Thursday, November 28, 2019

Gun Control Or People Control Essays - Gun Politics, Firearms

Gun Control Or People Control One of the biggest issues in the United States today seems to be gun control. The government is constantly proposing legislation for more and more gun control. Slowly they are chipping away at our constitutional right to keep and bear arms. You must ask yourself: For what reason does the government want to restrict law abiding citizens from owning guns? Certainly government is not so naive to think criminals will adhere to gun control laws. There just may be an underlying motive for gun control. After all, people would be easier to control if they were defenseless. Few public policy debates have been as dominated by emotion and misinformation as the one on gun control. Banning guns to reduce crime makes as much sense as banning alcohol to reduce drunk driving. Indeed, convincing evidence shows that civilian gun ownership can be a powerful deterrent to crime. In 1966 the police in Orlando, Florida, responded to a rape epidemic by drafting a highly publicized program to train 2,500 women in firearm use. The next year rape fell by 88 percent in Orlando (the only major city to experience a decrease that year); burglary fell by 25 percent. Actually, of the 2,500 women not one ended up firing her weapon; the deterrent effect of the publicity sufficed. Five years later Orlando's rape rate wasstill thirteen percent below the pre-program level, whereas the surrounding standard metropolitan area had suffered a 308 percent increase. During a 1974 police strike in Albuquerque armed citizens patrolled their neighborhoods and shop owners publicly armed themselves; felonies dropped notably. In March 1982 Kennesaw, Georgia, enacted a law requiring members of each household to keep a gun at home; house burglaries fell from 65 per year to 26, and to 11 the following year. Comparable publicized training programs for gun-toting merchants distinctly reduced store robberies in Highland Park, Michigan, and New Orleans; a grocers organization's gun clinics produced the same result in Detroit. Gun control advocates note that only two burglars in 1,000 are driven off by armed homeowners. However, since a huge majority of burglaries take place when no one is home, the statistical citation is deceptive. Several criminologists attribute the predominance of daytime burglary to burglars' fear of encountering an armed resident. Indeed, a burglar's chance of being sent to jail is about the same as his chance of being shot by a victim if the burglar breaks into an occupied residence (one to two percent in each case). Gun control is based on the faulty notion that ordinary American citizens are too hazardous and ill-tempered to be trusted with weapons. Only through the blatant revocation of specific constitutional rights is gun control even possible. It must be enforced with such violations of individual rights as officious search and seizure. It most severely victimizes those who most need weapons for self-defense, such as blacks and women. Many advocates of gun control believe that legislation in their favor will create a decrease in violent crime. To the contrary, Great Britain, a country with gun control, reports a frightening 1,200 percent increase of violent crimes against individuals in the last thirty three years (between 1960 and 1993). The number of robberies in this same time period has increased by 2,700 percent. Great Britain's overall crime rate has risen by 680 percent. Gun control advocates--those who favor additional legal restrictions on the availability of guns or who want to outlaw certain types of guns--argue that the more guns there are, the more crime there will be. There is no simple statistical relationship between gun ownership and homicide or other violent crimes. In the first 30 years of this century, U.S. per capita handgun ownership remained steady, but the homicide rate rose tenfold. Consequently, between 1937 and 1963, handgun ownership rose by 250 percent, but the homicide rate fell by 35.7 percent. Switzerland, through its militia system, issues both pistols and fully automatic assault rifles to all adult males and requires them to store their weapons at home. Further, civilian long-gun purchases are basically unregulated, and handguns are available to any adult without a criminal record or mental defect. Nevertheless, Switzerland suffers far less crime per capita than the United

