Thursday, October 31, 2019

E- Commerce & IT Essay Example | Topics and Well Written Essays - 1500 words

E- Commerce & IT - Essay Example Electronic Markets are the recent online trading network platform that links the sellers with the buyers together for exchanging goods and services, without any mandatory face to face interaction during spot trading. Most of the EMs are two-way networks or collaborative in nature. When different companies working in same line of business meet at a place, which are willing to exchange goods to target customers, we get an association of market places. Such market place is called the electronic market if the parties to transaction mainly communicate online or through some private networks.The concept of EM has its origin from Electronic commerce, the fundamental purpose of which is to execute transactions that are supported electronically. Some of the top e-commerce developments of last decades include eBay, Amazon, Google Ad Words, PayPal, etc. The business model may be B2B, B2C, or C2C. In all these models, automating transactions drastically reduces the amount of paper works and need for human intervention which consequently leads to minimization of overall cost of the firms (Andreini, 2003, pp.15-16). Any transaction involves the exchange of goods and services and the electronic medium is used to keep record of such transactions, such as inventory, track location of goods despatched, quantity, price, etc. Online transactions that take place at the point of sale need to critically focus on time sensitive transactions whose delay might cause huge losses for companies (Huang, Wolf, and Sycara, 2001, pp. 2-9). The evolution of internet increased the speed of data transfer and, hence, provided an ideal platform for conducting EDI (Electronic data Interchange) transaction and E-commerce. Challenges for the Collaborative Electronic Markets When any business plans to launch the Electronic market, its main objective is to bring the buyers and sellers together through a network by realising a need for exchange of goods. But such a business model can sustain in the long run only if there is sufficient trust among the business partners on the entire system. Not to mention that security, reliability and privacy is a must for any sort of online transaction. These issues must be addressed very seriously if the company is planning to sustain (Wielki, 2002, p.129). The Electronic market has huge scope form demand planning, analysing and forecasting, to supply chain management, logistics and demand fulfilment. The business partners do not only look for cost efficiency but also expect specialization from Electronic Market companies (Furrenr and Sudharshan, 2001, p.127). The cost consideration has to be taken into account along with the timely delivery. This is because very often it is found that carrying goods for third party reduces direct cost per kilometre of running the trucks for the companies but at the same time it increases time of delivery by spending significant amount time on roads. Many e-Markets have only focused on the cost aspect ignoring th e time which ultimately lead to their downfall. Very often the larger-than-life ambition, lack of clearly defined long term goals, distrust among partners, reluctance of the suppliers to join common platform also lead to failure of e-business models (Gupta, 2007, p.4). In order for the e-commerce companies to sustain in the competitive market, it needs to specialize on a particular field and then expand the business gradually with time. Thus, the mentality of entrepreneurs of trying to achieve ‘too much’ in ‘less time’ may ultimately take their ship down and shorten their long term sustainability. Managing Conflicts in e-Marketplace The emergence of Electronic Marketplace has lead

Tuesday, October 29, 2019

Moth Essay Example | Topics and Well Written Essays - 1000 words - 2

Moth - Essay Example The family Noctuidae, or the owlet moths, are not only numerous in species but also robust – and they are the largest family. They have hind wings of bright colors. They are usually flying at night. They also invade flowers as many are attracted to sugar and nectar. Moreover, their larvae are crop pests (Cutworm Moth, 2012). In Australia, the Philobota species of moth, or the pasture tunnel moths, are grass feeders (Moate et al., 2012). The so-called tunnel moths make a silk lined tunnel and that during night time or winter, the caterpillar of the tunnel moth gathers grass foliage and drags them back into their tunnels. The caterpillars are very small and may be quote difficult to notice for they measure around 35 mm long only and 3 mm across (New pasture pest, 2010). Pasture tunnel moths usually live in areas with higher rainfall, and they can cause significant damage to clovers, as well as annual and perennial grasses. The larvae are usually grey-colored in their bodies with black heads. The adult moth, on the other hand, is long and has a creamy-white color. The pasture tunnel moth usually cause the greatest damage during the months of July and August, during the rainy months, for rain has a great factors in stimulating this species of moth to feed more (Pasture tunnel moth, 2009). Moreover, the past ure tunnel moth affects cereal crops (Perry et al., 2011). The first time that Philobota species were identified in New Zealand was in February 2010 at the Ruakura Research Center in Hamilton, New Zealand. The migrant species are actually native to Australia, of which there are around 400 species, and where a number of these species are regarded as â€Å"minor pests of pasture† because it merely feeds on grass such as tall fescue trials and perennial ryegrass (Popay & Gunawardana, 2011). The aim for the project is to determine the emergence patterns of the Philobota moth, as well

