Tuesday, April 30, 2019

Report on the Role of Project Management in the Modern Business Essay

Report on the Role of Project Management in the Modern agate line Enterprise - Essay Example3.1. The author used the books listed in the appropriate section marked root List. Each book was reviewed and their relevant contents included in this report. In-text citations refer to direct quotations lifted or paraphrased from these references.4.1.1. A Project is a temporary endeavour undertaken to achieve a particular aim. Every despatch is time-bound, constrained by time and resources, temporary and unique, may involve human resources from one department or from the whole organisation, and require planning, execution, and control (PMI, 2004, p. 3-4).4.1.2. Project Management is the application of knowledge, skills, tools and techniques to a broad range of activities to run the requirements of the particular get off. Project direction knowledge and practices are best described in terms of their parting processes Initiating, Planning, Executing, Controlling and Closing (PMI, 2004, p . 8).4.1.2.1. A project management team established to work on the project has the task of balance and satisfying several (often competing) stakeholder interests as to the projects scope, deadlines, financial requirements, risk, and quality while achieving the projects objectives (PMI, 2004, pp. 9-10).4.1.3. Efficiency and enduringness are respectively defined by Drucker (2003, pp. 66-67) as doing things right and doing the right thing. He adds that balancing both is the mark of a dividing line enterprise that is managed properly.4.1.3.1. Modern business enterprises are characterised by complexity, the contend for reaction speed to changes in the marketplace, and business competition.4.1.3.2. Project management use in modern-day business enterprises range from the mundane (organising an employee party) to the extraordinary (moving the head office to another location), and from the simple (investigating the failure of a mod product) to the complex (launching a marketing informa tion system). All these involve the use of resources (people, finances, materials, and facilities) that need to be managed through and through a set of activities to achieve a defined objective within a specific timeframe and each(prenominal) provides a venue for the application of project management tools.4.1.3.3. Several project management tools available to modern business enterprises enable them to manage projects with efficiency and effectiveness. Most of these tools developed in the 1950s from the scientific management theories of F.W. Taylor established in the late 19th century were

Monday, April 29, 2019

Is globalization rendering nation-states weak and irrelevant Discuss, Essay

Is globalization rendering nation-states weak and hostile Discuss, with examples - Essay ExampleThe economical strength of a nation defines its political powers.Globalization has presumptuousness modernise to strong nations both economically and politically. Globalization fosters economic mutuality. States become key producers of certain products and services, while they hope on other nations for other insufficient products (Hirst & Thompson, 2002, p.279). This capacitates nations to trade freely thereby leading to a large increase in the GDP of such(prenominal) nations across the globe. The capability of a nation to avail such products and services globally renders such a nation to be significantly relevant in pliant world economy, thereby strengthening its political strength. For instance, various oil-producing nations have a significant economic relevance globally. However, they ought to rely on other nations that produce other products such as agricultural and technologi cal products.The interdependence that globalization creates is significant in promoting political stability among nations, thus promoting peace globally. The economic interactions have fostered the victimization among nations, particularly the ontogenesis nations through the importation of human resource capabilities such as technological and occupancy expertise (Hirst & Thompson, 2002, p.189). Additionally, developed nations have been able to bring in cost-effective human resource from the developing nations, and this has scathing improvement in the improvement of productions of such nations. As such, various countries play a critical role in shaping the global economy.The transcendence of a global economy across borders has given rise to various bodies that include the Word Bank and IMF among others. These bodies play a critical role in the globalization, since they implement policies that aid in controlling word trade. Besides, these bodies significantly aid nations in propell ing their economic capabilities through

Sunday, April 28, 2019

Cultural Studies abstract Essay Example | Topics and Well Written Essays - 500 words

cultural Studies abstract - Essay ExampleIssues related to the original shape and authenticity of the tales of Kitaro in the graveyard atomic number 18 examined by comparing various forms of the paper in Kami-Shibai and the variations generated during the transition from Kami-Shibai to rental Manga. These be based on researches on street Kami-Shibai and rental Manga.Creation in Kami-Shibai, which has no prior story documented, depends mainly on sequencing of images with speech language and reaction from the audience. Therefore, as for street Kami-Shibai, the accumulation of various versions as one story must be put into consideration. Orality, a main feature of Kami-Shibai, is subject to fundamental and crucial transformations imputable to changes in representation techniques and authorship during its transition to Manga. The consciousness and analysis of Manga readers are centered primarily on words or text. The recipients of Manga and animation tend to be categorized as fanatic s and this makes the issue of popular purification use and ownership even more complex.This paper also tackles the authorship and ownership of popular refining in the age of technological media. The relationship between cultural likeness and transformation of media technology is discussed slice the arguments of studies on transmission densho in Japanese folklore studies, anthropological resemblance, power in cultural studies, and creative similarities are examined in discussing actual copyright issues of Manga, digital copyright, and problems encountered in its creation on the

Saturday, April 27, 2019

Adjustment Letter Case Study Assignment Example | Topics and Well Written Essays - 500 words

Adjustment Letter Case Study - fitting ExampleLate delivery may adversely affect the stakeholders in case the Hesse decides to withdraw their account. However, their long relationship may favour restoration of good pull up stakes.The letter provide address the acceptance of the companionship to refund the fee of $3200. Acceptance of the return go out help address the primary demand of Hesse. It will send an apology due to late delivery and poor communication to the Hesse. It will also involve an explanation for failure to pick goods as agreed and provide a future solution in case of similar incidents.The cause of the late delivery resulted from communication failure. Thus, the new quality control criterion will make sure of an efficient communication system. Effective communication system will jibe in case of nay changes in company Hesse, and other customers get information. In addition, the service will work even on holiday days to make sure communication flows well.Physica l environmental factors. For example, the break in on Coastal Moves resulted to disabled of access cards and loss of company laptops with several(prenominal) access codes. Disabling of access cards gave the company a setback in line of communication. Thus, this will help in justifying an apology to

Friday, April 26, 2019

Stakeholders of the software industry Research Paper

Stakeholders of the bundle industry - Research Paper ExampleConspicuously, study on the choice of computer software product harvest-homes is the most seek by consumers. It is imperative that developers of software products disseminate this information not only in a seasonable manner and also ensure that the information publicized is accurate and detailed (Myers, 1999). To obtain this information about a products quality, design, requirements, and implementation, it is important that developers of software products carry out different tests at the various phases of their production line. Such interrogatory processes not only give information on the quality of a product but also enable an independent and unprejudiced view of a product not only by its developers but also by its users (Myers, 1999). In addition, the developer of software product whitethorn be in possession of the opportunity to appreciate and understand the risks of the design, development, and execution softw are (Myers, 1999). Contrary to common belief among laymen, software testing extends beyond tests done to ascertain whether a product can be executed or applied and testing to identify or discover bugs it encompasses all the processes by which software is validated and verified. In addition, software testing seeks to establish whether a product has adhered to the design and development requirements and can be effectively executed with similar features. What is more, software testing seeks to establish whether the needs of all stakeholders pull in been achieved in a product (Willison, 2004). One fundamental facet of software testing is that it can be done at any stage of the development and implementation of software, depending on the type of testing advised or adopted. This opus explores the notion that software testing is used to show that software business offices properly. More precisely, the paper discusses the use of software testing to prevent and/or eliminate faults associ ated with requirements, design, analysis, and implementation. Software Testing for Prevention of Faults Recent times have realized an increase in the popularity of software testing in the software development industry. Software testing in the software industry entails not only the activities in the development cycle of software but also beyond. The importance of software testing is best highlighted by the fact that quite many users have experiences of software not working as expected. Evidently, faulty software has quite huge impacts on organisations. Among the consequences of software that do not work include financial losses, time losses, damage to business reputation, injury or death for safety-critical systems (Willison, 2004). The first way by which faulty software may result in financial loss is due to non-compliance to legal requirements. Regrettably, the testing phase of software development is never accorded the seriousness it deserves from software developers and managers . This situation exists despite the fact that testing is the only way to ascertain whether an application is likely to function properly after it is deployed to the market. Due to its importance in ensuring a product is correct, there are several(prenominal) recommended approaches to and reasons for software testing (Willison, 2004). Although it gets a little attention, software testing remains a rather inviolate and important phase of any project on software development. That is, it is only via software testing that a developer may ascertain whether a software project or product is poised to succeed in the market or is doomed (Willison, 2004). It is important that software developers must have an approach that focuses on serviceable testing, characterized by the verification of whether software

Thursday, April 25, 2019

Descriptive Profile of Milford Sound Fjord Essay

descriptive Profile of Milford Sound Fjord - Essay ExampleThey stand tall on either slope of the narrow curving inlet and rise towards the sky protruding from the stretch of water. While some hills argon coated a dark green hue with trees and appear all soft and bushy, others have streaks of lighter green canopy adorning them. Yet some others appear a bit grayish and rocky, whereas the peaks of the mountain argon snow-capped with bits of a green impression on them like the ones done to blend two antithetic colors in a painting. The unobjectionable mist that seems to hang only on the mountain peaks ar actually the vast spread clouds. There can also be seen clouds in the form of white fluffy puffballs that encircle the peaks giving the idea of a pointed birthday hat with a sphere on top.At some parts of the mountains, the eye catches white moving streaks falling towards the ground, which are the temporary water travel created by and by the heavy rains. However, the Milford Sound proudly shows off its two cascading beauties, the Stirling Falls, and the Lady Bowen Falls. The Bowen River trickles along the hill before it falls off the cliff and splashes into the inlet. The clear deep blue inlet is almost always dotted with ships that get hold of in tourists from all around the world. The blasts made by the whistles of the ship bounce of the cliffs and fade into the distance. Another tummy to watch is when the powerful winds blow, the temporary waterfalls get pushed back vertically and they tend to move upwards, as the menstruum of the water is changed by the wind. If one is lost in a hypnotic trance from the scenic beauty, they forget be brought back to senses by the calls of dolphins, seals and also the penguins, just like I was. A rare savage present here is the Whio (blue duck), the males of which whistle and the females make guttural rattle-like calls (Milford Track 5).The climate at the sound is precise pleasant as there is rainfall mostly and it pr oved to be much better than whatever man-made equipment that adjusts room temperature.

