Thursday, December 26, 2019

What Did Durkheim Mean When He Called The Collective...

1) What did Durkheim mean when he referred to the Collective conscience ? Why did he think this was important for understanding Crime and deviance. 2) Describe Merton s theory of Strain as an explanation of crime and deviance in society. Strain theory refers to when people turn to crime and deviancy when they feel unable to achieve socially approved goals through legitimate means. (Agnew, 1992). Featherstone and Deflem (2003) outline five routes that individuals could take in order to achieve their goals, according to Merton’s theory. The first is the ‘conformist’ route where individuals adhere to achieving goals and means in a legitimate way, and this does not lead to crime and deviance. The second route they discuss is the†¦show more content†¦The rebellious route leads to groups forming such as the ‘skinheads’ and the Ku Klux Khan. This route can also lead to deviant behaviour and crime. 3) Why did Shaw and Mckay think that delinquency was concentrated in particular geographical areas? Shaw and McKay (1942) believed that delinquency was concentrated in particular geographical areas, which came about from some research they conducted in Chicago using maps to examine the residential location of juveniles referred to Chicago courts, where they found that rates of crime were not distributed evenly throughout the city. They found that crime was concentrated on particular areas and those areas had a steady crime rate despite the movement of people moving in and out and different races taking over. They then focused on these areas with high crime rates and compared to those with low crime rates. Shaw and McKay found that the neighbourhoods with high crime rates were in low socio-economic status and economically deprived. These neighbourhoods were viewed as socially disorganized because these areas had high rates of movement where there was a continuous flow of immigrants. In these areas, institutions such as the family and schools were unable to regulate the behaviour of the youth because they were weak, which in turn leads to higher crime rates. They looked at the result of social disorganisation in relation to crime and found that it affected many things, mainly the social institution of

Wednesday, December 18, 2019

Essay on History of African American Music - 1267 Words

Yasmin Gonzalez Mrs. Herrera Junior English 1 March 2012 History of African American Music â€Å"In less than a minute, the death wail went up out of every cabin in the Quarters, and Brother Ezekial began the death chant: Soon one morning, Death come knocking at my door†¦. Oh, my lord, What shall I do† (Walker 17)? Death was common for slaves. They routinely died from disease, beatings and accidents on the plantation, and they expressed their sorrow in the form of song. â€Å"I see death around the corner, gotta stay high while I survive, †¦ Keep my finger on the trigger, no mercy in my eyes† (â€Å"Death Around†). Death is still common in the African American society. â€Å"Black males ages 15-19 die from homicide at 46 times the rate of their white†¦show more content†¦During this time period, music began to evolve. Woog says, â€Å"These immigrants, naturally, brought their music. During the next decades, black popular music flourished, developing into several key genres and moving steadily into mainstream American culture† (20). As they did, music began to grow into three obvious styles: ragtime, blues, and jazz. Starting this new era was ragtime. As pianos became common in saloons, clubs, brothels and middle-class homes (Woog 22), ragtime became very popular. Pianos were one of the main instruments, although a piano could have also been accompanied by bongo drums or an acoustic guitar. The ambiance of this genre is generally expressed in a fluent and joyful way. Another type of music of this exquisite age was blues and it wasn’t a secret. Blue and Naden agree when saying: Ragtime wasnt the only music to come from gospel. Around the turn of the 20th century, a different sound was drifting out of the Mississippi Valley and out of Tin Pan Alley. It would overtake rag in popularity and endurance, †¦it was associated with the haunting heartaches of life and thus came to be called the blues. Ragtime and blues were alike in many ways but different in many others. Blues was genuinely emotional ; it had a darker side to it. Singing was the key tool to blues; it wasn’t so much the type of instruments that were used but more of theShow MoreRelatedAfrican Music And Its Impact On The World1051 Words   |  5 Pagesmost music we hear today is profanity such as rap or pop or basically any music in the united states. But there is one culture that hasn t changed that much but has stayed to their roots and is still popular today. That is African American music. Because of the rise of modern day music in America such as rap and pop I want to show how African music has impacted the world today and stayed in their roots. African music or better known as black music brought a lot of different types of music to AmericaRead MoreWorld Music: The Emotional Effect of Music Essays846 Words   |  4 Pagesthe communication that is experienced when listening to instrumental music. This will cover the intrapersonal and intercultural connection that the music communicates. The paper will discuss both of these points by focusing on 4 different cultures and show the differences in the music styles by showing what emotions the music is communicating by way of instrument, voice, tone and tempo. While many cultures use all forms of music to communicate their beliefs and emotion I could only pick a few toRead MoreHistory of the Blues Essay1018 Words   |  5 Pages In one way shape or form Blues music has influenced almost every music artist and their work. Jazz and Blues gave way to such artists as Elvis Presley and Chuck Barry. The history and origins of Blues traces back many generations. Many articles have been written over the years helping readers better understand the history and importance of Blues music. All the articles have a similar attitude toward The Blues. Each article makes Blues Musics social and musical importance and impact blaringlyRead MoreAfrican Americans Influence On Music1229 Words   |  5 Pagesblack culture represented in most hip-hop; that is the dominating music genre that expresses African American views. It’s not so easy to remember where African Americans influence on music al began. Black influence on music today is really unrecognized but it’s important to bring to light just how much African Americans really have contributed to the sound, style, and feel of today’s music. Not just h ip-hop or rap, but all kinds of music. There was one particular sound that really changed America andRead MoreThe Blues, A Genre Of Music905 Words   |  4 Pagesblack and from the south to play the blues? The blues, a genre of music so well known and so universal, that one knows is associated with black culture; and forever connected to it. However, some may argue that not anyone can play the blues and blues is only black music. That being said, does it matter what the skin color of an individual may be to play the blues? In contrast I strongly believe anyone can play the blues because music is the purest form of creativity and communication. The realityRead MoreThe History, Criticism And Theory Of The Arts935 Words   |  4 Pages both modern and classical; linguistics; literature; history; jurisprudence; philosophy; archaeology; comparative religion; ethics; the history, criticism and theory of the arts†¦Ã¢â‚¬  (â€Å"What Are the Humanities?†). This definition can be used to analyze the African continent; the practices and various cultural aspects that can be found in America, in particular in the African American population; as well as the international relations, and history. Interviewees were asked different questions about AfricaRead MoreHow Hip Hop Is Influenced By African Americans And Hispanic Americans909 Words   |  4 Pagesmusical art form, it was created by African-Americans and Latino-Americans in the 1970s. Its concept came from a younger generation of African-Americans in the Bronx, it is different from rap because it also includes elements of pop ,some say it was a beautiful, prideful ex pression of music, art, and dance from a backdrop of poverty. Since that ignition in a New York City borough, it has inspired people from all across the world to produce this genre of music. However in 2015 Hip-Hop ContinuesRead MoreThe Struggle For Equality And Rights During The Civil War1323 Words   |  6 PagesAmerican history was radically changed when President Abraham Lincoln gave the very famous Emancipation Proclamation. This lead to the freedom of millions of African Americans who sought the same liberty and equality that was promised to everyone under the United States constitution. These liberties, of course, were not achieved right away. During the Reconstruction era, which is the decade right after the Civil War, many of the recently freed slaves did not have money, property, or credit. TheyRead MoreThe Black Atlantic : Modernity And Double Consciousness1190 Words   |  5 Pagesvarious experiences of Africans across various locations such as Africa, the Caribbean, and Europe. Gilroy also highlighted many intellectual contributors to the discussion, which included Fredrick Douglas, Donald Byrd, W.E.B. DuBois and Richard Wright. His approach to the diaspora study differed from the typical, but did incorporate personal stories from those who experienced it themselves. While focusing on the various components of the work including nationalism, race, music, double consciousnessRead MoreThe Jazz : A Music Genre1078 Words   |  5 PagesName: Sofia Endara Research Paper Jazz The Jazz is a music genre that was developed from the traditions of West Africa, Europe and North America. It arises specifically in New Orleans, Louisiana, home of musical style, where was a large consignments of slaves, mainly western Africa. That is why the jazz comes from the combination of three traditions: the native American, African and European. The African-American community in South America developed its musical expression through creative improvisation

