Saturday, August 31, 2019

Relationship between IQ and GPA Essay

In this study, relationship between Intelligence Quotients (IQ) and Grade Point Average (GPA), the correlation is very strong. Correlation is known to be a positive. The meaning of this correlation is the relationship between the Intelligence Quotients (IQ) and the Grade Point Average (GPA). This correlation implies that individual with high Intelligence Quotients (IQ) have a high Grade Point Average (GPA), in my opinion it does imply that the having a higher IQ means that you brain is Intelligence Quotients. This means you are smarter, therefore your GPA will be higher. This correlation by the information was giving to me, did not have enough information to tell if having a high IQ causes higher GPA. More evidence would have been needed to answer this question appropriate. Students who have metal impairment or other mental disabilities where not mention in this case study in order to determine if it would influence this relationship. The connection between correlation and causation is according to text is the two characteristics co-vary, or vary together, does not resume that one necessary cause the other. Some of the factors that affect the size of this correlation are shapes of distribution, sample sizes, outliers, restriction of range,  aggregate samples, ecological, inferences, random error of measurement, and correlations with third variables (Chen & Popovich, 2002). Correlation is a good predicting GPA for this test because it allows one to compare variables together on one chart. Reference Chen Y, Peter. & Popovich M, Paula. (2012). Factors Affecting the Size and Interpretation of Pearson’s Saga Research Methods.Retrieved from http://srmo.sagopub.com/view/correlation/d35.xml

Friday, August 30, 2019

Native American Indians Then and Now Essay

Native American Indians Native American Indians have not changed much in hundreds of years. The Natives still have the same belief as they did from the beginning of time. They are still forced to live on reserved lands that do not seem livable and are in worse conditions now than ever before. Even though people think due to casinos that the American Indians have it made, the Natives are still being mistreated, many tribes are well below poverty levels, highest in death rates, have the most number of preventable diseases, the highest of teen suicide than anywhere in the Nation. Native American Indians traditions go back to the beginning of time. The Native religion is more about sacred and ceremonies. The Native people do not have a word for religion it is more a way of life to them than a religion. According to one researcher, â€Å"There is not one Native tradition to represent Native religion. Just as there are numerous Christian beliefs the Native people have many different beliefs. The Native ceremonies are so similar that it is impossible to discuss them as one† (Burbar, and Vernon 2006) The Natives have always been connected to the lands. Most of their ceremonies and sacred objects come from the lands and has everything to do with how they feel about them. Native people do not believe they can own the lands that people are merely caretakers of it. The Native believe that the land is a gift from the Creator, put here to give them tools for survival. They believe if they take something from the land that they must give thanks for the gift given. They do this by offering sacred herbs, prayer, and dance. Native American Indians The Native people give each member roles to keep the villages running smoothly. The Native men hunt and protect the village, while the women gather fruits, berries, and keep the camps, the children gathered wood, help clean hides, look after the younger children and clean the camps. One researcher studies tells stories of how some tribes are at certain times in the tribal life. â€Å"On the Northwest coast, young women were taught that the wives of Makah whale hunters must very still in bed while their husbands hunted, since their movement influenced the whale’s behaviors. In a Navajo story Black God had all animals penned up until his wife opened the gate. The animals escaped and thereafter had to be hunted, (Kidwell, 1998). All of this became threatened with the arrival of foreigners. With the foreigners coming and bringing there Christian beliefs the Native traditions were going to be challenged. With the start of the White Mans government the Natives faced having several ceremonial rights taken away for hundreds of years. The Natives were stopped from worshiping in manners they were accustomed. The Natives were forced to worship the Christian belief and if they refused they were put to death or imprisoned. Many of the Native traditional ceremonies were stopped completely. Two of those rights at this time were the Ghost Dance, and the Sun dance. The Natives found ways around this; they would go to places they knew white men would not to have ceremonies that had been band. Due to so many of the Native rights being taken away the Natives formed a group called â€Å"American Indian Movement† (AIM). AIM in the early years was called â€Å"Indian wars†. After fighting the government for several years and fighting for their right to religious freedom President Jimmy Carter signed the American Indian Religious freedom Act, Native American Indians (AIRFA). Burke, and Vernon, 2006), AIRFA was one of the very few times when congress gave the Natives the legislative right to worship in the manner he or she feels fit. (Burke, and Vernon, 2006). After a few more decades of being mistreated and having rights taken and treaties broken Aim reformed again. AIM’s early and best known leaders, Russell Means, Dennis Banks, Clyde and Vernon Bellecourt, these Native men formed together to fight for the rights of all indigenous peoples across the world. According to one research study, the â€Å"Trail of Broken Treaties† was â€Å"AIM’s first national pretest event of the 1970’s. AIM’s best-known and controversial protest action began February 1973 in Wounded Knee, South Dakota, a small town in Pine Ridge Reservation†, (Encyclopedia Race and Racism p. 82) better known now as the â€Å"Siege at Wounded Knee†. The siege lasted 71 days and when it was over several of the AIM members were arrested for causing riots. Many of the AIM leaders spent years in legislation, exile, or prison. One of the best known cases is that of Leonard Peltier. Peltier was imprisoned for killing two FBI agents. Several years later it was proven that Peltier did not receive a fare trial. Much of the evidence was not allowed in court and was suppressed from the jurors. After decades of trying to get Peltier freed from prison he was finally deemed the only American political prisoner in 1984. Peltier is still in prison to this day and the Natives are still fighting for his release. A more resent less known case August 22, 2008 of the Natives not receiving justice is the case of Robert Whirlwind Horse 23 and Calonnie Randall 26. These two Natives was struck and killed by a drunk driver Timothy Hotz while walking on a reservation road. This was Hotz Native American Indians fourth DUI, one year prior Hotz had his third DUI. After striking the Natives Hotz continued to drive home without stopping. The next morning Hotz noticed hair on his bumper and turned him self in to authorities. Mr. Hotz received 51 months for killing the Native men. This infuriated the Natives once again. (Means, Russell, Republic of Lakota 2009, April 22). Another case of a young native boy went to the Bureau of Indian Affairs (BIA) and was upset at the justice received over Hotz actions and was outraged. He shot one bullet into the radiator of the BIA agent’s car and received 20 years imprisonment. The Natives are still being forced to live on reservations. The reservations are in such horrendous conditions almost all the reservations are in worse conditions than most third world countries, (Republic of the Lakotah, conditions); According to one Native â€Å"It is like living in Hattie’s†,(Means Russell). The Pine Ridge Reservation in South Dakota is one such reservation. â€Å"The United States Government has not upheld many of it promises to the Lakotah people and the results to this is astonishing†, (Means, Russell, Republic of the Lakotah). Due to the conditions the Lakotah people are forced to live in has caused them to have the highest death rates than anywhere else in the Nation. Reservations across the country are well below the poverty level. (Figure 3 below) The average life span of a Lakotah Male is 44 years. (Figure 1 below) The Lakotah people have the most preventable diseases than anywhere in the nation. Much of the disease could be stopped if the government would allow the Natives have vaccines and medications. The teen suicide rates are the highest of anywhere in the nation.

Thursday, August 29, 2019

Archimedes theory of a circle ABCD and a triangle K

Archimedes theory of a circle ABCD and a triangle K Archimedes compared the area enclosed by a circle to a right triangle whose base has the length of the circle’s circumference and whose height equals the circle’s radius. If the area of the circle is not equal to that of the triangle, then it must be either greater or less. He then eliminates each of these by contradiction, leaving equality as the only possibility. Archimedes’ proof consists of constructing a circle ABCD and a triangle K. Archimedes starts by inscribing a square in the circle and bisects the segments of arc AB, BC, CD, DE subtended by the sides of the square. Afterwards he proceeds to inscribe another polygon on the bisected points. He repeats this process until the difference in area between the circle and the inscribed polygon is smaller than the difference between the area of the circle and the area of the triangle. The polygon is then greater than the triangle K. Archimedes then proceeds to explain that a line from the center of the polygon to the bisection of one of its sides is shorter than the radius of the circle, and its circumference is smaller than the circumference of the circle. This disproves the statement that the polygon is greater than the triangle, since the legs of the triangle are made up of the radius and circumference of the circle. The triangle K cannot be both smaller and larger than the polygon, and thus cannot be smaller than the circle. After Archimedes proved that that the triangle cannot be smaller than the circle, he continues to prove that the triangle cannot be larger than the circle, either. This is accomplished by first assuming the triangle K to be larger than the circle ABCD. Then, a square is circumscribed around the circle so that lines drawn from the center of the circle will go through the points A, B, C, and D and bisect the corners of the square, one of which Archimedes labels T. Archimedes then connects the sides of the square with a tangent line and labels the points at which the line meets the square G and F. He goes on to say that because TG GA GH, the triangle formed by FTG is larger than half the area of the difference in area between the square and the circle. Archimedes uses the fact that continual bisecting of the arc of a circle will produce a polygon with this characteristic to assert that continuing this method will ultimately produce a polygon around the circle such that the difference in area between the polygon and the circle is less than the difference in area between the triangle K and the circle. The polygon is thus less in area than the triangle K The length of a line from the center of the circle to a side of the polygon is equal to the radius of the circle. However, the perimeter of the polygon is larger in length than the circumference of the circle, and since the circumference of the circle is equal to the length of the longer leg of the triangle, the polygon must be larger in area than the triangle K. Again, the triangle cannot be both larger and smaller than the polygon, so the triangle cannot be larger than the circle. Archimedes accomplished to prove his theory by using contradiction. After he proved that the triangle with legs equal to the radius and circumference of a given circle is not greater or less in area than that circle he concludes that the two must be equal in area.

