Saturday, August 31, 2019

Ambassadors

Jenya Mavromati Panayiotis Karafotias IREL-480-9 For my paper I decided to write about the ambassadors of Denmark, The United States of America and Uruguay. His Excellency Mr. Tom Norring, the ambassador of Denmark, was one of the ambassador’s to come this semester. He decided to focus his speech not on his country but more on the global financial crisis and how it affected Greek economy. He said that even without the crisis the situation in Greece would have been messy. Despite the fact that Maastricht Treaty allows the GDP deficit in European countries not more than 3% Greece had deficit 6-7%.Ambassador said that in 2006-2007 the government of Kostas Karamanlis managed to restrain the deficit to the acceptable level, but later in 2008 they failed. Karamanlis hoped that he would be reelected and he promised to restrain the deficit, but people lost faith in him. Later George Papandreou revealed the new information about the deficit. The deficit for that time was not 8% but 12% . And thus the rescue program was established by the European Union. So Greece took course to the EU and the IMF. They wanted a hard cash and the EU and IMF tried to help with it. Then the restructuring fund was established.The public expenses had to be cut. As ambassador said â€Å"Greece has one of the biggest public administrations† and the cutting of public sector expenses will help to decrease the deficit. He also pointed out that 25% of Greek economy is black economy. The only one thing which he said about his country was that the Denmark is not the part of Eurozone. One of the reasons I enjoyed the speech of Danish ambassador was because he seemed very honest when talking about the topic. When giving his speech, he gave personal examples and continuously referred to the audience.The second ambassador was the ambassador of Uruguay, his Excellency Mr. Jose Luis Pombo Morales. He decided to focus his speech on his country and its relations with Greece and other European c ountries. Mr. Jose Luis Pombo Morales, talked about political system in Uruguay, that it is a  representative democratic  republic with a  presidential system. Also, he told us that, the members of government are elected for a five-year terms by a  universal suffrage  system. Uruguay is a  unitary state: justice, education, health, security, foreign policy, defence are all administered nationwide.The Executive Power is exercised by the  president  and a  cabinet  of 13 ministers. Plus to that, Mr. Ambassador talked about Uruguay as one of the biggest wool and meat exporter to the EU countries. Mr. Jose Luis Pombo, told the audience, that Uruguay is one of the most economically developed countries in South America, with a high  GDP  per capita and the 52nd highest  quality of life index  in the world. Uruguay is rated as the 2nd least corrupt country in  Latin America  (behind  Chile), although Uruguay scores considerably better than Chile on domesti c polls of corruption perception.Its political and labour conditions are the highest level of freedom on the continent. The third ambassador, I want to talk about, is the ambassador of the United States of America, his Excellency Mr. Daniel Smith. Ambassador focused his speech on Greek- Turkish relations and financial crisis. His speech was very diplomatic, and tried to keep neutrality, when some students asked him questions about problems in Libya and Greek-Turkish conflicts. But, Mr. Smith, gave very clear idea, about the USA and its foreign relations. Also

Friday, August 30, 2019

Mountains: Volcano and Mid-ocean Ridges

Volcanic mountains are mountains that form when molten rock erupts onto the earth's surface. They can either form on land or in the ocean. The Cascade Range in Washington, Oregon and northern California is composed of volcanic mountains. Some of the largest volcanic mountains are found along divergent boundaries, which form the mid-ocean ridges. The mid-ocean ridges have huge volcanic mountain chains that run through the Atlantic, Pacific and Indian Oceans. The mountains in the mid-ocean ridges can actually grow tall enough to create islands such as Iceland or the Azores. Other volcanic mountains can form over hot spots, which are pockets of magma beneath the crust that erupt onto earth's surface. The Hawaiian Islands are actually the tops of really high volcanic islands that have formed over a hot spot on the sea floor. The main Hawiian island is actually a volcano that is about 9 km above the ocean floor, with a base that is about 160 km wide. Almost 4 km of this island is above sea level. Folded mountains Folded mountains make up some of the highest mountains in the world. Folded mountains commonly form along boundaries, where 2 continents are colliding. They tend to look like an accordion. Some really complex folds can be found in parts of the Alps, Himalayas, Appalachians, and Russia's Ural Mountains. These long mountain chains also show extensive signs of folding. block mountains lock mountains are formed when parts of the earth's crust has been broken off into large block mountains are formed when two simultaneous blocks of land rise above or fall down leaving its middle part behind, when magma pushes up and forces top layers of rock (elastic) up with it. An example is the Flinders Ranges in South Australia. Domed mountains, although have broken (plasic) and move up as a ‘chunk'. A fault block mountain is a mountain or range formed as a horst when it was elevated between parallel normal faults. A horst is the ra ised fault block bounded by normal faults.