Wednesday, April 24, 2019

Pre-Raphaelite Women in Rossetti's The Girlhood of Mary Virgin Essay

Pre-Raphaelite Women in Rossettis The girlhood of Mary pure - Essay ExampleThis is that blessed Mary, pre-elect, Gods Virgin. Gone is a great while, and she Dwelt modern in Nazareth of Galilee. Unto Gods will she brought devout respect, Profound simplicity of intellect, And supreme patience. From her mothers knee Faithful and hopeful sagacious in charity Strong in grave peace in pity circumspect. So held she done her girlhood as it were An angel-watered lily, that near God Grows and is quiet. Till, one dawn at home, She woke in her white bed, and had no fear At all, -- yet wept till sunshine, and felt awed Because the fullness of the time was come. II. These are the symbols. On that cloth of red I the centre is the Tripoint perfect each, Except the second of its points, to teach That Christ is non yet born. The books whose head Is golden Charity, as Paul hath said Those virtues are wherein the soul is rich whence on them the lily standeth, which Is innocence, being interpret ed. The seven-thornd briar and the pal seven-leaved Are her great sorrow and her great reward. Until the last be full, the Holy One Abides without. She in short shall have achieved Her perfect purity yea, God the Lord Shall soon vouchsafe His Son to be her Son1. The Girlhood of Mary contains strong religious symbolism. ... Gabriel Rossetti the artist Dante Gabriel Rossetti was born in London, England on May 12, 1828 with the given reveal of Gabriel Charles Dante Rossetti. His mother was Frances Polidori and his father was Gabriel Rossetti who as a poet had a affectionateness towards the works of the poet Dante Alighieri that he gave his first son the same namesake. Later, Rossetti put the Dante first ahead of his birth name Gabriel in honour of the poet he was named after. Dantes early works were said to be mirrored in the earlier works of Rossetti3. Dante Gabriel Rossetti had three other siblings (whom he was the eldest) who were equally talented. His other sibling, Cristina was also a poet honorable like her brother Dante Gabriel who sat as the Virgin Mary in the paintings of Dante Gabriel The Girlhood of Mary Virgin and Ecce Ancilla Domini. III. The capital of Seychellesn Female during Dante Gabriel Rossettis time Dante Gabriel Rossetti (12 May 1828 9 April 1882) was born during the reign of Queen capital of Seychelles who was the Queen of England from 1837 to 1901. During the reign of Queen Victoria (known as Victorian era), the idea of ideal feminine was copy after the queen herself. The respectability and figure of the ideal lady during the era of Queen Victoria surrounds slightly domestic purity as she dispenses her duty as a wife, mother and daughter 4(BBC 2004). This era is characterized as the domestic age as femininity was centered on family as epitomized by Queen Victoria who was the role model of marital stability and domestic virtue5. This social milieu during Dante Gabriel Rossettis time may have tremendously influenced his early works es pecially his first public oil painting The Girlhood of Mary when he describes his idea of lady to be innocent and pure This concept of womanhood stress

Tuesday, April 23, 2019

Letter to the Editor of the New York Times Essay

garner to the Editor of the New York Times - Essay ExampleNeither is it easy to confirm information gleaned via the gentlemans gentleman wide web. There is still a different sense of accomplishment that one can hand via the manual research method. Even with all of the eBook readers available today, holding a book and actually good turn the pages seems to make information stick better in our brains. Maybe because reading and comprehension were always meant to be a physical task. It was never meant to be completed by the swipe of a finger or a wave of the hand.Indeed, libraries are beginning to lose their relevance in our modern society. But that does not mean that it has lost its importance in the world of learning. Instead, libraries merely have to be brought up to picture with the latest technology and allow the city residents impoverished access to their books, internet service, and other learning tools without any additional costs.It is therefore important that we oppose th e idea of charging library social station fees if one wishes to use the facilities of the library. The in the public eye(predicate) library was never meant to serve only a few people. Therefore, it is up to the city folk to tot up up with the important fundraising programs that can help keep our public libraries free to use as yearn as you are a resident of this city.It is therefore important that we oppose the idea of charging library membership fees if one wishes to use the facilities of the library. The public library was never meant to serve only a few people. Therefore, it is up to the city folk to come up with the important fundraising programs that can help keep our public libraries free to use as long as you are a resident of this city.The public library should never be allowed to become a museum of the past. It is a vital and integral part of our future learning unconscious process and it shall always be of the utmost importance to most people who have an insatiable lo ve of learning.

Monday, April 22, 2019

How Leaders can overcome conflct, influence others and raise Essay

How Leaders can overcome conflct, model others and raise performance - Essay ExampleHowever, with this new insight, I can be well arm to face the boss on an equal footing. I have learnt how not to be held an emotional hostage in my relationships, whether personal or business.Being a leader, I might also have to use to taking my team members metaphorical hostages to achieve the desired results. As a leader, my ultimate goal would be to increase productivity and enhance performance. Thus, I would listen to use all the available skills to achieve this, including pursue in productive dialogue and resolution of tough problems.Through this write-up, I have learnt valuable tips on how to be an effective leader and overcome conflict by skillful negotiations. I would even try to influence others and raise the performance of my team.If we can understand the intricacies of our relationships, beliefs and values that shape our thinking, recognize and respect the inner dignity of the individ ual, we can be sure to act in an appropriate manner and be poverty-stricken from a situation in which we could be held as a metaphorical hostage.Thus, I can confidently say that I will not be held a hostage, emotionally or physically in any break dancen situation personal or business. I will be in a position to effectively deal with difficult situations both at work and in my personal life. The stub would be to be calm and composed in any situation and look for solutions, rather than give into the demands made by

The Decade of the 1960's Essay Example | Topics and Well Written Essays - 1250 words

The Decade of the 1960s - Essay ExampleHuman rights advanced during the disco biscuit but not without an extended, sometimes bloody fight. It was a collection of revolutionary acts designed to gain the fancy and mind of American society.Following WWII, black Americans, who had fought in segregated units, began to wonder out loud why they returned to an oppressive situation in a country they risked their lives to defend. Legal equality and economic opportunity was tough for blacks, particularly in Southern States. Jim Crow laws segregated blacks from schools, sections of town, restaurants and restrooms while preventing them from serving on juries, voting and exploitation various methods of transportation. The 1954 Brown vs. Board of Education Supreme Court decision invalidated the excuse of fall in was equal thus ending public segregation but the South didnt agree and for awhile didnt budge. The pledge of black Americans was put into the spotlight by the decision then the next ye ar. Rosa Parks stony-broke the law in Alabama by not moving to the back of a Montgomery urban center bus. A steady stream of public civil rights actions followed, making the 1964 Civil Rights Act inevitable. Racism, prevalent throughout the nation, was now in full demonstrative display in full color into everyones homes. The movement was, in itself a revolution involving great sacrifice. It certainly looked like one as televisions showed the National Guard transforming schools in Little Rock, Arkansas and Oxford, MS. into battlefields so black kids could attend. Martin Luther King, Medgar Evers, Malcom X and other prominent movement leaders were assassinated, students registering blacks to choose during Freedom Summer murdered and protesters beaten. As opposed to a famous saying, the revolution was indeed televised. (Vox, 2014). spell the nation deeply mourned President John Kennedys assassination in Dallas and the Vietnam War was ramping up, President Johnson introduced a range of a function of programs designed to

Sunday, April 21, 2019

Issues Concerning Optical networking and Equipment Essay

Issues Concerning opthalmic networking and Equipment - Essay ExampleImportant network topologies and issues like, transparency, protection, routing, switching and wavelength assignment are discussed in detail. The concept of wavelength partitioning multiplexing (WDM) and DWDM has also been introduced. Finally, the latest trends in optical communication and networks are briefly explained.Optical communication clay is similar to any kind of communication system, as far as the basics are concerned. The major difference in optical and other communication models is the additional requirement of a source (for innovation of signal from electrical to optical domain), receiver (for conversion from optical to electrical domain) and use of fibre as media in place of conventional copper wire or microwave. The use of glass fibre or optical fibre features a number of advantages that make it a formidable media, in comparison to others. peerless of the most important assets of optical communicat ion is the availability of enormous potential bandwidth to the tune of hundreds of GHz. The potential cannot be fully harnessed owing to electrical domain limitation. However, technologies like WDM or DWDM are evolving to optimize the functional bandwidth usage. Being fabricated from glass, the fibre does no have earth loop or interface job as are evident in electrical media. The optical communication is immune to interference from radiocommunication frequency and electromagnetic radiations or EMP (electromagnetic pulses) as they act as dielectric waveguides. There are practically insignificant radiations from fibre which enhance security of signal in a communication system. Other advantages let in low weight, small size, flexible, reliable, easily maintainable, low transmission losses and cost effective.The requirement for capacity is change magnitude at a fast rate in the present day networks. Growth of worldwide mesh and Internet are the primary causes for this increase. Ev ery four to six months, the need is almost doubling.

Saturday, April 20, 2019

BP Oil Marketing Plan(The Gulf of Mexico oil spill) Assignment

BP Oil selling Plan(The Gulf of Mexico oil spill) - Assignment ExampleThe paper also suggests a marketing plan that give the axe be adopted by the fellowship to help recover from the marketing disaster as sanitary as try to regain its position in the markets. First it is crucial to gain a sweep through overview of the disaster Deep Water Horizon. Overview of Disaster One of the largest marine oil accidents was seen on twentieth April 2010. The oil spill went on to flow for a total of three months in the Gulf of Mexico. The enlargement claimed eleven lives and injured seventeen people. The oils spill started from the sea floor oil gusher. Methane gas was found to be released from the well with high pressures and this went up into the drill column (Cleveland, 2011). The methane gas expanded on the platform and direct to the explosion. The fire was intense and was not doused which led to the Deep Water Horizon to sink after 36 hours. The Deep Water was built in 2001, and was ma naged by BP in the Gulf of Mexico. The spill as a whole has caused extensive damage to the wildlife, as well as marine habitats and also damaged hundreds of miles of sea shore as well. The spill led to the close down of several small businesses in the angle and tourism industry since tar balls were found to be present in the nets (Cleveland, 2011). ... This provides a date wise(p) record of government and non government estimates. Estimates of Flow Rate of Oil in Spill (Cleveland, 2011) The overall impingement of the spill has been intense, and the impact volition be felt for years to come. Although in the current times, the main resolution being faced is the spill on the sea shore and the dead marine and wildlife, this spill will have a major irreparable damage to the Gulf Stream and jackpot cause universewide thermoregulation activities as well (Zangari, 2010). The damage has been caused to the environment as well as the caller. BP has been faced with a major issue here as due to lack communication. A study concluded, Better management of decision-making processes in spite of appearance BP and other companies, better communication within and between BP and its contractors and effective training of key engineering and plant personnel would have prevented the Macondo incident (Belokas, 2011). Macro Environmental Factors Considering the major impact the spill has had on the company and the world as a whole, it is crucial to gain a detailed understanding of the environmental factors that can impact the strategic plans of the company. Here for the macro environmental factors, a SWOT and PESTLE analysis of the company has been developed. This helps gain a clearer idea of factors impacting the company and affecting the ability of the company to regain the position in the US of A markets. SWOT Analysis of BP Strengths BP is one of the largest oil and Petroleum Company in the world The company has used a wide range of strategies pertaining the marketing o f their refined products, trading gas, and also the liquified natural gas and British Petroleum has grown to become a common household name. across-the-board spread operations and increasingly

Friday, April 19, 2019

Ethical issue at Starbucks Research Paper Example | Topics and Well Written Essays - 1250 words

Ethical issue at Starbucks - Research Paper exemplarHowever, recent discoveries show an early(a)wise picture (Cross et al 2009). According to Rhetoric Society of America et al (2004), Starbucks has been covering up many things such as serving milk with GM growth endocrine in US. Besides, it has been running relentless campaigns of bursting unions. According to Schultz et al (2011), the company is also accused of attempting to block the attempts of Ethiopia to emend the coffee bean growers livelihoods. Furthermore, it has also petitioned a federal judge to accept in knightly sexual history evidence of a former employee aged 16 years when she took sexual badgering case to court. Despite the fact that the company has sold as standard Fair-trade Coffee since 2009 in entirely its stores in UK, the rest of the operation globally on the uptake has been slower. The firm has been criticized even for its operations in US by Organic Consumers Association also dragging its feet in Fair-tr ade launch (Michelli 2007). In addition, gigabit (2008) points out the order by the US court on Starbucks to pay low wage ply more than $100million in California in a ruling that the workers improperly sh atomic number 18d with their bosses some tips although was retrousse subsequently after a successful appeal. The lawsuit against Starbucks was for using tactics that are anti militant to eliminate their competitors. The employees of Starbucks would give out their coffee rights as free sample outside the small shops of coffee in their neighborhoods, thereby gaining more profit and business for themselves. Furthermore, Bussing-Burks (2009) add that they sometimes even tried to buyout other shops of coffee near them. They would sometime sign leases for almost 3 times of the market price to withdraw the landlords not rent it out to other sellers of coffee. Marie et al (2009) adds that Howard Schultz the chief executive officer earned a pay rise of 25% after a cost of $580 million sl ashed from the company in the year 2009. By analyzing the actions of Starbucks, it is unethical because the stores of small coffee give much to the people in the towns they are located compared to what Starbucks does. Majority of people love small coffee shops with reasonable coffee prices in their surround towns. On the other hand other people would be contented with Starbucks. However, Kachra (1997) explains that although you might love Starbucks, you would not like a coffee shop that has been in existence in your town for long universe faced out of business. According to Schultz et al (2007) the small coffee shops found in most towns gives gaiety to more people unlike Starbucks which overcharge their coffee. It is very unethical for a firm like Starbucks to price their products since they know they are alone in the market after displacing other businesses therefore people lead lack other options. Moreover, they disregarded other small business by being selfish and negatively facing them off gaining all the clients and profits. Fellner (2008) observes that the company did not value people but considered them as sources of profits. Their proficiency of expansion does not have goodwill and they are also not motivated rightfully. Simon (2009) observes that the company does not also comply with their set legislations. This is because Starbucks motto clearly elaborates they will treat their clients self-respect and respect. However, no dignity or respect is shown to their clients or even the communities. According to Olsen (1994), Starbucks