Wednesday, August 28, 2019

Is Abortion Right or Wrong Essay Example | Topics and Well Written Essays - 1000 words

Is Abortion Right or Wrong - Essay Example In most cases, it is carried out in the middle and late stages of pregnancy. Abortion is morally wrong because it brutalizes the person who performs the act and deprives or denies the fetus right to live. Killing a person denies them opportunities to their experiences, projects, activities and enjoyment that they would have made in the future. What makes abortion worse is the fact that the victim is not only denied experiences and projects but there are some other things, which the aborted fetus cannot enjoy now but would have experienced them in future. Abortion permits women to terminate their pregnancies, and it involves the killing of the fetus. The issue of abortion is an intricate matter to discuss because it depends under what circumstances it is conducted. The prochoice argue that abortion is a right that should be respected by all people and institutions in that it should not be limited. Contrary to this, prolife argue that life begins at conception and therefore, terminatio n of pregnancy is not acceptable since it is the killing of the unborn baby. It is not good to authorize abortion when women who are unable to conceive are willing and ready to adopt. For a long time, proponents of abortion have argued that a developing fetus is not a human being, therefore, it is ending the pregnancy not the child because according to them personhood starts at birth and not at conception as argued by the Prolife. In addition, they assert that fetus are unable of feeling pain during the process of abortion this is because they believe that biological process has not taken place to support the feeling of pain. More so, they contend that a woman has a right to choose what she thinks is best for her and thus she is permitted to do whatever pleases her. For them, abortion is right because a baby should not be brought into this world unwanted since parenting is a significant long process that needs responsible preparation, planning, and consideration. Contrary, the Proli fe argue that unborn babies are human beings from the time of conception. They have a right to life like other people, which must be respected and protected. Additionally, the assertion that fetus do not feel pain is unsubstantiated because when a fetus is beyond twenty weeks of gestation, they start feeling pain, therefore, during abortion process, they undergo excruciating and severe pain (Kaczor 79). Abortion removes a potential societal contribution of the unborn baby. It is unethical to kill because the fetus is a ‘moral human being’ because it has duties or responsibilities and rights, since unborn baby is a human being; it has the same rights and privileges. For instance, a country like United States of America would be very different if the mothers of the nation’s scientists and heroes had chosen to abort them. Some philosophers have denounced the argument that fetus have rights because they believe that being a human being is not morally important in its elf. If most human beings have rights, it is not because they belong to human species that is innately morally blessed, but because of some other aspects that define a human being such as self-determination, and self-awareness that makes a person, a fetus does not have all these features to enjoy the rights that born human beings enjoy. Philosophical argument about abortion asserts that abortion does not liberate women but permits society not to provide for women’s needs. Therefore, women demand for equality is not free access to pregnancy termination but they have to be offered what they need to survive as mothers. Abortion as a process is risky to women since it can cause long-term emotional and physical damage to women who have practiced it (Beckwith 39).

Tuesday, August 27, 2019

Fiscal condition of the federal government today Essay

Fiscal condition of the federal government today - Essay Example The US financial crisis threatens not only its constituent states but also the world at large. The crisis has been around for some time. It started slowly with fears of the worst since 2003. As the years progressed, the fears came to pass with the present financial status leaving more to be desired in the financial markets.The last six months have demonstrated financial volatility (not only in US but world over) that has never been witnessed may be since the great depression (O'Connor, 2001. pp.10-15). This paper seeks to evaluate the present fiscal condition of the US federal government with emphasis on the causes of the crisis and an exploration of the effects of the crisis on both the public and private domain. The federal government fiscal crisis is echoed by the serious struggle by the states and local governments through unfathomable and prolonged fiscal crisis which has since spread from the federal government to haunt them. The states', not mentioning the federal government's , revenues are declining sharply or if they are growing, then this growth is indeed very slow to be noticed. This is made worse by the federal government out spending its revenues. The crisis is likely to continue unless some quick and informed remedial measures are not taken.According to the 2002 financial year report, as at September 2003 the federal government had more than $1 trillion reported assets with slightly more than $8 trillion in liabilities leaving $7 trillion accumulated deficit with a reported $365 billion operating deficit and a $158 billion unified budget deficit. The projection by the general comptroller and CBO was that the situation was headed for worse with the unified budget deficits likely to hit $401 billion and $480 billion in 2003 and 2004 respectively. This means that there was no hope in 2002 and the situation was expected to worsen with time. 2008 was recorded the climax of the financial market redundancy and thus you can imagine the situation in 2008 i f it is worse than the figures projected for 2003 and 2004. The 2008 was marked with acute financial crisis with the financial market feared to be headed for a clash. The cause of the situation was immediately credited to the borrowers who were at the verge of insolvency and thus pulling down the lenders. These borrowers include the auto industry which has since received $15 billion bailout. Based on this insolvency, most lenders declined to lend thus affecting the mortgage industry and the stock market. Apart from the cause mentioned above, the other causes of this sticky financial crisis may be traced down to the weakening economy, the 1990's tax cut policies taken by the federal and state governments, sharp decline in stock markets, and the structural anomalies in the state and federal government tax systems among other seen and unseen causes. Focusing on policy, it is common knowledge how federal policy can impact state finances. Since the 1990's, the federal government set policies to provide subsidies to the state and local governments. The subsidies were to be provided because the federal government asked the states to reduce the cost of taxes on the taxpayers. This tax cut was later to haunt the federal government. The federal government also exempted interests on bonds from the federal taxation. Another tax policy is the fact that the federal government managed the entire estate tax and shared the tax revenues amongst the states. The 2003 Jobs and Growth Tax Relief Reconcili ation Act (JGTRRA) came with a counter- cyclical fiscal relief or subsidies for the states. The fiscal relief amounted to $20 billion over 2003 and 2004. The fiscal reliefs to cover the tax cuts instituted by the federal government ate significantly into the federal governments financial reserves. This together with the ever increasing demand for better Medicaid and Medicare funding thoroughly utilized the federal finances. The percentage allocation for Medicaid, Medicare and other social welfare programs increased to more than 60% raising concern

Monday, August 26, 2019

Homeland Security Advisory System Essay Example | Topics and Well Written Essays - 750 words

Homeland Security Advisory System - Essay Example This efficient system is used to create structure and context for national discussion regarding threats that oppose the homeland and help in taking proper measures that can play an appropriate role in protecting the country. This system seeks to facilitate and inform proper decision that rate to various levels of government and to local citizens present at work and home (Loeb, 2007). This powerful system was launched on March 11th 2002, by Homeland Security Presidential Directive 3 as a way to secure the conditions after 11th September 2001. It has the initiative to provide a â€Å"comprehensive and effective means to disseminate information regarding the risk of terrorist acts to federal, state, and local authorities and to the American people." This was said by Tom Ridge, the assistant to the President for Homeland Security on 12th March 2002. However, the role of managing, implementing and developing the system was the duty of the U.S Attorney General (Loeb, 2007). On January 2003, a new department known as Homeland Security (DHS) started administering this system. Now, the decision to â€Å"announce the occurrence of threat conditions is performed by the Secretary of Homeland Security in consultation with the Assistant to the President for Homeland Security.† (Homeland Security Presidential Directive-5) The Homeland Security Advisory System that binds the services various levels of government and other private sectors. In this system, there are five Threat Conditions that identify the description of the threat by the color they have. Each level of threat has a subsequent color which describes the intensity of the expected attack. Each level; from highest to lowest, following is the colors: This proves that the higher the level of Thread Conditions is the greater are the chances of terrorist attacks. The terrorist attacks include both; the reason why the attack is occurring and the potential

Sunday, August 25, 2019

Local paper Essay Example | Topics and Well Written Essays - 250 words

Local paper - Essay Example Dauskurdas represents the authors’ last name. The reference page provides a reader with information that will enable the location and retrieval of the sources cited in the essay or article. Angeli et al explains that the reference page in APA format comes at the end of the paper. The reference page has the heading reference centred on top of the page. In order to give a clear distinction between the writers voice and the ideas or thoughts of other authors we utilise signal phrases. For example in the article, Dauskurdas (2012) reports on the district spokesperson comment on their reason for denying the theatre to perform the play. The word "reports" is a signal phrase. Plagiarism is the use of somebody’s words or ideas without quoting or citing the source. This can be through directly copying the idea or using diagrams charts or data utilised by another author and not providing a citation. A hanging indentation explains how the reference list is presented, for example, in the article we cited the first line is flushed towards the left, and the lines that follow are indented. This represents the APA format-hanging indent. Direct quotation refers to the exact reporting of words used by an author or speaker. Angeli et al. State when directly quoting in APA format we cite the authors name, date of publication and the page the where the quote can be found. A signal phrase introduces a signal phrase (Angeli et al., 2010). Paraphrases are words or ideas that have been restated to fit the description writers own words. Paraphrasing helps in preventing plagiarism a clear understanding of the article read. APA format encourages paraphrasing as a way of avoiding plagiarism and too much quoting. Quotation marks are punctuation marks that enclose the exact words of a speaker or written ideas of another author. The APA format suggests the utilisation of quotation marks on titles of shorter works. These include journal article, televisions series, and song titles.

Biological molecules Essay Example | Topics and Well Written Essays - 1250 words

Biological molecules - Essay Example The two strands of the helix run in opposite directions (1 "up" and 1 "down"). The inner edges of the helices are formed by the nitrogenous bases and they run in pairs. Adenine pairs with thymine with 2 hydrogen bonds and cytosine pairs with guanine with 3 hydrogen bonds (Murray et al, 2007). DNA is present in the chromosomes of most of the living beings. The human genome approximately has 3 billion base pairs of DNA which are arranged in the 23 pairs of chromosomes. Sequence pieces of DNA form genes which carry vital information. The genetic information is achieved by complementary base pairing. Transmission, transcription and translation are the steps involved in transmission of genetic information. Currently, DNA is used in the field of genetic engineering for the treatment of many diseases (Murray et al, 2007). RNA or ribonucleic acid is similar to DNA except that it is single stranded and the sugar present in it is ribose sugar. RNA consists of repeating units of nucleotides which are made up of a nitrogenous base, a ribose sugar and a phosphate. The pyramidines are guanine and cytosine and the purines are adenine and uracil. RNA is transcribed from DNA by the enzyme called RNA polymerase. There are basically 2 types of RNA: coding RNAs and non-coding RNAs. Messenger RNA (mRNA) is a coding RNA. There are many non-coding RNAs. These include ribosomal RNA (rRNA), transfer RNA (tRNA) and others. Functions: mRNA carries information from DNA to the ribosome which is the site of synthesis for proteins. The amino acid sequence in the protein is based on the coding sequence of the mRNA. tRNA and rRNA are involved in the process of translation. Many other non-coding RNAs are involved in RNA processing, gene regulation, catalysis of chemical reactions, cutting and ligation of other RNA molecules, catalysis of peptide bond formation in the ribosomes and other roles (Murray et al, 2007). Carbohydrates Structure: Carbohydrates are organic compounds that are either ketones or aldehydes with many hydroxyl groups added. These hydroxyl groups are added one on each carbon atom that is not a part of either the aldehyde or the ketone group. Thus the general formula of a carbohydrate can be designated as (C'H2O)n. Here n is any number greater than 3. There are many carbohydrates like uronic acids and fucose which don't have this formula in their structure. Also, all chemicals which have this structure do not fall into the category of carbohydrates. The basic carbohydrate units are monosaccharides. These are further classified based on the number of carbon atoms, the placement of the carbonyl group and the chiral handedness. Monosaccharides with the carbonyl group aldehyde are known as aldoses, those with carbonyl group ketone are known as ketoses, those with three carbon atoms are known as trioses, those with four are called tetroses, five are called pentoses and six are hexoses. Each carbon atom wi th a hydroxyl group (except the first and last carbon atoms) is assymmetric making them stereocenters with either right-side configuration or left-side configuration. Thus many isomers can exist for any given monosaccharide formula. Glucose, galactose and fructose are monosaccharides. Monosaccharides can link together in many ways to form disaccharides and poly- saccharides. One or