Monday, November 25, 2019

Joint Ventures Trianon HR Management

Joint Ventures Trianon HR Management The position present requires a person who is hard working and who knows the ways of work of Trianon. Moreover, since the joint venture involves the Hungarian government, somebody with knowledge of the Hungary government will be vital. Consequently, Alistair should choose Janos Gabor for the position in case he is forced to do that. Firstly, Gabor was born, brought up and educated in Hungary. As a result, he has good knowledge of how business is done in Hungary.Advertising We will write a custom essay sample on Joint Ventures: Trianon HR Management specifically for you for only $16.05 $11/page Learn More He will therefore advice the company in case there are legal issues that need to be addressed. He is also well placed to easily adapt the culture of Hungary. Moreover, Gabor has the technical knowledge about cathode ray tube which is critical for the assignment. On the same note, he has additional knowledge on systems technology which is an additional advant age. In addition, he has worked with the company for some time and his performance is good depicted by the recent promotion that he was given. Furthermore, Gabor is single and can therefore be willing to travel without any hindrance. It should be noted that one of the requirements of the position is extensive travelling especially for the first year. Though not very vital, the connection of Gabor’s family with the government can be very crucial in ensuring that the venture goes on smoothly. For recruitment to this position, highest degree of integrity is required. Therefore, Trianon will have to come up with the job description first. The job description needs to be detailed outlining what is expected of the person who will fill the position. It should be noted, that the position is not only technical but also administrative. As a result, somebody with knowledge of managing people will be the best option. After having the job description Trianon will then have to advertise th e position and give both internal and external people opportunities. Selection will have to be done strictly following the job description. There should be interviews both oral and over the phone to ensure that the selected candidate has the required qualities. Questions of the interview should be based not only on the duties that the person is going to execute, but also on the general knowledge that the candidate will require during his or her duty. It is important to have the oral interview conducted by a panel of people so as to eliminate subjectivity in candidate recruitment. This procedure will ensure that the best talent is tapped into the company. It is needless to say that Trianon will need to advertise itself as the employer of choice to attract many qualified applicants. Joint ventures involve management of people sometimes from other firms which have different operational guidelines. On the same note, by entering into a joint venture, a firm should be ready to rearrange i ts operations. All this will affect the mode of operations of a firm in one way or the other.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Consequently, inclusion of human resource staff will be very important. The new roles that come with joint ventures will have to be filled with qualified people. The duty of recruiting new staff to the firm rests with the human resource department. On the same note, any reorganization as far as human capital is concerned that may be required to set a joint venture into motion will have to be done by the human resource department. Consequently, human resource staff should be an integral part in finalization of joint venture agreements.

Thursday, November 21, 2019

Ethical and Legal implications of lack of access to healthcare Case Study

Ethical and Legal implications of lack of access to healthcare - Case Study Example The high expectations of ensuring effective care to those suffering from acute illnesses have taken a toll on the health care system in the country due to shortage of available resources against the number of people in need of care. Allocation of scarce resources in the midst of increasing costs and unemployment has led to a series of debates among scholars regarding the role and impact of ethics in provision of health care services. Although various health care reforms have been initiated over the years, to ensure better care for the citizens, the nurses and other care givers are entrusted with an ethical responsibility to provide equitable and fair distribution of resources (White, Duncan, 2002). The ethical obligation to offer adequate and timely health care services across all classes of the society entails two key principles of health care which includes - the provision of fair and equal opportunities to all members of the society and to protect and safeguard the interests of th e vulnerable populations by providing them proper health care benefits. These principles seem to have eroded with time, on account of increasing costs of drugs, rise in health care expenditures, and the resulting cost-control measures arising out of the same. This has lead to serious negative implications on the society as a whole such as reduction in overall health of the citizens, reduction in employee productivity, and an increased burden on the health care system in terms of added costs among many others (Sulmasy, 1992). Although access to health care services is not an end to all health related problems, the equitable access to such services does however significantly increases the odds of attaining better health outcomes due to timely diagnosis and treatment. According to the Study of Ethical Problems in Medicine and Biomedicine and Behavioral Science Research Commission, one of the key ethical obligations of the society includes ensuring equal access to health care services. The commission states that "Equitable access to health care requires that all citizens be able to secure an adequate level of care without excessive burdens" (Millman 1993, Pp. 32). Legal Implications of lack of access to health care: There are wide ranging racial disparities in the United States with regard to health care, despite of stringent laws against such discrimination. However, such disparities exist on account of various reasons such as the vulnerabilities of people belonging to certain races such as African Americans and Hispanics who belong to low socio-economic backgrounds. According to The Civil Rights Act of 1964, any discrimination in provision of health care may lead to enforcement of legal action against the accused. Section 601 of Title VI states that "No person in the United States, shall, on the grounds of race, color, or national origin, be excluded from participation in, be denied the benefits of, or be subject to discrimination under any program or activity r eceiving federal financial assistance" (Williams 2007, pp. 180). This clearly indicates that law prohibits any kind of discrimination however preventing such discrimination poses a greater challenge, due to the various types of

