Wednesday, November 27, 2019

How Google Governs the Internet

The extent to which Google governs the internet today is unsurpassable. Google has tactfully developed products and services that are ubiquitous in the cyber realm, in addition, these products and services are user friendly designed to meet the consumer needs, encompassing current and potentially future market trends.Advertising We will write a custom essay sample on How Google Governs the Internet specifically for you for only $16.05 $11/page Learn More Google seems to set standards for the industry by influencing every sector and reasserting the company’s market dominance. This document will highlight Google’s efforts in revolutionizing the internet industry focusing specifically on products, services, market command and their usability. Google has greatly invested in internet based search engine, software, data and advertizing. AdWords, a Google subsidiary, has the primary function of income generation from advertisements. Other than Goo gle’s core web search engine, it has successfully developed a series of online services as well as acquiring other internet-based brands in collaboration with some innovative online companies. This has led to the Company’s rapid growth since it was incorporated in 1998. According to Pandia Search Engine News (2007), Google has established over one million servers and three million computers worldwide to handle search traffic and support their online products and services, which translates to twenty-four Pet bytes of processed data each day. Alexa (2011) lists www.google.com as the most visited site on the internet, more so in the United States and several other countries in the world. It also ranks highly other Google owned sites such as YouTube, Blogger, and Orkut. As a market leader, Google has been criticized on issues such as violation of privacy, copyright, censorship as well as high-energy consumption of the servers. This has not legally hurt Google because most of these criticisms are based on issues that do not feature in the cyber laws (Rosen, 2008). Google Web Search According to Alexa (2011), over the last three months, Google Web Search has been the most utilized search engine on the internet. On October 10, 2011, approximately 48% of the people who logged into the internet visited Google’s search engine with 27% spending an average of thirteen minutes.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More On the above mentioned date, Google ranked first in the United States of America, Iran, South Korea, Bangladesh to mention a few. It ranked second in India, Brazil, Netherlands, Algeria, Ukraine and ranked third in most European countries including, United Kingdom, Germany, Italy. Google search engine is a simple website that features a search bar in the middle. This simplicity has not changed much for the last fourteen years. In addition, the website contains eight links. The links are located at the top left corner of the interface. The first one is Google Plus, second link is the World Wide Web, the third link is Videos, the fourth link is Maps on the Internet, the fifth link is to leading news items worldwide, the sixth link is to Google Mail and the last link labeled â€Å"more† is an open door to over ten links. It is not easy to imagine such a simple site with so much to offer. Compared to other leading search engines, Google has been remarkable, which explains the reason why it has set precedence in ‘search’ on the internet. According to Alexa (2011), compared to Google, Yahoo Search ranked fourth with 23% of internet user visits on 10 October 2011 a position it has maintained for the last three months. Bing Search on the other hand did not even come close to top ten most visited sites. Google Plus Google Plus is a social networking site launched on 28, June 2011 and is one of the newest p roducts from Google. It integrates features such as friendship circles, social hangouts and mobile phone contacts. According to Par (2011), Google Plus is an ambitious answer to Face book. A day after the launch, users were asked to invite friends to Google Plus, this activity was put on hold the following day after an overwhelming demand for accounts (Shaer, 2011). By 6 August, individual account holders received 150 invites (Brinkmann, 2011). Google Plus is one Google’s services launched to enable it exert significant influence on the internet.Advertising We will write a custom essay sample on How Google Governs the Internet specifically for you for only $16.05 $11/page Learn More Google Videos Google Videos is a product that Google launched on January 25, 2005 (Blogoscoped, 2005). Google Videos has transformed viewing and downloading of videos on the internet. Acquisition of YouTube in 2006, added to Google Video’s service as Google inh erited a huge collection of videos. However, Google disabled the video upload feature three years after You Tube’s acquisition. Google Videos has a huge video base ranging from television programs, documentaries, movie trailers to educational materials, amateur media to professional media. In 2009, Google in collaboration with Aardvark’d:12 Weeks with Geeks alongside Waterborne launched the Google Video Store. Content providers for this service included CBS Broadcasting Inc. (CBS), National Basketball Association (NBA), The Charlie Rose Show and Sony BMG. Google Maps Internet users can access this internet based mapping application at no cost. The service offers street maps and other features such as route planners for non-commercial use. The pan able map images are not live, but updated periodically, as they could be several weeks or months old. This service makes available satellite images for most urban areas around the world in high pixel resolution. However, some areas around the world have been blurred for security reasons (Back, 2005). Coded in java script and XML, this application has made it easy for users to reverse engineer it producing other scripts. This permits users to custom tune it for use on their individual websites. With this development, Google launched Google Map API in 2005 to allow users adopt the maps in their websites (Taylor, 2005). This Application Programming Interface has been upgraded to use Adobe Flash application from java script, making it applicable for retrieving static images and geo coding for web services. It also incorporates automobile navigational tools for drivers, which has attracted a huge user base across 350,000 websites making it the most used application-programming interface on the internet (ProgrammableWeb.com, 2011).Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Google has also made it possible for users to get maps on mobile devices; this follows the introduction of Google maps for Mobile phones in 2006. Soon after in 2007, Google introduced â€Å"my location† with the release of Google Maps for Mobile 2.0. By December 15, 2008, the service was available for most smart phone platforms including Android OS in iPhone, iPod Touch, iPad, Windows Mobile, Nokia- S60, Windows Mobile, Symbian OS, BlackBerry, Sony Ericsson K800i, and Palm OS (Google, 2010). Google Earth This virtual geographical information application initially developed by Keyhole incorporated, maps the earth by superimposing satellite pictures and geographic information system’s three-dimensional globe. Google Earth shows satellite pictures of the Earth’s surface where users can see features on the ground from a bird’s eye view, most of these images are covered in not less than fifteen meters of resolution. It applies three-dimensional representation of terrain data received by National Aeronautics Space Administration’s Shuttle Radar Topography Mission (Farr et al., 2007). Google Earth has many uses among them; it can be used to assess disaster struck areas on the Earth’s surface, for instance, flood or earthquake prone regions. It is also beneficial in a classroom setting as an instructional tool (Rescigno, 2010), teachers are already taking advantage of this application in lesson planning and in teaching subjects such as geography and social sciences (Wyatt, 2010).Google Earth is available in 34 major languages of the world. Google Earth incorporates features that have made it very popular among internet users (McCollum, 2008). Tuned to suite users, these features include, â€Å"Panoramio,† this feature replaced â€Å"Geographic Web† on March 2010, after Google acquired Panoramio, a photo sharing geo location website. It enables users to access map coordinates, a significant geographic tool. The fl ight simulator in Google Earth is a great attraction for internet users; it allows users to simulate F-16 fighting Falcon at maximum speeds and high altitude. The Cirrus SR 22, also featured in the flight simulator on the other hand, offering reduced speeds at minimum altitude. Version 5.1 has the capacity to make users experience under water actions as well. Sky mode feature was added in 2007, it enables users view a simulation of the galaxy. (Google, 2011). The partnership with Space Telescope Science Institute in this venture was strategic and authenticated the application (Knight, 2007). The Street View is a wonderful feature integrating a 360 ° panoramic view of selected city streets around the world. The other interesting feature in this application is the â€Å"Water and ocean.