Sunday, December 29, 2019

Present Perfect Tense in Spanish

Despite its name, the present perfect tense in Spanish (and English as well) is used to refer to events that happened in the past. Its use in Spanish can be tricky, however, because its usage varies with region and it sometimes is used in slightly different ways than it is in English. In Spanish, the present perfect tense is formed by the present tense of haber followed by the past participle. (In English its the present tense of to have followed by the past participle.) It generally indicates that an action has been completed that has some bearing on the present. Forms of Present Perfect Tense Here are the forms in which the present perfect would be stated. Pronouns are included here for clarity but often arent necessary: yo he past participle (I have ...)tà º has past participle (you have ...)usted/à ©l/ella ha past participle (you have, he/she has ...)nosotros/nosotras hemos past participle (we have ...)vosotros/vosotras habà ©is past participle (you have ...)ustedes/ellos/ellas han past participle (you have, they have ...) Note that while in English, as in some of the examples above, it is possible to separate the have from the past participle, in Spanish you normally dont separate  haber  from participles. However, if haber applies to two participles, the second haber can be omitted, as in the second sample sentence below. Sample Sentences Here are some examples of sentences using the present perfect tense along with the way theyd most commonly be translated: Me he comprado una esponja rosa. (I have bought a pink sponge.) ¡Es lo mejor que he visto y escuchado en mi vida! (Its the best thing I have seen and heard in my life!) ¿Alguna vez has hablado con las ranas a medianoche? (Have you talked with the frogs at midnight?)Todos lo hemos pensado. (All of us have thought it.)Minerva ha conocido ya a los padres de su novio. (Minerva has already met her boyfriends parents.)Siempre he anhelado tener un metabolismo con el cual pueda comer lo que quiera. (I have always wanted to have a metabolism that would let me eat whatever I want.)Hay videojuegos que han hecho historia. (There are video games that have made history.)He leà ­do y acepto la polà ­tica de privacidad. (I have read and I accept the privacy policy.) Subjunctive Use The subjunctive present perfect functions in much the same way: Mi amiga niega que su madre haya comprado un regalo para el perro. (My friend denies that her mother has bought a gift for the dog.)Titular: 14 piscinas que no se parecen a nada que hayas visto antes. (Headline: 14 swimming pools that dont seem like anything you have seen before.)Es probable que hayan escondido micrà ³fonos en la casa y està ©n escuchando nuestras conversaciones. (It is likely that they have hidden microphones in the house and are listening to our conversations.)El la eleccià ³n mà ¡s sucia que hayamos conocido en los à ºltimos tiempos. (It is the dirtiest election that we have known in recent times.) Present Perfect With Meaning of the Preterite You should be aware, however, that the Spanish present perfect tense should not always be thought of as the equivalent of the English present perfect tense. In many regions, it can be used as the equivalent of the English simple past tense. Sometimes the context will make this clear: Ha llegado hace un rato. (She arrived a little bit ago.)Cuando lo he visto no he podido creerlo. (When I saw it I couldnt believe it.)Leo la carta que me han escrito esta maà ±ana. (I am reading the letter they wrote to me this morning.)Esta maà ±ana he estado en Madrid. (This morning I was in Madrid.) But even where the context doesnt dictate so, the present perfect can be the equivalent of the English preterite, also known as the simple past. This is especially true for events that occurred very recently. Youre also more likely to hear the present perfect used in this way in Spain than in most of Latin America, where the preterite may be preferred (e.g., llegà ³ hace un rato). Key Takeaways The present perfect tense is formed by following the present tense of haber with a past participle.No words should intervene between haber and the participle.The Spanish present perfect sometimes is used to indicate than an action recently took place rather than merely that it has occurred.