Sunday, October 27, 2019

Mark Ratners Concepts of Molecular Electronics

Mark Ratners Concepts of Molecular Electronics Mark Ratner  and  The Basis of the Future: Molecular Electronics Levent BahadÄ ±rhan KarakuÃ…Å ¸ 2. Introduction Mark Ratner, He is professor of chemistry and professor of materials science and engineering at Northwestern University. He studies the theory of fundamental chemical processes related to nanoscale application. Ratner is a member of the Internatioanal Academy of Quantum Molecular Science also, His lectures subjects were â€Å"Transport in molecular Junctions†and â€Å"Nano and Energy† at Stanfort University at 2009. I choose Mark Ratner because, Topic of Nano technology and energy generation are important on the sustainable energy. High capaticy batteries, high technology solar cells, etc. besides; new tech-power plants or storages These topics to be studied for me. In short, Quantum mechanics and Nano technology are always interested me[20]. 2.1. Education He graduated from Harvard University department of chemistry at 1964. Then, He started Ph.D. in chemistry from Nortwestern University and working with G. Ludwig hofaker. Ratner first lecture chemistry at New York University from 1970 until 1974[20] 2.2. Career Development He worked may extended period of time in israel and he worked with lots of scientists, including form Tel Aviv University and University of Jesursalem. Also Rater works international association, particularly in Netherlands and Denmark[20] 3. Fields 3.1 Molecular Electronics (Primary field) Molecular electronics increased interest in as of late, induced spawning by information technology may reach it computability limits in a several years. [1-2]. In order to molecular electronics to become a valued alternative to silicon researces, It will not be enough to generated molecular electronic devices with distinguished characteristics, but proper circuit and architectural solution will be needed. When lots of effort has given to the demonstration of electronic functionalities of one molecules and organic filmsi research at the circuit and system level is still in its beginning[5-9]. Investigation on single molecules or nanotube based devices prospect to keep Moore’s law alive once miniaturisation of silicon-based structures becomes useless. As first proposed by Aviram and Ratner [10]. One can imagine to squeeze whole nonlinear circuit elements such as transistors or diodes into single molecules. In principle, suchlike devices could be importantly faster and smaller th an end of the routemap solid state electron devices[11]. 3.1.1 Why molecular electronics? Intrinsically entire electronic processes in nature, from photosynthesis to signal transduction, occur in molecular structures. For electronic epplications, molecular structure have four major advantages: Size: The size scale of molecules is between 1 and 100nm, a scale that permits functional nano-structures with attendant advantages in efficiency, cost and power dissipation. Assembly and recognition: One can exploit secific internolcular interaction to from structures with nano-scale self assembly. Molecular recognition can be used to chance electronic attitutde, providing both swithing and sensing capabilities on the one molecule scale. Dynamical stereochemistry: lots of molecules gave multiple distinct stable conformations or isomers. Such geometric isomers can gave distinct optical and electronic properties. For instance, the retinal one switches between more than one stable structures, a process that transduces light into a chemoelectrical pulse and allows vision. Synthetic tailorability: with choice of character and geometry, ona can extensively vary a transport of the molecule, binding, structural and optical properties. The instrument of molecular synthesis are extremely developed.[12] [http://www.nanowerk.com/nanotechnology/reports/reportpdf/report52.pdf] 3.1.2 Electrode The molecule electrode interface is a severely significant component of a molecular junction. It might limit current flow or completely modify the measured electrical response of the junction. Lots of experimental platforms for constructiong molecular electronic devices are founded on practical comsideration. This approach is in numerous ways the boon and the disaster of the field. For instance, the sulfur gold bond is a fabulous chemical hangle for forming self assembled, forceful organic monolayers on metal surfaces. Other technics such as using a scanning probe tip a cÄ ±ntact the molecule are frequently employed in part. Becuse that avoid processing steps that can damage or unexpecteably modify the molecular component. Optimally the couice of electrode materials would be based not on the easy of production or measurement, but rather on first principles considerations of molecule electrode interactions. On the other hand, in state of the art for the theory of molecule electrode interfaces is very elemantary. [http://www.nanowerk.com/nanotechnology/reports/reportpdf/report52.pdf] 3.1.3 DNA Consider a protein that spans a cell membrane and shuttles information across that membrane. The protein self assembles and self orients in the membrane; it also might switch between two forms, only one of that will transmit the chemicalsignal. Proteins are big molecues and indeed a specific molecular size is required to achieve such a rich combination of properties. The rotaxane molecule shown large and comples, but it is indeed efficiently and small designed, given the set of mechanical, chemical, and electronic properties that have been built into it[16]. Quite likely, transport in DNA junctions will show that the molecule or at least naturally occuring DNA is actually a wide bandgap semiconductor characterized by localized hole hopping between the low energy guanine cytosine pairs. Also guanin yields the most stable positive ion. Because the band gap is wide, DNA seems colourless and long range coherent charge motion is improbable[17]. 