Thursday, November 28, 2019

Robin Bloor and relational database an Example of the Topic Psychology Essays by

Robin Bloor and relational database When you put your car in a garage, you put it as one thing complete with its capabilities. You dont put your car in the garage and store its steering, transmission, signaling and lighting functions somewhere else. (Robin Bloor, para 4) Introduction Robin Bloor, in his article, The failure of relational database, the rise of object technology and the need for the hybrid database cites a very common example, to demonstrate the state of relational database. In this article he categorically analyses the evolution of relational database and the object oriented technology. He discusses the advantages and disadvantages of both the technical advancements. At the end, after citing the shortcomings of both, he puts forward the new development which tries to overcome the shortcomings of both these technologies in one product known as object-relational database or cache. Need essay sample on "Robin Bloor and relational database" topic? We will write a custom essay sample specifically for you Proceed This essay , is an effort to opine about the validity of whatever Robin Bloor has to say in this article, and decide if his judgments are purely commerce oriented or have technical justifications also. Background It is a matter of general knowledge that the need to analyze and sort the data of American census, gave birth to the modern day computer in the 1940s. Since then, the way databases have been handled has constantly changed for the better. Till the personal computers came in 1970s, databases were analyzed by batch processing method, which was very slow, cumbersome and expensive. In 1970, American scientist Edgar F. Codd presented the relational model to analyze and sort data, when he was working at IBM. Later, in the last decade of the twentieth century, the concept of object evolved. Robin Bloor examines the evolution of relational database and object oriented technology, and proposes a solution which overcomes the limitations of these two technological developments. Contents of Bloors paper in brief While discussing relational database, Bloor mentions that one of the foundations of relational theory is that the data and the program that uses it should be independent of each other. Our Customers Often Tell EssayLab professionals: Who wants to write paper for me? Specialists advise: Entrust Your Essay Paper To Us And Get A+ Papers For Sale Cheap Writing Service Reviews Grab My Essay Review Essay Company Review This was and is at odds with the whole idea of object technology. He gives the example of a car taken as an object, and refutes the idea of data and its associated processes being independent of each other. He strongly advocates that data and its associated processes cannot be and should not be separated. Bloor cites one more limitation of relational database. He says that , Relational databases are more constrained in their capabilities than most would suspect. Storing and representing some fairly common data structures, can be very difficult. He takes the example of a simple ordered list of bus stops. Relational databases only hold tables as unordered lists and can retrieve an ordered list only if a specially built index is added. An object database does not need index. Performance overhead is another concern of Bloor. He says that, in relational database, to assemble data, developers have to JOIN one table to another to another to another. While retrieving, database runs optimiz ation routines, to determine the best way to gather data and then retrieves it. This process often takes a long time. This does not happen with object database. Impedance mismatch, is another problem cited by Bloor. He says, The problem surfaced when OO languages rose to dominance. The differences between the way data was handled by OO languages and the relational database. In reality most databases are not completely normalized when they are implemented , but even so, the problems of impedance mismatch occur. Conclusively, Bloor suggests a possible solution, by mentioning that, the approach involves providing the databases, with a mapping laye r through which developers access the database. The mapping layers should be based on open standards to resolve the impedance mismatch problem. Database calls could then be made either in SQL or direct requests to an object class or collection of classes. The mapping layer would translate these calls, into physical data requests, to the database to retrieve the data. This would obviate the impedance mismatch.( Robin Bloor) Relational database A relational database is a database that conforms to the relational model. It could also be defined as a set of relations or a database built in RDBMS. An RDBMS is many times called a relational database, but strictly speaking, Oracle, Microsoft SQL server, MySQl are not relational databases. . they do not fully conform to the relational model.(relational database) It is common knowledge that query languages which were developed purely on the relational model, never found the commercial acceptance. Object database In object oriented database, information is represented in the form of objects. When database capabilities are combined with object programming language capabilities, the result is an object database management system. Object databases are generally recommended when there is a business need for high performance processing on complex data. Most object databases also offer some kind of query language, allowing objects to be found by more declarative progra mming approach. Access to data can be faster, because joins are often not needed. The pointer based techniques of object oriented databases proves to be slow for general purpose queries. Another disadvantage object oriented database is lack of interoperability with great number of features. ( OODBMS) A closer look at Bloors article and the definitions of relational database and OODBMS in an encyclopedia reveals that Bloor is very correct in whatever statements he has made about relational database are correct and they are very much reflected in other sources also. The biggest proof of Bloors claim on failure of relational database is that even after 40 years since the invention of relational model by Codd, there is no query language strictly adhering to it. Whatever languages were developed in such a way, never met with commercial success. ( Edgar Codd) An interesting point to be made here is that, even when Codd presented his relational theory, IBM , where he was working, never gave much attention to it unless, companies like Oracle and others used Codds relational model to develop query language. (Edgar Codd) This suggests that IBM foresaw the difficulties in pure implementation of Codds model. 40 years of history has proved this right. Bloors article and technology guide of Intersystems Bloor harps upon the shortcomings of relational database and Object based database in his article. He synthesizes these difficulties and proposes a solution in terms of object- relation database. His company, Intersystems, in its technology guide, cites the same reasons as Bloor has cited in his article, especially impedance mismatch, and names the solution as cache. The article fully echoes the technology guide.( technology guide) MSIMT courses and commerce All academics, including this course, are turning towards commerce, because the whole world is in the grip of creation of wealth, still more and still more of it. The ultimate aim of all activities is generation of wealth. In the history of mankind, never before, was such a mad rush for wealth witnessed, as witnessed in the later part of 20th century. This is perhaps the reason why academics is also getting closely related to commercial applications and its feasibility. Conclusion Robin Bloor is a smart technocrat with a commercial vision. He has carefully analyzed the weak points underlying the relational database and object based database, and shown a practical workable solution to the difficulties faced in implementation of the two. His paper is not just a commercial for cache, but a very legitimate guide to analysis of an existing problem, and development of technically feasible and commercially viable solution, ultimately leading to opening of new busi ness opportunities and helping the IT community. The future history of IT may take the innovation of cache by intersyatems, as a landmark discovery that changed the way databases were handled. Works-cited page Robin Bloor, The failure of relational database , the rise of object technology and the need for hybrid database, cache technology, cache innovations, Intersystems Relational database, wikipedia the free encyclopedia, 8-11-2006 Retrieved on 4-12-2006 Object Database, wikipedia the free encyclopedia, 23-11-06, Retrieved on 4-12-06 http://en.wikipedia.org/wiki/Object_database> Edgar F.Codd, Wikipedia the free encyclopedia, 4-12-2006, Retrieved on 4-12-2006 https://en.wikipedia.org/wiki/Edgar_F._Codd> Technology guide, cache technology guide, cache innovations, retrieved on 4-12-2006