Thursday, April 18, 2019

Training and Development in health care Essay Example | Topics and Well Written Essays - 750 words

facts of life and Development in wellness care - Essay ExampleEmployees who manage better are usually motivated and are such individuals who will likely to leave a particular job in search of more challenging and interesting work, and bigger overall opportunities. Training and development is one way an system can retain its better performing employees. It is important to aver that a department that does not put into consideration training and development is bound to fail. The constant changes in technology, economy, legislation, finances, and social changes make it mandatory for the organization to offer training and education to its employees. Thus, maintenance and the improvement of the staff abilities ought to be an ongoing effort. Ongoing education is important (Fallon and McConnell, 2007).Measuring competence is important for a wellness care organization. The increasing sophistications of health care delivery and the changes in the market conditions have forced the health p olicy makers to enhance the evaluation of initial competence of students and new graduates and the continuing competence of experienced and advised practitioners (Burkhalter, cooper and Kak, 2001, p4). Health care organizations are required to evaluate individual and organizational procedure on a regular basis in order to assess the efficacy of the services they are whirl. This assists the organization to know whether that requires designing training and continuing education interventions for the improvement of provider performance. Comparing job performance and the assessments of competence serves as an indicator of the extent to which the organization offers support required for quality care (Burkhalter, Cooper and Kak, 2001).On the other hand, low performance and high competence is an indication that the organization is not offering the required resources, is not correcting poor performance, or rewarding effective performance, and it has not clarified the standards

Wednesday, April 17, 2019

The Importance of Creating a Learning Environment in which Diversity Essay

The Importance of Creating a Learning Environment in which Diversity is Respected - Essay employmentIn order to ensure respect for diversity in encyclopaedism, teachers must focus and be evoke in all pupils equally. They should employ flexibility in the teaching process for consideration of all schoolchilds. Additionally, to reduce biased learning outcomes, instructors must utilize curriculum and other resources in which there is a standard of both male and female genders (Standard 52).When there is respect of diversity in the learning environment, a student will be informed and have a better understanding of the dynamics in life, cargoners, and relationships in the modern world. Students who are exposed to a learning environment where there is respect for diversity are more likely to become good citizens and leaders in the new emerging global community. Therefore, the student develops both academically and socially. Additionally, such an environment boosts the confidence leve ls of students, raises their expectations about the future, and makes them discover their potential and talents. Similarly, this raises the educational outcomes of students and presents them with an enriched learning experience. Students therefore become productive and culturally literate citizens of their country and the

Tuesday, April 16, 2019

Legalization of Marijuana Essay Example for Free

Legalization of Marijuana bedvassThe fight to legalize cannabis has been going on for decades now and looks to have no stamp out until the allow for is that its legal. My fight would be for it to be legalized as well. Simply because its a drug with a great deal benefits then harm. In some states, and other countries its already legal and doctor approved which I believe needs to be applied everywhere. Marijuana users give not stand for marijuana probation, no matter how long it takes, punishments or consequences. One might say press the issue Make harsher laws These prohibition views have failed to silence users. Marijuana legalization is a persistent issue that will not vindicatory go away. I believe it will be legalized because users are willing to spread over to fight until they succeed. This will eventually open piles eyes that the drug is not all bad.Marijuana has positive(p) attributes a medical value with very mild side effects. Many people use it because they put oneness across it good for them especially those suffering ailments. It relieves pain, nausea, spasticity, and other symptoms for many individuals who have not been treated successfully with customary medications. I agree that if we do legalize it just for medication that it would leak to other users.But in todays society many American adults prefer marijuana over alcoholic drink as a way to relax, it has a lot less side effects then alcohol. The use of marijuana in America is a choice that comes with a relatively low dependence rate. around people develop a tolerance to side effects, and those who dont usually stop using drugs. Most Americans decide that the benefits of the drug outweigh the risk which the greatest risk is low risk arrest.Legalizing the drug can have more benefits to our county then harming it. If marijuana was legal we could put a value on it, to annoy a profit on it. If we look at our crime rate, our law enforcement has more important responsibilities than arresting 750,000 individuals a year for marijuana possession. By doing this we waste jail space, clog court systems, divert conviction of police, attorneys, judges, and corrections officials away from violent crime. When I say violent crimes I mean being able to focus on the sexual abuse of children, terrorism and other more dangerous crimes.For my study I looked for a country that has legalized marijuana and their reasons for doing so. I found that it is a common knowledge throughout the world, that in Amsterdam you may just enter a coffee shop and buy drugs you will be handed a menu with drugs of the day, and there might be even a special on the menu. It is all accessible, for four joints you will pay the same amount for twenty cigarettes.Marijuana is legal in Amsterdam because the government there realizes that it is much easier to control when they make it publicly available. This way they can tax it to generate state funding and ensure that they know where it is and w hos using it. Its a much more detached approach than prohibition, which causes any controlled substance to go immediately underground and leaves the governments jurisdiction. Marijuana being illegal is much like the prohibition of alcohol.The Prohibition was a period of nearly fourteen years of U.S. history in which the manufacture, sale, and transportation of liquor was made illegal. It led to the first and further time an Amendment to the U.S. Constitution was repealed. And unlike alcohol and any prescription drugs, marijuana is not lethal. A study in 2009 by U.S. Department of wellness and Human Studies published that 69.7 million Americans are current users of tobacco products, 15 million Americans abuse alcohol, and only 4.2 million Americans abuse Marijuana.Everyday 1,000 people die from smoking tie in illnesses, 550 die from alcohol related accidents and diseases, and less than 20 die of drug related causes. American adolescents use Marijuana twice as much as their counter parts in Holland where Marijuana is legal. It seems that the temptations to do what youre not sibyllic to do are too strong to resist.In conclusion, marijuana should be legal. If we are going to comprehend to offer these drugs that are more harmful then marijuana then why band one that helps? If continuing to keep marijuana as an illegal substance then users are willing to continue to fight. Like the prohibition of alcohol I dont believe this fight will end until the users win. Maybe they will think their decision over, and realize it would help us more then it harms us.

Monday, April 15, 2019

Bilbo Baggins Fake Facebook Essay Example for Free

Bilbo themegins Fake Face keep back Es imagineBilbo Baggins on Fakebook Create a Fake Facebook Profile Wall using this generator Tw eet 0 Disclaimer This appliance is for educational purposes. It is NOT affiliated with Facebook or any former(a) social net controling site. Bilbo Baggins Edit Profile Friends add Gandalf Thorin hello all My life has been a genuinely calm, peaceful life that has been cozy and comfortable. I come from a noble ancestry and a happy, content family. I live in a hole called Bag End in a snug little crossroads under a hill. I love my life, even though it was a quiet life.Not much thrill in my daily catch of eating, cleaning, smoking, and relaxing, provided that is how I wishd it,in my own little humanness you could say. This all changed one solar day when an come I had started a domino affect on my life with cosmosy guesss involved. It all started that one day while sitting on my porch, smoking a pipe, wait oning into the landscape when a mysterious man with a long beard, great staff, and massive dark blue cloak approached me. I recognized him as Gandalf, the famous wizard of the country .He asks me if I want to go on an adventure, but I quickly dismiss this question and excuse myself cover song into my house. I fantasy this would be the last time I would see him in a long period, but the next day, Gandalf plus 13 new(prenominal) dwarfs burst into my house clearing come out of the closet my pantry during the process. Apparently I was chosen to be a burglar in this huge adventure to go to a dragons den and steal all the care for that Smuag, the dragon, was guarding. The treasure originally belonged to Thorins grandfather dwarf, Thror who was the King at that time.Smuag the dragon killed and scattered all the wad of Thrors village and has been at the mountain guarding the treasure ever since the incident. I then am basically forced to go on this mission but it was technically not forced because hey, who doesnt w ant an occasional adventure quite of the usual daily life? So I go on this adventure and fight finish up goblin, wolves, find secret rings, fight dark extremely large spiders,travel miles and miles, get presentd multiple times, rescue other(a)s multiple times, find the treasure with a mad dragon to go with it, and start a war.You could say I had a pretty arouse experience. In conclusion, when I came home I found out people thought I had died because I had been gone for so long, so in reaction to my presence, people were completely shocked to see me. I lose many of my possessions because they were being auctioned off, but in the end, Im back at my cozy home at Bag End after a crazy, exciting adventure ,that was all worth it in the end. That was my experience. Add PostThorin Friend Explanation- Thorin is chosen to be a suspensor of Bilbo because over the journey, they started to authority each other more and have a friendly relationship near the end of the journey. In the begi nning when Thorin first meets Bilbo, he doesnt have much faith and belief in him and doesnt really channelise with him at first. Then when the story starts to go on, Thorin gets more respect for Bilbo and becomes more friendly to him. earlier immediately comment.Gandalf Friend Explanation- Gandalf was chosen as a friend of Bilbo Baggins because first, he started the whole adventure by choosing Bilbo to be the burglar in the first place. He then helped Bilbo throughout the story giving him wisdom, teaching him lessons, and fashioning a friendly relationship with him. They helped each other when needed, backed each other up, had conversations, and bonded with each other which are all things friends do. earlier today comment Smaug the Dragon Non-Friend Explanation-Smaug would not friend Bilbo andBilbo wouldnt want to friend Smaug for many reasons. First, Bilbo stole the treasure that Smaug was guarding. Second, when Bilbo and the others reached the dragon and the mountain where th e treasure was, Bilbo and Smaug didnt really start off on the right foot with each other, you could say. Last but not least, Smaug wanted to kill Bilbo and i dont imagine you would want to be friends with someone trying and wanting to kill you. These are some main and distinct reasons why Bilbo wouldnt friend Smaug. earlier today comment www. classtools.I than had to free all of them and fight off swarms of giant spiders wanting us to be there next meal. Another adventure I had in my journey was when me and my accomplices were trying to get away from the goblins and wargs at the same time. They were both chasing after us looking for revenge for deeds we had done earlier to them, uniform kill their leaders. We didnt know anywhere else we could go when we were in a forest so we decided to climb into the trees so aught could reach us. This didnt necessarily work because once the goblins came, they lit the bottom of the trees on fire so basically, we were in a pickle.We were about to be ripped to shreds by the wargs and goblins eventually because the fire was slowly reaching up the tree, when suddenly the Lord of the Eagles and many other eagles swooped down and saved us from the terror that awaited us. My last adventure that was also very interesting was escaping the elves and having to save my friends then escape. I had to slip everyone out by secretly going to everyones cell with my wizard(prenominal) ring on,which made me invisible. I then said that I will make sure nobody is left behind, and this is what i made true.We all escaped into barrels that were being released downstream for a troupe the elves were having later on and even though it was bumpy ride, it got us where we needed to go. I will neer forget these experiences I had and have never wished that these events didnt happen since. earlier today comment Carter Brydon Likes This I like his story and how he went through many challenges and achieved his final goal. This story seems like a fun, e ntertaining book that will hook the reader with its many exciting events and sequences. earlier today commentPaige Brydon Likes This I thought that this experience that Bilbo was a very interesting adventure. I havent read the book but based on the summary and main idea of the book, I am drawn into variant the book because of the fantasy world but with amazing detail as well. After I will have read the book, I feel it would satisfy my want to read it and I will enjoy the book while reading it. earlier today comment Bilbo Baggins FOR MORE INFORMATION- One cultural aspect of the life of Hobbits is that since we are small, we like to be in small, compact areas that are cozy and comfortable for our size.We dont like to be out in the open because of our size. We then feel too vulnerable out in the open because we arent the strongest race, you could say. This then leads to my here and now cultural aspect of being very peaceful and not having much tension with others. Since we are very vulnerable and small, we like to be on the good sides of others because even though we can put up a fight if needed, there arent many guarantees we will be on the winning side of these fights. We like having a simple, farming and calm life.The last cultural aspect is that we are very unique. We are normally very shy but under the right circumstances we can achieve great things. We look and act different then other species like humans. We are very social and caring for others but like to keep to our own business. We are short ans stout but we are sublime of ourselves . earlier today comment _ www. classtools. net/fb/96/NCMPe2 2/3 10/2/12 Bilbo Baggins on Fakebook Create a Fake Facebook Profile Wall using this generator www. classtools. net/fb/96/NCMPe2 3/3

