.

Thursday, October 31, 2019

Staffing & Talent Management F12 Assignment #3 Essay

Staffing & Talent Management F12 Assignment #3 - Essay Example Most organisations in today’s world are high profit seeking business partners. They have their plans, objectives and actions aligned with financial goals in mind. Therefore for such organisation, strategic monitoring of performance by the leadership is very important. This is the contribution area registering the contribution made by employees in the area of their core competency. This accounts for the main work that give the organisation its â€Å"bread butter†. For an IT organisation, it is developing applications, building software, providing software solution consultancy etc. For manufacturing companies it could be throughput of manufacturing operation, reduction of waste, optimisation of processes. For a public service company it could be generating ideas related to a particular field, implementation of internal projects, ability to cut down on departmental expenses etc. This is the leadership contribution area responsible for training and development of staff. This parameter is necessary for understanding the impact of leaders on their team and peers. It measures training and motivation efficiency, it calibrates and provides a benchmark for trainings to be taken and leadership roles to be undertaken in order to ensure growth of the organisation. It is a crucial area that registers responsibilities taken over and above current responsibilities. It encompasses the qualities of ownership, accountability, customer satisfaction and dedication towards achieving 100 % customer satisfaction score keeping in mind larger topics like: future business, long term goals, long lasting customer relationships, joint efforts, partnerships, forecasted future financial benefit etc. Value Creator contribution area also records the value addition that an employee brings to his work through added effort out of the set of assigned results. Apart from

Monday, October 28, 2019

Naturopathic Medicines over Pharmaceutical Medications Essay Example for Free

Naturopathic Medicines over Pharmaceutical Medications Essay For World Health Organization (WHO), health of an individual is not only means of getting rid of physical illness or pain but involves complete mental and social wellbeing of an individual. It is muti-dimensional and involves various aspects including social environment of a person or a society. Still eighty per cent of people are heard complaining about one or the other health problems and only one percent of people are in according to the WHO definition really healthy. Among several factors, it’s the departure of the people from our age-old system of naturopathic treatment towards hyped Pharmaceutical Industry – a product of Industrial revolution. Dr. Mathias Rath, a German-based advocate of patients’ rights and author of the book, â€Å"Why Animals Don’t Get Heart Attacks-But People Do†, rightly said, â€Å"There is an entire industry with an innate economic interest to obstruct, suppress and discredit any information about the eradication of diseases†. (Faseyin, 2004) He condemned millions of people who are eager to pay billions of dollars to the pharmaceutical industry for medicines that never cure rather kills. Pharmaceutical industry is earning more than one trillion dollars by selling drugs promising cure of various diseases and are being marketed at a cost more than 55,000 percent of the raw materials, bringing profit to the whole pharmaceutical industry and the people attached to it but without any concern to the health of the people. These drugs are merely removing symptoms instead of curing. As a result, more people are finding themselves facing deathbeds even from the preventable diseases. For e.g. few centuries back, James Lind had found that deficiency of vitamin C can cause blood loss and scurvy but still pharmaceutical industries dealing with medicines promising the cure of cardiovascular diseases are not supplying this information. The official RDA for vitamin C set at 60 mg is also not enough to prevent the disease. And the reason is the attitude of the pharmaceutical industry that looks at the cost effectiveness of the medicines rather than the health of the citizens; naturally they find vitamin C as an unprofitable venture for the pharmaceutical industry. Allopathic medicines can cure acute illnesses very effectively and pharmaceuticals and artificial respiration has also saved lives of millions.   But if we count the side effects, these are more than the actual benefits. Several cases have come to light when patients have suffered from pneumonia and acute physical dysfunction arising from the continuous use of steroid medication. Patients can also lose normal intestinal flora and can develop acute digestive problems. Nature has bounteous wealth of healing powers in its lap, which our ancient healers had fruitfully utilized, to the advantage of the patients. Naturopathic medicines go deep into cleaning of our immune system, healing hormonal, nervous systems and detoxifying them and eliminating diseases from its roots thus taking care of patient’s complete health. Medieval Jewish writer, Maimonides reflected Plato’s concept of health, when he said, â€Å"The cure of many diseases is unkown to the physicians†¦ because they are ignorant of the whole (body and soul) which ought to be studied also; for the part can never be well, unless the whole is well. For all good and evil, whether in the body or in the human nature originates†¦ in the soul, and overflows from thence†¦ and therefore if the head and body are to be well, you must begin by curing the soul; that is the first thing.† (Vaux Stenberg 2002) Underlying principles of healing on which the naturopathic medicine is based makes it different from all other medical approaches. Naturopathic doctors take the individual’s biochemistry, biomechanics, and emotional predispositions into account while prescribing medicines.   The body’s self-healing takes into consideration various aspects of body control and strive to maintain the biological balance of the body, which is a very crucial aspect of a healthy body. The holistic or naturopathic way of healing works in combination of best scientific diagnosis methods and monitoring techniques with both ancient and innovative health promotion methods. These methods involve use of natural diet and herbal remedies, nutritional supplements, exercises, relaxation, psycho-spiritual counseling, meditation, breathing exercises, and other self-regulatory practices taking into consideration history of patient’s health and his current life including family, job, and religious life and believes in basic concept that food and nutritional supplements are the best medicine. It focuses on prevention of diseases, maintaining high-level wellness and longevity. Besides, naturopathy beckons patients to be an active participant in his or her own healing process, rather than merely becoming a passive recipient of treatment. Naturopathy deals with specific individual needs, and involves in healing process of body, mind and soul. It is quite true that to understand about the illness, knowing about mere physical symptoms are not enough but emotional aspects of patient should also taken care of. Therefore naturopathic treatment is also called as a science of life as it regulates and maintains chemical activities in the brain, controls rhythm of heart, blood pressure, resistance power of skin and other functions inside our body.   It helps persons to overcome anxiety, depression, irritability, improve memory, create emotional stability, and proves to be a healing power for our old traumatic experiences and over and above rejuvenates our lives by giving us energy and vitality. There are several herbs that have multiple uses for human body. People have been growing herbs since centuries and their medicinal properties even challenge the practitioners of medicines of today. Our ancestors were growing the herb plants in their homes. Many evidences have come to light, which show that early settlers had grown herbs like parsley, anise, pennyroyal, sorrel, watercress, liverwort, wild leeks, and lavender across America and in other parts of the world also. They are still grown in many houses all over America and their proper use can relieve the patients from number of diseases. They are many more herbs like ginger, which reduces the chances of heart attack and act as a protective cover for heart and blood vessels. (Naturals Herbs Guide Online) In 1983, World Health Organization suggested to incorporate naturopathic medicine in conventional health care systems. In 1994, Bastyr University of Natural Health Sciences, received grant of   $1 million funds from the National Institutes of Health’s Office of Alternative Medicine to facilitate the research for alternative therapies to cure the patients affected with HIV and AIDS. The diet for cancer patients recommended by the National Cancer Institute was first published in a naturopathic medical textbook in the 1940s. Government of Germany has made it mandatory for conventional doctors and pharmaceuticals also to undergo formal training in naturopathic techniques, as they are cost-effective. (Morton Morton 1997) Graduates of naturopathic colleges have to put in more hours of study in basic and clinical science than their counterparts in Yale or Stanford medical schools and they receive more training in therapeutic nutrition than Md.’s, osteopathic physicians, or registered dietitians. In United States alone, there are more than one thousand licensed naturopathic physicians and many provinces of Canada also issue licenses to naturopathic doctors as primary care physicians and it is expected that by the end of 2010, all fifty states will start issuing licenses to naturopathic physicians. (Alan Morton, Marry Morton 1997) There are many more healing techniques like Chiropractic, Ayurvedic Medicine, Therapeutic Massage, Traditional Chinese medicine (TCM)/ Chinese Medicine, Acupuncture, Acupressure, Atlas Orthogonal, Chelation Therapy, Colonics, Psychotherapy/Counseling, Movement Therapies/ Dance, Holistic Dentistry, Ear Candling- Ear Candling/ Ear Coning/ Thermal-Auricular, Feng Shui, Flower Essences (Bach Flower Remedy), Herbalism, Hypnotherapy, Lymph Drainage Therapy, Ohashiatsu and Vitamin Therapy, whose basic principles and remedies lie in the various ingredients found in the nature. So why not fully utilize what the nature has given to us as only with the healthy body, there is healthy mind and only healthy mind can lead the world towards healthy living. REFERENCE LIST Faseyin A.Y.   2004. The Pharmaceutical Cartel: A Tool for Genocide. Retrieved on February 10, 2008 from W.W.W: http://newafrikanvodun.com/pharm.html. Grout M.M. Allopathic Medicine. Retrieved on February 10, 2008 from W.W.W: http://www.crossroadsclinic.net/articles/allopathic_medicine.html Morton M. A. Morton M. 1997. Naturopathic Medicine. Retrieved on February 26, 2008 from W.W.W: http://www.healthy.net/asp/templates/article.asp?PageType=ArticleID=508 NaturalHerbsGuide.com. Natural Herbs, Herbal Remedies, Medicines, and Supplements Guide. Retrieved on February 26, 2008 from W.W.W: http://www.naturalherbsguide.com/ Vaux K.L. and Stenberg M. 2002. Covenants of Life: Contemporary Medical Ethics in Light of the thought of Paul Ramsay. USA: Kluwer Academic Publishers.

