Thursday, November 28, 2019

Asthma Essays - Respiratory Therapy, Asthma, Free Essays

Asthma Essays - Respiratory Therapy, Asthma, Free Essays Asthma subject = Heath title = Asthma Asthma What is Asthma ? Asthma is a disorder that affects 20% of Australians in their childhood. It causes airways to narrow making it difficult to breathe. Symptoms may include loss of breathe in cold weather, wheezing and whistling. It may occur periodically in sudden sharp attacks. When an attack occurs - The muscles around the wind pipe tighten shrinking the airways. The wind pipe lining then swells (picture) and a mucus called phlegm develops causing the cough to intensify and slightly more painful. What are the Causes and Triggers for asthma ? Attacks of Asthma occur due to a blockage in the bronchial tubes. This blockage results from a spasm that narrows the windpipe causing breathing difficulty for the sufferer. Asthma Triggers are things that make Asthma worse. Usual triggers are - Respiratory infections eg. Colds, flu, sore throats and bronchitis Allergic reactions sometimes cause Asthma eg. Pollen, foods, dust, animal fur or some seed. Air irritants (similar to Allergic reactions) eg. Cigarette smoke, gases or dust. Excessive/strenuous exercise can cause an Asthma attack. Emotional Stress can also trigger an Asthma attack. Symptoms of Asthma Symptoms include wheezing from the chest or a slight whistling is heard when inhaling. It's even louder when exhaling. Tightness of the chest, lung and lung area are closely associated with Asthma. Treatment for asthma There is no cure for Asthma but there are steps that doctors take to help relieve the symptoms of Asthma. As a first step doctors try to remove or get the patient to avoid Asthma triggers such as "animal dander" (eg. Fur or hairs). These are very likely to trigger an Asthma attack. Places where animals dwell are advised to be kept clear of for a sufferer. Since it is impossible to remove or avoid all triggers there are medications that can be taken. Such as - - Anti - Inflammatory Drugs : these reduce swelling of the windpipe and it's lining. Oral Steroids - prednisone and prednisolone quickly reduce inflammation during an attack. Inhaled medicines - such as cromoyln sodium and inhaled corticosteroids keep inflammation from flaring up. - Bronchodilators : relax the muscles which have tightened around the windpipe. Adrenergic bronchodilators ("Beta 2 agonists") provide temporary relief but do not treat inflammation. These are available as an Inhaler or a tablet form. Unfortunately the tablets are slower and have a few side affects. Theophylline is available in a liquid, capsule or tablet form. This drug has a long duration of action making it a very good soother for "night time" Asthma. Ways of preventing asthma There are no ways of preventing Asthma because it is usually genetic, allergically related or following a dose of bronchitis, but there are ways to prevent it from flaring up and turning into an attack. A sufferer can be very careful about his or hers diet because the diet can greatly affect the Asthma. Due to allergic reactions etc. Staying away from pollens and animal fur settles down Asthma. The allergic reactions are the highest causes of Asthma. Make sure you always have medication with you such as Intal and Becotide. These preventative medicines will stop an attack occurring. Summery For an Asthma sufferer breathing can sometimes be a great difficulty due to the fact that at any time their wind pipe can shrink due to inflammation, making it very hard to breathe. But with the right medication eg. Inhalers and Theophylline their life can be much easier. If they also stay away from triggers such as pollen, fur and cigarette smoke the air ways may not be so vulnerable. Even if you don't have Asthma you should keep an eye out for the symptoms which are - chest and lung tightness, wheezing and loss of breath especially in cold weather.