Saturday, August 24, 2019

Plato Essay Example | Topics and Well Written Essays - 500 words - 2

Plato - Essay Example o that we gain the knowledge of Socrates, perhaps one of the ancient world’s most famous philosophers but what were the ideas of Socrates and which were the ideas of Plato remains a mystery today. Plato, who was a student of Socrates, pulled together the ideas of his mentor and Pythagoras to combine them with his own response to what he’d seen of the world to develop his Theory of Forms. In this theory, the ultimate goal was to progress through the levels of reality to the highest level, also known as the greatest good. According to Plato, reality is not the world of substance and things that we can see in everyday life, but is something more abstract that can only be obtained through intellectual thought (Strathern, 1996, p. 25). To help explain his Theory of Forms, Plato developed what is today referred to as the Allegory of the Cave. In the dialogue Plato presents, Socrates explains how people have been chained since childhood with their vision restricted to a giant screen in front of them. They can see the shadows of marionettes and other things dancing, but the actual colors and nature of these things cannot be perceived from such a perspective. These are the Forms of Plato’s theory. Not having known anything else, Socrates argues that the humans don’t know there’s something to miss: â€Å"To them, I said, the truth would be literally nothing but the shadows of the images† (Plato 388). Because of the pain of the bright light of truth, Socrates also explains that individuals will attempt to reject the truth, the colors and textures of the real Forms, for the more comforting and familiar shadows. Eventually, they come to accept the truth, though, and are sometimes able to help others still trapped in the cave to come out and see the truth. Plato also outlined an elaborate description of utopia in The Republic. Here, he sets forth an example of a just society in which there are no possessions, children removed from their parents soon after

Friday, August 23, 2019

News paper summary Essay Example | Topics and Well Written Essays - 500 words - 2

News paper summary - Essay Example Overall, it is a necessary step to regulation of economic critical situations in financial sector. The article Bank of America Again Requests 5-Cent Dividend discovers several attempts of Bank of America to increase dividends from one cent to five cents a share. The increase was proposed and rejected in 2011. This march the Fed approved the increase; however, the change was stopped because of miscalculations in documents. Now it is a time for the next attempt. Bank of America will get much money from the increase in dividends. However, it was fair that the Fed banned the change due to mistakes in docs. Overall, if the organization wants to get benefit, it has to work hard to make sure that their activities are legally correct. Otherwise, they will spoil their reputation. The article Capital-Raising in India Is Poised to Rise make optimistic prognoses concerning the future of economy in India. After the arrival of new government, the country experience boost in investing and development. The only concern related to paperwork; organizations need to develop and formulate their fundraising plans for future. Economy in India will be actively developing in the nearest time. The article shows that it becomes more stable in hard industries as well as financial sector. Stability will attract more investors who will join people willing to invest in India. This country has great reaources and potential for long-term cooperation. The article Big Commodity Traders Gain Clout dwells on success of four commodity traders which include Vitol,  Glencore PLC, Cargill Inc. and Trafigura. These companies boost their profit and become as successful as Apple or Chevron. Their success becomes even more outstanding because they actively buy assets in hard industries. These companies are engaged in trade of raw materials which make them stable and profitable. Titles of the companies mentioned in the article cannot be compared to Apple in their popularity; however, they become

Thursday, August 22, 2019

Weekly News from the Arab World Essay Example for Free

Weekly News from the Arab World Essay There has been an observable interest coming from the public regarding events that is happening in the Arab World. This has something to do with the situations that happened in the past that involved the peace and order of the region. At present, the interest of most people is based on how the countries in the Middle East will deal with the present global financial crisis. News from this region mostly pertains to this issue as well as other events that are related with its peace and security. This week’s news gave emphasis on the situation of the Arab World when it comes to their financial stability especially with the looming crisis in their midst. According to recent updates, Arab markets continue to deteriorate. The region’s decreasing economic robustness is observable in its stock market that has been decreasing for four straight days. Tadawul All of Saudi Arabia, which is recognized as the largest stock holder in the Middle East, experienced a decreased of more than 7. 5 per sent of their shares. In the same manner, other Arab countries like the shares of Dubai lost more than 25 per cent of their trading value and even the Kuwait stock exchange, the second largest in the region decreased by 2. 8 per cent. These clearly show that the Arab World is also greatly affected by the financial crisis in the world today (Aljazeerah, 2008). There are also observable security threats in some countries in the region. This is greatly evident in Iraq when a bomb exploded at the Abu Dshir market. The bomb exploded a vehicle that killed 13 people and inflict injury to another 27. Even though there are still violent incidents in the country, police reported there is a steady decline in this kind of incidents. The latest notable attack was when the MP Moqtada Sadr from the Shia was killed by using a roadside bomb (BBC, 2008). On a lighter note, good things are also happening for some countries in the Arab World. One of which is the exclusion of Jordan from Egypt’s rice embargo. Egyptian Minister of International Cooperation Fayza Abul Naja explicitly announced that Egypt is willing to provide Jordan’s rice needs. This transaction does not only stand for economic partnership for these two countries but it also symbolizes their strengthening relationship. The Arab World like any other region in the globe is also facing numerous challenges (The Jordan Times, 2008). These problems occur in different areas of concern in the region. Nevertheless, they are doing what they can in order to address these dilemmas immediately to achieve favorable results for the Arab countries and most especially its people. References Aljazeera. (2008). Arab markets continue to dive. Retrieved October 10, 2008, from http://english. aljazeera. net/news/middleeast/2008/10/200810811223643836. html. BBC. (2008). Deadly bomb attack at Iraq market. Retrieved October 10, 2008, from http://news. bbc. co. uk/2/hi/middle_east/7664057. stm. The Jordan Times. (2008). Egypt excludes Jordan from embargo on rice exports. Retrieved October 10, 2008, from http://www. jordantimes. com/? news=11225.

