environmental factors researchers have developed to understanding the causes of juvenile delinquency, the family unit plays the greatest role. I support this conclusion with the fact that society has always placed a heavy burden on families by assigning the responsibility for childrearing to parents with little or no guidance. Individual family units must transmit values so as to lead children to accept societal rules based on their own understanding. Therefore, it should be no surprise to find that family life bears the strongest relationship to juvenile delinquency. Peer Influence on Juvenile Delinquency There is considerable evidence to support that peer relationships influence the growth of problem behavior in youth (Regoli, Hewitt, Delisi, 2007; Schmalleger, Bartollas, 2008). Peer influences can be defined as pressure either planned or unplanned exerted by peers to influence personal behavior (Schmalleger, Bartollas, 2008). Peer groups provide important developmental points of reference through which adolescents gain an understanding of the world outside of their families (Megens Weerman, 2010). Failure to develop close relationships with peers can result in a variety of problems for adolescents that range from delinquency and substance abuse to psychological disorders (Megens, Weerman, 2010). It has also been documented that higher peer stress and less companionship support from peers has been associated with a lower social self-concept in adolescents (Palermo, 2009). Research has consistently documented a high correlation between peer and youth deviance; ironically, the most common public interventions for deviant youth involve segregation from mainstream peers and aggregation into settings with other deviant youth (Chung Steinberg, 2006). Given the rise of public concern and research on this issue, there still needs to be more understanding on the conditions under which these peer contagion effects intervention, youth developmental levels, and strategies for managing youth behavior in groups. Many studies have found a consistent relationship between involvement in a delinquent peer group and delinquent behavior (Megens Weerman, 2010). Literature has noted that for youth ages 12-14, a key predictor variable for delinquency is the presence of antisocial peers (Chung Steinberg, 2006). Factors such as peer delinquent behavior, peer approval of delinquent behavior, attachment or allegiance to peers, time spent with peers, and peer pressure for deviance, have all been associated with adolescent antisocial behavior (Chung Steinberg, 2006). Conversely, research has shown reported that spending time with peers who disapprove of delinquent behavior may curb later violence (Megens Weerman, 2010). Thus, I conclude that the influence of peers and their acceptance of delinquent behavior is significant and this relationship is magnified when youth have little interaction with their parents. Community Influence on Juvenile Delinquency A dramatic way neighborhood and community environments can affect residences lives is through the influence on educational outcomes of the children. The Juvenile Justice Systems involvement with kids within the special education system is currently a hot topic (Chung Steinberg, 2006). When the federal special education law was passed in 1975, Congress found that most children with disabilities were not receiving an appropriate education, and that millions of children were excluded from school altogether (Chung Steinberg, 2006). Today, schools continue to suspend and expel students with disabilities for behaviors that are a direct result of their disabilities (Li Lerner, 2011). These children often become delinquent, feel worthless, are viewed as failures, stop trying, and/or end up in the juvenile justice system as a result of their treatment by those who are charged with educating them (Christle, Jolivette, Nelson, 2005). School policies can best be defined as various goals and assigning the proper authorities that makes school governance and management possible (Li Lerner, 2011). Studies have reviewed the impact of school policies concerning grade retention, suspension and expulsion, and school tracking of juvenile delinquency and have reported that these policies, which disproportionately affect minorities, have negative consequences for at-risk youth (Li Lerner, 2011). For example, suspension and expulsion do not reduce undesirable behavior, and both are linked to increased delinquent behavior. Studies have also revealed that large