Strategic Planning – Ibm 2009

CASE ANALYSIS: IBM IN 2009 Analysis Industry: Computer Services Industry Porter’s 5 Forces 1) Risk of entry by potential competitors The risk of entry by potential competitors is relatively low (+). This is due to the newly entrant competitors that need a large market capitalization, software materials, services and consulting; to gain consumer’s interests. If consumers are able to choose buying their products from a large company that are adequate in the computer hardware, services and consulting, other technological services, they would rather choose a large firm than a smaller firm that do not have adequate resources. ) The intensity of rivalry among established companies within an industry The intensity of rivalry among established companies within this industry is relatively high (-). This is because there are big firms such as Oracle that are neck in neck with other large firms such as IBM, trying to acquire every software there is that helps them gain a competiti ve advantage. 3) The bargaining power of buyers The bargaining power of buyers is relatively low (+). This is because in this industry that is supplying a particular product or service is not composed of many small companies and the buyers are large and few in number. Also, buyers are unable to purchase in quantity, because many of the firms in this industry offer services and consulting, and software that buyers use. 4) The bargaining power of suppliers The bargaining power of suppliers is relatively high (-). This is because the product that suppliers sell has few substitutes, and the profitability of suppliers is not significantly affected by the purchases of companies in this industry. Also, switching costs are great as consumers will need to move from their original product to another supplier. 5) The closeness of Substitutes to an industry’s product The closeness of substitutes to an industry’s product is relatively low (+). There are hardly any substitutes as for many consumers, the importance of the market for technology products and a source of high-tech workers for serving these types of software when consumers need help. The less technological advanced products are unable to satisfy similar customer needs. Forces – Conclusion: This industry is a 3 star industry. What IBM should do is: * IBM should use their competitive advantage to surpass their competitors, and be the monopoly in the industry, instead of being in a competition neck-in neck with other leading competitors * Since the product that suppliers sells has few substitutes, and the bargaining power is extremely high, IBM should acquire the supplying companies, to reduce their cos ts some more, and for suppliers not to have the bargaining power that they have currently. Life Cycle: Growth stage * E. G. In this industry, it is growing because consumers are becoming more and more familiar with the now technology-advanced products when technology in the world is advancing rapidly. Also, most of the large firms usually have control over technological knowledge as a barrier to entry which diminishes most of the smaller firms, which lessens the chance of a new entrant. The Value Chain IT Provides low cost-traditional IT services or value-creating, customizing consultant solutions depend on it having the distinctive competencies to develop state-of-the-art software applications across business processes and industries * Recent advances have increased the power of business intelligence software to identify ongoing changes and forecasts many events after acquiring Cognos (software) * Another advancement was that the IT department came up with a new initiative to make it easier for geographically dispersed people to interact and collaborate without the time a nd expense of in-person meetings. They were using virtual technology which other people inside and between companies to exchange instant messages, chat verbally, share real-time presentations, and virtual meetings Hardware * The systems and technology group put its resources into developing new kinds of mainframes and servers that would appeal to a wider number of customer groups and expand global sales. This will give them more power and flexibility for the IT product they buy from IBM * Currently IBM sells its mainframes directly to customers through its own sales force to protect lucrative software and service revenues that accompany these sales. By doing that, IBM’s mainframe installed base had doubled because IBM’s ability to deliver increasing amounts of processing power to customers at a decreasing cost * Such as self-contained server would eliminate the need for expensive IT consulting and service; it would offer companies with a low-cost alternative and companies could simply order as many of Cisco’s (one of the acquired software) server racks as needed to operate or expand their business Competitive Advantage Distinctive Competencies: are firm specific strengths that allow a company to differentiate its products from those offered by rivals and/or achieve substantially lower costs than its rivals. IBM’s distinctive competencies is acquiring the different servers and software to help the company gain a competitive advantage as the company integrated many technological advanced products that surpasses other firms in the industry Intangible Resources: are nonphysical entities that are created by managers and other employees, such as brand names, the reputation of the company, the knowledge that employees have gained through experience, and the intellectual property of the company, including that protected through patents, copyrights, and trademarks. The intangible source here is the brand name and reputation that IBM had built all these years, leading to one of the top companies in the computer service business. Capabilities: refer to a company’s skills at coordinating its reso urces and putting them to productive use. * IBM’s skills at coordinating its resources and putting them to good and productive use by the drive to focus the efforts of all IBM employees on satisfying the needs of clients was one of the capabilities that made IBM have this competitive advantage Functional-Level Strategies EFFICIENCY * The simplest measure of efficiency is the quantity of inputs that it takes to produce a given output; the more efficient a company is, the fewer the inputs required to produce a given output and the lower its cost structure will be. * E. G. In 2007, IBM spent $11. 8 billion to acquire 36 software and 18 service companies in the fields such as security, data management, and Web commerce * QUALITY * The CEO’s strategy was to focus on high-profit margin products that directly complemented its service and software offerings. IBM had sold off its PC business to Lenovo; its disk drive business to Hitachi, and its printer business to Ricoh. By doing this, IBM is able to focus on high-profit margin products and ditch the failing products in the company that are sold off to other companies * INNOVATION * By keeping up with the technology advancements, IBM had announced a new â€Å"virtual world† IT initiative to make it easier for geographical dispersed people to interact and collaborate without the time and expense of in-person meetings. These virtual worlds are interactive, immersive Web sites based on the use of three-dimensional graphics. This allows people to exchange instant messages, chat verbally, share real-time presentations and ideas in private, virtual meeting spaces that exist permanently in real time so people can meet on regular, periodic, or impromptu bases. * CUSTOMER RESPONSIVENESS * At this stage, the sales of its new mainframes of IBM were up by 25%; software revenue rose 5%, helped by increasing sales of its popular WebSphere software package that improves the performance of a company’s electronic commerce and business applications Building Competitive Advantage Through Business-Level Strategy Competitive Positioning High Market Segmentation * What IBM is doing is high market segmentation where they could choose to recognize the differences between customer groups and make a product targeted toward most or all of the different market segments. The customer responsiveness and high and products are being customized to meet the needs of customers in each group. * E. G. IBM had shifted its products to higher profit-margin services and automating traditional business processes such as procurement, finance and human resources which was leading to increasing numbers of long-term service contracts between large firms. Differentiators * Clearly, IBM is a differentiator. This is due to how IBM was able to acquire different software from companies which then was able to offer clients high profit-margin software application to satisfy their needs. IBM was able to differentiate their products from the leading competitors and satisfy consumers that the other competitors clearly could not Business-Level Strategy and the Industry Environment Main strategies that companies can adopt to deal with decline: * Leadership strategy The speed of decline and the intensity of competition in the declining industry are moderate. Through aggressive acquisitions, IBM was able to acquire much software to create high profit-margin products to satisfy customer needs and to also provide clients with their best service and consulting. The open standards approach that Gerstner’s approach was that as IBM’s consultants went from client to client assessing their needs; they were able to provide detailed feedback to IBM’s other divisions about whether their products were adequately meeting clients’ needs. Gerstner’s strong focus on being close to clients had the additional advantage of spurring innovation throughout the organization. Chaining * They establish networks of linked merchandising outlets that are interconnected by IT and function as one large company. The enormous buying power these companies possess through their chain of nationwide stores allows them to negotiate large price reductions with suppliers that promote their competitive advantage * With IBM, the company is able to link with other software companies and IT back up servers that could connect as one large company. By doing so, it allows IBM to create a competitive advantage in regards to price reduction from suppliers. Strategy & Technology Technological Paradigm Shifts * This occurs when new technologies come along that revolutionize the structure of the industry, dramatically alter the nature of competition, and require companies to adopt new strategies to survive. * E. G. When technology has been advancing, IBM innovated a new product that made geographical dispersed people to interact and collaborate without the time and expense of in-person meetings called the new â€Å"virtual world† from the IT department. Also, IBM had put its resources to good use by developing new kinds of mainframes and servers that would appeal to a wider number of customers groups and expand global sales. Proprietary standard * Establishing a proprietary standard as the industry standard may require the company to win a format war against a competing and incompatible standard. Strategies for doing this include producing complementary products, leveraging killer applications, using aggressive pricing and marketing, licensing the technology, and cooperating with competitors * E. G. IBM could produce complementary products, leverage killer software that they have been acquiring and perfecting it, also using aggressive pricing and marketing to let gain new consumers. Strategy in the Global Market By serving as a global market, a company can potentially utilize its production facilities more intensively, which leads to higher productivity, lower costs and greater profitability. Global sales also increase the size of the enterprise, so its bargaining power with suppliers increase, which may allow it to bargain down the cost of key inputs and boost more profitability. IBM made the investment to establish huge, low-cost service delivery centers for its global clients by improving the software necessary to automate the management of networks and data centers, and develop IT to improve telecommunications, especially Internet services. From India, IBM runs a whole range of IT services for its global customers. In Bangalore, IBM has a command center that monitors the ope ration of the database server networks of more than 16,000 clients. Through this, IBM was forced to eliminate 20,000 jobs in Europe and the US, and move these jobs to India as the cost of labour in India is significantly low. Corporate Level Strategy Vertical Integration * This could enable IBM to achieve a competitive advantage by helping build barriers to entry, facilitating investments in specialized assets, protecting product quality, and helping to improve scheduling between adjacent stages in the value chain * One of the disadvantages is that it increases bureaucratic costs if IBM’s supplier becomes lazy or inefficient, and it reduces flexibility when technology is changing fast or demand is uncertain Strategy Outsourcing By strategic outsourcing of value creation activities, it may allow a company to lower its costs, better differentiate its products, and make better use of scarce resources, while also enabling it to respond rapidly to changing market conditions * One of the disadvantages is that if IBM outsources important value creation activities or becomes too dependent on the key suppliers of those activities * IBM has invested in India to take advantage of its growing importance as a m arket for technology products and a source of high-technology workers. IBM made the investment to establish huge, low-cost service delivery centers for its global clients, improve the software necessary to automate the management of networks and data centers, and develop IT to improve telecommunications. IBM runs a whole range of IT services for its global customers, including software delivery services such as upgrading and maintaining client software and managing and protecting database centers in India. Also in Bangalore, IBM has a command center that monitors the operation of the database server networks. The largest of IBM’s three global IT service centers are in India, Brazil, and China. IBM’s scope was to expand traditional outsourcing operations and attract more and more global clients to compensate for reduced profit margins so it can still increase profits from this group. Related and Unrelated Diversification Acquisitions * Acquisitions are used to pursue vertical integration or diversification when a company lacks the distinctive competencies necessary to compete in the industry. Acquisitions are often perceived as being less risky than internal new ventures because they involve less commercial uncertainty. * IBM has done many acquisitions, such as Lotus, CenterPoint Energy, Phillippines PSBank, PTT Chemical Public Company of Thailand, Skynet in Lithuania, Cognos etc. which helps IBM increase its expertise in specialized IT services to strengthen its competitive advantage Corporate Performance, Governance, and Business Ethics ROIC 1) Participate in growing market 2) Take market share from competitors ) Consolidate industry through horizontal integration 4) International expansion, vertical integration or diversification * E. G. For IBM, pursing strategies to maximize profitability and profit growth helps a company to better satisfy the demands that several stakeholder groups place on it, not the other way around. Also, by maximizing returns to stockholders, IBM could boost its profitability and profit growth rate to be consistent in satisfying the claims of s everal other key stakeholder groups. Ethics * Despite the argument that maximizing long-run profitability and profit growth is the best way to satisfy the claims of several key stakeholder groups, a company must do so within the limits set by the law and in a manner consistent with societal expectations * It is incumbent on managers at IBM to make sure that the company is in compliance with these laws when pursuing strategies. Unfortunately, there is plenty of evidence that managers can be tempted to cross the line between the legal and illegal in their pursuit of greater profitability and profit growth. IBM could hold many various seminars on the topic of ethics and to try and implement ethical protocols when dealing with an issue that arises. Implementing Strategy in Companies that Compete in a Single Industry Strategic Reward Systems * Organizations strive to control employees’ behavior by linking reward systems to their control systems. Based on a IBM’s strategy (cost leadership or differentiation), strategic manager must decide which behaviors to reward. Selecting, Developing an Action/Implementation Plan * Disadvantage of acquisitions * Many acquisitions fail to increase the profitability of the acquiring company and may result in losses. Acquisition may fail to raise the performance of the acquiring companies suggesting that acquisitions usually destroy rather than create value. As IBM is acquiring many types of software to enhance its competitive advantage, but it may fail to raise the performance of the acquiring companies for four reasons * Companies frequently experience management problems when they attempt to integrate a different company’s organizational structure and culture into their own * Companies often overestimate the potential economic benefits from an acquisition * Acquisitions tend to be so expensive that they do not increase future profitability * Companies are often negligent in s creening their acquisition targets and fail to recognize important problems with their business models * IBM should be firm on their management organization structure to refrain any management problems with IBM makes an acquisition * IBM should weight out all the pros and cons to distinguish whether the acquisition is beneficial to the company or not. Also, when doing the acquisition, IBM should think of all the important problems that align with their current business model * Outsourcing * IBM will fail when their profitability is now substantially lower than the average profitability of its competitors; it has lost the ability to attract and generate resources, so its profit margins and invested capitals are shrinking rapidly. IBM will have to acquire many new software to keep their competitive advantage * IBM should incorporate quality control in those countries that they have outsourced their services and consulting to continue to attract and generate resources and have profit margins still high

