Saturday, November 30, 2019

The Role of the Media in the Nigeria 2015 Elections 2015 free essay sample

But further studies have come up with other important roles such as persuasion, interpretation, surveillance, interpretation, advocacy and mobilization, integration, selling and advertising, publicity, cultural transmission, propaganda, agenda setting and the list can be endless. But for the sake of this presentation I shall discuss a few. And the aim of this paper is to discuss the role of the media with the 2015 elections in view. And it should be noted that the media has an important role to play in the 2015 electoral process. Straight to it, the major role of the media in the electoral process towards the 2015 election is that of an Informing function. It behooves the media practitioners to spread useful information, which will enable Nigerian citizens to make informed decisions. Therefore, the question that comes to mind is what should the media inform Nigerian citizens about? First, the media should bring to the fore, the activities of the current administration(s) or incumbents’ activities. We will write a custom essay sample on The Role of the Media in the Nigeria 2015 Elections 2015 or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page This should be done objectively. The media should bring back the manifestoes of the incumbents and juxtapose them with what they have achieved. The policies that have changed the lives of the Nigerian citizens or driven them into the abyss of pervasive poverty and dehumanization. The media should inform the Nigerian citizen on where they were before the current government came into power and now that they are in power with their different tenures coming to an end and with the 2015 election in view. Moreover, it is the media’s responsibility to perform a checking function by ensuring that elected representatives uphold their oaths of office and carry out the wishes of those who elected them. More also, the media should inform the Nigerian citizens on the ideologies of the contesting political parties. What has been the ideology of these parties? What are their policies? What are their economic values? And how do they meet with the existing challenges of our society. But it should be stated, the media is not to take side or decide for the people but should direct the people in an unbiased, balanced, objective and productive line of thinking. Furthermore, the media should do more of developmental reporting and not used as a hunt dog to hack down opposition parties. The media should report events to promote the unity of the country. There is a lot of sectional sentiment in the Nigeria media today. Sensationalism has become the order of the day. We see big headlines with no substance, headlines capable of causing unrest. In informing the Nigerian electorate, yellow journalism should be avoided. The truth must be told though it may incur the wrath of a political party but it must be told. The media should as well sensitize the people on the need to constructively fight for their rights that have been denied them by the elected representatives. Persuasion and mobilization is another pertinent role the media is to perform in the forthcoming elections. The media must persuade the Nigerian citizens on why they have to be registered before the election as this is the criteria on which their freedom of franchise is based. Further on this, they should mobilise Nigerians on the need to come out to exercise their freedom of franchise by casting their votes for their trusted and desired candidate. The media must let them know that their destiny is in their hands and they will decide what form, pattern and colour their destiny will look take in the next tenure. The print media have an important hold on the people. It is a stronghold of information that affects the decisions of people about government polices that are made, neglected, implemented and other needed information for the people’s daily life. Walter Lippmann in 1920 had this to say about the newspaper: â€Å"For the newspaper is in all literariness the bible Of democracy, the book out of which a people determines its conduct. It is the only serious book most people read. It is the only book they read everyday. Now the power To determine each day what shall seem important and What shall be neglected is a power unlike any that has Been exercised since the pope lost hold on the secular mind† Well said. It means that the print media should not become a recruitment agent for political parties but a source of useful information that will not create anxiety in the society but rather integrate the society together. But I will end this write up with this question can the media really perform this role of objective and constructive information, dissemination? When the elected representatives and their friends have hijacked and bought over most of it not all the media houses? Don’t query me, answer the question objectively and then you can forecast what kind of 2015 elections we are going to have in Nigerian. What is your role?

Monday, November 25, 2019

Love and Forgiveness essays

Love and Forgiveness essays Loving others, while difficult, is not always a thankless task; love creates compassion, whereas compassion generates love. In Les Miserables, Hugo affirms that love and compassion are the most essential gifts one individual can give another and that always displaying these characteristics ought to be the most momentous goal in life. You could almost say that love and compassion are virtually contagious, passed on from one character to another in this novel. Jean Val Jeans transformation from a hate-filled and hard-edged criminal into a well-respected humanitarian reassures readers of Hugo's emphasis on love. For it is only by learning to love others that Val Jean is able to improve himself. Readers cannot help but feel a sense of annoyance in realizing from the very start that the crime of Val Jean was so menial. He did nothing truly worthy of censure under any reasonable law, but the mistreatment he undergoes in prison causes him to feel an overwhelming sense of bitterness, which then makes him capable of doing the exact things he has been accused for. This is intended to receive a great deal of forgiveness from society towards this ex-con. While Val Jean's efforts on behalf of others unavoidably cause him troubles, they also give him a sense of contentment and fulfillment that he has never before felt. Val Jean's love for others, in particular for his daughter Cosette, is what keeps him going and what rescues him in times of nee d. Another strong influence on Val Jeans love for humanity is that of the Bishop. In giving Val Jean the silver, Myriel has purchased his soul for God, though Val Jean does not realize what is happening to him. It is obvious that he is basically a good person to start with, and that once the years of torment surpass him, the saintly man will emerge. Throughout this novel readers will find the religious value that Hugo is trying to come across. ...

Friday, November 22, 2019

An Analysis of South Park, The American Adult Animated Sitcom and The Issues It Tackles In Society