† This allows users a three-dimensional view of underwater surface of the ocean with zoom capability. This feature integrates information from world-renowned scientists and oceanographers (Brit ish Broadcasting Corporation, 2009). Historical Imagery feature in Google Earth is only available in version 5.0 and allows users to peruse archived records of different places (Hanke, 2009). Google News Google, based on Krishna Bharat’s idea (Glaser, 2010), developed this service and launched it in 2002. Google News automatically selects news items from internet by aggregation algorithm. It aggregates content from over 25,000 publishers, which can be accessible through Google News for 30 days from aggregation date (Cohen, 2009). In addition, Google News is available in 25 major languages of the world. Google News allows users to search for news by date and time of publishing. Users can also custom the search by national audience. In addition, they have the option of subscribing in order to receive news alerts via Really Simple Syndication (RSS) feeds. The Cookie option allows users to compile stories from different Google News editions. This application enables users to crea te custom pages that integrate Google Search History. In 2006, Google News added a ‘News Archive Search’ feature. This feature allows users access archives dating back 200 years by clicking on the ‘time line view’ option. Google News provides scanned news materials to facilitate the archive database (Soni, 2008). Interestingly, in 2007, United Airlines lost $ 1 billion due to an article archived in 2002 but appeared on Google News as current most viewed item (Helft, 2008). This incident was an indication of the way Google has revolutionized news on the internet. Google Mail Developed in 2004, Gmail is a free email service that is accessed as secure web mail. The initial storage for Gmail was 1 Gigabytes for every account holder, but was later upgraded to 4 Gigabytes due to stiff competition for storage capacity in the market (Craddock, 2010). By October 11, 2011, Gmail was mentioned as having 260 million active email accounts worldwide (Terdiman, 2011). The re are features in Gmail that are comparable to none in the industry portray Google’s sophistication, dedication and zeal to dominate the market. These include the current storage capacity of 7 Gigabytes for individual email. Users needing more storage are able to rent on a yearly basis (Google, 2007). Gmail Lab is a link that enables account holders to test new Gmail features. This is gives the webmail engineers to assess user input or review of Gmail features. The Spam filter helps users deflect unwanted email. Account holders may suggest to the system ways of handling specific messages (Chitu, 2007). Mobile devices can also access Gmail; this was made possible by the introduction of the Gmail Mobile feature. Users are able to compose, read, reply emails just as on a personal computer (Kroeger, 2009). In 2010, â€Å"Google introduced a two-pane layout that is sent automatically to Gmail users on iPad† (Nicolaou, 2010). Gmail also availed a voice over data feature, wh ich in addition to voice calls allow users to chat and send text messages at no cost to other account holders and to mobile phone worldwide at a fee. Nonetheless, Gmail allows users to make free video calls to other Gmail account subscribers. On the launch date, this service handled over 1 million calls (Shankland, 2010) Google Images Google developed this service to make it easier for internet users to search for images. Images are searched based on their file names and the search results are displayed as thumbnails. The user has to click on the thumbnail to enlarge the image viewing it from the original website. Google has upgraded this interface several times. First, in 2001, when it added over 200 images to the database, by 2005, this base increased to 1 billion and by 2010, it was 10 billion (Google, 2010). In 2009, Google introduced an option of finding similar images. In 2010, Google improved the interface by auto disabling details of the image until the cursor rolls over it. Google Image has revolutionized the way internet users’ access images. With the increase in popularity of Google Image, Google has made it available for mobile phone and portable device users as well. Google Chrome Launched in December 11, 2008, this is one of the most popular browsers on the internet today with 26.16% of the market share (Stat Counter, 2011). This browser applies WebKit layout engine mechanism incorporated with ‘V8 java script’ to enhance the application’s performance. Chrome exhibits tremendous difference from other browsers, it does not run RSS feeds; it combines the address bar with the search bar and offers simplicity, speed and security to users. It portrays unique features like the graphical interface that has made it adorable by many internet users worldwide (Google, 2011). Chrome incorporates two access control mechanisms (phishing and malware). The browser warns users when they click on potentially harmful links or sites (McClou d, 2011). Statistics indicate that internet users are regularly cheated into accepting malware downloads (Hughes, 2010). Chrome allows individual tabs to fit in their own processes making them independent, this, is a complex model that prevents malware from self-installation (Chung, 2008). Chrome does not sandbox plug-in as tabs since they are not standardized; they are run at a different security level to reduce their vulnerability. Chrome also provides a porn mode feature, ‘Incognito’ that stops it from archiving information from visited websites (Google Support, 2011). Google Chrome uses the ‘V8 java script virtual machine engine’ which incorporates just-in-time compilation (JIT) and an automatic memory management that makes it twice as fast as Firefox 3.0. Google Chrome performed faster compared to several other websites that included Explorer, Safari, and Opera in a joint benchmark test (Google, V8 Benchmark Suite – version 6, 2011). According t o Mathew Moore (2008), reviewers not only appreciated Chrome’s appearance and features but also found it fast. However, they were skeptical regarding Chrome’s market dominance. In a rejoinder, Business Week reported in 2010 that, â€Å"For the first time in years, energy and resources are being poured into browsers, the ubiquitous programs for accessing content on the Web. Credit for this trend—a boon to consumers—goes to two parties. The first is Google, whose big plans for the Chrome browser have shaken Microsoft out of its competitive torpor and forced the software giant to pay fresh attention to its own browser, Internet Explorer. Microsoft all but ceased efforts to enhance IE after it triumphed in the last browser war, sending Netscape to its doom. Now it’s back in gear.† (Jaroslovsky, 2010). By July 2011, Google Chrome was the most used browser in Chile, Uruguay, Philippines, Malaysia, Pakistan, Tunisia, Armenia, Moldova, Argentina and Jamaica (Stat Counter, 2011). Android Google led a consortium of 84 information and communication technology companies collectively known as Open Handset Alliance to develop this operating system meant for mobile phones and computers. Google acquired Android incorporated in 2005. In 2007, it announced the formation of Open Handset Alliance as well as Android’s debut in the market (Open Handset Alliance, 2010). Android consist of a component integrating Linux, Application Programming Interface (API), middleware and libraries authored in general purpose computer language(C), operating on a framework including java-compatible resources based on Apache Harmony (Bray, 2010). Android has user-friendly features including, Handset layouts, a graphics library platform, which is a database storage facility, Connectivity, including Bluetooth, WI-FI, WiMAX and more. Additional features include, Messaging, both SMS and MMS, Multiple language Support, including most major languages of the world, Web browsers based on Chrome. Android contains advanced features that are java supported making it exceptional compared to other systems. These Android application programs run on Dalvik. Android also supports various video formats including, WebM, MPEG-4 SP, AMR, H.263. Audio formats include, MP3, Wav, JPEG, PNG, GIF, BMP,MIDI and more (Android Developers, 2011). In addition, the Android also supports multi-touch, which is prominent in the Nexus One and Motorola Droid. The primary market for Android is online. The online market is pre-installed on devices running on Android and enable users to download applications from other developers. In 2010, the market contained 200,000 applications, by April 2011, the number of installed application from the market grew to 3 billion and by June 2010, the number was 6 billion installed applications (Tsotsis, 2011). Google has introduced several applications into the Android Market, including Google Voice, Sky Map, Finance, Map Editor, Places Directory, Google Goggles and more. Google AdWords This is Google’s leading advertizing setup; it is also the main income earner. AdWords offers various online advertisement services