Saturday, October 26, 2019

Overview of the Data Protection Act

Overview of the Data Protection Act Task 2 For the purpose of this task. I am going to do the following: I am going to discuss the Data Protection Act. I am going to discuss what the data protection is. I am going to discuss the rights to a persons personal protection. I am going to look at the aims to their rights. I will identify the rights of people in relation to the data protection, and give eight samples. I will look at when these rights do not apply. I will discuss how a person can have access to their details. I will discuss the role of the Data Commissioner. I will also discuss the role of the Data Receiver. The role of the Data Controller will also be discussed. I will give two examples of breach of data legislation relating to healthcare. 1. What is Legislation? Legislation governs communication in Ireland concerned with communication freedom of information act. It was amended in 2003 and is called the Data Protection Act. What is the Data Protection When you give personal details to an organisation or individual, they have a duty to keep these details private and safe. This process is known as Data Protection. They refer to organisations or individuals who control the contents and use of a persons details as data controllers. Most people give information about themselves to groups such as Government bodies, i.e, banks, insurance companies, medical professionals and telephone companies to use their service or meet a certain source. Under data Protection Law, you have the rights regarding the use of these personal details and data controllers have certain responsibilities in how that handle this information. Identify the rights of people in relation to Data Protection: The right to have your details used in line with Data Protection Regulations. The right to information about your personal details. Thee right to prevent the use of your personal details. The right to change or remove your personal details. The right to remove your details from a direct marketing list. The right to refuse direct marketing calls or mail. The right to object. The right to freedom from automated decision making. When have you the right to Data Protection? You Have the right to Data Protection when your details are: Held on a computer. Held on paper or other manual form as part of a filling system. Made up a photograph or video recordings of your image or recordings of your voice. What are the aims of these rights? Data Protection rights will help you make sure that the information stored about you is Factually correct. Only available to those who should have it. Only used for stated purposes. When do Rights not Apply? The rights does not apply, however, in a small number of cases, where it could harm certain interests for example, when someone ids investigating an offence. How do I request access to my details? You can ask for a copy of all your personal details by writing to any organisation or any You can also ask the Data Controller to inform you of any opinions given about you, unless the Data Controller considers that the opinions are confidential. Even in such cases, your rights to such information will usually be greater than the right of the person who gave this information will usually be greater than the right of the person who gave this opinion in private. 8. What is the Role of the Data Commissioner? The role of the Data Commissioner aims to make sure that those rights are being upheld and that Data Controllers respect data protection rules. Summary proceedings for an offence under the Data Protection Act may be brought and prosecuted by the data Protection Commissioner. The Role of the Data Controller: A Data Controller is the individual or the legal person who controls and is responsible for the keeping and use of personal information on a computer or in structured manual files. Will keep or process any information about living people. They are responsible for the personal data which it holds. They decide what personal information is going to be kept. They decide the use to which the information will be put. The Role of the Data Receiver. A Data Receiver is a person who provides personal information about themselves to a variety of organisations for a whole range of purposes i.e, when you go to the doctor you give him/her information about yourself, name, address, date of birth, if you have children, and your phone number. Give two examples of Data Legislation: Sample One: The office received a complaint from a solicitor acting on behalf of a data subject concerning the alleged further proceedings of the complaints personal data contained in medical records held by her General Practitioner (G.P.). It was alleged that medical records relating to the complaint were released to an Insurance Company by her G. P, following a request made to her G.P. The complaint stated that the G.P, had received a request from an Insurance Company, seeking the complainant medical records, relating to a knee injury she had suffered. It was alleged that, in replying to this request, the G.P, not only realised data relevant to the knee injury, but also disclosed other sensitive medical information including cervical smear test results, colposcopy, correspondence regarding lesions and records relating to Carpel Tunnel Syndrome, none of which were related to the knee injury. We wrote to the G.P, and we asked that he provide an explanation as to what had occurred in this case. He responded stating that an Insurance Company had requested relevant information with respect to the patient concerned and her knee injury. He informed us that the request received, stated that it required copies of clinical consultations/surgery notes, investigations and associated results, treatments, referrals, out-patients appointments and repeat prescriptions from 18 02 2009 to the present date. He stated that, inadvertently, copies of the patient records were supplied to the Insurance Company with some details which were not relevant to her knee injury and that this was obviously an oversight. He stated that he was deeply sorry that he has caused any distress or upset to his patient, whom he has known for thirty-five-years. The G.P, stated that the company knew he always endeavoured to keep high standards in the practice and that she should understand his disappointment that the system used in releasing this information fell below that standard expected by the complainant and himself. He further stated that he hoped that she would accept his unreserved apology for the inadvertent disclosure of her records to the Insurance Company and that he completely understood how upset and appointed she must be. He said that since this unpleasant and unfortunate error he had overhauled his practice procedures. We wrote to tell the solicitor for the complainant outlining the G.Ps response and also conveying the G.Ps apologies. We stated that this offices approach to complaints is to try to seek an amicable resolution to the matter which is the subject of the complaint and we asked if his client would like to try to reach an amicable resolution of the complaint. They responded stating that their client wished for a formal decision of the commissioner on the matter. In considering this case, the key issues from a Data Protection perspective was the issue of consent. It was noted from the material provided that the complainant had completed and signed an insurance claim form which contained the following consent clause: I authorise Financial Insurance Company Limited (the underwriters) to make any enquires and get any information they consider relevant from my doctor, employers or elsewhere. I understand that I must provide evidence to Financial Insurance Company Limited to prove my claim form. On the same claim form, the complainant supplied details of her accident and explained as follows, Why it prevented her from walking? left knee injury, tore ligaments, recovery time unknown, waiting for knee surgery, on waiting list. The Insurance Company concerned had sought the complainants medical records, supplied the relevant consent form and used the following terms in its request to the G.P.: Can you please provide us with copies of the claimants medical records relevant to this claim. This includes all records relating to the medical conditions and associated symptoms which are subject of this claim. It was clear from the Insurance Companies request for medical records that it sought medical records relevant to the claim only. As the claim related to the complainants knee injury, the medical records sought related to that injury and the request did not extend beyond that. Equally the complainants consent authorised the Insurance Company to make injuries and to get any information concerned relevant from her doctor and others. The consent was clearly limited to relevant information and it could not be interpreted as extending to all medical records held by the G.P. This office issued a decision on this complaint which stated that the commissioner was of the opinion, following the investigation of this complaint, that section 2 (1) (C) (ii) of the Data Protection Acts, 1988 2003 had been contravened by the G.P, by the further processing of the complainants sensitive Personal Data in the form of medical records unrelated to her knee injury. The contravention occurred when the G.P, in responding to a request from and Insurance Company, disclosed to that Insurance Company certain medical records of the complainant without her consent.

Thursday, October 24, 2019

Michael Crichtons The Lost World Essay -- Michael Crichton Lost World

Michael Crichton's The Lost World I read Michael Crichton's The Lost World. In the following paragraphs, I will not only explain the book, but also give my critique of it. I will also give a paragraph that was probably the best paragraph in the book, in my opinion. The book starts out with Ian Malcolm, a mathematician who had already had an experience with live dinosaurs a couple of years ago on another island. He has pretty much blocked that experience from his mind. Anyway, it also talks about a man named Doctor Levine. This man talks at a lecture that Malcolm is watching about the theory of there being a lost world, an island, undiscovered, that has extinct animals on it, particularly dinosaurs. Malcolm dismisses this idea saying that is the dumbest thing he ever heard. After the lecture, Levine talks to Malcolm to help him in finding this "Lost World." Malcolm again dismisses him. After a couple weeks of Levine nagging him, he sort of gets more into the idea, and starts to believe it. Levine Narrows it down to one island, Isla Sorna, and just leaves without telling anyone. Two of Levine's students, Kelly and Arby, get worried when he wasn't there to teach their class, because they were supposed to go on a field trip with him that day. They go to a guy named Doctor Thorne, a guy that was making specialized equipment for their trip. He said that he didn't know what was going on. They contact Malcolm and they go to Levine's apartment. They go to his computer room and see all this stuff on the wall about site B. They go onto the computer and Arby gets all this stuff about site B on it. Malcolm then finds out that the island that Levine went to was Isla Sorna. They plan this whole trip to go there, just Malcolm, Thorne, and Thorne's assistant, Eddie. They also call a woman named Sarah Harding, a scientist in Africa, to come with them. She had to take a flight in a while, she was too far to just go with them. They told the kids that they couldn't go. They leave for a helicopter with a specialized explorer, and two trailers, with a lot of equipment. On the way there, Thorne gets a call from Arby saying good luck. They get to the island and search for Levine, with this device they have, the find him and go back to the trailer. Before the go back, you find out that that Kelly and Arby hid in a compartment in the trailer. The... ...ey take the boat off the island, and go home. I think the only weakness of the book is that it is too much like the first book, Jurassic Park. â„ ¢ The characters have similar strengths and weaknesses, two kids, etc. I also thing that there are numerous strengths to the book. It was very compelling, and some nights I'd be up until stupid hours in the morning reading it because I couldn't put it down. It was a thrilling book. It kept you wanting more. A particular passage which impressed me was PP 422 & 423, Chapter Exit, the whole chapter. I particularly liked this chapter because it sort of turned the table on humans. We always think we are superior to every other animal in the world, always taking them for granted, killing them and eating them. The T-Rex brings Dodgson back to the nest for the babies to eat, sort of like when a bird brings a worm home for its babies, only we're the worms. In conclusion, I really liked this book, it is my favorite book now. I would definitely recommend it to anyone. No matter what they are interested in. I didn't read Jurassic Park, â„ ¢ but I am definitely going to, and I can't wait to see the Lost World â„ ¢ on the big screen.