An Analysis of South Park, The American Adult Animated Sitcom and The Issues It Tackles In Society South Park is an American adult animated sitcom, a production of South Park Digital Studios, LLC that started airing on August 13, 1997, till now. with 20 seasons and over 270 episodes in total, South Park has received numerous awards and even ranked as the tenth Greatest TV Cartoon of All Time by TVGuid. Being famous for its dark, surreal humor that covers a wide range of topics including social problems, politics, and internet sensations. South Park became a popular entertainment among adults all over the world, mainly in the United States. Although South Park had been famous for its well-scripted comedy that applies to different situations, groups and even individuals, according to Roland Barthes’s concepts discussed in Mythologies, there are still tricks played on us that causes us to invest in the ones in greater power willingly or even wholeheartedly. Through the book Mythologies, Roland Barthes shows how truths are hidden behind the banalest and natural aspects of everyday life. According to Barthes, things often present themselves as being natural, therefore, are transparent to the public. His analysis of different â€Å"natural† mythologies today reveals the ideological nature of the products. Barthes considers Myths as speech, that it is a system of communication which bears meaning in itself. He expresses his view on how every symbol conveys a meaning, unlimited by the nature of the symbol, be it a text, an image or even human actions. As Barthes explained in Mythologies â€Å"Every object in the world can pass from a closed, silent existence to an oral state, open to appropriation by society, for there is no law, whether natural or not, which forbids talking about things. A tree is a tree. Yes, of course.† (Mythologies 1972 p.1) He considers every cultural product as a symbol itself, conveying at least a meanin g conditioned by a myth. Any cultural product can be analyzed and reviewed in Barthes’s consideration since there is always a realm of second-class signification which distinguishes its symbolic meaning from its denotation through analysis. Barthes’s explanation of his analysis in the article ‘The Romans in films’, â€Å"Signs ought to present themselves only in two extreme forms: either openly intellectual and so remote that they are reduced to an algebra, as in the Chinese theatre, where a flag on its own signifies a regiment; or deeply rooted, invented, so to speak, on each occasion, revealing an internal, a hidden facet, and indicative of a moment in time, no longer of a concept†¦Ã¢â‚¬ (Mythologies 2009 p.28) Applying Barthes’s concept presented in Mythologies on South Park, as an American animated sitcom, it often expresses people’s view and thoughts through comedy and satire, presenting themselves to be true and universal. Ironically, similar to its own c haracteristic of presenting ideas through imaginary characters and stories, South Park is actually a fiction that tricks us into benefiting the more powerful members of the society. Its use of comedic approach to expressing ideas and thoughts increase social acceptability on transgressions. It also decreases the viewers tendency on voicing out, through fulfilling their will of express and reflecting on social issues or problems when they are enjoying the show. The mixing of highly-realistic setting and contents with surreal situations cuts back imagination and expectations of the public on different aspects. South Park slowly dull viewers’ individual and critical thinking and tricks them into being an easier public to mass media or governance by slipping ideas and myths into the show. South Park is famous for its use of humor relating to social issues or taboos, the use of comedy encourages the acceptance of transgressions such as racism and sexism. South Park often over-exaggerate public’s reactions and social problems to create comic yet relatable stories or situations. Although it is considered done ironically to encourage social participation or awareness, it also encourages social acceptance on transgression. Suggested by Brain L. Ott, ‘South Park does not simply depict the violation of social taboos; it enlists viewers participation in them. By watching the show repeatedly transgress the boundaries of social acceptability, public complete the communication circuit vital to the shows violations.’ (Taking South Park Seriously 2008 p.41-42) The constant violation of social taboos in the show made viewers dull towards transgression, which increases their acceptance of the violation of social taboos. In South Park season 20, the theme focuses on internet trolls, the 2016 United States presidential election, and nostalgia. Multiple social taboos are comically discussed and over-exaggerated, in the episodes of the 20th season, numerous racist, sexist jokes and ideas are presented. In the episodes, the Member Berries speaks of memories of older days some quotes that over-exaggerates nostalgia like â€Å"Member when there werent so many Mexicans?†, â€Å"Member when a white man kissing a black woman on national television was considered daring?†, â€Å"Member when interracial marriage wasnt legal?†[1] are racist comments relatable to Americans. Similarly, sexist jokes about women being not funny and irrational are constantly made throughout the season, such as â€Å"Whats the one thing women dont have? Semen and a sense of humor.† Not only in one or two seasons but throughout all airings of South Park, offensive jokes or remarks and extended use of slurs and foul languages often appear in the show . Since it is considered as an â€Å"Adult-only† sitcom, viewer automatically considers them to be only for comical effects. The overuse of offensive jokes with the excuse of â€Å"only for comedic effects† slowly dulls viewer’s negative feelings on the violations of social taboos, by creating the myth of not needing to take violations of social taboos seriously if it’s comical. With long-term exposure of such remarks and language, viewers are unconsciously brainwashed into the acceptance of transgression, believing that it’s not a serious problem. South Park fulfills the viewers’ needs of expressing and reflecting on social issues or problems through the fictional characters’ highly-relatable expressions on up-to-date topics, which my decrease the viewers’ need of expressing themselves in real life. According to Fiske, â€Å"Cartoons and comedies frequently invert normal relationships and show the adults as incompetent, unable to understand, and the children as superior in insight and ability.†(Television Culture 1992 p.197) South Park uses the same tactic, revolving around four 4th grade boys, Stan Marsh, Kyle Broflovski, Eric Cartman, and Kenny McCormick, and their bizarre adventures. In season 19, the adult’s greed leads to the growing intelligence of online advertisements, while the children are the ones understanding and noticing the problems, being the main force of defeating the â€Å"evil ads† that the adults had created. The reverse in relations are even more vivid in Season 2 0, some adults trolls and bullies people online leading to a potential world war, adults fail to resist the temptation of nostalgia that causes poor decision making, and professionals failed to complete the right formula for the discovery of a new energy; while all the problems are solved with the children’s intelligence and insights. In all episodes of South Park, it’s the children often speaking the truth or intelligence with surreal abilities and ways, while adults are often the ones who cause trouble. As Brain L. Ott had pointed out, â€Å"They are invited to engage the show and the world not as responsible individual adults, but as children at play. Such liberation is an intense but fleeting pleasure because when one turns off South Park, he or she must re-enter the world of social rules and conventions.†(Taking South Park Seriously 2008 p.44) The highly-relatable expressions in the show pleasure the viewer’s need of expressing or reflecting on the s ocial issues and problems they encounter, leading them to believe that their thoughts are similar to concepts and ideas presented by only children with their surreal abilities. And since they are invited to engage the show as children at play, the viewers’ will to express or reflect on those topics are automatically diminished when they turn off South Park. Not realizing that the show had invert the relationships, showing the children to be superior in insight and ability, viewers are tricked into believing in the myth of being a responsible individual adult, is to not fully expressing and voicing out their own thoughts. South Park uses highly-realistic, up-to-date setting and contents but adds in some surreal and imaginary situations. Although the surreal situations on realistic events actually reflect the viewers’ imagination and expectations, the situations often turn out to be delusional or disappointing, which cuts back the viewers’ imagination and expectations on different aspects. The setting and characters are highly relatable and realistic. The show mainly locates in the fictional small town that is within the real-life South Park basin in the Rocky Mountains of central Colorado. There are prominent settings, including bus stops, the local elementary school, even various neighborhoods and the snowy landscape. Actual Colorado landmarks and the shops and businesses along the towns main street, are also prominent and are based on the appearance of similar locations in a real town in Colorado— Fairplay. The choice Colorado is simply because of the creators, Trey Parker and M att Stones origin[2], but the realistic setting made the show easily relatable. The shows do not only create relatable characters but also uses real names and persons, depicting an extremely realistic social setting. Although the show is highly relatable and realistic itself, each episode of South Park opens with a simple disclaimer— †All characters and events in this show—even those based on real people—are entirely fictional. All celebrity voices are impersonated..poorly. The following program contains coarse language and due to its content it should not be viewed by anyone. The comical disclaimers remind viewers of its fictional content while the truth is that most of the content is based off real-time, up-to-date events of since each episode is written and produced during the week preceding its broadcast. Since they are based off real-time events, expectations and imagination of the public on related topics are also depicted, such as the common expecta tion of Americans on NASA having great discoveries on projects of Mars, or the wish of having a peaceful cyber-community. Just like all the other common depiction of dreams or expectations, the expectation on great discoveries of Mars as well as the dream a peaceful cyber-community turns out to be dilution and disappointing in South Park Season 20, since the project on bringing mankind to Mars is destructed by an explosion and first mail of the newly built cyber-community is still about trolling. Both situations is a common imagination or expectation of the public, but through the mixing up of realistic characteristics with scripted delusional outcome, viewers might unconsciously expect the same delusional outcome in real life. They might cut back their own imagination and expectations on different aspects, believing in the myth that imaginations and expectations will always end up as a disappointment. â€Å"One learns how to watch South Park as surely as one learns how to take in Shakespeare (we learn for instance that Kyle is almost always right and Cartman is almost always wrong; that if Kenny dies, he most likely will be back again in the next episode; that Chef’s advice invariably has more to do with libido than with the actual problem at hand, and so forth)† (Taking South Park Seriously 2008 p.19) Ironically similar to the hidden rules among the characters in South Park as well as the show itself being an American animated sitcom, South Park is actually a scripted fiction that tricks us into benefiting the more powerful members of the society. The show slowly shapes the viewers into an easier public for mass media and governance through the myths hidden in the show itself, causing viewers to be more accepting on transgression, being less criticising on social issues, and being less sensitive to the cutting back of imagination or expectations. And by simply putti ng on a disclaimer and listing itself as a satirical American animated sitcom for adult viewers only, South Park can protect itself from all the possible critics with the expectation of the viewers themselves.

Wednesday, November 20, 2019

Material Selection Case Study Essay Example | Topics and Well Written Essays - 2750 words

Material Selection Case Study - Essay Example The outcome is that presently golf clubs have been developed that perfectly suit each of the aforementioned groups. It is now even possible to customize the manufacturing of these kits to satisfy individual taste, preferences and financial strength. Golf manufacturers have been able to satisfy their customers, largely because of the wide array of materials available for use. Through research and development, new materials or new combinations of existing ones have been unearthed to develop even better fitted kits. A recent study by Peterson (2003) has revealed the extent to which technology and material selection for that matter, has contributed in boosting golfer player performance over the past 20 years. The author found, for example, that the average driving distance of median tour players has increased by 27.3 yards from 1993 to 2003.The improvement in performance was traced to better golf equipment developed for the game by manufacturers. This report reviews commonly used materials in manufacturing golf clubs. In doing so, it gives plausible reasons why and how they were incorporated as materials into golf clubs. The report concludes with the presentation of some possible materials that could be used in future for manufacturing these equipments. Golf clubs come in various shapes, sizes and colors... The shaft of a golf club measures about 89 to 115 centimeters in length and has a diameter of about 12 millimeters towards the grip end of the club. The most common way of classifying shafts is based on the extent to which they bend when swings of a player are applied to them. On the basis of how they withstand this pressure, they are described as either being stiff or soft. Stiffer shafts facilitate relatively faster swings than their softer counterparts for a given load applied. Generally, the stiffer the shaft, the greater it can potentially impart the ball when struck. However, if it is too stiff, a golfer may not be able to apply enough swing to it for its maximum effect to be manifested. In that case, it leads to a loss of distance coverage. This problem notwithstanding, stiffer shaft gives greater accuracy than their softer counterparts. Materials used for making shafts are steel, graphite fiber, a combination of steel and graphite, among others. The grip is the end of the shaft opposite to the head. It is commonly made from materials such as rubber, synthetic leather, or derivatives of these materials. The third component of a golf club is the club head. This is that part of the club that comes into direct contact with the ball when hit. A golf club head can be made from persimmon or maple wood, metal inpregrenated woods such as titanium or iron or steel woods, among others. 3.0 Materials used in manufacturing golf clubs As already mentioned, various materials are employed in the manufacturing golf clubs. These materials possess unique properties that aid the making of superior and easy to use golf clubs. This section takes a good look at these materials and highlights some