Thursday, August 29, 2019

The Management of Global Trade Distribution Coursework

The Management of Global Trade Distribution - Coursework Example However, if a business organization is not careful, competition might lead it into bad debts. This is because a company might sell its products to new customers, who might not be able to pay for the commodities thus leading to bad debts. However, this can be avoided by doing a customer value analysis and payment history analysis, Peppers and Rodgers, (2010). Customer value analysis is comparing what a customer is willing and able to part with in monetary terms and what satisfaction the customer gets from the good or service provided. Payment history analysis is reviewing past payment details of the company in question. A payment analysis allows the company to go through a customer’s financial statements in order to determine if the customer in question will pay for the goods provided in time hence avoiding the occurrence of bad debts. For example, if a customer’s financial records indicate that they owe other suppliers money then the company should only do with that cus tomer on cash before delivery basis. If a customer’s financial statements indicate that the customer is not indebted to other suppliers and pays for goods in time then the company can supply goods to such customers on cash on delivery basis or cash after delivery. Question four When transporting goods and services various factors are considered when choosing the mode and means of transport. This in turn affects the charges incurred when transporting goods and services. According to Barnes, (2009), the type of goods being transported greatly affects the cost of transportation. For example, toxic materials require specialized containers when transporting them. Acquisition of these special containers might be expensive hence charges for transporting toxic material are high. Another factor that is considered when determining freight charges is the destination distance. Choice of mode and means of transport is also greatly affected by distance. If goods are being transported over long distances, then the cost of transportation will be high thus resulting in high freight charges.at the same time if the distance is short cheaper means of transport such as road is used hence resulting in lower freight charges. The time within which goods are to be transported also affects the cost of transportation. For example, if perishable goods such as fruits and flowers are being transported; a very fast means of transport is required. For such goods air transport is necessary which is very costly thus resulting in high freight charges. Another factor that determines the freight charges is the general nature of the goods being transported. The nature of goods determines how the goods are to be packed. For example some goods are bulky in nature hence take up a lot of space. Transportation of such goods is more expensive since the more space goods take the more they are charged. Question five Exportation of goods is not an easy task. It is a long process depending on laws pu t in place in both the country of origin and the country of destination. However, if the correct process is followed it can exportation can be simple and very effective. There are certain procedures set, to be followed when exporting anything. First of all one the exportation should prepare for the exportation of the commodity in question. One should make sure that they are conversant with the environments involved in international trade and the obstacles

Wednesday, August 28, 2019

Donald Greenbergs achievement in the field of computer graphics(Term Essay - 1

Donald Greenbergs achievement in the field of computer graphics(Term paper ) - Essay Example The term Computer Graphics has numerous values like: Today computers and computer-generated images stroke many features of our every day life. Computer images are found on television, in newspapers, in weather reports, and during surgical dealings. A well-constructed graph can present multifarious information in a form that is easier to understand and understand. Such graphs are used to illustrate papers, reports, theses, and other presentation material. A range of tools and conveniences are available to facilitate users to visualize their data, and computer graphics are used in many disciplines. (Hill, 2001) As an educational discipline, computer graphics studies the manipulation of visual and geometric information using computational techniques. It focuses on the mathematical and computational foundations of image generation and processing rather than purely aesthetic issues. Computer graphics is often differentiated from the field of visualization, even though the two fields have many similarities. (Xiang ,Plastock, 2000) Charles Csuri is well known for pioneering the field of computer graphics, computer animation and digital fine art, creating the first computer art in 1964. Csuri has been acknowledged as the father of digital art and computer animation by Smithsonian, and as a leading pioneer of computer animation by the Museum of Modern Art (MoMA) and The Association for Computing Machinery Special Interest Group Graphics (ACM-SIGGRAPH). (Lewis, Luciana, 2004) Donald P. Greenberg is an internationally recognized pioneer in computer graphics. Greenberg has written hundreds of piece of writings and served as an educator and adviser to many prominent computer graphic artists and animators. Five previous students have won Academy Awards for Scientific or Technical Achievements, five have won the SIGGRAPH Achievement Award, and many now work for Pixar Animation Studios. In 1991, Greenberg was the

Tuesday, August 27, 2019

Homo Religiosus by Karen Armstrong, p. 22-38 Essay

Homo Religiosus by Karen Armstrong, p. 22-38 - Essay Example It is essential to acknowledge that loss of self is desirable according to Armstrong’s arguments hence influencing homo religiosus. Firstly, Armstrong argues that loss of self is desirable since it enabled ancient societies to believe and worship idols in shrines hence they are aware that this is against God’s will. The ancient society believed that these labyrinths served as sacred places where they could perform all sorts of rituals. According to some historians’ arguments, the purpose of these labyrinths was generally pragmatic (Armstrong 22). Despite how deed these labyrinths were, the loss of self enabled them to enter although, it took lots of ours to reach the innermost core. However, loss of self seems desirable since these innermost cores were very dangerous, uneconomical, exhausting, and time-consuming. The consensus with the ancient communities was that these sacred caves served as sanctuaries, and similar to all temples, the caves’ iconography portrayed a vision, which was extremely different from the vision of the outside world (Armstrong 23). This showed how loss of self was de sirable. Although the ancient practices were extremely painful, difficult, and even traumatic, their loss of self seemed desirable as this enabled them to involve and practice some difficult rituals such as that of hunters. Animal sacrifice, for instance, which served as the central rite with all religious societies in antiquity, portrayed prehistoric hunting celebration and they continued to give honor to a beast that surrendered its life for humankind sake (Armstrong 24). The main aims of practicing these rituals were to bring to mind an anxiety in a way that ancient society must confront and take control of it. From the beginning, this shows that homo religiosus life was centered in the tragic facts that life focus upon destruction of these creatures. Some of the

Monday, August 26, 2019

Compare and Contrast HIPPA and PSQLA federal laws Research Paper

Compare and Contrast HIPPA and PSQLA federal laws - Research Paper Example To support discussions and reporting of dangerous conditions and adverse events, the act also advocates for confidentiality shielding for Patient Safety Work (HHS, 2012). Similarities between HIPAA and PSQIA Federal Laws Some of the similarities between these two laws are that, firstly, they deal with matters regarding the health care field. Looking deeper into the two acts, they also advocate for patient privacy and safety. The effective compliance date of the Privacy Act of the two laws was 14th April, 2003 and 16th May, 2006, for HIPAA and PSQIA laws respectively (Hiltzik, 2012). Both HIPAA and PSQIA Privacy Rule regulates the disclosure and use of Protected Health Information held by health care clearinghouses, health insurers, employer sponsored health plans and medical service providers, who engage in various transactions. PHI refers to any information held by covered entities that concern the provision of health care, health care status and payment for health care, which can b e associated to an individual (HHS, 2012). According to the two health acts, PHI comprises of any element of a person’s health record and payment history. The laws, therefore, urge cover entities to disclose PHI to the person being protected within a month or 30 days upon request (Hiltzik, 2012). The two laws urge PHI to facilitate payment, treatment or health care operations even when lacking a patient’s express written authorization (Clancy, 2008). Also, according to the two laws, any disclosure of Protected Health Information (PHI) needs the covered entity to acquire written authorization from the individual for the disclosure. Nevertheless, in case a covered entity reveals Protected Health Information, it should make a logical effort to just the minimum vital information needed to achieve its purpose (HHS, 2012). The Privacy Rule, with regards to the two acts, offers people the right to request that a covered entity to correct any incorrect information. The rule al so, according to the two principles, urges covered entities to incorporate reasonable steps in ensuring that confidentiality of their individuals is met with regards to communications (Hiltzik, 2012). For instance, a person can ask to be called from his or her home or cell phones instead of the work number. It is the duty of the covered entity to grant this to the individual. Differences between HIPAA and PSQIA Federal Laws Some of the main differences that could be draw out of the two laws are with regards to their security regulations. The HIPAA Federal Law incorporates administrative, physical and technical safeguards to ensure that their individuals are protected (Clancy, 2008). The PSQIA, on the other hand, incorporates a Patient Safety Organization (PSO), which certifies that the list of requirements, according to the Agency of Healthcare Research and Quality, are met. Patient Safety, with regards to PSQIA Federal Law, includes any reports, data, records, analyses, memoranda o r written statements, which can improve patient health care quality, safety and health care outcomes. However, in the HIPAA Federal Law, the security rule compliments the privacy rule such that it incorporates the three types of security safeguards, administrative, physical and technical safeguards (HHS, 2012). Administrative safeguards refer to the procedure and policies created to show how the

Sunday, August 25, 2019

Role of Organizations in the Profession of Nursing Research Paper

Role of Organizations in the Profession of Nursing - Research Paper Example American Association of Critical Care Nurses is the world’s largest specialty nursing organization, which represents the interests of more than 500,000 nurses who vehemently work toward the objective of providing care for acutely ill patients. The essence of the AACN mission statement is that â€Å"AACN drives excellence because nothing less is acceptable†. At the same time, its vision statement reflects that â€Å"AACN is dedicated to creating a healthcare system driven by the needs of patients and families where acute and critical care nurses make their optimal contribution† (Ebright , 2010). I choose the AACN for this assignment because the organization exemplarily operates its critical care and it has won many awards for its excellence including The DAISY Award for Extraordinary Nurses. Membership requirementsThe AACN offers six various membership options including active membership, affiliate membership, student membership, emeritus membership, international digital membership, and retired or disabled membership. The membership requirements are different for different options. The annual subscription rate also varies in accordance with the type of membership option chosen. History and demographicsThe AACN was established in 1969 and the first intensive care units (ICUs) were introduced in 1950s with intent to provide improved care to critically ill patients. The improved technological applications have assisted the AACN to place itself on the world’s top position.’s top position. Presently the organization has the power of over 80,000 members. The AACN members include 89% male and 11%female. Similarly, Caucasians constitute 78% of the AACN members. The current trend shows that the member strength of the organization increases day by day. Priority agenda items The AACN website says that â€Å"our patients, our nurses, our units† are the main priorities of organization. The scope of the AACN is to provide quality hea lthcare to its members by establishing a sustainable and healthy worksite environment. The AACN encourages effective leadership so as to promote worksite environments, which are â€Å"respectful, healing, and humane† (American Association of Critical- Care Nurses, 2011). The AACN works with other organizations to vie with common nursing care issues and establish a professional nursing practice. The modern trends indicate that the organization gives great emphasis on ambulatory care centers by employing more nurses in this sector. The increased vacancy rate of AACN indicates that the organization will suffer troublesome nurse shortage issues in the coming years unless it recruits adequate nursing staff immediately. Hence, the AACN has recently implemented a variety of programs for meeting its nurse staffing requirements. The main focus of the organizations is to meet the needs of its members whose family includes individuals who are acutely and critically ill. In addition, the AACN specifically emphasizes and advances nursing education through technology as the organization greatly promotes patient safety and improved care. Likewise, the organisation offers extensive payment concessions to its existing members, who completed a specific membership period,