3.1.4 Circuit Architecture The potential of chemical synthesis to design specific and maybe even useful device behaviors is rapidly being realised. The following question, what sorts of circuit architectures can most take advantage of molecular electronics, is nowadays receiving rather a bit of attention both from computer scientists and from researchers; progress towerd indentifying and constructing working molecular electronics circutry has advanced fastly[13]. 3.1.5 The Future The primary challenges of realizing a true molecular electronics technology are wintry. Controlled fabriaction to within specified tolerances and its expermental verification is a exclusive problem. Self assembly schemes based on molecular recognition will be viral for that work. Absolutely reproducible measurments of junction conductance are only beginning in laboratories at Cornell, Harvard, Delft, Purdue and karlsruhe Universities and at the Naval research laboratory and same centers. A lot of the technology targets of molecular electronics, such as the computational applications duscussed, should perhaps be viewed as drivers for steering the field forward and for defining the critical and rate limiting challenges that must be overcome[14]. 3.2 Electron transport in molecular wire junctions Molecular conductance junction are structures in that unimolecules or minor groups of molecules conduct electrical current between one than one electrodes In such junctions, the linkage between the molecule and the electrodes very affects the current boltage characteristics. Considering theoretical and several experimental advances, including the understanding of basic systems, there is still limited correspondence between theoretical and experimental studies of these systems[18]. 3.3 Mesoscopic features of charge Generation in organic semiconductors Over the past twenty years, organic materials gave been extremly investigated by countless research groups for implementation in organic photo voltaic(OPV) devices. The organic semi conductors is protrusive by their potential low cost and facile tunability, making organic photovoltaic devices a knowledfe gap in our common understanding of materials, so boyh the time scale and lenght scale (fento to microsecond and nano to micrometer) proper to OPV functionality occupy a challenging a impressive space between the traditional regimes of quantum mechanics and solid state physics[19]. 4. Conclusion Ratner lead up lots of field, research centre and laboratories foremost; International Business Machines (IBM) and The defense Advanced Research Projects Agency (DARPA). Also, He described his experiences as an organizing member; a member of the board of directors and being on steering and selectrion committee. The significance of gaving a staff at research centre and proposal some thoughts on the future nanotechnology. Once for all, Ratner have a part in many today’s technology References [1] J. R. Heath and M. A. Ratner, Physics Today 56, 43 (2003) [2] J. R. Reimers, C. A. Picconnatto, J. C. Ellenbogen, and R. Shashidhar (eds.), Ann. New York Acad. Sci. 1006 (2003) [5] J. R. Heath, P. J. Kuekes, G. S. Snider and R. S. Williams, Science 280, 1716 (1998) [6] Y. Wada, Proc. IEEE 89, 8 (2001) [7] J. M. Tour, W. L. Zandt, C. P. Husband, S. M. Husband, L. S. Wilson, P. D. Franzon and D. P. Nackashi, IEEE Trans. Nanotech, 1, 2 (2002) [8] M. Macucci, G. Iannacone, L. Bonci and M. Girlanda, IEE Proc. Circuits Devices Syst. 151, 5 (2004) [9] A. Chaudhary, D. Z. Chen, X. S. Hu, M. T. Niemeier, R. Ravichandran and K. Whitton, IEEE Trans Comp. Aided Des. Int. Cir. Sys. 26, 11 (2007) [10] A. Aviram and M. A. Ratner, Chem. Phys. Lett., 29, 277 (1974) [11] J. C. Ellenbogen and J. C. Love, Proceedings IEEE 88 (3), 386 (2000) [12] Thomas Bjà ¸rnholm References:Tue Hassenkam, Kasper Moth-oulsen, Nicolai Stuhr-Hansen, Kasper Nà ¸rgaard, M. S. Kabir, and Thomas Bjà ¸rnholm. Self-Assembly and Conductive Properties of Molecularly Linked Gold Nanowires. Nano Letters, 4 (1), 19 -22, 2004. [13]. A. J. Heinrich et al., Science 298, 1381 (2002). [13] A. Bachtold, P. Hadley, T. Nakanishi, C. Dekker, Science 294, 1317 (2001); Y. Huang, Science 294, 1313 (2001); P. Avouris et al., Physica B 323, 6 (2002); Y. Chen et al., Nanotechnology 14, 462 (2003). [14] A. DeHon, in Proc. First Workshop on Non-Silicon Computation, available at http://www.cs.caltech.edu/research/ic/ pdf/molecular_nsc2002.pdf [15] P. J. Kuekes, R. S. Williams, â€Å"Demultiplexer for a Molecular Wire Crossbar Network,† US Patent 6,256,767 (3 July 2001) [16] A. J. Heinrich et al., Science 298, 1381 (2002). [17] D. Porath, A. Bezryadin, S. de Vries, C. Dekker, Nature 403, 635 (2000). [18] Nitzan, A, Ratner, M 2003, Electron Transport in Molecular Wire Junctions, Science, 5624, p. 1384, JSTOR Journals, EBSCOhost, viewed 7 May 2015. [19] Savoie, B, Jackson, N, Chen, L, Marks, T, Ratner, M 2014, Mesoscopic features of charge generation in organic semiconductors, Accounts Of Chemical Research, 47, 11, p. 3385-3394, Scopus ®, EBSCOhost, viewed 7 May 2015. [20] Cao, M, Deng, L, Xu, H 2015, Study of PNA-DNA hybridization by AFM-based single-molecule force spectroscopy, Colloids And Surfaces A: Physicochemical And Engineering Aspects, 470, p. 46-51, Scopus ®, EBSCOhost, viewed 7 May 2015.