Tuesday, November 19, 2019

Medical Devices Decontamination Essay Example | Topics and Well Written Essays - 1500 words

Medical Devices Decontamination - Essay Example s a very familiar threat of getting exposed to a number of unrevealed microorganisms that reprocessing staffs’ bear in the process of cleansing, reprocessing, and sterilization of medical instruments. Washer Disinfectors are designed to reduce the quantity and extent of reprocessing staffs exposure to this danger and make reprocessed medical devices available that are hygienic: harmless for handling, secure for patient care, and become safe at the cheapest cost. (Reichert, 2008, 34) The most favorable cleansing cleaning-reprocessing of medical devices will provide all the requirements needed to disinfect medical devices and sterilize surgical instruments and make surgical instruments harmless to handle, and diminish costs of reprocessing. The "most appropriate series of medical devices Washers Treatments" includes a sequence of mechanical and chemical conducts. (Marimargaret, 2008, 32) Mechanical conducts take account of: chilled water pre-wash using a solution of ultrasonic cleaner, detergent rinse, distilled water washes, and warm air aeration. (Jette and Lambert, 2006, 15) The chemical management involves mixture of enzymatic cleaners, lubricants and surface conditioners. Medical devices automated Washer Disinfectors, executes a pre-wash, ultrasonic (not obligatory), detergent cleaning, high temperature water rinsing, lubrication and at last drying at high temperatures in order to make medical devices methodically clean, free from any dirt or stains and sufficiently lubricate them. It is not possible to make Medical devices sterilized until and unless each and every surface is thoroughly cleaned, before sterilization process, in order to make them free from soil or debris rinse them thoroughly in order to prevent staining. The most appropriate series of treatment at the right time, correct temperature is essential to make medical devices significantly clean and safe for handling. An automated Washer Disinfectors eliminates unwanted debris with the help of

Saturday, November 16, 2019

How Different People Behave in the Presence of Authority Essay Example for Free

How Different People Behave in the Presence of Authority Essay The survey and behavior study was conducted in a finance office branch of the United States military. The office is comprised of both military and civilian employees as well as several different races and nationalities. A short written survey was conducted in order to discover how the military versus civilian personnel behaved in the presence of authority as well as how different races and nationalities behaved in the presence of authority. These surveys were filled out voluntarily and participants were asked not to include their name on their survey in order to remove any identification or bias. However, they were asked to provide information about their military or civilian status. In addition, observations were also recorded after the survey as the employees went about their normal business activities while at least one authority figure was present. The questions asked are as followed: 1. Do you work harder when an authority figure is present? Why or why not? 2. How do you normally respond to authority while on the job? 3. What do authority figures do to motivate you to work harder? 4. What do authority figures do that causes you to not work as hard? 5. What can authority figures do in the future to motivate you? Combined with the observations this survey provided valuable insight into the differences in behavior among civilian and military employees as well as differences across races and nationalities. The most striking discovery was that military personnel appear to be more motivated when in the presence of authority. From a personal standpoint, this phenomenon may be due to the intense training and fear of punishment within the military. Military soldiers and officers are trained to respond immediately to authority and to refrain from questioning authority. At the same time, military personnel cannot be simply fired from a job as civilians are. In the majority of cases, military personnel sign up for a certain amount of time in the military and failing to meet these obligations is much more complicated than just being fired. This is one possible reason why the military employees within this particular finance office respond so positively to authority figures. Further, the written surveys provided additional support for this theory. The military employees overwhelmingly responded that they were more motivated when an authority figure was present. Similarly, the majority of military employees also answered that this was because they wanted to perform well for their immediate boss but that they also wanted to avoid the humiliation that comes with making unnecessary mistakes. The civilian employees also answered that they were more motivated to work harder in the presence of an authority figure. However, their reasoning was most often due to their fear of losing their job if they did not perform well enough. The questions and observations regarding behavior associated with not working as hard also provided some valuable insight into the differences between military and civilian personnel. The military employees reported that they often were much more at ease when an authority figure was not present but that they could never completely let down their guard. Several of those military employees who participated in the study reported that they felt as if someone was always watching them and that any unbecoming behavior would eventually make its way to their commanding officers which would put their rank and position in jeopardy. In contrast, the civilian employees reported being able to joke around and being a little less focused on their work when an authority figure was not present. However, two of those surveyed responded that they were hesitant to engage in this type of behavior in front of military personnel simply because the military employees did not behave in this way. There were also some important differences found among the different races and ethnicities within this particular finance office. For example, there is one Middle Eastern civilian employee who works in the office as well as one Indian civilian. These two employees are very dedicated to their jobs and work very hard to perform well. They are both very respectful of their white bosses and strive to please them at all times. These two employees were not observed engaging in any different types of behavior when authority figures were not present. Instead, they continued their work as if the authority figure was still in the room. Additionally, they were always careful to make eye contact with the person they were speaking with and were also careful to remain respectful at all times. While the white military and civilian officers were also observed to be respectful and dedicated to their work, they were also more likely to be more relaxed when interacting with authority figures. Further, they were also more likely to have relationships with their bosses in the form of questions about their families and activities when not on the clock. The hours that employees work in this particular finance office are from 0730 until 1600. The observations and survey took place within these hours. The written survey was conducted between 0800 and 0900 and the remainder of the day was filled with observations regarding behavior. The observations provided important insight about the differences in motivation in the morning versus towards the end of the work day. In the morning, the employees were observed sitting at their desks, booting up their computers and getting right to work. There was very little interaction among employees beyond casual greetings until lunchtime. As the lunch break approached the employees could be overheard discussing what to do with their time and generally looking forward to a short break. While the employees returned from lunch and returned right to work the atmosphere remained upbeat. The employees engaged in a little more chatter right after lunch and as the end of the work day approached they once again increased their amount of dialogue. However, it was also observed that the amount of talking was significantly less when an authority figure was present than when an authority figure was not present. Further, the white military and civilian employees engaged in more dialogue with each other than did the other races or nationalities. A final interesting and insightful bit of knowledge that was gained from the survey and observations was associated with the last question: â€Å"What can authority figures do in the future to motivate you? † The majority of participants responded that authority figures would motivate them to work harder through incentives. These incentives did not necessarily need to be tangible goods. Instead, most of the participants felt that praising them for a job well done or thanking them for their hard work was sufficient in making them feel valuable. Further, the participants felt that when their work was noticed it was easier to stay motivated because it helped them improve on their weaknesses by using their strengths. The participants responded that when their efforts were noticed and praised they were more willing and motivated to work on their weaknesses without feeling as if they were bad at their jobs. Overall, the employees within this particular finance office were hard working and dedicated to their jobs. They behaved appropriately in the presence of an authority figure and even though they were more relaxed when an authority figure was not present they were still performing their jobs satisfactorily. The military employees displayed more discipline, possibly because of their training. The Middle Eastern and Indian employees were more reserved and less relaxed than the white employees. The authority figures were not surveyed but were observed and it was noticed that they treated all the employees equally but there were slight differences as well. For example, the authority figures were much more reserved when interacting with the Middle Eastern and Indian employees than they were with the white employees, possibly because they were respecting individual differences. Ultimately, the surveys and observations provided information about the differences among military and civilian employees as well as across different races and ethnicities. While there were several differences, it was noted that each member of this office worked diligently and appropriately at all times.

