Monday, September 30, 2019

Respect Toward Your Superiors Essay

â€Å"He who scorns instruction will pay for it, but he who respects a command is rewarded.† Proverbs 13:12-14 NIV. There are only forty five instances of the word respect in the NIV bible. I try to live my life as though I were being watched by God Himself, because I believe that I am. I try, and hopefully achieve, to show respect to all people, NCOs and Officers, I even call civilians â€Å"sir† and â€Å"ma’am.† As a Christian I know that I am an example for God, and the only way some people will ever see God is through me; my actions and words. I know the power that God has in my life and how He would like for me to act by constantly talking to me. Some people call the voice of God their â€Å"conscience,† a feeling or a still, small voice that they â€Å"should have listened to.† My wife is a very spiritual person and hears the voice of God clearly, like a person’s voice and not a still, small one. She often acts as my guide in matters that I am facing, and if I don’t listen to her advice, it often ends badly. I say that to say that I once had a problem with respect and saw my superiors as only the people that they were and not the rank or position that they held. She warned me to start to treat my superiors with the respect that they get as a certain rank and not normal people; she would not have said if God had not had talked to her because she is a civilian and knows very little about the ways of the military. Respect by definition is the â€Å"willingness to show consideration or appreciation.† In terms of military respect, as in the LDRSHIP acronym, respect is to â€Å"Treat people as they should be treated.† And in the soldiers code, we swear an oath to â€Å"treat others with dignity and respect while expecting others to do the same.† With respect being defined so many ways, how is one to tell which to choose from? A seemingly obvious answer is the â€Å"Army’s way.† But to those who serve a higher calling it would be God’s way, or even the non-believing military rationalists might word respect different. Though the grasp on the true definition for respect is put so many ways, it is a true attitude a person shows another in respect, regard, or preference to their grade, position, or stature. Though a person leads his/her life showing respect toward others, they may have a hard time getting the respect back from those that he/she has shown, and continues to show, the respect to. Respect should be a two-way street,  in my opinion, to achieve maximum affect for all parties. â€Å"Show those with the same respect that they show you† is a common â€Å"new† military idea, to curse at if you were cursed at, to push if you were pushed. I feel that a person should get what they give; such as, if a person is constantly degrading people and belittling them, then they should not be surprised if they get the same treatment in return. On the same scale, if as a superior, you get upset with a soldier and start to disrespect them out of anger, then you should not expect to get respect in return. But my belief in Christ out rules the ways of normal behavior and thinking, I try to remain respectful even if I am being respected. Many people see it as a weakness, something to be ashamed about as a leader. I feel that it shows self control, a collectiveness that most people will neither possess nor will ever understand. A â€Å"level-headedness, cool under fire† sort of attitude. In this given situation, however, even if a certain person, i.e., NCO, a SSG to be exact, feels that they were disrespected because they were contacted by a certain Sgt’s spouse, then that SSG should have brought the issue up with that particular person in which contacted him or her. There is such a thing as free speech by the civilian sectors, not necessary in the military itself, but as a civilian they are entitled to the right of free speech. And if an alert roster is given out and the spouse has access to it, anyone’s individual phone number could be looked up and called. If this basic freedom were denied then we wouldn’t enjoy and live in the democracy that we do today. Respect is something that everyone wants, not many have, and few want to give. Most people would appreciate â€Å"just a little bit,† and most should give just that. Unfortunately, a lot of the time, this does not happen. Perhaps this is because the concept of respect is not understood. What exactly is respect? To respect anything is to think it through positively and hold it in some high regard, but estimation gets us into trouble because while we sometimes win, we also sometimes lose. To respect something, on the other hand, is to accept it. The dictionary defines it yet another way as an act of giving particular attention or high or special regard. This does not explain what it is; it only outlines what it may consist of in regards to  personal feelings. The word respect is very a very strong word in itself; it is a word that draws your attention from the start. But there is more to it than just being a word. There is the idea behind it, which is the beginning of many ideas and characteristics of a particular individual, group, or culture and the statement, theories, and sought understandings that forms a political, social, and economic program. By another definition, respect is ‘to consider deserving of high or special regard.’ Society defines respect as the way one person or group of people treats another person or group of people and also the way they look upon those persons. We in the Army define respect as the common courtesy we give to our peers, subordinates and superiors and the way in which we carry out our orders and our duties on a daily basis within the United States Army. Respect is a common bond in today’s Army because all of us are, or should be, well trained soldiers and it is a building block that our training is based upon. Respect is basically how we treat each other, the actions shown toward other people. Respect is the way in which you help others out whenever they need a hand. Respect is also the way you take the time to discipline and train your subordinates. And respect is the way you work harder than anyone and longer hours to do an excellent job for your career and your unit. These are all ways of showing respect- toward each other, our subordinates, our peers, our superiors, our unit and our country. This is the respect that we have been trained to give and which we show on a daily basis. For us serving in the military it also represents the sacrifices that we are giving for our fellow soldiers. The definition itself is all well and good, but what exactly is respect? What does it mean to me, a soldier in today’s Army? Respect is something everyone is capable of achieving, but at the same time it is not just a right or privilege. It has to be earned. We as soldiers have been well trained and disciplined at respecting the ranks of superiors. But is respecting their rank or position enough? All soldiers within the Army must earn the respect of their fellow soldiers. To earn the respect of your fellow soldiers you must do many things. For your subordinates, you must be fair and just and take care of all problems that may arise. For your peers, you must be  technically and tactically proficient and set the standard for both of them to follow. And for your superiors, you must accomplish the mission quickly, efficiently and sometimes even in the absence of orders. These are just small examples of the many, many things that can help you earn the respect of your fellow soldiers. The key to remember is that you must do something other than just sit around. You must earn respect and work hard to gain it. Your rank or position deserves the military honors that are presented with it, but no more. The rest is up to us as soldiers and individuals. Through our own actions we can earn the respect of fellow soldiers, and through the actions of our fellow soldiers, they will earn our respect and all that goes with it. In the Army we adhere to a standard called military bearing. Military bearing is a code of conduct in the U.S. Army, and when you come right down to it dignity is maintained in military relationships, reflective of an individual’s pride in his military service and of the organization he represents. Military personnel should be courteous and controlled to show dignity as well as respect. Part of possessing dignity is to also have the ability to respect his juniors and seniors, and acknowledge the dignity of others. This sense of pride in military service is shown during work as well as when on liberty, carrying himself at all times with reverence and a proper sense of self-worth. By admiring his seniors, the individual can be guided in presenting good conduct, and can likewise demonstrate his pride and decorum to those who in turn look to him for guidance in presenting military bearing. Dignity and respect can be taught, and examples can be shown, but the willingness to present military bearing also comes from within, especially when showing courtesy and respect toward others. To respect others you first have to respect yourself, if you have no self esteem then you will have a hard time respecting yourself. In an Issue of Self-Respect Being a Christian has changed my perspective on the way people perceive themselves. Since becoming a Christian I have had a hard time understanding why or how a girl or guy could belittle herself by so freely giving her body to someone else. Growing up in Indiana, I witnessed this in many different ways. Whether it is a prostitute standing on the corner in  the closest big city, or a good friend that sleeps around, the lack of respect these people have for themselves is very visible, and very sad. I am a very social person, and I would someday like to work as a minister of some sort, which is why I am taking the time now to try to understand the reasoning for their foolish and dangerous choices. Why do teenage boys and girls have such little respect for themselves? I am sure that each of these kids have her own theories and reasons for his or her actions. I believe the most obvious causes are; they were never taught that it was wrong, most guys treat girls with disrespect, and the fact that somebody wants them make them feel loved. Sadly enough, a girl having no respect for herself is not a new thing. Girls just aren’t taught that it is wrong to abuse their bodies or give away something that is supposed to be so sacred. It seems that some parents these days do not know how to handle their kids and are often too lenient with them. It also seems that role models in today’s society advertise sex in subtle, yet noticeable ways. I think the media plays a huge role in the misleading of teenage minds. Entertainment, such as singers and actors are not even chosen based on talent anymore, they are hired based on the right look; it is all about sex appeal. Another obvious cause is, there are so many guys in today’s society who were not raised to respect women. They think of women as sex objects, and unimportant people they can control. It is normal to be somewhat dependant on men, but women today seem to become totally reliant on men. In most cases that can be very unhealthy or dangerous. Men know these women â€Å"need† them, so they think they can get away with playing with their heads and their hearts. Women are under the false impression that if a man wants to sleep with her he must love her. When in reality, most men are really out to satisfy themselves. They will tell a girl whatever she wants to hear, until she falls into the â€Å"trap† and gives herself to him. Then he dumps her. You would think the girl would learn after being dumped, but she doesn’t, she just looks to be loved by someone else. In most cases it becomes a habit and can be tough to break. Teenage girls in the world today have very little respect for themselves because they really don’t know any better. They are just following the pattern that women have been following for generations. In society’s eyes as well as their own they are not wrong. My desire for them is that they will be taught that they are very special and they deserve so much more than they think. I  pray everyday that they will realize God loves them more than anyone ever could. They have so much to offer, if they just believe in and respect themselves. There are the beginnings of respect, starting in the classrooms of America. How does respect for your superiors begin? Many people have ideas on how to reclaim the virtue and morality that made America a great nation. However, the only sure way that everyone can achieve this goal is if parents start teaching and demonstrating respect to their kids. The dictionary defines respect as- â€Å"to have regard for the quality of a person† or â€Å"to refrain from obtruding upon or interfering with†. The problem with society today is that there is a complete lack of respect. The lack of respect is evident everywhere, people have no respect for the law, they have no respect for their peers, and they definitely do not have any respect for themselves. What parents need to do is from an early age teach their kids to respect everyone, from the person sitting next to them in school to their coworkers in the future. People do not understand how much better the nation would be if the respect was there. Even if some parents do not teach their kids this valuable trait, if enough people are taught to respect others it will catch on. In most cases, if someone shows respect to someone else, that person is more likely to respect them back; causing a chain reaction. Right now, not enough parents are teaching their kids respect and this causes violence, crimes, and can even lead to drug use. It is easy to see how these problems can be easily solved or would be nonexistent if their was respect. Violence would not be a problem, because no one would fight if they had respect for the other person. The next problem is crime. Nobody is going to steal or vandalize someone’s property if they respect them. One other problem is drug use, this would not be a problem is people respected themselves enough to not harm their bodies with drugs. They also would not sell drugs because selling something to someone that will harm them is not showing respect to that person. It is extremely easy to sit back and say that parents should teach respect, but it is not as easy to actually teach it. For there is really no way to  teach a child to respect others. Parents can tell their children to respect others all they want, but the only way a child will actually learn respect is from observing their parents as well as others showing respect. This is why teaching respect is so difficult, even if a child sees his parents respecting others it may not be enough, the child must see other people respecting others. They must also feel that other people respect them, because if they do not get respect they will not respect anyone. This is why it is so important for everyone to show respect to everyone else, not only will kids see it, but the more respect that is shown to others the more respect that is received. For these reasons respect is the chief ingredient in reestablishing the morality and virtue that made America a great nation.