Monday, November 25, 2019

Synthesis of Aspirin Lab Report Essays

Synthesis of Aspirin Lab Report Essays Synthesis of Aspirin Lab Report Paper Synthesis of Aspirin Lab Report Paper Essay Topic: Synthesis After the reaction was complete some unrelated acetic anhydride and salicylic acid was still be present in the solution as well as some sulfuric acid, aspirin, and acetic acid. Crystallization, which Uses the principle of solubility, was then used to remove most of the impurities and caused the ecstatically acid to precipitate out of the solution. Next, the crude product was then purified by adding water which further lowered the solubility of ecstatically acid and dissolved some impurities from the crystal of aspirin. The aspirin was then isolated from the solution using a vacuum filtration apparatus. The percent yield of crude aspirin product was 91. 89%. To purify the crude aspirin product a rationalizations procedure was performed. The percent yield of the purified aspirin product was 5. 77%. Next a phenol test was performed on the crude aspirin product, the purified aspirin product, and salicylic acid as a control. The phenol test was to test the purity of the aspirin product that was created during the experiment. The crude aspirin product and the purified aspirin product had no color changes and remained orange when mixed with the iron (Ill) chloride solution, which means that there were no phenol groups in both the crude aspirin product and the purified aspirin product. The lack of action with the iron (Ill) chloride revealed that both the crude aspirin product and the purified aspirin product were pure aspirin. The salicylic acid turned into a dark purple color when mixed with the iron (Ill) chloride solution, which was expected since salicylic acid has phenol groups. Next a melting point test was performed on the purified aspirin product. The purified product started to melt at 86 degrees Celsius and finished completely melting at 102 degrees Celsius. The melting point of the purified product was lower than the expected 135 degree Celsius melting point of aspirin, which revealed to us that the purified aspirin reduce still contained some impurities. Introduction: As early as 3000 BC ancient cultures such as Greek, Roman, Egyptian, and Chinese found that extracts from plants such as willow bark, meadowsweet, and myrtle possessed the ability to alleviate fever, pain, and inflammation. These plants contain a compound called silicates, which creates these curative attributes. Several of years later the folk remedy of plants containing silicates transformed into the cure-all medication known as aspirin. Today aspirin, also known as ecstatically acid, is an over the counter medication that is extremely popular and is used for relieving pain, reducing fever, reducing swelling, and slowing blood clotting. The history of aspirin began in 1763 when Edward Stone wrote a paper to the Royal Society of London that claimed that willow bark could cure ague, which is now known as malaria. Later it was found that the treatment did not actually cure malaria, but instead just reduced the fever of those with the disease. Nearly a century later, a Scottish physician found that Edward Stones extract could also be used to relieve the symptoms of acute rheumatism. Organic chemists began working with willow bark and many other plants to try and extract and isolate the active ingredients from them, in doing so it was found that the active ingredient was salicylic acid. Salicylic acid was then industrialized for medicinal use, but soon after industrialization it was found that salicylic acid was extremely limited as a treatment because of the acidic properties that cause severe irritation in the digestive tract. In 1 893, Felix Hofmann synthesized ecstatically acid, which has all of the same medicinal benefits as salicylic acid but it did not have the side effect of irritating the digestive tract. Hofmann worked for Brayer, which then named ecstatically acid compound aspirin. Aspirin became commercially available in 1899 and today it is estimated that over a trillion aspirin tablets have been consumed by those in need of its curative effects. In this experiment aspirin was synthesized from salicylic acid and acetic anhydride. Salicylic acid was justified using acetic acid and sulfuric acid acting as a catalyst to produce ecstatically acid and acetic acid. The phenol group that will attack the carbonyl carbon of the acetic anhydride is the -OH group that is directly attached to the benzene since it is more basic than the -OH group attached to the carbonyl group. This method of forming ecstatically acid is n sterilization reaction. Since this sterilization reaction is not spontaneous, sulfuric acid was used as a catalyst to initiate the reaction. Sulfuric acid serves as the acid catalyst since its conjugate base is a strong deportation group that is necessary in order for this reaction to be reversible. The need for the strong conjugate base is the reason why other strong acids such as HCI is not used since its conjugate base CLC- is very weak compared to HASH-. After the reaction was complete some unrelated acetic anhydride and salicylic acid was still be present in the solution as well as some sulfuric acid, aspirin, and acetic acid. Crystallization, which uses the principle of solubility, was then used to remove most of the impurities and caused the ecstatically acid to precipitate out of the solution. This precipitation happens because the solvent can no longer hold all of the solute molecules, and the molecules begin to leave the solution and form solid crystals. During this cooling, each solute molecule in turn