Friday, December 20, 2019

Emotional Intelligence And Speech Pathology Students

INTRODUCTION Therapy students, including those studying occupational therapy, physiotherapy and speech pathology, often experience difficulties during clinical placements in the final stages of their university program. These difficulties are occasionally so pronounced that students fail their clinical placements REF. The difficulties during clinical placements are related to a range of underlying reasons including underdeveloped communication, interpersonal, intrapersonal and social skills interacting with colleagues and patients (REF). The authors reasoned that a reason for these difficulties may be that therapy students’ emotional intelligence is under-developed when these clinical placements commence. For the purpose of this study, the following hypothesis was proposed: Hypothesis 1: The emotional intelligence scores for 3rd year occupational therapy, physiotherapy and speech pathology students, before they commence full-time clinical placements that, will be lower than the population norms. Although healthcare settings are similar, the competencies required of occupational therapy, physiotherapy and speech pathology students differs between each of the three professions REF. As such, the professionals may attract students with similar but varying personal attributes. Different groups of professionals have been shown to have differing emotional intelligence profiles (REF). The authors reasoned that there would be differences in the emotional intelligence profile ofShow MoreRelatedSpeech in Relation to Intelligence and Success2427 Words   |  10 PagesSpeech is an essential part of our everyday lifestyle, and it is likely that very few people stop to think about how much it influences their day. From waking up in the morning and greeting a sibling, spouse, or child, to interacting with coworkers at a job or students in a class, every individual uses speech in one way or another throughout his or her day. It forms such an important part of our lifestyles that without thi s essential part of communication, many would have difficulty getting theirRead MoreDigital Communication, By Sherry Turkle Essay1491 Words   |  6 Pagesour society or as the harbinger of its downfall. Modern communication methods such as texting, tweeting, IM’ing, and other forms of digital interaction have been credited as a new wave in learning techniques or as the end of verbal exchange and intelligence in today’s youth. Various authors have offered their opinions either for or against nonverbal digital dialog backed by differing amounts of personal and structured research. In the essay â€Å"No Need to Call†, originally published in the book AloneRead MoreCase Study Of A User Undergoing A Radiographic Examination Or Procedure3265 Words   |  14 Pages Case study of a user undergoing a radiographic examination or procedure Student I.D S149389 Word count: 2730 MI5-The Service User For this case study I will evaluate the care consideration for my patient with autism and how their additional needs were met in the X-ray department in order to accommodate the patient. We will consider the care of the service user and the adaptations in order to meet the needs of the patient. Throughout this examination we will look at legislations, policiesRead MoreEssay special education11975 Words   |  48 Pagesit all in a little book called International Classification of Impairments, Disabilities and Handicaps. All these terms refer to the consequences of disease, but consider the consequences at different levels.   The disease produces some form of pathology, and then the individual may become aware of this: they experience symptoms.   Later, the performance or behaviour of the person may be affected, and because of this the person may suffer consequences such as being unable to work.   In this generalRead MoreDescription Of An Example Of A Presentation8050 Words   |  33 PagesGlossary of Terms Accommodations –adaptations to presentation or setting that can typically and easily occur in general education – they do not involve modifying the material content but do allow students to receive information in a more effective manner. Assistive Technology Device – any item, piece of equipment, or product system whether acquired commercially off the shelf, modified, or customized, that is used to increase, maintain or improve the functional capabilities of a person with a disabilityRead MoreReflective Practice As A Radiation Therapy3358 Words   |  14 PagesIntroduction I alongside with other radiation therapy students were privileged to hear Carlas’ story from a patient point of view. Her journey through being treated for breast cancer. I could feel a strong sense of conviction in her words. She stayed strong and did not waver when speaking. I was shocked yet amazed at her confidence to tell it so clearly. It was my first time receiving insight from a radiation therapist. This paper will explore the feelings I experienced during and after this timeRead MoreAbnormal Psychology. Classification and Assessment of Abnormal Behavior20707 Words   |  83 Pagessuch as relying too strongly on the medical model. Our focus on the DSM reflects recognition of its widespread use, not an endorsement. In the DSM, abnormal behavior patterns are classified as â€Å"mental disorders.† Mental disorders involve either emotional distress (typically depression or anxiety), significantly impaired functioning (difficulty meeting responsibilities at work, i n the family, or in society at large), or behavior that places people at risk for personal suffering, pain, disability,Read MoreCommunication Disorders7061 Words   |  29 PagesCOMMUNICATION DISORDERS What is Communication Disorder? †¢ a speech, language and hearing disorder which refers to problems in communication and in related areas such as oral motor function. †¢ The symptoms vary depending on the particular type of communication disorder, but they generally center around problems communicating. †¢ Children with communication disorders have deficits in their ability to exchange information with others. COMMUNICATION †¢ a multidimensional dynamic process thatRead MoreModern Gadgets Implications to Teenagers6102 Words   |  25 Pagesreducing TV viewing time to a great extent, and in spending the time in family chatter instead. We have much to learn from each other as persons and no artificial media can substitute human warmth and interaction when it comes to improving emotional intelligence. So, we should put our foot firmly down and reduce the TV viewing time of the family in the best interests of everyone. Computers: Though computers have become almost indispensable today, too much time in front of the screen can be damagingRead MoreDeveloping Management Skills404131 Words   |  1617 PagesSelf-Awareness 46 Self-Awareness Assessment 46 Emotional Intelligence Assessment 47 The Defining Issues Test 48 v Cognitive Style Indicator 52 Locus of Control Scale 52 Tolerance of Ambiguity Scale 54 Core Self-Evaluation Scale (CSES) 56 SKILL LEARNING 57 Key Dimensions of Self-Awareness 57 The Enigma of Self-Awareness 58 The Sensitive Line 58 Understanding and Appreciating Individual Differences Important Areas of Self-Awareness 61 Emotional Intelligence 62 Values 65 Ethical Decision Making and

