Saturday, August 31, 2019

Mind and Consciousness

Mind and consciousness appears to act as inseparable entities. Daily functions  Ã‚   are taken for granted, not given much thought how everyday habitual patterns work. Television programming, selection of music, newspapers, magazines, people we choose to communicate with and the invitation of outside influences has an overall impact on our conscious minds, eventually. Environments, situations and circumstances seem to be   automatic, these conditions arrived without any conscious effort.   All external factors   entering into minds is in the process of becoming a part of the consciousness, but almost always temporarily. Understanding differences between consciousness and mind is crucial to understanding the environment we are living in, and our daily behavior. Many people say, they would never select to live in the conditions they live, or are associate with their friends, or select other situations they are currently in. This is where the consciousness is separate from the mind. The mind or brain would not accept these predicaments, but the consciousness selected these situations. People valuing their freedom to go out dancing in nightclubs, or go chase their kids or dog in the park chooses to stay in the middle, maybe lower financial income. Millionaires have to keep up a certain image, because someone is always watching. Running with a dog in the park is not considered sophisticated behavior of an outstanding citizen. The consciousness chooses financial status, friends, environments depending on beliefs. It has often been said by many motivational speakers, â€Å"you are what you think.† Over time, repeated thoughts automatically reoccurring become part of the consciousness. People start behaving like the actors they see on television without realizing they changed, or they pick up an accent. Once the consciousness accepted the outside messages, these beliefs become a part of the person, or who the person actually is. The difference between the mind and consciousness is the mind changes, but the consciousness is permanent or takes a long time or repeated programming for a temporary change. â€Å"Consciousness (pure awareness) is who you are, and does not have a physical origin† (Morose, 2004).   Consciousness is much more permanent than the mind. The mind brings us into different environments through jobs, relocations, leaving old friends, meeting new people. Through external changes, we keep our same beliefs, values, feelings; our consciousness. When we leave a place physically, our internal, invisible consciousness goes with us. â€Å"Using the example, Alzheimer’s disease, the brain or mind functions do become partially or totally inaccessible, but consciousness never alters† (Morese). Although the physical body changes, the mind does not. The mind and brain are physical external objects. The conscious mind is the actual soul or internal intentions of the person. Outside appearances are usually an accurate reflection of who they are on the inside. The mind is a fascinating mystery. Scientists conduct numerous studies and research trying to find out more about the minds and consciousness. Naturally, diagnosing physical problems, such as Alzheimer’s, and several forms of brain damage are much easier than unraveling the real mysteries of the mind. Scientists and doctors can see a brain. They cannot see the mind. Much of the conclusions of exactly how the mind works is left up to beliefs, opinions, and study’s of similar patterns. Even when external influences alters personality, it is only for brief periods. For example, a well behaved teen getting mixed up with the wrong crowd intentions will become obvious through any type of discipline or counseling resulting from temporarily choosing the wrong path. The conscious mind is permanent, the mind is changeable. Once external conditions change, the consciousness reveals itself. Source: Morose, (2004) The Separation of Mind and Consciousness; retrieved 13 December 2007 Buzzle.com http://www.buzzle.com/editorials/8-9-2004-57639.asp      

Friday, August 30, 2019

Lady Gaga – Role Model

All across the world, girls attending middle school should be permitted to dress like Lady Gaga because she is a role model for both boys and girls alike. For instance, her bold sense of fashion and confidence is a true inspiration to all. Prior to her debut, she had proudly deemed herself a â€Å"freak† in school, for she dressed and acted differently than the norm. Beneath her catchy songs and eccentric music videos, Gaga emphasizes the importance of originality. Amidst an environment where girls try to imitate others in order to become â€Å"popular† and forgo personal creativity, Gaga reminds people not to be afraid to think outside the box and express their ideas freely. However, although some may believe that Lady Gaga is not a suitable role model for growing girls because of her ill-suited fashion and songs, they are incorrect because her lyrics spotlight important messages. To illustrate, in Lady Gaga's â€Å"Born This Way†, she sings, â€Å"I must be myself, respect my youth†¦. I'm beautiful in my way. Throughout the song, the lyrics clearly remind the listener to embrace oneself and fearlessly confront others. Through her songs and style, Lady Gaga emphasizes individuality and originality to others, and urges others to let go of oneself once in a while, as one only lives a life to create momentous experiences. Around the globe, middle school girls should be allowed to dress like Lady Gaga because she is an exemplary leader of pop music who influences girls and boys around the world with her matchless audacity and undaunted willingness to express herself.