Saturday, August 24, 2019

The Determinants of FDI in Nigeria and its Effects on the Growth of Research Proposal

The Determinants of FDI in Nigeria and its Effects on the Growth of SMEs - Research Proposal Example In this particular area, there are two approaches that are commonly applied namely the macro approach and the micro approach. Macro approach encompasses empirical examination of effects of FDI on the general economic growth in areas related to the creation of employment, business and industry as well as international relationships (Ip, 2010, p.90). On the other hand, the microeconomic approach focuses on the impacts of FDI on the grass root economy in various sectors like skills development, employment generation specifically the establishment of small businesses being highly emphasized on. Foreign direct investment refers to the direct investments made to businesses or production process in a given country by companies or individuals from other countries. This exercise is achieved by either buying the targeted business entity or by expanding corporates operations. In Rivers State Nigeria, FDI involves the movement of both financial and human resources (capital) from abroad. Some of these resources are owned by individuals, governments while others are owned by leading multinational corporates (Great Britain, 2009, p.102). There exists the number of factors that make Rivers State a favorable destination for many investors. Therefore, it is essential to have a brief understanding of the state that has become a target of many foreign investors. Rivers State is among the 36 states that Nigeria made up of (Mitee, 2010, p.85). The state contributes a lot to the Nigerian economy because of the presence of oil-rich fields, the presence of refineries and seaports among other various industries that spread out across the state. As a result, the state has become one of the most targeted areas by foreign investors who in this case comprises of both leading multinational corporations as well as individuals who travel to the state to seek employment.  

Friday, August 23, 2019

A Comparasion of Rack Supprted Warehouse vs. Conventional Steel Frame Research Paper - 1

A Comparasion of Rack Supprted Warehouse vs. Conventional Steel Frame Buildings - Research Paper Example The easy analyzes or compares two structural styles, that is rack supported warehouse and conventional buildings. In conventional building or steel frame design, the building utilizes the skeleton frame of the horizontal trusses or beams and vertical column of steel (Fischer, 2009, p.78). Usually the building is constructed in the rectangular grid so that it supports the walls and roof, which is well attached to the frame. Then the building is later equipped with freestanding or agonistic racks for the material storage. The building is comprised of total storage rack system; the rack system are the basic structural support for both roof and walls of the building, sometimes the roof and the walls of the building are referred as skin (Goetsch, 2004, p.34). The building design for steel frame can be classified into two different designs; the first design is called hot rolled steel industrial building design and the other is cold form steel building design. The conventional steel frame designs are expensive to construct, therefore, it not to be economical (Goodno, 2010, p.12). Rack supported wareho use are found to be economical due to their simple design and structure. The structure offer highest height, which increases its storage capacity (Hiatt, 2002, p.34). For conventional steel buildings, it is someway not quick and efficient in construction. The main reason for it not to be quick, the building are designed from the beginning or are designed from scratch as it is the consultant who designs with fewer designing aid available for an engineer (Koontz, 2012,p.12). In adition conventional steel building, the main steel are chosen from typical hot rolled â€Å"I† parts that are in numerous segments of the constituents which are heavier than what is usually required for a design (Yudelson, 2006, p.13). These constituents

Thursday, August 22, 2019

Academic Honesty, Who is responsible the student the teachers or the Essay

Academic Honesty, Who is responsible the student the teachers or the admission - Essay Example    According to McCabe, in his essay â€Å"it takes a village,† he considered the problem in African tribal way that it is the responsibility of the society or village to raise a child. Therefore, he argued that it should be the responsibility of the whole campus community including the administrators, the students, and the faculty to shape and effectively educate a student by employing simple strategies to reduce cheating, â€Å"†¦I would argue†¦it takes the whole campus community†¦.to reduce cheating.†. The main issue that he addresses is to enable the institutions, to find innovative ways of using academic integrity as a constructive way of developing more responsible students and citizens. McCabe further argued that in order to enable the students develop honesty and positive behaviour towards education, the entire body of the students, administration and faculty ought to work together to achieve the goal set. â€Å"†¦the village, communityâ⠂¬ ¦actively works together to achieve this goal†¦Ã¢â‚¬  In order to work actively, each body plays an important role in ensuring that the students are well developed in academic matters and reduce cheating actions among them (Choong, and Bob 98). As for teachers, they are expected to teach students moral values and share their responsibility with the students especially during consultations. Students are expected to discover their talents and ability in academic matters. Teachers are therefore helpful in improving the climate of academic honesty in their institutions. Similarly, the administration also plays a role in ensuring that academic integrity has improved in the community. The administration looks out at the roles of both teachers and students in enabling academic honesty in the community and they punish the students involved in dishonesty or cheating. Additionally, students also play a role of their own. For instance, students are expected to