schools with formal and severe punishment structures in place had more incidents of students misbehaving (Christle, Jolivette, Nelson, 2005). Recently there has been a growth in the development and application of prevention programs (Li, Lerner, 2011). Most have been directed at adolescents and are based in schools. I suggest that there will be a continued growth in these programs because school is a key locus for intervention. This is based simply on the fact that these institutions aside from family have access over extended periods of time to most of the population of young people. There is a general consensus in the general public that juvenile delinquency is concentrated in disadvantaged neighborhoods (Chung Steinberg, 2006). Existing research has revealed a powerful connection between juveniles residing in an adverse environment and their participation in criminal acts (Chung Steinberg, 2006). Sociological theories of deviance state that disorganized neighborhoods have weak social control networks; that weak social control, resulting from isolation among residents and high residential turnover, allows criminal activity to go unmonitored (Megens Weerman, 2010). For example, according to Jane Jacobs, a writer and community activist, who has primary interests in urban decay, identified in her writings that a greater tendency for crime occurred in large publicly accessible areas created by the newer forms of urban planning (Jacobs, 1961). She also pointed out that the new forms of design broke down many of the traditional controls on criminal behavior; and us ed the example of the ability of residents to watch the street and the presence of people using the street both night and day (Jacobs, 1961). In studies of predominantly male adolescent samples, neighborhood adversity has been linked to both minor and serious forms of delinquency, to the presence of gangs, and to a broad range of criminal activities (Chung Steinberg, 2006). Research however, has largely ignored the influence of neighborhood factors on the development of delinquent behavior in girls despite the fact that issues relating to etiology or opportunities for intervention within neighborhoods apply equally often for both girls and boys (Chung Steinberg, 2006). Neighborhoods influence childrens behavior by providing the values that lead them to perceive how to act (Palermo, 2009). Communities in which criminal activities are common tend to establish criminal behavior as acceptable, because tolerance for gang activities varies by community. In neighborhoods in which gangs are respected, gang membership may generate loyalties that increase the likelihood of violence (Chung Steinberg, 2006). Studies have further re vealed that friendships among delinquents seem to involve closer ties as well as greater mutual influence than do friendships among non-delinquents (Palermo, 2009). It is thus fair to suggest that through ties of friendship, neighborhoods have multiplying effects. Conclusion Arrest records indicate that the majority of crime committed in the United States is associated with youths more than any other demographic ( Megens Weerman, 2010). The prevention of delinquency is a complex problem with no simple solutions. However, risk factor analysis offers a way to determine which youth are most likely to become delinquent (Palermo, 2009). The approach also allows practitioners to tailor prevention programs to the unique needs of individual youth and communities. Agreeing with the correlation of social factors to juvenile delinquency, I propose like many others studying in this field, that there is no single path to delinquency and note that the presence of several risk factors often increases a youths chance of offending. However, I do strongly concur with the long history of research that links family dysfunction as a major factor with future criminal offending. In part because parents monitor and provide nurturance to children, it is thought that the loosening of bonds among family members may result in more criminal involvement (Valadas, 2008). Thus, I suggest further studies on the family unit are necessary to gain more understanding on delinquent behavior. Recently researchers and policy makers have regarded juvenile delinquency as one of the worldÊ ¼s most critical social issues. Regardless of the causes, juvenile delinquency carries a high cost to the American system. These costs can be measured in terms of money spent and lost, but more importantly as the moral costs to society.