Wednesday, October 23, 2019

Effective Leadership Essay

Being an effective leader means learning who you are and what you stand for, and having the courage to act on your values. Moral leadership is quite similar to the concept of servant leadership in that the emphasis and the reward are based in doing for others. A leader serves using an ethical foundation which is then adapted and acted on by followers within the organization. Moral leadership describes how leaders make decisions according to beliefs about right and wrong. A system of morals, or beliefs, is also very personal to leaders. Dr. Martin Luther King Jr., displayed courage and moral leadership; Martin Luther King Jr. was born in Atlanta, Georgia, the eldest son of Martin Luther King Sr., a Baptist minister and Alberta Williams King. King attended local segregated public school. He entered Morehouse College at the age of 15 and graduated with a bachelor’s degree in sociology in 1948. After graduating with honors from Crozer Theological Seminary in Pennsylvania in 1951, he went to Boston University where he earned a doctoral degree in systematic theology in 1955. Throughout his education, King was exposed to influences that related Christian theology to the struggles of oppressed people. Dr. Martin Luther King Jr., operated on moral leadership, distinguishing right from wrong and doing right, seeking the just, the honest, the good, and the right conduct in achieving goals and fulfilling purpose. In May of 1963, Martin Luther King Jr., and his Southern Christian Leadership Conference staff escalated anti-segregation marches in Birmingham by encouraging teenagers and school children to join. Hundreds of singing children filled the streets of downtown Birmingham, angering Sheriff Bull Connor, who sent police officers with attack dogs and firefighters with high-pressure water hoses against the marchers. Scenes of young protesters being attacked by dogs and pinned against buildings by torrents of water from fire hoses were shown in newspapers and television around the world. During the demonstration, King was arrested and sent to jail. He wrote a letter from his jail cell to local clergymen who had criticized him for creating disorder in the city. His â€Å"Letter from Birmingham City Jail† which argued that individuals had the moral right and responsibility to disobey unjust laws, was widely read at the time and added to King’s standing as a moral leader. The demonstration forced white leaders to negotiate and end some form of segregation in Birmingham. Even more important, the protest encouraged many Americans to support national legislation against segregation. Martin Luther King Jr. and other black leaders organized the 1963 March on Washington, a massive protest in Washington, D.C, for jobs and civil rights. On August 28, 1963, King delivered the keynote address to an audience of more than 200,000 civil rights supporters. His â€Å"I Have a Dream† speech expressed the hopes of the Civil Rights Movement in oratory as moving as any in American history: â€Å" I have a dream that one day this nation will rise up and live out the true meaning of its creed: â€Å" We hold these truths to be self-evident, that all men are created equal. â€Å" I have a dream that my four children will one day live in a nation where they will not be judged by the color of their skin but by the content of their character†. The speech and the march built on the Birmingham demonstration to create the political momentum that resulted in the Civil Rights Act of 1964, which prohibited segregation in public accommodations, as well as discrimination in education and employment. As a result of King’s effectiveness as a leader of the American Civil rights Movement and his highly visible moral and courage stance he was awarded the 1964 Nobel Prize for peace.

Tuesday, October 22, 2019

Examples of Informalization in English

Examples of Informalization in English In linguistics, informalization is the incorporation of aspects of intimate, personal discourse (such as colloquial language) into public forms of spoken and written communication  is called informalization. Its also called demotization. Conversationalization is a key aspect of the more general process of informalization, though the two terms are sometimes treated as synonyms. Some linguists (most notably discourse analyst Norman Fairclough) use the expression border crossing to describe what they perceive as the development in post-industrialized societies of a complex range of new social relationships, with behavior (including linguistic behaviour) . . . changing as a result (Sharon Goodman, Redesigning English, 1996). Informalization is a prime example of this transformation. Fairclough further describes informalization as such: The engineering of informality, friendship, and even intimacy entails a crossing of borders between the public and the private, the commercial and the domestic, which is partly constituted by a simulation of the discursive practices of everyday life, conversational discourse. (Norman Fairclough, Border Crossings: Discourse and Social Change in Contemporary Societies. Change and Language, ed. by H. Coleman and L. Cameron. Multilingual Matters, 1996) Characteristics of Informalization Linguistically, [informalization involves] shortened terms of address, contractions of negatives and auxiliary verbs, the use of active rather than passive sentence constructions, colloquial language and slang. It can also involve the adoption of regional accents (as opposed to say Standard English) or increased amounts of self-disclosure of private feelings in public contexts (e.g. it can be found in talk shows or in the workplace). (Paul Baker and Sibonile Ellece, Key Terms in Discourse Analysis. Continuum, 2011) Informalization and Marketization Is the English language becoming increasingly informal? The argument put forward by some linguists (such as Fairclough) is that the boundaries between language forms traditionally reserved for intimate relationships and those reserved for more formal situations are becoming blurred. . . . In many contexts, . . . the public and professional sphere is said to becoming infused with private discourse. . . . If the processes of informalization and marketization are indeed becoming increasingly widespread, then this implies that there is a requirement for English speakers generally not only to deal with, and respond to, this increasingly marketized and informal English, but also to become involved in the process. For example, people may feel that they need to use English in new ways to sell themselves in order to gain employment. Or they may need to learn new linguistic strategies to keep the jobs they already haveto talk to the public, for instance. In other words, they have to become producers of promotional texts. This can have consequences for the ways in which people see themselves.(Sharon Goodman, Market Forces Speak English. Redesigning English: New Texts, New Identities. Routledge, 1996) The Engineering of Informality in Conversationalization and Personalization [Norman] Fairclough suggests that the engineering of informality (1996) has two overlapping strands: conversationalization and personalization. Conversationalizationas the term impliesinvolves the spread into the public domain of linguistic features generally associated with conversation. It is usually associated with personalization: the construction of a personal relationship between the producers and receivers of public discourse. Fairclough is ambivalent toward informalization. On the positive side, it might be viewed as part of the process of cultural democratization, an opening up of the elite and exclusive traditions of the public domain to discursive practices which we can all attain (1995: 138). To counterbalance this positive reading of informalization, Fairclough points out that the textual manifestation of personality in a public, mass media text must always be artificial. He claims that this sort of synthetic personalization only simulates solidarity, and is a strategy o f containment hiding coercion and manipulation under a veneer of equality. (Michael Pearce, The Routledge Dictionary of English Language Studies. Routledge, 2007) Media Language Informalization and colloquialization have been well documented in the language of the media. In news reportage, for example, the past three decades have seen a definite trend away from the cool distancing of traditional written style and towards a kind of spontaneous directness which (though often contrived) is clearly supposed to inject into journalistic discourse some of the immediacy of oral communication. Such developments have been quantified in textual analysis; for instance, a recent corpus-based study of editorials in the British quality press in the twentieth century (Westin 2002) shows informalization as a trend persisting through the twentieth century, and accelerating towards its end. (Geoffrey Leech, Marianne Hundt, Christian Mair, and Nicholas Smith, Change in Contemporary English: A Grammatical Study. Cambridge University Press, 2010)In an experimental study, Sanders and Redeker (1993) found that readers appreciated news texts with inserted free indirect thoughts as m ore lively and suspenseful than text without such elements, but at the same time evaluated them as less suitable for the news text genre (Sanders and Redeker 1993). . . . Pearce (2005) points out that public discourse, such as news texts and political texts, is influenced by a general trend towards informalization. Characteristics include, in Pearces view, personalization and conversationalization; linguistic markers of these concepts have become more frequent in news texts over the last fifty years (Vis, Sanders Spooren, 2009). (Josà © Sanders, Intertwined Voices: Journalists Modes of Representing Source Information in Journalistic Subgenres. Textual Choices in Discourse: A View from Cognitive Linguistics, ed. by Barbara Dancygier, Josà © Sanders, Lieven Vandelanotte. John Benjamins, 2012)