approaches a growing crystal and rests on the crystal surface. If the geometry of the molecule fits that of the crystal, it will be more likely to remain on the crystal than it is to go back into the solution. Therefore, each growing crystal consists of only one type of molecule, the solute. The ecstatically acids solubility decreased and caused it to gradually precipitate out of the solution while the other compounds were left in solution because they were either a liquid at room temperature or have higher solubility and would not completely crystallize out of the solution. After the solution had come to room temperature, it was carefully submerged in an ice bath to complete the crystallization process. To purify the crude product, water was added to solution to further lower the solubility of ecstatically acid and to solve some of the impurities from the crystal. The chilled solution was then filtered through vacuum filtration to isolate the pure crystals. Vacuum filtration was the technique used for separating the solid aspirin product from the solvent or liquid reaction mixture. The mixture of solid and liquid was poured through a filter paper in a Boucher funnel. The solid aspirin product was trapped by the filter and the liquid was drawn through the funnel into the flask below it by a vacuum. The aspirin product that was collected still contained some impurities. The general reaction equation and the reaction mechanism are as follows: To purify the crude aspirin product a rationalizations procedure needed to be performed to remove impurities and to further purify it. Rationalizations utilizes the different solubility of the desired product and impurities included in the reaction mixture. So, when the solvent cools, only the impurities will remain dissolved and the pure product will crystallize out of the solution. The information we gather will allow us to determine the percent yield of the crude aspirin product and of the purified aspirin product. The percent yield is a way of measuring how successful a reaction has been. Percent yield problems allow us to calculate what percent of the expected product we are able to account for by the end of our experiment. Actual amount of product x 100 Percent yield amount of product Expected Next, a phenol test must be performed to determine the purity of the aspirin product. The impurities that could be in the purified aspirin product could be salicylic acid and other compounds that contain a hydroxyl group on a benzene ring and are known as phenols. Phenols form a highly colored complex with iron (Ill) chloride that can range from a pale to dark purple depending on the incineration of the phenol group present in the solution. Pure aspirin does not contain any phenol groups and should be enervative when mixed with the iron (Ill) chloride solution and should remain orange in color. Another way the purity of the sample is tested is through a melting point test on the purified aspirin product. A pure compound has a specific range in which it melts and it is normally a fairly small range. If the melting point of the purified aspirin sample is lower than the expected or if it has a very broad range compared to the actual range, then the sample still contains some impurities. Experimental: In a 125 ml Erlenmeyer flask add 5 ml of acetic anhydride, 1. Egg of salicylic acid, and 5 drops of sulfuric acid. Swirl the mixture in the Erlenmeyer flask for approximately one minute so that all of its contents have completely dissolved. Heat the mixture using a water bath for 10 minutes. The water bath temperature should not exceed 50 degrees Celsius. While heating the mixture, measure out 70 ml of ODL water and then put it in a 100 ml beaker. Also, set up an ice bath for the mixture in the Erlenmeyer flask as well as a second ice bath for the 100 ml beaker while waiting for the mixture in the Erlenmeyer flask to heat. After he mixture has heated for 10 minutes, remove it from the water bath and allow it to cool to room temperature. Crystallization should begin once the solution reaches room temperature. If crystallization does not occur use a glass stirring rod and with strong force scratch the bottom of the Erlenmeyer flask. Cool the Erlenmeyer flask containing the mixture in the ice bath set up previously for 20 minutes. At the same time place the 100 ml beaker containing 70 ml ODL water in the second ice bath set up previously for 20 minutes. While waiting for those items to cool, set up the vacuum filtration apparatus. After 20 minutes of lolling, take 50 ml of the 70 ml now cooled ODL water from the 100 ml beaker and add it to the 125 ml Erlenmeyer flask that contains the mixture. Leave the 125 ml Erlenmeyer flask that contains the mixture in its ice bath and allow it to cool for an extra 5 minutes. Also leave the remaining 20 ml of DID water in the 100 ml beaker in its ice bath. After cooling for an additional 5 minutes, pour the contents in the ml Erlenmeyer flask into a Boucher funnel attached to the vacuum filtration apparatus. Make sure to get as much of the product into the Boucher funnel as possible. Use the remaining 20 ml of ODL water in the 100 ml shaker to rinse out the 125 ml Erlenmeyer flask and wash the product in the Boucher funnel. Allow the sample to vacuum dry for 5 minutes. While waiting for the sample to vacuum dry weigh a weigh boat. After the sample has dried for 5 minutes, turn off the vacuum filtration apparatus and retrieve the crude product from the Boucher funnel and place it in the previously weighed weigh boat. Weigh the weigh boat with sample inside and record the mass of the crude product formed. Calculate the percent yield of the product