Wednesday, November 20, 2019

Development Economics Paper 3 Essay Example | Topics and Well Written Essays - 500 words - 1

Development Economics Paper 3 - Essay Example From a critical point of view I believe in the existence of the poverty trap that has essentially entangled a group of people and deprive them from getting what they would desire to get. In essence, an individual born to a poor family in the village set up of a third world country may be entangled within the vicious circle of poverty, lack of access to education and healthcare facilities as well as exposure to the world out there. In such a case, the child may be limited and despite of his talent and great mind, they fail to get a platform to practice it and perfect the art. This leaves them in the same place becoming a vicious circle for a family or the state at large. there is poverty trap for those who have too little and cannot invest to get enough returns whereas those who have access to reasonably more resources, there potential to grow is evident regardless of the situation around them. As one continues to invest in what they have, growth is eminent and sooner or later there w ill be no poverty trap entangling them as they break free from it. Yes, I believe that the poverty trap works when all other factors are kept constant. Someone’s financial income essentially determines there financial might and dictates what they can do in as far as investment is concerned. The economic status of an individual starts flat then rises as one gets income but the goes down as responsibilities increases creating an S-curve that depicts element of a poverty trap. In this sense, poverty trap is evident and works by way of limiting ones potential within their financial might derailing them from the ability to invest a break away from the vicious cycle of poverty (Banerjee and Duflo 55). S-curve is a theoretical shape depicting a poverty trap that shows one beginning on a straight line, then goes up to a point where they stagnant and start the downward movement again. This concept is used

Monday, November 18, 2019

Prepare an organizational Strategic Human Resource Plan Essay

Prepare an organizational Strategic Human Resource Plan - Essay Example We also hold up all the talent growth of our workers through qualified growth, profession growth, and better presentation for our management. Mostly endorse the most attainment of a work existence balance and wellness in our workers community. To bring Human Resource services, plans and more so communications that are can be more valued by our potential workers, present workers, and retirees. To provide a quality and varied, comprehensive a group of people with an optimistic work surroundings. To struggle for most talented with effectual staffing plans and well organized staffing processes. Anothr goal of human resource is to foster an inclusive, diverse community, as well as a positive work environment. This will involve conducting climate assessment, building a better work environment, partner with Diversity Office to uphold and promote principles of community. Other provisions under this goal would also be to educate the community on harassment and discrimination prevention by equ ipping them with productive problem solving techniques. Objectives To generate a total plunder significance so as to educate the Human Resource associates, employing new managers, and even workers of the high value of this organization. Working very directly with the management so as to strengthen the needs for aggressive reimbursement for most of the individuals in our institution and desires to draw and keep our students. Â  To advance in specialized growth programs so as to get better management abilities, job capacities, and eventually employee efficiency. To expand complete vocation organization tools, job enhancement plan, furthermore mentoring all programs so as to help our workers and then get ready for more new chances. Develop more usable and flexible employment preparations during greater decision making and workers responsiveness regarding the possible reimbursement to workers and departments. Strategic Human Resource Organization Chart Our Activities Experts in our ins titution of Human Resources are listening carefully about civilizing our services to the university’s society by humanizing our abilities. Most of our efforts are to provide back to the career through managements and participation in expert relations. Again we will provide more efforts so as to intensify the information of the career by adding more of the academic qualifications and expert certifications. We will keep more information to our students this during these times so as to let everyone be acquainted with how the talented our members of the team are increasing as experts. Our Strategic human resource organization gives the financial, shared and supporting factors that one can be created in the external circumstances in which our University works. These factors have significant value, which have allegations for effectual human resource organization associated to the change work of art of the institution, in terms of era, sex and more so racial allocation. Our Universi ty seeks to make sure that its works better to the most extent promising. We do analyse and take away the most universal organisational difficulty to women’s development and give confidence to diversity in its employees and students population. There are important confront in upholding a high level output in mature employees and making sure that this University is most successful in employing and keep