Sunday, September 29, 2019

Inter-vendor Storage Management Application Tools Essay

Inter-vendor storage application management tools are huge enterprise software applications that are used for robust, reliable, available and effective data management. The applications are both hardware and software dependent. The choice of their implementation depends on the organizational needs and objectives. Various vendors develop and support these tools both for support of business and mission critical applications. Some of the leading Inter-vendor applications tools that have dominated the industry as well as organizational automations in the last two years include VERITAS, Oracle and NetApp (ESM, 2009). VERITAS Its application tools provides for automated storage management software for enterprise business applications which have increased dependence on data from corporate storage infrastructure. VERITAS application tools are vital for boosting administrator productivity and reduce errors in automated storage administration. Among the tools it provides is the Storage Resource Management (SRM) software tools that help to automate the erroneous, tedious and routine tasks in storage administration. The tools are able to predict when the problem is likely to happen and as a result the IT managers are able to head off these problems. The automated storage provisions help the administrators have a continuous, uninterrupted access to the enterprise storage resources. The storage administration by the automated SRM software can accomplish several tasks in use, management and applications of the storage allocations. The automation tools are able to gather data around the storage infrastructure and also give feedback on the successful storage policies and also provide input and reports on the storage environment. The accurate and timely data help managers make informed and intelligent decisions on the future use of the storage. Further administrators are able to report and monitor on resource utilization and performance. When applications crash, the pagers beep and systems panic, it is the administrator that is on the receiving end of a pager to get the problem notification. Such situations prove to be very critical especially for business users due to degraded performance, equipment failure, resource shortages, and corruption of data or storage problem risks. This interruption of application access may in turn lead to incalculable financial losses to the business or organization. Therefore the automated software provisioning has a framework that manages the growing inventory in the components of enterprise storage. When the SRM software tools are deployed into the automated storage provisioning framework, the administrator has an easier access to the event based interventions and rule based policies which adequately resolve and intercept potential problems before they reach their critical levels (Hussain, 2008). The storage management application tool for a web based directory assistance runs on a web server as a data entry component with a more sophisticated management application that runs on a separate application server. When data is entered for the directory assistance, it is updated on the web server and staged on the repository application server and it is then automatically transferred to a relational database in another server by the directory management application. For fault tolerance as provided by the database server, database tables are duplicated using the snapshots from the primary database. The services however are vulnerable to storage failures especially when space allocation to the web server, database and repository is threatened to be exhausted and as a result bring down the system. Organizations of all sizes and in all industries are dependent on enterprise technological infrastructure which means that there is immense need for automated storage management process to avert any failures in the enterprise storage infrastructure. Therefore the SRM software tools and the automated storage provisioning should be implemented to solve the storage management problems. The rule based storage automations streamlines the administrator’s routine which improves productivity, reduces potential errors and system’s availability which impacts business activities and application availability. Oracle and NetApp The Automatic Storage Management (ASM) application tool provides a way to manage storage with an underlying database on a volume manager for the files on the database and an integrated file system. Its gives an alternative to the volume management solutions and file systems for the storage management tasks in the database (Manning & Bridge, 2009). On the other hand NetApp filers simplify management and deployment of the enterprise data. The ASM and NetApp storage lower ownership costs and save on costs through the configuration of combined technology. There are combined benefits for using the NetApp for database layered applications and Oracle database which includes practices for deployment of ASM with the storage solutions networked by NetApp. Oracle ASM on NetApp iSAN and SAN storage like Oracle on NAS storage by NetApp has alternative capability for volume management for customers on an Oracle server that can alter, drop and create SQL statements which simplifies the storage provisioning on the database. The NetApp and ASM storage application tools has features that complement one another in performance to avoid errors by balancing of workload and help utilize the disk drive resources available. They also provide for support of online removal and addition of storage capacity that help maximize data availability and at the same time making configuration changes in the storage. The applications tools provide data security and availability since enterprises require high levels of data availability and protection whether there are component failures or faults storage subsystems. These tools include NetApp mirroring solutions that offer protection for disaster recovery requirements and business continuance while ASM provides protection against storage failures. In shared storage, Oracle’s Real Application Clusters (RAC) provides scalability and availability for the Oracle database which requires all servers to have direct read and full access to the database files. The ASM implementation provides a simplified cluster file system with optimized functionality of the volume manager in the shared storage. The NetApp networked storage gives shared access as required by RAC while in SAN environments, ASM provides volume management by Oracle RAC and a capable clustered file system. Both application tools have a rich assortment of storage data management that can be used separately or when combined depending on the customer enterprise requirements or the data infrastructure (Animi et al, 2009). The Automatic Storage Management application tool simplifies the management and configuration of storage management for the Oracle data files in its database. It also complements iSCSI SAN products for storage and NetApp Fibre Channel and while combined, they give full value to both technologies. With several combinations for data storage management and protection exists in the market, the Oracle and NetApp partnership offer powerful combinations that offer best practices to meet business performance and high availability requirements. Storage Management Networking Industry Association (SNIA) SNIA has created Storage Management Initiative Specification (SMI-S) application tool in order to standardize and develop storage management technologies for networking and storage. The SMI-S is for a standardized interface like SAN based storage management which are a challenge for interrogators and end-users to manage especially for multivendor SANs. The applications developed in most cases are unable to work together or are uncoordinated to perform tasks and deliver functionality, security and reliability for increased business efficiency. SMI-S therefore specifies protocols to manage communications with incorporated mechanisms for standard based management. It unifies the storage networks and also the management tools. The set of interfaces will allow the control of heterogeneous storage by storage management software packages. This way storage administrator will create and delete volumes and zones and also monitor array controllers, switches and host bus adapters. The enterprises too can manage with a single management framework their storage capacity independent of manufacturers. The application features have a common and extensive management transport, which has unified and complete which provides control of Zones and LUNs in a SAN context. It also has an automated discovery system with a newer approach in application of the CIM/WBEM technology. This specification helps to secure a reliable interface that can allow for the storage management interface classify, identify, control and monitor logical and physical resources in a SAN. The Technical Specification defines the management of a heterogeneous SAN and describes information from a SMI-S compliant CIM server available to a WBEM client. This information is object oriented, message based, XML based interface that is designed to support requirements of the managing devices through and in SANs. Using the CIM-XML on HTTP standard which is an independent management protocol, vendors increase the functions and features of their products without having to redesign the management storage therefore reducing cost and extending functionality. The SMI-S functional capabilities include the version requirements as provided and stated in the interface. Among them is that it will be able to receive the asynchronous notifications incase the SAN configuration changes. It will also be able to identify the health of vital resources in a SAN and also receive the asynchronous notification incase the SAN resource’s health has changed. It will also identify interconnects available performance in a SAN and receive the asynchronous notification incase a SAN’s interconnect performance changes. It will also identify zones that SAN enforces and help enable or disable, delete or create zones in a SAN. It will also identify the access rights and connectivity to SAN Storage Volumes and also enable or disable, delete or create access rights and connectivity to SAN Storage Volumes. These standards and specifications can only be used by a WBEM compliant and authenticated client. The language chosen for managing information and other related operations is the XML language which will help traverse the organizational firewalls and installed at low costs (Cover, 2010). In midrange computing environments and enterprise class, the SANs are highly emerging due to various functions and applications such as sharing of huge storage resources between multiple systems and having a LAN free backup. Other applications include disaster tolerant and remote online mirroring of critical data and clustering fault tolerant applications and systems with one data copy. While emergence of SANs accelerate, the informational industry requires a management interface for different classes of software and hardware products for multiple vendors to allow interoperation and reliability in order to monitor and control resources. For this reason SMI-S was created to define this interface and provide a standard for heterogeneous, functionally secure and reliable control and monitoring of resources in the complex distributed Inter-vendor SAN topologies. The SMI-S standard can simplify the huge storage management and reduced costs in storage administration but has not solved all storage problems. Since storage is an integral part in IT infrastructure to be managed with a combination of servers, applications and networks, management solutions offered by SMI-S work for servers, storages and networks. In the storage infrastructure, it provides the end-users with a consistency for device discovery, configuration and status information. SMI-S defines the behavior and structure of devices and their management and configuration in the storage infrastructure and provides management of multiple storage devices from multivendor. However, it does not solve the problem of incompatibility of hardware devices from the different vendors while its domain in storage management does not cover remote replication and backup. Conclusion There is countless demand by customers for open software from the computer industry vendors which is the reason multiple vendors such as Oracle and NetApp have had to work more closely to develop common standards, protocols and languages for storage and network management. The multipurpose standards could help storage administrators take control of the distributed applications with a resulting inter-vendor, manageable and open information systems. Using standard based storage management application tools can help increase value of IT investments. Before the multivendor standards were developed by SNIA, the individual users would need to manage the storage devices with vendor specific tools while disparate information was integrated manually. Today’s management standards and specifications are increasingly interoperable while still maintaining competitive advantage among vendors through differentiation.