Friday, October 25, 2019

Progeria Essay -- Disease, Disorders

Progeria is a rare, fatal, genetic condition that comes from the Greek word progeros meaning prematurely old. In the greek language, the word ‘pro’ means before and the word ‘geras’ means old age. Another name for progeria is Hutchinson-Gilford Progeria Syndrome. Hutchinson-Gilford Progeria Syndrome (HGPS) was first described in 1886 by Dr. Jonathan Hutchinson and also in 1897 by Dr. Hastings Gilford in 1897 – both in England. Hutchinson- Gilford Progeria Syndrome is reported about 1 in 8 million newborns (Parker 16). Hutchinson-Gilford Progeria Syndrome equally affects both sexes and races of children and gives them an appearance of rapid aging (Nordqvist 1). The symptoms of this disease show around eighteen to twenty-four months of age. Some of the symptoms are growth failure during the first year of birth, narrow shrunken or wrinkled face, baldness, loss of eyebrows or eyelashes, macrocephaly, open soft spot, small jaw, dry scaly skin, limited range of motion, and delayed or absent teeth (Brown). To help with the diagnoses of this disease, an overall look of the symptoms are used and radiography is also used. Radiography is used to determine bone density and body composition, such as body fat and muscle. For example, when taking x-rays of the skull, the craniofacial bones are disproportioned and when taking x-rays of the hands, the terminal phalanges are radiolucent (Sarkar,Shinton 312). Blood tests are done to analyze cardiovascular risk factors and blood counts, urine tests are done for sugar and proteins, photographs to study growth problems, EKG and heart ultrasound to study the heart and blood vessels, lung function tests to measure energy consumption and lung capacity, hearing tests, skin biopsy to examine cellular ch... ...uture looks promising for a treatment or cure to help these children live a longer life. Works Cited Brown WT. Progeria. In: Kliegman RM, Behrman RE, Jenson HB, Stanton BF, eds. Nelson Textbook of Pediatrics. 18th Ed. Philadelphia, Pa: Saunders Elsevier; 2007: chap 90 Nordqvist,Christian. "What Is Progeria?." Medical News Today. MediLexicon, Intl., 13 May. 2009. Web. 20 Feb. 2012. http://www.medicalnewstoday.com/articles/146746.php Parker, James N., and Philip M. Parker. Progeria: A Medical Dictionary, Bibliography, and Annotated Research Guide to Internet References. San Diego, CA: ICON Health Publications, 2004. Progeria." Progeria Research Foundation. Lustig,Megan, 14 Feb. 2000. Web. 20 Feb. 2012. . Sarkar, P., and R. Shinton. "Hutchinson-Guilford Progeria Syndrome." Hutchinson-Guilford Progeria Syndrome (2001): 312-17. Progeria Essay -- Disease, Disorders Progeria is a rare, fatal, genetic condition that comes from the Greek word progeros meaning prematurely old. In the greek language, the word ‘pro’ means before and the word ‘geras’ means old age. Another name for progeria is Hutchinson-Gilford Progeria Syndrome. Hutchinson-Gilford Progeria Syndrome (HGPS) was first described in 1886 by Dr. Jonathan Hutchinson and also in 1897 by Dr. Hastings Gilford in 1897 – both in England. Hutchinson- Gilford Progeria Syndrome is reported about 1 in 8 million newborns (Parker 16). Hutchinson-Gilford Progeria Syndrome equally affects both sexes and races of children and gives them an appearance of rapid aging (Nordqvist 1). The symptoms of this disease show around eighteen to twenty-four months of age. Some of the symptoms are growth failure during the first year of birth, narrow shrunken or wrinkled face, baldness, loss of eyebrows or eyelashes, macrocephaly, open soft spot, small jaw, dry scaly skin, limited range of motion, and delayed or absent teeth (Brown). To help with the diagnoses of this disease, an overall look of the symptoms are used and radiography is also used. Radiography is used to determine bone density and body composition, such as body fat and muscle. For example, when taking x-rays of the skull, the craniofacial bones are disproportioned and when taking x-rays of the hands, the terminal phalanges are radiolucent (Sarkar,Shinton 312). Blood tests are done to analyze cardiovascular risk factors and blood counts, urine tests are done for sugar and proteins, photographs to study growth problems, EKG and heart ultrasound to study the heart and blood vessels, lung function tests to measure energy consumption and lung capacity, hearing tests, skin biopsy to examine cellular ch... ...uture looks promising for a treatment or cure to help these children live a longer life. Works Cited Brown WT. Progeria. In: Kliegman RM, Behrman RE, Jenson HB, Stanton BF, eds. Nelson Textbook of Pediatrics. 18th Ed. Philadelphia, Pa: Saunders Elsevier; 2007: chap 90 Nordqvist,Christian. "What Is Progeria?." Medical News Today. MediLexicon, Intl., 13 May. 2009. Web. 20 Feb. 2012. http://www.medicalnewstoday.com/articles/146746.php Parker, James N., and Philip M. Parker. Progeria: A Medical Dictionary, Bibliography, and Annotated Research Guide to Internet References. San Diego, CA: ICON Health Publications, 2004. Progeria." Progeria Research Foundation. Lustig,Megan, 14 Feb. 2000. Web. 20 Feb. 2012. . Sarkar, P., and R. Shinton. "Hutchinson-Guilford Progeria Syndrome." Hutchinson-Guilford Progeria Syndrome (2001): 312-17.