Friday, November 15, 2019

Computerised Stock Control System

Computerised Stock Control System Introduction The Enterprise Networking assignment is based on the computerised stock control system. This assignment is about how to implement a new online book company called â€Å"Amazing Books†. â€Å"Amazing Books† company is a new online book company that will be selling books via a website. The website represents the books that are in the company’s warehouse. It also contains the information of the books and the information provided to the customers to order the books they want. It is linking with company’s stock control system. The stock will be regularly recorded and updated based upon the sales record. When a customer fills an order form, he or she has to choose the items and the delivery information. When the company receives the order, it delivered the packaged books to the local depot of a courier company. The online book company also implements its computerised inventory control system in the warehouse. This system includes order processing, recording new entry of books, despatching books to the courier firm, and flagging stock reorder levels up. So, the company will investigate the websites of stock control system as sample and implement its own one. Besides, the company will create a local area network (LAN) for in the warehouse by using appropriate media and topology to carry out its processes well. The company also has a plan to deliver the ordered stock items from the warehouse to the delivery company successfully by using suitable vehicles which contains hardware and software for security management. The last plan is to manage a security control system in order to prevent the theft of staff themselves and to regulate the stock reorder level by the time theft occurs. The network administrator or manager of the â€Å"Amazing Books† online book company will be investigating the book websites and computerised stock control system websites of other companies. He or she is also looking forward to finding the delivery management system and security management system on the web. Then he or she will be writing a report (with recommendations) how to implement theirs company in order to successfully set up. Task 1 Amazing Books Company is one that wants to manage themselves as an online book sales company. They will sell their books via the internet. So, they want to develop a website which will display information about their books. Before it is developed, they examine three websites of the online book companies that sell theirs via the internet. The first investigated website is www.bookshopofindia.com. In home page, the pictures of some books are presented. When the pictures are doubled-clicked, the summaries of each book are displayed. It contains other information such as authors’ names, ISBN number, price and numbers of pages. On the left-hand side of the home page, the subjects of the books that are sold in this website are listed. The subjects contain religions, arts, commerce, computer technology, children books and so on. To order the books, customers can send e-mails, but they can only make payment by using bank account of Corporation bank and Punjab bank. The second examined website is www.boomerangbooks.com. In home page, some pictures of normal books are placed on the right side. In the top, some special ones such as books for Mother’s day are put. In the middle of the page, some are advertised by showing pictures, authors’ names, and short descriptions of them. If the pictures are double-clicked to investigate, the pictures of the books’ covers and summaries of them with authors’ names appear. ISBN, format, number of pages, publishers, publish date and languages are also shown. On the right side, normal price and discount price are compared. On the left side of the home page, the site arranges some categories to browse for books according to book categories, bestsellers, books from movies, and book awards, etc. It also places book contents. In home page, it ranges a menu called â€Å"Boomerang Books Bulletin†. If a user signs up in this form, he or she can get a $5 book voucher and 20% discount when discounts days are on. To order the books, the site displays its phone number, e-mail address, and fax number. Thus, customers can order by phone, e-mail or fax but they can pay only Australian dollars. The third one that is observed to get displaying books information is www.cherrythitsar.org . This website is the one where users can get e-books. On the home page, there is a list that describes the categories that users can download. These categories contain Myanmar free e-books, Myanmar novels, Myanmar newspapers and so on. If a customer wants to get them, he or she has to make an account by entering user name and password. Then he or she can get them. After investigating these websites that provide information for online book selling, â€Å"Amazing Books†, the online book company, is implementing their website. On the top of the home page, the photos of the books that are sold for the memorial days will be presented. They will be sold by gifting suitable discounts. On the left-hand side of the home page, the catalogues of the books will be exhibited in order to search books by the categories the customers want. The catalogues will queue the lists of the books according to book categories, bestsellers, books from movies, and book awards, etc. If the photos of the books in home page are double-clicked, the summaries of the books with books’ titles, sorts of books, ISBNs, authors’ names, publishers, publishing date, number of editions, and number of pages, etc. will be shown. Under the every page of site, there will be company’s address and ordering information will situate. Ordering information will include phone numbers, fax numbers and company’s e-mail address. So, customers can order books by ringing a phone call, or making order by fax, or sending an e-mail. To order by e-mail customers must fill chosen items into the shopping basket that is on the right side of the home page. Then they have to enter their phone numbers and addresses (including postal code). They can enter their bank accounts or credit card accounts to order. Task 2 There are many stock items that are stored in the warehouse of the â€Å"Amazing Books† online book store. The stock control system in warehouse is linked with the company’s website so customers can view the books that are in warehouse via the website. If they want to order books, the will their personal information including delivery addresses, postal codes and bank or credit accounts. When customers make books order via website, the company will inform the staff of the warehouse. The warehouse staff checks the level of stock items and reply to the main server. And the server keeps the information update and let the customers know information to the website. Then the company will deliver the books to a delivery team. And then the courier company will deliver books according to the customers’ addresses and postal codes. To carry out these processes successfully, the