Saturday, September 28, 2019

Mid term Questions Assignment Example | Topics and Well Written Essays - 1000 words

Mid term Questions - Assignment Example On the other hand, computer worms do not strike a specific victim (computer). Should this happen, a state(s) or man’s civilization may retrogress by 200 years, into the pre-electricity era. Question 2 It is most likely that P2P software will be replaced by the new subscription sites such as Spotify. This is because, the fact that there are more than 22 million peers who are connected to P2P file system is likely to attract a court verdict which is inimical to the use of P2P file sharing system. Court verdicts against high-profile file-sharing systems may in turn birth the emergence of technically more superior and sophisticated platforms. This is especially the case when expedited attempts to disable P2P file systems infrastructure are made. This postulation is verified by the manner in which the shutting down of Napster changed file sharing, following a court verdict. Napster users did not deal file-sharing a coup de grace, but only gave newer and more sophisticated platforms such as KaZaa and Gnutella a larger purview. KaZaa and Gnutella also experienced the same fate in Grokster v. Supreme Court, 2005. Question 3 Lakhani postulates that the reason why Facebook is bigger than its competitors in terms of connections is partly explained by Metcalf’s Law. Originally formulated by Robert Metcalf (b. April 7, 1946), Metcalf’s Law states that a telecommunication network’s value is proportional to the square of the number of the number of users who have connected themselves into that system. To this effect, just as the value of every fax machine increases with the total sum of fax machines in the network, the total number of Facebook users with and to whom every member may posts and receives documents increases. Because of this, the greater the number of users of a social online network (Facebook) is, the more valuable Facebook services become (Lakhani, 164). Question 4 Interestingly enough, in 2006, Second Life was the future and vice ve rsa, but this is contrary to the present situation. Some of the reasons why Second Life is not the future include: technical lacunae; moral gaps; legal drawbacks; and the failure to address security concerns. According to Kane, Robinson-Combre and Berge, the technical lacunae came in the form of Second Life’s failure to budget for server resources. This is a serious failure since Second Life’s virtual real estate as an online world that is owned and run by Linden lab is used by residents who need long-term in-world content which they own, have created or both. The crux of the matter herein is that both Second Life’s residents and Linden Lab’s users make money from the former, through trading, while using virtual real estate. Thus, Second Life’s failure to budget for server resources would lead to serious legal implications which readily invited financial responsibility. For instance, the amount of land a resident owned in a region specified the num ber of objects which may be placed in the region and the area in which they may be placed. Nevertheless, alternative region servers such as network bandwidth and CPU time are seldom budgeted in like manner and thereby bringing about problematic situations (Kane, Robinson-Com

Friday, September 27, 2019

The positive and negative effects of globalisation Essay

The positive and negative effects of globalisation - Essay Example It involves a rescaling of social relations, from the economic sphere, beyond the national to the transnational, transcontinental and transworld.† (Held and McGrew, 2007 p 24). According to Held and McGrew, globalization allows local people to have international experiences right from where they are. The process of globalization is not only concerned with the mixing of people from different geographical areas, it also involves the integration of cultures, ideas as well as values (Goldberg and Pavcnik, 2007). Globalization has a long history. However, its effects started becoming apparent during the fifteenth century. Globalization is what led to colonialism in the Americas, Africa and Asia. The nations that had the resources at the time sought to affirm their authority and create economic opportunities by getting colonies. Modern Globalization started after the Second World War. The cold war can be said to be an accelerating factor for globalization as world powers fought silent wars for world domination (Williamson, 1996). Modern globalization is characterized by increased international trade, enhanced communication and better transport systems. There are many factors that have contributed to modern globalization as we know it. Technological advancement in various fields is the greatest contributor to enhanced globalization. Policy changes have also contributed to faster, deeper and cheaper globalization (Goldberg and Pavcnik, 2007). The concept of globalization has elicited many debates about its positive and negative effects. Globalization cannot be said to be a good thing or a bad thing. It is true that there are some shortcomings that are associated with globalization, but there are also many good things that can come out of it. As the world becomes one big global village, there are some things that are worth celebrating

Thursday, September 26, 2019

Finance for manager Essay Example | Topics and Well Written Essays - 2500 words

Finance for manager - Essay Example In the initial three (3) year period the market will be restricted to only a few suppliers but this will change thereafter as the market will be opened to other suppliers. This means that care should be taken to ensure that the company does not invest in too large a capacity which may not be necessary later. There are two options available to Steelbeam. The company can either choose option 1 – which involves investing in capital with a limited capacity to produce a maximum of 1,000 units (small capacity) or option 2 with the capacity to produce a maximum of 4,000 units (large capacity). These alternatives have different variable cost per unit with the large capacity project having the lowest variable cost per unit and the small capacity project the highest variable cost. In assessing the two options the company has to pay attention to the contribution that both projects make to fixed cost as well as the break even point in units. Additionally, every capital budgeting decision requires the use of capital budgeting techniques in order to make a determination of which option is more advantageous to the company. The techniques available to your company include: ENPV is calculated using the figures obtained from the pessimistic, most likely and optimistic market forecast while applying the formula used in project evaluation and review technique (PERT). This technique assumes that the estimates of sales and demand activity follow a probability distribution (See Heizer and Render 2006). The expected sales and demand are found through the application of weights to the three estimates in each case – of demand and sales, as follows: The information arrived at from the computations suggests that the expected annual demand is 6,333 units and the expected selling price per unit - Â £12,167. These figures can be used to determine which option is better for Steelbeam PLC. Each option will be assessed to determine its

Wednesday, September 25, 2019

Refliction Paper Assignment Example | Topics and Well Written Essays - 250 words

Refliction Paper - Assignment Example In the nineteenth and the twentieth century, more children were brought in as child labourers. The only time that child labour reduced was when the labour standards grew, and labour standards improved. This increased the political power of working people and social reformers to demand legislation regulating child labour (Hindman 44). These political reformers changed the lives of many children. This was least expected from them because they were the company owners who received cheap labour from these children. The history of child labour in the United States was a long reign. In history, it is said that children worked for their parents, or they were employed by an outside employer. However, child labour cases have changed. In this era child, employment is associated with a lot of risks. In addition, technology has improvised the society thus reducing much labour which fell under children responsibility. Nevertheless some of these equipment’s that are brought in companies are equally dangerous to youth and people who are not improvised to operate the machines. The most important thing that have changed my mind is that I thought the only people who were enslaved were black people but surprisingly I have come to learn that even the white people were enslaved. The most significant determinant that I think is important is that even though the children were enslaved later on they were set free in the year 1938 (Hindman 44). It is relaxing that the children would no longer suffer the torture they went

Tuesday, September 24, 2019

Strategy management Essay Example | Topics and Well Written Essays - 3000 words - 1

Strategy management - Essay Example These strategies are usually based on theoretical frameworks that guide a firm towards success or growth. There would be three different strategic frameworks utilized in this study for critical analysis such as Porter’s diamond model, Porter’s generic strategies and Yip’s drivers of internationalization. Michael Porter has been able to elaborate on three types of general strategies that are basically used by every other organization. There are two dimensions that define these three generic strategies like strategic strength and strategic scope. Porter developed the diamond model in order to analyze reasons behind some firms becoming competitive in specific locations. On the other hand, Yip’s drivers of internationalization states that there are drivers such as cost drivers, market drivers, competitive drivers and government drivers which drives overall international strategy. In this study all the three strategic models will be applied on Samsung and Micro soft Nokia. Samsung is a South Korean company and it consists of affiliated subsidiaries and business. The company had entered into electronics industry in 1960s. Nokia is an information technology and multinational communications firm of Finland. This firm is regarded as the biggest vendor in mobile phone market and has recently entered into strategic alliance with Microsoft so as to use for its smartphones an exclusive Windows platform. As per figure1, market drivers basically mean market forces. This driver encompasses similar needs of customers, transferable marketing strategy and global customers. Customers possessing same needs or wants are usually offered same product. On the other hand, global customers shall differ in their demands which have to be addressed properly. Cost drivers consist of economies of scale, country specific differences and favorable logistic conditions. Economies of scale can be well justifiable in terms of research and

Monday, September 23, 2019

Marketing strategies of Apple Inc Essay Example | Topics and Well Written Essays - 3000 words

Marketing strategies of Apple Inc - Essay Example When Apple was established in 1977, a three point marketing philosophy was assembled by founding members, which also became the underlying market strategy for the company (Forbes, 2012). The company still runs on these three marketing and strategic principles, where all planning and implementation processes are based on above strategies. These are;1. Empathy: Understanding exact needs of the consumers and identifying them in a faster and better manner compared to any other organization.2. Focus: Eliminating all issues and problems before utilizing internal and external opportunities.3. Impute: A book is always judged by its outer appearance or cover. Similarly, making a great service or product will not prove beneficial if the offerings are communicated ineffectively. This is where the marketing strategies come into action. The offerings are presented in a professional and creative manner imputing the desired attributes. Apple has been integrating its marketing strategies with the ab ove marketing principles and has successfully achieved sustainable competitive advantage. According to Chimhanzi and Morgan (2005), companies focusing on human resource and marketing alignment are able to attain success faster and in a more convenient manner compared to those, whose focus is directed only at profit making strategies. Hence, findings provide an important input that marketing executives should improve their relationship with the human resource departments through strategies such as, written communication and joint rewards.