Thursday, December 12, 2019

English Legal System UK Civil Legal Process

Question: To be acceptable to ordinary people, I believe [the] legal process in litigation must be designed to encourage, first, settlement by agreement; secondly, open and speedy trial if agreement is not forthcoming. In other words. Justice, not truth is its purpose. It is against criteria of justice and fairness that the system must be assessed. (Lord Scarman) Critically assess the UKs civil legal process. Answer: English Legal System The legal system of every country promises justice to be delivered accurately and quickly. Every person who has suffered physically, economically or mentally approaches the Court of law in its country that guarantees the sufferer or the injured a promise of redressal of his sufferings. As the citizen of the country believes in its justice system and the rule of law, they refrain from taking the law into their hands and believe that justice will be delivered to them some day from the Courts following the adequate rule of law. Therefore, the judicial system of every country has the responsibility to assure inexpensive and quick ways to deliver justice to the citizen of its country without losing the real essence of justice, which includes fairness, unbiased outlook and equality before the law. Thus, the judicial system in the United Kingdom encourages settlement between parties by agreement and speedy trial in case settlement by agreement is not possible. Many disputes that are heard before the Courts get settled before the Courts can believe its final judgement and many disputes are settled between parties before the disputes even come before the Courts. Therefore, the Courts are rapidly encouraging settlement by agreement, as its a faster and a more efficient way of dispute resolution. The Courts go ahead also to include penalties for parties who are not willing to readily follow the said approach of dispute resolution by making them liable for costs of the proceedings which would be allocated to the other party in case of settlement by agreement. Settlement by agreement is an agreement to bring to an end any dispute between two parties by mutual consent following the principle of good faith. The same is an amicable mode of resolving disputes and ending the litigation process between parties or preventing the same. It is become a part of public policy in the United Kingdom to encourage settlement by agreement. In the judgement of the case M. H. Detrick Co v Century Indem Co 299 Ill. App 3d 620 the Court stated that Courts will encourage settlement by agreement and the same will be given full effect. Settlement of any dispute by agreement is permitted before the initiation of court proceedings and during the court proceeding before the courts judgement. Usually, the format of these agreements is in the form of a Consent Order that is in writing which can be enforced if required. In case, of a settlement by agreement, the Consent Form take the place of a Courts Judgement which can be enforced and executed by either f the parties and which includes the order as to which party is liable to bear the costs. Some parties adopt the Tomlin order to settle their disputes, which includes consent order along with an attached schedule to it. The primary feature of Tomlin order is that it permits the parties to include such terms in the order, which even the Court, is not authorised to allow. The most significant reform in settlement by agreements is the provision of Part 36 offer in Civil Procedure regulations in the United Kingdom. The Part 35 offer in the United Kingdom deals with rules that govern the manner in which Courts settle disputes by agreements. It is open to both the parties to a dispute to make a Part 36 offer. If an offer under this section is made by the defendant and the claimant refuses to accept the same, and then claimant will be liable to pay a portion of defendants cost if the sum that is awarded by the court in the final judgement less than what the defendant offered to pay. The same principle will apply in reverse. However, the same will be awarded only when certain formalities as to the said offer is fulfilled. One such formality is that the offer should be open for the other partys acceptance for at least 21 days. It is in the parties favour to make a tempting offer to another party for settlement of disputes and avoid inexpensive litigation. Ho wever, offers made with terms, which are not satisfactory, are allowed to be ignored. Every party before it decides to file a suit in the Court hires an attorney. Therefore, it becomes the duty of the attorney to advice its client on the availability of the option to settle by agreement and assure their clients that it is readily encouraged and accepted by Courts as a means to solve disputes. One primary advantage of this mode of dispute resolution is that the process to attain justice is speedy and inexpensive which every common person in the country is convinced to follow. However, when the parties to a dispute are not ready to accept the settlement by agreement approach to solving disputes, the second option available before the Courts to deliver adequate and quick justice is a speedy trial of the dispute. Many a time, a person may take law in his own hands committing crimes to punish someone after suffering from the said person. However, if the individual is convinced that the regular system in the country can provide him a better and a quicker means to punish his offender, he will opt for the judicial way to punish his offender that will in return eliminate crimes that occur to punish wrongdoers. Therefore, speedy litigation is a key to this problem. On October 1, 2015, the Courts in the United Kingdom came up with a scheme called one-year litigation target. This scheme was enforced to encourage quick and speedy trials. This scheme proposed to end or conclude a case within ten months from the date the case was brought before the court. In case, a dispute between parties cannot be settled by agreement, the Court will adopt the principles of the said scheme to conclude quickly any dispute brought before it. Judgement in this scheme is said to be delivered within six weeks after the trial is completed. For the citizen of the country to adopt the legal way to fight every dispute amongst them, they need to respect the judicial system of the country, which is only possible when the same is favourable and quick. Thus, settlement of disputes by agreement and a speedy trial in case agreement settlement is not materialised will only increase the respect of judiciary in the eye of a common person. Reference List Greene, H., 2015. Undead Laws: The Use of Historically Unenforced Criminal Statutes in Non-Criminal Litigation.Yale Law Policy Review,16(1), p.5. Hanretty, C., 2013. The decisions and ideal points of British Law Lords.British Journal of Political Science,43(03), pp.703-716. Huxley-Binns, R. and Martin, J., 2014.Unlocking the English legal system. Routledge. Kas, B., 2015. European Union Litigation.European Review of Contract Law,11(1), pp.51-75. Martin, J., 2013.The English Legal System, eBook ePub. Hachette UK. Sime, S., 2013.A practical approach to civil procedure. Oxford University Press. Terrill, R.J., 2012.World criminal justice systems: A comparative survey. Routledge. Varney, M. ed., 2010.The European Union Legal Order After Lisbon. Kluwer Law International. Martin, J., 2013.The English Legal System, eBook ePub. Hachette UK. Varney, M. ed., 2010.The European Union Legal Order After Lisbon. Kluwer Law International. Terrill, R.J., 2012.World criminal justice systems: A comparative survey. Routledge. Sime, S., 2013.A practical approach to civil procedure. Oxford University Press. Hanretty, C., 2013. The decisions and ideal points of British Law Lords.British Journal of Political Science,43(03), pp.703-716. Greene, H., 2015. Undead Laws: The Use of Historically Unenforced Criminal Statutes in Non-Criminal Litigation.Yale Law Policy Review,16(1), p.5. Huxley-Binns, R. and Martin, J., 2014.Unlocking the English legal system. Routledge. Kas, B., 2015. European Union Litigation.European Review of Contract Law,11(1), pp.51-75.