Wednesday, August 21, 2019

Analysis of Cloud Storage In Robotic Environment

Analysis of Cloud Storage In Robotic Environment Cloud Computing: Analysis of Cloud Storage In Robotic Environment Tushar Gupta Sunil Yadav Abstract— Cloud is a well-designed data storage model concerned with the storage of information on the web. Such storage has greatly revolutionized the robotic environment for learning purpose. This paper provides an overview of how databases in cloud deliberate to store knowledge fabricated by both robots and human in a robot-readable open format that will support existing as well as forthcoming robots learn faster. These robots will pick up the aggregate knowledge which will be accumulated in the cloud storage so as to perform a set of tasks including navigation, task information like how to pick up an object as well as object-recognition data such as digital models of real-world objects, to simultaneously confine itself in the unknown environment and to construct a map of the environment without having any knowledge in advance. Keywords—cloud, storage, robotics, robobrain, rapyuta I. Introduction From decades, it has been noticed that robots are mainly empowered with programming embedded in a chip but a small defect could result into malfunctioning of the whole unit and hence affect learning ability of robots. As such certain mechanism is required that will provide guarantee in terms of reliability, security and robustness. Due to great processing power of cloud it paved the way as an appropriate utility in Robotic Environment. Cloud robotics is one such step taken towards, that has evolved idea of leveraging the Internet for robots, and offers extraordinary opportunities for robot learning. Instead of using the World Wide Web for rapid communication or faster reckoning, a key factor is allowed for robots to generate and collaboratively update shared knowledge repositories. Such knowledge bases will power robots to deal with the intricacies of human environments and offer a simple yet powerful way for life-long robot learning. [1] The objective of the European-Commission-fund ed initiative is to evolve proof-of-concept demonstrations that show the way that cloud repositories like RoboEarth’s databases can greatly prompt robot learning and how they may finally allow robots to act well beyond their preprogrammed behaviors. As many AI Researchers are putting effort in establishing a database in cloud which they called â€Å"RoboBrain† that will house all the information which robots have learned till now and help them further their knowledge by sharing that knowledge. On the developer’s hand, they will have access to RoboBrain’s massive database, free of charge and wirelessly. [2] Aditya Jami, from Cornell, who depicted the database for RoboBrain said this about it: â€Å"The RoboBrain will look like a gigantic, branching graph with abilities for multi-dimensional queries.† By sharingparameters, data, files and everythingelse robots have gathered till now, their developers will access and automates the robot’s grasp ing of their ambiances, including speech and voice recognition, grasping, navigating and perception of different objects. Year 2010 was firstly marked as the self-drivingcarscame in our lives which afterwards tracked by RoboEarth (a system that allow the robots to distribute their knowledge wirelessly between each other). II. Literature Review A. Cloud Robotics Cloud Robotics is a specialized application of cloud computing that deals with the study of robots and their environment. Since with the help of cloud all the data will get stored on the web which in turn has greatly boosted the ability of robots to perform all workings by sharing experience with each other in order to provide a precise response. Due to connection with cloud network it is easier for robots to collaborate with other objects, machines and human beings. At the same time, internet has highly augmented the capabilities of robots by providing service on demand and offloads computation. Cloud robotics has greatly overcome the problem of network robotics due to their resource, information and communication constraints. With the arrival of cloud robotics expenditure of maintenance and updates and requirement of custom middleware has solved up to a great extent. Fig 1: Driven by advances in mobile communication technologies, lots of robotics applications can be executed in the cloud environment[3]. Robots are able to perform some computationally heavy tasks such as mapping, planning and probabilistic interference through the accessibility of huge computational infrastructure. RoboEarth is one such attempt that offers a cloud based infrastructure, which can help a robot to send some data to cloud and get the data back from the cloud in some other form. RoboEarth is a kind of database that stores the knowledge generated by either humans or robot but in a machine readable format. RoboEarth knowledge base is supposed to consist of a variety of data including task knowledge (e.g. manipulation strategies, action recipes etc.), several software components, maps for navigation (e.g. world models and location of objects), model that aids in recognition of different objects.(e.g. object models, images). Rapyuta which is also considered as the RoboEarth cloud engine is highly responsible for powerful computations to the robots. It is implemented as Platform-as-a-Service which is open sour ce designed to suit robotics application. It enables the robots to unburden heavy computation to protect cloud’s computing environment with marginal configuration. Rapyuta is considered to provide efficient access to the bandwidth which in turn provides access to the repository of knowledge on cloud enabling robots to learn skills and share experience with other robots. The components of the cloud robotics are so well structured and interconnected that they provide the environment for the deployment of large robotic teams. B. Software Components RoboEarth system is powered with the cloud infrastructure which in turn supported by RoboEarth databases and RoboEarth cloud engine (Rapyuta) in addition with several software components. Such software components are responsible to interact with the RoboEarth database in order to enquiry and accumulate data and can be installed for their execution in cloud engine or locally on the robot. In certain scenario these components can also be used independently. Fig 3: A simple architecture diagram of the integrated RoboEarth system can be used during thefinal demonstrator [4]. Rapyuta: Rapyuta is a framework which is an open source framework for having utility in cloud robotics. The figure below give a simple outlook of the Rapyuta framework: Each robot attached to the Rapyuta is having a reliable computing environment (rectangular boxes) enhancing their efficiency to move their heavy computation in the cloud. Computing environment are interconnected in a well-structured way and have a high bandwidth connectivity to the repository of knowledge as shown in the figure by stacked circular disks. Fig 2: Rapyuta: A Cloud Robotics Framework [5] RoboEarth DB: The Apache Hadoop based WWW- style database used to store essential data for the robots. KnowRob: It is a system involved in the processing of knowledge that groups reasoning methods and knowledge representation with several techniques for acquiring the knowledge in the physical system. It also serves as a framework that gathers knowledge through the various sources and is used in RoboEarth as a local knowledge base for robots. Object Adapter: These are the set of ROS packages that enables both robots and users to build up a small cloud model from an object using a marker pattern, so that the resulting model can be stored in the RoboEarth’s repository of knowledge, and allow downloading the object models later and used them for detecting objects. WIRE: The WIRE stack allows generating and maintaining one stable world state gauze based on object detections. It is highly involved in the data association problem by retaining multiple hypotheses and facilitates following of various object attributes. C2TAM: C2TAM implements a system called visual SLAM which is dependent upon a distributed framework where the storage and expensive map optimization is allocated on an external server, whereas a light camera tracking client executes on the local machine. The robot onboard computers are released from a burden of calculation, the only additional requirement being an internet connection. III. Application of cloud storage in robotics Cloud Based Robotics has proved to have a number of applications and advantages over the traditional networked based robotics. Cloud storage provides a shared knowledge database by which the robots can easily share their information with each other and can aligned them to work collaboratively in order to achieve a common task. Cloud robotics offloads the computing tasks to the cloud which involves heavy computation. Moreover cloud robotics is cheaper, easier to maintain hardware and lighter which results in the long battery life. CPU hardware upgrades are undetectable and hassle free. Cloud Robotics involves skilled and well maintained database. Reusable library of capability or etiquette that map to perceived tasks requirements/complex situations. Data mining keep the history of all cloud which enable robots. Due to these advantages, cloud robotics had a wide range of potential applications in the computation-intensive or data-intensive tasks in the areas of health care, intelligent transportation, environment monitoring, smart home, entertainment, education and defense. In this section, we discuss the opportunity and challenges that cloud robotics bring to traditional robotic applications. Specifically we focus upon three robotic applications: Robotic Surgery, Defense and navigation. A. Robotic Surgery Consider a scenario where a situation demands instant operation of a patient but the problem is doctor is not available. Then to tackle with that situation Robots can help because they can capture the useful knowledge from the cloud regarding the operation tips as mentioned by the other robots who previously have tackled with the same situation who is currently present somewhere else. In this way the whole operation can be executed in a safe and reliable manner. B. Defense Cloud robotics has a huge application in defense where they can sense the area which has the maximum probability of finding enemy by selecting the appropriate map from cloud storage at appropriate time. Cloud storage can be fed with updated maps from time to time with the help of satellites. As such human life can be saved by using robots in place of them at the time of world war or any war happening in the country. C. Navigation Robotic Navigation involves a robot identifying its own position with respect to a certain reference by choosing an appropriate path from there to reach the desired destination from all possible paths available. Such activity involves a collection of tasks such as localization, path planning and mapping. Two types of approaches are available: mapless and map based approach [13]. Mapless approaches are based on the observation and perception of the sensors used in navigation. Due to the limited onboard resources, these approaches usually suffer from reliability issues. Map based robotic navigation is comparatively better then mapless if the map is available. It can either use an unknown map or build a map during navigation. On the other hand building maps requires too much computation and storage requirements. However, if the area is large process of creating map requires access to vast amount of data which is a challenging task. Cloud robotics highly aids cloud based navigation by fa cilitating the following two properties: In addition to provide vast storage space to store the large amount of map data, cloud also provide processing power to facilitate the construction and searching of the map quickly. Secondly, commercially available maps (e.g. Google maps, bing maps) can also be leveraged to develop consistent, active, and high range independent navigation solutions. IV. shortcomings of cloud storage in robotics One of the key issues regarding cloud robotics is threaten to cloud storage which is highly vulnerable to malicious attacks. Moreover the wireless network over which the robot communicates with cloud in order to exchange information can be challenged at any instant of time. As certain security mechanism needs to be provided that will result in the increasing overhead of the overall system. As discussed, previously that a developer has an access over the cloud. In the same manner if an intruder gets access to the cloud somehow then it might be possible the same intruder will replace the existing information in cloud with some other malicious information that will result in the malfunctioning of robots that proves to be highly destructive. Several other limitations of cloud robotics:- 1. As discussed in section II cloud supports the software part of the robot and it doesn’t have to deal with the hardware structure of the robots. So, it offload the hassle and costs of IT management. 2. Cloud robotics relies heavily on the cloud which in turn depends upon internet connection. So, if internet service will get affected from frequent outages or slow speed it fails to help the robots to continue their frequent communication in order to share knowledge from knowledge repository present on the cloud. 3. It is a hard fact to digest that robotics is lacking emotions. Such thing results in a huge impact on the people because of their adjustment with the machinery robots because there is high probability of thinking mismatch between them. Consider havoc where the people are suffering from the local environment conditions. As such if certain robotic team is send there for the rescue operation for their safety it is very hard for the humans to believe upon them. V. Possible Solutions And Future Scope Instead of fetching knowledge every time to perform an operation from cloud. A robot must be able to remember the already done tasks in order to tackle the same situation next time but at faster rate with greater efficiency. Robots can be taught to handle many different tasks through the installation of robotic apps. Very soon, these robots will enhance the real-time by connecting to the cloud and downloading apps from there [9]. An app store for robots – Downloading apps from the app store is one the biggest reality behind smartphones success. In the same way Robot Apps can be used to control the robot and imparting intelligence in them. Some Apps allow you to generate predefined-programmed movement sequences, while others are used for remote control, whereas software development platforms are used to make more sophisticated autonomous control systems. VI. ConClusion We have discussed a scenario where future robotics will rely heavily on cloud storage that will enhance their capability and functionality in terms of learning and sharing information in order to work collaboratively to achieve some goal which was limited earlier due to limited programming. Cloud storage also enabled the developers due to their accessibility to the cloud to control and coordinate the robot activities at any point where the situation demands that may not be favorable to nature. Cloud storage also supports some real time applications like Health Care, Intelligent transportation, Rescue Operation, Assembling of different parts in production of vehicles etc. Cloud Storage in some cases proves to be inadequate due to poor transfer rate and harmful due to security threats on cloud due to wireless networking access technique which could be easily challenged at any time resulting in a huge destruction. References M . Waibel , â€Å"Analysis: Robot learning in the cloud Covic â€Å"RoboBrain† Will Use Cloud to Teach Robots, Available: http://robohub.org/analysis-robot-learning-in-the-cloud/ V. Covic, â€Å"RoboBrain† Will Use Cloud to Teach Robots, Available: http://www.cloudwards.net/news/robobrain-will-use-the-cloud-to-teach-robots-4543/ RoboEarth, What is Cloud Robotics? Available: www.roboearth.org/cloud_robotics, 2013. RoboEarth, What are Software Components in Cloud Robotics? Available: http://roboearth.org/software-components/ Rapyuta: A Cloud Robotics Framework, A Cloud Robotics Platform Available: http://rapyuta.org/ Guoqiang Hu, Wee Peng Tay, and Yonggang Wen, â€Å"Cloud Robotics:Architecture, Challenges and Applications† IEEE NETWORK MAGAZINE S. Jordà ¡n*, T. Haidegger**, L. Kovà ¡cs**, I. Felde** and I. Rudas**, The Rising Prospects of Cloud Robotic Applications, IEEE 9th International Conference on Computational Cybernetics †¢ July 8-10, 2013 †¢ Tihany, Hungary Richard Voyles â€Å"Robotics as a â€Å"Singularity†: The Case for Cloud Robotics and Real-Time Big Data† Available:http://telerobot.cs.tamu.edu/CMA/slides/Voyles.CASECloudMfg.pdf, August 17, 2013 Grishin Robotics â€Å"Future of cloud Robotics† Available: http://www.pinterest.com/pin/278660295665464178/ K. Goldberg. Cloud Robotics. Available: goldberg.berkeley.edu/cloud- robotics, 2013. K. Goldberg and B. Kehoe, Cloud Robotics and Automation: A Survey of Related Work. UC Berkeley Technical Report No. UCB/EECS-2013-5. Available: http://www.eecs.berkeley.edu/Pubs/TechRpts/ 2013/EECS-2013-5.html, 2013. RobotShop, Pioneers Cloud Robotics, Interview With Mario Tremblay. Available: www.robotshop.com/blog/en/myrobots-com F. Bonin-Font, A. Ortiz, and G. Oliver, â€Å"Visual navigation for mobilerobots: A survey,† Journal of Intelligent and Robotic Systems, vol. 53, pp. 263–296, 2008. `