Tuesday, December 10, 2019

Hawaii International Conference on System Sciences MyAssignmenthelp

Question: Discuss about the Hawaii International Conference on System Sciences. Answer: Introduction: The Commonwealth Bank of Australia is one of the largest business companies in Australia. It was established in 1911 by the Australian government and later was listed in the Australian stock exchange market. However, it was then privatized by the same government in 1996 which still manages its operations to date. CBA is a multinational bank whose business operations spreads towards New Zealand, Fiji, Asia, USA and the UK (Commonwealth Bank of Australia, 2008). It also offers a good number of business services which are normally under the retail services, institutional and individual banking services, insurance services, investment and financial management services among others. With this in mind, the bank established a large number of branches or subsidiaries that operate under its management. E.g. the Commonwealth securities Limited (CommSec), Commonwealth Insurance Limited (CommInsure), ASB in New Zealand and Bankwest to name a few of them (commbank.com.au). Nevertheless, its headq uarters are situated at Darling Harbour, Sydney, Australia where its major and central operations take place. After its establishment, the bank has been growing and developing till today. Being listed as one of the largest business in Australia, its operations must be modernized as well as updated. Since the bank offers financial services, then it certainly must be using the modern and technologized accounting systems and packages to manage and control its business operations. It uses them to run the banking operations in all of its branches which has enabled it to be even more successful I its industry. The organizational structure of a business is the physical and logical organization of the business authority, powers, principles, laws, rules and regulations. In addition it also relates to the identification and implementation of the goals and objectives of the business with an aim of achieving them. Therefore, this means that the organization structure will relate to the employees, management team, products or services offered, strategies and techniques of performing business operations among other things (Baird et al, 2017). Therefore, the banks top management roles are performed by the board of commissioners who control, direct, organize and plan all the overall business processes and procedures. There are managers who work under this team of top managers by running the banks branches and other departments. However, the bank also a very large number of employees (around 45,000) that include financial analysts, sales teams, accountants, other managers, investment advisors to name just but a few. Additionally, it has many various organizational department or rather divisions whose purpose is to focus on customer needs and most importantly customer satisfaction. These activities include services like retail banking services, business and private banking services, international financial management, wealth management and safekeeping, institutional banking and marketing services among others. However, to be able to succeed in all of these business operations and activities, the bank has its mission, vision and values that they look forward to achieving. This structure seems to be a simple and clear structure which has helped the bank maintain its market and its business operations since its establishment to date. Also, it is the structure that has helped it become so successful to the extent of being listed as one of the topmost companies in Australia. Challenges in meeting market demand The bank operates in different locations within and without Australia; e.g. New Zealand, Fiji, Asia, USA, Sydney among others. Also, it offers a wide range of services which means that it has a very large market share and market segment in all its locations. For instance, it offers retail services, business and personal banking services, investment opportunities to name a few. This is a clear indication of how large its market and demand can really be. However, the company may be unable to reach the market demand especially in seasons when it is high. This challenge can cause a lot of damage for the bank especially in terms of revenue earned and customer satisfaction levels. The bank has a large number of subsidiaries in different locations and working under its management. This means that the communication process and process between the branches and the main bank headquarters must be effective and efficient. The structure should be flexible so that it can be able to adjust to location changes as well as the technological changes. However, poor communication is a challenge that is experienced by most large and rapidly growing business. Also it later causes organizational problems in general and therefore failure. The CBA subsidiaries have various departments or rather divisions which help the business run its various operations. This means that every department has its manager, human resource manager among others. Therefore, the process of employees reporting to different managers in different division may lead to conflicts between them when it comes to the overall reporting stage, i.e. to the top management team. Here there may be disagreements between the managers concerning different business aspects. This is a challenge that arises from structure like that of CBA bank. Most Likely Acquisition Method for CBA The most likely acquisition method for CBA is the ERP system methods. The Enterprise Resource Planning, ERP, is basically a software systems used to manage a businesss operations and activities and channel them towards the set objectives and goals of the business. For instance, it can manage and control the technological advancement, human resource operations are activities like hiring, firing, appraisals, retiring process, manufacturing and production operations among other things. This system is mostly applicable for large and well developed businesses therefore making it the best option for CBA bank. Apparently, it is a business that deals with offering a large number of services, managing a large number of employees, satisfying a large and wide market share and segment and most importantly managing a god number of branches or subsidiaries (Papadopoulos et al, 2017). Therefore, the implementation of this kind of software systems, it will be able to make its business operations eas y and management responsibility of the top managers and the other managers pretty simple and easy as well (Boehm et al, 2013). Also, it will be able to be updated on real time the progress of all the organizational departments and division as well as the performance of the overall bank operations. It is important for every business transaction to be recorded and documented for future reference as well as for evidence availability. Therefore, anyone who is to be involved in a sale process should ensure that the information recording and documentation is done correctly and effectively to avoid problems. This means that the customers, accountants and the bank tellers should be extremely cautious when dealing with the customers finances. In correct recording and documenting is a problem that occurs in many business that deal with finances like banks. This is in relation to bank account hacking and access by unauthorized personnel. Every business should ensure that its finances and other customer or business information is well and properly safeguarded and secured. This means that there should be security measurers installed and implemented in all the parts and stages of business transactions or operations. For instance, in the case of CBA bank, it should ensure that the customers have been checked and verified before they enter the bank, the employees given security accesses up to certain levels of clearances to prevent theft among other things. Lack of adequate product knowledge According to Khodakarami et al, 2014, the sellers of a product should ensure that they have enough knowledge about the product before they go to sell. This will help them convince the customer to purchase the product or service. The accounting software packages are used to monitor, evaluate and analyze a businesss financial statements reports and records. They help a business manage and control its finances in the best way possible. This is in relation to investment decisions, revenue allocation and spending procedures, expenditure decisions to name a few. In that case, CBS has certainly been using the modern and advanced accounting software systems to perform its operations. These systems have often proved to be of great help in businesses like banks and have certainly contributed to their success (Wixom et al, 2014). For instance, for CBA to be listed as one of the best and largest banks in Australia, it must be using such kind of software packages. These systems have helped the company manage its customer relations, finances, human resource department management but most importantly its financial status and finance spending (Rajaguru et al, 2013). Through the accounting software package, it is able to mon itor and manage its market share, service demand, manage its branches or subsidiaries among other things. In addition to that, it is able to account for its financial spending and budget for its future revenues through the help of the financial analysts. Therefore, having this in mind, it is clear how important and essential the accounting software packages are for a business like the CBA bank and how helpful they can also be. As for this kind of business and industry, having the best and most modernized accounting software can lead to better performance and therefore improved success levels. CBAs Current Market Size Just as mentioned earlier, the bank has a very large and wide market share and segment. Apparently, it offers a wide range of services like business and private banking, retail banking, international financial management, wealth management and safekeeping, institutional banking and marketing services to name a few of them. This shows that the business has a large number of customer variety who need satisfaction from different services. In addition to that, the bank operates in many town like New Zealand, Fiji, Sydney and Australia among others. Also it has a large number of subsidiaries like Bankwest, Commonwealth securities Limited (CommSec), Commonwealth Insurance Limited (CommInsure) and ASB (New Zealand) as some of its main branches and brands. The business has been listed as one of the largest banks in Australia which give it an opportunity to be popular as well as famous. This is an additional aspect that increases its market share and market segment in the banking industry. Al so, just as mentioned earlier it is multinational business which means that it operates in many other countries outside Australia; e.g. in United Kingdom, Asia and USA. Through this, it increases its market shares even to a wider range. CBA has been rated very highly by its customers as well as by the economic status analysts in the country which means that it offers very good and quality services. Since the company is rated as one of the best banks in Australia, its closes competitors in the industry are its fellow big four banks, which are the Westpac, NAB and ANZ banks (Commonwealth Bank of Australia, 2008). The CBA and all these banks offer almost the exact same quality and type of banking services to their customers. However, being listed as one of the top four banks in the country, then they have to have a certain aspect that gives each of them a competitive advantage. Therefore, for the case of the NAB, the company has been rated higher than CBA on some aspects which gives it a competitive advantage on that aspect, i.e. the fact that they operate in more locations and have more subsidiaries than CBA. Also, those other banks have a wider variety of services that they offer to their customers which also gives t hem competitive advantage over CBA. Challenges Facing Accounting Software Users Lack of technical support e.g. electricity and enough computers or equipment. Lack of experience and expertise required for the system operation. Lack of advanced technological support to assist them especially when it comes to speed of the software packages. Recommendations CBA should ensure effective and efficient training is conducted to teach the users how the systems should be operated. CBA should ensure that all the support needed for the systems to be functional are available and enough. The bank should be able to upgrade the systems frequently to ensure that they are fast, effective and efficient. References Aoki, M., 2013. Monitoring characteristics of the main bank system: An analytical and development view.Chapters, pp.342-374. Garvey, W.D., 2014.Communication: the essence of science: facilitating information exchange among librarians, scientists, engineers and students. Elsevier. Missimer, M., Robrt, K.H. and Broman, G., 2017. A strategic approach to social sustainabilityPart 1: exploring the social system.Journal of Cleaner Production,140, pp.32-41. Rajaguru, R. and Matanda, M.J., 2013. Effects of inter-organizational compatibility on supply chain capabilities: Exploring the mediating role of inter-organizational information systems (IOIS) integration.Industrial Marketing Management,42(4), pp.620-632. Kamariotou, M. and Kitsios, F., 2017. Information Systems Phases and Firm Performance: A Conceptual Framework. InStrategic Innovative Marketing(pp. 553-560). Springer International Publishing. Khodakarami, F. and Chan, Y.E., 2014. Exploring the role of customer relationship management (CRM) systems in customer knowledge creation.Information Management,51(1), pp.27-42. Baird, K. and Baird, K., 2017. The effectiveness of strategic performance measurement systems.International Journal of Productivity and Performance Management,66(1), pp.3-21. Wollmann, D. and Steiner, M.T.A., 2017. The Strategic Decision-Making as a Complex Adaptive System: A Conceptual Scientific Model.Complexity,2017. Coltman, T., Tallon, P., Sharma, R. and Queiroz, M., 2015. Strategic IT alignment: twenty-five years on.Journal of Information Technology,30(2), pp.91-100. Yang, Z., Sun, J., Zhang, Y., Wang, Y. and Cao, L., 2017, January. Employees Collaborative Use of Green Information Systems. InProceedings of the 50th Hawaii International Conference on System Sciences. Commonwealth Bank History A brief history of the Commonwealth Bank, 2012-07-14. About.commbank.com.au. Retrieved. Commonwealth Bank of Australia (2008)."Commonwealth Bank of Australia to acquire Bank West and St Andrew's". Retrieved2008-10-09 Weimar, E. M. I. L. Y., Ariadi, N., Joost, V., Aske, P., Martijn, G., and Alexander P. S., 2017. "The influence of teamwork quality on software team performance."arXiv preprint arXiv:1701.06146. Wixom, B., Ariyachandra, T., Douglas, D., Goul, M., Gupta, B., Iyer, L., Kulkarni, U., Mooney, J.G., Phillips-Wren, G. and Turetken, O., 2014. The current state of business intelligence in academia: The arrival of big data.Communications of the Association for Information Systems,34(1), p.1. Piccoli, G., Lui, T.W. and Grn, B., 2017. The impact of IT-enabled customer service systems on service personalization, customer service perceptions, and hotel performance.Tourism Management,59, pp.349-362.