Thursday, December 5, 2019

Biblical Integration and Counseling Practices free essay sample

Abstract The integration of biblical practices and counseling has been discussed for decades. There is an increased interest in spiritual and emotional health, among Christian counselors and with secular therapists as well. Understanding the differences between implicit and explicit integration practices in therapy help a therapist to decide which techniques should be used appropriately in therapy. There are critics who claim there is no way to properly integrate psychotherapy and biblical practices; however there is a growing interest in religion and clinical practice in American today. The use of prayer and Scripture play a role in the mental health field because clergy are not able to keep up with the demand of counseling their congregation. The values, needs and interests of a client, and respect of the clients preferences should be a considered in therapy to determine whether or not to engage in religious or spiritual practices. Biblical Integration and Counseling Practices The modern mental health field provides a way to help clients who are facing emotional or spiritual pain, social issues, educational difficulties, and financial, legal, or health-related concerns. The field helps clinicians understand the way people act and how they think, which can affect the overall emotional well being of a client. Over the last 50 years, the concept of biblical integration in the therapeutic process has received significant attention. There has been an increasing amount of interest in receiving spiritual practices within the counseling session. Tann (1996) stated the integration of faith and psychotherapy is occurring in other faith communities such as in Jewish, Muslim and even Buddhist religions (p. 365). Although there is significant interest in spiritual practices within counseling, there is also criticism arguing that psychology and /or counseling and biblical integration are not compatible. Some Christians focus only on theology, the study of God and the Bible, as the means to solve problems of mankind and is all man needs. There are strong critics  posing against the mental health field and religion; however, there are many others â€Å"who have arrived at more favorable conclusions about religion and mental health† (Tann, 1996, p. 367). Christian counselors look toward the integration of psychology and theology because it focuses on mental health as well as spiritual growth. More than thirty years ago, most of the religious counseling that occurred was primarily done by the clergy. From a theological perspective, this worked well, but it posed practical concerns. These problems were because many clergy were not trained in psychology, and they were not able to keep up with the amount of clients within the congregation or â€Å"able to meet with clients as often as clients would like† (Worthington, 2009, p. 125). In the 1980s, the area of psychology and Christianity had begun to spark much conversation leading to an approach of a â€Å"Christian psychology† movement. McMinn (2011) stated over the past few decades Christian counselors made progress in reuniting theology and psychology (p. xxi). In the 1990s, the attitudes began to change about religion and psychology. Jones Butman (2011) stated the American Psychological Association (APA) had ignored the topic of religion prior to an article Jones had written to consider religion as a partner in psychology (p. 17). Many clients do not talk about religion during therapy; however there are some clients who do seek out religious concepts. In the late 1980s, theologically conservative clients began to seek out therapists who provided counseling based on specific religious practices. The best approach to counseling is the integration of religion, spirituality, and theories in psychotherapy. Many Christians have a desire to seek to alleviate mental and spiritual suffering and have a healthy relationship with others and God. Concepts of Biblical Integration: Implicit and Explicit It is imperative that therapists not assume feelings experienced by the client or to assume the perceptions of the client. Even if clients indicate they are Christian, it does not mean they will share the same values and beliefs of the therapists. Counselors can become confused about the best way to integrate religious values with psychological techniques to help â€Å"clients with both spiritual and emotional growth† (McMinn, 2011, p. 5). Even though many critics oppose integration of theology and psychology, several practices can be responsibly applied in the counseling process to show respect for Christian values, understand emotional pain, and lead to healing. There are two approaches, implicit and explicit integration, in a clinical practice with counseling and religion. Implicit integration refers to a practice when the therapist does not discuss religion or use spiritual resources like prayer or scripture. Explicit integration works with a person’s spiritual or religious issues in therapy and will use prayer and Scripture as effective techniques in therapy. Even though some therapists are eager to implement Christian counseling and psychotherapy techniques, they should consider their own worldview, assumptions, and views of healing. This attempt begins with the therapist understanding their own attitudes and beliefs and how to bring religion