Electronic security Essay Example for Free

Electronic warranter measure EssayElectronic security is defined as any(prenominal) barb or technique that is used purposely to protect systems instruction as desexualises. E-security is very valuable element in e- employment since it adds value to the computer network as it composed of both soft and hard infrastructureE-security has been a matter of debate and it has been scientifically argued to be of ample importance to economic development as it charge efficient trade and trading. E-security has enhanced safe transaction and this has modify customers needs to be taken bring off off. Through e-security market place has expand since on line is very vital in that it enable many customers to be access to safe markets. Computer security systems enhance effectiveness, efficient, satisfaction of customers. E-security systems also acquired immune deficiency syndrome proper decision making concerning security susceptible situations through user interface design (Marco, 200 3)E-security has been considered to a fundamental aspect in ensuring that technology benefits an geological formation in bringing both social and economic development.Development of on line environment has the impact of creating pull amongst its users and this has been taken by many organizations as a priority in order to name competitive advantage. (Marco, 2003)Goals of the study of an academic study protection has been subjected to various studies because of the fact that it aids in organization operations. It has been viewed by government entities as an idea of great demand that should be given priorities. The academic study by the Carnegie Mellon University was conducted to ascertain the level of security that buttocks be derived from use of e-security in any given transaction (Marco, 2003)Goals of the private organization studyOn the other hand, a private organization study was conducted with almost similar goals to the former i.e. The aim of ascertaining that in that resp ect is protection of attributes of information security. These attributes include confidentiality, availability and fairness (Marco, 2003). It was also conducted with the objective of factors that keister lead to stroke of e-security in organizations either through poor planning and design or overall complexity of electronic security architecture that are concern with sustaining the above attributes. It is vital to comprehend that proper security influence encapsulates and consolidates the various processes in an organization such as detection, prevention and recovery of information and other germane(predicate) data..Reasons for conducting the studyThe academic study was conducted with the aim of ascertaining the methodological approach that can be adopted by organizations and other business institution when assessing the level of competency that it poses in implementation of e-commerce in presence of e-security.To crumple how organization can be effectively and efficiently f ormulate electronic security and electronic commerce strategies to enhance proper functioning of the organizationsTo enable the organization to understand the factors that contributes to wide spread of e-security and electronic commerce in the globose economy. The study was conducted to articulate major variables that bring about extensive use of the e-security by the business organizations.To compare electronic security, electronic procurement, electronic commerce, retributions systems and electronic portals. This is to ascertain the influence that these aspects capture brought in terms of global growth in economy.To comprehend and articulate the strategic implications of electronic security on private, public and civil organizations have been able to reduce risk associated cost and how market transactions have been carried out efficiently. It was done to draw inference on the impact of technology and faster stream of information on business transactions.To assess the available options in which e-security can be adopted as a tool for achieving organization goals through proper management strategiesTo monitor and evaluate e-commerces impact upon current global businessTransactions, technologies and public policy as related to electroniccommerce strategy and new practiced innovations.Type of data dispassionateThe data was collected during the academic study on e-security by the University was surveys from businesses and households on the importance and use of electronic security and ICT in general. The information collected was mainly pertaining trust on IT security. Specific question were macrocosm asked concerning the way different households perceived the importance and barriers to Internet commerce. The data collected depends entirely on the traditional strengths of the already collected data which was being used as unoriginal form of information. The data collected concerns trust and security of technology service which been employed currently by m any organizations.The report that came out of the study was an official data and semi-official data. Both types of data feature the trust that electronic security should be vested with. The official data carries the proposed questions that should be put into consideration before implementing any type of electronic security.How was data collectedThe data was collected in controlled experiment set up where students who used to attend introductory level business class were the main subjects. The University employed e-learning parcel when conducting the study due to the fact that Internet was available. They were randomly assigned certain conditions that were required to follow.Before the unfeigned experiment been conducted students were asked to fill the questionnaire that carries information concerning the demographic profile and other paramount features. The questionnaires were well validated in order to give correct measures of performance avoidance and any kind of reluctance that the students portrayed (Marco, 2003) explore Questions OF ACADEMIC STUDYThe following are common questions that were asked when conducting both studies and they cover important aspects of electronic security and to manage upon its implementation in the organization. These includes policy frameworks, principles, integration with management procedures and more so the significances to total tone management in an organizations. The questions which were asked during private organization study includeWhat are the some of the principles that influences the transition of electronic security?In what can enterprise security framework enhance the effective administration of electronic security in an organization?In what way can electronic security management be significant aspect to total quality management and enterprise strategic management model? look for questions of the private organization studyOn the other hand questions which were asked during academic study on electronic security in cludedIn your opinion, what are the significant differences between different ways of electronic payment?What are some of the organization where electronic security has been used extensively?What are safety go been offered electronic security?Instruments used when collecting the dataWhen conducting the study, the University used very powerful machines such as computers (Intel Pentium 4). The decision made on the use of these computers when collecting data was based on the physical accessibility barriers of the computers and their memory that could make the work of the student very easy. They collected packet traces for each of the experiment and these traces carried data that allowed the group to analyze control packets (AlAboodi, 2003).Results of the studyAfter conducting the study, what came out clearly was the fact that e-security and other sack up service technologies have had a far-reaching influence on business operations in organizations. Web service and electronic securit ies have enable organizations to carry out the transactions without the human intervention. It has enable data and applications to flow in without being monitored by the human being. It was also noted that electronic services can be put in place in wide variety of architectures hence can co-exist with other technologies.These services can be adopted in an evolutionary manner in absence of main transformations to legacy applications. Furthermore, it was realized that challenges posed by security cannot be avoided. From the study it was discovered that there exist ambitious issues that an organization should put into consideration before implementing any electronic security. These includeLack of confidentially and integrity of data that depend upon electronic security for its transmission. Service to service transactions are not being trusted by many business organizations due to lack of confidentiality.Availability in the face of defensive structure of service attacks that exploit vulnerabilities unique to Web service technologies, especially targeting core services, such as denudation service, on which other services rely.Functional integrity of electronic security has been subject of debate in many organizations due to the fact that it is not been trusted by many organizations (AlAboodi, 2003).Results study of private organization studyThe end results of private organization study conducted on electronic security was that improved security is very important to organizations since it adds value to the organization. These are achieved by use of electronic security to enhance swell interaction with the say-so traders across the globe. Through use of electronic security organizations have been able to gain competitive advantage over their competitors because they are able to maintain closer customer relationship. From the study conducted, it can be concluded that proper employment of electronic securities enable companies to improve their reputation which i n gambol helps to maintain and retain customers (AlAboodi, 2003)The results obtained from the studies conducted have a very practical value in the sense if a company put in place a well functioning electronic system it is a position to make a lot of sales. These is as a result of good maintenance of potential customers by the virtue that safe transaction are been carried out between the customers and the organization.If information security and electronic security is well managed, it results less costs of operations been incurred. In addition, electronic security is the basis for salutary foundation for implementation of good business structures and other vital frameworks which are factors that fosters economic growth been experience in the organization These include Total Quality Management(TQM) and Enterprise Resource Planning(ERP) (AlAboodi , 2003)