Monday, December 2, 2019

Interconnection Between the Lives of Human Beings and the Internet

Introduction The interconnection between the lives of human beings and the internet is not only complex and intertwined but also a cause of concern today. With easy access to information, questions are being raised on the impact of this trend and whether the moral fabric of the society is under any threat. This paper addresses some of these issues with emphasis on online dating, politics and religious life.Advertising We will write a custom essay sample on Interconnection Between the Lives of Human Beings and the Internet specifically for you for only $16.05 $11/page Learn More Acceptability of Online Dating With the growing use of social networks like Facebook, Twitter and MySpace, the society is coming to terms with certain phenomena that were earlier condemned and demonized (Worstall, 2011). Of particular interest is online dating which has captivated the mind of millions of people around the world, triggering debates, discussions and research in orde r to have a clear understanding of the fundamentals of online dating. The question of acceptability of online dating has for instance received a wide range of discrepancies with some people supporting the idea while others believe that it is unethical (Reuters, 2010). It is therefore true to say that almost every person has an opinion concerning online dating and whether young people should be allowed to find their soul mates through the internet. According to Casciato (2010), online dating has gained acceptance among young people with close to thirty percent of web users considering it as a viable source of their romantic friends. In his 2010 research, Casciato (2010) further noted that Pakistan and India recorded the highest number of people who would prefer using the internet as a channel for romantic introductions. With almost 60 percent of Indians and Pakistanis accepting online dating, it is obvious that the perception over the web is continuously changing (Casciato, 2010). In my day to day life, these disparities do exist with people having varying stances on the use of the internet. Many still believe that there are other natural ways of meeting spouses and relating other than using the internet which may sound like a communication machine. Nevertheless, in this time and age where communication technology has overtaken almost every aspect of our lives, online dating cannot be absolutely ruled out. Internet and Politics As mentioned above, the internet plays a major role in almost every aspect of human life. In politics, technology has been used to a wider extent resulting into multiple reactions and effects. For instance, the 2008 American race to the White House welcomed significant application of the internet as a tool to encourage democracy and political participation (Nagourney, 2008).Advertising Looking for essay on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More According to Nagourne y (2008), the campaign redefined ways of reaching out to voters, mobilizing funds, selling ideas and manifesto and tracking of the public opinion among other issues. Through numerous blogs and websites, politicians and political parties reach out to citizens with an aim of influencing their voting decisions (Council on Foreign Relations, n.d.). The internet also allows voters to interact with politicians from different destinations around the world. It can also be argued that the internet is able to reach to people who may not necessarily rely on the main stream media like television and newspapers for news updates (Tabler, 2011). With over 70% of Americans having access to the internet, its role and place in the current political arena cannot be ignored. Most people spend a lot of their time online making it convenient to track political developments in offices and at home (Quintelier Vissers, 2008). Arab Spring It has to be noted that social media networks and the internet at lar ge did not cause the upheavals in the Arab world. However, it played a major role in propagating information (Saletan, 2011). Through cascades of messages which were carried across networks, the need for freedom and democracy came to the attention of millions of people leading to the spread of revolutions around the Arab World. Several political groups created social accounts, blogs and YouTube contents that were solely meant to communicate the spirit of uprising in the region (Howard, 2011). Internet and Religious Institutions As a reservoir of a wide range of information, the internet has become a source of spiritual edification for millions of people around the world. The question which lingers in the minds of many is whether we are headed for an e-Church of e-Religion that will cater for the needs of many who are seeking their holistic satisfaction online (Dawson Cowan, 2004). How then does internet pose a threat to religious institutions around the world? It is worth noting th at the web has not only attracted the unrighteous and spared the saints but rather everybody including pastors and Sheikhs are considering World Wide Web (WWW) to be their daily destination in terms of colleting sermons and spiritual content around the world.Advertising We will write a custom essay sample on Interconnection Between the Lives of Human Beings and the Internet specifically for you for only $16.05 $11/page Learn More The ultimate consequence of having this scenario is that religion and religious institutions get transformed with time (Davie, Woodhead Heelas, 2003). How authentic is a web sermon? Many analysts argue that some web authors do not have moral authority to write sermons which are being downloaded and fed to believers on a daily basis. The sanctity of the web space is also questionable; having in mind the fact that it contains both illicit and palatable information. Internet sermons therefore usually carry the image of the source and may sometimes express the feelings of the original author whose intensions and beliefs could be different from what is to be communicated (Laan, 2009). As a result, the nature and perception of people over spiritual life changes to comply with the internet which may be considered as a true source of spiritual nourishment. The challenge remains to the religious leaders to not only integrate the web but also guard against negative impact of online sermons. Reflections Technological advancements realized in recent years remain major achievements of the 21st century. Among countless benefits, these developments have significantly simplified and transformed communication modes and efficiency (Silverstein Lasky, 2003). The use of the internet which connects the whole world permits sharing, access and transfer of information at ones comfort zone at a click of the mouse. Indeed every sphere of human life has been touched in one way or the other ranging from social, economical and spir itual. Businesses have expanded and realized tremendous growth through the integration of internet technology and digitalization. Young people have resolved to use the internet as the avenue to develop relationships through dating while other people consider the internet as their source of spiritual nourishment (Casciato, 2010).Advertising Looking for essay on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More Of importance is the fact that there exists an interconnection between the internet and the lives of people. As a result, no one can run away from the web; it is either affecting you directly or indirectly. For many adults, who may consider the internet as a source of very important materials, they may be rudely shocked to learn that their sons and daughters are finding marriage partners online (Silverman et al., 2007). Should the society denounce the internet and revert to 19th century technology? Logically, the internet is a major achievement in the history of human kind and no one would dare consider such a move. The advantages of the internet by far outweigh its demerits, qualifying its application to be worldly acceptable. An understanding of the predisposing factors which make internet use threatening is equally important. For instance, many people who prefer online dating do so because of certain existing circumstances and conditions. Issues like nature of career and level of education play a pivotal role in determining individuals’ reactions towards the use of the internet and its perceived effects. People with lower education level easily accept the use of the internet as a dating channel as compared to those with advanced qualifications (Attwood, 2007). This disparity explains why particular generations appreciate the idea than others. Additionally, people with tight working schedules find a lot of comfort in making online friendships because of limited time as defined by their careers. Online dating also offers a wider range of possibilities in terms of choices as opposed to the traditional way of meeting friends which could be limited geographically. No one can deny that online communication has turned out to be a significant toolkit for leaders around the world. Nevertheless, it has to be emphasized that the internet can pull down the leadership of a country especially in cases of revolutions as witnessed in the Arab World (Council on Forei gn Relations, n.d.). In a dictatorial environment where freedom of speech is limited, the internet has been employed as a last resort in mobilizing people and making them fight for their deprived rights. Conclusion Based on the above arguments, it is evident that the web plays an enormous role in human life mainly by augmenting the flow and access to information around the world. This has generated varying perceptions within the public with a section denouncing this mega communication tool. There is every need to cautiously appreciate the role of the internet since it has two sides which could either be beneficial or destructive to the society. References Attwood, F. (2007). No Money Shot? Commerce, Pornography and New Sex Taste Cultures. Sexualities, 10(4), 441-456. Casciato, P. (2010). Online dating gaining worldwide acceptance. Reuters. Retrieved from: http://www.reuters.com/article/2010/02/15/us-online-odd-idUSTRE61E4G120100215 Council on Foreign Relations. (n.d.). The New Arab Revolt: What Happened, What It Means, and What Comes Next. Washington, DC: Council on Foreign Relations. Davie, G., Woodhead, L. Heelas, P. (2003). Predicting religion: Christian, secular, and alternative futures. London, UK: Ashgate Publishing, Ltd. Dawson, L. L. Cowan, D. E. (2004). Religion online: finding faith on the Internet. London, UK: Routledge. Howard, P. N. (2011). The Arab Spring’s Cascading Effects. Miller MCCUNE. Retrieved from: http://www.miller-mccune.com/politics/the-cascading-effects-of-the-arab-spring-28575/ Laan, J. (2009). How the Internet Shapes Religious Life or the Medium Is Itself the Message. Bulletin of Science, Technology Society, 29(4), 272 -277. Nagourney, A. (2008). The New York Times: The ’08 Campaign: Sea Change for Politics as We Know It. New York Times. Retrieved from: http://www.nytimes.com/2008/11/04/us/politics/04memo.html?_r=1 Quintelier, E. Vissers, S. (2008). The Effect of Internet Use on Political Participation An Analysis of Survey Results for 16-Year-Olds in Belgium. Social Science Computer Review 26(4), pp.411-427. Reuters. (2010). Online dating gains acceptability as singles face time constraints. Canada. Retrieved from: http://www.canada.com/life/valentines-guide/Online+dating+gains+acceptability+singles+face+time+constraints/2486013/story.html Saletan, W. (2011). Springtime for Twitter; Is the Internet driving the revolutions of the Arab Spring?Slate. Retrieved from: http://www.slate.com/id/2299214/ Silverman, et al. (2007). Creating community online: The effects of online social networking communities on college students’ experiences. How can student affairs professionals best respond to this emergent phenomenon. Michigan USA: ProQuest. Retrieved from: http://ssc.sagepub.com/content/26/4/411.full.pdf Silverstein, J Lasky, M. (2003). Online dating for dummies. New Jersey, NJ: Hoboken. Tabler, A. (2011). In the Lion’s Den: An Eyewitness Account of Washington’s Battle with Sy ria. Chicago: Chicago Review Press. Worstall, T. (2011). Forbes: Internet Dating Destroys Our Humanity. Forbes. Retrieved from: http://www.forbes.com/sites/timworstall/2011/07/26/internet-dating-destroys-our-humanity/ This essay on Interconnection Between the Lives of Human Beings and the Internet was written and submitted by user Ishaan T. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Wednesday, November 27, 2019

Coming of Age in Mississippi (The Story of Anne Moody)