Sunday, November 24, 2019

buy custom Disaster Management essay

buy custom Disaster Management essay Disaster usually occurs at an unexpected time making it hard for the affected people, country, or region to continue with normal operations (Coppola, 2011). There are various ways of countering the effect of disasters. Some prevent the happening of such events, while some either reduce the impact caused by disasters or help in ensuring that the affected achieve the initial state of their life prior to the disaster (Diane Meyers, 2006). The methods used in disaster management include mitigation, prevention, preparedness, response, and recovery (Gibbons, 2007). Disaster management program encompass combination of different disaster management methods (Hakkinen, Gilbert, Mohapatra, 2009). However, these methods differ in usefulness of fighting the impacts of disaster. This makes it hard to decide the priority method. The success of disaster management program depends on the method utilized. This is because the methods of disaster management yield different results in addressing occurrence of uncertain events. For example, prevention of disaster by not committing things that will possibly lead to its occurrence, yields different results when compared to other methods such as preparedness (Krishna, 2006). This is because, disaster management methods have different times in which, each one of them is applicable. In the United States, the Department of Homeland Security and Disaster Management has the responsibility of handling and managing disasters properly. In the event of a natural disaster, a terrorist attack, or other major tragedy, the Department of Homeland Security provides coordinated, effective, and comprehensive response and recovery assistance (Preparedness, Response, and Recovery, 2011). The department has a responsibility of ensuring that emergency response professionals are always ready for any kind of situation (Preparedness, Response, and Recovery, 2011). The Department of Homeland Security and Disaster Management employs different methods of managing disasters. For instance, in achieving preparedness, the department offers online disaster preparedness seminars to families, and provides online preparedness videos for citizens to watch. In addition, the department has citizen corps located in towns and cities to ensure quick response in case of a disaster. The department also has several emergency call centers, which offer rapid response in cases of emergencies (Preparedness, Response, and Recovery, 2011). Due to presence of different methods of disaster management, it becomes hard to decide on the most efficient method of managing this challenge, and the appropriate time where one of the methods should be preferred over the other. Therefore, this research seeks to analyze the suitability of different methods utilized in disaster management and the suitable application time in disaster management. The suitability of a disaster management method used in preparations for an emergency, responding to an emergency, and recovering from a disaster, depends on the time taken to implement the method, and the efficiency of the resources used. The Research Hypothesis The expectations of this research are; to assist in improving efficiency in homeland security, achieve enhanced speed in the recovery process, and ensure enough resources for dealing with tragedies are provided. Efficiency in the security department relates to the activities done to protect the country from disasters. In the management of disasters, identification of a suitable method is paramount in handling the matter at hand. This entails all activities and programs from different disaster management programs, which are useful in choosing only activities that, improve operation efficiency. Resources needed in combating the occurrence of a disaster could be made available, if the Homeland Security department learns the importance of being prepared to counter a disaster. Preparedness is a useful method, which helps in increasing the recovery speed in case of the occurrence of an emergency. Enhanced preparedness strategy can help build trust between the community and the department ( Penuel, Statler, Golson, 2010). Moreover, an act of rejuvenating the expectations of life of the affected is vital to hopes for life. Recovery process entails transformation of life from an old one to a new one. As a wise strategy, homeland security needs to be in a position to reflect the humanity in them to reality, which will see many have hopes after the disaster. Based on these expectations, the hypothesis of the study will be, the Department of Homeland Security and Disaster Management can achieve efficiency through providing enough resources for dealing with tragedies, and increasing the recovery speed after a disaster. Therefore, the null and alternate hypothesis will be indicated as shown below: Research Variables Three research variables have been identified, which will assist in testing the hypothesis outlined above. They include, time taken to implement a given disaster management method, resources used when dealing with tragedies, and the efficiency of the disaster management method used by Homeland Security department. According Rahman (2001), the efficiency and effectiveness of a disaster management method depends on the availability of resources necessary for preparation, response, and recovery from a disaster. The local government and other stakeholders, who are concerned with the security of citizens,have the responsibility of providing disaster preparedness systems. Such systems include information and communication systems, expert analysis systems, and space technologies. The functions of these systems are; to make observations, monitor, make analysis, disseminate warnings, collect data, network, and communicate information about possible occurrence of disasters. Information is a very important resource in disaster preparation. Effective disaster management depends on the informed participation of all stakeholders (Rahman, 2001). Widespread of information concerning disaster preparedness can play a vital role in reducing the magnitude of a disaster. Therefore, information about disaster preparedness should be availed to all stakeholders in a consistent manner. The role of disaster managers is to conduct research about potential disasters, make national plans on how to prepare for such disasters, monitor the potential hazards, assess the likelihood of occurrence of the disaster, and assess the risk levels of different disasters. These measures would ensure that all stakeholders have all the information necessary for disaster preparation. The role of space technology as an information resource for disaster preparedness is to back-up the information and communication systems (Rahman, 2001). During disasters, systems located on the ground infrastructures are likely to be affected, hence cutting off communication between the stakeholders, a situation that can cause risk levels of a disaster to increase. Space technology is usually unaffected by such disasters. Therefore, it ensures undisrupted communication after occurrence of a disaster. When a disaster occurs, it is important that the necessary resources used in responding to disaster are made available. These resources should always be there to enhance disaster response. The main goal of having these resources is to ensure speedier search and rescue of victims, speedier access to trapped victims, speedier stabilization of the emergency and speedier transportation of injured victims to safety (Rahman, 2001). Such resources include emergency rescuers, medical personnel, ambulances, aircrafts and helicopters, non-human search and rescue systems such as robots, airlift bags, and heavy equipments such as concrete saw, jackhammers, and hydraulic rescue tools such as spreader cutters, among others. Resources important in recovery from disaster include emergency power supply, medical supplies, food and clean water supplies, and sanitation and waste management resources. These resources are core in restoring the lives of the victims back to normal; if not to the way they were before the occurrence of a disaster. The aforementioned resources should be in a position to provide preparedness, response, or recovery assistance in an efficient manner. Stakeholders can ensure efficiency of the resources used in disaster management by ensuring that they are available at all times, and they are functional. For instance, equipment and fuel-powered machineries used in disaster response should be serviced on regular basis. This would ensure that they are always ready to function whenever a disaster occurs. The states department of security should have stand-by ambulances, aircrafts, and medical personnel who can provide emergency relief services, while others continue with routine services. Time is also of essence in ensuring efficiency of disaster management methods. Stakeholders involved in implementing one or more methods of disaster management should ensure that time taken to implement a given method is kept at minimum (Disaster Management: Strategy and Coordination, 2010). For instance, information concerning disaster preparedness should be disseminated to the stakeholders as soon as such information becomes available. This can be achieved by employing effective methods of communication. Currently, mobile devices and the internet can be used to pass information on disaster preparedness very quickly. A research study conducted by the International Federation of Red Cross and Red Crescent Societies in 2009/10 concluded that, post-emergency effects of catastrophes depend on the time taken to respond to disasters and in the recovery process (Disaster Management: Strategy and Coordination, 2010). Quick response to a disaster assists in providing quick rescue operations to victims hence reducing the number of casualties. Many researches on disaster management indicate that many casualties, which occur immediately after a disaster are because of lack of rapid responses to the situation. Lack of immediate commencement of recovery efforts after a disaster can also contribute to more casualties because of hunger, poor sanitation, lack of water, or lack of access to medical services. Therefore, to ensure efficiency of any disaster management method, disaster management experts should observe time discipline. Research Findings The research findings indicate that the Department Homeland Security and Disaster Management have put in place a number of control measures to ensure efficiency of its activities. The department has an established disaster act: the Stafford Disaster Relief and Emergency Assistance Act, which was enacted in 1988 and later amended in 2000 (Moss, Schellhamer, Berman, 2009). The Department of Homeland security carries out the provisions of the act through it agency known as FEMA (Federal Emergency Management Agency). The act provides that the federal government should provide 75% fundingg for acquisition of disaster management resources, while the local government should provide 25% funding for the same (Moss, Schellhamer, Berman, 2009). The Stafford Act also provides that victims of natural disasters and terrorist acts should be provided with immediate assistance. This include; immediate removal of debris from the disaster site to aid in rescuing trapped victims, provision of medical assistance to injured victims in public healthcare facilities (unless where an individual chooses otherwise), use of federal and state governments funds in repair and restoration of infrastructures and personal properties such as houses destroyed by the disaster. In addition, the act provides that mitigation funds should be provided to disaster prone areas to aid in implementing disaster control measures (Moss, Schellhamer, Berman, 2009). A research study conducted by Garnett and Moore (2010) reveals that employment of sound strategies for restoring health and livelihoods of victims of catastrophes ensures efficiency in disaster management methods. Garnett and Moore evaluated the approaches used in providing recovery efforts in six different disasters in United States. They found out that, where victims of those disasters were provided with immediate relief, in terms of medical care, food, clean water, and sanitation systems, the number of post-emergency casualties was minimal (Garnett Moore, 2010). In such areas, victims of disasters were found to recovery quickly from the effects of the disasters, and they were able to reconstruct their lives with ease, as compared to victims of disaster areas who were not provided with immediate recovery assistance after occurrence of a disaster. From their research, Garnett and Moore suggested three approaches to efficient disaster recovery: incorporation of recovery goals while preparing for a disaster, expanding the knowledge base of the stakeholders on disaster recovery strategies, and developing measurable outcomes in disaster recovery plan (Garnett Moore, 2010). Inclusion of the three strategies would ensure efficiency of disaster management methods used in disaster recovery process. A research study conducted in 2008 by Goodwill reveals that the department of Homeland Security has improved its disaster response capacity since 1992: after occurrence of Hurricane Andrew, one of the largest natural disasters in records. These improvements include; increased capacity of local governments and NGOs to respond to disasters, inclusion of other twenty six agencies, apart from FEMA, in-coordinating disaster response, provision of direct assistance to America citizens in disaster-hit areas, and increased financial assistance to affected areas (Goodwill, 2008). Goodwill points out that these improvements have assisted in achievement of efficiency in disaster response to affected citizens in the United States and in other parts of the world. In terms of preparedness, Homeland Security has continuously provided resources used in monitoring disasters, disseminating information concerning likelihood of occurrence of disasters, and maintaining disaster prone-areas to reduce the likelihood of disaster occurrence. For instance, FEMA operates an Incident Command System, which allows flexible communication of information concerning disasters among the stakeholders (Birkland, 2008). FEMA has also developed an international response system: TOPOFF, to enable United States interact with first responders, federal agencies, non-governmental organizations and its international partners while preparing for perceived terrorist attacks (Goodwill, 2008). Development of TOPOFF started in 2000, with the first version of the system: TOPOFF being developed in 2000 and the current version of the system: TOPOFF IV being developed in 2007. FEMA ensures that its disaster management systems are up to date with technological advancements, for them to remain efficient (Birkland, 2008). Conclusion From the research findings, it is clear that the Department of Homeland Security is determined to achieve efficiency in disaster management. Through its security agency: FEMA, Homeland Security ensures that all the necessary resources for disaster preparedness are availed to local governments and other stakeholders. Availability of these resources allows the stakeholders to prepare adequately for emergencies. The department has put in place technologically advanced methods of communicating disaster related information to all the stakeholders. In addition, the Homeland Security department ensures speedy response to disasters and immediate commencement of recovery efforts in disaster-hit areas. The department has provided the necessary resources, which ensures that victims of emergencies are rescued quickly, and recovery assistance is provided to survivors of catastrophes as soon as a disaster occurs. Through the Stafford Act, Homeland Security has managed to ensure availability of fun ds, which are utilized to acquire the necessary resources for disaster preparation, response, and recovery. Based on the research findings, it is clear that the efficiency of disaster management method depends on the availability of resources, the efficiency of the resources, and the time taken to implement a disaster management method. Therefore, we fail to accept the alternative hypothesis, and accept the null hypothesis, which states that, providing enough disaster management resources and enhancing disaster recovery time will help the Department of Homeland Security and Disaster Management to achieve efficiency. Buy custom Disaster Management essay