formed. Next, place a few crystals of the crude product in a test tube labeled A and put to the side for later use. Reweigh your sample and record the new mass sample. Now place the crude product from the weigh boat in a 25 ml Erlenmeyer flask and add 3 ml of ethyl acetate. Heat the 25 ml Erlenmeyer flask in a water bath (not to exceed 50 degrees Celsius) until all of the product has dissolved. After 5 minutes if the product has not completely dissolved, add ml more of ethyl acetate. Place the 25 ml Erlenmeyer flask containing the product and ethyl acetate directly on the hot plate at 50 degrees Celsius. Raise the temperature of the hot plate to 125 degrees Celsius so that the solution boils. Keep a close eye on the Erlenmeyer flask. Heat the mixture for 5 minutes. After heating the mixture for 5 minutes, gravity filter what is in the 25 ml Erlenmeyer flask through filter paper. Put what goes through the filter paper back in the 25 ml Erlenmeyer flask and add petroleum ether drop by drop until crystals begin to form. If crystals do not form, place the 25 ml Erlenmeyer flask on a hot plate at 125 degrees Celsius with a boiling stone in the mixture. Wait for the mixture to boil and then let it boil for 5 minutes. After boiling for 5 minutes remove the 25 ml Erlenmeyer flask and remove the boiling stone. Allow the mixture to cool to room temperature. Scratch the bottom of the Erlenmeyer flask with a glass stirring rod with strong force. Place the Erlenmeyer flask in an ice bath for 30 minutes. Pour the contents in the 25 ml Erlenmeyer flask into a Boucher funnel attached to a vacuum filtration apparatus. Allow the product to vacuum dry for 5 minutes. While waiting for the sample to vacuum dry weigh a weigh boat. After the sample has dried for 5 minutes, turn off the vacuum filtration apparatus and retrieve the purified product from the Boucher funnel and place it in the previously weighed weigh boat. Weigh the weigh boat with sample inside and record the mass of the reified product formed. Calculate the percent yield of the product formed. Next, place a few crystals of the purified product in a test tube labeled B. Next perform the phenol test. You must have three test tubes, one labeled A with the crude aspirin product in it, one labeled B with the purified aspirin product in it, and one labeled C with salicylic acid in it. The third test tube labeled C is a control. Add 10 drops of iron (Ill) chloride to each test tube. Record the color observations. After recording the color of each test tube dispose of the waste into the appropriate waste container. Next, obtain a capillary tube. Fill the capillary tube with dry purified product. Invert the capillary tube and stick the open end of the capillary tube in the densest part of the crystal sample. Turn the capillary tube back to the upright position. The crystal product will be stuck at the top of the capillary tube. Tap the crystal product down to the bottom of the capillary tube. Load the capillary tube into the melting point apparatus and begin heating. Record the temperature range that the sample melts within. Once the melting point has been determined turn off the apparatus so it may cool and dispose of your capillary tube in the appropriate waste bin. Clean and dry any glassware used and return it to the appropriate location. Results: Conclusion: The mass of the crude aspirin product was 4. 791 g. Due to apparent wetness of the product it is estimated that half of the mass is due to moisture. Taking this into account, the actual mass of the crude aspirin product is reduced to 2. Egg. The theoretical yield of crude aspirin product is 2. Egg. This information gave us a percent yield of 91. 89%. The mass of the purified aspirin product was 0. 301 g. Due to apparent wetness of the product it is estimated that half of the mass is uh to moisture. Taking this into account, the actual mass of the purified aspirin product is reduced to O. Egg. The percent yield of purified aspirin product was 5. 77%. This low percent yield of purified aspirin product was due to a few different factors. The first factor that caused a low percent yield was caused because we lost some crude product when we were moving our crude product from the weigh boat to the 25 ml Erlenmeyer flask. Another factor that could have caused a low percent yield was that when no crystals formed after adding drops of petroleum ether we placed our 25 ml Erlenmeyer flask back on the to plate at 125 degrees Celsius. We could have accidentally boiled off some of our product. The third factor that caused a low percent yield of our purified product was that when we vacuum filtered our purified product, some of our purified product fell through the filter and into the side arm flask. Maybe if we hadnt turned the water on so high it might not have fell through the filter. The results of the phenol test were that test tube A, which contained crude aspirin product, had no change in color and remained orange upon adding iron (Ill) chloride. This led us to believe that our crude aspirin product did not contain NY phenol groups and was pure aspirin. Test tube B, which contained purified aspirin product also had no change in color and remained orange upon adding iron (Ill) chloride. This led us to believe that our purified aspirin product did not contain any phenol group and was pure aspirin. Test tube C, which contained salicylic acid, had an extreme change in color and turned dark purple. This was an expected result because salicylic acid has phenol groups and when iron (Ill) chloride is added it turned dark purple due to the concentration of the phenol groups present in the solution. Test tube C was our control.