Saturday, April 13, 2019

Promotion and advertising strategies Essay Example for Free

Promotion and advertising strategies shewIn 1966, while sitting in a small diner, Rollin King, a Texas businessman presented his attorney, Herb Kelleher with an root word. The idea entailed creating a new airline, one that would offer low fares to passengers and would fly quickly between three cities Dallas, Houston, and San Antonio. Together, they organize southwestern United States Airlines. Initially, the airline battled a number of obstacles from unlike competitors of that eon, as the other airlines did non want to expose a new competitor in the market who offered low cost flights to local areas. Despite various efforts diagnose to keep southwestern United States a mere vision, they legally won the right to fly by dint of the Supreme Court and began offering air service in 1971. AirTran Airways, formerly known as ValuJet Airlines, source began operating October 26, 1993. The Airline was renamed after the 1996 crash of ValuJet into the Florida Everglades, killing all 110 passengers and crew members on board. Since that time, AirTran has bragging(a) to be one of the most profitable airlines in the assiduity, offering service to more than 60 destinations across the United States, as well as to Mexico and the Caribbean.On September 27, 2010, AirTran Airways make a public resolution that they entered into agreement allowing southwestward Airlines to acquire them. Numerous entities report the reasons behind the science are to make southwestern a dominant competitor in the airline industry, southwestern United States is following the tr finish up in the industry merge or acquire in order to stay alive and competitive (Mouawad, 2010). In addition, the acquisition would allow southwesterly to mark its presence in markets they were previously unable to penetrate, The deal would expand southwestern United Statess network by 25 percent and give it its maiden base internationaldestinations in the Caribbean and Mexico (Mouawad, 2010). As rel ayed in a statement made by Bob Fornaro, AirTran Chairman, President and CEO on AirTrans official website, Joining Southwest Airlines will give us opportunities to grow, both professionally as individuals and as a group, in ways that simply would not be possible without this agreement.Together with Southwest, the worlds largest passenger airline, their financial resources, tremendous brand, legendary customer service, corporate culture and decades-long record of success, we will allow the opportunity to go places neither company could have gone alone. As a result of the acquisition, which was holy on May 2, 2011, Southwest has experienced several unexpected glitches during the transitioning stages. One major issue has been with the ticketing and bookings systems, Southwest Airlines agents struggle with AirTran Airways tickets and vice versa, sometimes leaving passengers who have been delayed and need rebooking in the lurch (McCartney, 2013). It is report that prices and seat avai lability are inconsistent on both websites when attempting to book a ticket online. Customers, who obtain early boarding passes for their itineraries, are limited to using them tho for the Southwest leg of the trip, as it is not recognized by AirTran. This has caused numerous complaints with customers who pay full price for early boarding, provided are only able to use it for half of the itinerary.Southwest has been diligently working to combine both airline systems, but has not successfully completed the project to date. Southwest, for now, have agents of both airlines trying to work two reservation systems on different windows of their computer screens so one airline can check in customers from the other. Southwest says it will have a unified system, new to both airlines, in place by the end of the yr (McCartney, 2013). A prominent issue that has resulted in the acquisition is that once AirTran has been fully integrated into the Southwest Brand, upgraded seating will no longer be available, as Southwest only offers coach consort with unassigned seating. In addition, Southwest has been in the works to transition all aircraft from AirTrans 717 aircraft, which it inherited, to its existing 737 model. AirTran had first class, they had assigned seats, and Southwest has no first class, no assigned seats, doesnt sell through international distribution systems-a very different product than what AirTran offered in the market. It is very distinguishable (Boehmer, 2010).Delta Airlines and other major competitors impression they will be able to capture former AirTran customers, who find the elimination of upgraded seating unacceptable. Prior to the acquisition, Southwest Airlines had an organisational structure which was instrumental in the company becoming a leading competitor in the airline industry. Founder Herb Kellehers leadership style allowed for everyone, including front line employees to play a major role in business planning and operational budgeting. Herb rememberd that management decisions are made by everyone in the organization, not just the head executives (Advance Business Consulting Website, 2013). As a part of their organizational structure, Southwest maintained over 35,000 employees, had 568 Boeing 737 model aircraft, and operated in 67 domestic cities coast-to-coast. Whereas AirTran, who operated with a similar organizational model, listed assets of 8,500 employees, 86 Boeing 717s and 52 Boeing 737s, operating in approximately 37 markets. Southwest Airlines has not made major changes to their organizational structure as a result of the merger. The new Southwest airlines assets contain 43,000 convinced(p) employees, over 700 aircraft, operating in over 100 markets, serving 100 million customers, (Bomkamp, 2010).Southwest continues to get going with three primary levels of management Executive Vice Presidents, Senior Vice Presidents, and Vice Presidents, all positions marcher to Chairman of the Board, President, and CE O, Gary Kelly. Since the acquisition, Southwest has taken a slow approach to integrating AirTran systems, procedures, and employees into the Southwest family. Southwest appears to believe they will be able to seamlessly integrate 8,500 AirTran employees into the body of Southwests existing 35,000 employees. However, industry analysts quality Southwests expectations are risky at best, It will be tricky for Southwest. Southwests whole business model is built on a particular approach to managing employees. Its a big bet they are making that they can swallow AirTran (Cappelli, 2010).According to Southwest Airlines Announcements for Reporting social structure of AirTran and Leadership Changes, Human Resources Practices were modified in effort to embrace the leadership team coming from AirTran. to the highest degree all AirTran leaders were placed in positions with Southwest that were commensurate to positions previously held. The other leaders who were not placed in commensurate posit ions were hired on as full time consultants to ensure the integrating of the twoairlines went well. Southwest airlines have maintained a precedent that was stranded in 1971, when the company first began conducting business. Southwest Airlines began with four planes and less than 70 employees. During its first year of operation, the company experienced financial trouble, forcing the executives to make the decision to sell one of its planes or lay off employees. In effort to maintain the human relationship with its employees, Southwest opted to sell the plane.In return, the employees were asked to cut gate turn-around from 55 minutes to 15 minutes. The employees obliged, helping to establish one of the friendliest management/labor relationships in the airline industry, as reported by PBS.org. According to battle of Atlanta Business Chronicles, the following statement was issued to AirTran employees in the form of a Question and Answer sheet in effort to address their concerns regar ding job security, The combination of the two airlines will result in additional utilization opportunities as the combined airline continues to grow and expand the Southwest network. In its nearly 40 year history, even during the most recent financial crisis, Southwest has remained profitable and has never had layoffs.This statement was in attempt to calm fears that the acquisition would bring surrounding job stability. As in any industry, when employees are lining major changes in the workplace, especially as it relates to mergers and acquisitions, it is important to communicate plans for the direction of the company and the employees involved. This strategy allows time for the employees to process the information they have been given and adjust to the changes to come. It is imperative that companies model this practice as non-communication results in insecurity, chaos, and hostile work environments where uncertainty is present.ReferencesAdvance Business Consulting Website (2013) . Retrieved from http//www.advancebusinessconsulting.com/advance/strategic-alignment/strategic-alignment-business-cases/the-rise-of-southwest-airlines.aspxAirTran Airways Official Website, (2014). Retrieved from http//www.airtranairways.com/about-us/history.aspxAtlanta Business Chronicle, (2010). QA on the Southwest-AirTran merger. Retrieved from http//www.bizjournals.com/atlanta/stories/2010/09/27/daily2.htmlBoehmer, Jay (2010, November 08). Delta Sees Opportunity In Southwest, AirTran Merger. Business Travel cleans, (15), 4. Retrieved from http//elibrary.bigchalk.comBomkamp, S., (2010). Huff Post Travel Southwest Airlines Buys AirTran for $1.4 Billion. Retrieved from http//www.huffingtonpost.com/2010/09/27/southwest-airlines-airtran_n_739975.html?view=printcomm_ref=falseCappelli, P. (2010). Strategic Management North America By Acquiring AirTran, go forth Southwest Continue to Spread the LUV? Retrieved from http//knowledge.wharton.upenn.edu/article/by-acquiring-airtran-will-sout hwest-continue-to-spread-the-luv/McCartney, S., (2013). The Wall Street Journal Southwest and AirTran Airlines Mergers and Aggravations. Retrieved from http//online.wsj.com/news/articles/SB10001424127887324448104578611980670019710Mouawad, J., (2010). The New York Times Southwest, Determined to Expand, Buys AirTran. Retrieved from http//www.nytimes.com/2010/09/28/business/28air.html?_r=0pagewanted=printPBS.Org (date not available). Chasing the Sun The History of Commercial tune Seen Through the Eyes of Its Innovators. Retrieved from http//www.pbs.org/kcet/chasingthesun/innovators/hkelleher.htmlSouthwest Airlines Official Website. (2014). Retrieved from http//www.southwest.com/html/about-southwest/index.html?int=GFOOTER-ABOUT-ABOUT

Friday, April 12, 2019

Office Automation and Group Collaboration Software Essay Example for Free

social occasion auto mattingion and Group Collaboration Software EssayAs the rail line becomes smaller and smaller due to globalization making the art environment more dynamic and competitive, organizations of nowadays are fast realizing the enormousness of learning as an critical asset to successes. This in turn growths the importance of automated delicate wares and group coactions systems, which make in spirtation management and enforce more efficient and effective.This articles explores how Office mechanisation and group collaboration Systems alike Groove are increasingly applied to manual business functions in a lucre of computers in an organization, which help in business communications, writing reports, saving info and statistics, and group of people fixing on a project from different location and same or different term frames, all integrated in automated software which saves both time and specie increasing the expire productivity of the employees. An of fice automation system heavily relies on a net study of workstations in order to create an uninterrupted and fast approach to sending and receiving information in a timely fashion. This poop be a topical anesthetic Area Network or LAN for local destinations, for example a network of computers with in a building etc or it can also stretch across countries through a Wide Area Network (WAN), which can also be use send instant messages across . this network also provides a secures work space for individual workstations to distribute and work on documents using groove as a group collaboration software.The functions of an Office Automation System include electronic publishing soft wares which allow users to create documents, edit them as and when requires, install tables, charts or any former(a) graphics, electronically store important documents and even print them in the form of memos, periodic or ad hoc reports and letters, all these functions are performed by word processing soft wares where as a desktop publishing software can also be used for professional documents for examples brochure, and by making use of available templates for magazines etcThen we have Electronic communication soft wares, as a part of the Office Automation System used for face to face communication with executives in other cities or countries through desktop video conferencing incase of two employees communicating with each other, or electronic collaboration systems which allow different work groups to communicate face to face with each other and work on projects via a network of computers regardless of the geographical location.Another important branch of Office Automation Systems is Telecommuting which now makes It possible for employees to work from home or distant locations avoiding long distance travelling, traffic by connecting to the organizations local or wide area network. One of the greater advantages of teleworking is that it allows organization to use the untapped pool of the handicapped people and single parents who for reasons of their own cannot come to the work place.Other advantages of Office Automation Systems is that it also incorporates image processing and presentation and multimedia soft wares like PowerPoint, SPC Harvard Graphics etc which allow the users to edit and integrate both image and texts, videos etc and share it using work collaboration systems.Another important advantage of group collaboration soft wares in this era of globalization is that it allows work groups to work on and share information and coordinate activities at same place same time or different place, different times ensuring a smooth work flow through off the wide spread organization. Although Office automation and group collaboration software make work intent a lot easier for us, yet one has to be cautious about the limitations they offer along with the advantages.The soft wares can be used for personnel use unrelated to work. For example instant messaging can b e used to discuss topics other than work which wastes both time and office resources. As far as group ware is concerned they can be expensive, may require extensive training, mat not support the rapid changes in technology and due to the availability of company related information with different people at different places it can also lead to a leak in critical information.Therefore, after realizing the importance of automates software and group collaborative system which without any doubt increase work productivity and make coordination of various work activities very easy for us, one must be aware that it does come with certain limitations for which caution should be exercised. After all, information is a critical asset which needs proper management.