Thursday, November 21, 2019

Business and Project Management Coursework Example | Topics and Well Written Essays - 2000 words

Business and Project Management - Coursework Example In alignment to the intention of the brand, the statistical report regarding the market share of motorcycle manufacturers in the UK also appear in favour [4]. A close evaluation of the brands’ performance reports revealed about its positive growth figures in the present market scenario. If seen from the statistical perspective, one can say that this brand has successfully attained a growth figure of 12 per cent in terms of product and service sale by the end of 2012. Justification regarding this aspect can be provided depending on the fact that each of these growth reports was released by the ‘Society of Motor Manufacturers and Traders’. In an associate manner the sales figure attained by Vauxhall Motors during the period of 2013, hiked the previous year sales figure by 1.93 per cent. The financial year (2013) of this brand was accompanied with the release of multiple new models of commercial cars and passenger vans [6]. However, despite the slight drop in the sales figures of 2014 (11.14%), still Vauxhall Motors succeeded in turning the UK as its fourth largest profitable market. In addition, implementation of innovation within the provision of financial and comprehensive customer services have further helped in terms of boosting up the sales figures of 2014. Taking reference of all these aspects, one can easily say that Vauxhall Motors will have a profitable business opportunity in context to plunging its feet in the heavy two wheeler segment [6]. However, within the forwarding initiative Vauxhall Motors will have to make significant amount of investments to determine its potential and expertise of penetrating the over flooded two wheeler manufacturing and distribution segment within the UK. Likewise, the brand will also have to strategise and formulate effective marketing and customer convincement techniques in order to turn its heavy motorcycle manufacturing initiative into a success [6]. In addition, one

Wednesday, November 20, 2019

Reflections on medievil and ancient texts Essay Example | Topics and Well Written Essays - 500 words