in to a therapy session. Attitudes and Beliefs A properly trained therapist wishing to integrate biblical concepts and psychology should have proper knowledge on how to combine both training and faith. Having an understanding of â€Å"underlying philosophical beliefs, an investigation of theoretical understanding, a careful exploration of scripture, and a thorough reflection on practices to clarify a conceptual position† is necessary for believers and non-believers to relate to the therapist (Alexander, p. 1). It is essential for the therapist to recognize their religious beliefs and values in order to avoid imposing their own values and beliefs on the client. A therapist, who may not be able to tolerate a religious view from a client, may not be able to work effectively with the client and will need to provide a referral. A counselor needs to be aware of how they understand and relate to their own theological and theoretical beliefs, beliefs about the person, and the healing process. Counselors should have competence in theology and psychology when properly integrating both. McMinn (2011) stated when psychologists without theological training attempt to do integration; they often minimize the importance of doctrine, psychologize Christian beliefs, and overlook the historical and sociological context of today’s psychology† (p. 9). Some clients take comfort in knowing the therapist shares the same values or beliefs. Even if values are not shared between the client and therapist,  the session can still â€Å"be done in a highly secular manner without any use of explicit religious interventions† (Hathaway, 2009, p. 108). Prayer Praying can be done with clients, but it does not always have to be out loud. A therapist can still be a religious person in therapy, and still respect the client’s religious values. A therapist could pray silently for the client before, during, or after the session. If a client discloses a desire not to pray or discuss religious practices in therapy, a therapist can still be â€Å"consistent with the therapist’s own religious convictions and beliefs† (Tann, 1996, p. 368) by praying silently for the client. This practice is useful for therapists that do not feel comfortable praying out lout for a client or who may feel they do not have enough knowledge of scripture to help a client. For clients who want to deal with more spiritual or religious issues in therapy, counselors can integrate the use of active â€Å"prayer, scripture, referrals to church, and other religious practices† (Tann, 1996, p. 368). If a therapist is comfortable praying out loud and with the client when appropriate, the therapist should make sure they are comfortable discussing the religious issues with the client. Scripture For Christians, Scripture is a source of authority to help clients during therapy. McMinn (2011) stated Scripture can be used in counseling to help client’s dispute unhealthy self-talk (p. 139). A Christian counselor can filter psychological theories through Scripture. Secular theories that are not in line with the teachings of the Bible can be eliminated for religious clients. Tann (1996) stated religious clients prefer the use of Scripture in therapy (p. 369). Counselors should use caution so not to impose their own interpretation of Scripture on a client. Scripture can be misused in therapy if a therapist uses the Bible in an authoritarian way to convince or even force a client to repent their behaviors as a â€Å"simplistic way to deal with complex problems† (Tann, 1996, p. 375). Therapists can assign homework to clients which consist of Bible studies, and then can be discussed with the therapist during their sessions. Scripture can be helpful for clients who need b iblical truth and be particularly helpful for clients who suffer from Scrupulosity which is a form of Obsessive Compulsive Disorder involving  religious and moral obsessions. The use of Scripture can help the healing process with clients needing reassurance through the word of God. Conclusion The use of prayer and Scripture are great tools for biblical integration in psychology. In order for these to be effective, a therapist should discuss these at the first intake session. There should be an agreement between the client and therapist on whether or not the therapist can use these techniques in therapy. Simply asking clients how important religion is to them can help a therapist understand how valuable the client’s religious beliefs are to a client. A therapist should decide when biblical integration techniques of prayer and Scripture should be appropriately used in therapy. Some of the best counselors will be able to integrate biblical concepts and counseling effectively by â€Å"carefully considering the psychological implications and the effect on the therapeutic relationship† (McMinn, 2011, p. 138). The careful use of psychology and theology can benefit client’s who suffer and when therapists have the proper knowledge between implicit and explicit integration. Tann (1996) stated there are some therapists who believe that the grace of God can work in the therapeutic relationship in a way that the client can grow beyond where the therapist is (p. 378). Psychotherapy or biblical integration used by therapists should always practice in a manner of self-awareness, respect for client values, and be religiously accommodating to deal with religion and spirituality during treatment.