Coming of Age in Mississippi (The Story of Anne Moody) Free Online Research Papers Coming of Age in Mississippi was an excellent autobiography about the unforgettable personnel story of a remarkable young woman named Anne Moody. In this story, Anne details the sights, smells and suffering growing up in a racist society and the daily risks she encountered to challenge it. This was an extremely accurate portrait of black family life in the rural south and inspirational account of a young girl becoming a woman right in front of the reader’s eyes. This book explains how it was to grow up black in Mississippi in the forties and fifties and to have survived with pride and courage intact. Throughout the book Anne discusses the challenges that African Americans in the south had to deal with on a daily basis. The challenges which faced the black community affected them in terms of economic prosperity, affordable housing and the lack of nutrition. Economically it was hard for African Americans in Centerville and all of Mississippi for that matter to get ahead and live comfortable lives. Anne throughout the book had numerous jobs as a domestic house cleaner, a waitress, an assembly worker at a chicken factory, a field hand, a civil rights activist and a few more to add as well. Her employment status was like a revolving door changing multiple times throughout the book. Anne was not the only African American affected by this pattern; she followed in her mother’s footsteps when it came to multiple jobs. Her mothers 2nd husband Raymond was employed through the government, since he was enlisted in one of the branches of the military throughout the book. Some of the more successful Negros in the book owned their own cafes and were supported by the black community. Just as employment was ever so changing for Anne so was the housing situation. As you read the book it seems as if Anne and her family are outlaws running away from authorities with the given amount of places they lived. Anne lived with a countless number of relatives, Anne stayed in multiple houses, but none of them felt like home for her. Anne and her family stayed with wealthy white folk as well, this transpired because Anne and her mother were usually doing domestic work for the given home owner. The nicest house form a physical standpoint Anne stayed in was the one Raymond built but that house was not a home due to the fact that Raymond was a sick and frustrated individual. The smallest thing can make a house a home like a nice meal with great conversation with family and the warmth you receive form that experience. Throughout the book Anne describes the lack of malnutrition she encountered throughout her struggle to become influential. Usually Anne’s daily meal consisted of beans and bread, the only time she encountered meat was when the wealthy white people she was working for offered her leftovers. The topic of food later in the book was a stepping stone to what was to be of Anne Moody when she boycotted the food in the college cafeteria because the grits supposedly had maggots in them. These challenges which were presented to African Americans on top of discrimination from whites accumulated into psychological effects which still exist today. One of the pieces in the book which best describes the result of mental battering is the excerpt which involves Wilbert, Emma’s sister Janie’s husband who has a loaded shotgun ready to be used for destruction. Wilbert was in a fight with Janie and Emma got involved and was accidentally shot in the foot. Emma did not feel hate toward s Wilbert but blamed the white man, stating that none of this would have happened if a black man can keep a job in this town then he wouldn’t be fighting with his wife about money. Another example of discrimination affecting the psychology of African Americans in the south was the separate but equal school systems which weren’t necessarily equal. Anne always excelled in school she always had black students and teachers around her. When Anne went to college she was intimidated by the white teachers and she ended up not going to LSU because of this, she was afraid of â€Å"white teachers† who she thought had to prove a point of being a â€Å"white teacher†. The last psychological effect I’m going to note is that of all African Americans with the right to vote. Anne mentioned in the book that the African American voters who were much older were brainwashed form years and years of neglect and were now content with what they had. Anne understood this so she targeted the youth of the African American community the ones whose minds weren’t polluted and who were willing to be open to new things such as sit-ins and picketing. Legal examples of racism and discrimination within the bindings of this book are vast and extremely ignorant. To make blacks stay away from voting polls, states put tests at the voting station which were biased and did not favor African Americans one bit. This is why it was extremely hard for Anne to motivate fellow blacks to vote because it was pretty disheartening going to vote and being shutdown because you misspelled or misprounced something from the state constitution. Plessey vs. Ferguson states separate but equal, but that was not the case when it came to school conditions; from grade school to college conditions were harsh, this law was also evident at the movie theaters where blacks sat in the balcony and whites on the lower level. Black farmers were also mistreated, cotton was the main crop in Mississippi but for most black farmers they never had a study income. While blacks were struggling as basically sharecroppers white farmers were making a profit the state which would have usually given them grants. The last legal means of discrimination on African Americans in the south was used through the media. A big part why the movement was so difficult to attain was the unification of black civil rights groups was not there, the reason for this was the white media would make up false headlines which other African Americans would read then they would become discouraged and bail out of the movement for equal rights. Along with the legal tactics intended to keep blacks in the dark white southerners used terror to keep African Americans submissive. In keeping the African Americans hopes downs white southerners used tactics such as intimidation, murder, arsine and blacklisting. During one of the nights at the freedom house Anne and a couple of civil rights activists were trying to sleep but the flashlights and dogs from the police officers were keeping her up all night this was one of many intimidation tactics. Murder, was the case of a man who was shot with a double barrel shotgun because he was supposedly involved with the NAACP. Arsine occurred in Centerville when the Taplin’s house was burned to the ground because word around town was that a black male (Mr. Banks) was having relations with a white woman. Anne who had made quite a name for herself in the movement was always afraid of her family members being blacklisted back in Centerville. When sending letters back home Anne was extremely hesitant to reveal a detailed analysis of her plans for the movement. On the topic of lists Anne was on a list which sent a chill up her spine, the Klan’s Hit List. While reading Coming of Age in Mississippi Anne notes many significant historical events which transpired in her quest of civil liberties for African American people. Anne who was an active member of C.O.R.E during her college years was involved in some groundbreaking protests for African Americans. Anne’s most famous act for justice was the Woolworth sit-in where Anne and a few other black protesters wanted to get served equally at a dining hall. This event was a huge success the NAACP days after started protests and issued a list of demands which included hiring of black policemen, removal of segregation signs and integration of public facilities. History as we know is not always pretty there were many ugly and tragic historical events stated in this book. Some of the whores of the racist society which existed in the rural south were evident in the Birmingham church bombings were four young black children were killed, on the topic of brutal murders on black children Emit Til ls murder was also a low point in United States history. The last historic event I’m going to highlight which occurred in the text was the assassination of JFK a young and dynamic president who was dedicated to the civil rights movement. The reason why people like Anne and JFK were so motivated to make America a better place was because they witnessed complacency among all American citizens when it came to inequalities among blacks and whites. The reason Anne was so motivated to achieve something better for her when those around her weren’t was that things could really not get any worse for her she did not see a future for herself or the youth of blacks. Anne was an extremely independent individual residing all over the south and she did not rely on others to determine her destiny that’s what made her such a unique individual for her time she was a trendsetter, a revolutionist. During my completion of reading this book I found two passages which were extremely moving. The first passage which I’m going to chronicle is from Anne’s time when she was involved in the movement. Anne was organizing a voter registration drive and if eligible African Americans voters registered they would receive a supply of clothes. The response was great and lot of voters showed and picked up clothes but know one registered, which frustrated Anne as well as myself. The thing which was lacking in my eyes during the movement was the lack of accountability among African Americans on other African Americans. The second passage I’m to comment on is also from the movement it has to do with the imitative of the given civil rights groups. During the time of the protests numerous black students were thrown in jail for rioting and bailed out of jail by given negro organizations. My question is why a student like Anne Moody who is a bright minded scholar is struggling to pay for tuition but has no problem getting money to be bailed out of jail? I don’t know all the circumstance which occurred but, I feel like education is the ultimate investment and that did not seem apparent in this given situation. If I had read this book in 1968 I would have gotten involved in the Civil Rights Movement. One of the men I admire most in this world is Jim Brown the former Browns running back who is an icon in both the white and black community. One of Jim Brown’s selling points to the black community is his outspokenness about historical knowledge on civil rights. Brown explains to the black community that no movement in this country towards black equal rights was not possible without a white person putting their neck on the line. One of the examples Mr. Brown often brings up is Branch Rickey initiating the arrival of Jackie Robinson as the first African American major league baseball player. I believe if more white people like Branch Rickey put their neck on the line racial parody would become a reality. Research Papers on Coming of Age in Mississippi (The Story of Anne Moody)19 Century Society: A Deeply Divided EraBook Review on The Autobiography of Malcolm XHarry Potter and the Deathly Hallows EssayTrailblazing by Eric AndersonThe Masque of the Red Death Room meaningsHip-Hop is ArtEffects of Television Violence on ChildrenCapital PunishmentMind TravelThe Hockey Game