Wednesday, April 10, 2019

Social networking paper Essay Example for Free

Social networking paper EssayToday, 1.5 billion mess belong to an online neighborly network, which is one out of every nine people in the world. If you ar a part of this phenomenon, incisively how much does it affect your daily life? People join these sites for a wide variety of reasons. With reasonable a few clicks you outhouse let loose to friends and family that may be millions of miles a dash or check up on your favorite musicians latest updates. No matter what the reason, there is no denying that genial networks do bring into being a major part of society, in the work place, at home, and around the world. many complaisant networking sites argon made for a specific group of people, such(prenominal) as Facebook for college students, or MySpace for music and party people. However, they all in all have a common structure. Once you sign up for a particular site, you will be asked a number of questions such as your name, age, location, interests, marital status, and possibly a small section to redeem an about me. Many sites to a fault encourage uploading a profile picture, and some allow you to add a skin or some type of multimedia to your profile.Creating a profile on a sociable network allows you to define yourself however you wish to be seen. You atomic number 18 able to character your views, and express your interests. Many people feel a sense of independence and self esteem from using these sites. Some people may plane create a second life and get lost in an online world, completely losing track of reality. People become addicted to social networking, losing sleep over these sites, ignoring their work duties, or even their loved ones to update a status or check the latest trending authorizeics. According to affilatenetworking.com, as of April fifth 2012, the top five social networking sites are Facebook, with an estimated 800 million users Twitter, with an estimated 175 million users Linkedin, with over 115 million users Google Plus , with an estimated 90 million users and Pintrest, which is a brand new social networking site, but is already in the top 30 most visited websites in the USA. With these sites having so many active users, it makes sense that they are prime places to advertise. These sites are users of targeted marketing, meaning that they use information provided by you, to decide which advertisements to show. Facebook for example, uses things you liketo determine what ads to show in the sidebar. So if you liked a Facebook page for Thai food, the ad shown on your homepage may be a Thai restaurant that is close to your provided location. Along with your likes, Facebook uses your location, sexuality, and relationship status as means to advertise. Companies are non the only ones using the growing popularity of social networks to their advantage celebrities and artists do as well. They do non normally place ads on the page, but rather make their own Facebook or Twitter for publicity and to share their work. Lady Gaga, for example, has 45,633,442 Facebook fans and 16,862,231 Twitter followers.She is one of the more(prenominal) popular celebrities in social media, but definitely not the only one. Among the rather interesting list of users are Barack Obama, Kanye West, Megan Fox, and even Oprah Winfrey. By using these sites, public figures such as the aforementioned can communicate with their fans, and share photos and videos with them. They can to a fault promote their latest campaign, music, or movie release. If a celebrity wants to promote a social cause, social media is also a ministrant tool to gain supporters. Even though social media has many great characteristics and outcomes, there are also some drawbacks and concerns. For example, privacy issues. Facebook and MySpace make it very easy to retrieve personal information and harm someone. Phishing and scams continue often, by scammers who try to take away your personal information for fraud or identity theft. there are a lso websites that are made to look exactly like your favorite social networking site to steal your password. Once they have the password, they are able use it to send out spam, and even viruses, from your account, or repeal your profile. The most venerable victims of social media dangers are children. Predators can pose as children with the same likes and interests as the child, and pull someones leg that child into telling them almost anything, including where they live.The safety of a child is at risk when they are on any social networking site. Predators are the biggest danger for children, but there are also scams that affect them. There are hackers or scammers that target children to use their identity to open a credit card, since the credit of a child is always in good condition. The problems with social media do not end with people that we enduret know. They also cause problems with the people that are close to us. According to a survey by the American Academy of Matrimoni al lawyers, one in five divorces in the United States involve Facebook, and 80 percent of divorcelawyers have reported a spike in the number of cases that use social media for evidence of cheating (Gardner, David). The websites offer an outside source of communication that never existed in the prehistoric, allowing people to reconnect with past lovers or meet new ones. They also provide a distraction that takes away from the time that lettered couples are supposed to share. Many employers also use social networks in their hiring process.If a person desire a job has certain information, comments, or pictures on their page, it can comprise the decision of the employer. The Washington set up released an article stating that there are now oscilloscope checking services that exclusively run social media background checks for companies all over the country (Duran). A reference to drugs or even inappropriate jokes in a status can completely change a companys decision. There are also c ases that take social media past the hiring process, and use it as a cause to fire someone that is already working for them. In Pennsylvania, a teacher posted a picture of herself dressed as a pirate, holding a plastic cup, with the caption under the picture reading drunken pirate. She was then dismissed for promoting underage drinking. Whether or not these charges were fair, the facts cannot be changed social media is public. Its something that anyone can see, including employers, children, students, and parents (Duran). However, social media does not have to be feared or avoided. The more aware users are to the potential dangers, the better. As long as they are used correctly, social networking sites are a great way to interact. Avoiding them would just keep you from communicating and interacting in our society. They provide many useful tools, and an enjoyable way to keep in touch. A social networking site is an online community in which people can connect to other with similar in terests. Since their start in 1995 with Classmates.com, social networking sites have grown immensely to include huge websites such as Facebook, YouTube, hi5, and orkut.com (scribd.com). Through these sites, people can communicate, meet new friends, and share information and common values. Businesses can communicate with employees, advertise new products, speak to consumers about current products, and even get ideas for new or improved products. Social networks have changed the way we live today. They provide a means of being socially involved that never existed, and there is no telling how far they will take us, how long they will be around, or how much more they will grow. As a young adult, I can say that social mediaaffects my life on a daily basis, as it does millions of others. We are living in an era of the Internet, and there is no turn of events back now.

Tuesday, April 9, 2019

Recruitment and Selection Process Essay Example for Free

Recruitment and Selection Process EssayStages of enlisting and selection process In a nut shell 1. transmission line analysis Determining the diverse aspect of a job through with(predicate) job interpretation and job specification 1.1 Job description Role within an makeup and lists the main tasks and responsibilities 1.2 Job specification Highlights the characteristics a candidate needs for a post and the desired qualities2. Sourcing Attracting or identifying candidates internally or externally through advertisement (i.e. recruitment agencies, institutions, meshingetc)3. Screening and selection Assessing potential candidates, specifically, relevant skills, knowledge, aptitude, qualifications, and educational or job-related experience. Screening can be achieved by evaluating resumes and job applications, interviewing, and job-related or behavioural testing4. On-boarding/induction Process of helping new employees become a productive member of an organisationDefinitionThe pr ocess of sourcing and screening potential candidates that shares similar values and beliefs line up with the organisation along with the desired knowledge, skills and experience to competently fulfil the defined job descriptions and specifications (Australian tender-hearted resource Institute n.d, para. 1).Job AnalysisA job analysis is a systematic process where tuition regarding a job vacancy, specifically its duties and responsibilities as head as the knowledge, skills and abilities required, are collected to formulate a job description and job specification tailored to the organisations specific needs (HR Council n.d, para. 2)Job DescriptionThe objective of a job description, according to HR Council (n.d), is to effectively increase individual and organisational potence byaligning the daily duties and responsibilities of an employee with the overall mission, vision and value statement of the organisationJob stipulationJob specification, sometimes referred to as employee spe cification, is a written statement outlining the specific requirements demanded by an organisation including, moreover not limited to, characteristics, traits and qualifications that a potential candidate must possess to be considered for the position that he or she is applying for (Heathfield n.d Management Study Guide n.d).SourcingAccording to Recruiter (n.d), sourcing is a process that encompasses deep organizational giving strategy issues and in general, the practice and need to acquire human talent for any source of occupancy need. Sourcing can be seen as a tactic or as a strategy. When sourcing is referred to as a tactic, this often means the practice of finding specialized candidates on the internet or through phone work (Recruiter n.d, para. 3). In contrast, sourcing as a strategy means a number of distinct broad hiring initiatives or approaches to particular labour markets (Recruiter n.d, para. 5).Screening and selectionThe process of screening and selection involves as sessing and comparing potential candidates against a predetermined selection criteria factoring in their level of education, competencies, experience, skills and abilities and personal characteristics (ZeePedia n.d, p.82) as well as evaluating whether if their values and beliefs are compatible with the organizations overall mission, vision and values (Mayhew n.d, para. 5).InductionInduction is a formal process where, according to Department of forgiving Services (2014), new members of the organisation are welcomed to the organisation and given details about their position and introducing the hierarchy and line of communication involving the key people in the workplace (Department of Human Services 2014, para. 10). They are alsobriefed on their roles, responsibilities and expectations in the daily operations.SourcesAustralian Human Resource Institute n.d, RECRUITMENT AND SELECTION, Australian Human Resource Institute, retrieved 4 defect 2015,HR Council n.d, acquire the Right Peop le, HR Council, retrieved 6 butt against 2015,HR Council n.d, Getting the Right People, HR Council, retrieved 6 March 2015,Management Study Guide n.d, Job Description and Job Specification, Management Study Guide, retrieved 7 March 2015,Heathfield, S n.d, Job Specification, About Money, retrieved 7 March 2015,Recruiter n.d, Sourcing, Recruiter, retrieved 11 March 2015,ZeePedia n.d, SELECTION Initial Screening, Advantages of fortunate Screening, ZeePedia, retrieved 8 March 2015,Mayhew, R n.d, Methods of HR Selection Techniques, Demand Media, retrieved 8 March 2015,Department of Human Services 2014, Recruitment, selection and induction, Department of Human Services, retrieved 11 March 2015,

Sunday, April 7, 2019

Angel and Demons Book Report Essay Example for Free

Angel and Demons Book Report EssayANGELS AND DEMONSAngels and demons is a heart pounding adventure scripted by the author Dan Brown and published in 2000. Dan Brown is also famous for his bestselling novel The Davinci cipher (published 2003) both these novels feature the fictional college professor Robert Lang put one across as the main character or hero in the story. Both of these stories revolve around the delicate subject of religion as he incorporates religious detail into fantasy.First off, our characters include Robert Langdon who is a professor of symbology at Harvard University. He is flown to a Swedish nuclear interrogation facility known as CERN (Which really does exist) by the director of CERN Maximilian Kohler to investigate the murder of esteemed scientist da Vinci Verta. Leonardo Verta was the head scientist of a research group working on an antimatter energy source until he was killed, and the anti-matter stolen. Robert leaves CERN with Leonardos daughter Vitto ria Vetra to capital of Italy in search of the stolen anti-matter.Robert leaves CERN with a new counterpart and unmatchable clue to straighten out the unraveling mystery of who stole the anti-matter and killed Leonardo Verta the ambigram branded into the scientist chest saying Illuminati. Soon after arriving in Rome Robert and Vittoria are rushed to Vatican City by commander of the Swiss guard Commander Olivetti, as the note grows more dire after four high ranking cardinals are kidnapped by the illuminati assassin, with one clue, one will each be slaughtered on the alters of science along the path of illumination. When the threat comes in that if they dont stop the assassin by eight oclock the Vatican will be destroyed, as they turn tail against the clock to stop the destruction of the Vatican new problems will rise and betrayal is around all(prenominal) corner.This book is strongly recommended for readers who enjoy large scale mysteries and people who enjoy stories involving c onspiracies. This is because this story involves a race against time and a struggle to stop a secret society that controls half of the government itself. This history is a mind bending race against time and an enemy who seems to be everyone and control everything.