Filipino People and Rizal Essay

Introduction: During Rizal’s time, he showed us what a real character of a woman is on those times. He told in one of his letter that from his infancy woman are with agreeable manners, beautiful ways, and modest demeanor. But he also told us that there was in all an admixture of servitude and deference to the words or whims of their so-called â€Å"spiritual fathers†, due to excessive kindness, modesty, or perhaps ignorance. They seemed faded plants sown and reared in darkness. The woman of Rizal’s time responded to the first appeal in the interest of the welfare of the people. Rizal said: now that you have set an example to those who, like you, long to have their eyes opened and be delivered from servitude, new hopes are awakened in us and we now even dare to face adversity, because we have you for our allies and are confident of victory. This term paper will discuss what are the identity of Filipina from the past and the women identity today. The significance of woman from the past who followed Rizal’s bravery to fight for their right and their characters, will also try to see what kind of woman identity should a Filipino have, the Filipino women in Rizal’s novel or some of our woman leaders of todays. What is a Filipina? Is she Asian or Western? Is she the reluctant leader Corazon Aquino, or is she the self-proclaimed â€Å"symbol of beauty for her people† Imelda Marcos? Is she the modern-day Gabriela Silang who envisions and works towards cross-sectoral changes, or is she one of the millions of faceless and nameless struggling multitude who does anything just to put rice on the table, the ordinary Juana de la Cruz? The implication of an early paradigm of gender character and equality may have, to some extent, begun the process of identity formation. On the surface, the Philippine myth does not seem to introduce the notion of conflict. What is projected is compatibility and harmony. Just when and how, then, did the problems of identity conflict for the Philippine woman come about? The language of the colonizer is found to not only serve as a vehicle for literary expression, but also for setting forth the idealized image of a Filipina from a male perspective. A brief glance at literature shows an evolution of sorts of the Filipina from the pre-colonial Maganda of indigenous folklore, to the early 1800s Laura who epitomizes beauty and faithful acceptance of her role as prescribed by culture, religion, and society; and to the fictional characterization of womanhood drawn from two works of historical fiction by Jose Rizal, Noli Me Tangere and El Filibusterismo. Although Rizal’s central protagonists in both novels are men, the significance of the women characters lies in their symbolic portrayals of a people of many images, of a country torn apart by race, culture, and class. In Rizal’s attempt to define a nation’s identity by addressing the need for national reforms and by exposing the evils of colonialism, he may have also encouraged the need to demystify the Filipina. The colonial Spanish period’s desired image of a Filipina is embodied in the character of Maria Clara–beautiful, demure, modest, patient, devoutly religious, cultured, submissive, and virginal. The blood that runs through her veins is more European than native. Her ancestry is noted since it has a bearing on the idealized model of a Filipina, the Roman Catholic’s Virgin Mary, and European and foreign. Maria Clara belongs to the elite; her kindness is not to be equated, however, with social awareness. She is a repressed woman and her weakness and despair over a lost love overwhelm her, enabling powerful and sinister forces to slowly drive her to death. Perhaps, to a certain degree, this â€Å"ideal† is still upheld today, contributing to the confusion of identity formation, for the original application of the character â€Å"Filipino† was only for Spaniards and their descendants who lived on the islands; the indigenous natives were simply called â€Å"indios. † The 19th century saw a character reversal process: the latter (â€Å"indios†) who have capitulated, are now called â€Å"Filipinos† while the former, mostly direct descendants of colonizers, now prefer to call them â€Å"Spanish. † The character Dona Victorina is a reflection of the triumph of colonialism–the alteration of behavior and thinking patterned after the character’s perception of a superior race. One hundred years ago, there was a Dona Victorina. Today, the trappings of a colonial mindset persist, and are expressed in the attraction to look Western and to consume Western goods. Dona Victorina is a characterization of lost identity. Her frivolity, and that of Paulita Gomez, who is greatly enamored by the trappings of the elite, who loves the man who could maintain the needs of her class, and who is a vain and flighty version of Maria Clara, may be seen today in the persona of Imelda Marcos. The likes of Imelda Marcos also mirror, ironically, another Rizal character, Dona Consolacion, who can be described as an interesting specimen of colonial deformation. She may serve as an example of â€Å"the dehumanization of the indio,† a case of total alienation from her original self, or from her potential self. The character Sisa also represents the opposite image of Paulita, a contradiction of the so-called high status and the liberated label describing the Filipino women today. She is the woman Mary Hollensteiner speaks of in her article, â€Å"The Wife†: quietly suffering from subjugation, sacrificing to put food on the table, living only for her sons. Sisa represents the silent victims of an oppression which drove her to madness and death. There are millions of Sisas in the Philippines today: the unfortunate women who are scavenging for food in the mountains of trash, the degraded women whose bodies are used as commodities, and the abused wives who are repeatedly beaten by their husbands. The other woman, Juli, emerges as the one character that chooses death over a life in shame. She suffers abuse and humiliation working as a servant to pay her family’s debt. She brings to mind the women of today who work for starvation wages. Juli refuses to be coerced; her death liberates her from oppression. Among these characters, perhaps Juli best characterizes a sense of purpose and identity. In Rizal’s characters, the women who seem to be able to obtain their desired needs no matter the consequences are Dona Victorina, Paulita Gomez, and Dona Consolacion. On the other hand, misfortune seems to be the fate of the women whose consciousness could be raised to levels higher than that of self-sacrifice. The all-giving attitude of Maria Clara, Sisa, and Juli leads them to their deaths. Within their social strata, each character is confronted with varying degrees of oppression which in turn defines the parameters of liberation. In their ambition to hold on to the symbols of the ruling class, the former group has made themselves seemingly strong and highly visible handmaidens of a system which feeds on varying levels of coercion and subjugation. The latter group’s retreat into death or madness carries two concurrent views: 1) the strength to exercise a final liberation as a form of defiance to oppression, and 2) the weakness and inability to confront any form of injustice. Who is more oppressed? Who has really liberated herself? Perhaps, what we are seeing is the notion that oppression has slowed down the process towards a national identity in general and towards a Filipina identity in particular. The reality is that the Philippines is a country still going through the throes of colonization. Indeed, there are those who have catapulted to the highest ranks, such as Corazon Aquino and Imelda Marcos, who embody differences in substance, style, and character. However, there are contradictions. Corazon Aquino’s high visibility, status, and power contradicts the image of a meek and subservient wife loyal to the memory of her husband; while Imelda Marcos, the â€Å"Iron Butterfly† of unparalleled extravagance, is a drastic contrast to the image of a once dutiful and subservient wife. Despite the fact that both overcame the traditional roles assigned to women of their social class by reaching positions of political power, they remain subservient to the memories of their husbands, but exemplify the interests of the class they represent. Class interest is perhaps the overriding difference between highly visible women, such as Corazon Aquino and Imelda Marcos, and the fervent activist women carrying the legacy of an intellectualized Gabriela Silang. While women in power and women working for empowerment both assert a heritage and demand a platform, the contradiction probably lies in the former’s subservience and the latter’s ability to address issues that cut across class lines. But class again diametrically separates political women from those who suffer in silence, such as the patient and self-sacrificing women who toil to feed their families, work in sweat shops, as vendors, scavengers, and prostitutes. There are also those who come faceless and nameless for they may flit and slide and go seemingly where the wind blows, all these, indeed a kaleidoscope of conflicting Filipina identities. Not only do Rizal’s novels provide a matrix for identity and conflict, they also allow a rare view of a people’s past which formed their culture today, and of a social cancer of which, up to the present, â€Å"the best cure† is still to be found. In the process of identity formation or perpetuation of identity conflict, the women in Rizal’s novels best serve as bridges in the development process, allowing the flow from the early 1800s mythical formation to the current emerging identity. The social, cultural and political context of both past and present are mirrored in the novels. The myth of the â€Å"high status† of the Filipina has caused Philippine women, wittingly or unwittingly, to become at times participants in their own oppression. This â€Å"containment by elevation† has allowed the essence of womanhood to be subjected to and dictated by rules and regulations formulated by and for the satisfaction of a colonial society. Philippine women find themselves attempting to wade out of a quagmire of confusion over their identity. Remembrance of Rizal is fast disappearing when it ought to be cherished and honored by all Filipinos. It was he who, more effectively than anyone else among his compatriots, unified the disparate inhabitants of our archipelago into one nation. It was he who made them share a common rage against the foreign intruder and a common aspiration for the freedom of their land. Rizal awakened the national conscience from its lethargy not through the force of arms but with the armies of his pen. These were the â€Å"Noli† and â€Å"El Filibusterismo,† his â€Å"Letter to the Women of Malolos,† his youthful poems for the Motherland, his â€Å"Mi Ultimo Adios† that he secreted in a lamp in Fort Santiago hours before his death, and other irrefutable accusations against the Spaniards. His words were like mighty legions that won for our country the freedom we now enjoy. Summary As we all see, that woman of today are very different from the past. Filipino women today are brave and strong enough just like Rizal to fight for what they think is right. There also some women from the past who fight for their rights like education but as compare today woman are more confident to stand. There are woman activist who really do what a Filipino woman can do to make a stand for their fellow poor Filipino people especially those people who are uneducated, they take everything to achieve their goals. Nowadays, we are now equal with man in almost everything most especially in terms of education, all people in our country, man and woman, rich and poor are now equal in getting education. Because of it we are now challenge to face the adverse circumstances and continued to fight for changes, not just to limit our roles as housewives but also to continue fighting for what is right, and that’s what a real Filipino woman identity today. Just like Rizal, he focused on self-improvement, showing to Spain and the rest of the international community that, given the opportunity to achieve their full potential, Filipinos could stand alongside the best in the world and were eligible for self-rule. Then he set out to apply what he had learned as an ophthalmologist, providing a basic service that was badly needed by his impoverished compatriots. In his writings he emphasized the importance of education, seeing it as the path to national progress rather than armed revolt. We all know that prudence does not consist in blindly obeying any whim of the little tin God, but in obeying only that which is reasonable and just, because blind obedience is itself the cause and origin of those whims, and those guilty of it are really to be blamed. Rizal said that God gave each individual reason and a will of his or her own to distinguish the just and the unjust, all were born without shackles and free, and nobody has a right to subjugate the will and the spirit of another. I hope we can revive the reverent sentiments of gratitude to him for his efforts in releasing us from foreign bondage. Political rhetoric is not enough to keep his heroism alive. Let us remember that he forsook the enticements of his youthful and gifted life and embraced instead the ultimate sacrifice for the welfare of his country. That is the best homage we can pay the greatest hero of our race. Conclusion The issue of racial equality is today hardly disputed in intellectual circles. During Rizal’s time, however, the claim that â€Å"all races are essentially equal† was a highly debated topic among anthropologists, biologists, and philosophers. The readers of his novels, essays, and letters are familiar with his portrayal and denunciation of Spanish colonial rule. His insistence on the education of the native Indios, the representation of the Philippines in the Cortes Generales, and more so the recognition of the civil rights of the Filipino are all based on the belief that there are neither â€Å"essentially† superior nor â€Å"essentially† inferior races. In this belief stems the conviction that his fellow Filipinos had the capacity for autonomy and enlightenment. The present Filipino youth must know that in order to make their presence felt, they must understand Rizal. To understand Rizal, they must have the spirit and motivation to do so. Without such spirit or motivation, they will never be able to understand Rizal’s objectives or even the other heroes who fought for equality and freedom for the sake of the Fatherland. I believe that the Filipino youth will be able to move the society through these implied teachings of Jose Rizal that will sprout a new love to the Filipino Hero, I admit that I only considered Rizal’s Life and Works as another general education subject that is needed to be taken. But what I get is more than just knowing Rizal, but also knowing my Filipino identity and that I must fight at all cost to defend my identity. A lot of what Rizal had dreamed of has now come true for many people in the state. He was already a modern democrat when he advocated participation in the state and society with education. Today, education is no longer a privilege among the small elite, for everybody’s participation in all public matters has become a right and duty. † One’s right to express him or her in all matters is founded on compulsory education with the required quality standards. References: Jose Rizal’s Writings in Europe and its message to the Filipino Youth Today Zaide, Gregorio F. & Zaide, Sonia M. 1998. Jose Rizal: Life, Works and Writings of a Genius, Writer, Scientist and National Hero. Capino, Gonzales and Pineda: Rizal’s life, works and writings:their impact on our National identity Colonization: It’s Impact on Self-Image Philippine Women in Rizal’s Novels and Today By Linda Acupanda McGloin.

Thursday, August 29, 2019

Scientific misconduct Essay Example | Topics and Well Written Essays - 2000 words

Scientific misconduct - Essay Example Several journals publish their own ethical guidelines (Coats, 2008). However, it is surprising that many journals say little or nothing in their â€Å"Instructions to Authors† about which types of data manipulations and data presentation conducts are acceptable and which are not. A particularly delicate issue is that of digital image manipulation. In the days before imaging software became so widely available, making adjustments to image data in the darkroom required considerable effort and/or expertise. It is now very simple, and thus tempting, to adjust or modify digital image files. Many such manipulations have been recently discussed and stigmatized in biology top journals (Rossner, 2004). For what concerns handling of scientific misconduct, several institutions have issued guidelines, even though determining appropriate sanctions is often very difficult and may vary in any specific case. As remarked in the NIH guidelines, sanctions imposed on a particular individual may h ave consequences that are much broader, i.e. members of the laboratory may be indirectly or directly affected as well. There should be a logical correspondence between the nature and severity of the proven allegations and the sanctions imposed. (NIH Committee on Scientific Conduct and Ethics, 2004). The sanctions may include, but are not limited to, the following: removal from a particular project; letter of reprimand to be included in the individual's NIH personnel file; special monitoring of work; decrease in laboratory support probation; suspension with or without pay; denial of a raise in salary or a salary/rank reduction; termination of employment (NIH Committee on Scientific Conduct and Ethics, 2004). Questions and answers CASE ONE a) Do you agree with the committee’s finding? Why or why not? I do agree, since the student behavior in case report clearly corresponds to the current definition(s) of scientific misconduct issued by several independent institutions and commi ttees (see Introduction for such a definition). b) Dr. Potter was a co-author of the submitted manuscript. Should he also be found guilty of scientific misconduct? He should not be directly guilty of scientific misconduct. Nonetheless, he is likely the last author of the paper since he is the mentor of the student. Last authors, and corresponding authors, have several clearly stated responsibilities, such as controlling that the co-authors of their work are mentioned and agree to terms and conditions of publications etc. Last authors and corresponding authors have also implicit responsibilities, such as mentoring and controlling students' behavior and skills. As a part of the education program underlying a laboratory experience, there is teaching scientific behavior. The latter consists of not only making experiments following the scientific method but it also includes ethical behavior, since science is based on the assumption that experiments are true and reliable. Dr. Potter will likely have severe consequences from his lack of attention; for instance, he will need to publish a corrigendum or to retreat his paper from the journal. This act negatively affects one's credibility with negative fallout on future publications. c) Should the university revoke George’s degree? Revoking a student's degree is one of the sanctions hypothesized by several american universities in the case of scientific misconducts. For instance, Case western Reserve University, in his Graduate School guidelines on handling scientific misconducts states: â€Å" In the event that a suspected violation of academic integrity standards is

Wednesday, August 28, 2019

Noise Control Essay Example | Topics and Well Written Essays - 500 words

Noise Control - Essay Example In my opinion, the first restriction that community members will desire is that of a set boundary. People visiting the night club should not be allowed to loiter, and must stay within the actual boundaries of the night club, and not wander into the residential area. Second, the night club should be expected to shut its doors at a particular time period each night, and stay open no later than 1:30 AM in the morning. Next, the night club should not be too loud so as to disturb the people in the neighborhood; the night club should maintain a respectful volume so that the citizens of the area and the children of the area are well rested enough to wake up and go to school and work in the morning. If the volume is kept at a level where it does not interfere with the community, the community would be more likely to accept the nightclub in its area. The night club should also make sure to maintain a heavy security staff, since the night club is close to a residential area, and intoxicated in dividuals should not be allowed to wander or wreck havoc in the residential area. Furthermore, a heavy security staff will probably also help to make the community itself more comfortable with the idea of a night club in its area. Hearing protection should be worn by employees of the night club.