Thursday, November 14, 2019

Essay --

La’Shya Bradford November 10, 2013 Eng 102-H1 Dr Amy Carmines Double Standards â€Å"I am America. I am the part you won't recognize. But get used to me. Black, confident, cocky; my name, not yours; my religion, not yours; my goals, my own; get used to me.† – Muhammad Ali African American women in the workforce have been seen as the lowest percentage in many companies. Corporate America is the toughest for women of color, due to the culture of companies and the value of women to many leaders of these companies. Today I will specifically be talking about Pepsi Corporation and how they could help turn this stereotype around and open the doors to many more African American women. The Pepsi corporation should expand their corporate leaders by increasing the African American women population as an attempt to diversify and highlight to many the value of women of color in corporate America. The history of women has been defined as lower positions of life for ages. Having to take the back seat to male figures has been the way of life for women in general. Since before we could even think back Greeks had the same view of women as we did and still do to some extent. For instance, let's refer to Greek mythology such as The Odyssey. Penelope is the wife of Odysseus and the mother of Telemachus And even though she is queen of Ithaca she has to play the back seat to all men. Even her own son whom she lives with and by his rules due to the absences of her husband and her son age approaching a mans. On page 89 in Homer: The Odyssey Telemachus demonstrates his authority. He says â€Å"So mother, go back to your quarters. Tend to your own task, the distaff and the look, and keep the women working hard as well. As for giving orders, men will see that, but ... ...effective organizational knowledge.. Bring solutions by offering lighter, more diverse ways to help better understand customers. Take steps to ensure that staff is attempting to share useful knowledge that’s relatable and nurturing to the customers. Pay attention to what your employees learn from customers. The Pepsi corporation should expand its corporate leadership by increasing the African American women population as an attempt to diversify and highlight to many about the value of women of color in corporate America. This will help them take away from this stereotype of African American women in the workplace and the value of women in general. This routine can also help Pepsi stay true to its company culture as one of the first companies to open doors for African Americans and the women's community. Their position values will be more respected and recognized.

Monday, November 11, 2019

Professional Career Action Plan Essay

My professional goal is to work behind a desk and computer. I have had serveral different ventures on trying to come up with my professional goal but I see myself being extremely good with computer and importing information into a database. This being said, I can see myself being an administrative assistant and or in the coding and billing field. I have that energy to strive in both professional goals and build with a company as they grow. Both professional fields will consist of me working wtih computers. Either importing (filing) patient information, communicating via computer with other medical personnel, and of course verbally communicating with all parties involved in the case. My professional goals come from me always working with computers. I first thought I would be a computer technician but decided to take my career on a different path because the health care industry will be around for eternity. Both, administrative assistant and coding and billing departments will recommend me to further my education. In either direction that I plan to go I will need more schooling so that my professionals goals are met. My first career goal is to become an Administrative Assistant. An administrative assistant has many of the same duties as a secretary, including typing, filing, answering phones and taking notes at meetings (WiseGEEK, 2014). These are all the things that I enjoy doing and can see myself fitting well in this position. Being a medical adminstrative assistant also includes duties such as managing the day to day operations of a medical facility so that the facility is ran smoothly, verifying patient insurance so that they are billed correctly, providing quality customer service to all patients, and also working in a professional enviornment. My second career goal if all fails with my first goal is to find a position in medical coding and billing. As a medical coding and billing professional, you will review patient medical records and assign codes to diagnoses and procedures performed so the facility can bill insurance and other third party payers (such as Medicare or Medicaid) as well as the patient (Career Step, 2014). To fulffill this career goal I will have to go back to school and obtain at least a certificate in this area. I will need to better understanding the different codings so that I can proper work in this area. In both administrative assistant and medical coding and billing field in the health care industry I currently possess the ability to work with all types of computer software. I am a fast learner when it comes to computers and filing. I have the ability to understand computer software with reporting and emailing, I am a self starter, committed to self study to further professional developments, I have excellent troubleshooting skill, I enjoy seeing projects through from inception to completion, I am upbeat and friendly, I can easily adapt to new enviornments and changing priorities, I have excellent memory and attention to detail, I have also worked in a strong professional background. Softwares that I have the ability to manage with no assistance are: Microsoft Word, Microsoft Power Point, and Microsoft Excel. I am very comfortable using these softwares and I have tons of experience doing so. I am extremely confident with the softwares that I have the ability to use and I am willing to learn other software programs if they will benefit me in my career path. Note taking is another skill. In my current employment I am writing all day. I have to notate my daily task with patients when they are under my care. In an administrative assistant position I will be taking notes when needed to better Communication is a skill that would definitely need to change in either one of my career goals. Communicating with patients, physicians, nurses, and also insurance companies is a strong skill that need to be possessed in both fields. I am not a big communicator but I have the ability to speak when needed. I would like to change this skill because it can get me further on  my journey to reach my career goals. A skill of mine that could be altered would be my computer skills. Even though I am fluent with computer technology there may be a way that I am processing information that is not actually the correct way or the shortess way of doing so. I am proficient in many computer software program but I am sure that I could be taught and grasp information different seeing though that I have no professional experience working with computers in a big indusrty. Another skill that can be altered is my ability to work in groups if needed. I am a self starter and prefer to work alone on projects but I am more than capable of working with others on big projects. I am opinionated especially when it comes to a group project where my job may be on the line. All in all there are many skills that could be changed and or altered depending on the professional career direction that I consider to go in. To ultimately achieve my professionals goals it will take up to at least two years. I will be completing my bachelors degree in the next two months but will have to return back to school to obtain another degree and or just a certificate. Even after obtain all my degrees and certificates I would like to do an internship so that I can have that professional feel, seeing that I have no experience in either position. I would most likely physicially go into a school for further education with coding and billing. This is because I think I would be able to grasp the information a little better knowing there will be many codes for different areas of concern. I have someone that I am very close to in the coding and billing field so it is very possible that I can speak with them further about their experience. This may also determine if I want to go in that direction. During this time I will consider in which direction I want to go whether it is an administrative assistant and or in the coding and fielding field. Either way I see it taking some time so that I can fully understand and grasp the knowledge of both fields. Volunteering would be another way that would be beneficial to ultimately achieving my long term professional goals. In order  to do this I will need to verbally communicate and do major research on organization in my area that would accomidate my needs to help me grow. In my area, there are many professional organization that can help to achieve my professional goals. Even with my current employer, although I work as a caregiver, they would give me the opportunity to work within the office doing volunteer work and or even helping me with questions that I may have about my career goal. I could also do some research for hospitals in my area that offer internships so that I could get that feel of exactly what it is that I will be doing. There are health care organization such as hospitals, clinics within the hospital, and clinics within the city along with multiple dental clinics. Having all these health care organizations around would help to benefit me. My career action plan outline provides beneficial reasoning to which direction I will probably head into. Being able to see the outcome of each career goal and what they offer will help me in the next few month determine which career path I will take. The outline defined each awareness that I may have while analyzing the job descriptions for each career. At the end of my bachelors program I will have some better insight in which direction I want to go in so that I can enroll in a traditional school for further education. While obtaining my degree and or certificate I will start researhing organization that will allow me to intership. Once I have fully obtained what is need, with the intership I will hopefully have landed a position either with the same organization or with another organization close by. References Career Step (2014). Job Description. Retrieved on February 1, 2014 from http://www.careerstep.com/medical-billing-coding-job-description WiseGEEK (2014). What Is an Administrative Assistant? Retrieved on February 1, 2014 from http://www.wisegeek.com/what-is-an-administrative-assistant.htm