Impact of Current Information Technology on Our Lives Essay Example for Free

Impact of Current Information Technology on Our Lives Essay ACKNOWLEDGEMENT My deepest gratitude to my Ate Kristine and my parents who support and encourage me to pursue my chosen path, to concentrate to my studies, for all their kind and inspiring comments. My special thanks go to my grandma, who have given me great moral support in my studies and to our Almighty God, who have given me spiritual support to complete this term paper. I. INTRODUCTION Information technology (IT) ins probably one of the most significant developments in human history since the printing press. It has given rise to one of the most fascinating communications devices ever created, the Internet. It has come into our homes, our schools and our offices, tying us together in unprecedented ways. It is one of the most important developments in recent memory. Information technology (IT) is the acquisition, processing, storage and dissemination of vocal, pictorial, textual and numerical information by a microelectronics-based combination of computing and telecommunications. The term in its modern sense first appeared in a 1958 article published in the Harvard Business Review, in which authors Leavitt and Whisler commented that the new technology does not yet have a single established name. We shall call it information technology (IT).. Some of the modern and emerging  fields of Information technology are next generation web technologies, bioinformatics, cloud computing, global information systems, large scale knowledge bases, etc. A. GENERAL INFORMATION IT is the area of managing technology and spans wide variety of areas that include computer software, information systems, computer hardware, programming languages but are not limited to things such as processes, , and data constructs. In short, anything that renders data, information or perceived knowledge in any visual format whatsoever, via any multimedia distribution mechanism, is considered part of the IT domain. IT provides businesses with four sets of core services to help execute the business strategy: business process automation, providing information, connecting with customers, and productivity tools. IT professionals perform a variety of functions (IT Disciplines/Competencies) that ranges from installing applications to designing complex computer networks and information databases. A few of the duties that IT professionals perform may include data management, networking, engineering computer hardware, database and software design, as well as management and administration of entire systems. Information technology is starting to spread further than the conventional personal computer and network technologies, and more into integrations of other technologies such as the use of cell phones, televisions, automobiles, and more, which is increasing the demand for such jobs. In the recent past, the Accreditation Board for Engineering and Technology and the Association for Computing Machinery have collaborated to form accreditation and curriculum standards for degrees in Information Technology as a distinct field of study as compared to Computer Science and Information Systems today. SIGITE (Special Interest Group for IT Education) is the ACM working group for defining these standards. The Worldwide IT services revenue totaled $763 billion in 2009. B. TECHNOLOGICAL CAPACITY AND GROWTH Hilbert and Lopez identify the exponential pace of technological change (a kind of Moores law): machines’ application-specific capacity to compute information per capita has roughly doubled every 14 months between 1986-2007; the per capita capacity of the world’s general-purpose computers has doubled every 18 months during the same two decades; the global  telecommunication capacity per capita doubled every 34 months; the world’s storage capacity per capita required roughly 40 months to double (every 3 years); and per capita broadcast information has doubled roughly every 12.3 years II. TRENDS IN INFORMATION TECHNOLOGY The wide range of information, data, and knowledge for problem solving and decision making are dealt with Information Technology. Before starting with the projects, students should be aware of authentication, and integrity features in their projects. Breaking of passwords and hacking can be avoided using these techniques. Anyhow, the various trends for projects are based on the emerging software technology. A. LATEST TRENDS a. Flash technology To add multiple types of external data to the given text, images, video, XML and to interact with web pages, Adobe Flash is used. It provides multimedia platform. The main purpose of this technology is to be used in advertisements and games. Both audio and video streams are supported by flash. One of the Object-oriented languages called ActionScript is the language used here by the developers. Flash player includes ActionScript Virtual Machine (AVM). The compiler, Just-In-Time (JIT), is used for MP3-based audio and bitmap graphics. Flash CS5 is the latest version of Adobe flash which was released on April 12, 2010. b. Microsoft Silverlight Microsoft Silverlight is developed on web framework and is similar to the functions of those in Adobe Flash. In addition, it also integrates multimedia graphics and interaction with a single runtime environment. Common Language Infrastructure (CLI) and its development tools are supported by Silverlight. The processor x86 with streaming SIMD Extensions (SSE) is  used by Silverlight. Also the other processors which support Silverlight include the Intel Pentium III and AMD Athlon XP. Any of the .Net Programming language is supported for Silverlight applications. The developing tools for the application can be used along with the .Net language but should be aware that they can target only the Silverlight core CLR for hosting the applications and not that of the .Net Framework CLR since both differs in their own functionalities. 4GDR1 (4.0.50524.0) is the latest version of Silverlight and was released on 03 June 2010. c. Open Source software Open source software is newly emerging trend which is one of the best options for the students. The source code can be modified by the students as per the objective of project. Hence Open source is much flexible than closed version software. Open source software is mainly developed on peer to peer production by collaboration of end product, source material. Open source software can be enhanced by anyone and if you join some open source developers community, you can learn a lot of things directly from the most knowledged persons in the developers community. Even the top companies like Google who are paymasters gives lots of importance to candidates who have worked in open source projects during the interviews. d. Cryptography Cryptography is the practice and study of hiding information. It also refers to confidentiality. It is often seen as a â€Å"black art†, which means something others don’t understand but you need to understand. Cryptography is one of the essential aspects for secure communication. There are many aspects of security and applications ranging from secure commerce to private communication and to protect passwords. Cryptography is necessary for secure communication but it is not sufficient by itself. Here, the text is encrypted first; i.e. the plain text is changed to inarticulate garbage. The end user does the reverse process i.e. decryption, where the original text  is retrieved. There are a lot of algorithms in this area which is used in real time for data protection in sectors like banks, Research, Password Protection and so on. e. Nanotechnology Nanotechnology is the study of controlling properties of an atom and molecules. As the name indicates, it deals with the study of structures sized between 1 and 100 nanometer. It is said that, nanotechnology has a tendency to create new materials and devices which can be used in future in a wide range of fields such as medicine, energy production, electronics and bio materials. As they are very small in size, nano structures have a tendency to change its state for transformation of energy. The two main approaches used in nanotechnology are Bottom-up and Top-down. In bottom-up approach, materials and devices are built from molecular, a component which later assemble themselves chemically and follows the principles of molecular recognition. In top-down approach, nano-objects are constructed from larger entities without any atomic level control. Biotechnology is the best example to show the use of nanotechnology in various fields. The upcoming trends mainly focus on security and hacking. Mobile application for iPhone and Android are great areas to explore with good revenue opportunities as well. If you want to stand out from others, instead of going for some courses, try to contribute for an open source project. B. BUSINESS TRENDS Just a few decades ago, businesses had little in the way of office machinery except typewriters. Fax machines were new; only Xerox made copiers, and the computer was a monster that took up an entire room. These behemoths were housed almost exclusively on college campuses or in government laboratories. With the development of the personal computer, the situation changed; it was so quick it sometimes seems like it was overnight. At first, businesses were happy to use computers because their word processing programs made typing projects much easier. But using a computer like a high-powered typewriter  defeats the purpose of having the machine in the first place. Companies soon discovered that their PCs could do a great deal more. Companies began to network offices together so that they could share files and work on the same projects from distant locations. They connected to the Internet and put out advertisements to draw new customers. And perhaps one of the most significant business developments to come with IT is the creation of the electronic marketplace. Companies that sell their products over the Internet greatly increase the number of potential consumers who see their offerings. Even if the company is not actively selling goods, a website is a tremendously helpful tool. A well-designed, easy to navigate site can stimulate interest so that a potential customer calls or writes for further information. Other business applications of IT include â€Å"data mining,† â€Å"knowledge management,† and â€Å"modeling and simulation.† (Kalil, PG). This last is particularly interesting, as it allows companies to build prototypes in the computer. These prototypes perform exactly the same way a three-dimensional model would, and yet are far less expensive than building the â€Å"real thing.