Tuesday, August 20, 2019

Marketing Analysis of Dexit Inc

Marketing Analysis of Dexit Inc Case Analysis Report: Dexit Introduction to Dexit Inc. In 2001 a privately held firm known as Dexit Inc. (the â€Å"Debit Express† company) was formed by Renah Persofsky, a former member of the Bank of Montreal’s e-commerce subsidiary had left to pursue opportunities more aggressively. The company’s goal was to provide customers with a new convenient and easy to use electronic payment system that would provide an alternative option to cash for low-value transactions. Dexit Inc. had expected that this electronic payment service to be used for a small transaction averaging a cost of approximately of $4, however in addition there was a belief that this service could possibly be used for purchases potentially as large as $25. The design of Dexit’s service would allow customers to pay for goods and services by waving an electronic tag near a specialized reader that would be placed at a retail counter that would communicate in a secure manner with Dexit’s central payment clearing system. This process would on average be completed in less than three seconds which would generate fast no- hassle payments that could also be tracked enabling users to monitor their low-value purchases. This system which has been extensively tested and deemed to be highly reliable would be based on Radio Frequency Identification (RFID) technology. With this technology a secure personal identification number in the customer’s tag would be read wirelessly by the merchant’s terminal. Problem Identification Flashing forward to today, Renah Persofsky (CEO) is facing critical decisions regarding the launch of Dexit Inc.’s electronic payment system. Currently Dexit has attracted two of Canada’s largest banks as early stage investors and as well Telus Mobility, the wireless subsidiary of the country’s second largest telecommunications firm. All three entities have expressed significant enthusiasm for Dexit’s wireless payment service however each wanted to see a firm marketing plan before commitment of further resources to Dexit. The key decisions that CEO Renah Persofsky faced in order to push ahead with the project had included: Deciding which merchants and consumers Dexit’s service would target which would  shape the other aspects of the marketing plan. Determining whether any additions or changes needed to be made to the product itself. Establishing the pricing strategy that Dexit would implement which would take into  account the value of the service to merchants and consumers and their willingness to pay. Create a promotional plan to reach each target audience and decide between a Toronto-only launch, regional launch, or national launch in major Canadian cities. SWOT Analysis Strengths: Dexit has major companies like two of Canada’s largest banks and Telus Mobility supporting them which gives them huge area to explore. The new system is much more effective than the previous ones launched in the market because it provides an efficient way to settle retail transactions. The transactions are very secure and takes just three seconds for transactions to work due to Radio Frequency Identification (RDIF) technology.The company is targeting retail businesses characterized by high-frequency and low-value transactions by providing them with system which provides ease, speed and security. They are also targeting consumers who make lots of small transactions. They are providing customers with username and password so they can access their own account and keep track of their transactions. As for merchants they will be able to register for an account by providing basic information about financial institution to settle payments which will be executed on a daily basis by tra nsferring funds electronically to the merchants bank. And for retailers they offered faster payment than cash, credits or debit. Weakness: The history of the product outside the firm has been unsuccessful due to merchants finding the payment process costly and inconvenient since they had to operate two separate terminals: a traditional swipe reader for customer who used debit transaction and second to read the card’s computer chip for stored value transactions. Also, with major company backing the company it is crucial for Dexit to provide them with positive result. Opportunities: Dexit has opportunity to establish itself in the largest market for digital transactions. It also has a chance to explore the global market as their long term plan which will help them to expand their market and develop sustained competitive advantages. It will also help Dexit to bring in new ideas, expand their horizons and strengthen their market value. Threats: Since it is not easy to replicate the domestic market success globally it might not have to same positive results. Other companies can also easily attain the technology which could increase the risk of losing customers to the rivals. There are many other companies that allow customers to make electronic payments. Those companies give cards instead of key tags which means that customers will most likely stick to using cards since they are used to it. Also Dexit has just entered the market so it will take a while for the company to get customers. The company will have a hard time dealing with its competitors. Segmentation, Targeting and Positioning Dexit Inc. are providing consumers an easier and faster methods of making their everyday transactions. The target for Dexit Inc. can be divided into the consumers and the merchants. Merchants can save a lot of time servicing a customer at a busy store and consumers could save a great amount of time avoiding line-up on their way to something important. Places like gas stations and fast food restaurants usually with a heavy customer traffic are potential merchant groups. Key tags will not only reduce the time it takes to processed with a transaction but will also reduce the amount of theft from the cash register since everything would be done by electronic money. This will enable them to take more customer by avoiding walkaways. Merchants such as Esso, Tim Hortons, Mcdonalds are possible businesses that would benefit having Dexit receives at their locations. Dexit’s consumer market can be segmented by their work and lifestyle and attitudes. A consumer’s perception towards a fast food restaurants is to attain a quick service, even when it comes to making the payment for their purchase. Customers that usually rush to Tim Horton’s are eager to either get to work or to an educational institute. The target market would vary from young adult to early 50s would are either employed or enrolled at an educational institute. According to Employment and Social Development Canada about 81.6 percent canadian from ages 25 to 44 are employed and about 71.3 percent canadians from ages 45 to 65 are employed. These employed canadian are always in a hurry to get to work on time and rushing back home to avoid traffic. OCUL on their website states about 458,251 student across Ontario alone on their updated statistics August 2014. Dixits main focus should be towards targeting Canadian student and employed customers who use electronic payment methods to make their everyday purchases smoother and quicker. Imagine not requiring to take out your wallet and being able t o make a payment through a key holder that is attached to you car keys, or being able to tell how much of you money was spend on everyday small expenses such as gas, coffee or morning breakfast. In Canada, the market size has been estimated to be about 536 billion dollars in the payment industry, with about 4.1 billion transactions made through debit and credit cards. These cards often get lost or stolen without consumer’s attention and are also misused by frauds that can cost consumes a great amount of money. Key tags on the other hand are quite secure since their have less chances of getting lost and consumers can easily notice if key tag is lost. Consumers would be feel more safe and secured to make smaller everyday transaction. Product Strategy The core benefit in using Dexit’s payment system is to make is easier for consumers and merchant to make small amount purchases more efficiently. Small Purchases ranging from a dollar to about 25 dollars. This for everyday consumer would speed-up their ordering time and for merchants would speed-up the selling process. The product would also help consumer keep track of their small purchases with security. Key chain fob with the RFID technology is a very good payment system. Consumers would find it easier and more convenient to use keychain to make their small purchases. Consumers and merchants save time and also the risk of losing money. Consumer will no longer need to worry about giving exact change or worry about losing pocket change on their way to a nearby store. Place Strategy Since Dexit’s key tag is a brand new idea in the market, it would be better if the product is first tested out in a smaller market. Having Dexit Inc. promote their product nationally would be costly and very risk. If product not successful it could cost Dexit a huge amount on loses. To ensure the product is successful it would be beneficial is the company decided to introduce the product only in Ontario first. Dexit should focus on attracting market share in Ontario, since it already has a bigger population than other provinces. In 2001, the amount of interac direct payments equaled to about 755 million traction only in Ontario. There are about 6,551,298 interac direct users with about 116,241 merchants that also use interac. Currently in ontario the unemployment rate is about 6.9 percent, which is quite low. Student in Ontario have a quite large population. Price Strategy Dexit Inc. requires to strategize the price they would charge the consumers and their merchants. Effectively balancing payments between consumers and merchants will lead to adoption by both and prevent them from seeking alternatives. To do this it is important to not charge either side in a way that they will perceive as detrimental. Consumers will not be charged upfront for registering or to acquire the RFID tag. This avoids creating an initial investment barrier between consumers and their service. Consumers won’t need to invest to try out Dexit. Instead they will be charged a small fee for each transaction. They will be attracted to use Dexit because of it’s convenience and time-saving capabilities. They won’t mind paying the small transaction based fee. Instead they will focus on the opportunity to use a new, innovative, time saving technology. Merchants won’t be charged a transaction based fee. This will encourage them to promote Dexit to customers using payment methods that do charge a transaction fee like debit or credit. This is one of the ways Dexit will use a push strategy. Instead they will be charged an upfront cost to have the reader installed in their store. Merchants are more likely to be ok with an upfront cost, seeing it as an investment to attract customers that use Dexit and a competitive advantage in terms of convenience. Customers who value their time and prefer convenience will choose locations that have Dexit readers installed. This is one of the ways Dexit will employ a pull Strategy. By balancing the costs between merchants and consumers Dexit can encourage adoption among both groups. By receiving short term payments from merchants and long term payments from consumers Dexit can smooth out their revenue, allowing them to better plan for future expansions and investments. Promotion Strategy The main goal of Persofsky’s promotional strategy was to reach her chosen target markets. This could be determined by either a Pull or Push strategy. With a Push strategy, merchants are given incentives to promote the Dexit service. With a Pull strategy, a buzz is created around the product and helps increase the demand from consumers. A Pull strategy would work well for Dexit, based on the fact it is a product of major convenience, one that could catch on in the marketplace when promoted properly. When â€Å"buzz† is created around a product that can offer consumers something quick and tangible, it has a habit of catching on and allowing other consumers to see the benefits for themselves. With minimal cash flow, Dexit is forced to get creative with the promotional aspect of the product and company. Traditional advertising can be considered, along with sales promotions and direct marketing. Traditional advertising is effective because it can be used on so many different channels, such as radio, newspapers, magazines and television. By using traditional advertising, Dexit can reach a large number of consumers through the wide variety of channels. Final recommendation With Dexit being a new product, and this type of technology being new to consumers, it will be important to generate a high volume of sales in the early stages. This will require Dexit to penetrate the marketplace with low initial prices to gain as much traction as possible. The most plausible revenue model it to charge consumers a small percentage to use Dexit services. The consumers will most likely use Dexit due to it’s convenience and time-saving capabilities. Consumers will sacrifice the small percentage they will be paying for each transaction to save time at the checkout. In addition merchants can be charged when they purchase the Dexit POS terminals, this will create extra revenue for the company. Merchants will be likely to purchase the terminals because they want to attract consumers who are using Dexit, in hopes of having them enter their store instead of going to a competitors location. It will be important to try and sell the terminals to chain stores, who will place the Dexit terminal in all of their stores, and also receive a discounted price for bulk orders. Consumers should be able to receive the RFID tags for free, this will give the consumer a sense of nostalgia with the product and be more likely to keep it and attach it to a key-chain or store it in their wallet. If the consumers have to pay for the tag and then pay a charge each time they use it, they may feel like they are being taken advantage of and decide to use traditional forms of paying. Many consumers are very price sensitive and the additional tag charge may be ll it takes for them to stay away from Dexit. Contingencies With any type of business plan it is important to plan for unexpected events or sudden changes in the marketplace. These contingencies can stem from any part of the company or product that is being launched into the market and how they will change the original marketing plan that was developed before the launch.In the case of Dexit, there are many different contingencies that should be thought out and planned before launch. Firstly, a contingency should be developed in the case that the equipment or software that is used in the Dexit tag is faulty or has some issues. This is a common type of problem with any product that involves technology as there is no way to guarantee with 100% certainty that the product will not falter. Secondly, a contingency should be developed in case the consumers do not catch on to the Dexit product and sales are lagging form initial estimates. This may include switching up the promotional strategy or targeting a different consumer group than originally thought. It will only take a short time period to see whether or not consumers are beginning to use Dexit or not and at that point a decision will be made to stay the course or switch up the marketing plan.