Tuesday, August 27, 2019

Is globalisation a state-authored process Essay

Is globalisation a state-authored process - Essay Example This increased level of globalisation has necessarily meant that cultures and individuals that otherwise might not integrated with one another have come to the in closer contact and sharing a great many more similarities than they have any previous time within recorded human history. The example of the way in which social media has integrated many otherwise disparate individuals throughout the world is a good example of the way that this fundamental shift has been witnessed throughout the current model of media proliferation and globalisation. However, from even a cursory unit of analysis and a discussion into the view that has thus far been put forward, it must be understood that the proliferation and globalisation throughout the world is not an authorless process. Oftentimes, powerful individuals, and indeed states, within the developed world have a strong impact with regards to the way in which globalisation takes place and the particular manner through which the internationalizat ion effects that globalisation is capable of engendering take place. As a function of understanding this â€Å"state authored impact† that globalisation is capable of bringing to bear, the following analysis will approach current levels of globalisation from three distinct perspectives: trade interaction, the impact of technology, and the proliferation of globalized media. It is the hope of this author that through such a distinctive and nuanced approach, the reader will be able to come to a more appreciable view of the way in which current levels of globalisation are illustrated and affected. An Analysis of Globalisation in Tade: Whereas globalisation can be understood in a litany of different mechanisms, perhaps the most effective towards understanding globalisation and the power that it has over individuals throughout the world is to engage it based upon its monetary value (Schoen et al., 2013). In seeking to engage globalisation from a monetary value standpoint, the first rational approach that can be engaged is to approach it from the standpoint of trade. Whereas globalisation is represented throughout the world and impacts upon individuals in a litany of different situations, the power that globalisation has over trade and the means through which different nations choose interact with one another is ultimately the driving force that helps to spread globalisation and increase its impact throughout the world. However, even though globalisation can be understood as a universal concept, it must also be appreciated that globalisation is state specific and ultimately a state authored process (Corstjens & Umblijs, 2012). What is meant by this is the fact that regardless of the nation that is analyzed with a particular economic system that is considered, it must be understood that globalisation exists within a given region only due to the fact that trade agreements, domestic legislation, tariffs, barriers, and a litany of other financial issues have alrea dy been determined and directed in such a way so that globalisation is able to integrate with a given economy (Cook & Underwood, 2013). As such, if it were not for regional and domestic governance and choices that these institutions were able to make, the level and extent to which a globalized economy and the impact of global trade could affect a given region would understandably be minimal (Lapido et al., 2013). An example of this can of course be seen with respect to the way in which the United States,

Monday, August 26, 2019

Infantilization of women in advertising Essay Example | Topics and Well Written Essays - 500 words

Infantilization of women in advertising - Essay Example This essay "Infantilization of women in advertising" outlines the reasons for infantilization of females in commercials and how it affect the perception of women id advertisement. Infantilization is not a new concept but has been in existence for quite a long time. Many advertisers edit or sexualize bodies of younger girls and use them for advertisements. An example of female infantilization is the assumptions that beauty entails getting younger. Most advertisements make this assumption when they use exaggerated pictures of young girls when advertising beauty products. They thus use images of young girls or those of women but with childish behaviors (Wade Web). The women are postured in childish ways with empty stares, hands in mouth, or adopting seductive postures. Additionally, the skin texture is exaggerated. The postures make women appear submissive and not in control of their lives. The advertisements appear to be creating children out of women. This is contrary to the upright w ay men are postured demonstrating adulthood and being in control (Carlson 2-4). The erroneous infantilization defines women as weak and unintelligent. This is a block to celebration of femininity. Instead of encouraging girls to grow into strong women, advertisement in magazines and other media inspire girls to develop into women with childishness. Some advertisements appear to be inspiring women to act like children to be considered feminine and sexy. The antifeminist image below from maxim is an example of such appeals.

Sunday, August 25, 2019

This is a group work. The part which I am doing is about HP.com. Look Essay

This is a group work. The part which I am doing is about HP.com. Look at Assignment criteria, and write in the form of 12 sub - Essay Example The company’s global operations have been said to e directed from California’s Palo Alto in the US, which is its headquarters. On the other hand, its US operations have often been directed from special facility within Texas’ unincorporated Harris County near Houston. The Latin American offices to this company are situated within Florida’s unincorporated Miami-Dade County, in Medellin Columbia near Miami (Hennessey and Jeannette, 2004). In Europe, its offices are in Switzerland’s Meyrin close to Geneva. In Asia-Pacific, its offices are located in Singapore. Moreover, it possesses large operations within Plano, Texas, San Diego, Colorado, Fort Collins, California, Roseville, Idaho and Boise. Within the United Kingdom, HP bases itself on a considerably large site within Bracknell, Berkshire with the offices having been located within several locations including a landmark tower office within London’s 88 Wood Street. The company’s websites is created to be accessed by every individual within the globe without any issues, with the delivery services being executed upon order from consumers. Overall Strategy HP’s recent strategic move might be referred to have been out rightly outstanding. Its decision to do away with the hardware systems and lay focus upon enterprise software, appropriately waved the white flag, as well as ceded the dramatically changing personal computing business into Apple when it made public its intentions of jettisoning its customer hardware division together with scrapping its poorly selling mobile product line so as to concentrate on business services (Dorfler & Heuveline, 2007). According to a variety of analysts, HP’s move seems to have been an original idea of an outsourcing powerhouse IBM, having continuously bundled the hardware that it no longer owns to its outsourcing deals. This has been considered HP’s ‘appropriate correction’ within the industry, exiti ng the markets where it could be attaining a hiding and concentrating on the enterprise clients that desire for alternatives to the giant powerhouse, IBM. In case it technically rids itself off the computer business, it might offer the customers who might be wary of outsourcer, thus pushing its own hardware an impression that it is vendor-agnostic (2007). Marketing Strategy The company seems to be taking transformative, bold steps in order to drive the creation of long term value of shareholders through a concentration of fewer fronts, thus improving its capability of executing, investing in innovation and driving a higher margin business mix. However, it is clear that actual transformation within the outsourcing industry calls for more than just shifting the dollars from hardware devices to software devices. Although laying focus on software and other services might not necessarily enhance those sectors in the future, but it enables the company to concentrate on a particular consum er base and fully satisfy their desires within an industry that is less saturated and less competitive; the outsourcing industry (Burkett, 2002). However, the move to outsource its business cannot guarantee that the company would not be faced any competition. In fact, stiff competition might be posed by the Indian based companies like Cognizant, Infosys and may others. In order to fight back, the company possesses a majority stake within Mphasis, the Indian IT service provider and could

Saturday, August 24, 2019

Homework Coursework Example | Topics and Well Written Essays - 250 words - 14

Homework - Coursework Example nism perspective diverges from the two perspectives since it does not seek Truth or to make permanent epistemological or ontological commitments like those that produce modernist forms of scientific endeavor of meaning and human meaning making activity. German sociologist Max Weber will resonate very well with me. In his modern organizational theory, idealized organizational structure, duties and responsibilities for workers are clearly stipulated and behavior is highly controlled by policies, rules, and procedures. This contributions are worthy while as most of organizations today are governed by rules that control the behavior of the staff Systems-technical theory is the interdisciplinary study of organizational systems in general. The main goal of system theory is to elucidate principles that can be applied to different types of systems at all nesting levels in all fields of research. Institutionalization refers to the process of implanting some conception within organizations, social system, and society I general. The concept may also refer to committing a particular group or individual to an institution, such as a welfare or mental institution. The term is also be used in political context to apply to the organization or creation of governmental institutions and particular bodies with duties of implementing or overseeing policy. Deconstruction is a form of literary analysis and philosophical derived primarily deduced from Jacques Derrida’s work done in 1967. In the 1980s it designated more loosely a wide range of theoretical enterprises in distinct areas of the social and humanities sciences. In addition to literature and philosophy, other field of interest in deconstruction includes historiography, anthropology, feminism, linguistics, sociolinguistics, political theory, psychoanalysis, and lesbian and gay studies. Bank of America maintains environmental guidelines and policies related to forests, climate change, energy, environmental lending and

Friday, August 23, 2019

Proposal for Aquisition of LifeCell Essay Example | Topics and Well Written Essays - 2500 words