Saturday, November 23, 2019

Peroxisomes - Eukaryotic Organelles

Peroxisomes - Eukaryotic Organelles Peroxisomes are small organelles found in eukaryotic plant and animal cells. Hundreds of these round organelles can be found within a cell. Also known as microbodies, peroxisomes are bound by a single membrane and contain enzymes that produce hydrogen peroxide as a by-product. The enzymes decompose organic molecules through oxidation reactions, producing hydrogen peroxide in the process. Hydrogen peroxide is toxic to the cell, but peroxisomes also contain an enzyme that is capable of converting hydrogen peroxide to water. Peroxisomes are involved in at least 50 different biochemical reactions in the body. Types of organic polymers that are broken down by peroxisomes include amino acids, uric acid, and fatty acids. Peroxisomes in liver cells help to detoxify alcohol and other harmful substances through oxidation. Key Takeaways: Peroxisomes Peroxisomes, also known as microbodies, are organelles that are found in both eukaryotic animal and plant cells.A number of organic polymers are broken down by peroxisomes including amino acids, uric acid, and fatty acids. At least 50 different biochemical reactions in the body involve peroxisomes.Structurally, peroxisomes are surrounded by one membrane that encloses digestive enzymes. Hydrogen peroxide is produced as a by-product of peroxisome enzyme activity which decomposes organic molecules.Functionally, peroxisomes are involved in both the destruction of organic molecules and the synthesis of important molecules in the cell.Similar to mitochondria and chloroplast reproduction, peroxisomes have the ability to assemble themselves and reproduce by dividing in a process known as peroxisomal biogenesis. Peroxisomes Function In addition to being involved in the oxidation and decomposition of organic molecules, peroxisomes are also involved in synthesizing important molecules. In animal cells, peroxisomes synthesize cholesterol and bile acids (produced in the liver). Certain enzymes in peroxisomes are necessary for the synthesis of a specific type of phospholipid that is necessary for the building of heart and brain white matter tissue. Peroxisome dysfunction can lead to the development of disorders that affect the central nervous system as perioxsomes are involved in producing the lipid covering (myelin sheath) of nerve fibers. The majority of peroxisome disorders are the result of gene mutations that are inherited as autosomal recessive disorders. This means that individuals with the disorder inherit two copies of the abnormal gene, one from each parent. In plant cells, peroxisomes convert fatty acids to carbohydrates for metabolism in germinating seeds. They are also involved in photorespiration, which occurs when carbon dioxide levels become too low in plant leaves. Photorespiration conserves carbon dioxide by limiting the amount of CO2 available to be used in photosynthesis. Peroxisome Production Peroxisomes reproduce similarly to mitochondria and chloroplasts in that they have the ability to assemble themselves and reproduce by dividing. This process is called peroxisomal biogenesis and involves the building of the peroxisomal membrane, intake of proteins and phospholipids for organelle growth, and new peroxisome formation by division. Unlike mitochondria and chloroplasts, peroxisomes have no DNA and must take in proteins produced by free ribosomes in the cytoplasm. The uptake of proteins and phospholipids increases growth and new peroxisomes are formed as the enlarged peroxisomes divide. Eukaryotic Cell Structures In addition to peroxisomes, the following organelles and cell structures can also be found in eukaryotic cells: Cell Membrane: The cell membrane protects the integrity of the interior of the cell. It is a semi-permeable membrane that surrounds the cell.Centrioles: When cells divide, centrioles help to organize the assembly of microtubules.Cilia and Flagella: Both cilia and flagella aid in cellular locomotion and can also help move substances around cells.Chloroplasts: Chloroplasts are the sites of photosynthesis in a plant cell. They contain chlorophyll, a green substance that can absorb light energy.Chromosomes: Chromosomes are located in the cells nucleus and carry heredity information in the form of DNA.Cytoskeleton: The cytoskeleton is a network of fibers that support the cell. It can be thought of as the cells infrastructure.Nucleus: The cells nucleus controls cell growth and reproduction. It is surrounded by the nuclear envelope, a double-membrane.Ribosomes: Ribosomes are involved in protein synthesis. Most often, individual ribosomes have both a small and large subunit.Mitochondria: Mit ochondria provide energy for the cell. They are considered the cells power house. Endoplasmic Reticulum: The endoplasmic reticulum synthesizes carbohydrates and lipids. It also produces proteins and lipids for a number of cell components.Golgi Apparatus: The golgi apparatus manufactures, stores, and ships certain cellular products. It can be thought of as the shipping and manufacturing center of the cell.Lysosomes: Lysosomes digest cellular macromolecules. They contain a number of hydrolytic enzymes that help to break down cellular components.

Thursday, November 21, 2019

Natural history and phenology Assignment Example | Topics and Well Written Essays - 1000 words

Natural history and phenology - Assignment Example In essence, this laboratory experiment entailed collecting phonological data for a tree on the campus of NEIU with a view of contributing to the modern phenology network. After being provided with a tree to be used for the experiment, I found out that the tree had broad leaf, alternate, compound, and pinnate. In this case, given that, the tree had a broad leaf it was a characteristic of a deciduous hardwood. As observed, one of the leaf was on each node, and it had multiple leaflets on a common stalk and the given multiple leaflets being arranged in a pattern resembling a feather and they were all attached to a central rachis. It had a bark of distinctive lighter streaks with a corn large about ? to 3/2 inch and a shallow cap resembling a beret. Following this chronological order of the tree characteristics, it was clear that the tree was the northern red oak as observed in the appendix B. This type of tree is often found on a varied of soil but more especially on moist sandy clay an d the rocky soil. The table 1 (appendix B) shows the chronological order followed in order to arrive at the conclusion that the tree was the northern oak. ... An oak wilt is a fungal disease often known to be transmitted by insects. It is worth noting that the ork wilt disease is transmitted through the underground roots. It is characterized by the leaf discoloring, bronzing and wilting. Contrary to what was the expected phenology, in week two, there were more leaves infected by the wilt disease with one side of the tree dropping off. Leaves were on the other hand turning brown and they were falling off. In the third week, it was evident that there were more leaves that had been infected with a single leave remaining green though some section of the tree showed signs of dying. On the fourth week, it was vivid that the entire tree was infected and thus ended up drying up. On 15th of October which marked the beginning and end of week five, it was clear from observation that the tree in its totality had turned brown and crusty. When finally, the observation was made on 11th of November, it was certainly clear that there were no leaves. The ta ble 2 (appendix A) shows the procedure followed in carrying out the experiment. Work Cited Koech, EE, & Chmielewski, Claudio. Guidelines for plant Phenological Observations. Meteorologie 2007, 398: 225 – 243. APPENDIX A Table 1. Broad leaf Bark with distinct lighter streaks Acon large ? to 3/2 inch with a shallow cap which resembles a beret. Found on moist but not wet sites Alternate Compound Pinnate Table 2. Week one Leaves were 4 to 9 inches long, dark green, with a distinctive lighter streakes. Week two More leaves infected by the wilt disease with one side of the tree dropping off Third week More leaves infected with a single leave remaining green Fourth week Entire tree was 11th of November No leaves 15th of October Tree had turned brown and crusty APPENDIX B Diagram 1 : Leaf

Tuesday, November 19, 2019

W8 Assignment Example | Topics and Well Written Essays - 500 words

W8 - Assignment Example The author further asserts that such profits disappear after the competitors copy the innovations. The system swallows up ideas and changes them into a well-digested fodder for everyday productivity. He therefore, calls the introducers of these changes entrepreneurs, the business trailblazers or risk takers. He also noted that competition always forced down the prices leading to the ultimate disappearance of profits. He describes entrepreneurs as talented specialists who differ from politicians or military leaders as the society treats them as social pariahs or upstarts. They, therefore, reside outside the limelight, fond of dynasties and are not motivated by riches or titles. As the economy grows to complexity, senior managers are faced with uncertainties. Frank Knight pointed out that risk and uncertainties are different. His thesis stated that entrepreneurs are better at peering into the improbability that does not mean that they are efficient since it can neither be observed nor quantified. His argument rested in uncertainty, not efficiency. Knight argues from an abstract concept of uncertainty. His theory could be improved by minimizing contracting and supervisory cost to create efficacy. Schumpeter’s driving force is his accolade to the talented few. Another intriguing possibility is that he imbued with elitist notions that have created this paradigm as a means of self-glorification. He sees himself as the swami of elitism. He begs the question of economics by reducing it to one quibble: Do economists merely compartmentalize the facts about life the way we know it, or they serve as visionaries? Is economic function analytical or predictive? He opted to lay out a vision for the future generations rather than being mundane with money matters. He produced a passionate interest in the captains of industries. Schumpeter’s argues that