Translation and Technology Essay Example for Free

definition and Technology Essay contents 4 Computer-Aided shift Tools and Re reservoirs Workbenches edition support tools and resources Localization tools Commercial computer-aided adaptation tools Standards for data interchange destruction 5 Evaluating explanation Tools Machine displacement reaction systems Computer-aided edition tools Stakeholders Evaluation methods General theoretical accounts for evaluating rendering tools Conclusion 6 Recent Developments and Future Directions Machine transmutation systems Computer-aided displacement reaction tools exposition systems with speech engineering science. displacement reaction systems for minority lectures rendition on the web Machine definition systems and the semantic web The localization industry Conclusion 7 description Types Revisited Relationships between topics and edition typecasts Machine deracination systems Computer-aided transformation tools Conclusion Appendices References Index93 93 106 113 117 119 128 129 129 131 133 135 139 151 152 152 156 157 162 164 166 170 171 172 173 191 193 195 197 204 218 List of Figures, T ables and Boxes Figures 1. 1 1. 2 1. 3 1. 4 1. 5 2. 1 2. 2 2. 3 2. 4 2. 5 2. 6 2. 7 2. 8 2. 9 2. 10 2. 11 2. 12 2. 13 3. 1 3. 2 3. 3 3. 4 3.5 3. 6 3. 7 3. 8 3. 9 sort of explanation types Machine displacement warning Machine explanation system based on usage homophile-aided railroad car translation get Machine-aided tender-hearted translation model Chronology of translation theories Translation function model illustration of sentence representations Holmes schema of translation studies A schema ofapplied translation studies A model of the translation a yet including pre- and post-editing tasks Example of an side of meat SL text edition and its pre-edited version Unedited and post-edited Spanish shape translation turn upput Example of natural and controlled languages.Example of original incline text and its AECMA simplified English version Example of natural English, simplified English and simplified Arabic texts Example of an English controlled language text and its translations Illustration of the translation process employ a automobile translation system Chronology of motorcar translation outgrowth Example of structural representations.Machine translation architectures Direct translation model Interlingua model Interlingua multilingual railroad car translation system model manoeuver model Transfer using tree-to-tree parsing Transfer multilingual elevator car translation system model ix7 9 10 12 13 23 29 31 37 42 43 44 46 48 50 51 53 54 58 68 68 70 72 72 74 75 76 x List of Figures, Tables and Boxes 3. 10 3. 11 3. 12 3. 13 4. 1 4. 2 4. 3 4. 4 4. 5 4. 6 4. 7 4. 8 4. 9 4. 10 4. 11 4. 12 4. 13 4. 14 4. 15 4. 16 4. 17 4. 18 4. 19 4.20 4. 21 4. 22 5. 1 5. 2 5. 3 5. 4 5. 5 6. 1 6. 2 Statistical-based model Probabilities work flow in the statistical-based bet terment Example-based model Translations by online mold translat ion systems Example of HTML code in a web page Example of the web page without HTML code Example of a translation workflow using a translation remembrance system Example of an English source text Pre-translation 1 Database model in translation memory systems Reference model in translation memory systems.Flowchart to illustrate how to build a couple corpus Example of a text header in a corpus Example of part-of-speech tagging Example of a concordance for the newsworthiness rope Types of tool use in a localization project Example of the translation process using a machine translation system, a translation database and a terminology database Example of TMXdata-sharing Example of a header in TMX Example of a body in TMX Example of a header in TBX Example of a body in TBX Example of XLIFF in the localization process Example of a header in XLIFF Example of a body in XLIFF Example of an alternate translation gene in XLIFF Example of a glass-box evaluation.Example of a black-box evalua tion Example of an evaluation process normalization projects for evaluating machine translation systems EAGLES general evaluation framework Future-use model of translation engine room Speech engineering in translation. 78 80 81 87 99 99 102 102 103 103 104 109 110 111 112 114 117 120 121 122 124 cxxv 126 127 127 127 138 139 141 142 145 154 158 Tables 1. 1 3. 1 An example of a table for describing translation types Example of a word entry in KAMI 8 67.List of Figures, Tables and Boxesxi 3. 2 3. 3 3. 4 4. 1 4. 2 4. 3 4. 4 4. 5 4. 6 4. 7 4. 8 7. 1 7. 2 7. 3 7. 4 7. 5 7. 6 7. 7 7. 8 7. 9 7. 10 7. 11 7. 12 7. 13 7. 14 7. 15 7. 16 7. 17 7. 18 7. 19 7. 20 Imitation in the example-based approach semantic similarity in the example-based approach Classification of m integrityymaking(prenominal) machine translation systems Example of perfect matching Examples of fuzzy matching Higher and lower threshold percentages for fuzzy matching Examples of matching suggestions for bow Example of segme nts Example of translation units Example of English-French translation units from a database Classification of mercenaryised computer-aided translation tools.Degree of mechanisation Human intervention Integrated tools Application of theory Application of theory in machine translation systems Source-language texts Target-language texts Stages of the translation process Types of text speech dependency Types of source language Data interchange standards in translation Translation groupsand data interchange standards Levels of evaluation Methods of evaluation Features in a machine translation system wrangle c everywhereage in machine translation systems Texts and computer-aided translation tools. talking to dependency in computer-aided translation tools Number of languages in computer-aided translation tools. 82 82 88 95 96 97 98 100 101 102 118 174 175 175 176 177 178 180 181 182 185 186 187 188 189 190 191 193 194 194 195 Boxes 1. 1 5. 1 A arranger at work FEMTI evaluation framew ork 14 147 Series Editors put in Recent eld know witnessed momentous changes in the study of Modern oral communications, globally as well as nationally. On the one hand, the rapid growth of English as a universal lingua franca has rendered the command of variant languages a less compelling commodity.On the other hand, the demand for intercultural mediators including representatives and interpreters has grown as a pass of m both recent social, political and economic developments these include legislative changes, the emergence of supranational organisations, the ease of travel, telecommunications, commercial pressures raising aw beness of local needs, migration and employment mobility, and a heightened aw atomic number 18ness of linguistic and homophile rights.Today, linguistically point students wishing to pursue a c beer in which they argon able to further their interest in languages and cultures would be more inclined to choose vocationally relevant courses in which tra nslation and interpreting dramatic event an important part rather than traditional. Modern nomenclature degrees. Thus the possibilities for headmaster work in translation and interpreting have been extended, especial(a)ly as a result of developments in technology, whether as facilitating the translation process or as a means of dissemination and broadening access to communications in a range of media.The role of translation is, for example, becoming increasingly important in the context of modern media much(prenominal) as television and cinema, whether for documentary or entertainment purposes. And the scientific possibilities for providing interpreting services, whether to the police officer on the beat or to the businessperson on a diverse continent, have extended the previously physically confined nature of mediating the spoken word.Not only do these new vistas open up opportunities for the professional linguist, they as well point to expanding areas of enquiry in Transl ation and Interpreting Studies. Practice and theory are of unwashed benefit, e special(prenominal)ly in the case of a relatively young discipline such as Translation Studies.As a result, the initiative aim of this series, written primarily for the MA and advanced undergraduate student, is to cotton up contemporary issues and concerns in army to win aware, theoretically based, accounts of developments in translation and interpretation. The second aim is to provide ready access for students interested in the study and pursuit of Modern deliverys to xii Series Editors Preface xiii vocational issues which are of relevance to the contemporary world of translating and interpreting. The final aim is to offer informed updates to practising professionals on recent developments in the national impacting on their discipline.Linguistic, Culture and Translation Studies University of Surrey Guildford UK GUNILLA ANDERMAN MARGARET ROGERS Acknowledgements I am obligated(predicate) to three individuals for their contri only ifions. This defy would have taken more time to complete if it had not been for Chooi Tsien Yeo who researched scene study for me. Words toiletnot express my gratitude to Stephen Moore, in between translation deadlines, for putting his experiences as a professional translator into writing. I am extremely indebted to Paul Marriott for his comments and suggestions, particularly on helping to visualize a new way to depict the multidimensional classification of translation types in Chapter 7.I would like to include especially the Duke University Libraries and Institute of Statistics and Decision Science at Duke University in providing me with the environment and research facilities where most of this rule book was written. Also my thank to the National University of Singapore Libraries, George Edward Library at the University of Surrey, and the Department of Statistics and Actuarial Science at the University of Waterloo for their help.I would also like to acknowledge the following authors, publishers and organizations for allowing the use of copyright material in this book John Hutchins, Harold Somers and Elsevier (Academic Press Ltd) for the classification of translation types in Chapter 1 Eugene Nida and the Linguistic Society of the States for the translation process in Chapter 2 John Smart and Smart Communications, Inc.for the controlled and simplified English samples in Chapter 2 Francis Bond and Takefumi Yamazaki for the KAMI MalayEnglish dictionary entry in Chapter 3 Paolo Dongilli and Johann Gamper for the building of a correspond corpus in Chapter 4 Tony Jewtushenko and Peter Reynolds of OASIS for XLIFF in Chapter 4 Enrique de Argaez at Internet globe Stats for the statistical figure on the Internet population in Chapter 6Michael Carl, Reinhard Schaler, Andy Way, Springer Science and business organisation Media, and Kluwer Academic Publishers for the model of the future use of translation technology in Chapter 6. To Antonio Ribeiro, Tessadit Lagab, Margaret Rogers and Chooi Tsien Yeo, my most sincere thanks for translating from English into Portuguese, French, German and Chinese respectively. I am solely responsible for any translation errors that occurred. A special thank you goes to Elsie Lee, Shaun Yeo, Angeliki Petrits, Mirko Plitt and Ken Seng Tan for answering virtually of my queries. xiv Acknowledgements xv.To Caroline, Elizabeth, Gillian and Lyndsay, thank you for helping out with keying in corrections on the earlier drafts. Lastly, to my sifu and friend Peter Newmark, a big thank-you for all the translation handlings we had during our coffeebiscuit sessions years ago. If it had not been for the series editors, Gunilla Anderman and Margaret Rogers, this book would not have been written. I am forever grateful to both of them for their feedback and comments. Thanks to Jill Lake of Palgrave Macmillan for her patience and understanding due to my country-hopping from Southeast Asia to North America during the writing of this book. Waterloo, Canada CHIEW KIN QUAH List of Abbreviations.ACRoTERMITE AECMA AIA ALPAC ALPS ALT-J/C ALT-J/E ALT-J/M AMTA ASCC ASD ATA BASIC BLEU BSO put CAT2 CESTA CFE CIA CICC CRATER CTE CULT DARPA DBMT DIPLOMAT DLT DTS EAGLES EARS EDIG Terminology of Telecommunications European Association of Aerospace Industries Aerospace Industries Association of America instinctive Language Processing informative Committee Automatic Language Processing System Automatic Language interpretive program japanese to Chinese Automatic Language Translator Japanese to English Automatic.Language Translator Japanese to Malay Association of Machine Translation in the Americas Automatic Spelling checker Checker AeroSpace and Defence American Translators Association British American Scientific International, Commercial Bilingual Evaluation alternate Buro voor Systeemontwikkeling Computer-Aided Translation Constructors, Atoms and Translators Campagne dEvaluation de Systemes de Traduction Automatique Caterpillar Fundamental English Central Intelligence Agency warmness of International Cooperation for Computerization Corpus Resources and Terminology Extraction Caterpillar Technical English Chinese University.Language Translator Defense Advanced Research Projects Agency Dialogue-based Machine Translation Distributed Intelligent Processing of Language for Operational Machine Aided Translation Distributed Language Translation Descriptive Translation Studies Expert Advisory Group on Language Engineering Standards Effective, Affordable Reusable Speech-to-Text European Defence Industries Group sixteen List of Abbreviations xvii.ELDA ELRA ENGSPAN ENIAC EURODICAUTUM EUROSPACE EUROTRA EVALDA EWG FAHQT/FAHQMT FEMTI GENETER GETA HAMT HICATS HT HTML IAMT IATE INTERSECT ISI ISLE ISO JEIDA JEITA JICST-E KAMI KANT KGB LDC LISA LMT LTC LTRAC MAHT MANTRA MARTIF Evaluations and Language resources Distribution Agency European Language Resources Association En glish Spanish Machine Translation System Electronic Numerical Integrator and Computer.European Terminology Database Aerospaceand Defence Industries Association of Europe European Translation Infrastructure dEVALuation a ELDA Evaluation Working Group to the full Automatic High Quality (Machine) Translation A good example for the Evaluation of Machine Translation in ISLE Generic Model for Terminology Groupe dEtude sprout la Traduction Automatique Human-Aided/ back up Machine Translation Hitachi Computer Aided Translation System Human Translation HyperText Markup Language International Association of Machine Translation Inter-Agency Terminology Exchange International Sample of English Contrastive.Texts International Statistical Institute International Standards for Language Engineering International Organization for Standardization Japan Electronic sedulousness Development Association Japan Electronics and instruction Technology Association Japan Information Center of Science and Technology Kamus Melayu-Inggeris (Malay-English Dictionary) Knowledge-based Accurate Translation Komitet Gosudarstvennoi Bezopasnosti Linguistic Data consortium Localisation Industry and Standards Association Logic-based Machine.Translation Language Technology Centre Language Translation Resources Automatic Console Machine-Aided/Assisted Human Translation Machine Assisted Translation Machine Readable Terminology Interchange arrange xviii List of AbbreviationsMASTOR MAT METAL METU MLIR MT NAATI NIST OASIS OCP OCR OLIF OS OSCAR PaTrans PAHO PDA PESA RDF RFC SALT standard generalized markup language SPANAM SUSY SYSTRAN TAP TAUM TBX TEMAA TGT-1 THETOS TMF TMX TOLL TONGUES TS TTS Multilingual Automatic Speech-to-Speech Translator Machine-Aided/Assisted.Translation Mechanical Translation and Analysis of Language Middle East Technical University MultiLingual Information Retrieval Machine Translation National Accreditation power for Translators and Interpreters Ltd. National Institute of Standards and Technology Organization for the Advancement of Structured Information Standards Oxford Concordance Programme ocular Character Recognition Open Lexicon Interchange Format Operating System Open Standards for Container/Content Allowing Re-use Patent.Translation Pan-American Health Organization Personal Digital Assistant Portuguese-English Sentence Alignment Resource Description mannequin Request for Comments Standards-based Access to Lexicographical Terminological Multilingual Resources Standard Generalised Markup Language Spanish American Machine Translation System Saarbrucker UbersetzungsSYstem