Thursday, November 28, 2019

Football at Slack Essay Example

Football at Slack Essay As the train approaches its destination, the poem gains momentum as though possessed of some new energy, then suddenly slows down. The philosophical discourse slackens too, as Larkin can no longer sustain the intensity of his superior knowledge that extends far beyond the superficiality of socially constructed rituals. He relinquishes the awareness that the journey was merely a frail / Travelling coincidence: the experience now inhabits the past, and Larkin releases his hold on it, leaving him free to pursue the fertile possibilities of the future. Larkin has taken us on a journey through more than simply space and time: it has been a journey through experience and knowledge. It has revealed and observed the substance of Englishness: its landscape and the people who inhabit it. The gentle closing lines of the poem: there swelled A sense of falling, like an arrow-shower Sent out of sight, somewhere becoming rain is an optimistic release of the true meaning of life that can never be fully sustained, or indeed realised, by most Englanders. In the poetry which makes up The Whitsun Weddings, Larkin presents the reader with a simple and uncomplicated depiction of the matter of England, through which it is easy to perceive what is the matter with England. Ted Hughes has an altogether different attitude towards the matter of England, and indeed towards poetry itself. There are few overt references to the English nation in his New Selected Poems 1957-1994, primarily because Hughes does not deem the rational division of the earth into separate states to be of any real importance. We will write a custom essay sample on Football at Slack specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Football at Slack specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Football at Slack specifically for you FOR ONLY $16.38 $13.9/page Hire Writer To him landscapes, animalistic forces and the scope of nature are not contingent upon the demarcation of a particular region they are equally in existence the world over. However, certain landscapes in his verse can be identified geographically, and many of these are of England, or at least an England of the past. For example, Remains of Elmet is a series of poems which has as its backdrop the last Celtic kingdom; within this geography Hughes brings together history and the activity of contemporary life to create a mythic effect. England is depicted through the portrayal of the whole of western civilisation. The sentiments contained in Hughes poetry apply to England because it has been shaped by the same processes as western culture, and both are now in the grip of a spiritual and natural paralysis. Hughes harbours a powerful contempt for western civilisation because its values and attitudes have impeded the operation of mans natural energy. 4 He conceives of civilisation as a cage from which man must break free and rediscover basic instincts. Thus the role of contemporary society is negated, and the logical rationalism of modernity is denied, in favour of the evocation of primitive but unrecognised natural forces at work in man and his environment. Hughes sees that being disconnected from this inner [primeval] world, life becomes empty, meaningless, sterile. 5, so he uses poetry as a means to discover this life by giving voice to the figure beneath the mask of civilisation. Social history becomes translated into a natural history by Hughes poetry: in October Dawn for example, the social is related to the evolution of the landscape. 6 October Dawn sets a precarious civilisation against the puissant force of nature, a battle which civilisation inevitably loses. This poem emphasises that western culture is subject to the benevolence of the earth, and can be reclaimed at any point. So A glass half full of wine is left out / To the dark heaven all night like an offering to placate some primeval god. Yet the insubstantial wine glass, an emblem of civilisation, is doomed as natural forces begin to conquer all things man-made: Ice/ Has got its spearhead into place. The delicacy soon gives way to something more forceful, which is reflected by the elemental and energetic diction: a fist of cold / Squeezes the fire at the core of the world. Such is the unbridled power of nature that it has eliminated the civilised man and all evidence of his existence, and reinstated the Mammoth and Sabre-tooth, but has only just begun its domination. The potential of the landscape is immense: And now it is about to start. Football at Slack appears in Remains of Elmet, a collection that focuses on a real world inhabited by real people as opposed to the mythopoeic world of Crow, for example. Here, the human and the elemental interact in an exhilarating celebration of vitality. But significantly the human activity of football, a game that occupies an increasingly central role in the culture of England, is contained within the bounds of the landscape: Between plunging valleys, on a bareback of hill. The football game is recounted in a gently mocking tone; the football players take on an absurd quality, and become almost clown-like figures: Men in bunting colours / Bounced, and The rubbery men bounced after it. There is something incongruous about the whole activity men flailing around in the landscape, chasing a ball while the enduring hillside looks on. As always, nature exercises control over the activities of man: The ball jumped up and out and hung on the wind / Over a gulf of treetops. Nature exerts its powers on the men, as though in teasing; for although: the rain lowered a steel press leaving the players practically submerged, they remain: washed and happy. Man interacts with the landscape, and there is the connotation that the landscape watches the match and is entertained by it. Hughes identifies in this football game a vestige of mans natural energy. Yet although in this instance the natural and the social operate side by side in a complicit agreement, Football at Slack carries the suggestion that the hillside could at any time unleash its power on the comical figures: a golden holocaust / Lifted the clouds edge. A bleak, physical landscape once again has supremacy over humankind, and primitive energies possess the advantage over the peculiarities of western civilisation. An awareness of the carnal mentality shared by animals and humans alike is basic to Ted Hughes. 7 The impulse to get back to a new and more vital life principle is ever present in his poetry -he strips humanity down to a bare animal in order to attempt a reconciliation with a consciousness that has insisted on the alienation from the inner life. The Long Tunnel Ceiling is a drama of consciousness, and illustrates the way in which the observation of animals, as representative of the true order of nature, provides the stimulus for the re-acquaintance with our true selves. In The Long Tunnel Ceiling, the sight of a trout in a canal marks a departure from the mundaneness of modern life, and the verse that contains it. The fish takes on the persona of a natural god, a: Master of the Pennine Pass, and in that capacity is exalted, indeed almost worshipped, by Hughes. The sighting of the: Molten pig of many a bronze loach triggers in the poet an imaginative flight into a mystical, natural landscape a flight on which he is accompanied by the reader: Brought down on a midnight cloudburst In a shake-up of heaven and the hills When the streams burst with zig-zags and explosions. An encounter with a single, inert fish initiates a mental and spiritual departure from the heedless bustle of modern life, with its: Lorries from Bradford [and] Rochdale that pass insistently overhead. The animal is accepted as a desirable and precious aspect of the self; against this knowledge, the industrial society that surrounds the poet and the trout fails to possess any meaning. We are left with an awareness of a wild god that flowers like a symbol of hope and sustenance amid the relentless passage of modern life. Her Husband is one of the few poems by Hughes to possess a socially oriented view. A precarious social hierarchy, with males assuming a higher status because they know: The stubborn character of money, is portrayed. The existence of humans and their ultimately insignificant social structures are sustained through the violation of the landscape. Thus civilisation is supported and underpinned by nature. Yet the poem suggests that the physical earth will revenge its desecration at the hands of ruthless humanity: Their jurors are to be assembled / From the little crumbs of soot. The transience and superficiality of western culture is contrasted with the enduring and far superior presence of the landscape and its fossil fuels: Their brief / Goes straight up to heaven and nothing more is heard of it. The farcical notion of the rights of humanity is burnt away as effortlessly as the coal. Hughes portrays basic natural forces with a language of energy and vigour, and in doing so creates a mythic dimension. The poetry of Ted Hughes is neither social commentary nor a straight-forward description of the geography of England. It condemns the whole of western culture, of which England is a part, for distancing itself and its people from the strong primitive urges that comprise the inner self. His aim is to: reconnect our own natural energies with those in the external, natural world8 through the medium of poetry. Both Philip Larkin and Ted Hughes both examine the matter of England, and expose its flaws. But their attitudes towards and treatment of this England differ radically. The term English poets seeks to unite the two perspectives of two poets that remain essentially irreconcilable.