Sunday, September 22, 2019

Principle of Informatiion Systeam theory and pratice Essay

Principle of Informatiion Systeam theory and pratice - Essay Example (Mcafee and Berkley 1) The IT infrastructure at SYSCO was initially decentralized for all of its operating companies around the world which created a lack of common systems, procedures and information type. The lack of unison among the different units of the company created an appalling situation and the need for a common platform became evident. At first, a central ERP system was rolled out among all the operating units to handle the basic operations of the company ranging from processing of orders to delivering goods etc. The ERP system started being used effectively but then the need for centralized information arose. Therefore a central data repository had to be introduced in the company. This brought about unison in the information that was earlier kept in different forms by every operating unit. Even after the integration of ERP system and central data warehouse, the IT department felt the need for smarter software that would enable the employees of SYSCO to make informed decisions and critically analyze the data without running complex queries all the time. The modern world of business relies heavily on information since companies develop their strategies according to the changing market trends and customers’ choices. The IT department of SYSCO, led by Twila Day, also gave the suggestion of incorporating BI software with the same vision. There were many considerations and decisions that had to be made before the final roll-out, some of them are discussed below: SYSCO showed interest in the implementation of BI as early as 1995 but the condition of its implementation was the presence of a data warehouse in the company. After successfully achieving the incorporation of data warehouse, they finally opted for the BI software. Another obstacle that was faced by the respective company was that they wanted the implementation to take place over the

Saturday, September 21, 2019

Information about the KU Writing and Math Centers Essay Example for Free

Information about the KU Writing and Math Centers Essay Thank you for your letter asking me about studying at Kaplan University. This is very nice place and students feel here very comfortable and confident as they have plenty of possibilities to learn as many new skills as they may want and have time for. To make life of its students a little simpler, the University has established two Centers, which offer a large variety of services. That is why I am writing to you to give all necessary information about the system of student assistance at Kaplan University. The University two Centers are always ready to provide the students with any relevant assistance. There is the Kaplan University Writing Center and the Kaplan University Math Center which are both very helpful during the study. For example, you are working on any writing task like research, survey or just essay you may find it useful to attend Writing Center. This Center purpose is to help students develop their writing skills and technique. The Center staff has developed particular guidance sections outlining basic steps of working on writing task. There are four sections for those who are looking for grammar help or advice on more advanced level of idea generation. The section with the APA writing style guidance is there to help students make their work have a decent scientific style and be free of plagiarism. All these guidance sections are in PDF file format and can be downloaded or printed as often as you need. Writing Center may also give a feedback to your written work. For that you will have to submit your paper by clicking a yellow notepad icon. Once your paper is reviewed, which usually takes about 2 days, you receive an e-mail message and may get the reviewed paper by downloading it from the submission page. In case you are toiling at some math problems and need somebody to give you essential hints or just want to train your knowledge University Math Center is there to help you. As well as Writing Center, Math Center provides with the wide range of information starting from elementary math operations to the complicated equations solving. You can get not only information on certain math problems but also train you solving skills and check your progress either in a particular area or on the whole module. There are specific mathematics modules dealing with particular math operations, so you can work on them one by one or choose any in which you prefer to improve you knowledge. It has to be pointed out that the Centers have the option of communication with a tutor. Thus, Writing Center has a live-chat option where you can meet your tutor and ask him/her any questions related to your written work. However, you won’t have to ask about spelling or grammar issues, while the purpose of such instruction session is to give you more essential help and make your writing skills more advanced and efficient so that you can use them in your further study. Such live sessions are available for 15 hours per week from Monday to Wednesday in the evenings (6 pm -11 pm ET). Math Center Tutor is available also in the evenings from 8 pm to 11 pm on the same days plus Thursday. Just same as writing instructors math tutor will not solve or check your problems or equations; he/she will try to make you comprehend modules concepts and acquire necessary solving skills. I must admit that both University Centers are extremely helpful for those who want to be a better student. The principle of their assistance service is not to do the work for you but to teach you essential techniques and fundamental skills, basing on which one can make progress in study and achieve successful results. Their aim is your clear understanding of the learning material and ability of self-sufficient work. Unfortunately, I have not been for a long time here, and I have not had a chance to use any of these centers yet. However, the time when I’ll have to write my research is approaching and I plan to visit Writing Center soon. What I hope to get there is the information of what are the effective ways of collecting information, thesis formulation, arguments development and other essential points to write an outstanding paper. I am sure center instructors will be of indispensable assistance to me as I am a freshman and I’d advice this service to all my mates. I hope you will find this information useful and in case you need more information, please feel free to contact me. Sincerely, Full Name (insert your full name here) Class and Section Number (insert your class and section number here)