Monday, October 21, 2019

Consider a Career in Immigration Services

Consider a Career in Immigration Services For those interested in a career in U.S. immigration services, consider the three immigration agencies that are within the Department of Homeland Security: U.S. Customs and Border Protection (CBP), Immigration and Customs Enforcement (ICE) and U.S. Citizenship and Immigration Services (USCIS). These positions include border patrol agents, criminal investigators or agents who enforce immigration policy through apprehension, processing, detention or deportation of illegal aliens, or assisting immigrants through the process of achieving legal status, visas or naturalization. Homeland Security Careers Information Information about careers within the U.S. federal government can be found at the U.S. Office of Personnel Management. This office contains further information for federal job seekers including employee pay scales and benefits. U.S. citizenship is a requirement for a majority of these federal jobs. Read the requirements carefully before applying.   Customs and Border Protection According to U.S. Customs and Border Protection, the CBP is a premier law enforcement agency that safeguards America’s borders. Every day, CBP protects the public from dangerous people and materials attempting to cross the border, while enhancing the nation’s global economic competitiveness by enabling legitimate trade and travel at ports of entry. On a typical day, CBP makes more than 900 apprehensions and seizes more than 9,000 pounds of illegal drugs.  The  CBP offers a comprehensive careers section on its website including job recruiting events. There are approximately 45,000 employees across the U.S. and overseas. There are two major categories in Customs and Border Patrol: frontline law enforcement and mission-critical occupations, such as operational and mission support positions. Current CBP opportunities can be found on USA Jobs. USA Jobs is the official job site of the U.S. Federal Government. Annual salary ranges in CBP in 2016 were: $60,000 - $110,000 for a customs and border patrol officer, $49,000 - $120,000 for a border patrol agent and $85,000 to $145,000 for a management and program analyst. U.S. Immigration and Customs Enforcement According to U.S. Immigration and Customs Enforcement, its homeland security mission is carried out by a wide variety of law enforcement, intelligence and mission support professionals all of whom have the opportunity to contribute to the safety and security of the U.S. In addition to the core law enforcement occupations, there are also a wide range of professional and administrative functions that support the ICE mission. ICE offers an extensive  careers information  and recruitment calendar  section on its website. Find out when ICE will be in your area for a recruiting event. ICE classifies its job opportunities into two categories: criminal investigators (special agents) and all other ICE opportunities. Positions in ICE include financial and trade investigations; cyber crimes; project analysis and management; litigating removal cases in immigration court; working with foreign authorities; intelligence gathering; investigations into arms and strategic technology violations; human trafficking; and child exploitation. Other roles include security for federal buildings, perform crowd control and surveillance, and work with other federal state and local authorities or enforcement duties that include the apprehension, processing, detention, and deportation of illegal or criminal aliens. Finally, there are a number of technical, professional, administrative or management occupations directly supporting its law enforcement mission. ICE has up to 20,000 employees working in 400 offices nationwide and over 50 locations internationally. Entry-level criminal investigators are recruited directly through recruiters. Contact special agent recruiters at the nearest Special Agent in Charge (SAC) office to apply for a criminal investigator position, but only when ICE is actively recruiting. Check the career section of ICEs website to find out if the department is recruiting. All other ICE job opportunities can be found on USA Jobs.   Annual salary ranges in ICE in 2017 were: $69,000-$142,000 for a special agent, $145,000-$206,000 for senior attorneys, and $80,000-$95,000 for a deportation officer. U.S. Customs and Immigration Services According to U.S. Customs and Immigration Services,   the agency oversees legal immigration to the United States. The agency helps people build better lives while helping to defend the integrity of the nation’s immigration system.  The USCIS Careers site has information on becoming a USCIS employee, pay and benefits offerings, training and career development opportunities, upcoming recruiting events and some frequently asked questions. There are approximately 19,000 federal and contract employees at 223 offices worldwide. Positions include security specialist, information technology specialist, management and program analyst, applications adjudicator, asylum officer, refugee officer, immigration information officer, immigration officer, intelligence research specialist, adjudications officer and immigration services officer. Current USCIS opportunities can be found on USA Jobs. In addition to the website, USCIS has access to job opening information through an interactive voice response telephone system at (703) 724-1850 or by TDD at (978) 461-8404. Annual salary ranges in USCIS in 2017 were: $80,000 to $100,000 for an immigration officer, $109,000-$122,000 for an IT specialist, and $51,000-$83,000 for an adjudications officer.

Sunday, October 20, 2019

Gypsies in the Holocaust - Forgotten Victims

Gypsies in the Holocaust - Forgotten Victims The Gypsies of Europe were registered, sterilized, ghettoized, and then deported to concentration and death camps by the Nazis before and during World War II. Approximately 250,000 to 500,000 Gypsies were murdered during the Holocaust- an event they call the Porajmos (the Devouring.) A Short History Approximately a thousand years ago, several groups of people migrated from northern India, dispersing throughout Europe over the next several centuries. Though these people were part of several tribes (the largest of which are the Sinti and Roma), the settled peoples called them by a collective name, Gypsies- which stems from the one-time belief that they had come from Egypt. Nomadic, dark-skinned, non-Christian, speaking a foreign language (Romani), not tied to the land- Gypsies were very different from the settled peoples of Europe. Misunderstandings of Gypsy culture created suspicions and fears, which in turn led to rampant speculation, stereotypes, and biased stories. Many of these stereotypes and stories are still readily believed. Throughout the following centuries, non-Gypsies (Gaje) continually tried to either assimilate Gypsies or kill them. Attempts to assimilate Gypsies involved stealing their children and placing them with other families; giving them cattle and feed, expecting them to become farmers; outlawing their customs, language, and clothing as well as forcing them to attend school and church. Decrees, laws, and mandates often allowed the killing of Gypsies. In 1725 King Frederick William I of Prussia ordered all Gypsies over 18 years old to be hanged. A practice of Gypsy hunting was common- a game hunt similar to fox hunting. Even as late as 1835, a Gypsy hunt in Jutland (Denmark) brought in a bag of over 260 men, women, and children, write Donald Kenrick and Grattan Puxon. Though Gypsies had undergone centuries of such persecution, it remained relatively random and sporadic until the 20th century when the negative stereotypes became intrinsically molded into a racial identity, and the Gypsies were systematically slaughtered. Under the Third Reich The persecution of Gypsies started at the very beginning of the Third Reich. Gypsies were arrested and interned in concentration camps as well as sterilized under the July 1933 Law for the Prevention of Hereditarily Diseased Offspring. In the beginning, Gypsies were not specifically named as a group that threatened the Aryan, German people. This was because, under Nazi racial ideology, Gypsies were Aryans. The Nazis had a problem: How could they persecute a group enveloped in negative stereotypes but supposedly part of the Aryan super race? Nazi racial researchers eventually came upon a so-called scientific reason to persecute most of the Gypsies. They found their answer in Professor Hans F. K. Gà ¼nthers book Rassenkunde Europas (Anthropology of Europe) where he wrote: The Gypsies have indeed retained some elements from their Nordic home, but they are descended from the lowest classes of the population in that region. In the course of their migrations, they have absorbed the blood of the surrounding peoples, and have thus become an Oriental, western-Asiatic racial mixture, with an addition of Indian, mid-Asiatic, and European strains. Their nomadic mode of living is a result of this mixture. The Gypsies will generally affect Europe as aliens. With this belief, the Nazis needed to determine who was pure Gypsy and who was mixed. Thus, in 1936, the Nazis established the Racial Hygiene and Population Biology Research Unit, with Dr. Robert Ritter at its head, to study the Gypsy problem and to make recommendations for Nazi policy. As with the Jews, the Nazis needed to determine who was to be considered a Gypsy. Dr. Ritter decided that someone could be considered a Gypsy if they had one or two Gypsies among his grandparents or if two or more of his grandparents are part-Gypsies. Kenrick and Puxon blame Dr. Ritter for the additional 18,000 German Gypsies who were killed because of this more inclusive designation, rather than if the same rules had been followed as were applied to Jews, who had have three or four Jewish grandparents to be considered Jews. To study Gypsies, Dr. Ritter, his assistant Eva Justin, and his research team visited the Gypsy concentration camps (Zigeunerlagers) and examined thousands of Gypsies- documenting, registering, interviewing, photographing, and finally categorizing them. It was from this research that Dr. Ritter formulated that 90% of Gypsies were of mixed blood, thus dangerous. Having established a scientific reason to persecute 90% of the Gypsies, the Nazis needed to decide what to do with the other 10%- the ones who were nomadic and appeared to have the least number of Aryan qualities. At times Interior Minister Heinrich  Himmler discussed letting the pure Gypsies roam relatively freely and also suggested a special reservation for them. Assumably as part of one of these possibilities, nine Gypsy representatives were selected in October 1942 and told to create lists of Sinti and Lalleri to be saved. There must have been confusion within the Nazi leadership. Many wanted all Gypsies killed, with no exceptions. On December 3, 1942,  Martin Bormann  wrote in a letter to Himmler: ... special treatment would mean a fundamental deviation from the simultaneous measures for fighting the Gypsy menace and would not be understood at all by the population and lower leaders of the party. Also the Fà ¼hrer would not agree to giving one section of the Gypsies their old freedom. Though the Nazis did not discover a scientific reason to kill the 10% of Gypsies categorized as pure, no distinctions made when Gypsies were ordered to  Auschwitz  or deported to the other death camps. By the end of the war, an estimated 250,000 to 500,000 Gypsies were murdered in the Porajmos- killing approximately three-fourths of the German Gypsies and half of the Austrian Gypsies. For an overview of all that happened to the Gypsies during the Third Reich, there is a  timeline  to help outline the process from Aryan to annihilation. Sources Friedman, Philip. The Extermination of the Gypsies: Nazi Genocide of an Aryan People.  Roads to Extinction: Essays on the Holocaust, Ed. Ada June Friedman. Jewish Publication Society of America, 1980, New York.ï » ¿Kenrick, Donald and Puxon, Grattan.  The Destiny of Europes Gypsies. Basic Books, 1972, New York.