book store needs a proper inventory control system. So, they gather information for stock control system by exploring the websites which represent their computerised stock control systems. Required information for recommendations The first and second investigated websites show their online stock control systems. They show their product information and other associated one. Customers can search and browse they want and they can order them by e-mails. The company that creates the first website is using RFID (Radio Frequency Identification) readers for recording the new items for the stock. The company also explains its delivery service for ordered items. The second website uses barcode reader. It describes their control system of balance levels of the stock and alerting the flagging up reorder system by using the stock control management software. The third and the fourth one are the websites that sell software applications for computerised inventory control management system. They give the detailed information of how to use their software. Both of them are produced to run the functions of recording customers’ order, purchasing, items entry, auditing, receiving, shipping, transferring, reporting and security management, etc. Among them, the former one is used with barcode reader and the latter one with RFID for recording new stock items for the system. Customers can buy their software by entering their e-mail addresses, and bank or credit account numbers in these websites Methods and hardware for recording stock entry which are in warehouse After investigating four websites, â€Å"Amazing Books† implements its computerised stock control system. First of all, they make purchasing books from many other sources. Then the books are put in containers which contain RFID (Radio Frequency Identification) tags and the containers are carried by suitable vehicles. When they arrived to the warehouse of the company, the RFID tags are checked by RFID readers which transmit the series of digital identities of the books wirelessly. The tag readers detect the packages or containers which contains several book items. The RFID readers can check each entire container simultaneously and enter data into the server computer using special stock control management software for inventory control. So, the right data in database of the server can keep updating. Being linked the server with the website of the company, the information of the books in web pages is automatically updated. (c) Methods and hardware for order processing To order the book items, the customers have to fill the order form. In this form, the customers must fill their information that contains their addresses and postal codes and delivery fees (which price ranges depend on countries) by means of bank or credit account numbers. After that, they can order books via website of the company. When the company receives orders from customers, they register information of customers and orders in Order file. They check concerned master and transaction files to know how many numbers of which stock items are ordered. They also interrogate stock levels in the warehouse using RFID readers and make records of sending items. These records are entered into the server to update stock information. They then display that information in the website that is linked with server of the company. So, customers can see whether their ordered items are sent to them or not. (d) Methods and hardware for recording despatched items Their next procedure is to deliver the ordered books to a local courier company. Before they send, they pick books up from the warehouse and pack them into specific packages or containers which consist of RFID tags which will help the courier firm easy to check them. Then they deliver them to the delivery firms by appropriate vehicles. When the books arrive, the courier companies check the RFID tags of packages or containers by using RFID readers. Then they start delivering them to the customers around the world by using flights or ships or other appropriate vehicles. The delivery firm company sends the items information in order to update data in database of the server of delivery company. They will update the delivery information whenever the items arrive to their braches in different countries until they reach to the destinations. So, the customers can view the information on the website when and where their ordered items are arrived. (e) Flagging up and reorder levels of stock items After sending the ordered item, the website needs to update the item information. To make balance for the reorder level, they use the automatic flagging up system using the stock control software by giving notation on the server of the warehouse. So, the company can check balance level and decide whether they should reorder new books from other sources or not. (f) Required hardware for system To complete the system, they also use some kinds of hardware devices. They use Server for the main control processes for the stock. And they also need to use some kinds of not only security devices for the warehouse security but also special software to control the system and to prevent unauthorized access to data. It describes their balance of the stock and alert the flagging up reorder system buy using stock control software. Task 3 To implement the computerised stock control system used in warehouse the local area network (LAN) is conducted. The major requirements of LAN network are topologies and media. There are many topologies though only some are widely used. The most popular topologies are ring, bus and star topologies. In ring topologies, computers are connected by cables in a circle or ring form. Each computer is directly connected to the next, so no termination is required. In this topology, token passing method is used to transmit data in clock-wise direction. So every computer can transmit data fairly. It can prevent high-traffic and time-critical applications. So it is reliable and highly secure. But it uses fiber optic cables so cost is high and finds difficulties to install. In bus topology all computers are connected via a backbone, a cable segment. In bus topology, signals are sent as electrical parses. When they are sent, they travel along the cable in all directions. So, data collisions can occur when more than one computer transmit data simultaneously. Thus, occupying high-traffic is the major problem; otherwise, cheapness and ease of installation are advantages. In star topology, all components are connected by cable segments to a central device to communicate each other via it. It can share network resources and send and receive data from the computers in the network simultaneously because it handles multiple connections. So it is useful where high traffic occurs. It supports centralized management and the central server has a complete priority over other computers. But this topology requires a more involved cable installation and high cost. The access of the entire network also loses when the central device fails. To build a network we also need media. There are two