Proposal for Aquisition of LifeCell - Essay Example LifeCell Corporation deals in developing, processing, as well as marketing of tissue-based products which are used in reconstructive, urogynecologic and orthopedic surgical processes to restore soft tissue defect in America and worldwide. LifeCell's reconstructive products consist of AlloDerm used for plastic reconstruction, all-purpose surgical, burn up, and periodontal processes; in addition to Strattice, a porcine dermis which eliminates cells and lessens a constituent in the xenogeneic rejection reaction. LifeCell's orthopedic tissue restore products include GraftJacket for restoring damaged or insufficient integumental tissue in orthopedic surgical procedures. The company was incorporated in 1992 in the State of Delaware. (LifeCell Company, 2007) The company has a research and a development team which has ongoing research programs to develop new products required in the clinical applications and surgical applications to enlarge the company's product mix in the highly fast growing bio-surgery industry. (LifeCell Company, 2007) Sof... 2. GraftJacket; for orthopedic uses and lower end wounds 3. AlloCraft DBM; used for bone grafting processes 4. Repliform; used for urogynecologic surgical processes 5. Strattic; for specific plastic reconstruction and all-purpose surgical Processes The company has a research and a development team which has ongoing research programs to develop new products required in the clinical applications and surgical applications to enlarge the company's product mix in the highly fast growing bio-surgery industry. (LifeCell Company, 2007) Industry overview Soft tissue, for example dermis, blood vessels, nerve connective tissue and heart valve encloses an intricate, three-dimensional makeup which consists of manifold forms of elastin, proteoglycans, collagen several proteins as well as vessels (tissue matrix). As component of the human body's normal remodeling procedure, cells In a tissue constantly degrade during this process it replaces the tissue matrix. Nonetheless in the occasion of a large port of tissue matrix is lost or destroyed as a result of surgery or trauma, the human body cannot be able to regenerate that destroyed part this results in scar development. In such a case, surgeons encounter several treatment alternatives for repairing physiology and structure function, the alternatives includes using implants materials from the patient's body parts ("autograft") or created allograft tissue or using synthetic products. The company believes that the best alternative is the use of allograft or xenograft from the company which do not cause tissues matrices to undergo any damages. (Covell, 2006): Industry and market data Table 2, below, has estimated market information of the company's main products in the USA market. The

Thursday, August 22, 2019

The cold war Essay Example | Topics and Well Written Essays - 500 words

The cold war - Essay Example Truman’s policy, also called the â€Å"containment doctrine,† was intended to suppress and control the spread of Communism worldwide. The containment promptly became the executive U.S. policy towards the USSR (â€Å"The Cold War†). In 1949, Soviet Union had effectively launched its first atomic bomb, thus ending Americas monopoly of atomic weaponry. This event started the Cold War. The US then realized that the country was faced with threats of nuclear warfare.  The government immediately commenced the investigation of the probability of the US atomic secrets leaked to the Russians by American Communists. High-status court proceedings concluded the conviction and execution of  the Rosenbergs in 1953 (â€Å"The Second Red Scare:  Fear and Loathing in High Places, 1947-1954†). Julius and Ethel Rosenberg, under the Espionage Act, were found guilty of conspiracy to commit espionage for the Soviet Union from 1944 to 1950. The Rosenbergs had been fundamentally involved in a Communist undercover agent circle that leaked US national defense secrets, particularly blueprints of high-explosive lens patterns and the US atomic bomb Trinity design, to the Soviet Union (Parrish). Truman’s war on communism ignited an anti-communist panic that led to espionage trials, an aggressive communist manhunt, and escalated aggression as the American government questioned, deported and investigated citizens suspected of being communists (â€Å"The Second Red Scare:  Fear and Loathing in High Places, 1947-1954†). Truman’s proposal that the country exercise military force to contain the global communist conspiracy started a chain of armed conflicts and deadly arms race between the U.S. and the U.S.S.R. (â€Å"Cold War†). The anti-communist hysteria precipitated the U.S. involvement in the Korean War (Sandler). The Second Red Scare occurred after the

Project Plan- Risk and Quality Requirements Essay Example for Free

Project Plan- Risk and Quality Requirements Essay IT Project Plan IT projects are complex in nature. A proper plan gives not only maps the elements of the project but also ensures that the progress of project is going in the desired direction. In other terms, a project plan reduces the risk of project failure or over runs and improves the quality of the project. Project plan is the initial step in executing the project management. Project management strives to meet the expectations of the project stakeholders in terms of cost, quality, delivery and operations.    Project management is a crucial process that involves, people, process, price, infrastructure and cost. Project management should balance the interests of different stakeholders of the project like Project team members, management of the working group, client parameters, industry practices and the budget restrictions. In IT industry, it becomes the responsibility of project manager to look after the co-ordination of the above aspects. Project plan becomes an essential helping tool to the project management in directing the project requirements to the people and system. The project plan aligns the activities with the project life cycle and gives visibility to different phases of the project. IT will be like indicating the stakeholders of the project like client and project team to act upon the different activities of the project like, development, testing, rollout, training and implementation. The project plan is developed in connection with Organizational plan, Risk plan, Cost plan, Test plan, Roll out plan, Quality plan, Maintenance plan etc., So it is evident that Risk identification and Quality parameters act as forecasters for the project phase activities and does have a great significance in the successful implementation. However project plan includes the The Project Plan provides complete overview on how and when a projects objectives are to be achieved, by expressing different activities to resources to achieve targets at different milestones The major elements of the project plan are as following: Description of the project or an over view of the project plan. Project specifications and requirements of the client Project Initiation plan and requirements in terms of technology, budget and people Project dependencies- external, internal Project milestones like Analysis, design, development, testing, implementation and training Identification and specification of project assumptions like availability of resources, technical inputs, skills and competency requirements. Project plan with work break down structure through Gantt chart or bar chart and control points at different levels. Project level activity specifications for different stakeholders like client team,, analysis team, design team etc., Project level resource specifications Project budget and cost plan Project tolerance, through put and capacity in terms of users and boundaries Technology to be implemented with constrains and rationale for the usage. Network contingency plans and infrastructure layout plans to be required for the project work out Risk identification and risk tolerance specifications of he system Quality framework under which the project is expected to execute Risk Risk can be termed as the possible loss or damage to a process. Risk identification is the estimation of possible potential dangers that can occur or hinder the progress of the project.   Risk in IT project management is a major component to consider even before the project execution, as the unidentified risks not only obstruct the progress but also may turn the entire project into loss. A risk will have a probability something above 0%.   And there is an identified chance to happen, which other wise is not a risk. So a deliberate approach to identify and mitigate the risks is highly appreciable from the project learning from decades. According to Dr. Barry W. Boehm, (as cited in kjordan) the top 10 identified software risks are as follows: Personal Shortfalls in perception of risk and resources Unrealistic schedules and budgets Developing the wrong functions and properties Developing the wrong user interface Gold-plating Continuing stream of requirements changes Shortfalls in externally furnished components Shortfalls in externally performed tasks Real-time performance shortfalls Straining computer-science capabilities So, IT projects do have a risk management process that is expressed through the risk management plan. The risk management plan contains the four major areas to observe in the plan: Risk Identification: The project manager or risk management personnel will identify the possible potential threats to the project management before well in advance. Eg; Shortage of workforce due to the withdrawal of people from the team; this can be from different reasons like, maternity leave, transfers to other projects or contract termination etc., Risk Quantification: The risk identified should be quantifiable, other wise which it is will not be of much useful. Eg; What percentage of people are going to be placed on another major project or percentage of testers that may not be available on project A. Risk Response: The consequences of risk should be specified, in the sense, sometimes the system may be less altered with certain types of risks. With this, the low response of system indicates and attributes the risk as a less priority risk. And the risks that may cause major alterations to the process will be given high priority by the project plan to address them and mitigate them. Risk Monitoring and Control: Risk monitoring and controlling involves the risk mitigation tools and practices for the easy execution of the project. Eg: Training the new people to fill the gaps on attrition by the time they leave or to be transferred from the current project process. The common risk scenarios in IT projects are as follows: Schedule Risk This is the highly possible risks in IT projects, when projects over run with scheduled times or slip the release schedules or the client priorities and queries are not answered Schedule risks alters the project phases and disturbs many dependencies. Other project dependencies like testing schedules, release schedules and infrastructure costing etc., can be altered and result in excessive costing and   losses. Schedule risk can happened due to the following reasons: Inappropriate or wrong project time estimation Poor tracking and monitoring of work break down plan with the resources. Over estimation of system functionality and through put. Eg: When the existing system support only 50 resources to work, scheduling of 60 or 65 may result in non availability of proper infrastructure. Wrong estimation of effort or skills. Eg: the project with low skilled work force or low effort estimation may take much time compared with the scenario of experienced people on task. Failure to specify or identify complex functionalities or requirements that emerge and become stumbling blocks for the progress execution, takes longer time to resolve and them to continue with the projected phases. Unexpected project scope expansions: These can happen due to the poor business analysis and feasibility guidelines. Budget Risk All the above schedule risks can ultimately result in increase in resource cost. In addition to this, the following at the initial project plan phase also result in budget risks Wrong budget estimation: When the cost of resources is going to be increased in future, adaptation of old compensation rates will ask for more funds to meet the project execution after some time. Cost overruns: These will arise when the project activities are not aligning with the planned activities Project scope expansion: Wrong specification of requirement may lead to extra budgets.   