Saturday, October 19, 2019

U.S. immigration policies Essay Example | Topics and Well Written Essays - 750 words

U.S. immigration policies - Essay Example Immigration policy in the United States reflects multiple goals. The laws were framed to accommodate the tourists, businessmen as temporary non-immigrants whose visits are confined to their particular purpose of visit.First, it serves to reunite families by admitting immigrants who already have family members living in the United States. Second, it seeks to admit workers with specific skills and to fill positions in occupations deemed to be experiencing labor shortages.Third, it attempts to provide a refuge for people who face the risk of political, racial, or religious persecution in their country of origin. Finally, it seeks to ensure diversity by providing admission to people from countries with historically low rates of immigration to the United States. Several categories of permanent and temporary admission have been established to implement those wide-ranging goals.The US immigration was primarily established to regulate the unlawful entry of the illegal anti social elements. M ajor changes in the world economy have propelled the immigrations after the world wars. The U.S immigration has evolved from various stages from federal regulations allowing the reunification of the families who have been isolated from their family members, to entice skilled low cost employees to propel the economy with more alien power leaving the natives jobless. The laws were framed to accommodate the tourists, businessmen as temporary non-immigrants whose visits are confined to their particular purpose of visit. Globalization and technological change have radically altered the nation's industrial and occupational structures to the disadvantage of organized labor's historic membership strengths. The skilled work forces were provided with permanent residents status to gain on their low wage status. The globalization and technological advancement round the world has equally added significance in the immigration norms. The refugees and asylum seekers were allowed to enter the U.S and were granted with permanent status after a period of one year dumping large numbers of unemployable people into U.S which indirectly drive the companies to look out for foreign brains. Outsourcing has shifted the jobs of America to low investment base countries in Asia. Both refugees and asylum-seekers may file an application seeking lawful permanent resident status after one year in the United States. In 2004, about 71,000 LPR adjustments were granted to refugees and asylum-seekers, accounting for roughly 8 percent of all legal admissions to the United States. The asylum policy resulted in providing permanent residential status to illegal immigrants who were initially not allowed into America. The asylum policy has encouraged more number of people to take the path of the former illegal entrants thus creating a cumulative effect of more requests from illegal immigrants waiting for their turn. The commotion has created a major issue of inducing unskilled laborers The statistics suggest that the employers in the U.S were adopting unhealthy practices to bring in cheap labour to fill up the vacancies and build up their balance sheets. The more the availability of skilled low cost labor who can start with much lesser wages the more difficult for the native workers to get the wage hike and career advancement. The local unemployed lot has to compete with the skilled low cost laborer from other countries The local workers were left with no job as the positions are imported from skilled labour from developing countries. Immediate relatives of citizens have generally accounted for the largest share of permanent immigrant admissions. The family dependent immigrations are largely accepted in the U.S These unification may bring in more uncalculated educated population into U.S unknowingly. The reforms should address these issues to stop the ill affect on the jobs created. The increase in the number of low cost employees by employers will ultimately project a rude economic disaster"the unemployment". The companies should be monitored to make them search for resources in the native country and then venture into other countries for employees with specific skills. The number of

Friday, October 18, 2019

Narratine jobsite Essay Example | Topics and Well Written Essays - 750 words

Narratine jobsite - Essay Example When I made it clear she would be working in a 'man's world' (which wouldn't be easy), she didn't hesitate with her answer: "I can handle anything you toss my way." Roy, on the other hand, made her first three weeks as uncomfortable as he could, which translated to considerable discomfort for me as well. Roy was an imposing biker-type at six feet, two inches and 265 pounds, tough and knowledgeable enough to manage forty construction workers. Rachel, on the other hand, stood five-feet, four inches at maybe a hundred pounds dripping wet. I had to mediate between them several times. Roy withheld documentation, schedules, and material requests from Rachel. If she needed something, he made her ask for it. I was well aware of what was happening. The tension between the two was palpable, and I knew a confrontation was imminent. She would need to stand up to him soon-I knew her time with us would be over if she did not. Once, on her second week on the job, Rachel and I were inspecting the jobsite. I could see Roy was up to something again. He was rallying the troops, visiting each group of workers and making a few comments at which they all would dutifully direct meaningful glances at her. I began to think today might be Rachel's last on the job. She walked beside me, asking questions, taking notes, appearing not to have noticed. We completed our inspection and called every... Rachel answered each one to everyone's satisfaction, including mine. I could see Roy was uneasy, but Rachel had proven her competence, so I thought that would be the end of it. That was not to be. The meeting was about to end. "Where are my fire dampers" Roy piped in. "If they're not here, I'll be sending half the crew home tomorrow." The fire dampers were a priority item, without which the job would come to a halt. The person who knew this best was Roy. It was a cheap shot. He had made several requests for their delivery before Rachel had become project manager. The fire dampers had been the responsibility of Rachel's predecessor. Rachel would have needed to order the fire dampers ten days earlier to get the fire dampers to the site the next day. Roy had deliberately withheld the lack of the fire dampers to himself, with the intention of attacking Rachel. I had underestimated Roy's determination. He allowed his personal prejudice to put the job and the company at risk. The faces in the room were a mixture of blank stares and stunned disbelief. The men knew how serious the situation was. There would be emergency meetings, phone calls, and some hefty fines for delaying the job. I was furious. As I stood to protest, Rachel placed her hand on my arm, shot me a glance, and strode to the front. There was a look of defiance on her face. In a very measured tone she indicated, "The dampers are in my truck." All of us were dumbfounded. How had she pulled this off She spent the next ten minutes reading Roy the riot act. She had compiled a list of every mistake he had made in the last year. Roy himself had provided access to them. She concluded by letting Roy know who was in charge. "If you can put your petty differences aside, be

History of a Technology or Specific aspect of Engineering Research Paper

History of a Technology or Specific aspect of Engineering - Research Paper Example These factors have created a rich history and heritage regarding software engineering. What is Software Engineering? Software engineering is a process of producing programmes to provide functionalities basing on the problem being solved. The software can either be generic in which it is provided to the customers the way it is or custom in which customers can change it to suit their specifications. Software is engineered to give instructions to hardware components, for example, computers; and hand held hardware devices, for example, mobile phones and tablets to perform certain tasks. Software needs hardware for it to be operational. The specific hardware specifications determine the type of software that will be engineered and the specifications it should have (Puntambeker 3). The Early Days of Software Engineering Software engineering was cracked in the mid twentieth century. However, all the credit goes to people who started the ideology way before the twentieth century. In 1804, Fr ench by the name Jaquard made a loom that would perform predefined tasks using punched cards that were fed on a reading contraption on the loom. This technology was used for the production of carpets and tissue. It allowed people with no skills to use the loom to make carpets and tissue. This technology by Jaquard inspired many people to think on ways they could put instructions on the card to be replicated on the product (Robat 5). Charles Babbage designed an analytical machine which would use programmes. Although the machine never operated, Ada Lovelace wrote a rudimentary programme for the machine that was designed by Babbage in 1843. Four years later, a British mathematician George Boole proved that there was a lot of relation between mathematics and logic. Logic was therefore mathematical and not philosophical as previously claimed by the ancient philosophers (Robat 8). These four people had an idea of how programming would work, but never went to the extent of starting it off. Their ideas proved important to the people who later on pioneered software engineering. At first, programmers and other professionals in this field could not comprehend what John Von Neumann was saying. They analyzed his statements and looked at them logically to start getting a clear picture of exactly what he meant. Programmers and experts who understood this went ahead to make computing better. Random Access Memory was developed with the main objective of allowing easy access to any information in the computer faster. The improvements were well embraced but still, there was a lot of room for improvement, especially in the software part. The computing machines at the time were quite huge, the size of a grand piano using about 2,500 tubes (Evans, 2004). Software engineering went a notch higher, with the plan calculus by Konrad Zuse in 1945. This was the first ever documented algorithmic programming language. The objective of Konrad was to create theoretical preconditions of solvin g general problems. This new development inspired many others to continue with the improvement in the quest to engineer the best software. In 1948, Claude Shannon coined out the mathematical theory of communication through which engineers were taught how to code and to check for transmission accuracy between computers. Four years later, Grace Hopper came up with a compiler this allowed computers to use words instead of numbers. She came up with ARITH-MATIC, FLOW-MATIC and MATH-MATIC [software] basing on her A-0 compiler.

Thursday, October 17, 2019

An evaluation of competitive advantages of electronic advertising to Dissertation

An evaluation of competitive advantages of electronic advertising to companies in UK - Asda and Tesco - Dissertation Example This analysis is primarily an evaluation of the market potential of electronic advertising for businesses in the UK, with case-studies of notable examples. The relevant findings that necessitate studies such as this include data that portrays as many as 14 million households in the United Kingdom going online to discover current details about goods or services in September of 2009 – 14 million within just one month. (Office of Fair Trading, 2010) Other relevant findings indicate an ongoing growth rate in the subsequent advertising revenue that can be achieved for those that take advantage of online advertising opportunities. The percentage of advertising revenue generated from online commerce has grown 17% in the five years between 2003 and 2008, for example. (Office of Fair Trading, 2010) There are additional complexities to this form of advertising, but there is strong evidence to suggest that electronic marketing/advertising is a growth area which must be pioneered by any c ompany that does not wish to be left behind by history. As of 2010, the practice of behavioral advertising through online targeting is responsible for revenue as high as ?95m. (Office of Fair Trading, 2010) This represents the fraction of possible online marketing revenues known to be possible within the United Kingdom, to say nothing of the global market, but even within the UK there is potential for further growth. Online marketing allows for an element of behavioral tailoring which is more difficult in other forms of media – even other visual media. The competitive advantages of electronic advertising through online sources allow the vendor to maximize the relevance of an advertisement by adjusting content pertaining directly to the consumers’ desires. This potential is far greater than what might be achieved through less responsive media. Television advertisers for decades have sought to generate programming specific to a selection of the demographic most likely to be watching a given program at a given time, but this method has its limits. A television station attempts to acquire as many advertisers as possible, and must negotiate its scheduling to satisfy all of them, and the most popular programs may have a diverse demographic. Some commercials may be relevant to any particular viewer, but in the course of satisfying all advertisers inevitably there will be much content there any particular view or will not find worthy of attention. Television is not responsive in the way that online navigation could be. The television viewer has already responded by selecting the channel, and no further customization is possible. The situation is similar with radio. Electronic advertising through online sources allows the advertiser to adapt their message in a way that capitalizes upon the very personal nature of website navigation. In front of the computer or mobile computing device, the user has access to an ever growing network of information and enter tainment, far more options than could ever be feasible for the programming of a radio or television company. The range of options is dizzying, but provides a golden opportunity for advertisers. Those who attempt to market to individual website users do not need to cater to the totality of need for an audience of (hopefully)