Friday, September 20, 2019

Telomere Length and Telomerase Activity in Cancer

Telomere Length and Telomerase Activity in Cancer Conducted on the mean telomere length and the activity of telomerase in bone marrow samples to measure the survival and prognosis of B cell chronic lymphocytic leukemia and found that the patients with a mean telomere length under 6Kb correlated with high telomerase activity similarly the telomere length over 6Kb had a significant correlation with lower telomerase activity (Bechter and Eisterer et al, 1998). This study portrays that telomere length alone is not sufficient enough information to provide prognostic characteristic in cancer therapy but together with the activity of telomerase it is more useful in clinical medicine. Table 2: Mean telomere length and telomerase activity measured and detected in different types of cancer The telomere length for most cancers range from very low to higher than normal somatic cell telomere length. Telomerase activity was also detected in most cancers except in pediatric bone where certain types of bone cancers were did not show detectable telomerase activity (Remes and Norrback et al, 2000, Hiyama and Gollahon et al, 1996, Tasumoto and Hiyama et al, 2000, Sotillo-Pineiro and Sierrasesumaga et al, 2004, Sommerfeid and Meeker et al, 1996, Albanell and Engalhardt et al, 1997). However there are some problems with this technique that makes this topic debatable like for example each type of cancer is unique which make is harder to pick a biological marker that is universally reliable hence the telomerase activity for each type of cancer must be studied individually. Another issue is that this method used highly sensitive assays to obtain telomere length and telomerase activity which in return means that it is more susceptible to false positive results or false negative results. A false positive result can arise due to contaminated lymphocytes as a result of inflammation in the surrounding issues that have no malignant cancer spread may also show telomerase activity. To overcome this issue Kinoshita, et al suggested, in a study evaluating telomerase activity in bladder cancer, that telomerase assays should be performed after antibiotic treatment. False negative results on the other hand may arise from PCR taq polymerase inhibitors in the sample such as bile s alt, heparin and hemoglobin. A highly sensitive telomerase activity assay has been proposed by Yaku and Murashima, et al (2013) that includes the use of magnetic beads which enables the washing process of PCR products to remove any inhibiting contaminants from the samples and hereby limiting the detection of false negative results. What are the current methods of telomere detection? Table 3: Different technique used to measure telomere length and their advantages and disadvantages. There are many different assays that have been developed to measure the activity of telomerase though the most common method used is the telomeric repeat amplification protocol also known as the TRAP/PCR assay. Although this technique is more sensitive and rapid compared to the conventional assays TRAP assay is not suitable for diagnostic purposes in large clinical samples due to its high technicality, obtains time consuming stages and cannot provide reliable quantitative data however many modification of the TRAP assay has been constructed to achieve a better suitable and more efficient way to detect telomerase activity some of which include bioluminescent TRAP-ELIPA (Zu and He et al, 2002), real time quantitative TRAP or (RTQ-TRAP) (Hou and Xu et al, 2001) and the fluorescent TRAP assay (Table 3). On the other hand, several studies have demonstrated enzymatic amplification rather than PCR based amplification to determine telomerase activity such as the DNAzyme assay (Wang and Donov on et al, 2013) however although this assay showed higher sensitivity than the TRAP assay, the enzymes used in the assay are also prone to inhibitions by other biological molecules in the sample. A more indirect approach in detecting telomerase activity has also been carried out by measuring the components of telomerase such as the hTERT mRNA using RTQ-PCR. As the hTR component of telomerase is found in all types of cells whereas hTERT mRNA is only found in cells that express telomerase therefore due to the strong correlation between hTERT mRNA levels and telomerase activity it becomes the next ideal target for detecting telomerase activity and hence cancer. This method was evaluated in peritoneal disseminated cells of gastrointestinal cancers by Botchkina and Rivadeneira et al, (2008) and the study concluded that this method had 100% sensitivity and 100% negative predictive value hence have an important diagnostic value. Furthermore additional longitudinal studies on larger clinical samples are required to fully benefit from its clinical cancer diagnostic values nonetheless telomerase activity can be combined with present cytological diagnosis methods to make a more accurate diagnosis. Telomerase activity can also be used to detect poor prognosis and help identify those that have a more advantage of benefiting from adjuvant treatments and due to its biological marker properties it can also be useful in the development of anti-cancer therapies. Can telomere length be used to predict life expectancy? A study conducted on domestic dog breeds show that peripheral blood mononuclear cell telomere length is a strong predictor of average life span and the breeds with shorter telomere lengths were found to have an increase probability of deaths caused by cardiovascular diseases. The correlation of telomere length in domestic dogs shows similar telomere biology to humans including telomere length, attrition and absence of somatic cell telomerase activity in comparison to studies conducted in mice models (Fick and Fick et al, 2012). Mice have rodent telomeres which have a significantly different dynamics in contrast to human telomeres and are much longer with shorter life span, making it difficult to address whether or not telomere length can be used to predict life expectancy directly. However studies that have been conducted on mice also show that the rate of increasing short telomere length predicts longevity in mammals providing more evidence for the association between telomere lengt h and life expectancy (Vera and Jesus et al, 2012). As telomere shortening is inversely correlated with age which in return is very likely to correlate with age associated issues including lifespan. One of the largest family studies on telomere length in humans also reported a correlation between telomere length, aging and life span as well as a significant indication that telomere length is also influenced by genetics specifically from the paternal inheritance (Njajau and Cawthon et al, 2007). This study suggests the possibility that the genes that are controlling telomere length may also affect lifespan (Figure 5). Another more recent study conducted by Heidinger and Blount et al, (2011) on Zebra finches, measuring telomere lengths from nesting stage to various points of its natural lifespan producing the strongest available for the relationship between telomere length and life span. This study suggests that telomere length at early stages in life is a strong indicator of lifespan however as humans retain a higher life expectancy co mpared to zebra finches it’s harder to compare these findings to humans. Therefore similar studies should be carried out to evaluate the importance of early life telomere length and lifespan in humans. Figure 5 The mean telomere length in wild type( WT) mice and transgenic telomerase reverse transcriptase (TgTERT) mice both decreased with age whereas the amount of short telomeres measured increased with age (5A). This shows that telomere length is significatly negatively correlated with life span in mice similarly to the strong negative association between age and telomere length in humans supported by results obtained by Njajou et al (5B). There is a distinct market in the industry that includes various privet companies and clinics such as Life length, RepeatD and TeloMe, which are providing the public the ability to determine an individual’s biological age through measuring the length telomeres via blood tests. Most of these companies use flow-PCR, RTQ-PCR or Q-FISH to estimate telomere length however to be able to estimate an individual’s life expectancy is a debateable topic however there are various benefits that comes with obtaining information about how short or long ones telomere is like for example the biological age is an indicator of overall health status and essentially help people proceed a healthier life style with better understanding of how life style actions are effect aging process. It is important to take in to consideration that the telomere length tests that are currently available are not able to predict life span as it is effected by a wide range of factors than telomeres alone. More over these tests can be used to see if there in an improvement in the rate of biological aging and can even be used to monitor the prognosis of current treatments and help disease prevention however the uses of these tests in a clinical environment still requires further longitudinal research and understanding in more depth of telomeres and its involvement in different diseases than what is currently known. This includes more studies of how telomere length is affected during early stages of life and how the inherited and environmental factors affect telomere length. Is it possible to alter telomere length using modern technology or in the near future? Table 4: The population doublings and telomerase activity detected in pBabe, pBabest2 and pBabest2-AS infected BJ cells. The reconstructions of telomerase activity in normal neonatal human fibroblast cell strain (BJ) which do not poses telomerase activity but however express the RNA subunit of telomerase complex (hTR) have been reported to display elongation of telomeres and extend replicative life span. The cells were infected with cDNA coding for hTERT sub-cloned in the retroviral vector pBabe, pBabest-2 and pBabest-2-As. The PBabest-2 under the control promotor of the Maloney Murine leukaemia long terminal repeat sense strand exceeded the normal estimated life span of BJ cells of 87-90 PDs and hence showing evidence for forced expression of telomerase activity results in extended life span (Vaziri and Benchimol et al, 1998). This study reveals that pBabest-2 cells can potentially replace genetically unstable cell lines through the expression of telomerase in gene therapy in order to treat age related diseases and cancer. Consequently other studies have shown that the inhibition of telomerase leads to telomere shortening and cell death and therefore can be used as anticancer drugs. Telomerase inhibiting drugs are currently under phase 2 of clinical trials and its effects on telomere shortening is reversible however the process of telomere shortening with inhibition requires a long period of time before a significant change in cell growth is seen due to the presence of the cells alternative telomere lengthening mechanisms (ATL) for maintaining telomeres. Figure 6 The HME50-5E cells underwent apoptosis against number of days after transfected with complementary 2’-O-MeRNA oligomer telomerase inhibitors. More than 50% of cells went under apoptosis after 100 days after the initial transfection (Herbert et al, 1999). Herbert and Pitts et al, 1999, reported that peptide nucleic acid (PNA) and 2-O-MeRNA oligomers inhibit the activity of hTR telomerase in immortal human cell lines HME50-5E and DU145 hence can be used as a potential chemotherapeutic drug (figure 6). The use of targeting telomerase in direct anticancer therapies also has its drawbacks as telomerase activity is also found in some somatic human cells that may also be targeted during treatment. Additionally a small minority of cancers have been reported to exhibit no significant telomerase activity therefore the treatment may not be as effective in certain cancers compared to others due to drug resistance. Another issue with this approach is that chemically related molecules may carry the risk if being unintentionally inhibited which could result in harmful side effects. Based on the research that that has been carried out on telomeres it is well established that telomere length can be easily manipulated however like in most biological pathways when the natural process are disrupted there are always positive and negative consequence. In this case involuntarily altering telomere length requires the manipulation of telomerase activity (Lee and Hills et al, 2013). The increase in telomerase activity has been associated with multiple different cancers which could therefore potentially increase the risk of developing cancer while reducing the risk of developing CHD and other diseases that are associated with telomere shortening. Furthermore additional studies are required to develop a more advanced technique that can alter telomere length and at the same time prevent or repress cancer. Alternatively a follow up study reported that a series of lifestyle changes such as plant based diet, moderate exercise, stress management and increased social support provided to men with low risk for prostate cancer, revealed an increase in relative telomere length in the intervention group compared to the controls after 5 years. This study shows a significant correlation between telomere length and lifestyle changes, indicating that telomere length can also be altered naturally by reducing the environmental risk factors associated with telomere shortening without having to interfere with telomerase activity (Ornish and Lin et al, 2013). Conclusion The discovery of telomeres and telomerase is without a doubt a major revolutionary step in the scientific field which has led to the understanding of biological age and its association with low mortality medical conditions such as CHD and Cancer. However there are still some structural aspects of telomeres and telomerase that are not fully understood, like for example telomere binding factors TRF1 and TRF2 have only a few studies which suggest that they are part of a telomere maintaining control mechanism (Smogorzewska and Steensel et al, 2000). Therefore these negative regulators can also be possibly targeted in therapies in the future as they have been found to be associated with telomerase activity and hence telomere shortening and eventually lead to programed death of cancerous cells through apoptosis. Although most telomerase inhibition drugs have failed due to long lag phase period before effective shortening of telomeres occur, it can still be used in combination with present chemotherapeutic drugs and provide a more efficiently induced cell death (Cerone and Londono-Vallejo et al, 2006). Moreover telomere length is an independent biomarker for assessing cardiovascular diseases therefore telomere length testing can be used in clinical medicine as a risk factor for early diagnosis faster than current biomarkers such as cholesterol levels. The future will undoubtedly point to new discoveries of how telomere and age related diseases are associated and help prevent them.

Thursday, September 19, 2019

Discrimination and Physical Appearance :: essays papers

Discrimination and Physical Appearance There are billions of people living in this world, and that is the most important reason why there is a discrimination. This discrimination occurs due to the difference of skin color, religion, language, and even culture. Back in my home country, there are two groups of people who always seem to discriminate one another. These two groups are the Indonesian natives and the Chinese. Since my skin color is very much different as compared to the Indonesian natives’ I could hardly make friends with them. This was mainly because I always thought that the Indonesians were low-class people just because they are poor; they worked as servants, street sweepers and labors. I believed that this thought applies to most of the other Chinese. The Chinese always think that they are much better off than then dark-skinned Indonesians because the Chinese hold the majority of the business throughout the whole Indonesia although the Chinese population is extremely small in Indonesia. Besides the difference in skin color, I used to think that I would never make friends with the natives because ninety nine percent of them were Moslems. I began to realize that I was absolutely wrong when I left my home country for Singapore to continue my further studies. There, I was very impressed how the Singaporeans, the Indians and the Malays get along together very well. There is even a racial harmony day held once a year. Since then, I started to treat my surrounding people equally regardless of their skin color, language, and religion. When I went back to Indonesia, I tried to make friends with the natives. I then realized that they were just the same as the Chinese. I felt very sorry whenever I thought of how I treated my servants and my other Indonesians so badly in the past. I should have treated the Indonesians well since the beginning because Indonesia does not belong to the Chinese; I was only a foreigner there.

Wednesday, September 18, 2019

Symbolic Analysis of Alice Walkers Everyday Use Essay -- Alice Walker

Symbolic Analysis of Alice Walker's Everyday Use Alice Walker?s ?Everyday Uses (For Your Grandmother)? is a story about a woman?s struggle with the past and her inability and unwillingness to accept the future. The three main characters in the story are Dee, her younger sister Maggie, and their mother. The story is narrated by the mother in an almost reminiscent manner, and it is on her that the focus of the story centers. Her eldest daughter, Dee, is the first in her family to embrace modernization and to attempt to improve her way of life. Dee?s view of the world and her feelings about developing her own sovereign identity are foreign to Maggie and her mother. The mother has lived her whole life in a manner that Dee simply does not wish to live hers. The mother shows some recognition of this as the story opens and she describes her own life and childhood and compares those of her two girls. The daughters, then, represent to their mother opposing forces in regards to socioeconomic and educational standards of living. Through out her recollection of the story, the girls? mother learns to accept and even appreciate the fact that she and Maggie are resigned to living the only way they have ever known, while Dee has chosen to abandon that legacy and sees it only as a way of life to be honored, not lived. The author?s decision to narrate the story from a first-person point of view allows the reader to gain insight into the mother?s struggle that wouldn?t have been available otherwise. Throughout the beginning of the story, the mother describes both her views of herself and of her daughters. She sees Dee as being superior to both she and Maggie. Dee always gets what she wants, whether it be through her family... ...ally important in life. Dee will always want more. She will never experience the pure joy that Maggie and her mother now share in the knowledge that they may not be the richest or the brightest or the best looking folks, but they are satisfied with what they have. Before she leaves, Dee makes and assertion that is at least partly accurate. She tells Maggie that ?it?s really a new day for us?. She is correct. It is indeed a new day, but not for Dee and Maggie. They have already gone their separate ways. Instead, it is a new day for Maggie and her mother. They now share a love and understanding that they had not known prior to these events. They?ve found an everyday use for their grandmother by forming a bond of love that will hold their family and their heritage together for another generation, not unlike their grandmother was able to do with the pieces of a quilt.