groups of media; bounded and unbounded media. In bounded media, there are three types of cables; coaxial cable, twisted pair cable, and fiber-optic cable. Coaxial cable consists of two kinds- thin coaxial (10 Base2) and thick coaxial (10 Base5). There are two types of twisted pair cables; unshielded twisted pair cable (UTP) and shielded twisted pair cable (STP). The optical fiber cable contains two kinds; glass and plastic. The unbounded media or wireless connection technology contains Wi-Fi, and Wi-Max connection. Wi-Fi includes 802.11b and 802.11g at 2.4 GHz frequency and its speeds are between 11 Mbps and 54 Mbps, and 802.11a and 802.11n has 5 GHz frequency and 54 Mbps bandwidth. There are two versions of Wi-Max connection fixed Wi-Max (802.16-2004) and mobile Wi-Max (802.16e). The stock levels displayed in the website are based upon the sales figures which are in warehouse. Updating stock control system regularly can help the stock level. To support the stock control system a LAN network will be created in the warehouse. There are two types of networks; peer-to-peer one and server-based one. The server based LAN network is chosen to implement as it can handle a number of computers, more memory for a large database and extra peripheral devices such as printers; otherwise, peer-to-peer network can handle 10 or fewer workstations. To configure a server-based network, an appropriate topology and a suitable medium are used. The proper one for this network is star topology. Using central devices such as switches connected with cable segments, it supports centralized management for the entire network. It shares resources and access to clients simultaneously without traffic. Unshielded twisted pair cable is used as medium. It ranges into seven categories. Among them, category 5 is chosen because it is designed for 10 Mbps Ethernet whose speed is up to 1 gigabit. It can connect even 1024 nodes and can run 100 meters distance. It also provides ease of trouble shooting all nodes of the network. After configuring topology and medium, a server-based LAN is implemented. Firstly, the OSs is installed in the server computer. Then Active Directory Service (AD) is installed. So, it becomes a domain server which can control client nodes in the workgroup. There will be a network administrator as the authorized user of the server computer. This administrator will control security, access and user accounts of each client-computer user. Being centralized managed network, only server one can share resources but the client cannot. Data can only be updated, or deleted by the administrator who uses the server computer and not by the client. Thus the administrator can check and control the database using the information reported by clerks who provide data concerned with sales figures. Therefore, this database can offer up-to-date information for the stock control system because it is based on the sales figures. The computerized stock control system is being linked with the website via internet. So, regularly updating the data of the stock control system means the website shows the information deal with the status of the books items that are in ware-house. This makes customers easy to find the information they want and to order books by filling order form that displayed in company’s website. Task 4 The company will inform the staff of the warehouse about the information of the ordered books when they received confirmed orders and cost by bank or credit account from customers via their website. They also acknowledge the customers about the confirmation. The voucher numbers of the ordered books and the DNS of the courier’s website are also given. Processing Order in Warehouse After receiving the ordered report, the staff members in the warehouse prepare to deliver the stock items. First of all, they check to ensure whether the quantity of the stock level is complete or not. Then they prepare to send them to the local delivery company. They firstly put and pack the books by means of ordered quantity and titles in the packages or containers. Then they fix an RFID tag which contains an electronic serial number on each container. The information of the sent items is marked by means of an RFID reader which can detect the electronic signals of serial numbers of the books. Then the information is transferred into the server computer to update the data in database. Transferring stock to local courier company Then they transfer containers of books to the local courier firm by taking suitable vehicles which are fitted GPS (Global Position Service) system to point the routes and time taken of them and to acknowledge the company what time where they are. When the containers of books arrive to the delivery team, they are checked with RFID readers again to mark what time the delivery items are received. It makes ensure not only the stocks are prevented by theft of staff but also they are safely arrived and whether they are the correct ones or not. Delivering stocks by Courier Company The delivery team starts the delivered items entry into their website after checking them. Along the paths of wherever they deliver the stock until they reach to the destination, they regularly update information on their website. So, customers can check the delivery information via the website of the courier company if they want to track about their ordered books’ information. The delivery company delivers the ordered stock items according to the customers’ addresses and postal codes. If the addresses and postal codes indicate a customer is in local, the company uses cars to transport them. Otherwise, they firstly send by using shipping delivery to the foreign countries where the branches of their company are situated and they send to their destination addresses and postal codes at last. Updating data Each branch of the courier firm also reports to their main office and the office also return the information to the â€Å"Amazing Books† company until the ordered book items are received by the customers. The online book store company also updated the information in their company’s database in main server. Being linked with the server of the courier company, the information of the books in their website is also updated. So, the customers can see where the items they have ordered and when they will receive them by entering the voucher numbers of them on the website of the courier company. After the ordered books are transferred from the delivery company to the customers, the firm also reports to their main office again. The main office of the company also replies to the online book store company. And then the book store renews the data in database of the server in order to check the balance stock levels by means of automatically flagging up system. Task 5 â€Å"Amazing Books† online book company keeps in a large amount of book items in the company’s warehouse. The stock items in the warehouse are kept by staff members of its. To secure the warehouse and the books in it, a security management system is needed. This system is also required to prevent unauthorized