Sunday, November 17, 2019

IT Professional Presentation Essay Example for Free

IT Professional Presentation Essay Presentations are meant to be professional with a lot of effort required in the structuring of speech and the assurance of putting across the right message. Professionals in any field or walk of life need to have a good speech which would make them better presenters and hence a noticeable being among all the other employees. An organization has hundreds and thousand and sometimes even more than that employee in number. To make oneself noticeable in the eyes of the one that matter, makes a lot of difference in the career growth. Hard work is something that everyone does but few are those who are able to present it in a manner that enables the top officials to notice you. There are many ways to present and presentations are becoming increasingly common in today’s world. PowerPoint and Flash are the most utilized of all but written means of assistance and even plain verbal speech is also presentation. All these means of presenting are justified depending on the situations and the matter to be presented. Hence, it is not the material that matters to a large extent but it’s what you say right at the right time is what matters. Introduction Information system can be any organised combination of people, hardware, software, communication networks, and data resources that collects, transforms, and disseminates information in an organisation. Like any other system operates within an environment, information system and technology are very important in contemporary business, because they have become a significant component for success in any organisation, such as university, healthcare centre and company. However these are the most important and vital in internet business area because it cannot be managed without information system and technology. In addition internet business can increase their sales and profits by implicating efficient and effective e-commerce which is one of major parts of information system. There are big names that are involved with the IT industry such as the Amazon. com which is solely an internet based company. Other multinationals such as McDonalds are also involved in it despite being a fast food organization. Brief information regarding the two organizations are as follows. Critical Analysis of the Presentations ‘Things they are Achangin-1’ talk about the computer and Information Technology details. It starts off with telling the memory capacity of a computer. The different memories and the capacities that a computer and its hardware has, is explained in the presentation. Along with that it talks about the computer networking and the usage of broadband. It had become increasingly famous and popular in the current years and most of the people in the world have it. ‘Things they are Achangin-2’ on the other hand talks about other energy sources such as batteries and cars and how their mechanism works. These two mentioned sources have also become increasingly important over their years for day to day life. Along with that it has compared their mechanical sources with human body and mind and has talked about the structure of a robotic body. Delivery Channel Strategy ‘Delivery Channel Strategy’ defines the objective of delivery channel which are Projecting and representing the brand defending and developing the active consumer base, obtaining new customers and meeting essential service requirements. It also talks about the benefits of branches, which branches are used more for financial services and why. It explains self servicing and explains the benefits of automated machines which empower the customers. It takes into account the different product used by the financial institutions and their usage. Key Implications of Delivery Strategies In order to have an effective delivery strategy, one needs to take into account all the aspects that come before that as well in order to execute the plan in the most effective manner possible. The following delivery process is explained with an example of Amazon. com, the online trading place. a) Goods, products, ecommerce solution: It started off as a book store with an online presence but later on it kept on adding products in its portfolio and now they have different categories in which they divide their products into such as ‘Books, Music and Movies’, ‘Clothing and Accessories’, ‘Computer Office’, ‘Consumer Electronics’, ‘Food and Household’, ‘Health and Beauty’, ‘Home and Garden’, ‘Kids and Toys’, ‘Sports and Fitness’, ‘Tools and Automotives’, ‘Bargains’ and ‘Gifts and List’. There are further bifurcations within these categories as well which offers further variety to the customers. There services are divided into the categories of ‘Make Money’, ‘For the Community’, ‘For Developers’, ‘For Advertisers’ and ‘Partner Services’. .A9. com caters to the information content requirement which is a search engine present directly on the Amazon. com. (Amazon, 2007). b) Performance and services: The existence of the website over this long period of time indicates its efficiency and the level of customer satisfaction. The website is very well put together so that the customer can easily find their way through to their desired destination. â€Å"Amazon. com, BN. com, and Half. com aren’t getting any complaints at all because they are very simple to use and to understand. Each of these web sites are made for the computer illiterate or just plain lazy† (B2C e-commerce design and performance for Amazon. com, BN. com, Half. com, n. d. ). c) Personalization: The site lay out of the website is also user friendly and it takes no time to find where one wants to go unlike the complicated sites which are hard to browse. It offers the customer to personalize by offering a shopping cart just like an actual shopping mall to create a sense of personalization. They have many products and services and â€Å"different categories of all their items. They also have the option to make â€Å"Your Store,† this is where they store all the information that you like the best and what products you are most interested in† (B2C e-commerce design and performance for Amazon. com, BN. com, Half. com, n. d. ). This gives a sense of individuality to the customers wanting them to come back for a visit. d) Communities and Look and Feel: Amazon. com also offers chat forums for the customers in order to discuss their views and opinions. This is also one reason for the customers to visit the website. ‘Internet Chat Headset Forum’ is one of the examples of their chat forums and virtual customer online communities. The storefront of Amazon. com has been rated high as it offers a number of varieties on the page and also provides clear layout for the customer to assess where they are required to go. e) Incentives: Amazon. com offers different incentives to the customers such as bargains of Friday Sales, Today’s Deals and many more. It offers auctions and personal accounts to give the customers a sense of individuality and personalization encouraging them to visit more often. f) Security Reliability For such sites security is utmost important and therefore it can be said that â€Å"Security and Privacy Policy for these are very well put together and are very private† and one has to â€Å"go through various checks and double checks for e-mail and password verifications. This ensures that the website company and you have the right passwords and e-mail addresses for your privacy and protection. They also have protects programming on their sites to ensure that no one can get you password, e-mail address, and most important your credit card number† (B2C e-commerce design and performance for Amazon. com, BN. com, Half. com, n. d. ). g) Successful achievement One of the many highlighted features of the website is that very recently â€Å"Amazon. com is to Webcast Investor Conference Presentation Morgan Stanley Technology Conference† (Business News, 2007) which is considered to be a huge achievement for the organization along with earning million of dollars of revenue. Another one of its achievements could be the introduction of software called the Amazon S3â„ ¢ which is â€Å"a simple storage service that offers software developers a highly scalable, reliable, and low-latency data storage infrastructure at very low costs† (Amazon Web Services Launches Amazon S3, a Simple Storage Service for Software Developers, 2005). Ethics and Professionalism in the ICT discipline ‘Ethics and Professionalism in the ICT discipline’ talks about the importance of the code of ethics in the professional environment not for one’s career but for the sustainability of its moral values. It describes Ethics as Doing good, Not doing bad, Not screwing people, Only screwing the competition, Letting the competition screw you, Doing things right, Doing the right thing. Key Implications These key implications of Ethics in IT are explained with respect to the example of Amazon. com. For such sites security is utmost important and therefore it can be said that â€Å"Security and Privacy Policy for these are very well put together and are very private† and one has to â€Å"go through various checks and double checks for e-mail and password verifications. This ensures that the website company and you have the right passwords and e-mail addresses for your privacy and protection. They also have protects programming on their sites to ensure that no one can get you password, e-mail address, and most important your credit card number† (B2C e-commerce design and performance for Amazon. com, BN. com, Half. com, n. d. ). Risk Assessment of Ethics in IT Despite the existence of internet over the years, it has still not been able to gain trust regarding the transactions online. Amazon. com along with other organization based online for selling face the challenge of assurance of security to its customers. As for Amazon. com, it failed to provide trust in regard of security to e-commerce project because they did not concern about technical risks. Despite the presence of a huge customer base, a lot of potential customers are hesitant to buy from amazon. com because of this particular reason. However, there is a long procedure regarding the security of credit cards and its personal information which is utilized by many websites present today. â€Å"Many sites that accept credit cards claim they are secure when they have an encryption certificate. This is where you can see the padlock symbol at the bottom of the screen. The encryption certificate encodes the message with the credit card details when it is sent and the organization issuing the certificate (e,g, Thawte or Verisign) verify the business before they issue it. (E-commerce Security, n. d. ). Amazon. com follows the same long procedure of ensuring that the customer feels safe but even then there is a lot of chance of stealth of the information and its misutilization might lead to disastrous losses to an individual. This is the fear that stops the potential customers from entering into the market of internet. â€Å"If credit card numbers are stored on a server they are still potential targets for a hacking attack. Afferent Media protects its server with anti virus and firewall systems. Its ultimate defense though is that it does not store any credit card numbers† (E-commerce Security, n. d. ). Hence, despite the effort, due to technical risk involved Amazon. com is facing the same threat as many other online retailers. Although Amazon. com has developed a trustworthy image over the years but when it comes to monetary losses people are hesitant to take risk as the loss incurred might get too huge to counter. This technical risk can however be countered in order to gain the potential customers that are hesitating at the moment. This can be countered if â€Å"transactions are carried out in real time, in just the same way as an EFTPOS machine. The message is encoded and sent to the bank, if the card passes the checks then funds are transferred directly to the vendor. This is just like when you buy petrol or shop in a supermarket. The vendor swipes your card in and EFTPOS machine, they do not store the card details. † (E-commerce Security, n. d. ). Like every weakness, if this factor is also addressed in its early stages it might not even classify as a problem and may be included in one of the challenges but the more Amazon. com delays it, the more it might lead to disaster and reduction of customer base. It has the advantage that the solution has already been identified, therefore the company just needs to incorporate this procedure in its security e-commerce procedure and keep proper checks and balances over a period of time and the job is done. Once the authenticity of the procedure is verified, it would not be hard for customer to develop trust in the online services. Despite the overall success of the organization, there are still factors that it needs to counter before the issues convert into real threat to the existence of the organization. The security factor is always vital in e-commerce as no customers would want to risk their monetary gains for shopping online. Lean Thinking ‘Lean Thinking’ is a presentation which defines the importance of customers with the help of practical examples taken from different scenarios. It also takes into account the impact of value on customer’s choice and the importance of value in a product. Key Implications McDonalds is a world wide known brand and hence it is famous and loved all around the world for its customer hospitality. A fast food chain, so customer friendly has also made use of the IT sources which is explained as further. The company is a fast food chain across the world known by the name of McDonalds. It is world renowned and is among the top most fast food chains across the globe. It has different kinds of fast foods in its menu ranging from rapid on-the-go burgers to healthy breakfasts and other food items. The organization is known for its quality and variety in food across the globe along with paying its full due to the corporate and social responsibility to the members of the society. Our organization not only is concerned about regular people who are health or weight conscious but also make sure that people with certain individual problems are also given attention to. The entire nutrition information is available on its website and can be completely relied on as it is taken from â€Å"from testing conducted in accredited laboratories, published resources, or from information provided from McDonald’s suppliers. The nutrition information is based on standard product formulations and serving sizes. All nutrition information is based on average values for ingredients from McDonald’s suppliers throughout the U. S. and is rounded to meet current US FDA NLEA guidelines† (McDonalds – USA, 2006). Despite of enjoying the top most notches in most of the countries we are present in; it is made sure that the organization does not lag in its due responsibility towards its customers, employees or the society it caters to which is evident by the brochure of Corporate Responsibility by McDonalds. This brochure is known as ‘The McDonalds USA Corporate Responsibility Brochure’ and another third worldwide corporate responsibility report has been published recently in 2006. It has the ability to adapt to country to country environment and culture. It pays utmost importance to kids and their meals and therefore because of that reason we have specialized meal for children as well. These meals are set with kids preferences in mind and offers incentive such as toy gifts which children can enjoy along with their respective meals. Capabilities and Potential with Risk Assessment McDonalds is known for its customer service and for increasing indulgence in the technology sector as well. McDonalds has some of Information technology involved in its procedures as well as to offer to the customers. As a Manager it is very important to be well equipped and well informed regarding the knowledge of the on-going dynamics in the information technology sector of the country. The advancement of the organization in the information technology sector is indicated by the fact that it offers one of the most novel technologies of the information system which is the McDonald’s Wireless Connectivity. It offers Wi-Fi service to its customers so that they can even bring their work to McDonalds along with enjoying a good meal. Its not just limited to United States which is one of the most technologically equipped country of the world but 7,000 outlets around the globe. We believe in giving the best to our customers and Wi-Fi is a part of it as â€Å"We believe in bringing you innovative and convenient services that enhance your McDonalds restaurant visit, and Wi-Fi is a perfect example. As McDonalds continues to deliver fast and friendly food service at more than 30,000 convenient locations around the world, you can now enjoy the possibility of staying connected with friends, family and co-workers† (McDonalds Wireless Connectivity, 2006). Apart from this, our organization has even stepped in introducing a technology that would bring into use the real time network used by huge and well-known places such as Wal-Mart. In order to manage its hardware and software in different location across the globe, it took help of the Fujitsu Philippines Incorporation to implement a system the system. The system is called Help Desk which enables in the monitoring of the inventory system and the management of the SMS and documents. Due to Help Desk the technical support service now take half the time it previously did. (McDonalds Philippines improves customer service via technology, 2007). Due to high volume of sales of McDonalds around the globe, the manual or low level storing data system is not anymore a product of efficiency for the organization. Therefore, it has moved a step forwards and â€Å"The PC POS system replaced proprietary computer registers that delivered information to in-store processors. These computers are a McDonalds restaurants black box, recording information on operations such as an individual stores total sales for the day, and the number of patties, buns, cups and other products used, and delivering it back to the McDonalds mainframe systems in Oak Brook each night over a modem connection† (Food, Folks and Forecasting, 2006). We as Managers also make use of this technology to place orders to the suppliers for replacement as well, hence making tasks easier for everyone of storing the large bulks of information everyday. The Future of Business Information System ‘The Future of Business Information System’ talks about the consultancy by Dennis Keeling. It takes into account the trends in business cycle, the types of business applications and the industry changes. It talks about different operating systems and system designs and data file structure. Key Implications of The Future of Business Information System The most upcoming trend in the future is outsourcing. Outsourcing is a trend that has recently become very popular among the multi-million and multi-billion organizations around the world. Outsourcing â€Å"often refers to the delegation of non-core operations from internal production to an external entity specializing in the management of that operation† (Wikipedia, n. d. ). There are various functions of an organization that are not the main operations and therefore can be outsourced to other parties such as â€Å"Business segments typically outsourced include information technology, human resources, facilities and real estate management, and accounting. Many companies also outsource customer support and call center functions, manufacturing and engineering† (Wikipedia, n. d. ). There are several reasons why one would outsource their operations to an outside party, which might include the purpose of exploiting cheap labor in case of third world countries or utilizing the efficiency of specialized expertise in a particular field of work. Outsourcing might also involve reducing the cost even it effects their quality to a slight extent. IT outsourcing helps improve the efficiency of IT department as after outsourcing there is special attention given by an entire group people to only one operation, hence in return increasing its importance and therefore its efficiency. IT outsourcing might also be done due to cost reduction by utilizing brains that are willing to work for less as compared to the human resource that is present domestically. Along with a lot of benefits in outsourcing, there comes a bucket full of criticism as well. The critics believe that outsourcing reduces the quality of the operation outsourced hence reducing the overall performance of the organization. Hence, it is believed that organizations reduce their cost by compromising on their quality and exploiting cheap labor by outsourcing. On the other hand â€Å"proponents of outsourcing believe that arguing that outsourcing leads to lower product quality is pointless because if it were true, consumer demand will force firms to shift back to producing the good or service in-firm rather than out-firm† (Wikipedia, n. d. ). Risk Assessment regarding Future of IT With respect to outsourcing, the possible risk or problems that IT could face in the future are as explained further. There are different outsourcers depending to where they are located. They include three kinds that are outsourcing, offshore outsourcing and offshoring. Although these terms are used as a replacement of the other but their meaning is different from one another. Outsourcing is the allocation of an organization’s operation to another responsible party. Now the difference lies in the presence of this third party, that is, if the third party is located outside the host country, it is known as offshore outsourcing. While on the other hand, offshoring is when an operation of an organization is taken to another country without transferring control to the third party. Hence the difference is of transfer of control to another party, that is, the power remains within the organization in case of offshoring while in offshore outsourcing it is transferred to the third party. In case of IT offshore outsourcing, the main country that receives the majority deals is India due to its IT success in recent years with able IT graduates and world-renowned IT universities present in India. Different problems might occur due to the location of the outsourcer, that is, in case of offshore outsourcing, the cost of checks and balances, transportation, dealing across distances might end up being equal or surpassing the cost cut that is the purpose of outsourcing. Hence, nullifying the effect of outsourcing with the cost incurred for distant dealing. â€Å"One issue offshoring of technical services has brought more attention to is the value of education as an alleged solution to trade-related displacements† (Wikipedia, n. d. ). The foreign location of the outsources in case of offshore outsourcing and the exapanding of business globally in case of offshoring might also be subject to crticism due to the reason that it causes the host country to suffer with opportunities travelling to other countries rather than being available to others. Hence, along with certain positive outcomes, outsources is subjected to a sufficient amount of criticism as well. In order to counter the crticism, it would have to scrutinze itself and remove such drawbacks. Weaknesses in Current Information Technology Capabilities However, the McDonalds journey may be rapidly moving towards the success ladder but there are several pitfalls that have occurred in its Information System and its capabilities. For us as managers, it is very important to identify those pitfalls and rectify them as soon as possible in order to avoid any forthcoming problems or issues. The technological world is an extremely rapidly evolving environment, with information becoming obsolete after a certain period of time. Hence, it is very important for the Managers to take that into account and be on the constant guards to protect their image. Wi-Fi is a very innovative and healthy technology but in those countries that are well equipped to support this kind of technology and the citizens prefer to have it in a restaurant. As per a management’s perspective, to implement it in a country like Bangladesh or Pakistan, where there isn’t much knowledge of technology among the masses, would not only be unfeasible but also irrelevant expenditure. As for the PC POS System implemented, it does save time but being a Manager it is very important to receive the detailed information to further process it for other uses which it failed to do. â€Å"The data that is batch-dumped to the McDonalds mainframe system in Oak Brook every night doesnt offer the detail McDonalds executives needed and, worse, took as long as a week to be compiled analyzed and distributed to managers who would then order more patties, buns, etc. from McDonalds vendors†. Hence, it needs to take that into account as well. Professional Presentations Requirement of Soft Skills All the organization of such calibre are required to have high aptitude personnel in it with the presence of hard skills as well as soft skills. In order to sell your product, one has to make sure that its presentation and the its communication is up to the mark. The more the people are convinces the more is the popularity of the product or service meant to be. It is very important for a professional to possess the skills of speaking well and hiring such professional can be a tedious process but all the effort is worth it. Hiring is a very difficult process; it takes a lot of time, patience, and money. Gone were the days when management only looks for technical skills alone, now, they are more focused with soft skills referring to non technical skills of an individual. What are soft skills? According to Mannering (1998) they are considered to be harder to identify, to distinguish. Ironically, for many managers, the soft skills are the hard skills. Ask anyone who has had to manage change, deal with organizational politics, or build a disparate group of people into an effective team (Holbeche, 2006). Platinum skills are developed through training and delegation, active listening, giving and receiving feedback, and creating a motivational environment. (Topchik, 2004). Companies Who Values Soft Skills Fujitsu Here’s an excerpt from an article â€Å"Hi-tech soft skills† IT Training; Jan2007 Fujitsu Services has set up an international Management Academy, headed by Paula Graham (right), to help IT professionals brush up on their interpersonal skills As they progress up the career ladder, many IT professionals could find themselves at a crunch point. They have been hired and valued primarily for their technical and engineering abilities, but as they become more senior they will be expected to adopt more custodial and managerial responsibility over junior colleagues. But where, along the way, were they supposed to have picked up these managerial and interpersonal skills? IT giant Fujitsu Services is tackling the problem of helping the technical person be a better people manager with a new company-wide experiment in delivering soft skills training at leadership level. This programme is about raising the bar on the organization’s people management skills, adds Jeremy Hill, London-based managing director of training partner DIEU. Fujitsu employees are comprised mostly of IT professionals, yes they have all the various technical skills that needed to become one of their programmers, and they keep on giving other technical trainings in order to stay competitive and knowledgeable on diverse IT trends. And yet, management feels they lack something, they need to brush up with communication skills. Employees needed to be more effective communicators; they need to get their message across clearly with the people they are dealing with. Communication is very essential and powerful tool not everybody has the knock off communication skills, and essentially improvement on this part will have a big impact both for employees and their company.