including, cost-per-thousand, website advertising and pay-per-click. According to Google Investor Relations (2011), Google earned a total of $ 28 billion in revenues in 2010. Google websites are the primary hosts of AdWords adverts, in addition, advertisers are allowed to display their adverts on other Google affiliate and partner networks that include, American Online search, Ask.com and Netscape. Google has also developed a â€Å"Google Display Network† that displays advertisements on websites and not search engines. These websites apply a different advertising model such as AdSense and DoubleClick, which are used by those who wish to earn money-displaying advertisement on their websites. According to Google Investor Relations (2010), revenue for the first quarter from Google owne d sites was $ 2.04 billion and from collaborate sites $ 3.58 billion. In the second quarter of 2011, the revenues rose to $ 9.03 billion, with Google sites earning $ 6.23 billion and partner sites generating $ 2.48 billion. International revenues went up $ 4.87 billion 54% of total revenue of the second quarter of 2011. With almost 70% of market share (Danny Goodwin, 2011); Google has managed to influence the worldwide internet market. It has successfully positioned products and services strategically in order to take advantage of the market trends. This way, it not only dominates the market but also govern internet activities worldwide References Alexa. (2011). Top Sites. Retrieved from Alexa Web site: http://www.alexa.com/ Android Developers. (2011). Android Supported Media Formats. Retrieved from Android Web site: http://developer.android.com/guide/appendix/media-formats.html Back, E. (2005, April). Google Maps: The White House. Retrieved from Elliottback Web site: http://elliott back.com/wp/google-maps-the-white-house/ Blogoscoped. (2005). Google Video Search Live. Retrieved from Blogoscoped Web site: http://blogoscoped.com/archive/2005-01-25-n90.html Bray, T. (2010, November). What Android Is. Retrieved from Tbray Web site: http://www.tbray.org/ongoing/When/201x/2010/11/14/What-Android-Is Brinkmann, M. (2011, August). 150 Google Plus Invites. Retrieved from Ghacks Web site: http://www.ghacks.net/2011/08/06/150-google-plus-invites/ British Broadcasting Corporation. (2009). Google Earth dives under the sea. Retrieved from News Web site: http://news.bbc.co.uk/2/hi/technology/7865407.stm Chitu, A. (2007). How Gmail Blocks Spam. Google Operating System. Retrieved from Googlesystem Web site: http://googlesystem.blogspot.com/2007/10/how-gmail-blocks-spam.html Chung, M. (2008). Chrome’s Process Model Explained. Nothing  ventured, nothing gained. Retrieved from Marcchung Web site: http://blog.marcchung.com/2008/09/05/chromes-process-model- explained.html C ohen, J. (2009, December). Same Protocol, More Options for News Publishers.  Retrieved from Googlenewsblog Web site: http://googlenewsblog.blogspot.com/2009/12/same-protocol-more-options-for-news.html Craddock, D. (2010, August). A Short History of Hotmail. Retrieved from Windowsteamblog Web site: http://windowsteamblog.com/windows_live/b/windowslive/archive/2010/01/06/a-short-history-of-hotmail.aspx Danny Goodwin, M. I. (2011, March). Hitwise: Bing Market Share up 5%; Google  Down 2% in February 2011. Retrieved from Searchenginewatch Web site: http://searchenginewatch.com/article/2049889/Hitwise-Bing-Market-Share-up-5-Google-Down-2-in-February-2011 Farr et al. (2007). Reviews of Geophysics. Pasadena, California, USA: California Institute of Technology. Glaser, M. (2010, February 4). Google News to Publishers: Let’s Make Love Not War.  Retrieved from Mediashift Web site: http://www.pbs.org/mediashift/2010/02/google-news-to-publishers-lets-make-love-not-war035.html Googl e. (2011). Explore the sky with Google Earth. Retrieved from Earthgoogle Web site: http://earth.google.com/sky/skyedu.html Google. (2010). Google Images Presents a Nicer Way to Surf the Net. Retrieved from Google Web site: http://googleblog.blogspot.com/2010/07/ooh-ahh-google-images-presents-nicer.html Google. (2010). Google Maps for mobile. Retrieved from Google Web site: www.google.com: https://www.google.com/mobile/maps/ Google Investor Relations. (2011). 2011 Financial Tables. Retrieved From www.google.com: http://investor.google.com/financial/tables.html Google. (2007). More storage for photos and messages. Retrieved from Webcitation Web site: http://www.webcitation.org/5nE4hgK7M Google Support. (2011). Using the Incognito mode: private browsing. Retrieved from Google Web site: https://www.google.com/support/chrome/bin/answer.py? answer=95464hl=en Google. (2011). Technology overview. Retrieved from Google Web site: https://www.google.com/about/corporate/company/tech.html Google . (2011). V8 Benchmark Suite – version 6. Retrieved from GoogleCode Web site: http://v8.googlecode.com/svn/data/benchmarks/v6/run.html Google Investor Relations. (2010). Google Announces First Quarter 2010  Financial Results. Retrieved from Googleearnings Web site: http://investor.google.com/earnings/2010/Q1_google_earnings.html Hanke, J. (2009, February ). Dive into the new Google Earth. Retrieved from Googleblog Web site: http://googleblog.blogspot.com/2009/02/dive-into-new-google-earth.html Helft, M. (2008, September). How a Series of Mistakes Hurt Shares of United.  New York Times, Al. Hughes, B. (2010). Virus Bulletin : 2010 – Social engineering trumps a zero-day every  time. Retrieved from Virusbtn Web site: http://www.virusbtn.com/conference/vb2010/abstracts/Hughes.xml Jaroslovsky, R. (2010, February). Browser Wars: The Sequel. BusinessWeek, Al. Knight, W. (2007, August). Celestial add-on points Google Earth at the stars. Retrieved from Newscientist Web si te: http://www.newscientist.com/article/dn12523 Kroeger, R. (2009, April). A new mobile Gmail experience for iPhone and Android.  Retrieved from Gmailblog Web site: http://gmailblog.blogspot.com/2009/04/new-mobile-gmail-experience-for-iphone.html McCloud, S. Google Chrome. Comic. Google inc. Mccollum, J. (2008, January). Google Maps Growing in Popularity. Retrieved from Maketingpilgrim Web site: www.marketingpilgrim.com Moore, M. (2008, September). Google Chrome browser: Review of reviews. Retrieved from The Telegraph Web site: http://www.telegraph.co.uk/technology/3358306/Google-Chrome-browser- Review-of-reviews.html Nicolaou, A. (2010, April). Gmail on the iPad. Retrieved from Gmailblog Web site: http://gmailblog.blogspot.com/2010/04/gmail-on-ipad.html Open Handset Alliance. (2010). What would it take to build a better mobile phone?  Retrieved from Openhandsetalliance Web site: http://www.openhandsetalliance.com/ Pandia Serach Engine News. (2007). Google: one million servers a nd counting.  Retrieved from Pandia Web site: http://www.pandia.com/sew/481-gartner.html Par, B. (2011, June 28). Google+: First Impressions. Retrieved from Mashable Web site: http://mashable.com/2011/06/28/google-plus-review/ ProgrammableWeb.com. (2011). API Dashboard. Retrieved from Programmableweb Web site: http://www.programmableweb.com/apis Rescigno, D. (2010, April). Reinventing classroom geography with Google Earth  API. Retrieved from Googleenterprise Web site: http://googleenterprise.blogspot.com/2010/04/reinventing-classroom-geography-with.html Rosen, B. J. (2008, November). Google’s Gatekeepers. Retrieved from Nytimes Web site: http://www.nytimes.com/2008/11/30/magazine/30google-t.html?_r=1partner=rssemc=rsspagewanted=all Shaer, M. (2011, June ). Looking for a Google+ invite? Either get comfortable – or get  crafty. Retrieved from Csmnitor Web site http://www.csmonitor.com/Innovation/Horizons/2011/0630/Looking-for-a-Google-invite-Either-get-comfortable -or-get-crafty. Shankland, S. (2010, August). Google: 1 million Gmail calls on first day. Retrieved from Cnn Web site: http://edition.cnn.com/2010/TECH/web/08/26/google.gmail. phone.calls/index.html?iref=NS1 Soni, P. (2008, September). Bring history Online One Paper at a Time. Retrieved from Googleblog Web site: http://googleblog.blogspot.com/2008/09/bringing-history-online-one-newspaper.html Stat Counter. (2011). Stat Counter Global Stats: The World’s Top Five Browsers.  Retrieved from Statcounter Web site: http://gs.statcounter.com/ Taylor, B. (2005, June). The World is your javascript enabled Oyster. Retrieved from Googleblog Web site: http://googleblog.blogspot.com/2005/06/world-is-your-javascript-enabled_29.html Terdiman, D. (2011, October). Microsoft aiming to clean up Hotmail user’s inboxes  Retrieved from Newscnet Web site: http://news.cnet.com/8301-13772_3-20114975-52/microsoft-aiming-to-clean-up-hotmail-users-inboxes/ Tsotsis, A. (2011, July ). Google And roid Now On 130M Total Devices, With 6B App  Downloads. Retrieved from Techcrunch Web site: http://techcrunch.com/2011/07/14/google-android-now-on-130-million-total- devices/?utm_source=feedburnerutm_medium=feedutm_campaign=Feed%3 A+Techcrunch+%28TechCrunch%29 Wyatt, N. (2010, April). Reinventing classroom geography with Google Earth API.  Retrieved from Googleenterprise Web site: http://googleenterprise.blogspot.com/2010/04/reinventing-classroom-geography-with.html This essay on How Google Governs the Internet was written and submitted by user Desiree Holder to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