Thursday, October 24, 2019

The Big Sleep: Analytically Breakdown

The Big Sleep: Analytical breakdown The big sleep represents our class’s first exploration into what is known as â€Å"Hardboiled† fiction. The advent of Hardboiled literature means an escape from classic detective novels where all we find are ingenious investigators and mind numbing puzzles designed to impress and surprise us. In such novels, the protagonist is often observed from a third person point of view; where insight into the (genius) mind of the protagonist isn’t revealed till the end of the novel.Instead, hardboiled literature takes us on a more realistic route; solving crimes in first person with brute force investigators, rather than â€Å"Sherlock Holmes† like characters. Detective Philip Marlowe of The Big Sleep is an example of such a character. Clever, but no Sherlock Holmes; Marlowe takes on cases with good old fashion leg work and tenacity. Such is the way things are done in the real world, where all Hardboiled novels take place. The Big Sleep is no exception. A common theme often portrayed in Hardboiled novels is that of corruption.This corruption is often seen through the eyes of the protagonist, who is usually cynical and jaded because of which. The real world in The Big Sleep is a post WW1 Los Angeles, right around the time of the great depression. The effects of this time in history are clearly illustrated in many of characters represented in The Big Sleep. Here we have a world of money hungry people, who will do anything to escape such realities. This is how corruption starts. Everyone is dirty; politicians’ takes bribes, police can be bought and newspapers lie.People no longer have faith in promising futures, so they do what they have do to survive. In this sort of world, characters like Philip Marlowe are rare. At 25$ a day, Marlowe works for cheap, proving that he is above the common desire of wealth. Marlowe is depicted as man full of integrity and honor, and works simply because he feels it’ s the right thing to do. However, such a job requires him to delve into the all too real word, and so corruption is no stranger to him. Because of this, Marlowe is often jaded towards those he meets, and tends to expect the worst of people.However, this doesn’t stop him from doing what he feels is right, even if he feels that those he helps don’t deserve it. The plot of The Big Sleep revolves around a family that has become rich due an advantageous connection with oil. Marlowe is hired by General Sternwood, a bed ridden oil baron, who although is not free from corruption, has some honest qualities. The general tasks Marlowe with the task of discovering the whereabouts of Terrance Reagan, husband of the Generals daughter, Vivian Reagan. Here is where we find another common theme in Hardboiled novels, that is, the depiction of the rich.While most of America at the time is suffering due to the depression, some, such as the Sternwoods, are doing very well. However, we come to find that they too are suffering. Not physically, of course, but psychologically. It is not uncommon for Hardboiled novels to depict the rich as spoiled and often morally absent. Carmen Sternwood, for example, has grown up having everything she could possibly want, yet this leads her to becoming prone to drinking, drugs, and sexual behavior. Since their money was not earned, the Generals Daughters do not have the same respect for money as their father who earned does.Hence, they are prone to wasting their money on trivial pursuits and negative outlets. Instant gratification is their main concern. The juxtaposition of the rich is best displayed with the imagery of the old and dirty abandoned oil pumps that made the General rich in the first place. Although the exterior display of the rich is that of cleanliness (clean house, cars, clothes, etc†¦), their truer and deeper nature is closer to that of the oil fields, dirty and desolate. It is ironic that the General, owner of th e money and the closest in the family to any form of morality, is bed ridden an unable to utilize his fortune.Again, emphasizing the unworthiness of the rich. Despite the unworthiness of the rich, Detective Marlowe still agrees to help them. Although they may be unworthy of recusing, Marlowe still feels the need to rescue them, and in that way Marlowe is somewhat of a â€Å"Shinning Knight† archetype. This is hinted towards the beginning of the novel when Marlowe stares in the stain glass window which shows a knight rescuing a lady. In a way, Marlowe is tasked with saving them from the external corruption (The blackmail of Eddie Mars) of the world and the internal corruption the daughters grew up with.Marlowe maintains his knight hood by always taking the high road, and refusing to give into the seductive and nymphomanic behavior of Carman, who is constantly throwing herself at him. Detective Marlowe is very successful because of his â€Å"Knights Code†, and will even continue towards the truth even when he is not being paid. Marlowe’s tenacity for the truth takes him deeper and deeper into the dirty underworld of Los Angeles where he finds all different sorts of scum. Here we find two types of Criminal, the petty and the big time. The petty criminal is Joe Brody. Joe represents a causality of society.He isn’t one to go around killing people, in fact if things were better in the world he might have made an honest man of himself. Brody is no crime lord; he can barely feed himself; as he puts it â€Å"I’ve been shaking  two nickels  together for a month, trying to get  them  to  mate. † Eddie Mars, however, is a different man entirely. Eddie is at the top, the summation of corruption, and the direct opposite of everything that Marlow represents. As Marlowe puts it, â€Å"You think he's just a gambler. I think he's a pornographer, a blackmailer, a hot car broker, a killer by remote control, and a suborner of cr ooked cops.He's whatever looks good to him†¦he never killed anybody, he just hires it done. † A character like Joe Brody represents what happens to good people under bad influences, whereas Eddie represents the bad influence itself. One way Hardboiled novels communicate to the reader is through use of the weather and setting. In movies, it is often the music that adds dramatic flair, but in books, authors must rely on visual imagery. In The Big Sleep, for example, thunder and rain is mentioned before many of the major plot happenings.The darkness of rainclouds and cold of rain is symbolic of what Marlowe is going though as he treads through the underworld of LA, search for the truth. If you really pay attention, you might notice that pleasant weather is also used for the plot, a symbol that worst of things are over or at least getting better. Although the Major themes of this book are that of corruption and cynicism, there are also good vs. evil themes. A way of saying th at no matter how bad things are there is always hope in the form of characters like Philip Marlowe.There are people out there are willing to do what is right despite the consequences these action might inflict upon themselves. We call these types of people heroes, and I believe it is important for people like Raymond Chandler to write about characters like Detective Marlowe, especially considering the era that he wrote it in. When the world around you is dark, depressive, and inhospitable, it is important to have something or someone to idolize. Characters like Philip Marlowe help support the idea that you can still succeed with an honest heart.