Thursday, September 19, 2019

European Imperialism Essay -- essays research papers

European imperialism during 1450-1750, began as a plan to gain more riches for the European nations. The Europeans did this for three main reasons, which were for God, Gold, and Glory. The Europeans domination over Latin America, Africa and Asia were made out to be good for the native people of these lands. However, the Europeans were not there to help these geographic areas. They were there to spread their influence and gain riches for themselves and the European nations. The successes and failures of the Europeans and non Europeans would decide their relationship status for as long as they could co-exist. In Latin America, Cortes who was the conqueror of Mexico, and Pizarro the conqueror of Peru and the Incans, would control the ancient Latin America civilizations for many years to come. In order to maintain steady control over the area, the two conquistadores would have to create a faà §ade for the Inca’s, Mayans, and Aztec tribes. This faà §ade, would have to hide the fact that the Europeans had no intentions of providing aid for these natives. The extraction of riches and slaves would have remained a secret, while the Europeans would settle and pretend to help the natives out. Bringing guns, medicine, and other European inventions to the Latin American tribes and trading for more gold and other spices gave a peaceful demeanor to the Europeans. The slave trade involving the Latin Americans would become the hardest thing to justify and later on it would be the cause of man...

Wednesday, September 18, 2019

Iago’s Use of Tone and Simile to Deceive Othello in Shakespeare’s Othello :: Othello Essays

Iago’s Use of Tone and Simile to Deceive Othello in Shakespeare’s Othello The greatest and best villains in literature are those who possess the ability to manipulate others in order to further their own causes. In Othello, Iago has the insight and tact to manipulate the other characters, such as Cassio, Roderigo, Desdemona, and in this case, Othello. The methods by which Iago works the other characters are varied, and one prime example of his cunning ability to manipulate can be seen in Act III.iii.333-450. In this passage Iago utilizes many rhetorical strategies to his advantage; in particular he uses tone and simile. These rhetorical strategies are instrumental in the deception of Othello. Throughout this passage Iago’s tone when he speaks is critical in his effort to make Othello do as planned. This tone is one of innocence and loyalty, and is used effectively to make Othello trust Iago’s statements. Iago appears to be innocent in his reluctance to relate to Othello what he knows about Desdemona and Cassio, as seen on lines 373-380. In this particular passage Iago uses his tone to demonstrate how he did not want to make enemies by telling the truth. Consequently, Othello assumes that Iago is not a part of any scheme and therefore must be telling the truth. The tone of innocence and loyalty to Othello is one of the methods by which Iago successfully manipulates Othello. Not only does Iago utilize the rhetorical strategy of tone, he also employs similes to emphasize points. On lines 403-405, Iago uses multiple similes with the intent of deceiving Othello into thinking that Desdemona and Cassio had a promiscuous relationship. By saying that they were â€Å"as prime as goats† and â€Å"as hot as monkeys†, Iago is almost directly saying that they are having wild sexual relations. Furthermore, by using these similes, Iago helps to confirm Othello’s suspicion of Cassio and Desdemona, which was brought about by Iago in the first place. The use of similes is instrumental in Iago’s manipulation of Othello as seen in this passage.