Reverse logistics systems for end-of-life computers in Sydney †Computer Engineering Research Paper

Reverse logistics systems for end-of-life computers in Sydney – Computer Engineering Research Paper Free Online Research Papers Reverse logistics systems for end-of-life computers in Sydney Computer Engineering Research Paper Computers, with dramatically increased number and even shorter product life cycle, have become a serious problem in modern society. According to a report by the National Safety Council (Hamilton, Anita, 2001), some 500 million PCs will be rendered obsolete by 2007 in the U.S. alone, which have been abandoned by users who have upgraded to faster and sexier machines. The disposal of EOL computers incur much attention mainly because they contain many hazardous materials which will do damage to environment if not properly treated. Other concerns include legislation pressure, availability of landfill, company competence, pressure from consumers and profit pursuit. The recycling of the EOL computers, which requires a comprehensive reverse logistics system to support it, is proposed as the best available way now to solve this problem. A recent study by Murphy and Poist (2000) revealed that recycling materials, reducing consumption, and reusing materials are the three most commonly utilized green logistics strategies. Therefore, it incurs a need to develop a reverse logistics system to collect and then either refurbish or recycle the computers. The aim of this proposed research is trying to utilize qualitative methodology to examine the current reverse logistics system of Sydney to recycle and/or refurbish end-of-life computers that are deemed no longer useful by their owners, and then provide suggestions for further improvement. The research will concentrate on solving problems in Sydney, which has different situation with U.S.A., Europe and Asia. The main issues included in the proposed research are as follows: How the current reverse logistics system for computer recycling works in Sydney? How many parties are involved in this system? Who affords the logistics cost? What is the relationship between public system and private system? What are the impediments of this system? How we can learn the best practices or draw lessens from other countries? How we can improve the system? Introduction Some literatures have done research about reverse logistics system for EOL computer recycling. Some are conceptual models, which derived from the literature review. Others are developed from the real-world practice in certain country or area. Within them, two are mentioned here as an introduction. The first one is a conceptual model designed by A.Michael Knemeyer etc., which Integrates the factors impacting the design and implementation of a reverse logistics system specifically for EOL computers. This model pays particular attention to the specific activities needed to handle EOL computers and considers how the internal and external factors may impact the economic viability of the system. Shown in figure 1, he model outlines both external and internal factors that can affect the reverse logistics process in general and for EOL computers in particular. Consistent with Carter and Ellram, the proposed model incorporates both competitive and regulatory factors affecting the external environment. It goes on to examine other factors affecting the success of the operation from a self-contained perspective as well. These internal factors include identification and acquisition of product supply (EOL computers) from various entities including both the private and commercial sector as well as residential sector. The model then looks at the inbound processing aspect of reverse logistics. In this case, a decision whether the products should be recycled, (dismantled) or refurbished needs to be made. The processed output can then be sold to targeted customer segments or disposed of as waste. A key premise of the proposed process model is the ability of the system to aggregate the ne cessary supply of recyclable EOL, transport that material in a cost-effective and efficient manner to a central point for processing and then sell the output of this process to targeted markets where demand exists. Figure 1: Proposed model of reverse logistics system for EOL computers The second one describes the current scrap computer recycling system in Taiwan. Ching-Hwa Lee etc (2000) developed a flowchart to show the current the current scrap computer recycling system in Taiwan. This chart focuses on the relationship among the participants of EOL recycling rather than the detailed processing approach. It also mentioned the scrap computer processing fees. It is estimated that approximately 300,000 scrap personal computers are generated each year in Taiwan (S.-L.Chang, 1998). The disposal of such a huge number of scrap computers presents a difficult task for the island due to the scarcity of landfills and incineration facilities available locally. Therefore, the EPA of Taiwan declared scrap personal computers the producer’s recycling responsibility as of July 1997. As shown in the flowchart (see figure 2), several participants are involved in the process of EOL recycling, which can be divided into four categories: Government: EPA and SCM Foundation Public and consumers Computer manufacturers and importers Service providers: financial organization, collection point and storage yard management service providers, third-party auditors. Computer manufacturers and importers will afford the fees while SCM Foundation is the organizer. Consumers are rewarded money to bring their unwanted computers to designated collection points. Currently, the SCM Foundation plays an essential role in the scrap computer recycling system in Taiwan. On January 23, 1998, the Scrap Computer Management (SCM) Foundation was formally established by EPA in order to manage and implement the recycling of scrap computers in Taiwan. This foundation is a semi-official organization directly under the control of the EPA. Potential Outcome The potential outcome of the proposed research is an improved model designed for EOL computer recycling in Sydney, which is based on a comprehensive investigation of the current system. A flowchart will be drawn to describe the current system, attached with a detailed report to explain the flowchart. Impediments are pointed out and the new improved model will be established. The new model will integrate three basic elements: government, industry and consumers. The new model will also incorporate some best practices and lessons from other countries and areas. However, with particular situation in Sydney, the new model will try to adapt those initiatives to the specific environment of Sydney. The value of the model lies in that an effective an efficient reverse logistics system is the critical factor in solving the problem of EOL computer recycling. Methodology A qualitative research approach utilizing literature research, customer visit program and market research will be employed to carry out the proposed research. Step 1: The first half-year will be dedicated to literature research, which will help to learn more about computer recycling and reverse logistics. The related books, journals, websites are collected. The best practices world wide are studied and compared with Sydney. The first half-year will serve as knowledge preparation for the whole research. Step 2: The second half-year is assigned to do the preparation for the visit program and market research. During this period, the focus of the research will be diverted to Sydney. A plan is made to guide the visit program and market research. The potential visit objects, such as certain government departments, non-governmental associates, PC manufacturers, dealers, recycling company, reverse logistics company, second market, retailers, are specified. The research tries to hear voices from different perspectives. The visit program procedures and feasibility are considered carefully. The second half-year is a bridge leading to the substantial research. Step 3: The whole second year is allocated to do the visit program and market research. Different parties involved in the reverse logistics system will be visited in person. If personal visit is not available, postal questionnaire is accepted too. The design of the questionnaire is critically important, which decides if the visit program could extract useful information from the interviewees. It needs great patience and communication skills to finish the visit program. If possible, a market research will be done to learn more about the opinions from consumers who play an important role in the reverse logistics system. Without the active participation of consumers, all the recycling initiatives of EOL computers are difficult to realize. Step 4: The third year is used to synthesize and analyze the results of the visit programs and market research. A diagram is drawn to illustrate the flowchart of the current reverse logistics system. According to the bottleneck of the system, the research tries to work out some possible solutions or improvements to make the whole system more efficient and effective. A new model with new initiatives is designed specially for Sydney. The report will be finalized during this period. In sum, the proposed research will contribute to the computer recycling through designing a reverse logistics system to support it. The result of the research may help the computer industry and government regulators in the decision-making of how to implement environmental strategies. Reference Hamilton, Anita, 2001, How do you junk your computer, Time, 02/12/2001, Vol.157, Issue6, pp70 Murphy, P. and Poist R, 2000, Green logistics strategies: an analysis of usage patterns, Transportation Journal, Vol.40, No.2, pp5-17 Michael Knemeyer, Thomas G.Ponzurick and CyrilM.Logar, 2002, A qualitative examination of factors affecting reverse logistics systems for end-of-life computers, International Journal of Physical Distribution Logistics Management, Vol.32, No.6, pp455-479 Craig R.Carter and Lis M.Ellram, 1998, Reverse logistics: a review of the literature and framework for future investigation, Journal of business logistics, Vol.19, No.1, pp85-102 Ching-Hwa Lee, Ssu-Li Chang, King-Min Wang, Lih-Chyi Wen, 2000, Management of scrap computer recycling in Taiwan, Journal of Hazardous Materials A73 (2000), pp209-220 Research Papers on Reverse logistics systems for end-of-life computers in Sydney - Computer Engineering Research PaperBionic Assembly System: A New Concept of SelfOpen Architechture a white paperIncorporating Risk and Uncertainty Factor in CapitalRiordan Manufacturing Production PlanThe Project Managment Office SystemDefinition of Export QuotasPETSTEL analysis of IndiaGenetic EngineeringNever Been Kicked Out of a Place This NiceInfluences of Socio-Economic Status of Married Males