Reflections on medievil and ancient texts - Essay Example managed to draw on the generosity of the twin rivers Tigris and Euphrates, enabling them to come up with proper cultivation of the fertile land as well as systematic irrigation even during times of drought. Based on these accounts, it is not so much of a surprise that Gilgamesh, a great ruler in his own way, could lead such people who ought to earn recognition for a nearly remarkable living characterized primarily by their intelligent utilization of vast water sources besides literary inclinations and fascinating inventions of unique writing form, temples, cities, and academic institutions. Through extensive studies, archeological evidences do indicate that Sumerians possessed rich culture of literary scholars who had written epics, proverbs, poetry, history, and fables from which the prominent details of Gilgamesh is claimed to have concretized into an entity with flesh and form. In the combined endeavor of both the fields of history and literature. Gilgamesh is widely known as the king of Uruk who made possible the founding of the great city wall. Standing in the tangible realms of Mesopotamia, the six-mile wall in its wide presence across civilizations makes no unsolved mystery thou gh Gilgamesh, its acknowledged creator, is assumed a demigod. Analyzing such perspective with the aid of liberal approach used in current times, I think Gilgamesh may have existed in an ordinary human form or a human character whose interesting traits were more than adequate for a priest-king. For this ground, the Sumerians could have exaggerated more in their reverence and appreciation to the extent of treating Gilgamesh as a mythically constructed figure breathed into life by oral tradition. Accounting sufficiently for the Sumerian’s great city wall, by practical knowledge, we realize the fact that even if there were highly skilled workers who built the structure in all magnificence, it may not be denied that someone with genius potentials had facilitated them in the building

Sunday, November 17, 2019

The Legal and Regulatory Environment of Business Essay

The Legal and Regulatory Environment of Business - Essay Example This is mainly for commercial businesses. As for the other smaller businesses and entrepreneurs, there are other legal proceedings that involve guidelines on how to set up their businesses and divide up the profits and losses and even how to share them. This is carried out in legal jargon such as sole proprietorship, partnership, limited liability among others. When it comes to business regulations, there are regulations in issues to do with environment and consumers, investor protection, antitrust and monopoly as well as land use and property control. All these offer positive advice and guidelines to the businessmen, consumers and investors and ensure that they are all living in coexistence and there is mutual benefit in the end. These laws and regulations are manned in different codes as well as the constitution. An example is the Uniform Commercial Code, Sarbanes-Oxley Act, and The United Nations Convention on Contracts for the International Sale of Goods and the Constitution of the United States among others. All these should be followed to the letter by all concerned

Friday, November 15, 2019

Competitive Analysis For Dell Corporation

Competitive Analysis For Dell Corporation Michael Dell established Dell Corporation in 1984 in Austin, Texas, with an exceptional idea of selling computers having direct linkage to consumers; Dell is able to meet the computing needs of their customers effectively and efficiently. Now every day Dell connects with more than 5.4 million customers, through several ways like phone, in person, on Dell.com and most importantly through social networking websites, All over the world Dells almost 96,000 workers are dedicated to making technological work effective for communities and customers. It is one of the motive of Dell is make available the technology more easy to get to people and other organizations all over the world. Dells every day shipment is more than 110,000 computer systems to customers in almost 180 countries. Dells Customers to achieve the more Dell is united, to meet the needs of big corporations, public oriented institutions (healthcare centres, educational institution and government ets), SMEs, and the most important Dells customers. Dell have almost 41,000 Services group members in 90 countries,  60 centres of technical support, and seven centres of global command committed to helping their customers to use the up-to-date technology to meets their businesss needs and goals. There is no doubt that Dell is on the top in the satisfaction of customers by providing the extraordinary services like on site response, on site expertise and phone supports, said the Corporate IT users. From  the Classrooms  to  Virtual Labs, primary schools to universities are arranging  Dells specifically educational technological solutions, making Dell the number one source of providing laptops, notebooks and desktops computers to education in quite a lot of countries all over the world. As being a top rated IT Services provider of the world, Dell helps in the medical profession to set free the strength of technology to help for the better improvement regarding patients. Dell is the top rated  supplier of Personal computers to lSE all over the world and the top rated  supplier to public customers in the U.S. Dell deals with 98% of Fortune 500 corporations. As being on the 2nd in the rating of supplying computer to customers of education sector Dell is devoted to help teachers, admin, students connects the streangth of IT to broad learning. Dell is covering the SME as approx. 10 million small units deals with Dell through which It got high rank in U.S. No doubt that Dell is trusted greatly by customers regarding their corporations IT needs. Dell is on the top in providing the SCSI (ISCSI) solution of storage around the world and also number 1 in providing X86 server in U.S. Dells customers are able to deal with more than 60,000 registered partners of Dell and are certified to function as their Agents. Connecting with the Customers through internet Dell started online selling in 1996 on Dell.com and now they have smore than 4million website visitors daily, which results in an order got online in almost every 2 seconds. In this era Dell.com is dealing in 166 countries and in 34 languages all over the world, dell is on the no. 3 of the top five search engines and it is second most reputed brand in social media activities for depth and breadth. Dell social Web community have more than 3.5 million members, the community includes Dell outlets on twitter Dell.com, Face book, Orkut (brazil) SINA and other websites. Dell introduced idea Stormâ„ ¢ in 2007, a place where people can share their thoughts, ideas and can also vote for the one they like Dell got ideas and those ideas also implemented about 400 ideas executed by Dell. Visitors of Dell are allowed to read and participate to more than 100,000 reviews of products. Financial Information For FY 2011, in third quarter finished 29, Oct, 2010 Dells Revenue was approx. $15.4 billion and the operating income  was about $1.02 billion. Dells Net income in 3rd quarter of fiscal year 2010  was $822 million and retribution per share was $0.42. (http://content.dell.com/uk/en/corp/d/corp-comm/our-story-facts-about-dell.aspx). Competition Dell is no doubt is operating in an industry where there is a rapid change in technology and innovations in hardware and software, services and the competition among products and prices and all the related areas of business from our standard competitors. Dell compete with its competitors with its competitive ability of giving profitable and good solutions to their customers that provide the new and required product features with customer services, a standard quality and reliability. All this is only possible due our direct linkage with our customers, which proves the best way of getting the information about the changing needs and wants of customers more efficiently than any other company. No doubt that this strong and healthy connection between Dell and its customers and the understanding of customers needs offers Dell a competitive advantage. By IDC, Dell grew 0.2 points of share by calendar 2008 as Dells 11.1% increase in units outpaced the companys general growth of computer syst em which is 9.7%. in the share was due to a well overall performance in half FY 2009 followed by a decrease in units shipments in dells business in last 6 months of FY 2009. Which was somewhat equalized by the potency in our globalized business. Dells growth of commercial businesss units was slow which shows their decision in an erode demand atmosphere to enable the growth in units while saving the profitability. For the duration of the second half of FY 2009, the intact business faces a difficult IT end-user demand situation as present economic situation impacted on global customer ways of spending. The companies like technology grow by increasing their offerings and piercing new natural features. For achieving this level of growth, companies will bring innovation and will also lesser price. Dells capability to sustain or increase market share is predicated on our capability to be competitive on product functionality, quality and geographic saturation, and pricing. Furthermore, The efforts of Dell to equalize its mixes of services and variety of products to optimize profitability, elasticity, and chances of growth may affect the position of Dells market share in short term. In the last of the FY 2009, Dell by sustaining its position in the market remained the top rated supplier in personal computers in U.S and worldwide was at 2nd position. (http://i.dell.com/sites/content/corporate/secure/en/Documents/FY09_SECForm10K.pdf). Competitors When we talk about the competitors, comparatively Dells growth in Q4 of FY2009 was low which 11.5% is and growth of its competitors like HP grew 19.8% market growth and Acer was at 13.5%. Dells growth compared to its 13.35 in the 4th quarter in 2008 was also short. This is the main feature of the high growth rate in the last 7 years in the personal computer selling market, even though the last quarter of 2008 was not so good because of economic critical situation. Whereas some other competitors like Lenovo and Toshiba is concerned comparatively to Dell they were at low point of growth rate which was like Lenovo 8.7% and Toshiba 5.3%. The growth of mobile PCs like net books and notebooks was low in the personal computers selling market. Dells main strength is that it deals in commercial and communal sector so with the intension of preserving its profit Dell refuse to become a part of price war in the personal computer market. Prelim worldwide PC vendor unit ships for Q4 2009 (thousands of units) Company Q4 09 Mkt Share Q4 08 Mkt Share HP 17,792.2 19.8% 14,239.9 19.3% Acer 12,188.2 13.5% 8,612.7 11.7% Dell 10,397.1 11.5% 9,839.3 13.3% Lenovo 7,836.5 8.7% 5,509.3 7.5% Toshiba 4,811.9 5.3% 3,668.1 5% Others 37,008.5 41.1% 31,855.4 43.2% Total 90,034.5 100% 73,724.7 100% HP became a top rated compute seller in US, defeating Dell. Dell struggle to sustain its in the market. By this the US 5 top rated vendors were HP, Acer, Dell, Lenovo and Toshiba. (http://www.techeye.net/hardware/dell-continues-to-bleed-market-share). Conclusion The World largest PC manufacturer HP is using the retail channel strategy through which HP hit dells Sales and its profit, And showed the first-quarter profit of fiscal year 2008. The results estimated on orders for PCs, servers and storage by topped analysts shows that HPs strategy (to depend on the network of retailers) is working very well. They gave a wonderful option to touch the machines before purchasing and this option is helping HP to win customers .To add more HPs PCs and notebook are sold more than 110,000 stores. This is 10 times greater than Dell. Dell has its PCs selling not more than 10,000 stores. Even in terms of notebook and desktop models offered through retailers, HP offers them twice as many as Dell does. To Shoppers, therefore have more choice. Recommendation Dell uses direct sale strategy which is very good but not able to give the competitive edge to HP so I believe that Dell should also follow the same strategy as HP to win the customer back and to get success.