Tuesday, September 17, 2019

Physics And Engineering In I.T. Power Management Essay

The cost of energy continues to increase with shrinking in corporate budgets and need for more energy input. At times like this, even IT industry is affected and the stakeholders are starting to look for new ways of cutting down the cost as they keep the quality of work high and efficiency maximized. Implementation of a good energy policy in an organization’s premises can lead to reduced costs of ICT infrastructural costs in terms of capital required in setting up servers and cooling systems. If the right energy saving and proper utilization habits are adopted and effective construction and installation ideas implemented in natural air flow optimization and proper heat insulation can lead to less cooling facilities requirements, cutting on costs (Greenguard, 2009). Efforts of energy conservation in IT infrastructure have been initiated through: †¢ Technologies like PoE (Power over internet) and midspans; this is a technology that enables gadgets like phones to receive power together with data through the Ethernet connection. Midspans are stand alone gadgets that are used to interface the Ethernet switch with the power sources for optimized power distribution to the ports as required. †¢ Implementation of Smart energy and lighting technology in huge company premises with many workers using ICT equipments. †¢ Efforts of IEEE-the Institute of Electrical and Electronics Engineers, to set standards for manufacturers of electronic and electrical gadgets (IEEE 802. 3-at) to ensure optimized energy utilization at the design level. †¢ IT technology in energy auditing and virtualization of power management †¢ Use of Integrated circuits (ICs) to control magnetic and pulse width modulators for external power connection in devices. †¢ Use of Power Source Equipment (PSE) and Power Devices (PD) in network classification during powering of new connections to ensure only PoE connections are powered in wireless and telecom devices. Electrical Power With the introduction of Power over Ethernet (PoE), many electronic devices that work in direct connection with computers through Ethernet cables have shifted from use of external power cables to reception of power together with data on the Ethernet connection. The (IEEE) has established some standards (IEEE 802. 3-at) for such technology, contributing to encouraging the manufactures of electrical and electronic products to contribute in efforts of making ICT infrastructure environment friendly, through less energy consumption. This is a strategy which if adopted can lead to very improved efficiency in power delivery in devices’ interconnection. The manufacturers of such devices, for example Texas Instruments’, are manufacturing devices with power capabilities of choosing either to use PoE or switch to standard mode when the option is not available. This is in the effort to become compliant with the IEEE 802. 3-at. Even when PoE is a better option than external cables, a more detailed power saving strategy can be applied through use of midspans, which interface the switches with power sources, injecting power to the ports using way much better technology and hence more efficient. Such consciousness is needed in order to contribute to the overall infrastructure. According to (Conner, 2008), for the manufacturers of the gadgets, the design of PoE can contribute to making of smaller boards and reduce the cost of inputs on large scale. The technology shift there in the physics of electronic gadgets is the replacement of impedance power reduction through dissipation with the magnetic and switching methods in pulse width modulators, controlled through ICs. In efforts to increase power efficiency, the cost of production is also bound to reduce in the long run. The application of PSEs and PDs in network in power control centers gives an option to do power budgets and determine the proper management strategies to be applied. These are such refined levels of control that give the way to streamline and generally control power use. With the current state of globalization in online business, the ICT infrastructure has grown to very complex networks, especially with emergent of mobile devices. Power systems for these networks are as huge as the extents of the networks while management is done manually at physical points of contact. The samples provided in the cases of Highmark and the University of Minnesota (Greenguard, 2009) form a small part of the global business ICT infrastructure that interact with the environment. Educating people/employees A huge effort