Saturday, November 9, 2019

Essay for Speech Outline About Friendship

MICROSOFT SOFTWARE LICENSE TERMS WINDOWS VISTA HOME BASIC SERVICE PACK 1 WINDOWS VISTA HOME PREMIUM SERVICE PACK 1 WINDOWS VISTA ULTIMATE SERVICE PACK 1 These license terms are an agreement between you and  ·the device manufacturer that distributes the software with the device, or  ·the software installer that distributes the software with the device. Please read them. They apply to the software named above, which includes the media on which you received it, if any. Printed-paper license terms, which may come with the software take the place of any on-screen license terms. The terms also apply to any Microsoft updates,  ·supplements,  ·Internet-based services, and  ·support services for this software, unless other terms accompany those items. If so, those terms apply. Some of the terms have changed since the initial release of Windows Vista. The changes include:  ·details about the number of service connections available  ·additional information about the activation and validation functions of the software, which determine whether the software is counterfeit, improperly licensed or a non-genuine Windows product  ·additional privacy disclosures about Internet-based services  ·description of rights for specific-geographic softwareThis list highlights some of those changes. The terms below govern your use of the software. If you obtain updates or supplements directly from Microsoft, Microsoft, and not the manufacturer or installer, licenses those to you. By using the software, you accept these terms. If you do not accept them, do not use the software. Instead, contact the manufacturer or installer to determine their return policy for a refund or credit.. As described below, using the software also operates as your consent to the transmission of certain computer information during activation, validation and for Internet-based services.If you comply with these license terms, you have the rights below for each license you acquire. 1. OVERVIEW a. Sof tware. The software includes desktop operating system software. This software does not include Windows Live services. Windows Live is a service available from Microsoft under a separate agreement. b. License Model. The software is licensed on a per copy per device basis. c. Edition Specific Rights. See the Additional License Terms sections at the end of this agreement for license terms that apply to specific editions of the software. . INSTALLATION AND USE RIGHTS. The software license is permanently assigned to the device with which you acquired the software. That device is the â€Å"licensed device. † A hardware partition or blade is considered to be a separate device. a. Licensed Device. You may install one copy of the software on the licensed device. You may use the software on up to two processors on that device at one time. You may not use the software on any other device. b. Number of Users.Except as provided in the Device Connections (all editions), Remote Access Techn ologies (Home Basic and Home Premium editions) and Other Access Technologies (Ultimate edition) sections below, only one user may use the software at a time. c. Alternative Versions. The software may include more than one version, such as 32-bit and 64-bit. You may use only one version at one time. If the manufacturer or installer provides you with a one-time selection between language versions, you may use only the one language version you select. 3. ADDITIONAL LICENSING REQUIREMENTS AND/OR USE RIGHTS. . Multiplexing. Hardware or software you use to  ·pool connections, or  ·reduce the number of devices or users that directly access or use the software (sometimes referred to as â€Å"multiplexing† or â€Å"pooling†), does not reduce the number of licenses you need. b. Font Components. While the software is running, you may use its fonts to display and print content. You may only  ·embed fonts in content as permitted by the embedding restrictions in the fonts; and  ·temporarily download them to a printer or other output device to print content. . Icons, images and sounds. While the software is running, you may use but not share its icons, images, sounds, and media. 4. MANDATORY ACTIVATION. Activation associates the use of the software with a specific device. During activation, the software will send information about the software and the device to Microsoft. This information includes the version, language and product key of the software, the Internet protocol address of the device, and information derived from the hardware configuration of the device.For more information, see http://go. microsoft. com/fwlink/? Linkid=96549. By using the software, you consent to the transmission of this information. If properly licensed, you have the right to use the version of the software installed during the installation process up to the time permitted for activation. Unless the software is activated, you have no right to use the software after the time permitted for activation. This is to prevent its unlicensed use. You are not permitted to bypass or circumvent activation.If the device is connected to the Internet, the software may automatically connect to Microsoft for activation. You can also activate the software manually by Internet or telephone. If you do so, Internet and telephone service charges may apply. Some changes to your computer components or the software may require you to reactivate the software. The software will remind you to activate it until you do. 5. VALIDATION. a. Validation verifies that the software has been activated and is properly licensed.It also verifies that no unauthorized changes have been made to the validation, licensing, or activation functions of the software. Validation may also check for certain malicious or unauthorized software related to such unauthorized changes. A validation check confirming that you are properly licensed permits you to continue to use the software, certain features of the software or to obtain additional benefits. You are not permitted to circumvent validation. This is to prevent unlicensed use of the software. For more information, see ttp://go. microsoft. com/fwlink/? Linkid=96550. b. The software will from time to time perform a validation check of the software. The check may be initiated by the software or Microsoft. To enable the activation function and validation checks, the software may from time to time require updates or additional downloads of the validation, licensing or activation functions of the software. The updates or downloads are required for the proper functioning of the software and may be downloaded and installed without further notice to you.These updates and downloads may be delivered to you through the Windows Update service (if you use the service) or through other means. During or after a validation check, the software may send information about the software, the device and the results of the validation check to Microsof t. This information includes, for example, the version and product key of the software, any unauthorized changes made to the validation, licensing or activation functions of the software, any related malicious or unauthorized software found and the Internet protocol address of the device.Microsoft does not use the information to identify or contact you. By using the software, you consent to the transmission of this information. For more information about validation and what is sent during or after a validation check, see http://go. microsoft. com/fwlink/? Linkid=96551. c. If, after a validation check, the software is found to be counterfeit, improperly licensed, a non-genuine Windows product, or includes unauthorized changes, the functionality and experience of using the software will be affected, for example: Microsoft may repair the software, remove, quarantine or disable any unauthorized changes that may interfere with the proper use of the software, including circumvention of th e activation or validation functions of the software, or  ·check and remove malicious or unauthorized software known to be related to such unauthorized changes, or  ·provide notice that the software is improperly licensed or a non-genuine Windows product and you may  ·receive reminders to obtain a properly licensed copy of the software, or  ·need to follow Microsoft’s instructions to be licensed to use the software and reactivate, and you may not be able to use or continue to use the software or some of the features of the software, or  ·obtain certain updates or upgrades from Microsoft d. You may only obtain updates or upgrades for the software from Microsoft or authorized sources. For more information on obtaining updates from authorized sources see http://go. microsoft. com/fwlink/? Linkid=96552. 6. POTENTIALLY UNWANTED SOFTWARE. If turned on, Windows Defender will search your computer for â€Å"spyware,† â€Å"adware† and other potentially unwanted software. If it finds potentially unwanted software, the software will ask you if you want to ignore, disable (quarantine) or remove it.Any potentially unwanted software rated â€Å"high† or â€Å"severe,† will automatically be removed after scanning unless you change the default setting. Removing or disabling potentially unwanted software may result in  ·other software on your computer ceasing to work, or  ·your breaching a license to use other software on your computer. By using this software, it is possible that you will also remove or disable software that is not potentially unwanted software. 7. INTERNET-BASED SERVICES. Microsoft provides Internet-based services with the software. It may change or cancel them at any time. a.Consent for Internet-Based Services. The software features described below and in the Windows Vista Privacy Statement connect to Microsoft or service provider computer systems over the Internet. In some cases, you will not receive a separa te notice when they connect. You may switch off these features or not use them. For more information about these features, see the Windows Vista Privacy Statement at http://go. microsoft. com/fwlink/? linkid=96553. By using these features, you consent to the transmission of this information. Microsoft does not use the information to identify or contact you.Computer Information. The following features use Internet protocols, which send to the appropriate systems computer information, such as your Internet protocol address, the type of operating system, browser and name and version of the software you are using, and the language code of the device where you installed the software. Microsoft uses this information to make the Internet-based services available to you.  ·Plug and Play. You may connect new hardware to your device. Your device may not have the drivers needed to communicate with that hardware.If so, the update feature of the software can obtain the correct driver from Micr osoft and install it on your device. An administrator can disable this update feature.  ·Windows Update. To enable the proper functioning of the Windows Update service in the software (if you use it), updates or downloads to the Windows Update service will be required from time to time and downloaded and installed without further notice to you.  ·Web Content Features. Features in the software can retrieve related content from Microsoft and provide it to you.Examples of these features are clip art, templates, online training, online assistance and Appshelp. You may choose not to use these web content features.  ·Digital Certificates. The software uses digital certificates. These digital certificates confirm the identity of Internet users sending X. 509 standard encrypted information. They also can be used to digitally sign files and macros, to verify the integrity and origin of the file contents. The software retrieves certificates and updates certificate revocation lists over the Internet, when available.  ·Auto Root Update.The Auto Root Update feature updates the list of trusted certificate authorities. You can switch off the Auto Root Update feature.  ·Windows Media Digital Rights Management. Content owners use Windows Media digital rights management technology (WMDRM) to protect their intellectual property, including copyrights. This software and third party software use WMDRM to play and copy WMDRM-protected content. If the software fails to protect the content, content owners may ask Microsoft to revoke the software’s ability to use WMDRM to play or copy protected content.Revocation does not affect other content. When you download licenses for protected content, you agree that Microsoft may include a revocation list with the licenses. Content owners may require you to upgrade WMDRM to access their content. Microsoft software that includes WMDRM will ask for your consent prior to the upgrade. If you decline an upgrade, you will not be able to access content that requires the upgrade. You may switch off WMDRM features that access the Internet. When these features are off, you can still play content for which you have a valid license.  ·Windows Media Player.When you use Windows Media Player, it checks with Microsoft for  ·compatible online music services in your region;  ·new versions of the player; and  ·codecs if your device does not have the correct ones for playing content. You can switch off this last feature. For more information, go to http://go. microsoft. com/fwlink/? linkid=44073.  ·Malicious Software Removal/Clean On Upgrade. Before installation of the software, the software will check and remove certain malicious software listed at http://www. support. microsoft. com/? kbid=890830 (â€Å"Malware†) from your device.When the software checks your device for Malware, a report will be sent to Microsoft about any Malware detected or errors that occurred while the software was checking for Malware . No information that can be used to identify you is included in the report. You may disable the software’s Malware reporting functionality by following the instructions found at http://www. support. microsoft. com/? kbid=890830.  ·Network Connectivity Status Icon. This feature determines whether a system is connected to a network by either passive monitoring of network traffic or active DNS or HTTP queries.The query only transfers standard TCP/IP or DNS information for routing purposes. You can switch off the active query feature through a registry setting.  ·Windows Time Service. This service synchronizes with time. windows. com once a week to provide your computer with the correct time. You can turn this feature off or choose your preferred time source within the Date and Time Control Panel applet. The connection uses standard NTP protocol.  ·IPv6 Network Address Translation (NAT) Traversal service (Teredo).This feature helps existing home Internet gateway devices tr ansition to IPv6. IPv6 is next generation Internet protocol. It helps enable end-to-end connectivity often needed by peer-to-peer applications. To do so, each time you start up the software the Teredo client service will attempt to locate a public Teredo Internet service. It does so by sending a query over the Internet. This query only transfers standard Domain Name Service information to determine if your computer is connected to the Internet and can locate a public Teredo service. If you  ·use an application (e. . Windows Meeting Space) that needs IPv6 connectivity or  ·configure your firewall to always enable IPv6 connectivity by default standard Internet Protocol information will be sent to the Teredo service at Microsoft at regular intervals. No other information is sent to Microsoft. You can change this default to use non-Microsoft servers. You can also switch off this feature using a command line utility named â€Å"netsh†. b. Use of Information. Microsoft may use the computer information, error reports, and Malware reports to improve our software and services.We may also share it with others, such as hardware and software vendors. They may use the information to improve how their products run with Microsoft software. c. Misuse of Internet-based Services. You may not use these services in any way that could harm them or impair anyone else’s use of them. You may not use the services to try to gain unauthorized access to any service, data, account or network by any means. 8. SCOPE OF LICENSE. The software is licensed, not sold. This agreement only gives you some rights to use the software. The manufacturer or installer and Microsoft reserve all other rights.Unless applicable law gives you more rights despite this limitation, you may use the software only as expressly permitted in this agreement. In doing so, you must comply with any technical limitations in the software that only allow you to use it in certain ways. For more information, see the software documentation. You may not  ·work around any technical limitations in the software;  ·reverse engineer, decompile or disassemble the software, except and only to the extent that applicable law expressly permits, despite this limitation;  ·use components of the software to run applications not running on the software; make more copies of the software than specified in this agreement or allowed by applicable law, despite this limitation;  ·publish the software for others to copy;  ·rent, lease or lend the software; or  ·use the software for commercial software hosting services. 9. MICROSOFT . NET BENCHMARK TESTING. The software includes one or more components of the . NET Framework (â€Å". NET Components†). You may conduct internal benchmark testing of those components. You may disclose the results of any benchmark test of those components, provided that you comply with the conditions set forth at http://go. microsoft. com/fwlink/? LinkID=66406.No twithstanding any other agreement you may have with Microsoft, if you disclose such benchmark test results, Microsoft shall have the right to disclose the results of benchmark tests it conducts of your products that compete with the applicable . NET Component, provided it complies with the same conditions set forth at http://go. microsoft. com/fwlink/? LinkID=66406. 10. BACKUP COPY. You may make one backup copy of the media. You may use it only to reinstall the software. 11. DOCUMENTATION. Any person that has valid access to your computer or internal network may copy and use the documentation for your internal, reference purposes. 2. NOT FOR RESALE SOFTWARE. You may not sell software marked as â€Å"NFR† or â€Å"Not for Resale. † 13. GEOGRAPHIC RESTRICTIONS. If the software is marked as requiring activation in a specific geographic region, then you are only permitted to activate this software in the geographic region indicated on the software or device packaging. You may not be able to activate the software outside of that region. For further information on geographic restrictions, visit http://go. microsoft. com/fwlink/? LinkId=99189. 14. UPGRADES. To use upgrade software, you must first be licensed for the software that is eligible for the upgrade.Upon upgrade, this agreement takes the place of the agreement for the software you upgraded from. After you upgrade, you may no longer use the software you upgraded from. 15. PROOF OF LICENSE. a. Genuine Proof of License. If you acquired the software on a device or on a disc or other media, a genuine Microsoft Certificate of Authenticity label with a genuine copy of the software identifies licensed software. To be valid, this label must be affixed to the device or appear on the manufacturer’s or installer’s packaging. If you receive the label separately, it is invalid.You should keep the label on the device or the packaging that has the label on it to prove that you are licensed to use the software. If the device comes with more than one genuine Certificate of Authenticity label, you may use each version of the software identified on those labels. b. Windows Anytime Upgrade License. If you upgrade the software using Windows Anytime Upgrade, your proof of license is identified by  ·the genuine Microsoft Certificate of Authenticity label for the software you upgraded from, and  ·the genuine Microsoft proof of purchase label from a Windows Anytime Upgrade Kit you used to upgrade c.To identify genuine Microsoft software, see http://www. howtotell. com. 16. TRANSFER TO A THIRD PARTY. You may transfer the software directly to a third party only with the licensed device. You may not keep any copies of the software or any earlier version. Before any permitted transfer, the other party must agree that this agreement applies to the transfer and use of the software. The transfer must include the Certificate of Authenticity label. 17. NOTICE ABOUT THE MPEG-4 VISUAL STANDA RD. This software includes MPEG-4 visual decoding technology. MPEG LA, L. L. C. requires this notice:USE OF THIS PRODUCT IN ANY MANNER THAT COMPLIES WITH THE MPEG-4 VISUAL STANDARD IS PROHIBITED, EXCEPT FOR USE DIRECTLY RELATED TO (A) DATA OR INFORMATION (i) GENERATED BY AND OBTAINED WITHOUT CHARGE FROM A CONSUMER NOT THEREBY ENGAGED IN A BUSINESS ENTERPRISE, AND (ii) FOR PERSONAL USE ONLY; AND (B) OTHER USES SPECIFICALLY AND SEPARATELY LICENSED BY MPEG LA, L. L. C. If you have questions about the MPEG-4 visual standard, please contact MPEG LA, L. L. C. , 250 Steele Street, Suite 300, Denver, Colorado 80206; http://www. mpegla. com. 18. NOTICE ABOUT THE VC-1 VISUAL STANDARD.This software may include VC-1 visual decoding technology. MPEG LA, L. L. C. requires this notice: THIS PRODUCT IS LICENSED UNDER THE VC-1 PATENT PORTFOLIO LICENSES FOR THE PERSONAL AND NON-COMMERCIAL USE OF A CONSUMER TO (A) ENCODE VIDEO IN COMPLIANCE WITH THE VC-1 STANDARD (â€Å"VC-1 VIDEO†) OR (B) DECO DE VC-1 VIDEO THAT WAS ENCODED BY A CONSUMER ENGAGED IN A PERSONAL AND NON-COMMERCIAL ACTIVITY AND/OR WAS OBTAINED FROM A VIDEO PROVIDER LICENSED TO PROVIDE VC-1 VIDEO. NO LICENSE IS GRANTED OR SHALL BE IMPLIED FOR ANY OTHER USE. If you have questions about the VC-1 visual standard, please contact MPEG LA, L.L. C. , 250 Steele Street, Suite 300, Denver, Colorado 80206; http://www. mpegla. com. 19. THIRD PARTY PROGRAMS. The software contains third party programs. The license terms with those programs apply to your use of them. 20. EXPORT RESTRICTIONS. The software is subject to United States export laws and regulations. You must comply with all domestic and international export laws and regulations that apply to the software. These laws include restrictions on destinations, end users and end use. For additional information, see http://www. microsoft. com/exporting. 21. SUPPORT SERVICES.Microsoft provides support services for the software as described at http://www. support. microsoft . com/common/international. aspx. If you are using software that is not properly licensed, you will not be entitled to receive support services. 22. ENTIRE AGREEMENT. This agreement (including the warranty below), additional terms (including any printed-paper license terms that accompany the software and may modify or replace some or all of these terms), and the terms for supplements, updates, Internet-based services and support services that you use, are the entire agreement for the software and support services. 3. APPLICABLE LAW. a. United States. If you acquired the software in the United States, Washington state law governs the interpretation of this agreement and applies to claims for breach of it, regardless of conflict of laws principles. The laws of the state where you live govern all other claims, including claims under state consumer protection laws, unfair competition laws, and in tort. b. Outside the United States. If you acquired the software in any other country, the laws of that country apply. 24. LEGAL EFFECT. This agreement describes certain legal rights.You may have other rights under the laws of your state or country. You may also have rights with respect to the party from whom you acquired the software. This agreement does not change your rights under the laws of your state or country if the laws of your state or country do not permit it to do so. 25. LIMITATION ON AND EXCLUSION OF DAMAGES. Except for any refund the manufacturer or installer may provide, you cannot recover any other damages, including consequential, lost profits, special, indirect or incidental damages.This limitation applies to  ·anything related to the software, services, content (including code) on third party Internet sites, or third party programs; and  ·claims for breach of contract, breach of warranty, guarantee or condition, strict liability, negligence, or other tort to the extent permitted by applicable law. It also applies even if  ·repair, replacement or a refund for the software does not fully compensate you for any losses; or  ·Microsoft knew or should have known about the possibility of the damages.Some states do not allow the exclusion or limitation of incidental or consequential damages, so the above limitation or exclusion may not apply to you. They also may not apply to you because your country may not allow the exclusion or limitation of incidental, consequential or other damages. *********************************************************************** LIMITED WARRANTY A. LIMITED WARRANTY. If you follow the instructions and the software is properly licensed, the software will perform substantially as described in the Microsoft materials that you receive in or with the software.B. TERM OF WARRANTY; WARRANTY RECIPIENT; LENGTH OF ANY IMPLIED WARRANTIES. The limited warranty covers the software for 90 days after acquired by the first user. If you receive supplements, updates, or replacement software during those 90 days, they w ill be covered for the remainder of the warranty or 30 days, whichever is longer. If you transfer the software, the remainder of the warranty will apply to the recipient. To the extent permitted