Wednesday, November 13, 2019

In Contempt By Christopher Darden: A Review :: essays research papers

In Contempt by Christopher Darden: A Review   Ã‚  Ã‚  Ã‚  Ã‚  This report is based upon the book In Contempt, written by Christopher A. Darden with Jess Walter. This book is published by Regan Books an imprint of Harper Collins Publishers and is copyrighted 1996 by Christopher A. Darden. Introduction of the Author   Ã‚  Ã‚  Ã‚  Ã‚  The book In Contempt was written by Christopher A. Darden. Chris Darden is famous for being one of the prosecuting attorneys in the court case, The People vs. Simpson. He has worked hard his whole life to reach the status he has now achieved. He proved to America that even though he wasn't a high-priced private lawyer that he could present a well-thought out and planned case under tremendous pressure he and the other prosecutors had to endure during the Simpson case. Summary   Ã‚  Ã‚  Ã‚  Ã‚  I found this book to be very well thought out and well written. Most people would assume that this book was written with the intentions of making a quick-buck off the misfortune of Nicole Brown Simpson and Ronald Goldman. I, however, do not believe this to be true. The way that he speaks of the victims in the book, and the way he spoke of them before and after the trial shows that he really cared about the lives of these people that he didn't even know. He even went as far as to say in the book that this was the first case that affected him personally and emotionally. As one may expect the majority of this book is taken up with the Simpson case but, chapters two through six detail his life from birth, his childhood in a working class district of Richmond, California, and becoming a district attorney of Los Angeles in 1981. Chapters two and three mostly consist of stories of him and his brother, Michael, stealing from local stores or his brothers drug deals. When Michael hit his mid-teens hestarted selling marijuana off the front porch of the house and Chris was his lookout. In return, he was told that he would be cut in on the action (but never was). No matter what, Michael always told Chris never to use drugs. Throughout the book Chris Darden refers to his brother as a good role model for him no matter what he did.   Ã‚  Ã‚  Ã‚  Ã‚  I feel the purpose of Chris Darden writing this book is to try to show the hardships he had to go through as a black man trying to become a lawyer. Also I feel that he is trying to reveal the truth behind what was happening in the Simpson case. Body of the Review In Contempt By Christopher Darden: A Review :: essays research papers In Contempt by Christopher Darden: A Review   Ã‚  Ã‚  Ã‚  Ã‚  This report is based upon the book In Contempt, written by Christopher A. Darden with Jess Walter. This book is published by Regan Books an imprint of Harper Collins Publishers and is copyrighted 1996 by Christopher A. Darden. Introduction of the Author   Ã‚  Ã‚  Ã‚  Ã‚  The book In Contempt was written by Christopher A. Darden. Chris Darden is famous for being one of the prosecuting attorneys in the court case, The People vs. Simpson. He has worked hard his whole life to reach the status he has now achieved. He proved to America that even though he wasn't a high-priced private lawyer that he could present a well-thought out and planned case under tremendous pressure he and the other prosecutors had to endure during the Simpson case. Summary   Ã‚  Ã‚  Ã‚  Ã‚  I found this book to be very well thought out and well written. Most people would assume that this book was written with the intentions of making a quick-buck off the misfortune of Nicole Brown Simpson and Ronald Goldman. I, however, do not believe this to be true. The way that he speaks of the victims in the book, and the way he spoke of them before and after the trial shows that he really cared about the lives of these people that he didn't even know. He even went as far as to say in the book that this was the first case that affected him personally and emotionally. As one may expect the majority of this book is taken up with the Simpson case but, chapters two through six detail his life from birth, his childhood in a working class district of Richmond, California, and becoming a district attorney of Los Angeles in 1981. Chapters two and three mostly consist of stories of him and his brother, Michael, stealing from local stores or his brothers drug deals. When Michael hit his mid-teens hestarted selling marijuana off the front porch of the house and Chris was his lookout. In return, he was told that he would be cut in on the action (but never was). No matter what, Michael always told Chris never to use drugs. Throughout the book Chris Darden refers to his brother as a good role model for him no matter what he did.   Ã‚  Ã‚  Ã‚  Ã‚  I feel the purpose of Chris Darden writing this book is to try to show the hardships he had to go through as a black man trying to become a lawyer. Also I feel that he is trying to reveal the truth behind what was happening in the Simpson case. Body of the Review