should go to changing the habits of power use in a working environment. The employees can too contribute to the efforts of a greener ICT infrastructure by ensuring proper use of power. Switching off devices when not in use can help accumulate huge power savings with time. This is not a common thing in most IT departments and will take the initiative of the management to organist fro training of the power users on good use of energy sources. When organization becomes too huge with thousands of employees, energy efficiency becomes a major issue. Such a high number of users of the infrastructure can accumulate a high energy demand and proper management for cost effective and sustainable operation. An example of such a firm is the Highmark with 11000 employees. Energy Computations and Software Virtualization Right from the Physics hardware, the availability of interfacing in ports control to enable remote power on and power off (Ronen, 2009) in PoE makes complex networks manageable. In the Highmark case the Company strategized on extra careful management method on using software technology like energy auditing tools and virtualization as well as new technology in smart energy and lighting systems (Greenguard, 2009). According to the report, there has been increase in need for organizations to use power consuming ICT infrastructure with new technologies to do business as compared to the traditional methods. This has led to ratings of about â€Å"61 billion kilowatt-hours in 2006† by data centers (Greenguard, 2009). The figures could even increase with more ICT use, alarming the corporate to strategize on conservation and efficiency. Owing to this, there have been numerous instances of application of IT solution in power management. Highmark installed a system for collecting rain water and using it in a datacenter cooling system and virtualized the servers to monitor PC usage by employees. This strategy helped adopt the method of remote powering down of equipment not in use, to minimize wastage. The company consulted with IBM to do computations of server spacing for maximum utilization of cooling systems. It appears clearly that many organizations have massive equipments powered up even when not in use because of poor management policy. From these results, it is important to carry each of these computation and software analysis methods with weigh while considering efforts to manage such massive data infrastructures. In many cases, the companies rely on employees to be reliable in implementing the energy conservation policies but even that cannot be enough. If software methods are used to monitor use of powered resources and power them down remotely, a great deal of energy could be saved. A perfect example here is the IT organization of the University of Minnesota which could â€Å"switch off about 25,000 devices each night† (Greenguard, 2009). Conclusion The IT infrastructure comprises of billions of gadgets that use electrical power to operate and network equipment to keep them connected. Power consumption is therefore starts from a single device’s design and connection to the system and spans to the networking level. The physical electronic power consumption can be managed and through standardization methods such as those by IEEE. It is at such low levels that interaction with the environment can be analyzed and energy consumption optimized. The physical arrangement of power consuming data facilities is also of significance importance as clogging them closely together reduces the ability of natural air flow to take care of cooling done by electrical motors in fans. The relationship between IT and these physical sciences is so direct when it comes to practical application fields. The application of software power computation, management and control also helps ICT fit into the practical idea of conservation and greener infrastructure. From the cases analyzed, there is enough evidence that application of technology from the physics and engineering of devices and systems, software tools and ICT infrastructure can be managed in away that can lead to more environment friendly use. References Conner, M. (2008). PoE for high-powered applications. Electronics Weekly, (2263), 18 Retrieved from: http://search. ebscohost. com/login. aspx? direct=true&db=cph&AN=36122010&loginpage=Login. asp&site=ehost-live Sani Ronen, (2009) Midspans for next-gen PoE,An inside look at technologies and standards, Tech update, Available: www. networkworld. com Samuel Greengard, (2009), Building an Energy-Efficient IT Infrastructure, Baseline Magazine Available: http://www. baselinemag. com