Thursday, November 21, 2019

Berlioz Bicentennial Essay Example | Topics and Well Written Essays - 1000 words - 1

Berlioz Bicentennial - Essay Example With Currie sounding each drum, mallet, or "metal" to an ever-repeating rhythmic figure, various orchestral soloists and ensemble groups simultaneously define the melody or motif. Torke's expressed goal is to use these devices to get the listener "grooved into a rapturous state". Except for parts of the marimba movement, I was chiseled into an unrelentingly bored state. In this work, Torke commits an unpardonable sin: most of his forces go unheard. Specifically, the full string complement, the full wind complement, and the harp are seen busily sawing, blowing, and plucking away with only occasional audible evidence of their presence. The listener hears only the trumpets and trombones vying for attention with Currie's fearsome forward phalanx. The audience did give hearty applause at Rapture's conclusion and reportedly bought considerable numbers of its Naxos CD recording during intermission. In my view, however, they were sustaining a collective placebo effect from Torke's pre-performance address to them regarding the "sexual rapture" and related concepts. Like the 12-tone music of nearly a century ago, Rapture needs to be studied not merely heard to be appreciated.

Wednesday, November 20, 2019

Review on Ghost Soldiers Essay Example | Topics and Well Written Essays - 750 words

Review on Ghost Soldiers - Essay Example Ignorance remains an integral reason as to why people remain clueless about the experiences of soldiers engaged in war (Shlachter, 2001). In addition, the traumatized soldiers’ training expects them to remain resilient and not break under pressure. As a result, many of them suffer in silence from the traumatic experiences. They avoid recounting to their family and friends about what they went through during the deployment periods (Shlachter, 2001). Therefore, Hampton Riley’ Ghost Soldiers’ provides an exhilarating tale of the lives of US soldiers engaged in a dangerous mission during World War II. This novel provides insightful information for people possessing extremely limited knowledge on the experiences faced by soldiers at war (Shlachter, 2001). The setting of Hampton‘s novel is in January 28, 1945 during the World War II. He gives a narration of the experiences of the 121 hand-picked troops chosen to form the 6th Ranger Battalion (Riley, 2002). Their mission was to slip behind enemy lines in the Philippines and try to rescue the 513 Prisoners of Wars (POWs) of British and American descent. Their captors subjected them to inhumane conditions during both the time of the Bataan death march and the three year captivity period at a camp near the city of Cabanatuan (Riley, 2002). The 6th ranger battalion thought they would be dealing with only a few dozen prison guards. However, as they continued to advance deeper behind the enemy lines, it became clear that Cabanatuan had become a significant transshipment point for the Japanese soldiers. As a result, the 6th Ranger soldiers would have to face as many as 8,000 soldiers (Hoover, 2001). Hampton gives a detailed, gruesome narration of what the soldiers had to endure in order for their mission to prove successful. In his account, he applauds the leadership tactics employed by Lt. Col Henry Mucci; leader of the 6th Ranger Battalion (Riley, 2002). Hampton intricately combines three differe nt stories meshing them into one tale. The first tale revolves around the atrocities committed by the Japanese (Riley, 2002). Hampton delves into the details of the fundamental differences in culture. He also addresses the errors in Judgment, for example, there existed an assumption that only 25,000 American and Filipino troops were available to take part in the Bataan Death March; the actual number was 100,000. Hamptons diverges from the exploits of the soldiers providing an entirely different outlook of ‘high pockets’; individuals who risk their lives to become spies for the US (Riley, 2002). Claire Phillips rises into prominence in Hampton’s accounts of these risk takers. She pretends to be of Italian descent and starts the Tubaki night club despite the fact that she is a GI’s wife. She manages to spy on the Japanese soldiers supplying the information gathered to the local guerillas (Riley, 2002). The High Pockets’ run comes to an end when the Ja panese secret police manage to capture them. The final story revolves around the 6th Rangers Battalion’s mission to rescue the POWs. Hampton provides details on the choosing of the 121 soldiers to form the Battalion. The detailed information provided in the content affirms his dedication to his work; the research done proves impeccable (Riley, 2002). Hampton provides an epic end to his book through the successful rescue of the POWs. The warm welcome of the captives in San Francisco leaves readers heart lifted after the previous heartbreaking stories narrated in the book (Riley, 2002). Ghost Soldiers; is a thrilling battle saga in which author Hampton explores the mystery of human behavioral traits when faced with extreme, stressful conditions (Shlachter, 2001). His first take was on the POWs

Monday, November 18, 2019

Leadership in Management Essay Example | Topics and Well Written Essays - 1750 words

Leadership in Management - Essay Example Though nowadays, even this statement can be proved false. I say this because the world, in which we are living, has become so advanced that we can even say that leaders can be made. But we will focus our study on a born leader. He is also known as a synonym for Apple Inc. He is Steve Jobs. Steve Jobs was born in 24th February 1955 in San Francisco. He stayed with his adopted parents since he was born because his own parents never accepted him. So since child hood he had a feeling of abundance, which created the fire within him to become a famous leader one day. Jobs co-founded Apple in his parent’s garage in the year 1976. Though he lost the tussle with the board of director in Apple and had to leave, he did not give up (Northouse, 2009, p. 2-4). He decided to start NeXT computers in 1985, which was acquired by Apple Inc. He had a unique quality from childhood to fight with his situations. So in this case also he never sat back to repent on the bitter experiences that he had i n his life. One of the most important qualities of a leader is to face defeat with a smile on face. Apple computer was in a very difficult position when Steve Jobs joined apple as the interim CEO. In the mean while he also bought Pixar, a computer graphics company in1986. Later Walt Disney bought it from him and Jobs became the highest individual shareholder and one of the board members of Walt Disney. This shows that he was a visionary. He was very well aware of the steps that he took and the results of his decisions. He had an excellent team of employees who gave shape to his dreams. He was a very harsh with his words. At many times he spoke harshly with his employees. But they never left him to go for another job. The employees of Apple Inc. would be welcomed at any big company. But the aura of Jobs was such that 80% of his harsh words were accepted to be true. He was considered to be a charismatic leader (New Charter University, 2012). Steve Jobs introduced a series of new produ cts like the Mac OS X, iTunes, iPod, iPads, and iPhone. He was a perfectionist and he was very clear with his product ideas and their performances in the market. So he always wanted that the best technology offered to the world market should a product from Apple. A true leader not only wants to stay ahead of his group but also ahead of everyone. He has earned a lot of recognition, awards and for his achievements. But the more important fact than this is that he has great leadership qualities which made him stand out from the rest. He entered Apple computers when it was on the verge of closure. He not only revived the company but made it a market leader. A far sighted leader can only perform such miracle. Background Leadership means influencing people. It signifies creating a change in the society and in the minds of people and directs them towards achieving a goal. The person possessing these qualities is considered a leader. A good leader is one who follows his followers as followe rs are those who appreciates the quality of a person and considers him their leader. Leaders do not accept the norms of the society as they are they go against the flow, to set their own path. A leader has certain important leadership traits such integrity, self-confidence, intelligence and determination. Steve Jobs possessed all these qualities. Not only did he possessed them but also utilized them to integrate others too. He was always confident about his innovations, determined that they would do well in the market and he was intelligent enough to shape them also in products. Moreover, he always followed an ethical style. I say this because