Thursday, November 14, 2019

Free Essays - Animal Farm :: Animal Farm

Animal Farm By George Orwell The theme of Animal Farm is not difficult to follow with in the book. The allegory of history that was during the time of the books development, Orwell intended to criticize the communist regime he saw sweeping through Russia and spreading to Europe and even the United States.   Though he agreed with many Marxist principles, Orwell was unable to accept the communist interpretation of socialism because he saw many similarities between the communist governments and the previous czarist regimes in old Russia.   Communism, he thought, was inherently hypocritical. In his book, Orwell uses his allegorical farm to symbolize the communist system.   Though the original intention of overthrowing Mr. Jones (who represents the Czars), is not inherently evil in itself, Napoleon’s subsequent adoption of nearly all of Mr. Jones’ principles and harsh mistreatment of the animals proves to the reader that indeed communism is not equality, but just another form of inequality.   The pigs and dogs take most of the power for themselves, thinking that they are the best administrators of government.   Eventually the power corrupts them, and they turn on their fellow animals, eliminating competitors through propaganda and bloodshed.   This is of course a reference to Stalin, who murdered many of his own people in order to maintain his dictatorship of Russia.   Because Animal Farm was written, it opened the eyes of the Western world to finally realize the danger of communism.   Soon a Cold War began between the world’s greatest superpowers— the Soviet Union and the United States.   In the end, America would prove that capitalism and democracy could outlive a system of government-mandated equality. As Orwell’s presentation within in the book, many animals were used to symbolize different public figures in that time frame. Each animal had an outstanding role through out this book from the pigs to the pigeons each with their own mischief characters. Mr. Jones: Mr. Jones is Orwell’s chief villain in Animal Farm. Of course Napoleon is also the major villain, however much more indirectly. Orwell says that at one time Jones was actually a decent master to his animals. At this time the farm was thriving. But in recent years the farm had fallen on harder times (symbol of the world-wide Great Depression of the 30’s) and the opportunity was seen to revolt. The worldwide depression began in the United States when the stock market crashed in October of 1929. Free Essays - Animal Farm :: Animal Farm Animal Farm By George Orwell The theme of Animal Farm is not difficult to follow with in the book. The allegory of history that was during the time of the books development, Orwell intended to criticize the communist regime he saw sweeping through Russia and spreading to Europe and even the United States.   Though he agreed with many Marxist principles, Orwell was unable to accept the communist interpretation of socialism because he saw many similarities between the communist governments and the previous czarist regimes in old Russia.   Communism, he thought, was inherently hypocritical. In his book, Orwell uses his allegorical farm to symbolize the communist system.   Though the original intention of overthrowing Mr. Jones (who represents the Czars), is not inherently evil in itself, Napoleon’s subsequent adoption of nearly all of Mr. Jones’ principles and harsh mistreatment of the animals proves to the reader that indeed communism is not equality, but just another form of inequality.   The pigs and dogs take most of the power for themselves, thinking that they are the best administrators of government.   Eventually the power corrupts them, and they turn on their fellow animals, eliminating competitors through propaganda and bloodshed.   This is of course a reference to Stalin, who murdered many of his own people in order to maintain his dictatorship of Russia.   Because Animal Farm was written, it opened the eyes of the Western world to finally realize the danger of communism.   Soon a Cold War began between the world’s greatest superpowers— the Soviet Union and the United States.   In the end, America would prove that capitalism and democracy could outlive a system of government-mandated equality. As Orwell’s presentation within in the book, many animals were used to symbolize different public figures in that time frame. Each animal had an outstanding role through out this book from the pigs to the pigeons each with their own mischief characters. Mr. Jones: Mr. Jones is Orwell’s chief villain in Animal Farm. Of course Napoleon is also the major villain, however much more indirectly. Orwell says that at one time Jones was actually a decent master to his animals. At this time the farm was thriving. But in recent years the farm had fallen on harder times (symbol of the world-wide Great Depression of the 30’s) and the opportunity was seen to revolt. The worldwide depression began in the United States when the stock market crashed in October of 1929.