Monday, August 19, 2019

Why We Go To Malls :: Free Essay Writer

Why We Go To Malls There are a number of reasons why people shop at malls. For one thing, people malls extremely convenient. In addition malls provide shoppers with a great variety of stores and shopping opportunities. Finally, and perhaps most importantly, malls are great places for entertainment. Malls are convenient places to shop. They provide shoppers with abundant and secure parking areas. Shoppers need not drive around for fifteen minutes looking for a parking place, nor need they be afraid to walk to their cars after they have completed their shopping. Malls are usually totally indoors so people are comfortable why they shop. They do not they do not have to be subject to the elements as they go from store to store. Finally, the most convenient aspect of the mall is its one stop shopping experience. Variety is another advantage of the mall. There are specialty stores, such as candle stores, bath and beauty stores and music and video stores. These are the anchors of the mall, and the mall provides "odd stores" for those eccentric shoppers who are looking for different items. Finally, the mall is a wonderful entertainment center. Not only do people go there to shop, but they also got there for relaxation. There are movies sometimes as many as fifteen or sixteen. In addition, arcades are available for children, teens and adults. Some parents drop their children off at the arcade, give them a roll of quarters and pick them up after they have completed their shopping. For the hungry shopper there is a food court, which provides fast food for those shoppers who want to relax and possibly have a cocktail with their meal, other restaurants are available.

brady bill :: essays research papers

Brady Law Falsehoods The Brady law has received much credit for the country's rapidly dropping crime rate. Yet with the Supreme Court striking down the laws background check requirements, it faces its ultimate test. If gun control advocates are correct, the court's decision will unleash a new crime wave. The Justice Department continually releases "new" studies crediting the law with reducing crime. Actually, the downward crime trend started in 1991, well before the Brady law became effective in March 1994. My research shows that this decline is in great measure because of higher arrest rates and more states allowing law-abiding citizens to carry concealed handguns. Others estimate that the Brady bill had a much smaller effect on gun sales than the 100,000 rejections its proponents claim. Last year the General Accounting Office reported that initial rejections numbered about 60,000, and more than half were for purely technical reasons, mostly paperwork errors that eventually were corrected. A much smaller number of rejections, 3,000, were due to violent crime convictions--and presumably many of these people just proceeded to buy a gun on the street. Brady law backers have focused almost exclusively on the value of background checks, the one part of the law that the Supreme Court specifically struck down. Yet there never was much controversy over this issue: When Congress debated the law, no one, not even the National Rifle Assn., opposed background checks. The dispute was over a five-day waiting period versus an "instant check." Ultimately, the success of background checks and waiting periods must be judged by their impact on crime. To seriously evaluate their impacts, however, one must recognize that other legal changes also occurred. For example, during 1995 and 1996, 10 more states adopted nondiscretionary concealed handgun laws. In the belief that concealed handguns deter crime, 31 states now grant permits automatically to citizens who have no significant criminal records or histories of major mental illness. In all 31 states, more people now carry legally concealed handguns. Considerable evidence supports the notion that permitted handguns deter criminals. Polls show that there are at least 760,000 and possibly as many as 3.6 million defensive uses of guns per year. In 98% of the cases, people simply brandish weapons to stop attacks. This is further reflected in the different rates of "hot burglaries," where a resident is at home when a criminal strikes. In Canada and Britain, both with tough gun control laws, almost half of all burglaries are "hot.

Sunday, August 18, 2019

The Movie Industry vs Technology Essay -- Movies Internet Papers

The Movie Industry vs Technology The Internet and the roles it plays in society Since its conception, the Internet has been a huge market for life uses. It provides some of the greatest resources to educate people around the world such as search engines, databases, and an almost endless expanse for innovation. Being a conglomeration of countless numbers of computers allow users to interconnect with each other, making computers a prominent part of people’s lives. Aside from the home uses, businesses have capitalized on it as well. The Internet is essentially a medium through which mass distribution of information and goods can be disseminated. However, â€Å"the Net is no longer just a publishing or an entertainment or a personal communications medium, but rather a fundamental and indispensable engine driving all social and economic life† ( Kline). E-commerce is a big part of the average consumer. Shopping online at sites such as Amazon.com and Ebay.com have provided users with the convenience of shopping without picking up the car keys. With a few simple clicks, a few typing of numbers, the desired product could be at your door within a few days. Other uses are GPS systems, or even a 911-based emergency utility that combines GPS and locates you in time of trouble. This is all provided for by the internet. In light of all these fantastic services that are provided by the Internet, it is without its flaws. Child pornography and piracy are just some of the illegal activity that are present in society today. Filters have been set up in schools and in homes to prevent viewing or downloading of such illicit materials, however that is not enough. With the conception of Napster, the music industry engulfed it, chewed it up... ...anuary 12 - January 18, 2000. Http://www.citypaper.com/2000-01-12/pf/cyber_pf.html 8. Johnson, Bobbie. â€Å"CyberVillains†. The Guardian. Monday May 20, 2002. Http://film.guardian.co.uk/Print/0,3858,4416832,00.html 9. Kline, David. â€Å"The Embedded Internet†. Wired Magazine. October 1996 Issue 4.10. Http://www.wired.com/wired/archive/4.10/es_embedded_pr.html 10. Nugent, Benjamin and Bennet, Brian. â€Å"Beyond Hollywood’s Reach†. Time. Feb 25, 2002. V159 i8 p56. 11. Olsen, Stefanie. â€Å"Hollywood faces recurring Net nightmare†. CNET New.Com. June 5, 2002. Http://news.com.com/2100-1023-932743.html 12. Sullivan, Bob. â€Å"Hollywood Gets Tough on Copying†. MSNBC News.com. July 12, 2003. http://www.msnbc.com/news/779198.asp?cp1=1#body. 13. Weisman, Robyn. â€Å"Steal This Internet Movie†. NewsFactor Network. Febryary 28, 2002. Http://www.newsfactor.com/perl/story/16541.html