Friday, November 15, 2019

Domestic Violence A Recurring Problem In Modern Society Criminology Essay

Domestic Violence A Recurring Problem In Modern Society Criminology Essay Discuss its causes, effects and the legal and other remedies available to deal with the problem. Analyse whether these remedies are sufficient or not and set out how you feel the issue is best dealt with. Domestic violence is undoubtedly a serious problem in modern society. Crime statistics in Ireland indicate that the Gardai record an average of twenty three incidents of domestic violence every day (Watson and Parsons 2005). However, domestic violence is certainly not a modern phenomenon. It has existed throughout the centuries but remained largely hidden and unrecorded. Traditionally, domestic violence has been considered a private matter rather than a criminal offence. Until the 19th century it was legal and socially acceptable for men to beat their wives (Dobash and Dobash 1979). Domestic violence is often associated with physical abuse only. However, research indicates that it can take different forms: physical, sexual and psychological/emotional. In the course of this essay the causes and effects of domestic violence will be explored, drawing on research carried out in Ireland and internationally. The legal and other remedies will also be outlined and evaluated. 2. Many theories have been put forward as to the causes of domestic violence. One theory is idea of circular causality (Pressman 1989). This view implies that a woman is as responsible for her own victimization as the man who assaults her. The violence is seen as something they have both created and are both responsible for modifying. Another view explains violence by reference to the mans personal history. Research shows that men who witness their parents domestic violence are three times more likely to become wife beaters and women who witness violence as children seek out abusive men because they saw their mothers being abused (Pressman 1989). Pressman (1989) suggests witnessing violence against a Mother may make sons more prone to violence themselves as adults, they may be quick to perceive conflict and slow to see non-violent alternatives for dealing with it. However, there are no firm conclusions about childhood experiences of domestic or other abuse as a cause of adult abuse or v ictimization. Pressman (1989) points out that it is not simply a matter of modelling whereby a child witnesses a set of behaviours and proceeds to replicate them: there are powerful mediating factors that can shape a variety of outcomes. She concludes that not all violent families and not all children are the same and the replication of violence from generation to generation is not inevitable (Pressman 1989). Domestic violence is often associated with alcohol consumption, but it is unclear as to whether alcohol is the root cause of this problem. Reporting 3. on a study of married couples, Leonard finds support for a causal relationship between a husbands drinking and physical abuse of wives. However, he cautions that: †¦despite the support that the current research program has provided for a causal role of alcohol on marital aggression, it would be a mistake to overstate this role. Alcohol is neither a necessary nor a sufficient cause of marital aggression. The majority of aggressive episodes occur without alcohol, and men who have behaved aggressively with alcohol have often behaved aggressively without alcohol as well. The role of alcohol†¦appears to be one of a facilitative nature, a contributing cause. (Leonard cited in Watson and Parsons 2005 p.67). In their study of domestic violence in Ireland, Watson and Parsons identify a number of triggers of abusive behaviour. A trigger is an immediate precursor to the behaviour and not necessary the ultimate cause of violence (p. 174). They found that in about two out of five cases the abusive behaviour had no specific trigger or was triggered by minor incidents. In about one third of cases abuse was associated with the consumption of alcohol. The authors conclude that the results are not strongly suggestive of a primary causal link between consumption of alcohol and incidents of domestic violence. In only one quarter of cases was alcohol consumption always involved. Similarly, Margaret Martin, director of Womens Aid, points out that while there is a strong link between alcohol abuse and domestic violence, treating or dealing with the alcoholism does not necessarily stop the violence (Martin 2009). 4. However, she does acknowledge that alcohol greatly increases the risk to a woman and has clear links to increased severity in relation to physical and sexual abuse. Other contributing factors to domestic violence include social exclusion, gender inequality, poverty and having a criminal background. A number of theorists work from the understanding that domestic abuse is caused by social structures, cultural norms and other factors that endorse or do not challenge the use of control and abuse by men against their female partners (Debonnaire et al. 2004). Pressman (1989) suggests that violence against women has persisted in our society precisely because it does not contradict cultural norms in any fundamental way. She suggests that to some degree we have all been acculturated to perceive violence as an acceptable means of exercising control. Wife abuse also reflects power differentials in our society, played out in the family. Pressman (1989) points out that the groups against whom violence is accepted are groups that are socially and economically disadvantaged including women, children, racial minorities, the poor, the mentally ill. In particular she looks at the economic inequalities that affect women and their continuing exclusion from positions of power in very many sectors o f society. According to Pressman (1989) there is an obvious link between this systematic disempowering of women and their continued victimization. Domestic violence simultaneously expresses and reinforces their 5. disempowered state. The basic problem as she sees it, is not just to end violence as a behaviour (although it is obviously important) but more importantly to alter the social arrangements that violence expresses and reinforces. Women cannot be safe when at the same time they are defined as inferior and subordinate to men. The impact of domestic violence is far reaching and complex. Domestic violence is a major cause of injury, disability and death for women worldwide. Between January 1996 and June 2005, one hundred and nine women were murdered in Ireland, seventy two of these in their own homes. In those cases which have been resolved, all were perpetrated by a man and almost half were perpetrated by the womans partner or ex-partner (Debonnaire et al. 2004). Ireland is not alone, domestic violence is one of the greatest causes of death and injury amongst women worldwide (Amnesty International, 2004). The World Health Organisation has estimated that 70 per cent of female murder victims are killed by their male partners. Their recently released World Report on Violence and Health notes that whereas men are much more likely to be attacked by a stranger or an acquaintance than by someone within their close circle of relationships†¦.one of the most common forms of violence against women is that perfor med by a husband or male partner (World Health Organisation 2001). The Council of Europe has stated that violence in the family is the major cause of death and disability for women between the 6. ages of 16 and 44 years. Domestic violence results in more death and ill- health in women than cancer or road traffic accidents (Kerr 2004). Similarly child homicide is often linked to domestic violence, where the male abuser is abusing the women and the child(ren). Children who are not being abused may be physically harmed when they try to protect parents or are caught in the crossfire (Debonnaire et al. 2004). Apart from physical injury, domestic violence is also linked to depression, post-traumatic stress disorder and other mental health problems. Both women and men who have been abused report negative emotional consequences (Watson and Parsons 2005). However, women are more likely than men to have been very frightened or distressed by this abuse and to report that the experience had a major impact on their lives (ibid. p25). Watson and Parsons also found that more women than men reported a loss of