Wednesday, October 23, 2019

Psychology of Adulthood and Aging Essay

Introduction   Ã‚  Ã‚  Ã‚  Ã‚   Relationship varies in people and among different issues involved. Indeed no man is an island and you are what you are today because of how people made influences to you. Maintaining a good relationship is vital in every man’s life. It serves as inspiration and a driving force to succeed in every career or goal that we want to pursue.   Ã‚  Ã‚  Ã‚  Ã‚   This research aims to discuss further relationship types and issues. Our way of living and how it affects dealing with people will also be analyzed. At the end of this paper one will begin to realize what are the responsibilities and role of every individual as they relate with every people around. Friendship   Ã‚  Ã‚  Ã‚  Ã‚   The first type of relationship is friendship. As discussed in class in this relationship type, people tend to have more friendships during young adulthood than during any other period. It is easier to deal with younger people since they are free of anxiety, envy and insecurity. Hatred is easily taken out of their minds unlike fights between adult. They are after the happiness of their playmates rather discussing petty arguments. â€Å"Children’s friendships are the training grounds for important adult relationships, including marriage† (Finding A Friend, 2000). As they grow up different preferences occurs as they began to choose the kind of friends that they will have and also during Friendships in old age are important for maintaining life satisfaction.   Ã‚  Ã‚  Ã‚  Ã‚   Friendship among adult includes three broad themes: First, Affective or emotional basis of friendship based on trust, loyalty and commitment, Shared and communal nature of friendship and Sociability and compatibility. Men tend to have fewer close friends and base them on shared activities.   Women have more close friends and base them on emotional sharing. According to psychologist Erdley and Nangle in an article of University of Maine website: Close friendships are characterized by affection, a sense of reliable alliance and intimacy the sharing of secrets and personal information. The experience of having a friend to confide in can promote feelings of trust, acceptance and sense of being understood. As a result, friendship mediates the link between acceptance and loneliness. (Finding A Friend, 2000).   Ã‚  Ã‚  Ã‚  Ã‚   Trust is really vital in any relationship this is a strong foundation especially during your maturity years and you need somebody to rely upon. Your loyalty is really the basis as to up to what extent your friendship will last. It is also a commitment that requires integrity with each other on secrets and when businesses are already included. As you build trust you can easily gather people of common interest with what you have, from here enters the second theme of adult friendship. Sharing the same nature of likes and dislikes brings a more sense of belongingness and acceptance. From those commonalities, it leads to the third theme as you begin to adapt social responsibility as a friend. â€Å"Unlike close friendships, peer group acceptance offers children a sense of inclusion. Both social relationships offer nurturing and self-worth. But while peer acceptance influences children’s feelings of belonging, friendships directly affect feelings of loneliness† (Finding A Friend, 2000). Sibling Relationship   Ã‚  Ã‚  Ã‚  Ã‚   Most of our time is spent outside mingling with our peers but more important are those people whom we see upon arriving home. Blood relation is indeed more greater since they are the ones who stood by us after we are given birth. Sibling relationships are important and among the closest relationships. There are five types of sibling relationships that have been identified in class these are: Congenial or having the same disposition and desired things in life siblings who live with congenial relationship results in a more harmonious way of living as they associate the likes and feelings on one another., Intimate sibling relationship is more delicate and sweet in the truest sense they are after the concern of each other while the third type is in contrast with the first since apathetic type of sibling relationship is more spiritless and indifferent with the feelings of their siblings. Lastly is more of antagonistic approach since being Hostile to their siblings is because of certain malevolence and interest to family property.   Ã‚  Ã‚  Ã‚  Ã‚   Sibling relationship is indeed the most important on any relationship since they are the ones who stood beside us right after birth hence sibling rivalries makes the situation worst at times. This is considered as the rocky part of family relationship since jealousy and envy takes place between brothers and sister over affection, time and material things.   Ã‚  Ã‚  Ã‚  Ã‚   Children are sensitive from the age of one year to differences in parental treatment and by   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   three years they have a sophisticated grasp of family rules and can evaluate themselves in relation to their siblings (Mersky Ledder, 1993).   Ã‚  Ã‚  Ã‚  Ã‚   This is also explained by psychologist Freud as he states:   the sibling relationship is an extension of the Oedipus complex, where brothers were in competition for their mother’s attention and sisters for their fathers (Mitchell, 2003). And since sibling rivalry is part of every family it happens once in a while but siblings manage to fix things over quicker with the aid of parents. Love Relationship   Ã‚  Ã‚  Ã‚  Ã‚   Next relationship taken up is Love relationship where Passion, intimacy, and commitment are the key components.   Selecting a mate works best when there are shared values, goals, and interests. Passion is important to keep the romance alive and be more sweet to your love one. Intimacy is having the same extent of emotion and shared interest while commitment is being responsible to your partner and where fidelity takes place. The best way to love according to one love website is to :Love deeper. We love others to the degree we love ourselves (Self Creation, 2008).   Ã‚  Ã‚  Ã‚  Ã‚   Part of loving one’s self is accepting (being okay with) who we are. Consequently, we   Ã‚   love to the degree we’re happy. While we are unhappy and attending to our fears, we do   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   not love. The self is always crying out for acceptance. When we deny ourselves that   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   acceptance, life gets twisted. Our attention gets sucked into a void inside ourselves,   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   leaving nothing left to give to another (Self Creation, 2008).   