access data of the company. The company should also think about the theft or access data without permission done by staff members of the company themselves. (a) Methods to prevent theft and monitor the staff To implement the security management system of the warehouse, both hardware and software are needed. At first, the local area network (LAN) will be created using Star topology to control the centralized management of the company’s LAN network. Furthermore, the network administrator should also manage the specific working hours, authorized access, and login passwords, etc of an individual staff. So, unauthorized access that aims getting company’s important data in database of the server dishonestly can be overcome. It can also prevent the fraud of staff. Moreover, there should be some plans to detect and prevent the theft of stock items in warehouse. The most appropriate thing to monitor inside the warehouse is CCTV cameras. They will let the administrator or manager watch inside the warehouse all the time. He or she can immediately know if theft is occurred. Besides, there should be some limitations at the entrance and exit of the warehouse. Using retina scanner at the entrance is a proper method. The scanner will sense the retina of each staff to separate if the person has the permission to enter into the warehouse or not. It will make the record of each and it will alarm if something doubtful is happened. An EAS (Electronic Article Surveillance) should be fixed at the exit of the warehouse and everybody must be through when they leave the warehouse. It will detect each person using radio frequency technology and alarm when the staff takes the book items out without registering for despatched processes. (b) Adjusting the stock levels when theft occurs Before implementing the security management system of the warehouse, the stock levels of the books should be checked to ensure that the quantity of the stock before they are stored in it. When the books which are bought from different sources arrive to the warehouse, they are checked with RFID readers. Then the information of the books is transferred into the server computer as unique serial numbers of each. This event makes update the data in database. The server then stores the information of the books which includes quantity, books’ titles, and ISBN, etc. When the books are delivered, they are packed in containers which have an RFID tag and are rechecked with RFID readers again. Then checked data and data in database of the server are compared to confirm. If they are not same, the administrator can know the books are thieved by staff and he or she should review the security records. Automatic flagging up system also alerts when the quantity of books are less to acknowledge the administrator. So the administrator can check the balance level of the stocks and reorder new books from sources if necessary. Task 6 The report is produced in order to describe the recommendations of how to set up the computerised stock control system of the â€Å"Amazing Books† online books company. The summarising reviews for each procedure are as follows: Reviewing Task 1 The company investigates three online books websites via internet. They examine the features of the websites in details, i. e, the presentations of the books, selling and order information, delivery information, and discount information, etc. Then they will implement their own by using the facts which are based on the recommendations. Reviewing Task 2 The company explores four computerised stock control system websites. Then they set up their own computerised inventory control system in the large warehouse of the company. First of all, they will record the stock information by using RFID readers when the stocks arrive to the warehouse. Then they will transfer that information to the database of the server of the warehouse in order to update the data. The information in website will also keep updating because it is linked with the server of the company. When customers want to order books via website, they have to fill the order forms which contain the information deal with their addresses, postal codes, and bank or credit card account number. Then they will transfer the stocks to local courier company by appropriate vehicles. After that, they will update the information of books delivered in database of the server again. In the warehouse of the company, there will be an automatically flagging up system. They will fix this system to auto check the balance level and quantity of the stock. It will alert the company when the new stocks should be reordered. Reviewing Task 3 As the third step to implement the company’s stock control system, they will create a local area network (LAN) in the warehouse using suitable media and topology. The LAN will be set up as a server based one in order to centralized manage the whole network. The website of the company will be linked with the server so the information in website will always keep updating. Reviewing Task 4 After receiving the containers that contain books, the courier company will check stocks’ RFID tags with RFID readers and make records the books information. This information will be transferred into their company’s server computer to update data in database. As it is also linked with the website of their company, the delivery information will also update. The delivery company will always update the delivery information whenever the stocks arrive to their branches which are in foreign country. They will keep updating until they reach to their destination addresses. Customers can view what time at where their ordered books are via the website of the courier company. Reviewing Task 5 There will also be a plan to prevent thefts done by staff while the company is setting up their online book selling system and computerised stock control system. To prevent those events, the administrator will monitor the staff by using CCTV cameras. He or she will also use retina scanner at the entrance and EAS (Electronic Article Surveillance) system at the exit of the warehouse. To prevent unauthorized access, the administrator will manage the specific working hours, authorized access, and login passwords, etc of an each staff member. The stock levels are record by RFID readers when they reached to the warehouse. That information will be transferred into server of the warehouse. When the books are delivered to the deliver firm, they are rechecked with RFID readers again and transferred into server in order to update the data of stock levels. There will be an automatic flagging up system to alarm to acknowledge the administrator. So the administrator can check the balance level of the stocks and reorder new books from sources. Reference Websites http://www.bookshopofindia.com http://www.boomerangbooks.com http://www.cherrythirsar.org http://www.isisasset.com http://www.trakersystems.com http://www.controlelectronic.com http://www.rfid-library.com http://www.dhl.com Books Title Guide to Networking Essentials ISBN 14188-3718-0 Author Name Greg Tomsho, Ed Tittel, David Johnson