by law, any implied warranties, guarantees or conditions last only during the term of the limited warranty.Some states do not allow limitations on how long an implied warranty lasts, so these limitations may not apply to you. They also might not apply to you because some countries may not allow limitations on how long an implied warranty, guarantee or condition lasts. C. EXCLUSIONS FROM WARRANTY. This warranty does not cover problems caused by your acts (or failures to act), the acts of others, or events beyond the reasonable control of the manufacturer or installer, or Microsoft. D. REMEDY FOR BREACH OF WARRANTY.The manufacturer or installer will, at its election, either (i) repair or replace the software at no charge, or (ii) accept return of the product(s) for a refund of the amount paid, if any. The manufacturer or installer may also repair or replace supplements, updates and replacement software or provide a refund of the amount you paid for them, if any. contact the manufacturer or installer about its policy. These are your only remedies for breach of the limited warranty. E. CONSUMER RIGHTS NOT AFFECTED. You may have additional consumer rights under your local laws, which this agreement cannot change. F.WARRANTY PROCEDURES. Contact the manufacturer or installer to find out how to obtain warranty service for the software. For a refund, you must comply with the manufacturer’s or installer’s return policies. G. NO OTHER WARRANTIES. The limited warranty is the only direct warranty from the manufacturer or installer, or Microsoft. The manufacturer or installer and Microsoft give no other express warranties, guarantees or conditions. Where allowed by your local laws, the manufacturer or installer and Microsoft exclude implied warranties of merchantabilit y, fitness for a particular purpose and non-infringement.If your local laws give you any implied warranties, guarantees or conditions, despite this exclusion, your remedies are described in the Remedy for Breach of Warranty clause above, to the extent permitted by your local laws. H. LIMITATION ON AND EXCLUSION OF DAMAGES FOR BREACH OF WARRANTY. The Limitation on and Exclusion of Damages clause above applies to breaches of this limited warranty. This warranty gives you specific legal rights, and you may also have other rights which vary from state to state. You may also have other rights which vary from country to country. MICROSOFT WINDOWS VISTA HOME BASIC SERVICE PACK 1ADDITIONAL LICENSE TERMS. The following additional license terms apply to Microsoft Windows Vista Home Basic. 1. Device Connections. You may allow up to 5 other devices to connect to the software installed on the licensed device to use File Services, Print Services, Internet Information Services and Internet Connect ion Sharing and Telephony Services. However, you may not exceed a total of 5 connections at one time. 2. Remote Access Technologies. You may remotely access and use the software installed on the licensed device from another device to share a session using Remote Assistance or similar technologies.A â€Å"session† means the experience of interacting with the software, directly or indirectly, through any combination of input, output and display peripherals. 3. Other Remote Uses. You may allow any number of devices to access the software installed on the licensed device for purposes other than those described in the Device Connections and Remote Access Technologies sections above, such as to synchronize data between devices. 4. Use with Virtualization Technologies. You may not use the software installed on the licensed device within a virtual (or otherwise emulated) hardware system. MICROSOFT WINDOWS VISTA HOME PREMIUM SERVICE PACK 1ADDITIONAL LICENSE TERMS. The following additi onal license terms apply to Microsoft Windows Vista Home Premium. 1. Device Connections. You may allow up to 10 other devices to connect to the software installed with the licensed device to use File Services, Print Services, Internet Information Services and Internet Connection Sharing and Telephony Services. However, you may not exceed a total of 10 connections at one time. 2. Remote Access Technologies. You may remotely access and use the software installed on the licensed device from another device to share a session using Remote Assistance or similar technologies.A â€Å"session† means the experience of interacting with the software, directly or indirectly, through any combination of input, output and display peripherals. 3. Other Remote Uses. You may allow any number of devices to access the software installed on the licensed device for purposes other than those described in the Device Connections and Remote Access Technologies sections above, such as to synchronize dat a between devices. 4. Use with Virtualization Technologies. You may not use the software installed on the licensed device within a virtual (or otherwise emulated) hardware system. 5. Media Center Extender.You may have 5 Media Center Extender Sessions (or other software or devices which provide similar functionality for a similar purpose) running at the same time to display the software user interface or content on other displays or devices. 6. Electronic Programming Guide. If the software includes access to an electronic programming guide service that displays customized television listings, a separate service agreement applies to the service. If you do not agree to the terms of the service agreement, you may continue to use the software, but you will not be able to use the electronic programming guide service.The service may contain advertising content and related data, which are received and stored by the software. The service is not available in all areas. Please consult the soft ware information for instructions on accessing the service agreement. 7. Related Media Information. If you request related media information as part of your playback experience, the data provided to you may not be in your local language. Some countries or regions have laws and regulations which may restrict or limit your ability to access certain types of content. 8. Consent to Update Infrared Emitter/Receiver.The software may contain technology to ensure the proper functioning of the infrared emitter/receiver device that ships with certain Media Center-based products. By accepting these license terms, you agree that the software may update the firmware of this device. 9. WORLDWIDE USE OF THE MEDIA CENTER. Media Center is not designed for use in every country. For example, although the Media Center information may refer to certain features such as an electronic programming guide or provide information on how to configure a TV tuner, these features may not work in your area.Please re fer to the Media Center information for a list of features that may not work in your area. 10. NOTICE ABOUT THE MPEG-2 VISUAL STANDARD. This software includes MPEG-2 visual decoding technology. MPEG LA, L. L. C. requires this notice: USE OF THIS PRODUCT IN ANY MANNER THAT COMPLIES WITH THE MPEG 2 VISUAL STANDARD IS PROHIBITED, EXCEPT FOR USE DIRECTLY RELATED TO (A) DATA OR INFORMATION (i) GENERATED BY AND OBTAINED WITHOUT CHARGE FROM A CONSUMER NOT THEREBY ENGAGED IN A BUSINESS ENTERPRISE, AND (ii) FOR PERSONAL USE ONLY; AND (B) OTHER USES SPECIFICALLY AND SEPARATELY LICENSED BY MPEG LA, L.L. C. If you have questions about the MPEG-2 visual standard, please contact MPEG LA, L. L. C. , 250 Steele Street, Suite 300, Denver, Colorado 80206; http://www. mpegla. com. MICROSOFT WINDOWS VISTA ULTIMATE SERVICE PACK 1 ADDITIONAL LICENSE TERMS. The following additional license terms apply to Microsoft Windows Vista Ultimate. 1. Device Connections. You may allow up to 10 other devices to conne ct to the software installed on the licensed device to use File Services, Print Services, Internet Information Services and Internet Connection Sharing and Telephony Services.However, you may not exceed a total of 10 connections at one time. 2. Remote Access Technologies. You may access and use the software installed on the licensed device remotely from another device using remote access technologies as follows.  ·Remote Desktop. The single primary user of the licensed device may access a session from any other device using Remote Desktop or similar technologies. A â€Å"session† means the experience of interacting with the software, directly or indirectly, through any combination of input, output and display peripherals.Other users may access a session from any device using these technologies, if the remote device is separately licensed to run the software.  ·Other Access Technologies. You may use Remote Assistance or similar technologies to share an active session. 3. O ther Remote Uses. You may allow any number of devices to access the software installed on the licensed device for purposes other than those described in the Device Connections and Remote Access Technologies sections above, such as to synchronize data between devices. 4. Use with Virtualization Technologies.You may use the software installed on the licensed device within a virtual (or otherwise emulated) hardware system on the licensed device. If you do so, you may not play or access content or use applications protected by any Microsoft digital, information or enterprise rights management technology or other Microsoft rights management services or use BitLocker. We advise against playing or accessing content or using applications protected by other digital, information or enterprise rights management technology or other rights management services or using full volume disk drive encryption. 5. Media Center Extender.You may have 5 Media Center Extender Sessions (or other software or d evices which provide similar functionality for a similar purpose) running at the same time to display the software user interface or content on other displays or devices. 6. Electronic Programming Guide. If the software includes access to an electronic programming guide service that displays customized television listings, a separate service agreement applies to the service. If you do not agree to the terms of the service agreement, you may continue to use the software, but you will not be able to use the electronic programming guide service.The service may contain advertising content and related data, which are received and stored by the software. The service is not available in all areas. Please consult the software information for instructions on accessing the service agreement. 7. Related Media Information. If you request related media information as part of your playback experience, the data provided to you may not be in your local language. Some countries or regions have laws and regulations which may restrict or limit your ability to access certain types of content. 8. Consent to Update Infrared Emitter/Receiver.The software may contain technology to ensure the proper functioning of the infrared emitter/receiver device that ships with certain Media Center-based products. By accepting these license terms, you agree that the software may update the firmware of this device. 9. Worldwide Use Of The Media Center. Media Center is not designed for use in every country. For example, although the Media Center information may refer to certain features such as an electronic programming guide or provide information on how to configure a TV tuner, these features may not work in your area.Please refer to the Media Center information for a list of features that may not work in your area. 10. NOTICE ABOUT THE MPEG-2 VISUAL STANDARD. This software includes MPEG-2 visual decoding technology. MPEG LA, L. L. C. requires this notice: USE OF THIS PRODUCT IN ANY MANNER THAT C OMPLIES WITH THE MPEG 2 VISUAL STANDARD IS PROHIBITED, EXCEPT FOR USE DIRECTLY RELATED TO (A) DATA OR INFORMATION (i) GENERATED BY AND OBTAINED WITHOUT CHARGE FROM A CONSUMER NOT THEREBY ENGAGED IN A BUSINESS ENTERPRISE, AND (ii) FOR PERSONAL USE ONLY; AND (B) OTHER USES SPECIFICALLY AND SEPARATELY LICENSED BY MPEG LA, L.L. C. If you have questions about the MPEG-2 visual standard, please contact MPEG LA, L. L. C. , 250 Steele Street, Suite 300, Denver, Colorado 80206; http://www. mpegla. com. 11. DOWNGRADE. Instead of using the software, you may use one of the following earlier versions:  ·Microsoft ® Windows ® XP Professional,  ·Microsoft ® Windows ® Professional x64 Edition, or  ·Microsoft ® Windows ® XP Tablet PC Edition. This agreement applies to your use of the earlier versions.If the earlier version includes different components, any terms for those components in the agreement that comes with the earlier version apply to your use of them. Neither the manufac turer or installer, nor Microsoft is obligated to supply earlier versions to you. You must obtain the earlier version separately. At any time, you may replace an earlier version with this version of the software. EULAID:VistaSP1_R1. 0_CONSUMER_OEM_en-US