Ã‚  Ã‚  Ã‚  Ã‚   Love and acceptance goes hand in hand in order to maintain a good love relationship. Communications is also important to know each others feelings and it is better to find a mate who shares the sane set of values and beliefs to avoid any further arguments. If love is not taken care of properly violence in the relationship may occur and worsen the scene. Violence in Relationships   Ã‚  Ã‚  Ã‚  Ã‚   Violence in Relationships contains levels of aggressive behavior range from verbal aggression to physical aggression to murdering one’s partner.   The causes of aggression become more complex as the level of aggression increases.   People remain in abusive relationships for many reasons, including low self-esteem and the belief that they cannot leave.   Ã‚  Ã‚  Ã‚  Ã‚   Insecurity and obsession merely causes violence in relationship. A person greatly obsessed tends to take ownership on his partner and don’t want anybody to get into their way. Insecurity makes a person think of ways to secure his/her partner so that no one will have the power to get into the scene. Low self-esteem causes lack of confidence. Hence this violence can be avoided if only trust is preserved in the relationship.   Ã‚  Ã‚  Ã‚  Ã‚   However, violence in a relationship can be classified into three: Physical, Sexual and Emotional Abuse. Physical Abuse involves kicking, hitting, hair pulling, spitting, biting, pushing, shoving, beating with weapons and murder (Understanding Violence, 2008).   Ã‚  Ã‚  Ã‚  Ã‚   Sexual Abuse occurs when forced or coerced sex, unwanted touching, sexual accusations, unwanted sexual acts and Emotional Abuseises extreme possessiveness and jealousy, name calling, put downs, manipulation and control, isolation from friends and family, threats of suicide, threats against your life or to harm loved ones and pets, destruction of property (Understanding Violence, 2008).   Ã‚  Ã‚  Ã‚  Ã‚   Abuse and neglect of older adults is an increasing problem. This can be also considered as violence in a relationship since the feelings of adult people is being put at stake. The feeling of rejection and neglected to be taken care of is really hurtful to its very extent. Singlehood   Ã‚  Ã‚  Ã‚  Ã‚   According to our class lecture,   Approximately 75% of men and 60% of women are single between the ages of 20 and 25.   People remain single for many reasons; gender differences exist.   Singles recognize the pluses and minuses in the lifestyle.   Ã‚  Ã‚  Ã‚  Ã‚   The freedom that one may gain being single is irreplaceable since no one is dominating your life and you don’t need to think of giving consideration to any ones feeling since you are only depending on your individuality. Cohabitation   Ã‚  Ã‚  Ã‚  Ã‚   In this kind of relationship couples are living together without any legal or moral consent. People in committed, sexual relationships lives together and is now becoming an increasingly popular lifestyle. This up to date trend is not healthy but can be considered a trial and error relationship to determine the characteristics of your companion before jumping into marriage.   Ã‚  Ã‚  Ã‚  Ã‚   However, such measures should be taken loosely, as researchers report that cohabitation   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   often does not have clear start and end dates, as people move in and out of each other’s   Ã‚  Ã‚  Ã‚   homes and sometimes do not agree on the definition of their living arrangement at a particular moment in time (Manning & Smock, 2005). Homosexual Relationship   Ã‚  Ã‚  Ã‚  Ã‚   Most countries prohibits this kind of relationship since it is ruled with morality and ethical issues. But gay male and lesbian couples are similar to married heterosexual couples in terms of relationship issues.   The issue here is how open is the society to accept the validity of their relationship. Since in the present generation there are laws made to allow marriage of same sex couples. Marriage   Ã‚  Ã‚  Ã‚  Ã‚   The validity of a relationship is often measure through the legality of Marriage. The most important factors in creating stable marriages are maturity, similarity, and conflict resolution.   Marital satisfaction is highest at the beginning, falls until children leave home, and rises again in later life. Failure in marriage results to emotional damages and may lead into divorce. There are also instance when you find that there is someone else whom you should have marry instead of the one you are currently attached. This is the time where divorce and remarriage takes place. Divorce and Remarriage   Ã‚  Ã‚  Ã‚  Ã‚   Although most couples intend their marriages to last, roughly half will end in divorce.   Divorce is not viewed as negatively as it once was and expectations about marriage have increased.   Gender differences are found in adjustment; men have more short term problems but women have more long term problems including financial difficulties.   Most divorced couples remarry. Widowhood   Ã‚  Ã‚  Ã‚  Ã‚     Widowhood is more common among women because they tend to marry men older thank they are.   Widowed men are typically older.   Men generally have problems in social relationships and in household tasks.   Women tend to have financial problems Reference: Finding a Finding a Friend: Children’s Friendships Training Ground for Adult Relationships (2000). University of Maine Website, Retrieved, January 23, 2008 from: http://www.umaine.edu/mainesci/Archives/Psychology/Friendships.htm Manning, Wendy and Smock, Pamela (2005). â€Å"Measuring and Modeling Cohabitation: New   Ã‚  Ã‚  Ã‚   Perspectives from Qualitative Data.† Journal of Marriage and Family 67(4):989-1002. Mersky Leder, Jane (1993). Adult Sibling Rivalry. Psychology Today. January-February Issue 1993. Mitchell, Juliet (2003). Freud Lecture. Retrieved January 23, 2008 from: http://www.freud-museum.at/e/inhalt/wissenJulietMitchell2003.html Self Creation (2008). Be Selfish in love. Retrieved, January 23, 2008 from:   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://www.selfcreation.com/love/index.htm Understanding Violence in a Relationship (2008). What is Violence in a Relationship. Retrieved   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   January 23, 2008 from:   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://www.chebucto.ns.ca/CommunitySupport/Men4Change/violencerelate.html   