Sunday, November 24, 2019

B Cells

B Cells B cells are white blood cells that protect the body against pathogens such as bacteria and viruses. Pathogens and foreign matter have associated  molecular signals that identify them as antigens. B cells recognize these  molecular signals and produce antibodies that are specific to the specific antigen. There are billions of B cells in the body. Unactivated B cells circulate in the blood until they come in contact with an antigen and become activated. Once activated, B cells produce the antibodies needed to fight against infection. B cells are necessary for adaptive or specific immunity, which focuses on the destruction of foreign invaders that have gotten past the bodies initial defenses. Adaptive immune responses are highly specific and provide long-lasting protection against the pathogens that elicit the response. B Cells and Antibodies B cells are a specific type of white blood cell called a lymphocyte. Other types of lymphocytes include T cells and natural killer cells. B cells develop from stem cells in bone marrow. They remain in the bone marrow until they become mature. Once they are fully developed, B cells are released into the blood where they travel to lymphatic organs. Mature B cells are capable of becoming activated and producing antibodies. Antibodies are specialized proteins  that travel through the bloodstream and are found in bodily fluids. Antibodies recognize specific antigens by identifying certain areas on the surface of the antigen known as antigenic determinants. Once the specific antigenic determinant is recognized, the antibody will bind to the determinant. This binding of the antibody to the antigen identifies the antigen as a target to be destroyed by other immune cells, such as cytotoxic T cells. B Cell Activation On the surface of a B cell is a B cell receptor (BCR) protein. The BCR enables B cells to capture and bind to an antigen. Once bound, the antigen is internalized and digested by the B cell and certain molecules from the antigen are attached to another protein called a class II MHC protein. This antigen-class II MHC protein complex is then presented on the surface of the B cell. Most B cells are activated with the help of other immune cells. When cells such as macrophages and dendritic cells engulf and digest pathogens, they capture and present antigenic information to T cells. The T cells multiply and some differentiate into helper T cells. When a helper T cell comes in contact with the antigen-class II MHC protein complex on the B cells surface, the helper T cell sends signals that activate the B cell. Activated B cells proliferate and can either develop into cells called plasma cells or into other cells called memory cells. Plasma B Cells ​ These cells create antibodies that are specific to a specific antigen. The antibodies circulate in bodily fluids and blood serum until they bind to an antigen. Antibodies debilitate antigens until other immune cells can destroy them. It can take up to two weeks before plasma cells can generate enough antibodies to counteract a specific antigen. Once the infection is under control, antibody production decreases. Some activated B cells form memory cells. Memory B Cells ​ This specified form of B cell enables the immune system to recognize antigens that the body has previously encountered. If the same type of antigen enters the body again, memory B cells direct a secondary immune response in which antibodies are produced more quickly and for a longer period of time. Memory cells are stored in the lymph nodes and spleen and can remain in the body for the life of an individual. If enough memory cells are produced while encountering an infection, these cells can provide life-long immunity against certain diseases. Sources Immune Cells and Their Products. NIAID National Institutes of Health. Updated 2008 October 02.Alberts B, Johnson A, Lewis J, et al. Molecular Biology of the Cell. 4th edition. New York: Garland Science; 2002. Helper T Cells and Lymphocyte Activation.

Thursday, November 21, 2019

WW2 Japan and China's war AKA the Second Sino japanese war Research Paper

WW2 Japan and China's war AKA the Second Sino japanese war - Research Paper Example The results of the war were that they were displaced from their homes and properties totaling to billions destroyed1. This paper examines into details second Sino-Japanese War and its effects. The second Sino-Japanese War origin is traced back to the incident in Manchurian which took place in September 1931. Japanese being effectively consolidated had occupied different territories and the Kwantung army went ahead to occupy Munchuria. After this, they established their puppet state In Munchuria known as Manchukuo in February 1932. The Chinese were not happy with this change, but the Japanese forced them to recognize the independence of their puppet states. They opposed this by conducting suppressed anti-Japanese activities and in the process forming an autonomous regional government in Northern China. However, the Japanese succeeds in their quest of forming puppet states because between the periods of 1933 and 1935, the Chinese people were forced through their armies to create two demilitarized autonomous areas to border their puppet state2. The break of the Second Sino-Japanese war was traced back to increased internal opposition to the Japanese government by Chinese citizens who saw that the Japanese policy of making their selves stronger before carrying out an attack was a threat to their sovereignty. In 1937, the Japanese soldiers headed for Beijing and Tainjin demanding that the Chinese soldiers were to surrender under their terms. This was because they knew that the military might of the Chinese could not match them as they were advanced weaponry. However, this did not go as planned because the Chinese clashed with the Japanese as they saw that they were slowly loosing their freedom and country to the Japanese who were foreigners in their land3. The Chinese initial response to this was to place their troops outside Shangai an area occupied by the Japanese. This act greatly agitated the Japanese as they saw this as an act of challenge to their

Wednesday, November 20, 2019

The Trial Process Essay Example | Topics and Well Written Essays - 750 words

The Trial Process - Essay Example The statements made during the opening statement are not to be considered as part of the evidence. Rather, they serve to build a connection between the two sides to the case and set straight the plot that the case is going to take, while trying to influence the juries with the arguments and the evidence available. Even though there is no argument of the case at this phase, the stage, as one of the component of the trial process serves to set the stage for the actual process of case trial (Wayne, 2003). The next component in the trial procedure is the prosecution’s case presentation, where the prosecutor presents the evidence and all the information necessary to the case, in an attempt to prove that the defendant is guilty before the court (Sadakat, 2005). The prosecutor has to prove beyond a reasonable doubt that the defendant is guilty of all the charges aligned with him. If he fails to do this amicably, then the defense can request that the case be dismissed at this stage, w ithout the need to proceed to offer the case defense. If the prosecutor provides sufficient evidence to prove that the defendant is guilty, then the next stage follows. The next component of the case is the direct and the cross examination of witnesses. Under this component, the witnesses are sworn under oath to give true and only facts regarding the case. Each side to the case will then examine the witnesses through a question and answer session, where the counsels of both sides asks the witnesses questions to unearth some facts and prove the allegations already given (Zuckerman, 2012). During the cross examination, all attempts are made to indicate the inconsistencies and the loopholes that are left unsealed by the witness testimonies. The need for this component as part of the trial process is to have each side to the argument discredit the other, based on the testimonies given (Wayne, 2003). The next component that follows is the defense’s case, where the counsel represen ting the defendant will present their case, indicating how the case presented by the prosecutor does not qualify to make the defendant guilty before the court (Zuckerman, 2012). The defense can also seek to show the court that the prosecutor lacks sufficient evidence to prove the case against the defendants. In doing this, the defense counsel may cite the weaknesses made by the witnesses during the testimony session. The need for this component of the trial process is to indicate how the prosecution’s evidence fails to meet the threshold of conviction that the defendant is guilty. At this stage, the defense calls their witnesses who also give the testimony, opposing the guilt of the defendant. After the defense makes their case, the prosecution can react to this, though only in relation to new suggestions that defense has noted which were not addressed by the prosecution (Sadakat, 2005). The next component of the trial process that follows is the closing argument. Here, the p rosecution presents their final arguments, addressing any relevant details to the case that they could have forgotten, in a summary manner. This is followed by the closing arguments given by the defense, summarizing their main points and giving any relevant information they could have skipped during the preceding stages (Wayne, 2003). Of importance is