† This way, if the prototype doesn’t work, there isn’t the strain on the company’s resources there would be if a real model (car, plane, truck, train) had been built. If it does work, it can be put into production quickly. C. FUTURE INFORMATION TECHNOLOGY TRENDS There’s no denying that we are in a worldwide downturn. Government are in debt; jobs are being cut; houses are being repossessed and people because it. However, there is a way to plan for the declining eminent and that is through IT guidance. If you are like most people, the last thing on your opinion is paying for tuition, especially in a specialty as baffling as information technology. However, IT education may be your label out of the slump and into a fulfilling and stable career. For most of us, our prospect is not set in pelt, especially with the downturn. There is no concrete way of aware that you will forever be in the site, or even with the visitors you are with now. However, IT guidance can organize for a potential in information technology at any sector. The  diligence needs IT technicians whether you work in television, marketing, communication, client check, etc. IT technology can open doors to more than just your own effective Future Information Technology Trends environment. You can take these skills and concern them to other sectors and industries as well. This will make the leap to another career in the upcoming much fewer overwhelming, if that time ever comes. Technology and Telecommunication: While many people are trailing their jobs in marketing, buyer ceremony, factual estate and construction, more and more people are verdict their mission via telecommunication. This is because, while the nation is gradually lessening, the â€Å"nation† is blossoming. Websites are in stable penury to IT help including webmasters, graphic designers and programmers. This Future Information Technology Trends trend will prolong as the internet is one of the best customs to join to the world and will only maintain to grow in the future. Technological trends in the future: According to the Bureau of Labour Statistics, the technology world will maintain to upsurge with jobs in IT increasing by 16% in the next ten existence. This is sooner than most other industries in the United States due to the many technological advances within many industries. IT Training for all Industries: even if you never want to dine in a career as an IT technician, information technology exercise can help prepare you for advancement in your own sector. Information technology exists everywhere and this is why it’s important to advantage the skills desirable to understand the information technological phase of your sector. IT is Universal: Another important touch of information technology is that, while some systems modify from troupe to troupe, and from country to country, they are all relatively the same. This means that, if you desire to do so, you can move and convey with career guidance in IT. Spend a year in Japan since the sights and running in IT on the section, or take your skills to Australia when the frost months get too cold. The possibilities Future Information Technology Trends for those with information technology training not only transport from trade to industry, but they also outdo continental boundaries as well. D. EMERGING INFORMATION TECHNOLOGY TRENDS Traditionally, hotels were mostly dependant on cards and paperwork at the front desk to keep in meet with old and current customers. They were chiefly at the mercy of the wishes of vacationers to succeed, and on their own pains and force to be inclined for budding surges or long droughts of tenancy. Luckily, such inconvenience and old-fashioned methods are long since ancient, gratitude to advances in information technology. The first question in which information technology became important regarded billing. Old-fashioned paper-based book-keeping time-consuming and inefficient, and was not able briefly to tell a lodge holder what the avow of their lodge was. Luckily, advances in modern proof keeping tolerate for a lodge holder to keep pathway of what they have on hand, how much of it they have, and how much it outlay. Accounting is complicated, but future software, especially that tailored to the sole needs of the hospitality activity, helps to permit lodge owners to make smart decisions. Services and harvest that are no longer worn can be instantly cut off to prelude money, while those who show want can be augmented in magnitude or bespoke to diminish the important tradition. Most hotels are recurring with booking quarters and reservations over the telephone, but information technology has prolonged well past that. Hotels can now work with different online trek companies and booking military to have Emerging Information Technology Trends their rooms booked online, with no indigence to employ classy force. This also allows a lodge to announce their open rooms and unusual deals promptly to people who would be most to grasp them, instead of killing much money advertising in an unfocused mode. High worth information technology hence allows for better arrangement and management of booking to tolerate a lodge to better maximize residence, and to know in proceed when large groups or prop period are approaching. This allows a lodge manager to make strategy about transient pole, good times to renovate or inflate, or other concerns, because he/she can decide the state of their hotel currently and for the next few months with only a few clicks on the laptop. The advances in information Emerging Information Technology Trends technology proffer well afar booking, however. The internet is  necessary for vacationers who fancy to associate those back home, and for those nomadic on topic to get in feel with the bureau. Therefore, wireless internet has become a very ordinary and very helpful tune for hotels to supply. Many interest minded persons even entail that an hotel tender internet army so that they can keep running while on the street. Luckily, such army are easy to supply, as all that is required is a wireless router and diverse plans to guarantee the whole hotel is filled with the practice. Modern advances in wireless internet also permit for the wireless internet provided for hotel visitors to be used to group the hotel itself. Security cameras, door stresses, and other policy basic to hotel sanctuary and shelter can be Emerging Information Trends wired into the interact, so that workforce are alerted when a door is propped open, a fire alarm goes off or suspicious activity occurs. Though the hotel guests are wholly unaware of it, this variety of added safety and guarantee keeps them careful, and in the occasion of a puzzle they will almost surely appreciate the benefits of such system. As difficult as it is, information technology in the hospitality activity is still going ahead. Intelligent booking systems enable hasty and helpful guest opinion, along with the ability to predict who is likely to use the hotel again and tell them via e-packages or passage letters when a good deals appear. Hotels with scope mass or other guest services can tender menus online, allowing for abrupt updates, high-class photos, and other behavior to allow guests to see and order services before they even arrive. There also advances in terms of payroll and list which make information technology Emerging Information Technology Trends an effective asset for reduction money and maximizing profits. The sole quality of the hospitality trade makes it a great place for new and emerging information technology, and farther-opinion hotel owners and managers are forever looking for smart tools and software to invest in. E. HEALTHCARE INFORMATION TECHNOLOGY TRENDS The utilization of technology in healthcare has opened the method for improvements in a limit of areas. One of the advantages and payback of fitness tending technology is the additional people are extant diseases like feeling and blight disease due to the fitness to identify them earlier than formerly skilled. With this ability comes the subsidy of being able to use a method that may be fewer extreme than one beloved as the disease grows. With a disease like Tuberculosis, as it metastasizes, the talent to struggle it and eliminate it gets harder and harder. Although, one more use of technology in healthcare has brought us newest drugs that can aim more precisely the particular scourge cells along with being more embattled in other areas. It has also brought us latest radiation Healthcare Information Technology Trends tools that can be far extra accurate and not have to use the shotgun manage to dig up to the tumor. The ray could even be bent about key body parts like glands and arteries so as not to injure them when focusing in that territory. One interesting and futuristic loan is the utilization of robots. You can now have a preset prostatectomy with an outcome that may be to the profit of the enduring. With the use of a robot in surgical procedure there is a slighter Healthcare Information Technology Trends opening and large incisions which is fewer torment for the tolerant, there is a smaller quantity of blood failure, an exclusive hazard of rigid cuts about delicate nerves and tendons which may allow the unwearied a pompous choice of not having poorer effects from the surgical procedure, and typically a shorter drape about in the hospice and a shorter recovery time. The accuracy of the robot is far more rigid than a surgeon using his/her hands lonesome. Robots are also programmed in such way that they can grip complicated situations. Another zone where robots are worn is in mandatory middle surgery. Again the accuracy and precision of the tools show the way to a bigger unplanned of a quicker recovery time and minus anguish to the patient. The finer incisions and the possibility of less blood harm are one advantage to using robots in a middle surgery. The dab Vinci Healthcare Information Technology Trends robot worn in the heart and growth surgeries and has the opportunity to be  worn in a range of areas where precision and accuracy are vital. III. EDUCATION Although computers are now common in the classroom that has not been the most significant step in their use as educational tools. I believe that distinction has to go to distance education. The concept is not all that new, because the idea of remote classrooms with a teacher appearing on television has been in place for decades. But the idea of conducting an entire class over the Internet is radically different. In distance education, the students may never set foot in a classroom at all. They will interact with the teacher and with their peers via email; they may participate in lectures via some sort of instant messaging service. The assignments are posted by the instructor, and the completed assignments are returned to him/her through email. Attending class by accessing the Internet does of course mean that the student cannot participate in a live exchange with his peers and the instructor, so in that sense the spontaneity of the classroom is missing. However, for students in very remote areas, or when classes are offered at one campus and not another, it is a viable solution, and it is made possible by IT. IV. PERSONAL USAGE Of course the single biggest item here is the personal computer. Having a computer at home has revolutionized life for millions of people around the globe. We tend to get our news from the computer; we may find ourselves in a discussion with someone on the other side of the planet; and we tour museums and shops in distant cities among many other uses. Many people now work from home (â€Å"telecommuting†) rather than physically going to the office. This saves road congestion and helps diminish pollution. Children and teens use the computer to help with their homework, and with the Internet, they have the entire world as a resource. V. CONCLUSION The impact of IT on society is hard to overestimate. Many of the developments, as I’ve indicated, have been positive, but there are some negatives as well, specifically a tendency to spent more time alone, or interacting only with the computer rather than with real people. Still, for most of us, IT has made a sizeable impact, and a positive one, on our lives. VI. REFERENCES http://www.cisp.org/imp/april_99/04_99kalil.htm http://www.wikipedia.com