In a 2 page essay, explain the origin, development, struggle, and Essay

In a 2 page , explain the origin, development, struggle, and future of the communities and cities in our country over the past 200 years - Essay Example In half of the 18th century, there was totally disturbance in the political section of the United States. Slavery was so much common in the United States. Declaration of independence was written by Thomas Jefferson who himself had more than 200 slaves. In 1787, the constitution convention explains the rights of blacks in the society. According to that they did not have a right to vote as well as they did not take admission in public schools. After 20 years after the revolution many Southern freed their slaves. When the United States grew, slavery was also extended. In 1793, cotton gin was invented which, permitted the cultivation of short staple cotton in Inland areas. In 1830, majority of the blacks were free in thee United States approximately they were319, 000. Many of the people in the black community lived in poverty, but some had established their successful bossiness (Smallwood,

Calcium Element Chemistry Research Paper Example | Topics and Well Written Essays - 750 words

Calcium Element Chemistry - Research Paper Example Calcium occurs naturally only in compounds, and this is because it is so reactive. (Environmental Chemistry Website) It is derived from minerals such as limestone and gypsum where it occurs in combination with sodium, magnesium and aluminium There are also vast sedimentary deposits in the fossilized remains of marine life, such as shells. These minerals and sedimentary deposits containing calcium can be found all over the world. Calcium is often found in the compound calcite, which is the principal constitute of the rock limestone. (Enghag, p. 333) Chemists denote calcium with the symbol Ca and the atomic number 20, and it has the atomic weight 40.078. (Helmenstine, p.1) It is classified along with beryllium Be, magnesium Mg, strontium Sr, barium Ba and radium Ra as one of the alkaline earth metals. (Enghag, p. 323) The properties of calcium are that it has an atomic radius of 2.00A, and ionic radius of 1.14A, a melting point of 842?C and a boiling point of 1484? and it has a flame c olor of orange-red. Section 2. 10 compounds formed by Calcium. Calcium hydroxide (slaked lime) is made by heating limestone to a temperature of above 825?C and then adding water to it. (Wikipedia). Calcium sulphate (CaSO4 ·2H2O) is a powdery white material which is safe to handle. Calcium carbonate CaCO3 comprises more than 4% of the earth’s crust and comes in three main natural forms: chalk, limestone and marble. These are identical in chemical terms the have different purity, thicknes and homogeneity. (IMA-NA website, 2011) Calcium nitrate Ca(NO3)2 also called Norwegian saltpetre is obtained by â€Å"dissoving limestone in nitric acid or through the absorption of nitrous gases by milk of lime.† (Pubchem, 2011) Calcium chloride (CaCl2) can be produced from seawater, but this is inefficient and produces impure compounds. A better way of obtaining this compound is by combining high purity limestone and salt brine. (Morris chemicals Inc Website) Calcium carbide   (Ca C2) is a colorless compound produced at an extremely high temperature in a furnace from a mixture of lime and coke. (Wikipedia) Calcium hypochlorite  (Ca(OCl)2) is a yellow white solid which emits a strong smell from the chlorine part of its constitution. Calcium permanganate  (Ca(MnO4)2). This compound consists of calcium plus two permanganate ions. Calcium stearate  (Ca(C18H35O2)2) is a non-toxic compound of calcium with various solid organic acids such as stearic. Stearic acid is a naturally occurring fatty acid such as that found in animal fats and palm oil. Calcium arsenate  (Ca3(AsO4)2) is a â€Å"white flocculent powder which is practically insoluble in water.† Pohanish, p. 522. It is toxic to humans due to the arsenic component in it. Section 3. 4 Uses in everyday life. Calcium is used in making cheese, and it adds a valuable dietary contribution to many foods, or as a vitamin supplement combined with less reactive materials in tablet form. Another use of calc ium is in the steel industry, where it is as a deoxidizer used to help purify other metals in the heating process. A third use of calcium is in the production of cement. Calcium is used as an ingredient in many fertilizers and bleaching agents, including in textile and paper production. It is hardly ever handled in its pure form, but in its compounds (see sections 2 and 4). Section 4. 5 compounds and their everyday use. Calcium nitrate Ca(NO3)2 is a compound made with nitrogen which is used to fertilize plants. It was first applied in

Wednesday, October 16, 2019

Networking Essay Example | Topics and Well Written Essays - 2250 words

Networking - Essay Example Moreover, the concept of networking might appear simple if seen from a diagrammatic perspective but from the technical perspective, it might rather appear as highly complex. From a generalised point of view, it can be understood that the networking process is the development of a connection between the nodes within the network that might be involved in the data sharing process. The concept explains all the aspects that all together form the communication process (Microsoft, 2014). The essay describes the concepts and the aspects related to networking. The discussion emphasizes the principles and the operations of the layered communication protocols. It also briefs about protocol stack, its working and packet headers In computer networking, there are two important protocols that include Internet Protocol (IP) and Transmission Control Protocol (TCP). Contextually, computer networking is also recognized as TCP/IP. The layered communication protocols of networking are discussed hereunder. The concept of protocol stack can be explained with reference to the Ethernet technology and data transmission techniques. Data transmission in an online fashion generally takes place in the form of packets. Therefore, in a general sense, it can be understood that the packets that are needed to be transmitted must have a sending as well as a receiving address. In this context, the concept of protocol slack plays an important role in the data transmission process (The Linux Information Project, 2005). The diagrammatic representation provided below will help in understanding the concept of protocol slack. From the above diagram, it can be clearly understood that each packet transmitted must have a sender and a receiver address, so that the data reach the desired address appropriately (The Linux Information Project, 2005). The technique is known as wrapping up of the data packets. The transmission process has been explained through the elaboration of the seven layers of the

Tuesday, October 15, 2019

Calcium Element Chemistry Research Paper Example | Topics and Well Written Essays - 750 words

Calcium Element Chemistry - Research Paper Example Calcium occurs naturally only in compounds, and this is because it is so reactive. (Environmental Chemistry Website) It is derived from minerals such as limestone and gypsum where it occurs in combination with sodium, magnesium and aluminium There are also vast sedimentary deposits in the fossilized remains of marine life, such as shells. These minerals and sedimentary deposits containing calcium can be found all over the world. Calcium is often found in the compound calcite, which is the principal constitute of the rock limestone. (Enghag, p. 333) Chemists denote calcium with the symbol Ca and the atomic number 20, and it has the atomic weight 40.078. (Helmenstine, p.1) It is classified along with beryllium Be, magnesium Mg, strontium Sr, barium Ba and radium Ra as one of the alkaline earth metals. (Enghag, p. 323) The properties of calcium are that it has an atomic radius of 2.00A, and ionic radius of 1.14A, a melting point of 842?C and a boiling point of 1484? and it has a flame c olor of orange-red. Section 2. 10 compounds formed by Calcium. Calcium hydroxide (slaked lime) is made by heating limestone to a temperature of above 825?C and then adding water to it. (Wikipedia). Calcium sulphate (CaSO4 ·2H2O) is a powdery white material which is safe to handle. Calcium carbonate CaCO3 comprises more than 4% of the earth’s crust and comes in three main natural forms: chalk, limestone and marble. These are identical in chemical terms the have different purity, thicknes and homogeneity. (IMA-NA website, 2011) Calcium nitrate Ca(NO3)2 also called Norwegian saltpetre is obtained by â€Å"dissoving limestone in nitric acid or through the absorption of nitrous gases by milk of lime.† (Pubchem, 2011) Calcium chloride (CaCl2) can be produced from seawater, but this is inefficient and produces impure compounds. A better way of obtaining this compound is by combining high purity limestone and salt brine. (Morris chemicals Inc Website) Calcium carbide   (Ca C2) is a colorless compound produced at an extremely high temperature in a furnace from a mixture of lime and coke. (Wikipedia) Calcium hypochlorite  (Ca(OCl)2) is a yellow white solid which emits a strong smell from the chlorine part of its constitution. Calcium permanganate  (Ca(MnO4)2). This compound consists of calcium plus two permanganate ions. Calcium stearate  (Ca(C18H35O2)2) is a non-toxic compound of calcium with various solid organic acids such as stearic. Stearic acid is a naturally occurring fatty acid such as that found in animal fats and palm oil. Calcium arsenate  (Ca3(AsO4)2) is a â€Å"white flocculent powder which is practically insoluble in water.† Pohanish, p. 522. It is toxic to humans due to the arsenic component in it. Section 3. 4 Uses in everyday life. Calcium is used in making cheese, and it adds a valuable dietary contribution to many foods, or as a vitamin supplement combined with less reactive materials in tablet form. Another use of calc ium is in the steel industry, where it is as a deoxidizer used to help purify other metals in the heating process. A third use of calcium is in the production of cement. Calcium is used as an ingredient in many fertilizers and bleaching agents, including in textile and paper production. It is hardly ever handled in its pure form, but in its compounds (see sections 2 and 4). Section 4. 5 compounds and their everyday use. Calcium nitrate Ca(NO3)2 is a compound made with nitrogen which is used to fertilize plants. It was first applied in