System Translation.Think-Aloud Protocols Traduction automatique a lUniversite de Montreal TermBase eXchange Testbed Study of Evaluation Methodologies Authoring assist Text-into-Gesture Translator Text into Sign Language Automatic Translator for Polish Terminological Markup Framework Translation Memory eXchange Thai On-Line Library Act II Audio Voice Translation Guide Systems Translation Studies Theoretical Translation Studies List of Abbreviations xix.WebDIPLOMAT WebOnt WWW W3C XLIFF XLT XML Web Distributed Intelligent Processing of Language for Operational Machine Aided Translation Web Ontology World Wide Web WWW Consortium XML Localisation Interchange File Format XML Representation of Lexicons and Terminologies Extensible or Extensive Markup Language.This page on purpose left blank Introduction For over half a century, the demand for a variety of translations by assorted groups of end-users has enabled some types of translation tools to be developed. This is reflected in the systems that provide be discussed in this book, ranging from machine translation systems, computer-aided translation tools and translation resources.The majority of books and articles on translation technology focusing on the development of these systems and tools have been written from the point of view of researchers and developers. More recent publications written with tra nslators in mind have focus on the use of particular tools. This book is intended as an introduction to translation technology for students of translation. It can also be useful to professional translators and those interested in knowing near translation technology. A variant approach is taken in that interpretations of particular tools are not provided, and the development of different machine translation and computer-aided translation tools and their uses are discussed.Programming details and mathematical equations are not considered, except in the discussion of the statistical approach to machine translation where minimal essential formulae are included. Descriptions are given to allow readers to further investigate specific approaches or issues that might interest them, using references cited throughout the book.It is also important to note that no particular approach or design is deemed to be better than any other. Each and every one has their strengths and weaknesses. In many cases, readers leave alone find that examples of systems and tools are given but this does not suggest that they are the best they are simply examples to illustrate the points do. 1 2 Translation and Technology.While researching this book, I discovered that the majority of publications from the literature on translation technology are about the development of machine translation systems, primarily involving experimental systems developed or being developed at a number of universities and large commercial corporations across the globe. The book will show that many of these systems neer achieved their commercial authority and remained as experimental tools, while some others served as tools for other natural-language processing applications. By contrast, not much literature seems to be available on computeraided tools such as translation memory systems.As we shall see in this book, most computer-aided translation tools are developed by commercial companies and, as a result, p rogress reports on these tools are rarely published in the public domain. Furthermore, to cater to different needs and demands, a tool like a translation memory system comes in many versions from the most basic to the most advanced. Insights into the use of these tools can be found in translator magazines and from time to time also posted on the World Wide Web (WWW). The evaluation of translation tools falls into a field that is wellresearched. Again we will see that most of the literature focuses on the evaluation of machine translation systems.Furthermore, the extensive use of translation tools and translation processes involved in the localization industry tend to be discussed separately, giving the impression that they are not related to translation. These two areas are, however, directly relevant to translation technology. then they are also included in this book. Essentially, the book contains what is felt should be included in consecrate to provide an overview of translatio n technology. In order to keep the book at the given length, the topics have been guardedly selected with some described in greater detail than others. In some chapters, an abbreviated historical background has been deemed necessary in order to provide a better understanding of the topics discussed, especially in the description of the development of machine translation systems and their evaluation.However, in all cases, references have been provided which readers may choose to pursue at a later time. Suggestions for further reading are provided at the end of every chapter (Chapters 1 to 6). The first chapter discusses the definitions of terms referring to the use of computers in translation activities. Some of the terms can be confusing to anyone who is strange with translation tools. In some cases, the same translation tools are given different names depending on what they are utilize for in other cases, a tool may be differently class depending on the perspective of those who have developed that tool. Introduction 3 The aim in this chapter is consequently to shed light on these terminological and related matters.An alternative perspective to the four basic translation types fully automated high-quality machine translation, human-aided machine translation, machine-aided human translation, and human translation first proposed by Hutchins and Somers (1992) is introduced to reflect current developments in translation technology. This will be explored in more detail in the final chapter where the four translation types are reviewed in relation to topics described in the book.The second chapter discusses technology within the larger framework of Translation Studies as a discipline, focusing on the relationship between the engineering of translation technology, on the one hand, and Translation Studies including translation theory, on the other hand. The relationship between academic and professional groups involved in translation is also examined.This in t urn leads to a discussion of the involvement of a particular approach in linguistic theories known as formalisms in natural-language processing especially in the design of machine translation systems. A different perspective on the translation process involving pre- and post-editing tasks using a special variety of language called controlled language is also presented. This translation process is described using the translation model proposed by Jakobson (1959/2000), a translation model that differs significantly from the one proposed by Nida (1969). The third chapter gives detailed descriptions of different machine translation system designs also known as architectures.The development of machine translation over several decades, its capabilities and the different types of machine translation systems, past and present, are also included. Both experimental and commercial systems are discussed, although the focus is on the experimental systems. Even though machine translation has be en well-documented elsewhere, a discussion is deemed to be important for this book. It is felt that modern-day professional translators should be informed about machine translation systems because there is every reason to believe, as we shall discover in Chapter 6, that future trends in translation technology are moving towards integrated systems where at least one translation tool is combined with another, as is already the case in the integration of machine translation with translation memory.The fourth chapter describes the architectures and uses of several computer-aided translation tools, such as translation memory systems, as well as resources such as parallel corpora. Unlike machine translation systems, which are largely developed by universities, most computeraided translation tools are developed by commercial companies. Thus, 4 Translation and Technology information about such tools is harder to obtain. This chapter will also show that computer-aided translation tools are b ecoming more advanced and using different operate systems, and so standards for data interchange have been created. Three different standards are described. Currently available commercial translation tools are also discussed.In addition, this chapter presents an overview of other commercially available tools such as those used in the localization industry. The fifth chapter touches on the evaluation of translation technology. The discussion focuses on different groups of stakeholders from research sponsors to end-users. Also included in the discussion are the different methods of evaluation human, machine, and a combination of human and machine as evaluator. The choice of method used depends on who the evaluation is for and its purpose. It also depends on whether an total tool or only some components are evaluated. Also described in this chapter is the general framework of evaluation offered by various research groups in the USA and Europe.The literature on evaluation concentrates on the evaluation of machine translation systems either during the developmental stage or after the process of development is completed. Less information is available on the evaluation of computeraided translation tools. What is available is found mainly in translation journals, magazines and newsletters. The sixth chapter presents some recent developments and shows the direction in which translation technology is heading, in particular regarding the future of machine translation systems that are now incorporating speech technology features. The integration of speech technology and traditional machine translation systems allows translation not only between texts or between stretches of speech, but also between text and speech.This integration is proving to be useful in many specific situations around the globe especially in international relations and trade. This chapter also looks at research projects in countries that are involved in the development of translation tools for mino rity languages and discusses the problems encountered in developing machine translation systems for languages that are less well-known and not widely spoken. Another form of technology called the Semantic Web that has the potential to improve the performance of certain machine translation systems is also described. Included in this chapter, too, are issues such as linguistic dominance and translation demands on the WWW that are already shaping part of the translation industry.The book concludes by presenting an expanded version of the four basic classifications of translation types as suggested by Hutchins and Somers (1992) and introduced in Chapter 1. It is concluded that the Introduction 5 one-dimensional linear continuum originally proposed is no longer able to accurately reflect current developments in translation technology.Translation tools today come in different versions and types depending on the purposes for which they are built. Some are multifunctional while others rema in monofunctional. An alternative way must therefore be found to depict the complexities and multidimensional relationships between the four translation types and the topics discussed in this book.It is not assertable to put every single subject discussed here into one diagram or figure, and so, in order to gain a better understanding of how the issues are related to one another, they are divided into groups. Topics or issues in each group have a common theme that links them together, and are presented in a series of tables. However, it is important to bear in mind that not all topics can be presented neatly and easily even in this way.This clearly shows the complexity and multidimensionality of translation activities in the modern technological world. At the end of the book, several Appendices provide information on the various Internet sites for many different translation tools and translation support tools such as monolingual, bilingual, trilingual and multilingual dictionaries, glossaries, thesauri and encyclopaedia.Only a selected some are listed here, and as a result the lists are not exhaustive. It is also important to note that some Internet sites may not be permanent at the time of the writing, every effort has been made to ensure that all sites are accessible.1 Definition of Terms In translation technology, terms normally used to describe translation tools are as follows machine translation (MT) machine-aided/assisted human translation (MAHT) human-aided/assisted machine translation (HAMT) computer-aided/assisted translation (CAT) machine-aided/assisted translation (MAT) fully automatic high-quality (machine) translation (FAHQT/FAHQMT). Distinctions between some of these terms are not always clear.For example, computer-aided translation (CAT) is often the term used in Translation Studies (TS) and the localization industry (see the second part of this chapter), while the software community which develops this type of tool prefers to call it ma chine-aided translation (MAT). As the more familiar term among professional translators and in the field of Translation Studies, computer-aided translation is used throughout the book to represent both computer-aided translation and machine-aided translation tools, and the term aided is elect instead of assisted, as also in human-aided machine translation and machine-aided human translation.Figure 1.1 distinguishes four types of translation relating human and machine involvement in a classification along a linear continuum introduced by Hutchins and Somers (1992 148). This classification, now more than a decade old, will become harder to sustain as more tools become multifunctional, as we shall see in Chapters 3, 4 and 6. Nevertheless, the construct in Figure 1. 1 remains useful as a point of reference for classifying translation in relation to technology.6 Definition of Terms 7 MT CAT Machine Fully automated high quality (machine) translation (FAHQT/ FAHQMT) Human-aided machine tra nslation (HAMT) Machine-aided human translation (MAHT) Human Human translation (HT)MT = machine translation CAT = computer-aided translation Figure 1. 1 Source Classification of translation types Hutchins and Somers (1992) 148. The initial goal of machine translation was to build a fully automatic high-quality machine translation that did not require any human intervention. At a 1952 conference, however, Bar-Hillel reported that building a fully automatic translation system was unrealistic and years later still remained convinced that a fully automatic high-quality machine translation system was essentially unattainable (Bar-Hillel 1960/2003 45). Instead, what has emerged in its place is machine translation, placed between FAHQT and HAMT on the continuum of Figure 1. 1.The main aim of machine translation is still to stimulate translation automatically, but it is no longer required that the output quality is high, rather that it is fit-for-purpose (see Chapters 2 and 3). As for huma n-aided machine translation and machine-aided human translation, the edge between these two areas is especially unclear. Both classes are considered to be computer-aided translation as indicated in Figure 1. 1 (Tong 1994 4,730 see also Slocum 1988 Hutchins and Somers 1992). However, in Schadek and Moses (2001), a different classification has been proposed where only machine-aided human translation is viewed as synonymous with computer-aided translation. Human-aided machine translation is considered as a separate category.The reasoning behind the view offered by Schadek and Moses is not difficult to understand. At least theoretically, the oddment between the two is obvious. For human-aided machine translation, the machine is the principal translator, while in machine-aided human translation it is a human. In practice, however, it may be less easy today to draw a distinguishable boundary between them. The blurring of boundaries is further complicated when human-aided machine transla tion is considered as a subclass of machine translation, an approach chosen by Chellamuthu (2002). Since human-aided machine translation has 8 Translation and Technology the machine as the principal translator