Monday, September 16, 2019

Leadership Styles Research Project Essay

I would like to give special acknowledgement to XXX director, XXX for his consistent support and motivation. I am grateful to XXX, Associate professor in XXXX , for his technical expertise, advice and excellent guidance. He not only gave my project a scrupulous critical reading, but added many examples and ideas to improve it. 2 I am grateful to XXX (Sr Hr executive and whole staff members of XXX co for providing me an opportunity to complete my project under their guidance. I am highly indebted to them for the same. Teamwork is essential for competing in today’s global arena, where individual perfection is not as desirable as a high level of collective performance. In knowledge based enterprises, teams are the norm rather than the exception. Team leadership plays a critical role in fostering commitment, accountability, and team success. The Team leader must ensure that the right mix and level of skills are resident on the team. They are also responsible for effectively managing 5 relationships outside the team, overcoming obstacles to success, and creating leadership opportunities for others. Good leaders are made not born. If you have the desire and willpower, you can become an effective leader. Good leaders develop through a never ending process of self-study, education, training, and experience. To inspire your workers into higher levels of teamwork, there are certain things you must be, know, and, do. These do not come naturally, but are acquired through continual work and study. Good leaders are continually working and studying to improve their leadership skills; they are NOT resting on their laurels. Before we get started, lets define leadership. Leadership is a process by which a person influences others to accomplish an objective and directs the organization in a way that makes it more cohesive and coherent. Leaders carry out this process by applying their leadership attributes, such as beliefs, values, ethics, character, knowledge, and skills. Although your position as a manager, supervisor, lead, etc. ives you the authority to accomplish certain tasks and objectives in the organization, this p o w e r does not make you a leader†¦ Leadership differs in that it makes the followers w a n t to achieve high goals, rather than simply. All teams must shape their own common purpose, goals and approach. While a leader must be a working member of the team who contributes, she also stands apart from the team by virtue of her position as leader. A team expects their leader to use that perspective and distance to help them clarify and commit to their mission, goals, and approach. Do not be afraid to get your hands dirty (lead by example), but always remember what you are paid to do (get the job done and grow your employees). The term â€Å"styles† has become more prominent in popular culture over the last decades, but its origins lie in psychological research on learning and personality. The original concept of style is that we all have preferences for the WAY we do things — think, relate to others, interact, learn. Kurt Lewin, in the 1930’s identified three major styles — autocratic, democratic, and laissez faire, while Rensis Likert defined Exploitive 6 If you have the time and want to gain more commitment and motivation from your employees, then you should use the participative style. Participative (democratic) This type of style involves the leader including one or more employees in on the decision making process (determining what to do and how to do it). However, the leader maintains the final decision making authority. Using this style is not a sign of weakness, rather it is a sign of strength that your employees will respect. This is normally used when you have part of the information, and your employees have other parts. Note that a leader is not expected to know everything — this is why you employ knowledgeable and skillful employees. Using this style is of mutual benefit — it allows them to become part of the team and allows you to make better decisions. Delegative (free reign) In this style, the leader allows the employees to make the decision. However, the leader is still responsible for the decisions that are made. This is used when employees are able to analyze the situation and determine what needs to be done and how to do it. You cannot do everything! You must set priorities and delegate certain tasks. This is not a style to use so that you can blame others when things go wrong, rather this is a style to be used when you have the full trust and confidence in the people below you. Do not be afraid to use it, however, use it wisely! Forces A good leader uses all three styles, depending on what forces are involved between the followers, the leader, and the situation. Some examples include: 13 o Using an authoritarian style on a new employee who is just learning the job. The leader is competent and a good coach. The employee is motivated to learn a new skill. The situation is a new environment for the employee. Using a participative style with a team of workers who know their job. The leader knows the problem, but does not have all the information. The employees know their jobs and want to become part of the team. o Using a delegative style with a worker who knows more about the job than you. You cannot do everything! The employee needs to take ownership of her job. Also, the situation might call for you to be at other places, doing other things. o Using all three: Telling your employees that a procedure is not working correctly and a new one must be established (authoritarian). Asking for their ideas and input on creating a new procedure (participative). Delegating tasks in order to implement the new procedure (delegative). o Forces that influence the style to be used included: task. o Internal conflicts. o Stress levels Type of task. Is it structured, unstructured, complicated, or simple? o Laws or established procedures such as OSHA or training plans. Positive and Negative Approaches There is a difference in ways leaders approach their employee. Positive leaders use rewards, such as education, independence, etc. to motivate employees. While negative employees emphasize penalties. While the negative approach has a place in a leader’s repertoire of tools, it must be used carefully due to its high cost on the human spirit. Negative leaders act domineering and superior with people. They believe the only way to get things done is through penalties, such as loss of job, days off without pay, reprimand employees in front of others, etc. They believe their authority is increased by freighting everyone into higher lever of productivity. Yet what always happens when this approach is used wrongly is that morale falls; which of course leads to lower productivity. Also note that most leaders do not strictly use one or another, but are somewhere on a continuum ranging from extremely positive to extremely negative. People who continuously work out of the negative are bosses while those who primarily work out of the positive are considered real leaders. 