confidence. In some instances emotional abuse was found to be even more traumatic than physical attacks. Almost half of the severely abused respondents including those who had suffered severe physical or sexual abuse listed an emotional incident as being the worst thing that had happened to them (ibid. p.25). The research also found a clear link between abuse and marital breakdown. Domestic abuse can have an impact on other aspects of the victims life, including work and accommodation. Watson and Parsons found that two 7. in five of those severely abused had to take time off work, while nearly one in eight had to leave a job. In some cases it can lead to homelessness (OHalloran 2009). It is also a major cost to the exchequer in health care for the victims (Debonnaire et al. 2004). Ireland now has a network of womens support services and mens programmes, a civil and criminal justice framework, a specialist policy for the police and other elements of domestic abuse intervention. There has been public debate about effective ways of responding to and preventing domestic abuse (Task Force Report, 1997). The Department of Justice, Equality and Law Reform of the government of Ireland coordinates a Steering Committee on Violence against Women. Various sub-committees of the steering committee include one focused on work with perpetrators (Debonnaire 2004).. Traditionally attempts to intervene in domestic violence focused on abused women and their children. In recent years, however, there has been a shift to include a focus on the man who has perpetrated the abuse. on the perpetrator of the abuse. New policies have been adopted which focus on pro-active forms of intervention and prosecution. As part of these interventions treatment programmes for men have been introduced. The Dulaith Abuse Intervention Project (Dulaith DAIP) was the worlds first project to place intervention programmes as part of a co-ordinated 8. community response that aimed to hold men to account for their behaviour, enhance womens safety, sanction abusers appropriately and teach men not to abuse (Debonnaire 2004). There are currently fifteen intervention programmes working with domestic abusers in Ireland. Through working with perpetrators, these organisations are trying to increase the safety, and reduce the risks to their partners and children (Debonnaire et al. 2004). Numerous evaluations of intervention programmes have been carried out. Some results appear to show that programmes had limited or no effect on mens behaviour or womens safety. Others show that some programmes can have a positive effect on womens safety and on reducing mens abuse, particularly as part of a co-ordinated community response involving the criminal justice system and womens support services (Dobash et al, 2002; OConnor, 1998 cited in Debonnaire 2004). The legal protection for victims of domestic violence in Ireland includes elements from both the criminal and civil systems. The Domestic Violence Act 1996 enables spouses, cohabitees and parents to apply for orders, with certain property and residency restrictions. It enacted provisions of the Family Law Act 1981, making breach of domestic violence order an arrestable offence and allowing Gardai to arrest an offender for suspected actual bodily harm or grievous bodily 9. harm without witnessing the violence. The Non-Fatal Offences Against the Person Act, 1997 addresses criminal aspects of domestic violence, making most forms of physical violence used by domestic abusers a crime. Victims of domestic violence can apply for three type of civil orders: protection orders (an interim order, which the court can make while a full hearing is pending for one of the other orders), safety orders (which prohibits violence or threats of violence, molesting or watching the place where the applicant or dependant person resides) and barring orders which prohibits the person from entering the place where the applicant resides also prohibits violence, threats of violence, molesting or watching the place where the applicant or dependant person resides). According to Nester (2007) it is clear from a High Court decision in the case of McA -v- McA (1981) that it is not necessary to prove actual or threatened violence in order to avail of a barring order. The wife in the above mentioned case claimed that her health had been adversely effected by her husbands continued lack of communication. Judge Costello granted a barring order on the grounds that the husbands conduct had seri ously affected the welfare of the wife. In cases where the Court believes there is an immediate risk of significant harm to the applicant or dependant child, or that a protection order may not be sufficient to protect the applicant, an interim barring order may be granted. This order has the same effect as a 10. barring order, and lasts until the Court determines the application for the barring order. Safety orders can last up to five years and barring orders for up to three years and can be renewed after that (Nester 2007). According to Margaret Martin (2006) Director of Womens Aid, the 1996 Domestic Violence Act falls short in a number of significant areas, leaving many victims of domestic violence unable to access protection in the civil courts. She states the Act specifies where a cohabitee wishes to apply for a barring order, two key conditions must be satisfied: the applicant must have lived with the respondent for six of the previous nine months in aggregate. They must be able to prove an equal or greater interest in the property. To apply for a safety order, the applicant must have lived with the respondent for six of the previous 12 months in aggregate. Ms Martin (2009) argues that these restrictions have prevented many women from accessing protection. Some may have been living with their partners for too short a period or many may be separated from him too long. Others may not have lived with their abuser at all. Separation she says is often the most dangerous time for a woman with the abuse becoming more frequent, severe and dangerous. Ten per cent of callers to the Womens Aid helpline in 2008 were being abused by former partners who were not married. Ms Martin (2009) also points out that there are no legal provisions for women in dating relationships. She states that the law is powerless to protect women who were never married or have never 11. lived with the abuser. This also applies to women who have children but do not live with the father of the child, they cannot apply for domestic violence orders because they do not fit the cohabitation requirements. This falls short of UN guidelines for domestic violence legislation, which state that legislation should apply at a minimum to individuals who are or who have been in an intimate relationship, including marital, non-marital, same-sex and non-cohabiting relationships (Martin 2009). A number of groups including Womens Aid, the Law Society, the Law Reform Commission, the Government Task Force on Violence against Women and Amnesty Ireland, have called for the 1996 Domestic Violence Act to be amended in order to address these issues. Holland (2009) states that unacceptable delays in the family courts are causing women, intimidated by violent spouses and partners, to drop applications for barring orders. She points out that the first port of call for a woman seeking a barring or protection order against a violent or abusive man is the District Court. Currently women face an eleven week wait between applying for an order and a court hearing. Within that period she says many women come under enormous pressure to withdraw their applications. She argues that the abuser has a lot of time to work on the victim. She said once an application is withdrawn it is unlikely the woman, who would be further demoralised, would re-enter it. A report published by Amnesty Internationa l points out that of 8,452 incidents of 12. domestic violence reported to the Garda in 2003, less than half resulted in barring orders from the courts. It looked at convictions of perpetrators in the courts, figures indicate that successful prosecutions occurred in only 7.7 per cent of these cases. The report also states that there has not been a single conviction for marital rape in this country, despite specific legislation making it a crime since 1990 and its frequent occurrence as reported by victims to organisations such as Womens Aid (Raferty 2005). Womens refuges prov