Sunday, November 10, 2019

Understand the Role of the Nurse

Introduction The purpose of this assignment is to explore the professional responsibilities of the nurse and their role in safeguarding vulnerable patients, all of which are based around a fictitious scenario. The scenario is centred on a patient named Margaret and is going to be used to identify any vulnerability issues Margaret may have. Margaret could be identified as been vulnerable, as she is an 89 year old lady who is suffering from a heart condition. Margaret is currently living with her daughter and has said that her mother’s health has begun to deteriorate.Margaret is becoming very confused and forgetting to take her medication which has resulted in numerous admissions to hospital. No consent was needed on this occasion as it is a fictitious patient. Based around this fictitious scenario, the aim is to discuss and identify vulnerability and any issues arising from it. Exploring all aspects of vulnerability involving all models and discussing confidentiality, looking a t the importance of it and why it should be maintained.This assignment will also look at the mental capacity act and how the nurse and other healthcare professionals assess the patient for capacity and use the models of assessment. All these are in place to protect the patient’s health and well-being and patient rights. Communication is another important skill for any nurse to have. Good communication skills are essential in providing a high standard of care, which will be explored and discussed in detail.It will also explore what accountability and responsibility is within the nurse’s role. The nurse being accountable for their actions and adhere to the Nursing and Midwifery Councils (NMC), Code. â€Å"The core function of the Nursing and Midwifery Council is to establish standards of education, training, conduct and performance for nurses and midwives to ensure those standards are maintained, thereby safeguarding the health and well-being of the public† (NMC, code, 2009).It will then identify and explain how the patient’s autonomy might be promoted by the nurse, highlighting the support available and with the nurse building a therapeutic relationship with the patient, relating to scenario whilst maintaining appropriate professional behaviour and interventions. Overall this assignment will explore and discuss many of the NMC guidelines about the above topics.It will give you an understanding of the nurse’s role involved in delivering the best possible care to the public. Firstly to explore accountability within the nurse’s role The Nursing and Midwifery Council states, â€Å"Accountability is often defined as responsibility, but there is a difference between the two. Responsibility is concerned with answering for what you do, whereas accountability is being answerable for the ‘consequences’ of what you do† (NMC, 2009).