14 Use of Consideration and Structure Two other approaches that leaders use are: Consideration (employee orientation) – Leaders are concerned about the human needs of their employees. They build teamwork, help employees with their problems, and provide psychological support. Structure (task orientation) – Leaders believe that they get results by consistently keeping people busy and urging them to produce. There is evidence that leaders who are considerate in their leadership style are higher performers and are more satisfied with their job. Also notice that consideration and structure are independent of each other, thus they should not be viewed on opposite ends of a continuum. For example, a leader who becomes more considerate, does not necessarily mean that she has become less structured. Paternalism Paternalism has at times been equated with leadership styles. Yet most definitions of leadership normally state or imply that one of the actions within leadership is that of influencing. Leadership is influencing people — by providing purpose, direction, and motivation — while operating to accomplish the mission and improving the organization. † The Army further goes on by defining ‘influence’ as a: means of getting people to do what you want them to do. It is the means or method to achieve two ends: operating and improving. But there? s more to influencing than simply passing along orders. The example you set is just as important as the words you speak. And you set an example — good or bad — with every action you take and word you utter, on or off duty. Through your words and example, you must communicate purpose, direction, and motivation. While ‘paternalism’ is defined as (Webster): a system under which an authority undertakes to supply needs or regulate conduct of those under its control in matters affecting them as individuals as well as in their relationships to authority and to each other. o Thus paternalism supplies needs for those under its protection or control, while leadership gets things done. The first is directed inwards, while the. Latter is directed outwards. 15 It seems that some picture paternalistic behavior as almost a barbaric way of getting things accomplished. Yet, leadership is all about getting things done for the organization. And in some situations, a paternalistic style of decision-making might be required; indeed, in some cultures and individuals, it may also be expected by not only those in charge, but also the followers. That is what makes leadership styles quite interesting — they basically run along the same continuum as Hofstede’s PDI, ranging from paternalistic to consultive styles of decision making. This allows a wide range of individual behaviors to be dealt with, ranging from beginners to peak performers. In addition, it accounts for the fact that not everyone is the same. However, when paternalistic or autocratic styles are relied upon too much and the employees are ready and/or willing to react to a more consultive type of leadership style, then it normally becomes quite damaging to the performance of the organization. There are a number of different approaches, or ‘styles’ to leadership and management that are based on different assumptions and theories. The style that individuals use will be based on a combination of their beliefs, values and preferences, as well as the organizational culture and norms which will encourage some styles and discourage others. †¢ Charismatic Leadership †¢ Participative Leadership †¢ Situational Leadership †¢ Transactional Leadership †¢ Transformational Leadership †¢ The Quiet Leader †¢ Servant Leadership Additional research †¢ The Managerial Grid: Blake and Mouton’s people-task balance. †¢ Lewin’s leadership styles: Three original styles. †¢ Likert’s leadership styles: from autocratic to participative. †¢ Six Emotional Leadership Styles: from ‘Mr. Emotional Intelligence’, Daniel Goleman and friends. †¢ Post-hoc Management 16 Charismatic Leadership Charismatic Leadership is defined by Max Weber as â€Å"resting on devotion to the exceptional sanctity, heroism or exemplary character of an individual person, and of the normative patterns or order revealed or ordained by him†. He defines Charisma as â€Å"a certain quality of an individual personality, by virtue of which he is set apart from ordinary men and treated as endowed with supernatural, superhuman, or at least specifically exceptional powers or qualities. These are such as are not accessible to the ordinary person, but are regarded as of divine origin or as exemplary, and on the basis of them the individual concerned is treated as a leader (†¦ ). How the quality in question would be ultimately jud ged from an ethical, aesthetic, or other such point of view is naturally indifferent for the purpose of definition†. Charismatic people have a remarkable ability to distill complex ideas into simple messages (â€Å"I have a dream†); they communicate by using symbols, analogies, metaphors and stories. Furthermore they relish risk and feel empty without it, they are great optimists, they are rebels who fight convention, and they may seem idiosyncratic. Charismatic leaders are pictured as organizational heroes or magic leaders who have the social power basis to orchestrate turnarounds, launch new enterprises, inspire organizational renewal, and obtain extraordinary performance from organizational members. These leaders inspire trust, faith and belief in themselves. Of course none of this is a guarantee that the mission will be correct, ethical, or successful. Origin of the Charismatic Leadership model.