Wednesday, November 13, 2019

Miguel De Cervantes :: essays research papers

Miguel de Cervantes Miguel de Cervantes Saavedra, born September 29, 1547, was a Spanish novelist, dramatist, and poet. Cervantes was the author of the novel Don Quixote, a masterpiece of world literature that was a great influence to other renaissance writers. Cervantes was born to a poor family in a town called Alcala de Henares. His father was a surgeon who made little money to support the family . Without the means for much formal education, Cervantes became a soldier. On his return to Spain he worked at a series of government jobs that involved extensive travel in Andalucia. (Funk & Wagnalls Encyclopedia) . His career as a public servant was marked by as much misfortune as was his military career. Not till his later years did Cervantes find a patron. It was then that he had the time to devote to his writing.   Ã‚  Ã‚  Ã‚  Ã‚  Cervantes was a literary experimenter. In 1568, when Cervantes was a student, a number of his poems appeared in a volume published in Madrid to commemorate the death of the Spanish queen Elizabeth of Valois. In 1569 he went to Rome, where in the following year he entered the service of Cardinal Giulio Acquaviva. Soon afterward Cervantes joined a Spanish regiment in Naples. He fought in 1571 against the Turks in the naval battle in Lepanto, in which he lost the use of his left hand. While returning to Spain in 1575, Cervantes was captured by Barbary pirates. He was taken to Algeria as a slave and held there for ransom. (Funk & Wagnalls Encyclopedia). He did however make several unsuccessful escape attempts, but he was finally ransomed in 1580 by his family and friends. Returning to Spain at the age of 33, Cervantes, despite his wartime service and Algerian adventure, was unable to obtain employment with a noble family. This was usually the gift presented to military veterans for their distinguished courage. Deciding to become a writer, he turned out poems and plays at a prodigious rate between 1582 and 1585 (Funk & Wagnalls Encyclopedia). Few of these are still existent. His pastoral novel La Galatea (1585) gained him a reputation, but the proceeds from its sale were insufficient to support him. Cervantes then took government jobs, first furnishing goods to the fleet of the Armada and later collecting taxes. The government imprisoned him several times because he failed to give a satisfactory explanation of his tax-collecting activities. While in prison Cervantes conceived the idea for a story about a madman who imagines himself a knight-errant performing the splendid feats described in medieval tales of chivalry.