Ã‚  Ã‚  Ã‚  Ã‚   Eg:   Some IT projects fail to define the project scope very specifically in terms of design,   Ã‚  Ã‚  Ã‚  Ã‚   development, training (on site), installation, maintenance, and support. A project that fails   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   to differentiate between on site training support and training support through   Ã‚  Ã‚   documentation like user guide and admin guide has to face a situation in which the   Ã‚  Ã‚  Ã‚  Ã‚   company has to bear the traveling and expenses of training resource when on-site training   Ã‚  Ã‚  Ã‚  Ã‚   is demanded in the last moment. Operational Risks Operational risks arises due to non specification of appropriate project methodology and non implementation of project processes like daily meetings (scrums), communication reports, Change requirement reports. Such risks will again result in over runs in operational schedules and results in high costs. Some causes of Operational risks are as follows: Failure to address priority conflicts: when tasks and conflicts are not nor prioritized, people sit on unnecessary or low priority tasks resulting the operational delays. Failure to resolve the responsibilities: The non-defined roles and responsibilities work on the similar operations or raise conflicts at some point of time in the operations. Insufficient resources : A project with in sufficient resources may execute poor operational performance and may result in operational delay.   No proper subject training : When the project stakeholders are not given project training at consecutive levels, there will be no direction and clarity in the project operations.   No resource planning : If the resource allocation is not properly planned, conflict arises between the different activities of the system   No communication in team: poor communication is the major hindrance for smooth project execution. Excessive communication and less communication will also alter the project schedules. Non -defining the desired level and form of communication hampers the information flow . eg: Non-maintenance of Change request forms from the client may result in wastage of work on the old configuration of modules by the developers and may result in project over runs. Technical risks Technical risks are the most unidentified risks with great damage and result in failure of functionality and performance. The causes of technical risks are: Continuous changing requirements: The initial technical specifications may require different technology platform to the technology that is appropriate for the recently added requirements Poor suggestion of technology: Lack of technical expertise of resources may result in compatibility problems. Some advanced features that may not be ready by the time of release, or that may not be compatible with the already developed functionalities will hamper the project execution. Product is complex to implement: When the product development is too complex and there is a dearth of skill and expertise in the market, the project needs to suffer delay or failure. Difficult project modules integration: When different modules are products are to be integrated, incompatibility problem arises between them that result in re work or failure. External Risks    These are the external risks beyond the boundaries of project management. These are all uncertain and may result of the following: Shortage of fund. Market Changes: Transferred demand Changing customer product strategy and priority Government rule changes. Quality Requirements of Project Quality refers to the delivery of projects and products that meet the expectations of all the stakeholders. A project that may meet all the specification of the client, but may over run the project schedule is not termed as a quality project, as it has resulted in extra cost to the management. So in order to bring down the risk, IT projects adopt different Quality models. For example Software design and development projects adopt quality models like CMMI, ISO, BSI, etc., he quality model frames a risk management plan and ensures the system to adhere to the planned project activities until the successful implementation. Usually the quality models identify some risk areas and constantly work on controlling the risk areas. The parameters that are commonly observed by different Quality models for IT systems are as follows: Correctness, Reliability, Integrity, Usability, Efficiency, Maintainability, Testability, Interoperability, Flexibility, Reusability, Portability, Clarity, Modifiability, Documentation, Schedule, Validity, Functionality, Generality and Economy. The quality management department or manager will ensure the project that it is being executed properly as per the plan. All the stakeholders monitor the project activities according to the quality parameters and control the error or risk as per the risk mitigation guidelines. Project Quality Plan defines the expectation of the stakeholders in terms of project specifications, schedule time, technology inputs, dependencies etc., and also maps the process to ensure the system to balance. A Project Quality management supports the following through quality plans and system guidelines: Defining organizational and project level quality objectives and parameters Customer requirements and expectations in terms of functionality, delivery Acceptance criteria of the IT product, which is a prioritized list of criteria for the customer to accept the final product. Roles and responsibilities of Quality management team. Functionality boundaries of the project quality system Reference to Industry practices or standards to be met The quality-control and audit processes to be applied to project management Quality-control and audit process parameters and requirements Change management procedures in case of scope change in project Configuration management plan Validation and verification controls Quality control and Assurance plan and procedures By adopting quality monitoring procedures Defining test lab procedures like- test documentation, testing resources, Test cases, scenarios, error logs and other testing documentation Metrics for quality analysis System guidelines for quality management procedures Maintenance of configuration management and change control requirements Conclusion For the Successful IT Project implementation, the project plan must address the risk issues and Quality requirements to mitigate the risk issues. Effective project planning, quality control, and monitoring will ensure the quality assurance of the project mitigating the identified risks. References Elizabeth and Richard Larson, How to Create a Clear Project Plan, Retrieved February 2,   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   2008 from www.projectmanagement.ittoolbox.com/documents/industry-articles/how-to  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   create-a-clear-project-plan-844 26k – EPA Requirements for Quality Assurance Project Plans (EPA QA/R-5), Retrieved February   Ã‚  Ã‚  Ã‚   2, 2008 from http://www.epa.gov/QUALITY/qs-docs/r5-final.pdf kjordan, Introduction to Software Risk Risk Management, Retrieved February 2,2008   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   from   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://baz.com/kjordan/swse625/intro.html Hyatt L. Rosenberg, A Software Quality Model and Metrics for Identifying Project Risks and Assessing Software Quality, http://satc.gsfc.nasa.gov/support/STC_APR96/qualtiy/stc_qual.html Project Management Planning, Retrieved February 2, 2008 from   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://www.cio.ca.gov/itpolicy/pdf/PM3.2_Planning_Process_and_Plan.pdf Project Quality Plan , Retrieved February 2, 2008 from   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://www.ogc.gov.uk/documentation_and_templates_project_quality_plan.asp Project plan, Retrieved February 2, 2008 from   Ã‚  Ã‚  Ã‚  Ã‚   http://www.ogc.gov.uk/documentation_and_templates_project_plan_.asp QUALITY ASSURANCE PROJECT PLAN REQUIREMENTS, Retrieved February 2,   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   2008   Ã‚   from     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://www.wipp.energy.gov/library/CRA/BaselineTool/Documents/Appendices/  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   WAP%  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   2010.PDF Quality Assurance Planning, Retrieved February 2, 2008 from   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://www.chesapeakebay.net/info/qa_planning.cfm Risk management strategy, Retrieved February 2, 2008 from   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://www.ogc.gov.uk/documentation_and_templates_risk_management_strateg  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   y_.asp Risk management framework, Retrieved February 2, 2008 from   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://www.ogc.gov.uk/documentation_and_templates_risk_management_framew  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   ork_.as p Risk management strategy, Retrieved February 2, 2008 from   Ã‚  Ã‚  Ã‚  Ã‚   http://www.ogc.gov.uk/documentation_and_templates_risk_management_strateg  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   y_.asp Risk log (risk register) Retrieved February 2, 2008 from   Ã‚  Ã‚  Ã‚  Ã‚   http://www.ogc.gov.uk/documentation_and_templates_risk_log_risk_register.asp Types of Risks in Software Projects, Retrieved February 2, 2008 from   Ã‚  Ã‚  Ã‚  Ã‚   http://www.softwaretestinghelp.com/types-of-risks-in-software-projects/