Sunday, September 15, 2019

Managing Financial Resources and Decisions Essay

1. Equity capital (owners capital) for Blue Orange Solutions Equity is an external source of funds available to business and these are generated from the shareholders/investors. This is considered as the safest source of start-up funds. In case of a private limited company, the amounts are invested by the shareholders who are known to each other. But in case of a public limited company, the amounts can be invested by general public or institutional investors. – The funding is committed to business as the investors can only realise their investment if the business is doing well, e.g. through stock market flotation or a sale to new investors. – No financing costs involved as the business will not have to keep up with costs of servicing bank loans or debt finance, allowing to use the capital for business activities. – Outside investors can bring valuable skills, contacts and experience to your business. They can also assist with strategy and key decision making. â⠂¬â€œ Investors are often prepared to provide follow-up funding as the business grows. The principal disadvantages of equity finance are: – Raising equity finance is demanding, costly and time consuming, and may take management focus away from the core business activities. – Potential investors will seek comprehensive background information on the business. – Depending on the investor, original investors will lose a certain amount of power to make management decisions. – There can be legal and regulatory issues to comply with when raising finance, e.g. when promoting investments. 2. Bank loan for Blue Orange Solutions A debt financing obligation issued by a bank or similar financial institution to a company or individual that holds legal claim to the borrower’s assets above all other debt obligations. The loan is considered senior to all other claims against the borrower, which means that in the event of a bankruptcy the bank loan is the first to be repaid, before all other interested parties receive repayment. Bank loans are usually secured via a lien against the assets of the borrower. At the time the loan is made, there typically tend to be no other existing liens on the borrower’s assets, or at least not on any of the assets being secured by the bank loan. Advantages: – A bank loan can be used in a number of ways; money can be borrowed for many large-ticket items – A bank loan can be secured in a specific time frame Disadvantages: – Some loans carry a prepayment penalty, high penalty rates, other finance charges – There are a number of limitations on the transaction – Borrowing too much money can lead to decreased cash flow and payments can even overtake income in some cases. 3. Bank overdraft for Blue Orange Solutions An overdraft is a temporary facility added to business’s bank accounts which allows the account to be overdrawn by a certain amount. The business is charged interest based on the amount overdrawn and the length of time overdrawn, and are usually charged a regular fee for the use of the facility. An overdraft is particularly useful when business has regular sales and purchases and is to finance temporary cash shortages. They are a good backup to ensure business can pay its bills. An overdraft is not supposed to be a permanent source of finance. Advantages of Overdrafts Flexible – An overdraft is available when business needs it and costs very small amount of charges. It allows business to make essential payments in case of cash shortages. Quick – Overdrafts are easy and quick to arrange, providing a good cash flow backup with the minimum of fuss. Disadvantages of Overdrafts Cost – Overdrafts carry interest and fees; often at much higher rates than loans. The business face large charges if you go over the agreed overdraft limit. Recall – Unless specified in the terms and conditions, the bank can recall the entire overdraft at any time. Security – Overdrafts may need to be secured against business assets, which put them at risk if payments cannot be made. Business Angels for Blue Orange Solutions Business angels are wealthy individuals who invest in start-up and growth businesses in return for equity in the company, they are also called informal investors. The investment can involve both time and money, depending upon the investor. Business angels can operate independently, but many work as a syndicate (a group of individuals or organizations combined to promote some common interest). Business angels typically invest  £500,000 in a company. On average, business angels in the UK invest  £42,000, and each investor makes around six investments. Where larger amounts are invested in a business, this usually takes place through a syndicate of angels organised through the entrepreneur’s personal contacts or a business angel network. As well as cash, business angels can offer years of experience in the business world, not to mention useful contacts to help you grow your business, which can add real value to your company. Although some prefer to become a sleeping partner, others will get actively involved in business, offering help with anything from writing a marketing plan to taking the company through a flotation on the stock market. Indeed, the BBAA / NESTA report recommends that angels invest in their area of expertise and stay connected with the business, preferably at board level, as a way of improving the success rate of angel deals. Venture Capital for Blue Orange Solutions A venture capital firm is a group of investors who gain income from wealthy people who want to grow their wealth. They take this money and use it to invest in more risky businesses than a traditional bank is willing to take on. Because the investments are risky, the venture capital firm typically expects a higher return on the businesses it is investing in than other types of lenders would. The interest rate or higher cost of capital is worth it to the business, however, because the business would otherwise not receive the financing needed. Venture capital firms work under a specific investment profile. The investment profile is a document that outlines the types of businesses the firm is willing to invest in. By targeting their investments to certain types of businesses only, the venture capital firm can learn the ropes of a particular industry, and thus be better prepared to decide which new or expanding businesses are the best investments. And venture capital firms do not just provide start up financing. They can also provide expansion financing for promising businesses. When individual investors entrust their money to a venture capital firm, the firm puts the money in a fund. This fund is then invested in several companies, with the expectation that the companies will be able to repay the money in around three to seven years.