Thursday, November 21, 2019

CASE5 599 Coursework Example | Topics and Well Written Essays - 1250 words

CASE5 599 - Coursework Example 133) A reinforcing loop generally develops the market value of a company along with its policy framework and a clear cut course of action. For instance in the case of a company like Whole Foods Market, the management is actively implementing the core value of satisfying and gratifying their customers with an intention to retain them. This is giving rise to a reinforcing loop. The loop starts at the core value specification, which can be diagnosed as the causal factor. The loop is processed through the organization’s customer oriented activities culminating at customer centric relationship management. The loop is then reinforced by the returning customers. This happens in consequence to the causal policy that finally results into its reiteration by the virtue of the company’s active and deployable business methods. â€Å"Balancing loops are system processes triggered to bring the system back to a preestablished norm† (Notter and Grantt, 2011, p. 133) A balancing l oop is a kind of automatic control within the organization which may bring about considerable damage if not terminated in proper time. This is a case in which a system is constrained within highly tacit parameters (Notter and Grant, 2011; Sterman, 2000). ... This oversensitivity in establishing one of the primary core values to deal with the marketing processes appears to be causing a balancing loop. The loop is executing through the unopposed policy specification and then exposing the organization to tougher competition. Figure – 1: The Reinforcement Loop formed due to Customer Centric Management Figure – 2: Setting product quality specifications with excessive stringency may lead to a negative balancing loop Part 2 Traditionally, scholars and professionals in the field of management and business research used to accept the notion of organizational learning, but its definition and theory remained unclear for a considerable period of time. However, as early as 1985, Fiol and Lyles (1985, p. 804) pointed out that â€Å"Some agreement exists that distinctions must be made between individual and organizational learning.† Consequently, it becomes an imperative to contemplate on the concept that individual learning is vit al for an organization, but organizational learning cannot be regarded as merely the sum total of each member’s erudition. An organization, unlike an individual, builds up and maintains learning mechanisms. These mechanisms influence the organization’s immediate members. Moreover, these mechanisms help in transmitting the learning outcomes to others by the means of organizational histories, paradigms, and norms. (Notter and Grant, 2011; Argyris, 1990; Fiol and Lyles, 1985) So the theory of organizational learning has emerged on the fundamentals of the earlier works regarding organizational processes and needs. In providing a summary on the most important information on organizational learning (especially at the executive level), reviewing the works of Dixon (1999) can be highly rewarding.

Wednesday, November 20, 2019

Case Report, Warner brothers Study Example | Topics and Well Written Essays - 1000 words

Report, Warner brothers - Case Study Example Horn is presented with the dilemma with what strategy to adopt to produce and market movies that generate revenues and compensate for other low performing ones. On one hand, selecting the right script is guided by factors like experience, star loyalty, some specific genres of movies which are always liked by the audience or a rival spearheading a new concept which can be marketed along similar story lines. On the other hand, there are various other operational and strategic factors which shape up the selection decision and are based on more of data than intuition or gut feeling (Pisano & Wagonfeld 2009). One of the most essential components to pay attention to and analyze is the risk taking and sharing basis. Warner Bros. typically do not share risks of producing and marketing a movie with other studios and puts in the entire capital and efforts with an optimistic view of getting the risk-return trade-off. However, with such mammoth budget big-event films which are constrained by pub lic acceptance, rival moves and reduced opening weekend sales, risk sharing should essentially be a part of green-lighting a project. True that if successful, the movie will garner huge revenues to the studio and provide for even low budget movies that have failed at the box office. But in case, any of the above $200 million movies did not capture the expected response or fails in the successive weekends, the entire financial statement of studio can dissipate. With risk sharing, the studio can still remain optimistic and energetic of producing and marketing the movies in pipeline, which would otherwise be thought of as sheer waste of money and efforts on account of observed failure and huge losses. Trend of videos and DVDs is capturing fast with audiences turning to this medium more than actually visiting a theatre. Apart from traditional sources of revenue, studio revenues like theatre contracts, sale of broadcast television rights and videos and DVD sales are fast catching up, lea ving behind normal box office revenues. Warner Bros. operates on the philosophy of vertical integration which provides it with increased access to downstream distribution channels. This practice can be improved with more focus on securing additional studio revenues. This can also reduce the risks which are more frequent in box office openings. Television broadcast rights, theatre contracts and such other studio revenue streams are considered to be more immune and hence, they should be treated as risk management activities where every single film is a time and cost based project. Marketing campaigns play a significant role in the success or failure of a movie. It educates the audience about what actually is contained in the movie. Trailers are extracted from the movie run itself, which are some exceptionally excellent scenes to hit the psyche of the target audience. With every market, trailers are customized according to the choice, language, seasonality and preference. Trailers befo re launching the movie are generally for box office purposes. However, what if trailers are also developed for television broadcast and theatre screenings simultaneously with box office openings! This could eliminate the fear of a disappointing opening weekend where theatre screenings and sale of videos and DVDs could counteract the losses of bad openings. Maintaining relationships with distributors, actors and directors is yet another

Sunday, November 17, 2019

CUSTOMER CARE AND ROLE OF THE OVERSEAS REPRESENTIVE Essay

CUSTOMER CARE AND ROLE OF THE OVERSEAS REPRESENTIVE - Essay Example Large organisations are observed to be expanding their businesses globally in order to maintain their competitive position amid their competitors by offering an assortment products based on the local needs and preferences (Blaxter & et. al., 2001). However, it has often been viewed that the aim of expanding is considered to be one of the major tasks which at times results in negligence in the way customer satisfaction should be taken care of. With the changing demand in the preference of goods amid people, it has become vital for every organisation to implement new steps that would help them to fulfil the rising demands of their customers. Today’s tourism industry is recognised as one of the growing global industries. It has been measured that today many students selects travel and tourism as their field of study and chose to select it as the way of earning their livelihood. Additionally, tourism industry is viewed to provide challenging and exciting working environment which is attracting more people towards it. Overseas representatives are essentially organisational members who represent themselves as an authorised person to act as an official delegate or agent. The role of overseas representatives in a tourism industry is essential as they are responsible to look after all the requirements of their customers, which in turn helps in building better customer relationship with the organisation. Although tourism is considered to be a growing industry, it has been viewed that minimum research has been conducted to study the importance of overseas representatives in tourism industry and their role to maintain good customer care. In this regard, organisations or people who mainly aim to study the role of overseas representatives in tourism industry and their role in maintaining good customer care level would be attracted towards this research as it would aid them to understand the various factors associated with the job role and the importance of overseas re presentatives in tourism industry (Dale & Oliver, 2005). The Research Questions Based on the selected research topic, the two research questions that would be addressed in the proposed study are â€Å"what are the roles of overseas representative to establish better customer car