Wednesday, August 21, 2019

Carbon nanotubes

Carbon nanotubes Introduction Carbon nanotubes are the allotops of carbon , they have a cylindrical nano structure. Nano structure are construct with a length to diameter ratio of 28000000:1 , this is significantly larger than any other material. They have many novel properties and are many useful in nanotechnology , electronics , optics , material science and architectural field. They have great strength and unique electrical properties . However their useusge is limited in day to day life because of their toxicity . includes the spherical bucky ball (c60). It is often see that end of nanotube are hemispherical buckyball structure . It is qurt intresting to know that the radius of a nanoube is approximately 1/50000of the human hair. The nature of the bonding of a nanotube is described by appling orbital hybridation . They have sp2 bonds as graphite have . Most single-walled nanotubes (SWNT) have diameter close to 1nanometer, with a tube length is many millions of times longer. The structure of a SWNT can be conceptualized by wrapping a one-atom-thick layer of graphite called graphene into a seamless cylinder. The way the graphene sheet is wrapped is represented by a pair of indices (n,m) called the chiral vector. The integersnandmdenote thenumber of unitvectoralong two directions in the honeycomb crystal latticeof graphene. Ifm= 0, the nanotubes are called zigzag. Ifn=m, the nanotubes are called armchair. Otherwise, they are called chiral. ( The (n,m) nanotube naming scheme can be thought of as a vector (Ch) in an infinite graphene sheet that describes how to roll up the graphene sheet to make the nanotube.Tdenotes the tube axis, anda1anda2are the unit vectors of graphene in real space.) Single-walled nanotubes exhibit electric properties that are not shared by the multi-walled carbon nanotube (MWNT) . Single-walled nanotubes are the most likely candidate for miniaturizing electronics beyond the micro electromechanical scale currently used in electronics. The most basic building block of these systems is the electric wire, and SWNTs can be excellent conductors. Application of SWNTs are useful in the development of the first intramolecularfield effect transistor(FET). Production of the first intramolecularlogic gateusing SWNT FETs has recently become possible .To create a logic gate you must have both a p-FET and an n-FET. Because SWNTs are p-FETs when exposed to oxygen and n-FETs otherwise, it is possible to protect half of an SWNT from oxygen exposure, while exposing the other half to oxygen. This results in a single SWNT that acts as a NOT logic gate with both p and n-type FETs within the same molecule. Single-walled nanotubes are still very expensive to produce, around $1500 per gram as of 2000, and the development of more affordable synthesis techniques is vital to the future of carbon nanotechnology. If cheaper means of synthesis cannot be discovered, it would make it financially impossible to apply this technology to commercial-scale applications. Multi-walled nanotubes (MWNT) consist of multiple rolled layers (concentric tubes) of graphite. There are two models which can be used to describe the structures of multi-walled nanotubes. Russai doll model, sheets of graphite are arranged in concentric cylinders, e.g. a (0,8) single-walled nanotube (SWNT) within a larger (0,10) single-walled nanotube. In theParchamenmodel, a single sheet of graphite is rolled in around itself, resembling a scroll of parchment or a rolled newspaper. The interlayer distance in multi-walled nanotubes is close to the distance between graphene layers in graphite, approximately 3.3 Ã…. The special place of double-walled carbon nanotubes (DWNT) must be emphasized here because their morphology and properties are similar to SWNT but their resistance to chemicals is significantly improved. This is especially important when functionalizationis required (this means grafting of chemical functions at the surface of the nanotubes) to add new properties to the CNT. In the case of SWNT, covalent functionalization will break some C=C, leaving holes in the structure on the nanotube and thus modifying both its mechanical and electrical properties. In the case of DWNT, only the outer wall is modified. DWNT synthesis on the gram-scale was first proposed in 2003by the CCVD technique, from the selective reduction of oxide solutions in methane and hydrogen. A nanotorus is theoretically described as carbon nanotube bent into atorus(doughnut shape). Nanotori are predicted to have many unique properties, such as magnetic moments 1000 times larger than previously expected for certain specific radii. Properties such as magnet moment, thermal stability etc. vary widely depending on radius of torus. Carbon nanobudare a newly created material combining two previously discovered allotropes of carbon: carbon nanotubes and fullerenes. In this new material fullerene-like buds are covalently bonded to the outer sidewalls of the underlying carbon nanotube. This hybrid material has useful properties of both fullerenes and carbon nanotubes. In particular, they have been found to be exceptionally good field emitters. In composite materials, the attached fullerene molecules may function as molecular anchors preventing slipping of the nanotubes, thus improving the composites mechanical properties. Strength Carbon nanotubes are the strongest and stiffest materials yet discovered in terms oftensil strenghtandelectic modulas respectively. This strength results from the covalent sp ² bonds formed between the individual carbon atoms. In 2000, a multi-walled carbon nanotube was tested to have a tensile strength of 63gigapascal(GPa). (This, for illustration, translates into the ability to endure tension of 6300kg on a cable with cross-section of 1mm2.) Since carbon nanotubes have a low density for a solid of 1.3 to 1.4g ·cm−3,itsspecific strenghtof up to 48,000kN ·m ·kg−1is the best of known materials, compared to high-carbon steels 154kN ·m ·kg−1. Under excessive tensile strain, the tubes will undergoplastic deformation, which means the deformation is permanent. This deformation begins at strains of approximately 5% and can increase the maximum strain the tubes undergo before fracture by releasing strain energy. CNTs are not nearly as strong under compression. Because of their hollow structure and high aspect ratio, they tend to undergobuckingwhen placed under compressive, torsional or bending stress. Kinetic Multi-walled nanotubes, multiple concentric nanotubes precisely nested within one another, exhibit a striking telescoping property whereby an inner nanotube core may slide, almost without friction, within its outer nanotube shell thus creating an atomically perfect linear or rotational bearing. This is one of the first true examples ofmolecular nanotechnology, the precise positioning of atoms to create useful machines. Already this property has been utilized to create the worlds smallest rotationalmotor. Future applications such as a gigahertz mechanical oscillator are also envisaged. Because of the symmetry and unique electronic structure of graphene, the structure of a nanotube strongly affects its electrical properties. For a given (n,m) nanotube, ifn=m, the nanotube is metallic; ifn−mis a multiple of 3, then the nanotube is semiconducting with a very small band gap, otherwise the nanotube is a moderatesemiconductor. Thus all armchair (n=m) nanotubes are metallic, and nanotubes (5,0), (6,4), (9,1), etc. are semiconducting. In theory, metallic nanotubes can carry an electrical current density of 4 Ãâ€" 109A/cm2which is more than 1,000 times greater than metals such ascopper . All nanotubes are expected to be very goodthermal conductorsalong the tube, exhibiting a property known as ballistic conductor, but good insulators laterally to the tube axis. It is which transmits 385 W ·m−1 ·K−1. The temperature stability of carbon nanotubes is estimated to be up to 2800 °C invacuumand about 750 °C in air. Potential and current applications The joining of two carbon nanotubes with different electrical properties to form adiodehas been proposed The strength and flexibility of carbon nanotubes makes them of potential use in controlling other nanoscale structures, which suggests they will have an important role innanotechnologyengineering. The highest tensile strength an individual multi-walled carbon nanotube has been tested to be is 63GPa. In electrical circuits Carbon nanotubes have many properties—from their unique dimensions to an unusual currentconductonmechanism—that make them ideal components of electrical circuits. For example, they have shown to exhibit strong electron-phonon resonances, which indicate that under certain direct current (DC) bias and doping conditions their current and the average electron velocity, as well as the electron concentration on the tube oscillate at terahertz frequencies[. These resonances could potentially be used to make terahertz sources or sensors. Nanotube based tranistorhave been made that operate at room temperature and that are capable of digital switching using a single electron. One major obstacle to realization of nanotubes has been the lack of technology for mass production. However, in 2001 IBM researchers demonstrated how nanotube transistors can be grown in bulk, somewhat like silicon transistors. Their process is called constructive destruction which includes the automatic destruction of defective nanotubes on thewafer. The IBM process has been developed further and single-chip wafers with over ten billion correctly aligned nanotube junctions have been created. In addition it has been demonstrated that incorrectly aligned nanotubes can be removed automatically using standardphotolithoraphy equipment. The first nanotube integrated memory circuit was made in 2004. One of the main challenges has been regulating the conductivity of nanotubes. Depending on subtle surface features a nanotube may act as a plainconductoror as a semiconductor. A fully automated method has however been developed to remove non-semiconductor tubes. Most recently, collaborating American and Chinese researchers at Duke University and Peking University announced a new CVD recipe involving a combination of ethanol and methanol gases and quartz substrates resulting in horizontally aligned arrays of 95-98% semiconducting nanotubes. This is considered a large step towards the ultimate goal of producing perfectly aligned, 100% semiconducting carbon nanotubes for mass production of electronic devices. Another way to make carbon nanotube transistors has been to use random networks of them. By doing so one averages all of their electrical differences and one can produce devices in large scale at the wafer level.This approach was first patented by Nanomix Inc (date of original application June 2002). It was first published in the academic literature by theusa navel reacherch labority in 2003 through independent research work. This approach also enabled Nanomix to make the first transistor on a flexible and transparent substrate. Nanotubes are usually grown on nanoparticles of magnetic metal (Fe, Co), which facilitates production of electronic (spinotic) devices. In particular control of current through a field-effect transistor by magnetic field has been demonstrated in such a single-tube nanostructure. Large structures of carbon nanotubes can be used for thermal management of electronic circuits. An approximately 1mm-thick carbon nanotube layer was used as a special material to fabricate coolers, this materials has very low density, ~20 times lower weight than a similar copper structure, while the cooling properties are similar for the two materials. As paper batteries Apaper battery is abatteryengineered to use a paper-thin sheet ofcellulose (which is the major constituent of regular paper, among other things) infused with alignedcarbon nanotubes .The nanotubes act aselectrods; allowing the storage devices to conduct electricity. The battery, which functions as both a lithium-ion battery and asupercapacitor can provide a long, steady power output comparable to a conventional battery, as well as a supercapacitors quick burst of high energy—and while a conventional battery contains a number of separate components, the paper battery integrates all of the battery components in a single structure, making it more energy efficient. Solar cells Solar cells developed at the new jerrsyinstitute of technology use a carbon nanotube complex, formed by a mixture of carbon nanotubes and carbonbulkyball to form snake-like structures. Buckyballs trap electrons, although they cant make electrons flow. Add sunlight to excite thepolymer, and the buckyballs will grab the electrons. Nanotubes, behaving like copper wires, will then be able to make the electrons or current flow. Ultracapacitors Mit uses nanotubes to improveultracapicator. The activated charcoal used in conventional ultracapacitors has many small hollow spaces of various size, which create together a large surface to store electric charge. But as charge is quantized into elementary charges, i.e. electrons, and each such elementary charge needs a minimum space, a significant fraction of the electrode surface is not available for storage because the hollow spaces are not compatible with the charges requirements. With a nanotube electrode the spaces may be tailored to size—few too large or too small—and consequently the capacity should be increased considerably Optical properties of carbon nanotubes Withinmaterial science, theoptical properties of carbon nanotubesrefer specifically to theabosorbtion,photoluminesence, andRaman spectroscopyofcarbon nanotubes. Spectroscopic methods offer the possibility of quick and non-destructive characterization of relatively large amounts ofcarbon nanotubes. There is a strong demand for such characterization from the industrial point of view: numerous parameters of thenanotube synthesiscan be changed, intentionally or unintentionally, to alter the nanotube quality. As shown below, optical absorption, photoluminescence and Raman spectroscopies allow quick and reliable characterization of this nanotube quality in terms of non-tubular carbon content, structure (chirality) of the produced nanotubes, and structural defects. Those features determine nearly any other properties such as optical, mechanical, and electrical properties. carbonnanotubesare unique one dimensional systems which can be envisioned as rolled single sheets ofgraphite(or more preciselygraphene). This rolling can be done at different angles and curvatures resulting in different nanotube properties. The diameter typically varies in the range 0.4-40nm (i.e. only ~100 times), but the length can vary ~10,000 times reaching 4cm. Thus the nanotubeaspect ratio, or the length-to-diameter ratio, can be as high as 28,000,000:1,which is unequalled by any other material. Consequently, all the properties of the carbon nanotubes relative to those of typical semiconductors are extremelyanisotropic(directionally dependent) and tunable. Whereas mechanical, electrical and electrochemical (superconductor) properties of the carbon nanotubes are well established and have immediateappplications, the practical use of optical properties is yet unclear. The aforementioned tunability of properties is potentially useful in opticsandphotonics. In particular, light-emitting diodes (LEDs)photo-dectors ased on a single nanotube have been produced in the lab. Their unique feature is not the efficiency, which is yet relatively low, but the narrow selectivity in the wavelenghtof emission and detection of light and the possibility of its fine tuning through the nanotube structure. In addition,bolometerand optoelectronic memorydevices have been realised on ensembles of single-walled carbon nanotubes.[2] Carbon nanotubes as a black body An idealblack bodyshould haveemissivityorabsorbanceof 1.0, which is difficult to attain in practice, especially in a wide spectra range. Vertically aligned forests of single-wall carbon nanotubes can have absorbances of 0.98-0.99 from thefar-ultraviolet(200nm) tofar-infrared(200ÃŽ ¼m) frequencies.Super black, a coating based on chemically etched nicle-phopsphoras alloy, is another material approaching the absorption of 1.0. These SWNT forests (buckypaper) were grown by the super-growth CVD method to about 10 ÃŽ ¼m height. Two factors could contribute to strong light absorption by these structures: (i) a distribution of CNT chiralities resulted in various bandgaps for individual CNTs. Thus a compound material was formed with broadband absorption. (ii) Light might be trapped in those forests due to multiple reflections Nanotubes As Space Elevators A space elevator would extend 22,000 miles above the Earth to a station, and then another 40,000 miles to a weighted structure for stability Scientists from Cambridge University have developed a light, flexible, and strong type of carbon nanotube material that may bring space elevators closer to reality. Motivated by a $4 million prize from NASA, the scientists found a way to combine multiple separate nanotubes together to form long strands. Until now, carbon nanotubes have been too brittle to be formed into such long pieces.[3] Conclusion Carbon nano tubes are very important material and are precious in day to day life , space research, nanotechnology , telecommunication , optics etc. However they are still not been used in their full extent because they are very expensive and are toxic in nature. We have to somehow find a cheap source of carbon nanotubes in the future.