Thursday, November 7, 2019

Cluster Analysis

Cluster Analysis Cluster analysis is a statistical technique used to identify how various units like people, groups, or societies can be grouped together because of characteristics they have in common. Also known as clustering, it is an exploratory data analysis tool that aims to sort different objects into groups in such a way that when they belong to the same group they have a maximal degree of association and when they do not belong to the same group their degree of association is minimal. Unlike some other statistical techniques, the structures that are uncovered through cluster analysis need no explanation or interpretation – it discovers structure in the data without explaining why they exist. What Is Clustering? Clustering exists in almost every aspect of our daily lives. Take, for example, items in a grocery store. Different types of items are always displayed in the same or nearby locations – meat, vegetables, soda, cereal, paper products, etc. Researchers often want to do the same with data and group objects or subjects into clusters that make sense. To take an example from social science, let’s say we are looking at countries and want to group them into clusters based on characteristics such as division of labor, militaries, technology, or educated population. We would find that Britain, Japan, France, Germany, and the United States have similar characteristics and would be clustered together. Uganda,  Nicaragua, and Pakistan would be also be grouped together in a different cluster because they share a different set of characteristics, including low levels of wealth, simpler divisions of labor, relatively unstable and undemocratic political institutions, and low technological development. Cluster analysis is typically used in the exploratory phase of research when the researcher does not have any pre-conceived hypotheses. It is commonly not the only statistical method used, but rather is done in the early stages of a project to help guide the rest of the analysis. For this reason, significance testing is usually neither relevant nor appropriate. There are several different types of cluster analysis. The two most commonly used are K-means clustering and hierarchical clustering. K-means Clustering K-means clustering treats the observations in the data as objects having locations and distances from each other (note that the distances used in clustering often do not represent spatial distances). It partitions the objects into K mutually exclusive clusters so that objects within each cluster are as close to each other as possible and at the same time, as far from objects in other clusters as possible. Each cluster is then characterized by its mean or center point. Hierarchical Clustering Hierarchical clustering is a way to investigate groupings in the data simultaneously over a variety of scales and distances. It does this by creating a cluster tree with various levels. Unlike K-means clustering, the tree is not a single set of clusters. Rather, the tree is a multi-level hierarchy where clusters at one level are joined as clusters at the next higher level. The algorithm that is used starts with each case or variable in a separate cluster and then combines clusters until only one is left. This allows the researcher to decide what level of clustering is most appropriate for his or her research. Performing A Cluster Analysis Most statistics software programs can perform cluster analysis. In SPSS, select analyze from the menu, then classify and cluster analysis. In SAS, the proc cluster function can be used. Updated by Nicki Lisa Cole, Ph.D.

Monday, November 4, 2019

Centex Corporation Firm Analysis Essay Example | Topics and Well Written Essays - 500 words

Centex Corporation Firm Analysis - Essay Example Decrease in the customer's affordability for initiating buying inventory. Customers were in a mood to lay off the inventory to overcome the mortgage demands. The high inventory costs to bear with have depleted the market from selling. Thus, there were very few takers for the inventory and lots of unsold inventory was left with no takers. The decrease in buying and selling was due to low confidence levels of the customers who were affected by the adverse market conditions. Due to the financial markets turmoil, customers are ambiguous to venture out to buy new properties. Many prospective customers who are willing to buy new homes were made to shelve their ideas as they were unable to dispose their existing properties. Due to severe mortgage lending crunch and financial institutions tightening the screws to lend loans has created difficult times for customers to take loans. The above depicted issues with respect to customers have affected Centex's housing. Revenues of centex decreased primarily due to decreases in units closed, and the revenues are largely offset by increases in discounts and lower prices experienced. The total closing numbers on sales decreased by 18 percent and total revenue decreased by 32 percent compare to 2007 and 2006 (builder 100). High competitions in the market as customers were trying to sell off their old inventory due to mortgage debt pressures.

Saturday, November 2, 2019

History of the development of the Apple Newton Case Study

History of the development of the Apple Newton - Case Study Example It was believed that the invention of Newton would be of great significance to the users. Unlike the traditional desktop, it would be much portable and easier to carry wherever one goes. This would be possible due to the fact that it was to be smaller with a size 8.27† X 11.7†. In other words, it would be the size of a folded A4 sheet which is fairly efficient and can be handled by an individual much easily. Besides, it would be more preferable as it was to be equipped with a special user interface along side a cursive handwriting. These are features that were believed to make Newton be the only gadget of choice for everyone who would be interested in having a taste of personal computer. With enough resources, the management of Apple Inc would support its engineers and programmers to conduct an extensive research as they developed this product. Because of such a support, the development of the product began in a high speed. At first, they introduced a brand called Figaro which was having the size of A4. After its launching, it was valued to be worth $6,000. It was a very admirable product with a large format screen, object-oriented graphics and a well-developed internal memory. Because of such developments, the company managed to realize large volumes of sales and increased profit gins up to the later years. However, as fate would have it, the development of Newton would be discontinued in 1987 when the company realized that it would not be viable at all. Despite realizing a profit of $2 billion between 1987 and 1989, the company did not realize any success thereafter up to 1990. The other reason for the death of this product was the rise of Sakoman and Macintosh Classic, rival commodities which posed a very great challenge to its progress. Moreover, the company faced a stiff competition from other established firms such as Dell, Compaq and Gateway which introduced complementary products