Friday, November 8, 2019

Messerschmitt Me 262 Used by the Luftwaffe

Messerschmitt Me 262 Used by the Luftwaffe Specifications (Me 262 A-1a) General Length: 34 ft. 9 in.Wingspan: 41 ft.Height: 11 ft. 6 in.Wing Area: 234 sq. ft.Empty Weight: 8,400 lbs.Loaded Weight: 15,720 lbs.Crew: 1 Performance Power Plant: 2 x Junkers Jumo 004B-1 turbojets, 8.8 kN (1,980 lbf) eachRange: 652 milesMax Speed: 541 mphCeiling: 37,565 ft. Armament Guns: 4 x 30 mm MK 108 cannonsBombs/Rockets: 2 x 550 lb. bombs (A-2a only), 24 x 2.2 in. R4M rockets Origins Though best remembered as a late-war weapon, the design of the Messerschmitt Me 262 began prior to World War II in April 1939. Spurred by the success of the Heinkel He 178, the worlds first true jet which flew in August 1939, the German leadership pressed for the new technology to be put to military use. Known as Projekt P.1065, work moved forward in response to a request from the Reichsluftfahrtministerium (RLM - Ministry of Aviation) for a jet fighter capable of at least 530 mph with a flight endurance of one hour. Design of the new aircraft was directed by Dr. Waldemar Voigt with oversight from Messerschmitts chief of development, Robert Lusser. In 1939 and 1940, Messerschmitt completed the initial design of the aircraft and began building prototypes to test the airframe. Design Development While the first designs called for the Me 262s engines to be mounted in the wing roots, issues with the power plants development saw them moved to pods on the wings.  Due to this change and the increased weight of the engines, the aircrafts wings were swept back to accommodate the new center of gravity. Overall development was slowed due to continued issues with the jet engines and administrative interference.  The former issue often was a result of the necessary high-temperature resistant alloys being unavailable while the latter saw notable figures such as Reichsmarschall Hermann Gà ¶ring, Major General Adolf Galland, and Willy Messerschmitt all oppose the aircraft at different times for political and economic reasons. Additionally, the aircraft that would become the worlds first operational jet fighter received mixed support as many influential Luftwaffe officers who felt that the approaching conflict could be won by piston-engine aircraft, such as the Messerschmitt Bf 109, a lone. Originally possessing a conventional landing gear design, this was changed to a tricycle arrangement to improve control on the ground. On April 18, 1941, the prototype Me 262 V1 flew for the first time powered by a nose-mounted Junkers Jumo 210 engine turning a propeller. This use of a piston engine was the result of ongoing delays with the aircrafts intended twin BMW 003 turbojets. The Jumo 210 was retained on the prototype as a safety feature following the arrival of the BMW 003s. This proved fortuitous as both turbojets failed during their initial flight, forcing the pilot to land using the piston engine. Testing in this manner continued for over a year and it was not until July 18, 1942, that the Me 262 (Prototype V3) flew as pure jet. Streaking above Leipheim, Messerschmitt test pilot Fritz Wendels Me 262 beat the first Allied jet fighter, the Gloster Meteor, into the skies by about nine months. Though Messerschmitt had succeeded in out-pacing the Allies, its competitors at Heinkel had first flown their own prototype jet fighter, the He 280 the previous year.  Not backed by the Luftwaffe, the He 280 program would be terminated in 1943. As the Me 262 was refined, the BMW 003 engines were abandoned due to poor performance and replaced by the Junkers Jumo 004. Though an improvement, the early jet engines possessed incredibly short operational lives, typically lasting only 12-25 hours. Due to this issue, the early decision to move the engines from the wing roots into pods proved fortuitous. Faster than any Allied fighter, production of the Me 262 became a priority for the Luftwaffe. As a result of Allied bombing, production was distributed to small factories in German territory, with around 1,400 ultimately being bu ilt. Variants Entering service in April 1944, the Me 262 was used in two primary roles. The Me 262 A-1a Schwalbe (Swallow) was developed as a defensive interceptor while the Me 262 A-2a Sturmvogel (Stormbird) was created as a fighter-bomber. The Stormbird variant was designed at Hitlers insistence. While over a thousand Me 262s were produced, only around 200-250 ever made it to frontline squadrons due to shortages in fuel, pilots, and parts. The first unit to deploy the Me 262 was Erprobungskommando 262 in April 1944. Taken over by Major Walter Nowotny in July, it was renamed, Kommando Nowotny. Operational History Developing tactics for the new aircraft, Nowotnys men trained through the summer of 1944 and first saw action in August. His squadron was joined by others, however, only a few of the aircraft were available at any given time. On August 28, the first Me 262 was lost to enemy action when Major Joseph Myers and Second Lieutenant Manford Croy of the 78th Fighter Group shot one down while flying P-47 Thunderbolts. After limited use during the fall, the Luftwaffe created several new Me 262 formations in the early months of 1945. Among those becoming operational was Jagdverband 44 led by the famed Galland. A unit of select Luftwaffe pilots, JV 44 began flying in February 1945. With the activation of additional squadrons, the Luftwaffe was finally able to mount large Me 262 assaults on Allied bomber formations. One effort on March 18 saw 37 Me 262s strike a formation of 1,221 Allied bombers. In the fight, the Me 262s downed twelve bombers in exchange for four jets. While attacks such as this frequently proved successful, the relatively small number of available Me 262s limited their overall effect and the losses they inflicted generally represented a tiny percentage of the attacking force. Me 262 pilots developed several tactics for striking Allied bombers. Among methods preferred by pilots were diving and attacking with the Me 262s four 30mm cannons and approaching from a bombers side and firing R4M rockets at long range. In most cases, the Me 262s high speed made it nearly invulnerable to a bombers guns. To cope with the new German threat, the Allies developed a variety of anti-jet tactics. P-51 Mustang pilots quickly learned that the Me 262 was not as maneuverable as their own planes and found that they could attack the jet as it turned. As a practice, escorting fighters began flying high over the bombers so that they could quickly dive on German jets. Also, as the Me-262 required concrete runways, Allied leaders singled out jet bases for heavy bombing with the goal of destroying the aircraft on the ground and eliminating its infrastructure. The most proven method for dealing with the Me 262 was to attack it as it was taking off or landing. This was largely due to the jets poor performance at low speeds. To counter this, the Luftwaffe constructed large flak batteries along the approaches to their Me 262 bases. By wars end, the Me 262 had accounted for 509 claimed Allied kills against approximately 100 losses. It is also believed that a Me 262 flown by Oberleutnant Fritz Stehle scored the final aerial victory of the war for the Luftwaffe. Postwar With the end of hostilities in May 1945, the Allied powers scrambled to claim the remaining Me 262s. Studying the revolutionary aircraft, elements were subsequently incorporated into future fighters such as the F-86 Sabre and MiG-15. In the years after the war, Me 262s were used in high-speed testing. Though German production of the Me 262 ended with the conclusion of the war, the Czechoslovak government continued building the aircraft as the Avia S-92 and CS-92. These remained in service until 1951. Selected Sources Stormbirds: Me 262Me 262