Friday, November 15, 2019

Example Physics Essay

Example Physics Essay The Motion of a Mass Spring System The example of a mass attached to the end of a spring is a powerful tool in physics due to the fact that it is analogous to many physical phenomena. To be able to use this example to elegantly describe other more complex systems it is crucial to first fully understand how this simple system works itself. The force acting on a mass attached to a spring at a given position is given by (Serway, 2003: 437). F= -kx (Eqn 1) This equation may be derived from Newton’s Second Law of motion, which states that the force on a mass is proportional to the rate of change in momentum. A mass and spring system can be described as a Simple Harmonic Oscillator and there are some fundamental equations that govern the motion of such a system (Serway, 2003: 436). ω= √(k/m) (Eqn 2) Equation two shows how the angular frequency (ω=2Ï€*frequency) of an object oscillating due to it being fixed to a spring that is inversely proportional to the mass of the object. k is a constant, known as the spring constant that is defined by the properties of the spring. k can be easily determined experimentally for a given spring by changing the mass attached to the spring and measuring the frequency. Due to the periodic nature of such a system as that which can be described using equations one and two, they are known to be in simple harmonic motion. The motion of a particle over time is described effectively by a cosine wave (Serway, 2003: 436; Hayek , 2003; 562). x(t)=Acos(ωt+à Ã¢â‚¬ ¢) (Eqn 3) Equation three shows how this motion can be mapped over time where A is the amplitude of the oscillation, and à Ã¢â‚¬ ¢ is a term to correct the phase. This can be plotted to show how the mass and spring system will move over time. The figure above shows how a mass on a spring will behave in a frictionless universe while obeying Newton’s First Law of motion. A useful trait of the Simple Harmonic Oscillator is that the equations for the velocity and the acceleration are easily derived from that of the position equation (Serway, 2003: 436). V(t)=-Aω.sinà ¢Ã‚ Ã‚ ¡(ωt) (Eqn 4) a(t)= -Aω ² cosà ¢Ã‚ Ã‚ ¡(ωt) (Eqn 5) For brevity the phase term (à Ã¢â‚¬ ¢) has been omitted from these two equations as it can be assumed that phase is the same. These two equations give valuable insight into the nature of as mass on a spring and how its velocity and acceleration is linked. The interesting thing to note is that velocity is governed by a sine waveform, yet acceleration is dependent on the cosine waveform. What this means is that when the particle on the spring has minimum velocity it will have maximum acceleration, it also means that when the mass is travelling at its maximum velocity it has minimum (possibly zero) acceleration. Realistically however, most situations where a simple harmonic oscillator may be applied will involve a resistive force of some description, such as friction in the case of a mass on a spring. The effect this has on the motion of the mass and the spring system can be seen in the figure below. It is clear to see on the above figure that the presence of friction causes the amplitude of the oscillation to decay over time. This effect is known as damping. In a damped system that has no external force driving the oscillation itself, the rate at which the oscillation decreases is directly proportional to the resistive force being applied to it. The damping force is at its greatest when the particle is moving at its fastest velocity and at a minimum when the acceleration is at a maximum. There are three types of damping in an oscillatory system, underdamping, over-damping and critically damped. Underdamped is where the amplitude of the decay envelope does not decay rapidly. Critically damped systems are the fastest to return to equilibrium and will have a decay envelope that allows one oscillation over the entire damping period and will decay towards zero rapidly during this period. Over-damping occurs when there are no oscillations (as seen in critical damping) however there is an infinite time to return to equilibrium (Hayek , 2003; 567). The equation which describes this damped oscillation is given by: F= -kx-l dx/dt (Eqn 6) Here the original equation for the force is extended by a first order differential term relating to the change in the velocity due to the damping constant l. Equation six is able to be expanded into a more useful form by applying Newton’s Second Law, which gives: (d ² x)/(dt ² )+2Dω_0 dx/dt+ω_0 ² x=0 (Eqn 7) This equation now contains a first and second order differential equation relating to the velocity and acceleration respectively of the particle. Equation seven looks to be much more complex than that of equation six, however it is now in a considerably more useful form as it allows to see equation six in terms of the angular frequency of the system. D is the damping ratio and is given by D= l/(2√mk) , taking into account the damping coefficient, the spring constant and the mass of the particle. To fully understand the motion of the mass and spring system there must be consideration of the energy within the system. This may be done with the help of some simple drawings. The blue lines indicate the spring and the solid red block with a blue border indicates the mass. From the figures it is possible to imagine stretching the spring, this means that there is a force acting on the mass and if it is held at this stretched point (x) the mass will have a potential energy U. should the mass be released from this point it will have a maximum velocity Vmax and a maximum Kinetic energy KEmax. The total energy in the system at any one point in time is the sum of the potential and kinetic energies. E(t)=KE+U (Eqn 8) E(t)=1/2 mà £Ã¢â€š ¬Ã¢â‚¬â€œv(t)à £Ã¢â€š ¬Ã¢â‚¬â€Ã‚ ²+1/2 kà £Ã¢â€š ¬Ã¢â‚¬â€œx(t)à £Ã¢â€š ¬Ã¢â‚¬â€Ã‚ ² (Eqn 9) By substituting the formulae for velocity and position (equations three and four) into the energy equation it is possible to simplify this further. E(t)= 1/2 kA ² [à £Ã¢â€š ¬Ã¢â‚¬â€œsinà ¢Ã‚ Ã‚ ¡(ωt)à £Ã¢â€š ¬Ã¢â‚¬â€Ã‚ ²+à £Ã¢â€š ¬Ã¢â‚¬â€œcosà ¢Ã‚ Ã‚ ¡(ωt)à £Ã¢â€š ¬Ã¢â‚¬â€Ã‚ ² ] (Eqn 10) E(t)=1/2 kA ² (Eqn 11) The elegance of this simple algebra is that for an oscillating mass on a spring the energy in the system at any given point in time is completely independent of time. If there are dissipative or driving affects occurring during the oscillations then the amount of energy in the system will change, however for a closed system this fact holds true. This equation occurs in many areas of physics, for much more complex systems than a single mass on a spring. These equations can be applied to pendulums, resonant electrical circuits (RLC circuits) (Mispelter, 2006: 35) such as those used to detect Radio and TV signals, or even in quantum mechanics and the time independent Schrodinger equation, where it is found that a quantum harmonic oscillator, such as a particle in a potential well (Schrà ¶dinger, 1926: 1054), is one of the few quantum mechanical problems that it is possible to find analytical answers for. If the Hamiltonian for such a system is examined it is shown that its structure is very similar to that of equation nine (Schrà ¶dinger, 1926: 1057; Levitt, 2012: 144). H ÃÅ'‚= p ÃÅ'‚/2m+1/2 mω ² x ÃÅ'‚ ² (Eqn 12) p ÃÅ'‚ is the momentum operator that forms the kinetic half of the Hamiltonian and x ÃÅ'‚ is the position operator which calculates the potential part of the Hamiltonian (Schrà ¶dinger, 1926: 1052). It is obvious that the simple classical physics still applies to this quantum system. These are some of the situations where this type of motion is observed and the table shows how the equations are manipulated to fit the system under examination ( Hayek , 2003; 562; Mispelter, 2006: 38; Dirac, 1958: 108; Boylsestad, 2010: 871). In conclusion the mass and spring system’s motion is elegantly described by some simple mathematics that can be manipulated to suit systems that have external forces acting on the motion of the system. The beauty of this is that the mathematics can then be applied to much more complex systems. References: Boylestad, Robert. (2010) Intrductory Circuit Analysis, 12th edition. Pearson. Dirac, P. A. M. (1958). The Principles of Quantum Mechanics, 4th edition. Oxford University Press Hayek, S. I. 2003. Mechanical Vibration and Damping. Encyclopaedia of Applied Physics. Levitt, M. (2012). Spin Dynamics, Basics of Nuclear Magnetic Resonance 2nd edition. John Wiley and Sons Ltd. Mispelter, J. (2006) NMR probeheads for biophysical and biomedical experiments: theoretical principles practical guidelines. Imperial College Press. Schrà ¶dinger, E. (1926). An Undulatory Theory of the Mechanics of Atoms and Molecules. Phys. Rev. 28 (6) pp 1049-1070. Serway, R. A., Jewett, J. W., Serway, R. A. (n.d.). Physics for scientists and engineers, with modern physics. Belmont, CA: Thomson-Brooks/Cole.