Tuesday, September 17, 2019

The Fourth Law Of Robotics :: essays research papers

<a href="http://www.geocities.com/vaksam/">Sam Vaknin's Psychology, Philosophy, Economics and Foreign Affairs Web Sites Sigmund Freud said that we have an uncanny reaction to the inanimate. This is probably because we know that - despite pretensions and layers of philosophizing - we are nothing but recursive, self aware, introspective, conscious machines. Special machines, no doubt, but machines althesame. The series of James bond movies constitutes a decades-spanning gallery of human paranoia. Villains change: communists, neo-nazis, media moguls. But one kind of villain is a fixture in this psychodrama, in this parade of human phobias: the machine. James Bond always finds himself confronted with hideous, vicious, malicious machines and automata. It was precisely to counter this wave of unease, even terror, irrational but all-pervasive, that Isaac Asimov, the late Sci-fi writer (and scientist) invented the Three Laws of Robotics: A robot may not injure a human being or, through inaction, allow a human being to come to harm A robot must obey the orders given it by human beings, except where such orders would conflict with the First Law A robot must protect its own existence as long as such protection does not conflict with the First or Second Laws Many have noticed the lack of consistency and the virtual inapplicability of these laws put together. First, they are not the derivative of any coherent worldview and background. To be properly implemented and to avoid a potentially dangerous interpretation of them - the robots in which they are embedded must be also equipped with a reasonably full model of the physical and of the human spheres of existence. Devoid of such a context, these laws soon lead to intractable paradoxes (experiences as a nervous breakdown by one of Asimov's robots). Conflicts are ruinous in automata based on recursive functions (Turing machines) as all robots must be. Godel pointed at one such self destructive paradox in the "Principia Mathematica" ostensibly comprehensive and self consistent logical system. It was enough to discredit the whole magnificent edifice constructed by Russel and Whitehead over a decade. Some will argue against this and say that robots need not be automata in the classical, Church-Turing, sense. That they could act according to heuristic, probabilistic rules of decision making. There are many other types of functions (non-recursive) that can be incorporated in a robot. True, but then, how can one guarantee full predictability of behaviour? How can one be certain that the robots will fully and always implement the three laws?

Monday, September 16, 2019

Clinton Climate Change Initiative Program in Australia and the Progress of Barangoo Waterfront Development Project in Sydney so Far

Climate change has come to be one of the issues that have had far-reaching implications for the world in which we live. As people who are proud of our heritage and who need to live a fulfilling life, we need to do a lot more to fight climate change. For it is clear that unless something is done and done fast enough then this dear homeland of ours will be no more in a matter of several years (Pittock 2003). Therefore, my appeal is to all Australians to work hard to make the earth a good, safe place to live in not just today but also for generations to come.The way to go is to conserve our environment – to reduce carbon emission as far as possible as to date climate change is largely attributed to the rapid increase in the amount of carbon in the atmosphere in different forms. The Clinton Foundation has been in the forefront in this fight against climate change (The Clinton Foundation 2010). It has initiated many projects in the country to ensure that carbon emission is reduced. The Clinton Climate Change Initiative Program is a typical climate change program that is aimed at helping this country achieve its goal of becoming greener.Through the Clinton Climate Initiative (CCI), the Clinton foundation aims at working with the government to provide greener sources of energy, counter carbon emissions by using renewable energy sources in homes and offices, and reducing organic waste through use of recycled material (The Clinton Foundation 2010). It also seeks to create avenues for absorption of large quantities of carbon such as forests. The target is greenhouse emitters which range from industrial emissions through domestic energy sources to wasteful use of material or careless dumping.Working jointly with C40, CCI seeks to see cities greener and cleaner (The Clinton Foundation 2010). Through the Greener Government Buildings Program, CCI targets to make reduce the use of applications in government buildings which emit greenhouse gases. Reduced use of energy a nd reuse is a point of emphasis (Freestone 2010). All of us ought to seek to visit the Clinton Foundation’s official website and its other information resources to be better placed to work jointly with it to ensure we live in a safer and greener country.It is upon us all to work alongside CCI to make climate change less affective of our lifestyles. Now is the time for every Australian to do something that will count towards curbing adverse climate change. For this is for our own good. It is for us and for posterity. The more we conserve and preserve now, the more secure we make our future and the future of our children after us (The Clinton Foundation 2010). The Clinton Climate Change Initiative Program is currently running different projects to this effect, with the notable one being the Barangoo Waterfront Development Project in Sydney.This project is a partnership between the Clinton Foundation and the government of New South Wales and aims to create a park in the city of Melbourne’s area of Barangoo so it becomes part of the central business district (The Clinton Foundation 2010). This is a beautification approach that seeks to protect the waterfront of the city center and to capture the emitted carbon so the city is cleaner and greener. Once an inner city, Barangoo is being transformed to become part of the city center and so reduce congestion (Preston & Jones 2006).The main constructions are a headland park and a public domain. So far, work on the headland park has commenced and soon works are going to start for the public domain. The city, one the project is completed, is expected to be literally green with magnificent parks and surrounding blue waters. Magnificent buildings will adorn the nicely shaped harbor to demonstrate just how far collective effects and commitment can change cities for good. Also yet to be completed are a newly created headland park and a very modern waterfront. The headland park is located north of Barangoo (Beatle y 2008).Already done is a foreshore promenade that extends along the harbor and is part of a 14 kilometer foreshore walk joining Anzac Bridge to Woolloomooloo. Under the headland park is a car park that is almost hidden by the greenery. It is expected that the remaining part of the project will carry on to completion soon, to make Sydney a real green city and a demonstration of what being green really is. Word count: 747 References Beatley, T 2008. Green Urbanism Down Under: Learning from Sustainable Communities in Australia. Island Press Freestone, R 2010. Urban Nation: Australia's Planning Heritage.Csiro Publishing Pittock, B 2003. Climate Change: An Australian Guide to Science and Potential Impacts. Retrieved at: http://www. ccma. vic. gov. au/soilhealth/climate_change_literature_review/documents/organisations/ago/science-guide. pdf Preston, BL& Jones, RN 2006. Climate Change Impacts on Australia and the Benefits of Early Action to Reduce Global Greenhouse Gas Emissions. Retrieve d at: http://www. csiro. au/files/files/p6fy. pdf The Clinton Foundation 2010. What we Do. Retrieved at: http://www. clintonfoundation. org/what-we-do/clinton-climate-initiative/