Wednesday, November 6, 2019

What is the Best Alternative to Prison essays

What is the Best Alternative to Prison essays  ³The U.S. prison population has tripled since 1980 so that on any given day there are 1.5 million Americans behind bars. ² (Alternatives 1). There is a clear overcrowding problem in todays prisons. Why? I believe that the population explosion in the prison system is due to the increasing moral decline of America. Prisons should keep dangerous criminals off the streets and keep others from committing a crime. (Prisons 1) One would think that being locked up is to be feared. But in today ¹s society, criminals simply do not care.  ³Incarceration is not effective in crime reduction ² (Alternatives 1). But what can be done to fix this ever growing epidemic? More prisons can always be constructed, right? Building more jails is expensive and does not solve the problem. (Prisons 1) So we must now search for plausible alternatives to incarceration. First of all, there is the option of only putting violent criminals in jail. Non-violent criminals could be put into work programs. (Prisons 2) They could spend their days cleaning and repairing America ¹s highways and national parks. This, in my opinion is an excellent idea! Yet we still have to deal with the violent criminals. There are some different options in punishing those individuals.  ³Early release programs let prisoners out of jail before their sentence is complete. This promotes good behavior in prison and keeps the prison population lower. However, many released prisoners just commit another crime and are returned to jail ² (Prisons 1). Early release seems as though it would work wonderfully, but alas falls short. I think that prisoners should not be released early, or at all for that matter. They should serve out their complete term. If parole were not an option, maybe someone would think twice before they pull the trigger. And for those who don ¹t take heed, they would be locked up where they belong. The last option is by far the best in my eyes. ...

Sunday, November 3, 2019

Drivers for adopting public-private construction partnerships in the Term Paper

Drivers for adopting public-private construction partnerships in the US, UK and Australia - Term Paper Example This study also narrows the gap in the literature by collecting primary empirical data from interviews with construction company managers and owners in the US with a view to understanding their perspectives on the drivers for adopting PPPs. The results of this study are discussed and implications for practice and areas for further research are identified. Table of Contents Abstract 2 Introduction 4 Study Scope and Objectives 5 Research Methodology 5 Organization of the Research Report 6 A Review of Literature 6 Conceptualization of Public-Private Construction Partnerships 6 Public-Private Construction Partnerships in the US, UK and Australia 9 Public-Private Construction Partnerships in the US 9 Public-Private Construction Partnerships in the UK 11 Public-Private Construction Partnerships in Australia 13 Summary of Findings in the Literature 14 Empirical Evidence 14 Secondary Data: Australia 14 Secondary Data: The UK 17 Primary Empirical Evidence 19 Analysis 22 Implications for Pract ice 23 Areas for Further Research 23 Bibliography 25 Introduction Public-private partnerships (PPP), also known as P3s are contractual arrangements between governments and private entities/concessionaires for the construction of facilities. Under the P3 contract, the private investor typically funds the construction phase of the facility and is usually entitled to share revenues associated with the facilities (Rowlson, 2012). In addition to sharing revenues, the private entity involved in a PPP also assumes some of the risks associated with the construction project (Hodge, 2004). As a part of a trend toward more privatization of public services, the UK has increasingly adopted PPPs for the construction of government infrastructure (Spackman, 2002). A similar trend can be observed in the US with 23 states legislating for PPPs (Rowlson, 2012). PPPs have also become a part of government public management systems in Australia (English, 2006). Ke, et al. (2009) conducted a review of lite rature on PPPs and examined peer-reviewed articles published between 1998 and 2008. Findings indicate that research into PPPs have steadily increased from 1998 to 2008 revealing an increasing importance to the construction industry. The most popularly researched areas was the â€Å"build-operate-transfer† form of the PPP with some interest in investment conditions, governance and other areas that tend to compliment PPPs (Ke, et al., 2009, p. 1076). It would therefore appear that the drivers of PPPs is under-researched. As, Hodge and Greve (2007) note, although there is intensive interest in the popularity of PPPs, little is understood about these new partnerships in the context of traditional partnerships. Bovaird (2004) argue that although PPPs have become increasingly popular globally over the last 25 years, the definition of PPPs is difficult to conceptualize as it means different things, depending on the country involved and the project to which it applies. Thus further r esearch is necessary for gaining a more profound understanding of PPPs, what the future of PPPs are and how best to model PPPs. This research will therefore add to current knowledge on PPPs by comparing the drivers of PPPs in the UK, the US and Australia. The UK, US and Australia are selected for this study because empirical and

Friday, November 1, 2019

Crimes Research Paper Example | Topics and Well Written Essays - 1500 words

Crimes - Research Paper Example Murder is considered the most serious violent crime and its punishment is life prison, long prison life or capital punishment (death). Different states have different laws in relation to murder but the common division is manslaughter and murder. Murder is where the killer thought and intended to kill without a justifiable reason. In this case, the killer does not have a reasonable explanation to commit the crime. Murder can also take place under the felony-murder rule. Where one in the course of committing a felony such as robbery kills somebody else, he is charged with murder although there was no initial plan or premeditation. In this case, the person acted in a dangerous way and his behavior led to the death of somebody else. The difference between manslaughter and murder therefore is in the fact that there is no premeditation in manslaughter. Manslaughter is further divided into voluntary and involuntary categories. Voluntary manslaughter means that the intention to kill is there but it comes up suddenly due to intense emotions but it was not planned. In this case, there is no cooling off period between the action that brought the aggravation and the killing. There is no intention to kill but it happens due to carelessness or negligence. Voluntary manslaughter is not as serious as murder but it results to prison time. The only killing where the killer is released from responsibility is killing in self defense (Storing, 1981). Crimes against Property Crimes against property are those which involve theft without any force or threat directed towards a person. These include burglary, motor vehicle theft, larceny-theft and arson. Burglary is where one enters into somebody else's property such as a building to steal something. Lacenny-theft does not involve entry into a person's property but it is the unlawful taking of property. Embezzlement involves the changing something that was lawfully acquired to conduct unlawful activities. In embezzlement, the property must have come to the suspect's possession through a fiduciary relationship. It involves an element of breach of trust. It is necessary to prove breach of trust by showing that the property in question was handled in a manner that is not consisted with the trust arrangement. The required mental state for one to be accused of embezzlement is that there must have had been an intent to defraud and convert the property in question. Other types of crimes against property include fa lse pretenses and receiving stolen property. In false pretenses, a person is deceived to give up his rightful ownership or possession of property with an intention of converting the property to personal use. Possession or concealing, receiving and buying of stolen property also constitute of a crime against property. Under the crimes against property, extortion is the only intent crime. Another word for extortion is blackmail. It involves the taking of