Tuesday, November 12, 2019

Miseducation of Filipino Essay

Prof. Renato Constantino, in his essay entitled â€Å"The Miseducation of the Filipino†, writes about the coming about of the miseducation and the consequences of such action in the lives of the Filipinos, then, now, and perhaps the future. Promoting and imposing the â€Å"unFilipino† identity in Filipinos was the miseducation that Americans pursued during the time when they â€Å"posed† as a benevolent ally to the Philippines, and they proved victorious indeed because they had completely subjugated the Filipinos, both in minds and in hearts. Education is a very vital factor for one’s development. And as we all know, through education, one’s mind is molded because of the teachings, ideas, and values taught to him. Due to this fact, it’s only either of the two that will happen: the person will become productive provided that he was taught with the right things, or, the person will become otherwise since he acquired negative things. Personally, I learned and realized many things about the history and relationship between the Americans and the Filipinos upon reading this paper. It is quite intriguing what the main reasons really were the Americans in taking power over the Philippines. Was it for the good of the Filipinos or the Americans’ good? Whatever it was, they succeeded in almost every aspect of conquering the land because they knew the most effective way to subjugate Filipinos minds: by controlling our education. They created a new generation of good colonials, the â€Å"unFilipino† Filipinos. The indigenous ways of life of Filipinos had been changed to the American way of life. That was ridiculous because certainly, America and Philippines vastly differed from each other in so many ways, and therefore, their ways of life based on their differing needs should be entirely different. But the Americans insisted on creating a â€Å"carbon-copy† of themselves in Filipinos through the imposition of their language in their education. I went to elementary and high school in the Philippines, and I know for a fact they used both English  and Tagalog as the media of teaching. In the long run, I think this resulted in both positive and negative ways — positively, because I was uprooted to the U.S. and I was able to use the â€Å"smattering† English I know to communicate with others, and negatively, because as I have just realized, I feel the â€Å"impediment† in my thought process because I cannot think consistently in one language. All in all, I liked this piece because it reiterates the importance of education to not only produce literate people but also to produce people who would use that education to better their nation.

Sunday, November 10, 2019

A Doll’s House and the Macaroon

Gloria Nguyen Period 5 2010 February 24 A significant symbol in A Doll’s House by Henrik Ibsen are the macaroons that show up several times within the course of the play because it shows that Nora is not truthful to Torvald and that their household is tangled up in a web of deceit. â€Å"She slips the bag of macaroons in her pocket and wipes her mouth†¦ †. Nora knows that Torvald dislikes her spending money on guilty pleasures like macaroons so she tries to hide them, just as she tries to hide the truth of her bond and debts. The macaroons also show that Nora is uncomfortable with all of the rules and regulations Torvald has set up and that she has her own will and mind set. When Torvald asks her if she had any macaroons, she immediately responded with â€Å"No, Torvald, really; I promise you. It shows that she may have a different set of morals than Torvald and that she is not at all comfortable in her living situation and Torvald is not one of her confidants like Dr. Rank and Mrs. Linde. The macaroons show that Nora is not the perfect doll that Torvald tried to mold her into. The macaroons function in the text was to show that although that some families and lives seem picture perfect, most of the time it is not true, as proven by Nora’s need to hide the bond and macaroons from Torvald. The macaroons could also represent Nora’s want to be independent and free, that she wants to rebel and be someone of her own making as opposed to being Torvald’s little â€Å"songbird†, â€Å"squirrel† and â€Å"capricious Capri†. Ibsen’s use of symbolism in using such a minor pleasure impacts the story in a huge way by subtly showing the reader that Nora’s lifestyle is not as truthful and happy as it seems and that something as small as an innocent white lie about macaroons can set the precedent of lies that are to come.

Friday, November 8, 2019

Urbanization As A Social Problem Essays - Human Geography

Urbanization As A Social Problem Essays - Human Geography Urbanization As A Social Problem Urbanization as a Social Problem How is urbanization negatively effecting our society? The answer to this question is not a simple one. This essay will not only break down the problems of urbanization in the United States, but it will also tell you some of the attempts made to fix the problem and give some solutions as to how it could possibly be solved in the future. Also when answering this question one must understand that urbanization, can not be stopped, but only contained in a manner that will help the United States to function better as a country. The more densely populated and more heterogeneous a community is, the more accentuated characteristics can be associated with urbanism. Urbanism causes decrease in per capita, and promotes urban violence, political instability, crime and aggressive behavior. Rapid population growth in urban areas also perpetuates poverty. Another major issue being created by this social problem is the breaking of the traditional family structure. Our cities are not working well! Sanitation, safety, transportation, housing, education and even electricity are failing. These are all responsibilities of the government or it is at least their job to regulate these services deemed to be monopolies. And it is a known fact that monopolies deem toward inefficiency. Functionalist look at our cities as a means to profit. Cities are a place where everybody visits, and therefor vendors can raise their prices and profit more on their products. For example, from my own personal experience, I bought a pack of cigarettes for $3.00 at my local gas station, and when I visited inner city Orlando, I bought the same brand of cigarettes for $4.00. This is just a minor example, and most of the residents in an urban area are in poverty and have trouble affording the $3.00 pack if they smoke much less adding a dollar to the already ridiculous cost. In the United States, the breaking of the traditional family structure is an issue that has become increasingly noticeable in recent years, particularly in urbanized areas. The traditional, mom and dad, and children are rarely seen in the inner cities any more. There is a weakened bond of kinship, and declining social family significance as America has transferred industrial, educational and recreational activities to specialized institutions outside of the home. It is depriving families of their most characteristic, historical functions. While individuals pursue their own diverging interests in their educational, vocational, religious and recreational life. With divorce rates rising, delinquency is also becoming more of a problem than before. With single parent families, children lack in the authority department due to the lack of the amount of time their parents have free to raise them. These specialized institutions often help, but can not replace the role of a childs guardian. As long as the divorce rate continues to increase, delinquency will continue to increase in these areas as well. The density of people reinforces effect of numbers in diversifying people and their activities and increasing the complexity of the social structure. The variations of people give rise to segregation of people by race, religious practices, ethnic heritage, as well as economic and social status. Segregation often creates much tension and prejudice between social groups. This can cause physical or mental damage to individuals or society, which means that sometimes people may permanently suffer before any action is taken to solve the problem because the delay in action is most often the result of people underestimating the problems. As for racism and segregation, there is not much that can be done to fix these problems. Individuals will always have their own opinions no matter how ignorant, and the only thing we can do is to hope that these problems die out as we desegregate our communities. People will choose their destination or place of residence according to many different ideals and needs, for example what fits their budget. Political pathology and population growth is closely related because of the population change and this change carries with it a high likelihood of social disruption. Government assumes major responsibility for development attempting to meet rapidly increasing demands for education, housing, agriculture and industrial development, transportation and employment. The governments budget is not distributed equally mainly due