Wednesday, August 21, 2019

E Business Integration Systems Of Alibaba

E Business Integration Systems Of Alibaba Alibaba.com is commonly quoted among the leading 5 websites in the world. Other 5 websites which are competing in the same race are Amazon, Yahoo, eBay as well as AOL, with the help of domestic as well as international media. Hence, in other words, www.alibaba.com is a top rated business-to-business (B2B) as well as business-to-consumer (B2C) website. The e-business integration system of this website, in general, needs such a tactic, which has a touching appeal in order to produce prompt action. Hence, principally for an expensive products or assistance, this website is required to offer superior depth of information to the customers (both buyers as well as suppliers) in order to assist them in their assessment of this business. This website is useful for both buyers as well as sellers. Hence, one can buy as well as sell products also. This website is basically an English-language website as English is the only language which can be understood by whole world. So, there is no geographical challenge for this website to seek attention of customers. It primarily serves small as well as Medium-Sized Enterprises or in short SME, in the worldwide trade community, and hence, around 1 million users have registered themselves to this site from more than 200 countries as well as territories. Over 300,000 visitors go through this site every s ingle day, among which maximum users are global buyers as well as importers who are looking for trading with traders in China as well as other foremost manufacturing nations all over the world. Hence, the primary customers for this website are Suppliers, Exporters, Manufacturers as well as Importers. Problem Statement As www.alibaba.com is a website on a broader perspective, millions and trillions of customers go through it and trade accordingly. Now, the main problems while designing this website which needs to be solved are following: The website must be user friendly, so that it should not be problem for a buyer or a seller to navigate the site and work accordingly. Not everyone is well versed with internet technology; hence, its really important to make a comfortable website with not very complicated language. but, on the same hand, the website should be attractive enough to appeal visitors to go through it. Secondly, its a normal tendency that customers usually like to inspect the merchandise before purchase; hence, they can assume that they are at advanced threat of fraud as they are not able to inspect the product and services physically. There is one more risk of making purchase with the help of stolen credit cards or any other counterfeit refutation of the online purchase. Hence, this website needs to be more reliable and secured from customers perspective. Third problem area is that Secure Sockets Layer (SSL) encryption is a must to be used for secured transaction otherwise not a single buyer as well as supplier will want to use their credit card for this purpose. SSL is a technique which usually solves the difficulty of credit cards which, many times, got disconnected in delivery between the customer and the business. A lot of hackers are there to hack the transaction in between; hence, SSL should be compulsorily used in order to avoid Identity theft. Thus, computer security is really a major concern, now days, for both merchants as well as e-commerce service providers, who install countermeasures like, firewalls as well as anti-virus software, which is essential for protecting the network. Phishing is one more danger, where customers are fooled by thinking that they are trading with retailer of good reputation, while, they are actually manipulated to feed confidential information to such a system which is controlled by malicious parties. Hence, website needs to be secured enough to avoid the circumstances of Phishing. One more problem area is privacy. No one wants to share their personal and confidential information with third party or over unsecured network because of risk; hence, registration must be very confidential and secured. Even, a lot of consumers do not like spam and telemarketing also, which can lead to providing contact data to any online merchant. Objective This research intend to develop as well as design a website with inbuilt e-commerce techniques, such as, B-2-C (Business-to-Consumers) as well as B-2-B (Business-to-Business) features meant for efficient marketing approaches. Moreover, there are few more specific objectives while designing this site, as well. First is to build up such a system which must permit a process of monitoring in order to maintain database interactivity. Second objective is to create such a data-driven application where the contents of the web can be reorganized dynamically. Furthermore, last but not the least objective is to provide as well as improve all the product information and allocation for Alibaba.com. Summary Alibaba.com is one of the global leaders in the world of e-commerce for small scale business organizations as well as flagship corporations of Alibaba Group. This website offers internet as well as Web-related services to customers all over the world. The services provided by this website are selling different products to its customers. As this website is designed on the principle of Business to Business (B2B) and Business to Customer (B2C), both, buyers as well as suppliers are its customers. Based on the experience along with expertise in both business-to-consumer and business-to-business sales, this business organization believe that it can offer a unique as well as superior service to its customers across the whole world, in comparison to what is currently available. The development of this project is based on the phases of System development Life Cycle. All the problem areas have been identified and hence, a user-friendly website has been created. These phases of development will emphasize most of the aspects of this system and the business. Planning Planning is something which is very important for any organization to do as it will help in organizing things in a planned manner. We can be successful in what we are doing if proper planning is done. We need to understand the purpose of planning the things. This will help in going in the right path. There are many important things which have to be taken care when planning for a task. Planning a website is again the most important thing as it is used by the users of the organization. This is something which has to be taken care seriously. Proper planning will lead to the success of the company. It is always advisable to design a website with the help of experienced people. There are two main steps in planning for a task. Project intention: This is something which helps in understanding the importance of the project. The value of the project should be known properly. Our final intention of creating a website is to increase the revenue of the company. Website should be planned in such a way that it is user friendly. Users should be able to use the website and should get the required information from it. Website planning is an important task and should be taken seriously. Details about the company should be included. Search options should be very friendly. This will help in navigating properly across the site. We should design the website in such a way that customer can get all the information that they are looking out for. We should look into minimizing the work and should think of saving money. Website should be designed in such a way that customers are visited quite often and can be impressed with the websites information. This will increase the number of users and also helps in increasing the revenu e of the company. Project management: Project management is very important as it will help in understanding the requirements. We should be very careful when designing the website. We should a proper planning of how to create the website. Care should be taken that the size of the website should be enough to get into it as it may slow down which will in turn increase customers frustration. Designed website should be virus free which will increase customers visit and also will ensure that the website is safe enough to use. There are many other things which also have to be taken care and are the color, design and the font size. Color used to design the website should be light and should not involve many colors. On the other side we should also make it look attractive. Font size should be normal so that we can easily follow. We should try to create something different on the website which will attract customers and can increase our revenue. Competition is very high in this modern generation. So we should m ake the difference to tolerate our competitors. We should ensure that the language is English as most of the customers across the globe can access the website. In this way a planned website can be created successfully with all the latest features. Analysis, including descriptions of the requirements or projected features of the Web site by highlighting integration issues The analysis phase describes all the possible necessities of this website in order to develop it. Requirements are basically the collection of functionalities as well as constraints which the end-user must expect from the site and as alibaba.com has both buyers and suppliers as the customer, it really need a well designed integration of selling and busying over the secured mode. These requirements are collected from the customer by means of discussion. It is really very important to take customers suggestion as end of the day our goal is to satisfy our customers. We should be able to analyze what is the problem, where are we lagging behind, what are the improvements to be made, etc. In this way, many things can be sorted. Analyzing the current situation and working accordingly will help in overcoming the barriers. We should be capable to analyze the situation. These requirements are examined in order to check the validity as well as the possibility of incorporating them in the system which is to be developed. At last, a document providing requirement specification is developed that will serve the intention of guiding principle for the forthcoming phases of model. This website has been designed on the basis of waterfall model under the processes of System Development Life Cycle. The requirement specifications which are included for the purpose of development of website are: proficiency in copy writing, conventional graphics, high-resolution images, consultation regarding website architecture, reasonable web hosting along with the service of active 24X7 customer supports for the domains, domain registration, hosting as well as other services. This site also requires various development services including ordinary B2C functionalities, such as e-commerce solutions as well as video integration. More features like online catalogs, integrated convincing client demonstrational videos or testimonial videos, and many others, can appeal visitors to view and trade through this website. Local Search as well as Ranking Services may also assist in dominating the presence of local market. This site will also offer various other services like pay-per click services in support of Google Adwords, MSN advertisement Center and Yahoo Search promotion, consulting advertising over the internet, in addition to entire program management in order to get the majority for the budget. Diagram1: Project Management technique While every project has different set of requirements as well as challenges as per the project specification, there are several milestones and considerations, which are common in every project. In broader perspective, a 5 stage strategy is developed. These phases comprise of all the necessary phases of a Software Development Life Cycle or in short, called SDLC model. Requirement Analysis: Before start functioning on the project, an in-depth study of users requirements is needed to make the base or foundation of the website. Hence, this will assist in suggesting one of the best clarifications suiting the current requirements. Design: next phase is design phase which basically starts as soon as the project kicks-off. This phase describes the designs for the front-end along with robust and scalable application structure which includes the database design. This phase is one of the critical phases in the project since; entire application is going to be formed based on this framework. Development: As soon as the design is confirmed, reviewed as well as approved in the design phase, now the next stage is the development stage where application development starts utilizing the suitable programming languages based on the requirement of project. Various type of testing is done in this phase, such as unit testing, system testing as well as integration testing at various milestones of this B2C and B2B website development project in order to make sure an error free delivery to the end user. Devotion to various programming in addition to testing standards is stringently followed to make sure the quality of the code and performance. Implementation Support: Subsequent to the development phase where various coding and testing is completed, the next stage is the implementation and support stage. Here, the recently developed application is installed in the real server environment to check whether it is working as per the strategy or not. Hence, now, the application goes live. In this stage, support is also provided in order to keep the application forever on the go. Maintenance Promotion: The last stage is maintenance and promotion. As soon as any application goes alive, updates are necessary. It helps the application to get restructured as per the need of latest environment. Hence, any and all of these updates are accomplished as a component of maintenance work. Various marketing campaigns over the internet are also done in order to enhance the visibility of the business over the internet. Project initiation, management and control scenarios, including overall planning and role assignment to each member To initiate a project of alibaba.com, its really required to move on with several careful planning along with projecting. Initially, this business can reduce the cost; however, it will improve the situation, later on. Following are the five most important control scenarios, which this website has taken in consideration while designing it. First feature or scenario is its reliable hosting which comprises of more than 99.99% uptime. Second feature is its user-friendly appearance as well as feel. This appealing appearance is brought with the help of various professional designs or softwares having template storefront. Third attractive scenario is a gateway for secure payment, incorporated with the feature of shopping cart. Payment transaction is mandatory to be secured and encrypted; otherwise, no user will try this site. Fourth scenario of this website is to generate a merchant account. This account will help in accepting multiple mode of payment as different users can use different mode of payment in order to trade. Fifth most important feature is to store the contact information of the customer in order to smooth the progress of customer service as well as privacy policy. Locating a Niche Market in the world of Online