Exploring The Concept Of Forest Management Environmental Sciences Essay

The wood is a complex ecosystem dwelling chiefly of trees that buffer the Earth and back up a battalion of life signifiers. Numerous ecological maps are carried out by the wood. Therefore one must be careful in the managing and conserving of the forest. Trees can make environment which in bend affect the sort of animate beings and workss that can be in the wood. However the most of import function trees carry out is the purification of air. Trees are capable of refilling supplies of O in the ambiance and taking out harmful C dioxide, which is done in a cyclic procedure. Other than these environmental functions, the wood may be manipulated to give economic benefits through lumber harvest home which is normally practise by legion states across the Earth. It must be noted that economic benefits of the wood may besides run to non-timber merchandises. â€Å" Forest direction is the application of appropriate proficient forestry rules, patterns, and concern techniques to the direction of a wood to accomplish the proprietor ‘s aims. † Pull offing of a forest correctly may give legion benefits. Guyana is a comparatively little state which is situated on the nor'-east seashore of Latin America, along the Atlantic Ocean. It has a entire land country of 21.4 million hectares of which 16.9 million hectares are forested lands. This means that more than 75 % of the state is considered forested countries. As a consequence of holding such a high per centum of forested countries, a proper wood direction system is needed. Most of the state ‘s wood are still integral and are non being threatened due to the effects of agribusiness. However, the woods of Guyana are being threatened by deforestation. It is estimated that the annual deforestation rate is someplace between 0.1 % and 0.3 % . This deforestation is caused chiefly by the effects of the enlargement of the excavation industry. All forest that is non on private belongings is allocated to the province and is termed province wood. 13.6 million hectares of the forested land is deemed province land. More specifically, 5.8 milli on hectares of the designated province land are for commercial usage, while 500,000 hectares are allocated for research and protection, 63,000 hectares is outside the legal power of the forest service, and eventually, more that 58 % of the province ‘s wood is fundamentally untasted in relation to commercial usage. In Guyana province wood may be of seven ( 7 ) types: Permanent production woods – in which the rules regulating the sustainable direction of woods shall be applied. Permanent protection woods and biodiversity militias – in which, because of the exposure of the forest ecosystem, no tree felling or other types of wood use shall be permitted, and in which representative countries of biodiversity shall be inviolate. Reserve forests – woods which are yet to be classified, and on which no development shall be permitted. Extractive woods – woods reserved for the sole use of their non-timber wood merchandises. Multiple usage forests – woods to be utilised for the concurrent production and proviso of goods ( lumber and non-timber ) and services. Permanent research forests – woods devoted entirely to research. Conversion woods – woods to be cleared for other utilizations. By categorising the State Forest proper pull offing and monitoring can be achieved. This is so because assorted classs permit limited activity and besides place type of type of activity done within specific Forest countries. This method of pull offing State Forest with adequate enforcement ensures sustainable usage of the forest. Sustainable usage is all about utilizing resources in parts that may non impact future coevalss. The proper direction of Guyana ‘s wood is achieved through the application and enforcement of policies, these of which includes reaping policies that permits peculiar activities in a given forested country. One of which governs forest reaping licenses. There are four ( 4 ) classs of forest reaping licenses in Guyana: – Timber gross revenues understandings ( TSAs ) : grants are granted on a rental for 20 old ages or more over an country of 24,000 hectares or more. Wood cutting rentals ( WCLs ) : licenses are granted on 3-10-year rentals theoretically for countries of 8,000-24,281 hectares State forest licenses ( SFPs ) : film editing licenses are granted on an one-year footing for countries of province forest up to 8,094 hectares in size. Exploratory licenses: before a WCL or a TSA is issued, a three-year exploratory period is granted in order to garner all the necessary information for the readying of an investing proposal. In 1998, the Guyana Forestry Commission ( GFC ) introduced a Code of Practice for Timber Harvesting based on FAO ‘s Model Code of Forest Practice ; the codification, which was revised in 2002, prescribes internationally recognized criterions for exclusion countries and buffer zones, 100 % pre-harvest stock list, route building, felling, skidding, hauling, operational and camp hygiene, and occupational wellness and safety. Besides exclusion countries and buffer zones, the codification besides restricts logging on inclines greater than 40 % and sets a minimal distance of 10 m between crop trees to minimise the size of canopy gaps. Other policy enforced includes the film editing of trees of a peculiar diameter, 34cm. This promotes the proper development of trees that would give quality and efficient lumber, therefore small waste would be since it would be a offense to log a tree whose diameter is lower than that mentioned above. A log-tagging system to help the monitoring of lumber harvest home and cut down illegal film editing has been in consequence since 1999. The Log Tracking System in Guyana provides noticeable grounds on the legitimacy, location and magnitude of forest operations. The Log Tracking System presently applies to all operations, including those on State Forests, Amerindian Reservations and Private Properties and is linked to the State Forest Permit ( SFP ) Quota System. This is an inaugural to command the volume of green goods harvested. The Log Tracking System is regulated by the usage of Log Tags which are assigned to legal operators at the beginning of an operator ‘s one-year reclamation of his State Forest Permit license and are available to the operator free of charge. An operator ‘s quota ( forest green goods volume ) is first calculated by a formula estimation of the sustained output which considers the size of the forest country and captures the minimal log reaping variables of droping rhythm, droping distance and minimal girth. The quota is equated to the figure of standing trees which will give this volume ; and it is the figure of trees computed that indicates the figure of tickets to be issued ( one ticket is tantamount to one standing tree ) . Each operator is allocated a figure of tags equivalent to his sustained output and is recognised by a alone sequence of Numberss assigned to that operation. How the tagging system works – Log tagging is done at the stump where one half of the ticket is affixed to the stump at the clip of felling and the other portion bearing the same sequence of Numberss as recorded on the stump ticket, is affixed to the green goods being conveyed. All forest green goods including logs, timber, hemorrhoids, poles and stations are tagged. It is the alone Numberss of each ticket assigned that indicates who the operator is and hence is able to bespeak the geographic beginning of the forest green goods within the Forest Estate.RecommendationsThere is a deficiency in supervising the activities of individuals involved in the forestry sector. This would promote corruptness and breaching of contracts, in which instance, the policies and/or ordinances that apply to the contract may non be adhered to, which would finally ensue in hapless or weak forest direction execution. This is why there should be proper monitoring plans in topographic point. For this to be successful there is a demand for more human resources to take on the undertaking of supervising forest activities. One other weak point in the direction of Guyana ‘s Forests would be the fact that unqualified individuals in the lumber industry are issued licenses and rentals, which means that they may non be experienced or educated adequate to set many of these techniques into efficient pattern. Besides, although there is a plan to place protected countries such as Iwokrama, the country of wholly protected woods is low and there is non adequate control and direction in protected countries. Guyana lacks in trained and qualified forces to help in direction, so despite the fact that direction techniques are in topographic point, the existent execution or executing may non be up to standard. Education plans or the usage of good qualified persons should be applied to help in proper executing of direction techniques.INTERNATIONAL EXAMPLE OF FOREST MANAGEMENTChina Forest Management SystemIn footings of forested land, China has 175 million hectares of wood and 12.5 billion three-dimensional metres of forest stock. This is ranked as 5th and 6th severally in the universe. However, despite these facts China is still considered a forest – lacking state. This is so since its forest resources merely histories for 4 % of the universe ‘s wood and China ‘s forested country per capita of 0.13 hectares is far below the universe norm of 0.65. Coevalss of over development, disease and fires have reduced its forest coverage to 18 % of its land mass, ranking its 0.13 hectares of forest per capita at 134 globally, less than one-fourth the universe norm. The job of deforestation in China day of the months back to some clip, where the measure and the quality of forest resources in China aggressively decreased during the collectivisation period ( 1958-82 ) . The tendency farther accentuated at the beginning of the 1980s, insecure ownership rights taking husbandmans to clear woods after the family duty system was extended to forestlands. Besides the sustained economic growing of China has led to a rush in demand for forest merchandises. The building roar including house edifice in both metropoliss and rural countries, and the lifting demand for educational and cultural activities have been of import factors driving the crisp addition in demand and in quality demands for wood stuffs, furniture, paper and poster board. Confronting the ecological effects of forest over-exploitation and the turning force per unit area from the demand side ; the Chinese authorities has radically reoriented its wood policy over the last 20 old ages, by travel ing from a lumber production scheme to resources and ecosystem preservation and Restoration. The recent end of China is to increase its forest coverage to 26 % by 2050. In its direction of forest plan China has implemented six ( 6 ) policies ; Natural Forest Protection Program The aim of this was to implement logging prohibition along the upper ranges of Yangtze and Yellow rivers. Conversion of Fragile Farmland to Forest Program Its aim was to retrieve cultivated incline land and fragile grain land and turn them into woods or grassland. Desertification Control Program For this policy it entailed an addition in grass, bushs and trees by 5.2 million hectares to halt and change by reversal transition to abandon in some countries. This benefited the ecological environment in that the undertaking country has been dramatically improved with the increasing forest flora screen ; the income of the husbandmans increased. Aggressive Commercial Plantation Program For this plan Government designated suited countries for plantation constitution in 18 eastern and southwesterly states, this resulted in an addition in the domestic lumber supply and provided sustainable rural economic development. Wildlife preservation and natural militias development plan This is an incorporate direction attack which seeks both impermanent and lasting solutions that shall be adopted in order to react to the clime alteration and cut down the C dioxide content in the ambiance. On one manus, industrial steps shall be taken to cut down the emanation of nursery gas, on the other manus, biological steps including forestry-related 1s shall be adopted in order to efficaciously absorb and repair C dioxide and better the adaptability to the clime alteration. Forest shelter-belt plan From the late seventiess to the present, a large-scale afforestation plan called the â€Å" Three Norths Forest Shelterbelt † plan was carried out to battle desertification and control dust storms in China. However, few elaborate and systemic appraisals have evaluated its success despite the immense investing in the plan, its long-run, the extended country covered by the plan and the importance of battling desertification and commanding dust storms. By execution of these policies china has been able to pull off its forest more sustainably and at that place have been important betterments that are seeable. Pull offing its woods efficaciously is seen as cardinal if the wood sector is to accomplish sustainable development. Returning farming area to forest along with the other cardinal undertakings has already achieved a step of success. The natural woods in the upper ranges of the Yangtze River and Yellow River are no longer being logged and protective woods have been planted along the midstream and downstream subdivisions of the major rivers in China. Regulations are in force protecting immature woods, natural woods and forestalling the of import protective woods from being logged. The most of import factor in the direction of its forest trades with ownership. In 2003, China launched a reform of its corporate wood term of office. The purpose was to promote more single duty and stimulate greater engagement in forest direction, cut downing the portion of corporate direction. Under these reforms, private persons may now ‘own ‘ the corporate woods by subscribing legal contracts and having authorized forest certifications. This confers to the new proprietors the right to use the forest lands for 70 old ages. More rights such as transportations and mortgage are authorized to the persons every bit good. Until now, the corporate woods have tended to be managed ill compared to in private owned woods. Corporate wood husbandmans have tended to reap more and put less. In contrast, when the woods have become in private owned, the forest husbandmans have planted more trees and taken a more long-run position in pull offing their forest land. During the reform period, China ‘s forest resources have increased in both country and stock volume. This encouraging tendency is the consequence of both afforestation activities and increasing attempts made by the authorities to protect woods with the execution of large-scale national plans concentrating on natural wood protection and plantation development. Despite its positive impact on China ‘s forest resources, the recent displacement of forest policies from resource development to resource protection besides contributes to a farther decrease of domestic lumber supply possible, already tightly constrained by historical over-harvesting and by the low productiveness and inappropriate age construction of bing woods. Within Chinas each territory metropolis, metropolis and county authorities has a forestry disposal authorization, normally named the Forestry Bureau or Greening Committee. These governments are responsible for implementing policies and ordinances issued by higher-level authorities bureaus ; oversing and measuring public presentation ; carry oning forest resource stock lists and forest operations layout ; steering province forest farms, corporate wood farms, and local husbandmans ; and interceding land term of office conflicts. The capacity of local forestry agency or greening commissions mostly depends on the local authorities ‘s economic position. Rich metropoliss and counties tend to hold higher capacity and better installations. Every town has a forestry station affiliated to the county ‘s forestry agency. These Stationss assist the township authorities to fix an one-year forestry program, look into afforestation consequences, verify one-year logging quotas and logging sites in woods managed by collectives and local husbandmans, aid to look into and manage land term of office struggles, protect forest resources, and supply proficient aid to local husbandmans. Most forestry Stationss have low capacity and are ill maintained because of support deficits. Take for illustration Guangdong in China, which is comparatively rich, economically developed country with good market entree started their afforestation plan in 1985 ; where the state achieved its mark two old ages in front of agenda.RecommendationRemoving the logging prohibition and reforming broader forest regulative model, taking into peculiar history how they affect the rights and inducements of corporate wood proprietors, and so one time a sound model is in topographic point, presenting strong steps against over-harvesting and illegal logging. Revisiting the planned plantation plan and measure whether this is the most efficient economically, socially, and environmentally sound manner for fulfilling the future demand of mush in China. Implementing the Natural forest protection plan was based on the demand to stabilise dirts and change by reversal the dirt and H2O debasement caused by unsustainable patterns. Replacing the wood supply with illicitly logged stuff from other states merely exports the environmental debasement instead than better upon it. Anecdotal grounds indicates that unsustainable illegal harvest home is increasing in Russia and Asia to countervail the decreased lumber supplies from the execution if the NFPP. Policies need to be developed to guarantee that the beginning for imported wood is known in order to do the NFPP policy more effectual. Bettering and implementing relevant Torahs and ordinances and policy mechanism. The Forest Law and Wildlife Conservation Law demand to be revised, and particular Torahs and ordinances including Law on Nature Reserves, and Rules and Regulations on Wetland Conservation, Nature Forest Conservation and Forests, Trees and Forest Land Use Rights Circulation must be promulgated every bit shortly as possible. It is to add and escalate the legal commissariats reacting to climate alteration in relevant Torahs and ordinances. Law enforcement system and dynamic supervising mechanism demand to be improved and jurisprudence enforcement and review be enhanced. Tree-planting mark direction duty of the authoritiess at different degrees and greening duty of different sections should be continuously improved, signifiers of countrywide compulsory tree seting be developed and relevant policies be made. Fund and proficient inputs need to be increased and policy support be provided. It is to put up long-ru n and effectual working mechanism of China ‘s forestry get bying with clime alteration.ComparisonOverall, the Chinese method of forest direction seems to be more efficient and effectual as compared to that of Guyana. This is made clear when sing the deficiency of security related with the licenses issued in Guyana ‘s forest direction techniques. It tends to deter investings in State Forest Management, because of the short clip allocated for the rentals. The short clip span provides small confidence that the investor will hold continued entree rights to the same grant country in the hereafter beyond the life of the rental. This therefore encourages inordinate logging activities along with other unsustainable patterns. Where the Chinese direction is concerned, this is prevented because they have extended rentals as compared to the Guyana with clip periods of approximately 60 to 80 old ages in some instances. This prevents the issue of inordinate logging since the proprieto rs of the rental can non afford to recklessly cut down trees. By publishing rentals for extended periods this put the direction of the forest in the well-thought-of companies given the grant to log, hence if given a 80 twelvemonth lease the company must so pull off logging activities in such a manner that it may be profitable for the allotted rental period. Improper managing of the grant in these instances would help in the hurt of the company. In Guyana there is a deficiency of policies or proper execution in instances of natural catastrophes such as El Nino triping forest fires which can take to big multitudes of woods being destroyed without any agencies of recovery. This is non so in China, since they have in topographic point, a policy that takes into consideration proper solution to battle effects of natural catastrophe, ( Shelter Belt Program in China ) . Besides in China there is a Conversion of Fragile Farmland to Forest Program which was mentioned. For this policy, the Chinese would works forest trees or grasslands on parts of land that were officially used for farming or agricultural intents which would hold been left after being exhausted to some extent, abandoned, or no longer executable for cultivation. It fundamentally makes usage of that land that would hold otherwise been left unattended. Planting of forest trees in these countries would in bend lead to maximal use of lost land for re-afforestation. Form research done it is clear that there is no such plan in Guyana, nevertheless there were some sum of re-afforestation in the backwoodss but these plans were ne'er truly analyzed decently to find the effectivity or benefits of it. In China there is a commercial plantation plan where trees are planted in certain countries for logging intents merely. This in bend maintains a systematic attack towards logging. There is a similar pattern in Guyana where there are different types of province wood allocated for different intents such as forested countries that are protected to continue diverseness, modesty woods: woods which are yet to be classified, and on which no development shall be permitted and forested countries for logging merely.