What is customer service Essay Example for Free

What is customer service Essay Customer service consists of the various ways in which a business looks after its customer. A business that wants to provide a comprehensive high quality customer service must be aware of, and be able to analyse, customer needs, and also to set up systems to ensure that those needs are catered for from the first enquiry to after-sale service. Customer service consists of a wide range of activities. The purpose of these is to make sure that customers are happy and will return again and again. Every business should remember that customers are the factors, which affect demand for the product. It is one of the greatest importance, therefore, for the organisation to know its customers- who they are, what they need and how it can satisfy those needs. Customer service is one of the most important ingredients of the marketing mix for products and services. High quality customer service helps to create customer loyalty. Customers today are not only interested in the product they are being offered but all the official elements of service that they receive from the greeting they receive when they enter a retail outlet, to the refund and help that they receive when they have a complaint about a faulty product that they have paid for. Introduction to Sainsburys Sainsbury is a high class retail store that supplies to a wide range of products mainly dealing with foods but now, starting to increase the companys gross profit by dealing in an even wider range of products including household products, health, beauty, alcohol and cigarettes and currently starting to build a reputation in the clothes retailer. They also to compete with the likes of Bp and Esso by opening up over 250 petrol stations all over the UK. Sainsburys was founded by John James and Mary Ann Sainsbury in 1869, they first launched their first Sainsbury store in Dury Lane as a small dairy store, it quickly became popular because the economic wealth in the area was at an all time low and by the new Sainsbury store offering low prices it became one of shoppers favorites. As the stores success grew so did the branches open up on higher class high streets like in Islington and Kentish Town further growing and then becoming a Public Limited Company (PLC) which now owns over 500 branches across the UK. Types of Customer Lordly Customers Lordly customers like to be treated as special and important. How they are treated is often just as important to them as what they are buying. They are impatient. They will refuse to wait in lines or queues, even if it means not buying what they want. Their time is valuable. If they have questions they want them answered right away. They are status conscious and like to be seen as powerful and up to the minute. They do little research before they buy and often buy on impulse. They treat staff as just there to serve them and have little interest in staffs feelings or problems. They are not afraid to complain and can do so loudly. They are not interested in the systems that shops may have. They believe that rules are made for other people. Logical Customers Logical customers are interested almost exclusively in what they are buying. They are after the best deal and expect staff to be able to answer technical questions logically and factually and to be experts in what they are selling. If problems arise, they want a properly detailed explanation of what will be done. They retain receipts and often the external wrapping so that they can return faulty goods according to the system. They take note of special offers but they never buy on impulse. They usually study the consumer magazines and check prices in different places before they buy. They ignore the fact that staff are people. They will put up with indifferent service to get what they want the right price. If they complain, they may well invoke the law! Friendly Customers Friendly customers see buying as just another human inter-action. They prize friendliness and like it when people use their name. They like the warmth of a welcome and a smile. They prefer small shops and hotels where they can become known and where they can more easily get to know staff. For them, the way that the purchase is sold is almost more important than the product itself. They like to think of staff as friends and they are willing to help out if staff have problems. They will often make decisions based upon the staffs recommendations. They are influenced by people they like, particularly their close friends and trust others to give them good advice. They hate to complain and feel badly, and personally, let down if things go wrong. They can have very high standards of behaviour General Public This is anyone who might want to buy a particular good or service. This category includes passing trade and regular customers. Passing trade- Customers who might come into a shop or call on a service provider because they happen to be in the vicinity or want to try a new supplier Regular customers Those who use the same supplier time and time again.

Monday, October 14, 2019

The research strategy and the limitations

The research strategy and the limitations 3.1 Introduction Methodology can generally be described as the analysis of, and rationale for, the particular method or methods used in a given study, and in that type of study in general (Jankowicz, 2005). This chapter is initially concerned with identifying the best research philosophy to be adopted, as this contains important assumptions about the way in which the world is viewed by the researcher, and it is these assumptions that underpin the chosen research strategy and its associated methods (Saunders et al 2009). This chapter therefore starts with an explanation of the philosophical approach chosen by the researcher; then the chapter details the research strategy, and this section also explains the limitations of using such methods. Further this section will explains the research design, method data collections, sampling methods and limitations. 3.2 Research Philosophy, axiology and approach 3.2.1 Research Philosophy The Data collection techniques most often used approach basis for this research project is a mix of critical realism and interpretivism. As Johnson and Clark (2006) note, as business and management researchers we need to be aware if the philosophical commitments we make through our choice of research strategy since this has significant impact not only on what we do but we understand what it is we are investigating. The Research Onion Source: Mark Saunders, Philip Lewis and Adrian Thornhill 2008 In selecting the research philosophy and the methodology it is appropriate to access the researchers relationship with the research topic (Fisher, 2004) and attitude towards knowledge and reality. Saunders et al (2009) suggests experiment or survey as appropriate research strategies for research testing hypotheses founded on existing theory. In the above figure the realism and Interpretivism with epistemological approach will suits the research topic. To interpret different account holders in concepts the interpretive approach will helps here and the realism will helps to find the connection between the different variables. 3.2.2 Research Axiology According to (Saunders et al, 2009) research axiology is a branch of philosophy that studies judgements about values. The role that owns values play in all stages of the research process is of great importance if the research results want to be credible (Heron 1996). Research is based on world views, cultural experience and upbringing in realism (Saunders et al, 2009). This is important and relevant to the research topic as it is undertaking in the organization which I worked before doing masters program. This topic has been personally motivated me to go through research question and have firsthand experience in knowing the difficulties facing by human resource in controlling attrition rate in BPO companies. 3.2.3 Research Approach The research approach is aim at the high level management and middle level management employees of BPO companies and it can be done with both deductive and Inductive approach for analyzing the research data. Creswell (2002) suggests a number of particular criteria and perhaps the most important of the research approach are the emphasis of the research and nature of the research topic. According to Robson (2002) lists five sequential stages in deductive approach to progress positive results in quantitative analysis Deducting a hypothesis (a testable proposition about the relationship between two or more concepts or variables) from the theory; (Saunder 2009) Expressing the hypothesis in operational terms (that is, indicating exactly how the concepts or variables are to be measured), which propose a relationship between two specific concepts or variables; (Saunder 2009) Testing this operational hypothesis (this will involve one or more of the strategies) (Saunder 2009) Examining the specific outcome of the inquiry (it will either tend to confirm the theory or indicate the need for its modification); (Saunder 2009) If necessary. Modifying the theory in the light of the feelings. (Saunder 2009) Deductive approach will suits the research topic in conducting the survey questionnaire (Gill and Johnson 2002) to use structured methodology to facilitate replication and this approach is quicker to complete the data collection and it can predict the time schedules accurately and can be done in one take. Inductive approach will help this research to conduct semi-structured interviews with exit managers and supervisors in BPO companies through Skype online video conversation and understand the situation very quickly and instantly. Traditional research can be done with various methods of collecting the data in order to establish different views of phenomena (Easterby-Smith et al. 2008). Easterby-Smith et al. (2008) argues that knowledge of the different research traditions enables to adapt research design and these may be practical, involving, say, limited access to data, or due to lack of subject knowledge. Research topic will be very practical in conducting survey questionnaire with BPO employees and semi-conducted interviews with managers as Hakim (2000) uses an architectural metaphor to illustrate the choice of approach. She introduce the notion of the researchers preferred style, which rather like the architects, may reflect à ¢Ã¢â€š ¬Ã‚ ¦.the architects own preferences and ideasà ¢Ã¢â€š ¬Ã‚ ¦ and the stylistic preferences of those who pay for the work and have to live with the final result. 3.3 Research Strategy The strategy used for this dissertation is a Survey study. (Saunders et al, 2009) the Survey is usually associated with the deductive approach and it is very popular strategy in research and frequently used to answer who, what, where, how much and how many questions. Surveys are popular as they allow the collection of a large amount of data from a sizeable population in a highly economical way (Saunders 2009). Often obtained by using a questionnaire administered to a sample and standardized data to compare easy with the results given by BPO employees. According to Saunders et al, 2009 the survey strategy allows to collect quantitative data which can analyze quantitatively using descriptive and inferential statistics and using the survey strategy give more control over the research process and when the sampling is done with BPO employees and exit managers. 3.4 Research Design India BPO industry is still just in its developing edge except in manufacturing sector, which has already become a leader in Global offshore outsourcing lied to the low cost labor and semi-skilled labor pool. According to the India outsourcing associations report, it is believed that most of BPO projects are contracted by a small number of state- owned companies which accounts for around 70% of all revenue. Therefore, in this study, we only take those service providers with offshore experience into consideration. This research sources mainly based on a pre-structured questionnaire which derived from researcher Terdiman and Berg (2001)s Country Selection Model to collect primary data. Besides it, a limited number of online video interviews were also carried out for better understanding the survey by questionnaire. In order to minimize the bias of information given by responds, the secondary data came from available journals in the field as well as reports from field associations in both countries as the objective of this paper is to analyze the perception of the industry service providers rather than MNCs, BPO practices related to human resource management. The information and data obtained from the questionnaire survey was analyzed using the Country selection model from researcher Terdiman and Berg (2001). It served as basis model to analyzed information from questionnaire survey. The model was chosen because it critically covers the important reasons why human resource facing the problems in controlling attrition rate in BPO companies. Basically, it will test out the attractive factors relatively in BPO companies. The outcome of interview analyzed in line with theoretical models so bias can be minimized. Process of outsourcing model (source: Brown and Wilson, 2005) applied for interview outc ome analysis to identify which part still need to improve in order to have better performance. One approach which begins deductively makes use of data categories and codes that derive from the theoretical frameworks to analyze the collected data (Saunders et al, 2009). The implications of different data give a essential insight and guide for new human resource strategies in controlling the attrition rate and retain best employees. 3.5 Reliability Threats to reliability Reliability refers to the extent to which our data collection techniques or analysis procedures with yield consistent findings. (Easterby-Smith et al. 2008:109). Questionnaire used in this research will aims to find the new strategies in human resource management at BPO companies and the survey data will be more reliable and very confidentially. According to Robson (2002) there is a threat in doing semi structured interviews as we may get different results with different employees and the company will not allow revealing every information regarding HR policies to external media and peoples. 3.6 Research procedures Data collection consisted of a well-structured questionnaire considered as primary data in both BPO companies which I using for this research (Cognizant Technology Solutions Private Limited and Bank of America Continuum Solutions Private Limited) and the research will be done through online application Survey console. The sample needs to be large enough to be statistically significant and broad enough to avoid any limitations of common experiences. This is best satisfied using automated techniques, which also address challenges presented by time zone and availability of busy professionals. As the professionals concerned live out of suitcases but must be effective when travelling away from base locations, it is assumed a web-based survey is appropriate. The survey was built online using a wizard style interface to select question styles and validate responses. Survey Console simplifies building the survey with the inclusion of some common question sets, such as demographics, which can be tailored to the needs of the individual survey (e.g. question 1). Building took place during late July and early August 2010. Testing was conducted initially personally and subsequently by colleagues experienced in creating surveys. Survey Console provides a testing mechanism allowing a preview of the survey to be accessed and completed online, without storing the results. The testing includes the e-mail notification function. Colleagues were able to realistically confirm the time taken to complete the survey is within the intended 10 to 12 minute limit self-imposed during the design. Professional license will be used in this survey for reliable report with all survey results in structured format with graphs, standard deviation and with unlimited questions. And secondary data for this study was drawn from wide resources according to Yin (2003)s suggestion that information obtained from interviewees are often subjective, therefore, secondary data is necessary to be gained from companys published report and others. As author fortunately have some contacts with people who working in this field. It made it possible to have chance for face to face interview with some of relevant persons. Therefore, The research data for this study will be also draw based on qualitative data that can generally be defined as non-numerical data or data that have not been quantified (Saunders et al, 2009). The character of this data is mostly primary data which is defined as material that you have gathered yourself (Jankowicz, 2005). It is always useful to gain information face to face to add bonus to primary data that conducted based on well- structured questionnaire. Requesting gaining access email from BPO company Cognizant Technology Solutions Private Limited. Request email sent to Manager BPO operations in Cognizant Technology Solutions Private Limited. Approval email received from BPO Company for conducting survey Email received from Mr. Hari Krishna (Operations manager) to conduct survey through online tool with their employees. Online survey invitation to BPO employees Survey console can generate automatically an invitation emails to all the BPO employees by sending a link in the email to do the survey and the average time track can be done through online survey. Sampling methods Qualitative enquiry is very often about depth, nuance and complexity, and understanding how these work. Therefore, the act of concussing through sampling is likely to be as strategic as it is practical (Mason.J, 2002). In order to obtain relevant information for the study, 2 companies with offshore BPO have only been carefully selected for a questionnaire survey even though it was random selected based. Besides that, semi-structured interviews will be arranged to obtain an insight HRM in BPO industry. The overall response rate for the questionnaire was 95% through survey console and 5% in semi-structured interviews. 3.7 Limitations to the research The important limitations need to be highlighted in this research. Firstly the research will be taken in online web application Survey console there is a chance to do twice or more times the survey by the same person and Secondly there will be Internet constraint may be some people cant do the survey due to company lock on the private websites in the company and no internet access at their homes. The sample size apparently will be third limitation to the project with a small number of sample selected discredit the accuracy, reliability of the information obtained. 3.6 Ethinical considerations According to (Robson 2002; Sekaran 2003) the key stage of this research is to gain the access from the organizations to conduct the survey. In this research the data which is collected by all BPO employees will be stored with very confidential and do not reveal at any cost to the external clients. And the approach for gaining access and collecting data is very professional manner through online application. 3.7 Summary The philosophical approach to the research is given and the appropriate research methods to reflect this approach have been explained and justified. Equally the rationale for the rejection of inappropriate methods has also been explained. The research design including the procedures, strategy and reliability of the research are also described with ethical considerations when conducting the research survey. Therefore this chapter will laid the options for collecting the data and analyze the research methods in conducting survey, findings and analysis can be described in chapter 4.