Retail A lot of entrepreneurs, in todays time, already have a thought of what they want and are capable of selling over the internet. On the other hand, few of the entrepreneurs still do not know what to sell, however, are familiar with the opportunity and hence, are involved in the planning of initializing a retail business based on e-commerce. The preliminary phase of business planning is basically an opportunity in order to investigate numerous markets in addition to making sensible and realistic decision on which products or else, services are offering the maximum earning potential. A niche is really important while planning for a online retail as if you dont know what to sell and how to sell, then its not possible to sell products and services properly and run business. Hence, its really important to think about all the expenses linked with the product, together with its storage, import taxes, shipping or packaging, in order to obtain a practical projection of the expenditure of selling it. Projecting Sales, Costs and Profits in B2C E-Commerce Business Planning Financial projections play a very important role on the planning for business. However, this is also true that it is really impossible to enlighten at the planning phase how well the business will be going to perform. Still, market as well as competition research work as a support and permit entrepreneurs to formulate educated guesses that include various tools like, graphs or charts in this phase of business planning. Diagram 2: Detail Project Analysis with the help of graphs and charts This course of action is really very important. As, in todays world, B2C e-commerce companies like www.alibaba.com launch themselves very quickly over the internet, hence proper research and plan acts are really important to be performed as they work as an authenticity check. A lot of time it happens that a idea which seems one of the best idea from the theory perspective, does not make logic in the live, real environment, hence, its best to have few alternatives so that one can move on to the subsequent possible product. This alternative is basically sinking money into a failed business. Its a ray of hope to a dead business. Design Detailed feature of www.alibaba.com Design phase is the subsequent phase after the analysis phase in the system development life cycle model. Unlike analysis phase, where what needs to be done is decided, this phase implements the strategies of analysis phase and design the frame work of the website as shown below: Diagram 3: Screenshot of www.alibaba.com Diagram 4: Screen shot of www.alibaba.com The website of www.alibaba.com is very user friendly. As this site has the features of both B2B (Business-to Business) as well as B2C (Business to Consumer), buyers and sellers, both are its customers. One can buy various products and on the same time one can sell various products from here. Below are some key features of this website as per the SDLC approach: This site has a Buy feature. This tab is needed to be used when the user is planning to buy various products. This tab comprise of all the details which are needed while purchasing: newly added products (detail of fresh products), how to buy, safety and security center and last but not the least is the post buying leads. Second feature is the sell feature. This tab is used by the end user when its time to sell products. Hence, this tab is mainly used by suppliers who supply products. This tab comprises of all the details while selling products, such as, newly added buying leads, how to sell and display new products. Third key feature is the community tab. This tab is basically a support tab in order to help both buyers and sellers while dealing with their trade. It comprises of :Ask it, where one can ask any question regarding this site and the answer will be provided to them as soon as possible, forums, price watch which gives an idea on the prices of different products and trade shows. Fourth feature is the registration feature. As this website deals with genuine trade, fake peoples are not allowed to enter here. Thus, a proper registration is done here before buyers and sellers move inside to trade. This consists of a proper unique login id and password, which help in maintaining the secured environment. Fifth key feature is the search tab. This tab is also very different unlike other search engines. Here, various products can be searched out. Moreover, suppliers as well as buyers can search for different products for selling and buying purpose, separately. Searching can be done as per the geographical location also. The next key feature of www.alibaba.com is the ask it section. Here, both buyers and suppliers can ask any type of query related to dealing with this website. For example, a customer can ask a question like should he has to make payment before the delivery or after delivery, etc. this site consist of three sub features which means question can be related to trade, safe trading as well as finding different suppliers. Next feature is the price watch tab. This gives an idea of updates in the value of different currency, different product prices, etc. hence, while trading, customers do not have to go through other websites to check all this and they can get the updated information from here, only. Next feature is the success stories tab. This feature helps in providing success stories of this website. Its just a strategy to promote this website as customers definitely want to be aware of this, when they are trading here. Hence, they need not check various news sites in order to get the latest report. Each and every success story related to www.alibaba.com is available here. One more unique feature of this website is to provide a detail of products which are highly eye-catching. This tab is known as featured products. At present, which product is leading the market, can be known from here. This gives the customer an idea to go through them and buy as per their requirement. This feature is very similar to todays special in restaurants. Next feature is the advertisement section. This section advertises one of the best products of this e-commerce site. Last but not the least feature is the section from where one can easily surf all the details about the website, from company information, partners, to buying, selling, safety and support and other services as well as tools. Detailed description of features and functions of www.alibaba.com Alibaba.com is basically based on quite a few requirement frameworks that include strategic advertising branding, consultation for web designing, creation of professional contents, robust features of ecommerce, management in addition to administration of site, managed services, systems integration, as well as hosting. Below are the details of all the features as well as functions, which have been the part of the alibaba.com. Custom Site Design This feature include customized or traditional designed banner, navigation buttons or links, logo, site layout as well as color scheme as per the choice of the customer for the website. It basically works as per the customers need, requirement as well as choice. Second customized design is that the home page of www.alibaba.com must have various links, such as, view account, buyers and suppliers account login, , checkout page, shopping cart in addition to site map Management of various products Customized products are making entry and hence, get managed with the help of built-in merchant tools This website includes pages with unlimited number of grouping, sub-categories as well as detailed information related to products. Products are assigned to multiple different categories as well as sub-categories One more function of this website is to upload products in bulk or product feeding which means importing product details from other websites or databases by the help of files of XML data feed. Internal products can be searched with the help of various keyword related to products along with search query archiving. Technique for dynamic imaging is used which helps in enlarging image view, zooming image as well as multiple views of the image from front, side and back in order to provide most favorable user experience. Selection of Color swatch is done which allow end users to select from a variety of available colors. Notification for Out-of-stock is provided. This basically produce an out-of-stock notice on that page where the product detail is mentioned along with an anticipated in-stock date One more feature of this site is such that it can mark products as Unavailable. This means, products which have been removed from the catalog, although not from the database, are marked as, not available. Playback of video is also available to give attractive look to end-user. Videos related to any product can be uploaded on the site and played on the page of detailed product. Order Management Order editing can be done here, which means all the components of order can be edited. Searching for Order can be done which includes searching orders by the name of customer, corporation name, date, state, and order ID as well as order status. This business works on the principle of partial as well as back-order shipment which means shipping of in-stock items are done first and items which are out-of-stock are shipped later on. Order history is available which helps registered end users to view a catalog of formerly placed orders in addition to transferring selected orders to the online basket, known as shopping cart. Tracking of order status can also be done which means registered users are able to keep a eye on the condition of current orders as well as partially shipped orders. Shopping Cart Shopping cart is basically an online basket. Hence, a normal shopping cart or a drop-down is really needed and hence, designed. The customer can select among any of these two which appeared on the page where product detail is given in order to transfer the product to a shopping cart. The feature of this function is such that it can sum up all the items automatically inside the cart. Editing of shopping cart can also be done like consumers can delete items as well as update product items as per their requirement. Checkout Processing of instantaneous credit card permit order payment by majority of the credit card. Payment processing is done at the point of sale or for the duration of order fulfillment Order notification consumer get order confirmation along with order tracking number as well as shipping confirmation as soon as the order ships. Security SSL is used which means secured encrypted transport of order as well as credit card information is done. Secured HTTPS/SSL as well as password protected entry is done in order to enter to the admin section. Complete log-out capabilities is provided for site administrator as well as customer. Website is PCI compliant which means the servers are firewall protected. Numbers of credit card are no longer stored than necessary, susceptible data is encrypted in addition to restricted access. Audit logs are also created. Site Management Account management is done where site administrator has to login and revise the information related to customer account. Product management as well as order management is done. Pricing updates are provided which gives flexible interface for various price information related to all product items or for definite categories. Generation of sales reports for sales is done with the help of date, type of product, customer, location and order size, etc. Content management is done. Reviewing customer reviews, making those reviews on or off, are done here. User Engagement Customer account registration is done. Account information can be viewed. Customers can login to go through and update various and can check status of the order. Onsite blogging- end users can put their comment on various blog posts. Onsite product reviews can be done which means customers may rate as well as share their personal experiences regarding any product. Social media optimization in addition to integration provides link to social media sites such as Digg and Reddit, and on the other hand, two-way incorporation with different social networking sites such as Facebook as well as Twitter. Testing Diagram 5: Testing Testing is one of the important parts of designing and development of web based application for the reason that this application all the time works as a multi-user system along with limitations of bandwidth. Few of the common testing are integration testing, Scalability testing, Stress testing, resolution testing, load testing as well as cross-browser compatibility testing. Testing is a broader term which basically divided into two parts: automated testing and manual testing. Both of these testing can be performed without any failure. For instance, its really essential to test the speed of uploading of graphics, in order to calculate this loading time, as they plays a very important role in the appearance of any website. In todays time, there are a lot of testing tools available over the internet which assist testers to test the web applications. After complete of all the short step-by-step testing, a final testing is necessary. This testing will be done in a live environment. Hence, the basic policy is that as soon as the site is uploaded, there must be a complete testing. Various Inputs to the phase of testing A website, supporting documents, Requirement specifications, Technical specifications, along with Technical documents Various outputs of the phase of Testing Complete Website, Reports on testing, Error logs, recurrent interaction along with developers as well as designers Promotion This stage of system development life cycle is applicable only for websites. This phase consist of preparing Meta tags, steady analysis in addition to suggesting the URL to various search engines as well as directories. Its generally an ongoing process because the different strategies of search engine usually changes quite often. Hence, one of the ideal policies for submission will be to submit the website URLs once in every two months. Moreover, if the end user is willing, paid submissions as well as paid click can also be performed with extra cost. Various Inputs to the phase of promotion A website along with content, Mails from client notifying the competitors Few Output to the phase of promotion Site submission is done along with essential Meta tags. Maintenance and Updating All the e-commerce websites like www.alibaba.com basically require frequent updates in order to look fresh and adjust with any situation. Hence, a need for analysis is there so that application can be well maintained as well as all the phases of life cycle must get revised. Bug or error fixes are also done throughout the period of maintenance. As soon as the website is functional, ongoing promotion, content management and updating, technical maintenance, reports for website visit, mentoring as well as staff training are considered necessary on a normal basis depending on the intricacies of the website as well as the needs within the business organization. Various Inputs to Maintenance along with Updating Site or the application, Content as well as functions which are needed to be modernized, Reports for Re-Analysis Various Outputs to Maintenance along with Updating An Updated application, Various supporting documents developed to