Wednesday, November 6, 2019

The drop time of the paper helicopter Essay Example

The drop time of the paper helicopter Essay Example The drop time of the paper helicopter Paper The drop time of the paper helicopter Paper If the mass of the paper helicopter increases, then the drop time of the paper helicopter will decrease because the paper helicopter with the greater mass will take a longer time to reach terminal velocity ( when there is a balance of forces and thus zero acceleration) which results in a shorter drop time because the object is still accelerating. The mass of the paper helicopter will be measured by using 5 paperclips of each . 7g and the same paper helicopter whose mass is . The drop time will be measured with a stopwatch . The timing will start when the hand lets go of the paper helicopter at a drop height of 1 meter and stop when the paper helicopter touches the floor. The same person will be timing for each trial. A control of this experiment would be having the drop height the same throughout the experiment. This will be measured by using a meter stick and marking the height at which to drop the paper helicopter. The paper helicopter will drop at that marked height each time. Another control of this experiment would be having the same person timing the experiment for every trial. To keep the data as consistent as possible, the experiment will be using the same stopwatch, electric scale and paper helicopter each time. Another control would be using 5 paperclips of each with a mass of .7g . Measure each paperclip by placing them (on at a time) onto the electric scale and record. Based on the data collected, the hypothesis is accepted because as the mass of the paper helicopter increases, the average drop time decreases. This is evident in the data collected because the paper helicopter with a mass of 1g   had the highest average drop time of while the paper helicopter with a mass of 3. 8g had the lowest average drop time of. This is due to Newtons first and second law. Newtons laws states that an object will accelerate if the forces acting upon it are unbalanced and the amount of acceleration is directly proportional to the amount of net force acting upon it. Falling objects initially accelerate because there is no force big enough to balance the downward force of gravity so the object will continue to accelerate until the air resistance force increases to a large enough value to balance the downward force of gravity. Thus the objects (in this case paper helicopter) with a greater mass will continue to accelerate for a longer period of time then a paper helicopter with a lower mass which thus results in a decrease in drop time. One of the biggest weaknesses in this experiment was the human error with the reaction time when starting and stopping the stop watch. It is impossible to correctly start and stop the stop watch when the paper helicopter drops because of human reaction time (time needs to pass before the thought from the brain reaches the hand to start and stop the stopwatch). This serves as a limitation because although the stop watch was controlled by the same person each time, a different time lapse will pass each time thus causing the inability to accurately time the helicopter drop each time. Another weakness would be that since the person holding the paper helicopter each time has to move their hands, the angle at which the paper helicopter is dropped wont be the same each time which results in a shorter or longer drop time if the paper helicopter lands closer or farther from where it was dropped. There are several ways to improve this investigation to make the data more accurate. To decrease the lapse in stopping the stop watch, using a higher drop height would give the person timing more time to react to when the paper helicopter reaches the floor because the original procedure allowed (at max) 65 seconds to react from the time it took the paper helicopter to drop from the drop height to the floor. Another way to improve this investigation would be to create a stand that will hold the paper helicopter at the same drop height and angle each time so that the distance that the paper helicopter will land will be the same each time. This will reduce the error in time because of a shorter or longer landing distance.

Sunday, November 3, 2019

Female Objectification in Contemporary Films from Different Origins Research Paper

Female Objectification in Contemporary Films from Different Origins - Research Paper Example This is due to the fact that individuals are physical beings and thus present themselves to others as objects via their behavior and dressing (Caterina 709). Objectification is an issue because of its frequency among women especially as portrayed by the media. Contemporary examples of women objectification as sexual beings are reflected through various films. This research paper uses the feminist theory of gender equality to give critical discussion of women objectification as portrayed in three contemporary films. The research is based on different film productions to achieve sufficient analysis and discussion of female objectification within contemporary films that emanate from different social cultural origins. The research is specifically an investigation into the roles and objectification that is revealed by female characters within the films. The way female characters in the films are labeled is used to discuss the influence it has on the manner men treat women in relationships . A qualitative research methodology is employed in the research. The presentation of research findings will specifically apply psychoanalysis, semiotics, ideological analysis and historical and rhetorical models. The movie Pretty Woman was directed by Garry Marshall and became one of the most successful romantic comedies in the history of cinematic production (Hulse 23). The movie depicts implausible romantic relationship between Edward and Vivian. The disparity between the two is presented by the fact that while Edward is a multimillionaire in the wheeler-dealing business, Vivian is a Hollywood prostitute (Hulse 23). The film How Much Do You Love Me on the other hand is a French production which also has same thematic as Pretty Woman. In the film How Much Do You Love Me, the themes of love, money and desire are presented through a relationship between Francois and Daniela (Clark 15). Daniela is an Italian prostitute while Francois is portrayed as a regular who earns just enough fo r expenses and rent. The Movie Moulin Rouge is British production directed by Baz Luhrmann. On the other hand, the movie Moulin Rouge is about Christian, a British poet who meets a seductive courtesan called Satine in a night club and falls in love with her (Business Wire 1). The three films have a commonality in themes and the fact that female objectification is apparent as they unfold. The feminist theory as postulated by feminist scholars argues that female objectification emanates from the disregard of intellectual abilities of women. This leads to labeling women as instruments of physical pleasure through sexual encounters with men (Felicia 178). The movie Pretty Woman rankle feminists. This is due to the fact that Vivian objectifies herself by presenting herself as a commodity (Turner B1). Feminists are most likely disappointed by the manner in which Vivian dehumanizes herself. Vivian is also portrayed as yearning for a knight who would rescue her. The objectification that is represented by the manner Vivian is dressed, behaves and talks is a requirement for her line of work is not definitely acceptable by the proponents of feminism. It is evident that women are labeled as sexual objects within the movie Pretty Woman especially in its early scenes. Pre-feminists are represented by a historical view of the role of women within the society. Pre-feminists stand against labeling a woman as a mother who stayed at home and acted as submissive wife (Fredrickson and Tomi-Ann 173). Watching the

Friday, November 1, 2019

Audiovisuals MaterialsTechnologies Used To Help Students With Learning Essay

Audiovisuals MaterialsTechnologies Used To Help Students With Learning Disabilities And How Are These Students Incorporated Into The Regular Classroom - Essay Example However, special attention and different teaching strategies should be employed by the teachers for this system to be effective. Students with learning disabilities have strengths and weaknesses that affect their learning. For teachers to be successful, they need to identify these points. Upon identifying these strengths and weaknesses, the teachers should work to enhance the students' skills and work to improve on the students' weak points. (Alberta Education , 2002) Teachers can start by guiding their students using an organized system. Teachers are encouraged to pay special attention and give extra time to such students for a certain period of time and slowly adjust the intensity or level of guidance according to the progress made by the student. This should be done until such time that the student can work independently. (Alberta Education , 2002) There are a variety of approaches that teachers can employ in teaching students. These approaches are like tools or strategies that will help the teachers in making the challenging task of imparting knowledge to these special students a lot easier. Students will also experience the benefits of the learning experience with the aid of such strategies. Professionals in the field of education are constantly doing research and looking for ways to improve the systems of teaching, especially students with learning disabilities. They believe that by carefully understanding the case of each individual, employing the right approach for each, and carefully monitoring their progress, there is a great possibility to improve and even correct these disabilities in the regular classroom setting. As much as possible, teaching professionals would like to address learning problems in the regular classroom setting without having to resort to special education classes. Before a student is referred to enroll at a special education program, the teachers conduct an assessment test called the Response-To-Intervention or (RTI). This is to make sure that all efforts are exhausted in the regular classroom setting before resorting to special education programs. Identification is the first step in teaching students with learning disabilities. There are two standard approaches in identifying proper strategies in teaching special students. There is the problem solving approach and the standard protocol approach. (Teaching LD, 2005) According to the website "Teaching LD", the problem solving approach involves four steps. These are proble m identification, problem analysis, plan implementation, and problem evaluation. (Teaching LD, 2005) Problem identification involves observing the students' behavior while in class to determine and enumerate the problem areas that need attention. After the teacher determines the students' weakness or limitation, the teacher check on the possible factors or causes that bring about the problem and develops a plan to address the situation. Plan implementation entails carrying out the plan set to solve the individual's problems. Problem evaluation is the last step. Here, the effects of the solutions implemented are checked vis--vis the problem of the student to determine if significant improvements have been made due to the implementation of the solution. This step is very important to determine whether to