Saturday, August 17, 2019

Escape of the Gymnasium

As I sat in a managerial meeting, nervously taking the wrath from demanding hierarchy management, my mind began to drift back to an incident in my early childhood†¦ â€Å"Nice shot Shrimps!† There I was shooting the basketball in gym class, all five foot four inches, 125 pounds of me. I am known as â€Å"Shrimps,† but my real name is Donald I am a small kid, with the heart of a kitten. Patiently waiting for the school bell to ring, to notify me and the rest of the school it was time to go home for the day and come back again in a week and half, I could hardly wait to get home and show my parents my straight A report card. It seemed like two life times had passed already, but I was still stuck there waiting to hear the ring of the damn bell. All of a sudden, I realized Lenord was headed into my vicinity. My pulse began to race, sweat dripping from my forehead; I continued to shoot the basketball. Soon I became scared, so scared I thought I was going to wet myself. The threat was real, very real, but this wasn't the first time I'd been in danger and sure seemed like it wouldn't be the last. I can still see him even now, with a crystal clear vivid image of him. How could anyone forget what he looked like? Everyone in the school knew him as J Dog, but behind the slang name J Dog, he was known to all too many as Lenord. Lenord was double the size of any average Joe his age, standing tall looking over the top of his peer's heads desperately awaiting someone to step in his way. J Dog, the big fat aggressive pain in everyone's bottom, the school bully. J Dog was always with four of his immediate peers. J Dog generally picked fights with weaker students. He would abuse them with his strength and powerful vocal cords, which built his ego on his victims. For nearly the past seven years I have watched him and his four man mafia pick on younger boys. I can not even count the times on my twenty fingers and toes that I was the onlooker, watching sadly from the â€Å"birds eye view,† waiting for their time to come and be put in their place. One incident I witnessed was when J Dog and his four man mafia picked a fight with a varsity football player. As I observed the attack through the bathroom stall the fight seemed too unfair. J Dog and his crew attacked the peer in the boys' bathroom. They all took their turns aggressively punching and kicking the peer. I sat in the stall curled up on the toilet, bracing myself nearly feeling every blow. Showing no remorse they continued on their brutal attack until they seemed too tired to go on. The fight ended with a vicious kick to the face by J Dog. Constantly and repetitively J Dog and his crew moved away from the school handbook and the countless school policies that it entailed. Yes indeed I knew what they were doing, as well as everyone else at the school including the school staff, but no one took the time to create a peaceful environment. It just seemed that no one would stand up to their mischievous behavior. I never understood why this was this way. Why do we all sit here back on our heels and watch this reckless' abandon go on with his terror? We were all equally guilty, guilty as J Dog and his fellow perpetrators. The longer we stood back and accepted their behavior and the longer they were able to rage throughout the school, the stronger they became. This was not a good thing for me, or for the entire school. J Dog and his four brotherhood boys came for me one spring morning. In fact it was the last day of school prior to a well anticipated eleven day Easter break. I'd been playing basketball with a few of my peers in the schools' gymnasium. Looking on the other side of the gym behind a set of bleachers, sat J Dog and his fellow four up to no good teasing and laughing at fellow students. The obnoxious jerk himself, Lenord, and his four manned mafia soon came to the side of the gym where I was playing basketball. Before I had the chance to warn my friends I heard abruptly, â€Å"Donald, you four-eyed worthless piece of shit,† the bully said. â€Å"It's your turn.† My heart hit rock bottom, feeling myself gasp for air, I asked myself â€Å"oh no here we go, I think it is my turn to be plum bulled, or isn't it?† Such simple words, so much unsaid. I didn't need any further explanations. I knew what they wanted and it was not their sanity back. As mentioned earlier I'd seen others after they'd had their turn. It was never a pretty sight. Too many times over the years I have witnessed the brutal attacks on my fellow classmates. In time they would have progressed beyond schoolyard aggression, sinking lower into the anti-social status of the criminal underworld. They'd never be leaders of any kind, just straight up thugs. They'd been well schooled in this art. I had never once in my life been in a fight. Well unless my sister counts? To say I was scared of the upcoming attack would have been an understatement. I was petrified. I knew if I was not careful in what I said or did I may end up dead. As I sat there overshadowed by five ruthless thugs, I knew that even in a fair fight I couldn't possibly win. Other students swirled around us, isolating our little group. It was well known everyone in the oval knew of the intended attack. Sweating profusely, I was nearly drowned in my own sweat, knowing what was waiting for me, wondering why he didn't just lash out and end this mockery, this teasing. I did not even realize then that he'd had to work himself into a frenzy so he could just hit, and hit, and hit. â€Å"What's up, Shrimps? Don't you want your pretty boy face all smashed up like everyone else in this school? Or will you be upset because you will need a face lift?† As I sat there I could only think of dumb things like this girl name Ashley sucking her thumb and my friend telling me to imagine my peers naked while giving a speech. Only the sight of these two things registered on my numbed, frightened brain. â€Å"Why don't you leave me alone? Go annoy someone else.† I took the basketball and dropped it at my feet. â€Å"Are you throwing the basketball at me, Shrimps?† He snorted, searching for any excuse to start a fight with me. I didn't want to give him an excuse. He stood there warlike; hands on hips, wearing his all blue attire. His stomach fat erupted through ragged holes in his once blue t-shirt. Supporting the color blue was what J Dog felt was the holiest color known to mankind. â€Å"Don't be silly, I just dropped it at my feet,† I whined, not at all mentally prepared for the brutal assault. â€Å"I know you didn't just call J Dog silly,† one of his collogues shouted. â€Å"Or I'll flatten you myself. Come on J Dog, give the idiot a reason to talk back and let's get the hell out of here. It is just too hot in here to have to put up with all of this shit,† he added as he grinded his teeth, showing the enormous gap in his bottom teeth, so enormous I could kick a field goal through it. â€Å"You call me silly, did you? You're nothing but a poor excuse for human life. You can run to the teachers all you like, see, I am not afraid of them.† Thoughts began to race inside me. I wondered why school authorities put up with him. Too many times Lenord and his four mates' behavior were over looked. School fights happened; sometimes students went home a little worse for wear. I could not help to notice that in a mere two minutes the bell would sound. Thinking to myself will that bell ever ring and let me out of this mess I got myself into? I responded to this coward known to too many as J Dog, â€Å"I didn't call you silly; I just said I did not throw the basketball at you.† I was answered by a heavy push in the chest, the first sign of physical violence. Staggering back, it was followed by another massive blow from the aggressive J Dog. He stepped back up to me, face to face, as J Dogs four amigos stood close beside him, crowding me like flies on dead carcass. â€Å"Won't you stay and fight?† He spit little specks of salvia at me but I dared not acknowledge them. â€Å"Bloody little coward.† He'd been right; I was a coward, so scared I couldn't run, even if I wanted to, even if there'd been somewhere to go and get away from the mess I was in. I silently choked back sobs, fighting to hold back tears of terror. The panic controlled me; I stood there looking like a buffoon right in front of Lenord, his four friends, my best friend, twenty other students, and one especially hot girl named Cindy. Again the palms of his massive hands stabbed at my chest and, again, I staggered back. I felt the impact of his hands long after they'd abruptly returned to his hips. The five men closed back up on me as we danced further away from the gymnasium bleachers or what I like to call protection from a fall and embarrassment. I felt my grip on reality slipping further and further away. Others were here to only see another beating set forth by J Dog and to witness my shame. Not that J Dog and his mates wouldn't let everyone know how well, or poorly, I took the abuse. There was a certain honor in taking your licking like a man. I hadn't felt like a man, and had been sure there was little honor in J Dog. However, I couldn't hide for the rest of my life. It had been time to stop the hopelessness and stand up for myself and for the rest of the school population. It had to be all or nothing. I preferred nothing, but in the back of my head I wanted nothing more than to set the example. Putting on a brave face, I firmed my voice and looked the outsized buffoon in the eye. â€Å"I know you can beat me like a red headed step daughter, I don't doubt it at all.† As the jittered mess in my voice came out I wanted to look and feel confident in what I said to this animal. â€Å"But Lenord,† I added, â€Å"Just remember one thing. When I hit the ground, so too will your front teeth, you worthless coward. I'll get one punch in, you know I will, and that punch will be directed right for your front teeth. When I am done with you, you will no longer look like the donkey you look and smell like now! Is beating me up worth losing your front teeth?† I was being optimistic, I doubted that I could even get in one punch; I doubted even if delivered I could have knocked out any of his teeth. The reaction from the overweight J Dog was almost priceless. Suddenly it was the bully who backed off, looked lost, looked everywhere but at his bewildered fellows or me. â€Å"Er†¦ er†¦Ã¢â‚¬  he stuttered, â€Å"you're not worth the effort, you are just a waste of my breath, you little crap headed pansy. I wouldn't waste my spit on you. You better get away from me before I change my mind and pound the crap out of you.† Now I was the one standing aggressively, hands on hips, watching the fast disappearing of the other bullies as they soon walked away in disbelief. Cocky in my arrogance, I spit out a final mouth of spit in their vicinity. It had been the most rewarding victory of my life, standing there on that field of honor, knowing that I had conquered the mighty, invincible J Dog. I wanted to shout it out to the rest of the school and let everyone in the school district know of J Dog's defeat. My mind switched off that near death episode, back to the present, to the here and now. Hierarchy management surrounded me, trying to pressure me and abide to their will. Tacky school clothes were replaced with tailored business suits, the overt threat of violence with an undercurrent of raw power. Things hadn't changed. As before, I was the underdog, the potential victim. These smiling men were planning on beating me far worse than the luckless J Dog could ever have imagined. Here I was fighting for my life, my work life, and for the future of my family and myself. I could lose everything. I felt too old to start everything all over again. These smiling piranhas had planned on chewing me up and spitting out the bones. I had to fight for myself and for what I knew was right, and it was time to either stand up and fight their smirking aggression, or lie down and die like a dog. I thought again of J Dog the bully, remembering how quickly he'd collapsed after I stood in his way of destruction. Clearing my throat, I looked straight in the owner's eyes. â€Å"This is what should happen,† I began, as an idea rushed into my mind. Fully knowing what I was going to say, I continued as I spilled out the beans.

Friday, August 16, 2019

What Role Do Mobile Phones Play in Society?

1. What role do mobile phones play in society? Discuss the influence of technology on everyday life: relationships, social movements and education. Mobile phones have a major impact on modern society as they are increasingly useful social tools. In 2004, ‘there were almost two billion mobile subscribers world-wide’ Arminen 2007. The majority of worldwide businesses use this technology to communicate. Mobiles have changed the way people organise activities, meetings and social occasions, and generally the way people go about living everyday life. Mobile phones increase contact with peers, so a person can always know what’s going on with those close to them. They help people communicate more efficiently, anywhere on the planet. Mobile phones have developed multi-features they are more than just a phone and can be used for sending text messages, taking photos, surfing the internet, playing music, using a calculator, setting an alarm, playing games, sending email, checking the time, calendar, maps, GPS, banking, radio, business’s such as voice memos, and are capable of an amazing amount of functions and some have many more functions than a computer, have the added bonus of high portability. On the down side however mobile phones can break down personal barriers where a person can find it hard to have any personal time, or participate fully in their present environment without interruptions as the majority of people never turn off their phone, so there is always constant communication. Modern day society has formed a very strong reliance on mobile phones where most individuals cannot leave home without their mobiles and have developed a need to be constantly contacted. Overall mobiles have a very large influence on relationships. Mobile phones play a huge role specifically in adolescences relationships. Mobile phone technology allows us to communicate with social groups in new ways, and to reaffirm those relationships, regardless of distance. SMS connects individuals in a non intrusive way so time and physical location are no longer important boundaries to communication (Horstmanshof & Power, 2005) instead the shortness of the message is more important indicator of uptake giving rise to creative code. Horstmanshof and Power’s research looked at how the new communication was being taken up by what groups, and the rules, communication and social interaction of those groups. The results showed that SMS was mostly used to tighten close relationships. Mobile phones provide an easier way to communicate, and helps some shy adolescences become more social. Furthermore text message or SMS, help adolescences ‘check each other out’ (Cupples & Thompson 2010) without embarrassment of getting rejected by a potential partner. Mobile phones assist in taking away any awkwardness on the next appointment or date by getting to know a stranger or potential partner (Cupples & Thompson), by facilitating the asking of questions a person wouldn’t normally ask face to face. Despite their many positives mobile phones can have a negative side. All the availability leaves people with little personal uninterrupted. As Horstmanshof and Power describe ‘it's like you are inviting the whole world into your space’ at any time the mobile is on. The easily accessible, relatively cheap and individualised nature of mobile phones has increased their popularity to the point where they have changed the way people interact at work as well as at home (Geser 2010). Mobile phones are increasingly breaking down the boundaries between work and home. Mobiles have changed the way individuals make decisions from individual to more consultative, the way people report emergencies, the social messages of status or connectedness we send to others who witness our calls, the way people participate in the present with increasing interruptions, the way people keep social obligations and the way people can change appointments at short notice, the way we can access greater amounts of information, and importantly, the change from a specific, location based communication system (landline) to an individual recipient. Geser suggests mobiles allow an individual to carry the cocoon of another place to where we are at present which may be a different place emotionally as well as physically to our current location and we need to skillfully maneuver between the two. This is particularly important in the work home boundaries. We need to make new decisions about when we are interrupted and how to deal with the present social or work situations (Geser) which may result in more self control as well as more social control like requesting people turn off their phones before meetings. Geser also supports that with their great ease mobiles also raise some concerns about people but especially children being less independent, and about mobile phone use contributing to fracturing social cohesion through subgroups potentially challenging the norm and the lesser social influence of more formal networks to increasingly informal networks. Technology has evolved where a person can access almost anything on their mobile phone including the internet, so that information is very easily accessible. Mobiles can help students do calculations through the use of a calculator or using specific programs on a computer such as the SPSS program Swinburne University uses for statistics. Encyclopedias are readily accessed online mostly for free which helps a person access the information they need at any time regardless of library opening hours or physical location. Almost all information is available at a click of a button. There is also computer assistant learning programs (Cradler et. l 2002) such as ‘cogmed working memory training’ (a memory training used for individuals with short term memory difficulties) that can be accessed through the mobile. Individuals are also not limited to working on a farm if they live in regional parts of the world as there is university and high schools based online and accessible through mobiles. However there are consequences of having to much easily accessible information. People become too dependent on often superficial information and don’t research as thoroughly. Skills, such as spelling are often diminished as Microsoft Word corrects spelling mistakes and even helps with grammar. Less effort is required in modern day society where it can be argued people are fed information. It has also become easy to plagiarize (Snooks and Co, 2002) and copy other peoples work and pass it off as your own but also easily to be found out. References Arminen, I, 2007, ‘Review Essay, Mobile Communication Society? ’, Mobile Communication Society? , v. 53, no. 1 University of Tampere viewed 19 March 2010 http://asj. sagepub. com Cogmed, 1999 Karolinska Institute, viewed 6 April 2010, http://www. cogmed. com/ Cupples, J ; Thompson, L, 2010, ‘Heterotextuality and Digital Foreplay', Feminist Media Studies, v. 10, no. 1, pp. 1-17, Ebscohost viewed 19 March 2010 http://www. informaworld. com/smpp/content~db=all~content=a919196107 Geser, H, 2004, ‘Towards a Sociological Theory of the Mobile Phone’, ‘Sociology in Switzerland: Sociology of the Mobile Phone’, Google Scholar viewed 16 March 2010 http://socio. ch/mobile/t_geser1. pdf Horstmanshof, L, ; Power, MR, 2005, ‘Mobile phones, SMS, and relationships’, Humanities ; Social Sciences papers, v. 32, no. 1, pp. 33-52, Bond University viewed 16 March 2010 http://epublications. bond. edu. au/hss_pubs/75/ Snooks and Co 2002, Style manual for authors, editors and printers, 6th edn, John Wiley ; Sons, Milton, Qld. Published 2010