Wednesday, November 13, 2019

Total Quality Management Essay -- essays research papers

TQM is a philosophy of management driven by the constant attainment of customer satisfaction through continuous improvement of all organizational processes, including employee participation, teamwork, and leadership. There are five key principles: -MANAGEMENT COMMITMENT 1) Plan (drive direct) 2) Do (deploy, support, and participate) 3) Check (review) 4) Act (recognize, communicate, revise) -EMPLOYEE EMPOWERMENT 1) Training 2) Suggestive Scheme 3) Measurement + Recognition 4) Excellence Teams -FACT BASED DECISION MAKING 1) Statistical process control 2) Team oriented problem solving (TOPS) -CONTINOUS IMPROVEMENT 1) Systematic measurement + focus 2) Excellence Teams 3) Cross-functional process management 4) Attain, maintain, + improve standards -CUSTOMER FOCUS 1) Supplier partnership 2) Service relationship with internal customers 3) Never compromise quality 4) Customer driven standards Implementation of TQM Total Quality Management emphasizes detecting potential problems before they occur. There are five major areas of TQM, which are: †¢ Focus on quality and prevention of problems †¢ Cooperation with suppliers and customers †¢ Continuous improvement †¢ Encouragement of proper climate and employee empowerment †¢ Use of measurements to back decisions In the process of TQM customers are the ones who define a quality product. Not only should employees inspect products or services while performing duties, but companies must design quality products. During the design process there should be input from customers, marketing and those who assemble the final product. A company implementing TQM should cooperate with suppliers and have a focus on customer satisfaction. Vendors should be treated as business partners with all parties working to deliver a quality product. In order for TQM to be successful suppliers must also implement it. When implementing TQM one must remember that it is continuous improvement, while eliminating wasteful steps. In order to implement it employees must be empowered to make d... ...ogether to form a team so that the entire construction project in is sync with all of its components, thus resulting in more fluid results. The final and arguably most important application of TQM into the construction industry is a new system of measures. The construction does not have system of statistically monitoring themselves, except for total cost results. It can be argued that since the industry does not have a statistical standard of measurement it cannot improve itself. Instead of focusing on processes and causes of problems, the industry has focused on monitoring and inspection of end results. As an example, the construction industry does not monitor the amount of non-productive time at a project for the amount of redo-work that takes place due to mistakes. This lack of measurement leads to acceptance of the defects and non-productive time. Using a TQM approach, the cause of these "defects" are quantified and analyzed. This data can then be used to analyze the efficiency of projects as they are on going. This results in the ability to make beneficial changes by eliminating the cause of the defects wh ile the project is still in its construction phase.