Tuesday, August 20, 2019

Case Study of Diagnosis of Neutropenia Patient

Case Study of Diagnosis of Neutropenia Patient A 45 year old physically fit patient was admitted to hospital following several visits to his General Practitioner (GP) where is was complaining of decreased appetite, constipation, fever, chills, headaches, cramping, vertigo and respiratory problems after experiencing some hay fever like symptoms one week ago. He was commenced on Roxithromycin 150mg b.d and his GP ordered blood tests that showed his had neutropenia (low white cell count) (Harris et al 2006, p 1185) and thrombocytopenia (low platelet count) (Harris et al 2006, p. 1704). Two days later he was not feeling any better and the GP ordered a chest x-ray (CXR) which the patient to have bilateral pneumonia he was than admitted to the hospital. This essay will identify important events that took place during the patients admission to hospital and discuss three of these events in detail with contemporary evidence to support the writers discussion. The essay will than look what has been learnt through this case study in relation to future professional practice as a new graduate registered nurse in accordance with the Australian Nursing Midwifery Council (ANMC) competency standards. Day 2 Why did the patient not received oxygen until his saturation got to 70% there is no mention of the treatment plan to or from nursing staff. Later that day the patient was transferred to main ward, the nursing staff raised the issue that the patient needed to be in the intensive care unit (ICU), the patient was reviewed by Respiratory Physician and was decided to not to transfer patient to ICU. This patient required close monitoring due to saturation decrease and as a newly registered nurse we do not have the experience or the time to monitor this patient in a ward environment (ANMC 2006) competency Professional Practice. Patient safety, patient advocacy. Day 5 The patient was noted to be still febrile and was ordered another CXR as the Computed Tomography Scan (CT scan) was not preformed, why had this patient not had the CT scan that was ordered (ANMC 2006) competency Professional Practice. Team communication strategies, chain of command. Later that day it was also noted that the patient had a PR Bleed and a referral was made to the gastroenterologist. No mention of cause or any investigation taken place to assess the PR bleed no blood tests were ordered to determine patients status. Patient advocacy, patient safety. Day 6 Respiratory Physician saw the patient and noted he had severe bilateral pneumonia, possible bone marrow suppression and anaemia of an unknown cause, no communication between medical officers as the patient had a PR bleed the day before and is neutropenic and thrombocytopenic. The Respiratory Physician requested an infectious diseases review. Patient advocacy, conflict management, documentation. Day 7 It was documented again that the patient had low saturations and was febrile. He was seen by the Infectious Diseases Specialist and was ordered more tests and a lung biopsy. The lung biopsy was considered to be of high risk due to the patients condition by a Thoracic Surgeon. If this patient was a high risk why was he not in ICU as requested by the nursing staff? Conflict management, chain of command, patient advocacy. Day 8 The nursing documentation states patient remains very breathless and low saturation is on 12L oxygen via a non-rebreather mask and is still febrile. A BiPAP (bilevel positive airway pressure) was requested to be used the next day but patient was not alive the next day, why was it not used immediately he is on high level oxygen and should have CO2 levels checked by having blood gases taken, a CT scan was ordered of the abdomen as a splenic infarction was suspected. Later that evening the patient was found out of bed with his oxygen mask still insitu but disconnected from the oxygen outlet, why was he trying to get out of bed?, Why was the tubing disconnected was he disoriented due to high oxygen saturations, did he fall out of bed ?, did the tubing need replacing ? This was not documented in the patients notes just handed over to night staff verbally. Patient safety, documentation, team communication strategies. Early Day 9 The night duty staff stated they did not monitor oxygen saturation due to patients request, staff should have explained how important it is for the nursing staff to monitor his oxygen levels, the patient was buzzing several times during night for a urine bottle and to check his oxygen levels, staff gave the patient a urine bottle but left the curtain open, did the patient get up to close the curtains for privacy?. The patient was found on the floor ten minutes later in cardiac arrest, Cardiopulmonary Resuscitation (CPR) was commenced, the arrest team was called and resuscitation continues for 20 and ceased with authority from the respiratory physician. Policy and procedures, Patient safety. First event was that the patient was not placed in ICU as requested by nursing staff. (Patient advocacy) ANMC Competency Standards (2006) Professional practice 1.2 clarifies responsibility for aspects of care with other members of the health care team, recognizes the responsibility to prevent harm. 2.4 Identifies when resources are insufficient to meet care needs of individuals/groups. 2.5 raises concerns about inappropriate delegation with the appropriate registered nurse. The patient has been transferred to the ward after arrangements were made by his GP for admission to hospital following an illness of unknown origin. Tests reveal that the patient has. Bilateral pneumonia. Neutropenia. Thrombocytopenia. Upon presentation it was noted that the patients saturations where low and required 6L oxygen via a Hudson mask and the new graduate registered nurse felt this patient needed to be placed in ICU to receive appropriate care. The newly graduate nurse should have consulted with the with the unit manger about her concerns when the Respiratory Physician refused to place the patient in the ICU this is related to 1.2 of the competency standards by clarifying her concerns and recognizing to preventing of harm to the patient. Patient advocacy is not new to nurses, nurses assume they have an ethical obligation to advocate for their patients (Negarandeh et al 2006). Advocacy can be defined as the act of arguing in favor of something. In terms of nursing, advocacy can be seen as the process we engage in when we speak on behalf of our patients when they are incapable of doing so themselves (Spenceley et al 2006). Advocacy has been described in ethical and legal frameworks and, more recently, as a philosophical foundation for practice (Negarandeh et al 2006). It has also been described in terms of specific actions such as helping the patient to obtain needed healthcare, defending the patients rights, assuring quality of care, and serving as a liaison between the patient and medical officer (ANMC 2005,Code of Ethics), (Spenceley et al 2006). When nurses and new graduate nurses advocate for patients, they face certain risks and barriers associated with the settings within which they work (Negarandeh et al 2006). Therefore, there is always the possibility that attempts to advocate for a patient can fail, and that nurses can experience many barriers when addressing choices, the rights, or welfare of their patients (Negarandeh et al 2006). As a new graduate nurse this was an important event to advocate for their patient as it was quite evident that this patient needed extensive nursing care that is not available in the ward situation, the nurse needed to gather evidence to suppor t their concerns and present it to the Physician and nurse unit manager (Spenceley et al 2006). The second event was why did the patient not attend the requested CT scan (negligence, communication). ANMC Competency Standards (2006) Provision and Coordination of Care 7.1 Effectively manages the nursing care of individuals/groups. It is the registered nurses responsibility to make sure that all tests and orders by the medical officer are carried out. The registered nurse could be seen to be negligent of her duty by not making sure the patient had received his CT scan according to the treatment plan. The legal definition of negligence means breach of duty. Standards of care in nursing generally mean those practices that a reasonably average nurse would use. So a good nurse knows and understands ethics in the medical field and strives to provide excellent quality of care in order to avoid negligence. However, mistakes, which will happen, do not necessarily mean negligence has occurred (Staunton Chiarella 2008). Examples of breach of duty, which may be considered negligent under certain circumstances may include doing something which a reasonably average person would not do, or the failure to do something which a reasonably average person would do, under circumstances similar to those shown by the evidence. It is the failure to use ordinary or reasonable care, (Staunton Chiarella 2008). Inadequate nursing skills or attention to tasks may result in a suit of negligence against a nurse who habitually fails to provide approved standards of care. Such incidents include, but are not l imited to, constant medication errors, failure to follow policy or orders and improper use of equipment (Hughes 2008). The legal review of a nursing negligence requires proof that injury was done, and that it was the result of the nurses care or lack of. Negligence refers to the act of doing something or refraining from doing something that any other reasonable medical professional would do or refrain from doing in a similar situation (Staunton Chiarella 2008). It goes without saying that every situation is different, and that is where the law becomes somewhat cloudy. However, when reviewing a nursing negligence case, assumptions and circumstantial evidence are taken into account to determine if there was negligence (Staunton Chiarella 2008). There are five main elements in a nursing negligence, and all elements must be proven in order for a case to be valid. If one or more of the elements is not present, the case may be hard to prove, (1) the nurse had a duty to perform, (2) the appropriate care was apparent in the situation, (3) there was a breach or violation of care, (4) there was an injury proven to result from the nurses negligence, and (5) there is proof that damages occurred as a direct result of the situation (Staunton Chiarella 2008). New graduate nurse should know and practice the professional code of conduct for nurses in Australia, this standard cover all standards by the ANMC (ANMC 2005, Code of Professional Conduct for Nurses in Australia). The third event was why was there no documentation on the patients incident on the 13th February day 8. (Legal documentation, communication) ANMC Competency Standards. Collaborative and Therapeutic Practice 10.1 Recognizes that the membership and roles of health care teams and service providers will vary depending on an individual/group needs and health care setting, 10.2 Communicates nursing assessments and decisions to the interdisciplinary health care team and other relevant service providers. Professional Practice 1.1 Complies with relevant legislation affecting nursing practice and health care. In todays health care system, delivery processes involve numerous patient handovers among multidisciplinary team members with varying levels of educational and training (Hughes 2008). Changes to the nursing models of care have resulted in alteration to communications between health professionals for example patient allocation, all patient care remains the nurses responsibility, in team nursing the responsibility is shifted to the team manager (Fernandez et al 2010). During the course of a 3-day hospital stay, a patient may interact with 30 different employees, including physicians, nurses, technicians, and others (Hughes 2008). Effective clinical practice involves many instances where critical information must be accurately communicated, patient handovers, medication orders, follow up tests are some exapmles (Hughes 2008). When health care professionals are not communicating effectively, patient safety is at risk for several reasons: lack of critical information, misinterpretation of information, unclear orders over the telephone, and overlooked changes in status (Hughes 2008). The transfer of essential information and the responsibility for care of the patient from one health care professional to another is an important component of communication in health care (Hughes 2008). Introduction, Situation, Background, Assessment, Recommend (ISBAR) is good effective communication tool for handovers (Jacques et al 2009).An effective handover supports the transition of critical information and continuity of care and treatment (Hughes 2008). Ineffective communication is a leading cause of preventable patient injuries, wrong medication events and patient death (Fernandez et al 2010). Documentation is a legal requirement to nursing, it must show the patients condition, decisions made about nursing care, objective observation of patient and any events that have taken place during that nurses shift and documented as events occur (Jefferies et al 2009). Nursing documentation must comply with the legal requirements such as it must be legibly written, identify the patient, 24hr clock used to identify when the report was written, signed with name and designation, incorrect entries must have a single line through them and initialed next to entry with written in error, do no t make entries for other nurses, use only approved abbreviations and leave no blank lines between entries (Jefferies et al 2009, p. 121). As a new graduate nurse it is extremely important to document all events that occur during your shift, it is also important as an experienced nurse. New graduates should always back up their decisions and document why they managed the patient care that way using evidence base practice and policy and procedures of the facility. What the writer has learnt for their future practice is always document everything that is factual and relevant information as soon as possible, this is a legal requirement of nursing and if you need to go to court you will be able to defend yourself with full comprehensive nursing documentation. Documentation is a hard copy of the patients events and the whole multidisciplinary team can read them and there will be no confusion, misinterpretation. Advocating for patients is important as with this case if the nurse had advocated for the patient he may have had a better chance at survival and received the extensive nursing care he needed. If you are not happy with a result go further to resolve the situation to ensure a safe outcome for your patient. Do not operate outside your scope of practice this could lead to breach of duty of care and negligence, nursing today is considered to be a professional occupation and knowing the competency standards and follow policy and procedure is an expectation. Becoming a registered nurse is a huge responsibility, it is one that the writer will embrace and except whole heartedly. This is just the beginning and the writer is looking forward to the very exciting future and helping people thought difficult and challenging times of their lives. Conclusion There were many important events and communication errors thought out the patients care. The three main issues identified by the writer where patient advocacy, negligence of care, communication/documentation. Patient advocacy is an important role for nurses. New graduate nurses need to develop these skills and seek out assistance from more experienced nurses to help advocate with them. There are many issue with negligence and sometime hard to prove, but if the new graduate nurse follows policy and producers and the ANMC competency standards they should have confidence in their practice as a newly qualified registered nurse. Documentation is a requirement both legal and professional in nursing, accurate, comprehensive nursing documentation has the relevant information for all multidisciplinary members to comprehend. Communication with all members of staff can be difficult as there as many health care professional with varying levels of educational and training. Ineffective communicati on is a leading cause of preventable patient injuries, wrong medication events and patient death. This case study has displayed the importance of these events and has assisted the writer for future practice.