Thursday, August 15, 2019

Cook Chill

1. 0 INTRODUCTION Cook-chill and cook-freeze food productions are ways of producing foods that have been employed by many different organizations determining from the types of foods and services that the particular organization offers. These types of cooking methods work hand-in-hand with the kitchen designs. Kitchen design refers to the layout of kitchen equipment and positions of the working sections to produce foods that meet the needs of customers and thereby reaching the goals of the establishment. 2. 0 A KITCHENA kitchen is described as a building or a room in a building that has been specialized for cooking purposes only. Different establishments have their own types of kitchens with different designs that serve different purposes. Some kitchens are designed special for catering customers on transit such as Fast Food restaurants but some kitchens has to cater for a specific group of people using a specific type of service, thereby it has to have the right number of employees w ho will do the job and enough equipment to save time as well as energy. 3. 0 KITCHEN PLANSThere are different types of kitchen plans that have a specific purpose of operations. If a kitchen is designed for a particular way of production, it has also specific type of equipment available in that kitchen plan. There are different types of kitchen plan some of them are discussed below. 3. 1 Corridor kitchen A corridor type of kitchen, the appliances, cabinets and counter space are arranged on two facing walls. If the room is not too long, this can be an efficient kitchen. However, if both ends of the kitchen have doors, traffic through may create confusion. 3. 2 U-shaped kitchenThis type of kitchen is usually considered to be the best type of a kitchen which has the best work triangle because of its convenient arrangement and short walking space between appliances. It has a determined floor space and accommodates a determined number of workers. 3. 3 L-shaped kitchen This type of a kitch en creates an easy-to-use work triangle. If the kitchen space is large enough, an eating center can be included. This is the situation whereby customers serve themselves. 3. 4Center type of kitchen This type of kitchen is the most common type of kitchens that most establishments have employed.The working area is on the center as the name suggests but does not provide enough space. Figure 3. 4. 1 3. 5 Island type of kitchen All the necessary equipment in the kitchen is placed back to back in the middle of the working area. This type of setting requires an adequate space to allow an easy flow and enough space between the equipment for easy cleaning and to avoid creating dark areas that introduces insects. 4. 0 WORK CENTERS A work center is an area that focuses on a particular type of work activity such as preparation or cooking.Includes appliances and work space and that the necessary equipment is stored within for easy reach as depicted in figure 4. 0. Figure 4. 0. A chef preparing a meal from a working center. 4. 1 Refrigerator-freezer center * The refrigerator and the freezer have space next to them to use when loading or unloading foods. * A storage space is needed for items used to package food for refrigeration. * Storage space for items used when serving refrigerated or frozen foods. 4. 2 Range center(gas/ electric range) * Cabinet storage for foods used at this center. Storage space for pots, pans, cooking tools such as ladles, wooden spoons and pot handlers. 4. 3 Sink or cleanup center * Appliances such as dish washers and food waste disposers are found in these centers * Adequate space for stacking dishes 4. 4 Mixing center * Can be between two centers * Has several electrical outlets * Storage space for measuring, mixing and baking equipment and all the necessary ingredients 5. 0 TYPES OF KITCHEN ORGANISATIONS 5. 1 Conventional kitchen * They are suitable for small establishments They have fixed menus and banquets operating on rational basis * All dep artments are grouped together in blocks * Preparation and finishing are done in the same area 5. 2 Combined preparation and finishing kitchen * They are suitable for medium sized hotels or establishments * Preparation and finishing are done in the same section * In principle, preparation and finishing are totally or partially separated depending on the establishment 5. 3 Separate preparation and finishing kitchen( Satellite kitchen) * They are suitable for large establishments Preparation and finishing are done in separate sections; mis-en-place and the other one for finishing * Each section consists of one housing all the equipment for preparation of the dishes * Usually, they have no ranges, frying pans or steamed jacketed pots. Instead, they have grills, microwaves and Bain Marie. * 5. 4 Convenience food kitchen * a system of interest to the establishment that has no preparation kitchen but purchases only convenience foods * deals with the finishing of foods only and mostly canne d foods * require refrigerated and dry storage areasIn selection of these types of kitchen, consideration should be given * numbers of meals to prepared at each meal period * types of services * customer prices * system for serving meals * serving times for hot and cold meals 6. 0 FACTORS THAT DETERMINE THE DESIGN OF A KITCHEN 1. Service requirement: Management should be well aware of a food service objectives before planning its kitchen, type of menu and target numbers, etc usually determine the type of equipment to be in the kitchen 2. Space availability: One that maximizes space wage or that ensures efficient usage of space. 3.Amount of capital expenditure: Have an accurate idea of spending available since finances will often determine the overall design and acceptability. 4. Type of equipment available: Space provision for ventilation and power supply of the kitchen. 5. Use of convenience foods: Design of a fast food kitchen using ready-made foods will be different from that of a kitchen serving †¦. la carte menu. 7. 0 FOOD HYGIENE A number of factors may affect the quality and wholesomeness of food. * The premises, equipment and conditions in which it is stored * The care taken by food handlers to avoid contamination from other foods.Large scale handling of food by staff not trained or conscious of hygiene requirements is a major source of infection. In such circumstances, cross-contamination can easily occur. * Allocation of the kitchen * The number of people passing by the kitchen * Contact of cooked food with raw foods or utensils and surfaces contaminated by raw foods is likely to become infected * Segmentation of cooking sections may contaminate high risk foods such as cooked poultry and meat (pies, soups, stock) milk, creams, custards, shellfish, eggs, cooked rice and dairy products. 8. COOK-CHILL FOOD PRODUCTION Cook-chill, according to John Campbell,David Fasket and Victor Ceserani (2008), is a catering system based on the normal preparation and cooking of food followed by rapid chilling storage in controlled low-temperature conditions above freezing point, 0–3? , and subsequently reheating immediately before consumption. The chilled food is regenerated in finishing kitchens, which require low capital investment and minimum staff. Almost any food can be cook-chilled provided that the correct methods are used during the preparation. 8. 1 THE COOK-CHILL PROCESS The food should be cooked sufficiently to ensure destruction of any pathogenic microorganisms. The process must begin as soon as possible after completion of the cooking and portioning processes, within 30 minutes of leaving the cooker. * The food should be to 3? within a period of 90 minutes. Most pathogenic organisms will not grow below 7, while a temperature below 3? is required to reduce growth of spoilageand to achieve the required storage life. However, slow growth of spoilageorganisms does take place at these temperatures and for this reason storage l ife cannotbe greater than five days. The food should be stored at a temperature of 0–3? and should be distributed under such controlled conditions that any rise intemperature of the food during distribution is kept to a minimum. For both safety and palatability the reheating (regeneration) of the food should followimmediately upon the removal of the food from chilled conditions and should raise thetemperature to a level of at least 70?. The food should be consumed as soon as possible and not more than two hours afterreheating. Food not intended for reheating should be consumed as soon as convenientand within two hours of removal from storage.It is essential that unconsumed reheatedfood is discarded. 9. 0 COOK-FREEZE FOOD PRODUCTION This type of food production is similar with the cook-chill system of production. The only difference is temperature conditions that the foods are placed in. 10. 0 COOK-CHILL AND COOK-FREEZE FOOD PRODUCTION RELATING TO THE KITCHEN DESIGN A type of a kitchen determines what type of food production system to be employed. 1. A conventional type of kitchen produces fast foods therefore, it can adopt the cook-chill production system.It would be easy to reheat the foods in the microwave than to start preparing; beef stew takes long to prepare and for a fast food restaurant, time matters most. 2. L-shaped kitchen creates a large working area which also creates room for the cook-chill or cook-freeze equipment since the equipment is big and requires a larger space e. g the blast chillers and deep freezers as in figure 10. 0. Figure 3. 0. A chef preparing a meal using a Blast chiller. 3. A u-shaped kitchen, though considered to be the best, would not be the best type of kitchen for a cook-freeze type of production.The equipment might need one corner of the room which cannot be possible because the corners might be occupied with other equipment. 4. A corridor kitchen might also not be suitable for cook-chill systems because the equipmen t is placed in the sides of the kitchen which creates much space for an easy work flow but little storage and working areas. 11. 0 Conclusion Cook-chill and cook-freeze are food production methods that are commonly used nowadays to produce food in most of the hospitality establishments worldwide.The cook-chilling and cook-freezing areas in the kitchen are compatible parts of the kitchen plan and design, therefore, for these areas to exists in a kitchen it has to be planned at first when building the kitchen. BIBLIOGRAPHY Fellows, PJ(2000). Food Processing Technology: Principles And Practice 2nd ed. Woodhead: Cambridge Food Standards Agency(2002). The Composition Of Foods,6th ed. MacCance: Cambridge Kowtaluk, H. & Kopan, OA. (1990). Food For Today(4th ed). McGraw-Hill:New York