Tuesday, August 20, 2019

The Hilton Hotel And Resorts | Marketing Mix

The Hilton Hotel And Resorts | Marketing Mix According to Philip Kotler marketing strategies are the combinations of all important marketing goals into a comprehensive plans, it should be from marketing research and its centre of attention should be right marketing mix to achieve maximum profit and sustainability for the organisation. Hilton Hotel and resorts is a Hospitality industry founded by Conard Hilton in 1919 in Cisco, Texas (U.S) and has 540 hotels worldwide. Its first brand was opened in Business travel and leisure travel are the two marketing emphasis the company is focusing on. Hilton Hotel and Resorts are mostly located in city centres, near airports etc for the easy access for the customers. This assignment is on Hilton Hotel (HHonours) near Heathrow Airport; with in Heathrow area it has three branches. Easy access from all terminals Heathrow central and terminal 5. It has partnership with different airlines and car rental companies. It just 6 minutes walk away from T4 and 10 minutes away by courtesy shuttle bus from T5. Hilton London Heathrow Airport hotel Exterior (http://www3.hilton.com/en/hotels/united-kingdom/hilton-london-heathrow-airport-LHRAPTW/index.html) Marketing: Marketing in Hospitality industry is one of the main elements to increase profits and success of the business and it is playing very important role in hospitality. It helps the organisation to get success through understand their customers, what they want, their needs; priorities and demand from the organisation and what are their expectation level from customer service point of view, leisure and infrastructure etc. It is really easy these days through internet. The organisation can also put surveys on internet, blogs, websites, social media, etc. For example Hilton hotel is available on face book where anyone can like, comment and post their views and also customers can check their updates, offers etc. http://xzamcorp.com/quality-blog/wp-content/uploads/2012/06/Facebook-Hilton-Hotels-Resorts.jpg (https://www.facebook.com/hilton) Marketing Mix Marketing mix is a mixture of four fundamentals product, price, place and promotion. That actions used to satisfy the wants of an organisations target market and at the same time achieve its marketing objectives. (Stanton) 1994. http://www.marketingteacher.com/image/content/mmix.gif Product- this feature of marketing mix is including planning, developing and producing the right category of products and services in the market by an organisation. In short words what is the quality of the product, size of the product? How is it looks like, design of the product, value of the product, about packaging, testing and range etc? Product of Hilton Price- To fix a right price of product is a most difficult task. Price of the product should be reasonable and affordable so organisation can sell their product easily and successfully in the market. There are lots of steps between set the right price for example: determination of unit price of the product, pricing policies and strategies, discounts, credits, cost, terms of delivery, payment, competitive price credit policy etc. Price of Hilton hotel Place- It is called distribution channels, storage and warehousing, coverage channel, inventory management, selection channel, distribution logistics etc. Management of organisation is responsible to choose and deal with distribution channels so customers can get the product at right place at right time. They should develop physical distribution. Wholesalers and retailers are most important channels which are used for physical distribution of goods. Place for Hilton hotel Promotion- the fourth p is promotion it does include determination about direct marketing, sales promotion, advertisements, publicity, exhibitions, public relations activity etc. Most important tools are advertisements and sales promotion which are used to promote the sale of products of organisations. Promotional activities are free distribution of sample of product, contests etc. These types of tools are expressive which does help to beat the competition in the market to organisation. Advertisements are used to communicate and pass the information to customers and consumers about the features of product through television, internet, newspapers and magazines, radio, billboards, banners and posters etc. Limitations Doing advertisements or promotion is expensive tool but there is lots of advertisements on the television and internet so people can get fed up thats why mostly people ignore the advertisements on television they just skip the channels when the advertisements comes in front of them. Some people do not read the advertisements on newspapers and magazines. Promotion about Hilton Branding- branding is a unique name and identity of the company. It is a procedure of mark and stamp to the product with identify look, design and logo etc. So customers and consumers can get idea about the features of product from the name, look, logo, mark and design. Brand name or design should be attractive, which can attract to the customers. From brand name customers can recognise the product. When they give a symbol or name to the product organisation should always keep in mind there is lots of competitor in the market. Brand should be like that which is no one can copy it easily. Customer loyalty- it is about to encourage the customer, attract towards brand, buy the product often and in extra amount. It is about satisfaction level of customers, confidence, and their needs and wants. Organisation should build relationship with customers using e-market via email, messaging on mobile phones, so customers can stay keep in touch with them. Organisation should give points to the customers on loyalty cards. They should show to customers to care for them what are their choices and what they do not want. Network and customer relationships marketing strategies- Marketing take place in public relationship. For an organisation should have good and strong relation with society to fight the competition in the market. They should build strong network into the market with stakeholders. Now a days every organisation have customer care department to sort out the problems of customers and they have call centres as well as they have online customer care facility via internet so customers can call them or email them regarding their problems. In an organisation network and customer relationship is how does effective staff deals with customers and employers with employees. Hilton Hotel company appreciates the value of its staff and uses internal marketing to retain them and make them feel valued. At the Hilton organisation management realises that the companys team member added value and quality to the business. In fact it is the people working for the organisation that makes the Hilton hotels corporation such an international success. A hotel is an actual physical product, but a lot of the experience of visiting a hotel relates to the service offered by its staff to the customers. At Hilton hotel organisation management realises that staff treat customers with about same degree of respect as they themselves are treated by their employers. If staff are not treated and valued well they in turn will not respect or treat customers very well. Obviously this is very bad for an organisation..The Hilton hotel corporation invests a lot of time and money in its staff. It takes training and staff development very seriously. It involves staff in all aspects of it s marketing plans and strategy so that everyone knows what is going on and how they make contribution. Organisation gives rewards to its staff for effort with awards and promotion. It includes its staff by allowing them access to extranet which is also share with its business partners. Management offers a comprehensive befits packages to its staff, including: medical, dental and vision care coverage, life accident and disability insurance, the Hilton stock purchase plan, the flexible work arrangement. Other benefits including vacation and holiday pay plus and special privileges when staff stays at Hilton hotels. At the Hilton group management really try to retain good staff and do everything possible to make working for the Hilton hotel organisation rewarding and satisfying experience. Marketing communication activities and strategies-marketing communication is a way which is used by an organisation to change the behaviour of stakeholders towards product. They present to product into the market in such way, people can get information about the product from designing, promotion, exhibitions, advertisements, newspapers, magazines, mobile phone marketing etc. Marketing communication can be develop by direct marketing and indirect marketing. Personal selling, sales promotion, advertising, public relations these are all marketing communication. Those all tools are used for communication about product, which tells to public about the features of product. Organisation use marketing communication to achieve the market objectives and target sales. Communication is messages between one person to other person and in marketing it is between seller and buyer. E-marketing- e-marketing is an internet marketing, which is also called as an online marketing, web-marketing. Now a days every organisation use electronic technology for advertisements to gain the objectives. Technology plays a vital role for an organisation such computer based technology. Organisation create their websites, they send information about products online. Internet offers unique opportunities for organisation and customers to communicate with each others. It is a good way to build relationship with each other. Companies do promotion by direct email, advertisements on internet, by text messaging on mobile phones as well. People can know about the organisations and their manufactured goods to visit on their websites through internet. Organisation can do advertisements through social media for example: face book, twitter etc. On other hand some people do not trust on online information. These types of people prefer to go to the organisation personally so they can get information about the product from someone face to face. Guerrilla marketing activities and strategies- this type of strategy is a weapon for marketers and it is not very expensive it is low cost strategy. Guerrilla marketing is a unusual methods of promotion. This type of marketing does not focus on sales just focus profits, on primary success. It does expect highest results from minimum resources. But sometimes these methods of marketing represent the false image of brand, which is not good to get success for an organisation and survive for long time in the future. Viral marketing- it is blog marketing, forum marketing, email marketing and article marketing. This type of marketing is passed from one person to another person for example messengers are used for viral marketing. Social media is the best way for viral marketing. Public relationship strategies:-Public relation strategies are one of the promotional Mix (advertisement, personal selling, sales promotion, corporate image and Exhibition). According to Bill bernbach:- People cant believe you if they dont know what you are saying and they cant know what you are saying if they dont listen to you, and they wont listen to you if youre not interesting. Any news, planning, presentation, job advertisement etc organisation wants to give to public and any feedback organisation want from public different media such as speaker opportunities (conferences, seminars, public forums), trade show support (press appointments, private demos), public launch, magazines, newspaper, (articles, report), TV, internet, PR blogs (such as face book, twitter, online Pr) etc. Public relationship is a relationship of sharing information relation to organisation not only between organisation and customers; it is also with employees, staff, consumers, general public, competitors etc. Public relation plays a vital role and its essential to make public aware and up-to-date about new policies, procedures, jobs, vacancies etc. Marketing and marketing communication theory Conceptual frameworks Recommend marketing and customer loyalty strategies that would secure and/or enhance the organisation competitive advantage.

Monday, August 19, 2019

Mountains of the Moon: A Re-inscription of the Colonial Master Narrative :: Movie Film Essays

Mountains of the Moon: A Re-inscription of the Colonial Master Narrative      If Richard Burton and John Hanning Speke were alive in 1989 to see the release of Bob Rafelson’s Mountains of the Moon, what would their response to the film be?   Would they agree with the way Rafelson’s film depicts their remarkable journey into Africa to find the source of the Nile River?   Would they agree with the way the film dramatizes their relationship with each other?   The answers to these questions would help a great deal in determining whether Rafelson’s film about Burton and Speke’s expedition was accurate, or whether his film was an attempt to sensationalize their story to increase its reception.   Unfortunately, Burton and Speke are not around to answer these questions, which makes an analysis of these issues difficult.   Therefore, rather than analyzing this film from a historical perspective, this critique is concerned with what story Rafelson’s film tells.   How does Rafelson’s movie shape audience’s opinions about Burton and Speke as characters?   Does his story, through visual rhetoric, retell or reinterpret Burton and Speke’s story?   What role does Africa play in Rafelson’s film?   The answers to these questions should help determine whether Rafelson’s film is a re-inscription of the colonial master narrative, or whether it is a post-colonial critique of European colonization.    Mountains of the Moon sets out to recreate the adventures of Richard Burton (Patrick Bergin) and John Hanning Speke (Iain Glen).   The plot of the film focuses on Burton and Speke’s relationship, and their journey to discover the source of the Nile River.   One interesting characteristic that separates Rafelson’s Mountains of the Moon from previous attempts to describe Burton and Speke’s expedition is that Rafelson’s film introduces a human element into Burton and Speke’s relationship; an element that remains the focal point throughout the entire movie (Campbell, www.theparamount.org). As a result, Rafelson shifts the focus of the movie away from the business aspect of the story, and compels audiences to focus more on the friendship that develops between Burton and Speke.   Sidney Pollack’s Out of Africa shifts in the same way.   In Pollack’s 1985 film, audiences find themselves more concerned with the film’s love s tory, than with the Baroness’s coffee plantation in Africa.   This shift occurs not by accident, but rather as a deliberate attempt by Pollack to tell a particular story.   Therefore, Rafelson’s film deliberately shifts to allow him to tell his story: a story about â€Å"Two strangers made friends by a savage land.