Sunday, September 15, 2019

Lifespan Perspective Paper

Lifespan Perspective Paper Introduction This paper will discuss lifespan development and the theories associated with the study. Humans develop according to phases throughout their lives and this paper will address these phases and what to expect and when. People learn from mistakes made in the past and apply these lessons in order to improve their quality of life. The psychodynamic and evolutionary theories will be examined in detail. Also, the significant role of nature and nurture will be addressed.Lifespan Perspective of Development Lifespan development describes the growth that happens from the time an organism is conceived to the time of its death. A human undergoes a variety of changes throughout their lifetime: psychologically, physiologically, spiritually, and socially changes all occur. A mere fetus develops heart beat at around six weeks and from that point on, develops quickly over the remainder of the pregnancy. Each step in life people develop, little by little.Lifespan development provides us with the information necessary to understand the different phases of human life and with this information we are able to better understand what to expect from each phase (Berk, 2012). For example, children often fear the dark and require a night light to sleep, but overtime, this insignificant fear becomes less and less of a concern and eventually most children are able to sleep just fine without a night light. When a child realizes there is nothing to be afraid of, like there are not any monsters under the bed, he or she is able to sleep without the security of a night light.Understanding lifespan development is crucial and allows us to grasp the phases of life. And also, understand children and their needs for security and comfort. Young children often relay on the comfort of a pacifier or a blanket to calm them down or make them feel safe. Parents are able to understand their children and their needs with the help of lifespan development studies and thus, parents feel like they are able to be better mothers and fathers. There are four recognized phases of human lifespan. One, childhood and adolescence; two, early adulthood; three, middle adulthood; four, late adulthood.Natural progressions are expected to occur as a person ages. The study of lifespan development is important because it explains how and why people develop and what reasonable expectations should apply during this process (Berger, 2008). Lifespan Development at Work The study of lifespan development is significant factor in understanding the subject and provides people with many answers and has the ability of preventing people from repeating past mistakes. Over the years humans have monitored history and have used their research to prevent making similar decisions of the past that did not work out like they were intended to (Carson, 2000).For example, sunscreen is used to protect our skin from harmful UVA and UVB rays and ultimately, decrease the possibilities of skin cancer. Before the importance and knowledge of sunscreen was available people did not know the true dangers the sun presented and mostly did not protect their skin accordingly. As a result, many people who spent a lot of time outdoors in the 1970’s and 1980’s had a significantly increased rate of skin cancer. Many of these skin cancer victims did not know the dangers the sun presented and how wearing sunscreen could have decreased their risk.If this knowledge was readily available at the time it is almost guaranteed that a large percentage of these people who have worn sunscreen and possibly eliminate their chances of skin cancer all together. Now the threats of sun damage are widely known and discussed and there are a variety of sunscreen-type products on the market for consumers (Berk, 2012). People have learned from past mistakes that the sun does present dangers and can be harmful to our skin so it is important to wear sunscreen and take other appropriate precautio ns.Lifespan development is purposed partially on extending the life of man and as a part of that jaunting task, survival is required. Humans learn from mistakes that have been made in the past, as a part of their challenge to survive. Skin cancer kills some of its victims and therefore, the knowledge that skin cancer presents is crucial and allows people to take the appropriate measures to cut down their risks. This is one simple example of how people learn from history and use inventive ways to improve the future with the information acquired (Carson, 2000).Theories of Lifespan Development: Psychodynamic Behavioral, cognitive, contextual, evolutionary, humanistic, and psychodynamic are the six widely accepted theories pertaining to lifespan development psychology (Berger, 2008). Both Eric Erickson and Sigmund Freud did expansive studies on the psychodynamic theory. In Freud’s studies he focused on the inner being of a person and the unconscious forces that create personality and behavioral traits. His beliefs are that events, like memories and feelings that occur inside of us help motivate our personality and the way in which we behave.Memories are usually positive or negative and conflicts arise from negative memories and thus, creating a feeling that something should not be repeated in order to avoid a negative outcome. The psychodynamic theory focuses on three aspects of human personality: ego, superego, and id. Along with personality, this theory focuses on psychosexual development as well (Carson, 2000). Theories of Lifespan Development: Evolutionary The Evolutionary Theory of lifespan development is another interesting take on the study originally theorized by Charles Darwin and Konrad Lorenz.This theory focuses on evolution and how it specifically relates to human lifespan development. Over the years, a process of natural selection takes place and as a result humans adapt to their environments. Traits are acquired and sometimes altered by specie s in order to thrive. Darwin and Lorenz focus on how heredity influences development and how behavior is a result of our genetic inheritance. Studies that are connected with this theory show a relationship between family members and certain diseases and illnesses (Berk, 2012). For example, mental illness often runs in family histories and can be tracked through heredity.Heredity and the Environment Nurture versus nature is a discussion commonly associated with lifespan development. Environmental factors play a role in how a person develops, but heredity is passed down through a process of inheritance. A child may be born into a poverty-stricken home and raised to live in fear. A socioeconomic situation like this can lead to a life of crime in order to make ends meet. This environment has significant affects on the development of a person, but environments can be changed, if a person is willing to take the necessary steps.Now if a child is born into a family with a history of mental illness the child has a chance of developing a related illness (Berger, 2008). For example, if the child’s mother has schizophrenia and the child demonstrates symptoms of the disease at an early age and eventually is diagnosed with the disease, this is an act of nature. It is possible to earn a degree, get a better job, and move up to a middle class area, but it is not possible to undo heredity and no longer be schizophrenic. Nature and nurture both play a significant role in lifespan development and have equal importance in the lives of people (Carson, 2000).Conclusion In conclusion, lifespan development describes the growth that happens from the time an organism is conceived to the time of its death. Throughout these years, people develop in phases that can be observed as a result of the study of lifespan development (Berger, 2008). Human beings have learned about the different phases of development and have discovered new ways to do things to guarantee a higher quality of life. Watching history and mistakes that were made in the past are one of the ways the human species thrives and is able to withstand the test of time (Carson, 2000).The psychodynamic and evolutionary theories explain specific thoughts associated with lifespan development (Berk, 2012). Nature versus nurture is controversial debate that can be seen all throughout the study of psychology and many characteristics humans develop References: Berger, K. S. (2008). The developing person through the life span (7th ed. ). New York, NY: Worth  Ã‚   Publishers. Berk, L. E. (2012). Infants and children: Prenatal through middle childhood (7 ed. ). Allyn & Bacon. Carson, R. C. (2000). Abnormal Psychology and Modern Life. Retrieved June 25, 2012, from,http://www. abacon. com, p85.