Tuesday, November 12, 2019

Assessments Package Essay

The paper is based upon the self assessment online training. Throughout I will explain what changes the exercise has done to the view I had prior and the view I have after. Although in I think that becoming a case manager is a hard job and requires specific personality traits. I will write about the position of a case manager and what roles and duties the job requires. I will discuss the viewpoints on ethical principles, professional responsibilities, how my viewpoints had changed after the online training, and the self-awareness I have gained that could prepare myself for a case management role. View Changes on Ethical Principles The ethical obligations of the privacy for consumers and his or her protection of their health information are to be upheld at all times. The ethical principles within health care organizations are based upon the accountability of professionalism. However, the protection differs from the type of organization for example, state programs require state laws to be accommodated and followed. The programs in which state covers is alcohol and drug abuse programs, Medicare, and other accreditation programs that are applicable to federal laws. Therefore, the ethical principles in my opinion are held high as the guidelines are to be followed by all organizations in order to function properly and to provide the proper care to the clients. Privacy is extremely important as no person would want his or her medical conditions and concerns placed into public hands. View Changes on Professional Responsibilities The workforce training required for upholding privacy and security of health information proved to me that it is seldom to be professional in this type of work field. The awareness or degree of the security and privacy for patient’s health information varies from how to use or share health information, parameters, job position influences, the leadership interpretation, and implementing costs. The professionalism of the HIPPA security and privacy requires the formal education and proper training to ensure that the person entering this type of workforce can have ongoing accountability for the security and privacy to protect health information. The standards for HIPPA’s security and privacy rules address specific training requirements so professionalism responsibility is an absolute after receiving proper training. The requirements for the high-level training are crucial because of the cost and ongoing requirements and responsibilities of the workers. The professional responsibilities of the job demands ongoing training in which the workers are constantly up-to-date with documentations and responsibilities required by each person. The viewpoints of professional responsibilities after completing the online assessment has changed based upon the amount of responsibility the workers must obtain. The responsibility to make sure no health information is leaked through the system (documents, computers, corrupt employees) is extremely important, therefore the information shared among people is to be protected. Although I believe that health care information is not an item in which thieves’ want to possess. Health care information is in my opinion pointless to steal, as people really should not care who has certain medical conditions wrong with them. The workers job to me seems like a security job with the use of a computer in regard to health records, I often picture a security guard standing in front of a medical filling room. Self-Awareness Becoming self-aware of the case management role prepares me to comprehend the responsibilities, duties, and importance of health care information. The case management role is an important role as the information obtained by the case worker is personal should be guarded or protected, and secured. I am aware of the responsibility the case managers has daily and what his or her job title requires. However, I do not have plans or goals to become a case manager or to have that type of role in a job. I like helping people, whereas, I do not like to sit still and stare at a computers or paper work as a career. In the end, I have obtained information in which case manager’s jobs require extreme security, privacy, and professionalism. The case management role is only for certain people who can handle that type of job. Becoming a case manager is not a random choice a person picks for a career. For me, it is nice to obtain information in regard to the role of a case manager and realized how important case manager’s jobs are and what his or her daily duties require.

Sunday, November 10, 2019

Snort

Snort system softwareBy:College:Course:Professor:Date:AbstractThere has been a battle of supremacy among tech giants for quite a long; one company is always trying to outsmart the other. Positively speaking we can say that this has led to many innovations that have come in handy to make the customers navigations easy (morris-2014). Looking at it from the customers' eye, selection of good software has been a daunting task as most of them are brilliant if not classic. Selection of an operating is quite easy technology gurus but the situation is different for customers that are drawn to a product just because of peer reference or it popularity. Most of them end up being disappointed with their acquired systems after they underperform or demand other requirements to function. It is this battle that has led to specialization of the products in the technology industry, a keen analysis will show that some operating systems perform brilliantly in one field but fail in another; one is good in programming but moderate in its internet speed and vice versa. This research should be an eye opener for the operating system customers; before they pack bucks to go shopping for an OS they should know the precise features that they want their OS to have and hence need to do detailed digging to avoid confusion and later frustrations. Well, the most common operating system is windows; banking on popularity, but Linux is also catching up. Mac is out of question in this research as it only operates on Apple devices and if one owns the device then he has no option but stick to Mac operating system. On that point, I will be focusing on windows and Linux software in a bid to prove my point clear. The comparisons between these two should clearly show that one is superior to the other; I back the Linux system. To add a mint of credibility I will be sourcing for information from trustworthy online sites and scholarly articles that speak in favor of Linux. This will do away with bias and give the reader relevant insights. In the result section I will be showing that, truly there are benefits of Linux over windows software. In the discussion part I will highlight the requirements to run Linux, its file system location, instructions to run it and give examples of companies that use Linux to prove my point. IntroductionLinux was developed in 1991 by Linus Torvalds. It is a free open source open source operating system that allows users customize their own source code additional to main source code of Linux. It can be used on any device, smartphone, gaming consoles, e-books and desktops, however, it is mainly used as a server because of its openness and easy functionality. A common distribution of linux is the kernel; this is the central operating system component and link between a software application and its data. Other distributions are; downloading tools, system utilities, programs. It also comes in handy when installing or uninstalling updates. The ability of Linux to allow easy data manipulation and have resizable folders, buttons, windows and icons has made a preferred OS over its competitors as web developers use it to train themselves. Its robustness, scalability and flexibility have also made it a base OS for giant companies (gagne-2014). Some of it outstanding benefits are; open source nature, this allows it users to see the codes and make modifications. Community support system, this enables the user to reach share his problems to the Linux community and solutions be offered without waiting for experts. Reliability, it runs smoothly with no delays and reboot commands. Free to use, the customers can access it freely and even run it without subscriptions. Privacy does not pop out additional tools or make commands for information collection. Best for programming, allows a variety of programming applications like c/c++, python, perl and java to run on the OS.Research MethodsI used internet articles and scholarly reviews to build on my case. I mainly focused on the ones that explained the advantages that Linux has and disadvantages of windows. I also read ones that said the advantages of windows over linux. I aggregated the results of one party one party over the other and also summed the disadvantages of one case over the latter. This is the method I used so as to not look biased. I sourced the installation instructions from Linux and Windows official sites so that to give detailed steps and prove which one was simple to install and run and which had additional requirements for the process to begin. Results I discovered that windows has 13 steps to installation of the main and will require an antivirus before you begin to run the operating system. Windows also has a variety of products that are only fit to certain types of devices depending on the year it was manufactured and the storage space on the device. Linux on the other hand has 11 steps that can be downed to 6 and does not need an antivirus installation before it starts running. This feature reduces cost. This proves that Linux is way cheaper and way easy to control than windows. DiscussionThe steps after installation are not essential if you only need the Linux OS to be doing simple tasks like typing and doing calculation (dubey-2016). There also minimal requirements needed to run Linux on your device, they are;2GHz dual core processor2GiB system memory25 GB hard drive space, that can hold a USB stick, memory card on external driveVGA that has 1024 by 768 screen resolutionDVD/ CD or USB port for installer mediaInternet access ( optional)The requirements to install it on your desired servers are also less compared to windows;Processor should be 300MHz by 86 or above RAM should be 256MiB or above Disk space of 1.5GB or aboveMonitor cable and graphic card of 640 by 480 CD driveSystem files or log files are located in the directory of the software; there are different log files for different applications on the system. The most common files are history files that contain installation and removal information. In the directory you can view it at apt then history.logOther file destinations in the directory are;Installer, log files created during installationKern.log, kernel information like errors and warningsAlternatives.log, set of history on alternatives set by different packagesXorg.org, details on graphic driver that includes it warnings and failuresApport.log, saves information about number of crashes the OS has experiencedInstructions to install your Linux software are simple;Download the OS from Ubuntu site, this ensures it is authenticBurn the OS on a CD, memory card or flash diskPartition the computer's hard driveInsert your installer to the specific portRestart your device and wait for Linux installation window to appearSelect the language on the BIOS and click installCheck both boxes for preparing to install Ubuntu and continueCheck erase disk and install Ubuntu, click install nowFollow th e prompts to set location and time and enter your user informationSelect log in information and restart the computerSelect Ubuntu and press enterConclusion War lines were drawn on the technology industry floor when there was emergence of software and the situation tensed further when modifications were being done on the systems. All fronts have diehards and sycophants to vehemently prove their sides stronger but we must all agree that there are specific tasks that on OS performs better than the other; it is on this truce that I have proved that Linux has a better understanding of its customer base and it is by far the best as it offers simpler and more efficient tools over its arch rival. It is sad that a company's supremacy is always measured by its net sales and popularity but the judges ignore its suitability and fail to account for the grumbles from the customers. Truth be said, it is this ratings that lead to misleading of more customers. Linux efficiency and supremacy can be proved by giant companies that run on it; facebook, Google, Amazon, McDonalds, twitter, IBM, DELL, NASA and even the American submarines (das-2014). This clientele proves the point that Linux has a high level of privacy, is fast, can be modified to feed specific needs, cannot easily crash, is inexpensive and holds a large amount of data. Thumb rule of any manufacturing company should be; allow customers get the value for their money but meeting their specific needs. What is the need of getting of acquiring an operating system that is not long lasting or one that will need regular updates for it to function? That is how I conclude that Linux is by far much better than Windows operating system.ReferencesLA Morris- 2014Multi-OS (operating system) boot via mobile deviceG Gagne- 2014Operating system conceptsSK Dubey- 2016Implementation of operating system selection using AHP- entropy modelD Das- 2014Performance measurement and management model of data generation and writing time.