Sunday, October 13, 2019

Princes and Paupers Essay -- Wealth Poor Rich Economy Essays

Princes and Paupers Year by year the world becomes more sharply divided by two. On the one hand, there are the advanced, industrial, developed, with mature economics. And then there are the rest--developing, less developed, underdeveloped, undeveloped, and pre-industrial. The exact description is unimportant; for the basic division is, of course, one between the rich and the poor. What does it mean to be poor? It has always been advantageous to be born on the right side of the tracks. But the accident of birth has never had quite the significance that it holds today, for every child born to parents in the developed countries, seven are born in the underdeveloped world. This fact, above all else, will determine the course of their lives. The chances are that most of the seven children will be born, and brought up in poverty. Being born poor, the chances are that you will spend your life being hungry. This is not ordinary hunger as we may know it, but actual starvation and ill health brought on by lack of nutrition. Two-thirds of the world suffers from malnutrition, and thirty thousand children under five years of age die from malnutrition everyday. It is hard to imagine that within a twenty-four hour period we actually lose that many children. The total food resources in the world today would be perfectly adequate to feed everyone properly, unfortunately, there is an unfair distribution among nations and social groups. The United States is the net importer of food and agriculture from the rest of the world. While we make only five- percent of the worlds population, we import forty- percent of all beef traded, we buy one-third of all the fish and seafood and one-third of all dairy products. The overcompensation of... .... It costs only pennies a day and could make a tremendous difference in a child's life. Think about all of the small change that we spend everyday. The facts provided are not given to be critical of any one person or any particular Western country. Yet, they are facts, and are grim reality for so many disadvantaged people in these Third World countries. Instead of turning our backs on these individuals, we must start educating ourselves on the large gap that consist between the rich and the poor. They are trapped in a pattern of overlapping vicious circles. The people in these poor countries had no choice in where they would be born, but we do have a choice in trying to make a difference in their lives. We must remember that they are human beings just as we are, and have been put at a disadvantage and we in the West are in the position to lessen their suffering.

Saturday, October 12, 2019

Many Cultures, One Place #2 :: Essays Papers

Many Cultures, One Place #2 In modern time, numerous people have the idea that all the countries in the world can be united as one. However, they do not comprehend completely that there exists many differences in terms of political and cultural structures that do not allow countries to act as one. In the article: One Europe, Two Citizens by Pavel Kelly-Tychtl, the author tries to make the audience understand that having numerous countries together acting as one, like the European Union EUROPA - The EU at a glance is not the best way possible to solve the problems that our society has because eventually it will generate more because of the huge gap that these countries have in relation to each other. According to the author of this article, the only purpose that the European Union has is to generate discontent between their citizens and also to affect the political and economical structures that have already been created before by those governments. The structure that the European Union has is not the proper system to enforce around countries in the world because it limits the power of each country depending the characteristics that each of them have. The European Union is a group of countries that their main purpose is to act as one nation. With this focus on mind, they want to create between these groups of countries the same qualities and characteristics so that they can have the best governmental system ever (Squeezing 22 ) Among the things that the European Union shares in common are: common currency (Euro), borders (it is easier to pass from one country to another), parliament (same laws or rules) Accessing European Union Information, free trade (safe economy), and so on. In present time, this union is composed of fifteen countries. However, the European Union is looking forward that other countries will join them, and they already invited other ten countries to be with them. Many politicians agree that the European Union is an excellent example of how governments should work because it is very well organized (One Europe 30) However, with the ideas given by the author in this paper the audience can clearly see that the o nly thing that the European Union can produce is differences between people around the world. There exist a similarity between the European Union and the United States; they both are seen as one place, one nation, and one country. Many Cultures, One Place #2 :: Essays Papers Many Cultures, One Place #2 In modern time, numerous people have the idea that all the countries in the world can be united as one. However, they do not comprehend completely that there exists many differences in terms of political and cultural structures that do not allow countries to act as one. In the article: One Europe, Two Citizens by Pavel Kelly-Tychtl, the author tries to make the audience understand that having numerous countries together acting as one, like the European Union EUROPA - The EU at a glance is not the best way possible to solve the problems that our society has because eventually it will generate more because of the huge gap that these countries have in relation to each other. According to the author of this article, the only purpose that the European Union has is to generate discontent between their citizens and also to affect the political and economical structures that have already been created before by those governments. The structure that the European Union has is not the proper system to enforce around countries in the world because it limits the power of each country depending the characteristics that each of them have. The European Union is a group of countries that their main purpose is to act as one nation. With this focus on mind, they want to create between these groups of countries the same qualities and characteristics so that they can have the best governmental system ever (Squeezing 22 ) Among the things that the European Union shares in common are: common currency (Euro), borders (it is easier to pass from one country to another), parliament (same laws or rules) Accessing European Union Information, free trade (safe economy), and so on. In present time, this union is composed of fifteen countries. However, the European Union is looking forward that other countries will join them, and they already invited other ten countries to be with them. Many politicians agree that the European Union is an excellent example of how governments should work because it is very well organized (One Europe 30) However, with the ideas given by the author in this paper the audience can clearly see that the o nly thing that the European Union can produce is differences between people around the world. There exist a similarity between the European Union and the United States; they both are seen as one place, one nation, and one country.