Tuesday, October 22, 2019

Hannaford Bros. Cyber Security Lessons Learned Essays

Hannaford Bros. Cyber Security Lessons Learned Essays Hannaford Bros. Cyber Security Lessons Learned Paper Hannaford Bros. Cyber Security Lessons Learned Paper Introduction Virtually every business today uses at least one form of computer information technology. Business firms use computers to automate and assist in managing everything from operations, sales, finance, and logistics. Internal databases and intranets are used for internal controls and organizations are connected via the internet to conduct sales, marketing and many other communications and transactions. Electronic business, or e-business, is dominating modern markets and the business world. This new world of technological innovation has exponentially increased efficiency and globalized the world’s economies. Unfortunately criminals still exist and continue to exploit businesses, committing acts of theft, vandalism, and terror. E-business is not immune to criminal mischief and in fact can be quite vulnerable to sophisticated cyber criminals known as hackers. In early 2008 it was reported that the North East Supermarket mogul, Hannaford Bros. Company fell victim to a computer hacking attack that compromised approximately 4. 2 million customer credit cards. This act created a financial nightmare for thousands of consumers and for the Hannaford Bros. grocery company. The incident was a black mark on Hannaford’s public image and a financial burden to their corporation. Cyber Security is a growing priority of today’s business leadership. Boon, Kurtz (2011) Hannaford Bros. Co. Hannaford Bros. is an upscale North American grocery retail chain headquartered in Scarborough, Maine. Hannaford was founded in 1883 and now runs supermarkets throughout New England and upstate New York. Hannaford is owned by the American subsidiary of the Belgian Delhaize Group, Delhaize America, the parent company of Food Lion which operates over 1,500 stores on the East Coast, mostly in the Mid-Atlantic States. : The Hannaford Bro. Website (2011), The Delhaize Group website (2011) Hannaford Bros. administers a comprehensive website for their grocery chain. The Hannaford website found at: hannaford. com/home. jsp offers customers a wide range of shopping and food related planning activities. Hannaford does not offer their grocery products for delivery on their website; rather they make all of their grocery and pharmacy products available for customers to browse and purchase for pick-up. Customers can easily navigate through categorized product lists with eye catching visual cues. Products can be places on a virtual shopping list that the customer can use in the store or purchase on-line to be picked up at their nearest local store. Coupons and sales discount promotions are also readily available and easy to find on the website. Hannaford also gives customer’s options and assistance for planning different types of parties and organizing shopping lists. The primary services provided by the website in addition to on-line browsing and ordering of groceries includes pharmacy prescription refills, ordering gift cards, special orders, and Redbox video rentals. Instead of promoting broad scale on-line shopping and delivery like other supermarkets and on-line retailers, Hannaford uses their website to draw people to their stores and make the shopping experience easier and more appealing. The Hannaford Bro. Website (2011) Hannaford Bros. displays numerous lines of communication on their website. Their contact information is found thorough a â€Å"contact us† tab on the home page. The Hannaford Corporate office address and several 1-800 customer service phone numbers are listed. There are also several online feedback forms for customers to give Hannaford feedback and ask questions about their products and services. Hannaford even offers the advice and expertise of nutritionist for customer questions and concerns. The Hannaford Bro. Website (2011) The Hannaford Bros. website is designed and maintained with meticulous detail. Hannaford Bros. online marketing strategy is simple; to give customers a warm and inviting way to make their shopping experience easier and more pleasant. Hannaford Bros. is easily accessible through simple search engine searches and is then easy to navigate for even the most novice web users. The company is targeting people who shop for groceries the most, families. The visual colors and photographs are geared towards women and create a warm and enticing mood. Hannaford creates a competitive advantage for them by offering the shopper planning services to their customers. They are not just a cold internet retailer where somebody logs in to buy products and leaves. The website creates an environment that endears people to their stores. The Hannaford Bro. Website (2011) The Security Breach and Hannaford Bros. Reaction On March 17, 2008 Hannaford Bros. Co announced that it had been the victim of a computer hacker attack against their computer network. The Hacker, Albert Gonzalez , who was eventually arrested and sentenced to 20 years in prison had accessed Hannaford’s network and stole approximately 4. 2 million credit and debit card numbers between Dec. 7 2007 and March 10 2008. The security breach affected all of Hannafords stores in New England and New York, as well as subsidiary stores under the Sweetbay name in Florida and several independently owned stores selling Hannaford products. The data breach forced banks across the East Coast to block and reissue hundreds of thousands of credit and debit cards. Jaikumar Vijayan (2008) The State of Maine Bureau of Financial Institutions website (2011) Hannaford later posted an advisory on their web site signed by President and CEO Ronald Hodge, stating that the grocer had contained the illegal intrusion after being made aware of suspicious credit card activity on Feb. 27. The advisory stated that credit and debit card numbers as well as expiration dates were taken from Hannafords network while the data was in transit for transaction processing. Ronald Hodge went on to apologize for the compromise and the inconvenience to the consumers, but also urged the consumers that Hannaford had been upholding the highest standards of cyber security. Hodges ended his statement with assuring customers that Hannaford would work with the banks in rectifying the situation and would double their efforts in increasing their security measures. Hannaford immediately shut down all links on their website after the disclosure of the security breach. Hannaford launched an investigation into the matter and worked diligently to rectify all weaknesses in their cyber security system. Jaikumar Vijayan (2008) Analysts claim that Hannaford like many other retailers did not encrypt the credit and debit card data collected from customers during financial transactions. This allowed the hacker to easily steal the data once he discovered a back door into Hannaford’s system. Hannaford was quickly served with a massive class action lawsuit claiming Hannaford was negligent in protecting consumer data. Jaikumar Vijayan (2008) Hannaford’s website now offers a highly in-depth and comprehensive privacy policy page with multiple links to detailed explanations of their privacy and security procedures. Hannaford now goes out of their way to inform the consumer and provide protection against any other possible security breach of financial information. It appears that Hannaford Bros. has been very thorough in controlling the damage to their image and maintain their brand identity and good will with their customer base. The Hannaford Bro. Website (2011), The State of Maine Bureau of Financial Institutions website (2011) Cyber Security Methods and Procedures for Protecting Customers Cyber Security is a growing responsibility for business leaders in today’s market. Not only do corporations and small businesses need to protect their own financial and proprietary information, they need to protect the data of their customers. In fact cyber security is now a strategic decision point not only in business technology but in the business planning cycle as whole. Business firms now have to continually analyze the dangers and work together to combat the growing cyber threat. Business leaders should take strategic steps towards combating the cyber threats. Michael Neumann (2008), Boon, Kurtz (2011) The first step in combating cyber threats is to maintain an accurate and comprehensive data analysis team to continually monitor and track past, current, and emerging cyber threats. The next step in the process should be the establishing and maintaining evolving industry guidelines and procedures to define and combat the cyber threats. Without a united front against cyber threats, business firm security specialists will not be properly equipped to keep up with the threats. Another key step in the process of countering cyber threats is establishing critical infrastructure benchmarks, defining and actively working against cyber threats. Ultimately, fighting cyber threats is much like fighting against global terrorists. Business leaders must protect their greatest assets, their customers against the attacks from cyber criminals. Michael Neumann (2008), Boon, Kurtz (2011) Conclusion Hannaford Bros. like many other corporations learned firsthand the damage one person with a computer could commit against their business. The hard lessons learned were not to take for granted the capabilities of cyber criminals and the negative possibilities of their actions. Cyber security is strategic priority not only for corporations but for small business owners as well. Business leaders must stay vigilant and cognizant of the impending and emerging threats to their livelihood and maintain their responsibility to the consumer. References 1)Boon, Kurtz (2011) Contemporary Business, New Jersey, John Wiley Sons Inc. 2)The Hannaford Bro. Website (2011) Retrieved from: hannaford. com/home. sp 3)The Delhaize Group website (2011) Retrieved From: delhaizegroup. com/en/PublicationsCenter/PicturesandBiographies/Stores. aspx 4)Kim Zetter (2010) Hacker Sentenced to 20 years for Breach of Credit Card Pocessor. Retrieved from: wired. com/threatlevel/2010/03/heartland-sentencing/#more-14740 5)Jaikumar Vijayan (2008) Update: New retail data breach may have affected millions of Hannaford shoppers. Retrieved from: computerworl d. com/s/article/9068999/Update_New_retail_data_breach_may_have_affected_millions_of_ Hannaford_shoppers )Jaikumar Vijayan (2008) Hannaford hit by class-action lawsuits in wake of data-breach disclosure. Retrieved from: computerworld. com/s/article/9070281/Hannaford_hit_by_class_action_lawsuits_in_wake_of_data_breac h_disclosure 7)Michael Neumann (2008) The Rand Corporation: Cybersecurity Economic Approaches and Challenges to Decision Making. Retrieved from: rand. org/pubs/research_briefs/RB9365-1/index1. html 8)The State of Maine Bureau of Financial Institutions website (2011) Retrieved from: http://maine. gov/pfr/financialinstitutions/data_breach