Monday, November 18, 2019

The Usefulness of Marketing for Media and Entertainment Companies such Essay - 1

The Usefulness of Marketing for Media and Entertainment Companies such as Disney - Essay Example Strong brand imaging is important to engross higher customer equity. If taking the example of Disney, they are customer focused but their prices are not comparatively lower. Currently they are more conscientious about penetrating their existing market e.g., selling more to the prevailing consumers, continual expansion in marketing efforts to promote brands and improving the product quality to gain higher customer satisfaction by attaining expectations of customers. Their current marketing strategy can be analyzed as a â€Å"Brave† stroke of strategic mix. This entailed after observing the tremendous success of the movie â€Å"Brave† which performed terrifically on the box office as 13th top of the list movie consecutively yielding $66.7 Million. The analysts had topped up that Brave will barely be able to earn its cost on box office but its success made them to think about the Disney’s marketing strategies (Hughes, 2014). After examining the strategies of the Walt Disney and Time Warner, it has been concluded that customer affiliation is most important. Walt Disney has pointed on the right stroke by exploiting the exact opportunistic approach for example the strategic partners such as, McDonald. The characters embossment of Time Warner is reported as higher according to Gallup among the young generation yet the success rate of Disney is more than Time Warner (Gilchrist, 2013). The Dream works media entertainment also possesses a sustainable position in the industry but the character embossment and impact is not comparable because of strategic partnership and marketing practices (Hughes, 2014). Another important distinguishable feature of Disney’s marketing practice is the use of CSM (Corporate Social Marketing) (Robbins, 2014). Marketing is however important in this industry because all they have to disseminate and sell is the entertainment. It

Friday, November 15, 2019

Researching The Computer Forensics Investigation Plan

Researching The Computer Forensics Investigation Plan The purpose of this paper is to review the basic methodologies and the appropriate processes that a computer forensic investigator goes through in conducting an investigation. It will give an idea to the reader about the planning and organization of an investigator who is involved in a computer related crime, the ways in which he will conduct the investigation such as basic preparation, use of the required tools and techniques, acquisition and analysis of the data, role in giving testimony, use of forensic laboratories or the guidance of all the staff working under the main investigator and even planning network forensics all of which are related to his work. The Computer Forensics Investigation Plan A computer forensic investigates data that can be retrieved form storage media of a computer such as a hard disk, it is also considered that to be a successful computer forensic the knowledge of many different platforms to perform computing is a must, for our case we will consider you as the chief forensic investigator in the state of Virginia, as a part of private enterprise you are assigned the role of planning the computer investigation of a suspected criminal activity, we will see from your perspective how you should conduct all the necessary procedures. We dont just need science; we need good science (Evans, 2004) Always analyze major issues in preparing for an investigation. The crime scene is considered to be a very sensitive place in terms of collecting proofs and evidences which are in many cases very vulnerable and can be very easily be manipulated so special attention is needed in every aspect of recovery methods in order to gain as much as possible. Before arriving at the scene of crime, it is mandatory that you should always take a systematic approach in problem solving like making an initial assessment about the case then determining a preliminary approach to the case, after that, create a detailed checklist of the objectivity of the case, analyze the resources needed, identify all the risks and try the very best to minimize them, also outline all the details known about the case until then in a systematic manner such as the situation in which you will be arriving, the nature and specifics of the case, the type of computer forensic tools which will be needed at the case and to check on the specific operating systems in disposal which assist in the forensics investigation process. Once at the crime scene, try to gather evidence to prove that the suspect violated the company policy or committed a crime, since this is a private sector investigation it includes corporate businesses, other agencies of government are not involved such as law enforcement. The law enforcement agencies act according to the federal freedom of information act or laws of similar descent according to their territory in all process. Investigating and taking control of the computer incident scene in the corporate environment is considered to be much easier than in the criminal environment because the incident scene is often the workplace, these workplaces have databases of computer hardware and software which can also be analyzed, proper tools can be adopted to analyze a policy violation if any. Many companies either state their policy right away or show some warning, some apply both whose purpose is to tell that they hold the complete right to inspect the computing assets of their respective subjects at will, in addition to that every company must describe when an investigation can be initiated and allow the corporate investigators to know that under what circumstances they can examine the computer of an employee, if the investigator finds about the wrongdoing of the employee then the company can file a criminal complaint against him. If any evidence is discovered of a crime during the investigation then the management must be informed of the incident, checking the incident itself that it meets the elements of criminal law, work with the corporate attorney and also to see that you dont violate any other constitutional law in all the procedure. Preparing for a computer seizure for search operation is one of the most important point in conducting computing investigation. In order to do this, some answers from the victim and an informant may be needed, informant can be a detective for the case, a witness, a manager or any coworker to the specific person of interest. If you can identify the computing system, then estimate things such as how many computer systems to process and size of drive on the computer of the suspect, also determine which operating systems and hardware are involved. Determining location of the evidence and the cases type is very crucial, it allows to determine if computers can be removed. If the removal of the computers will cause harm to the company then it should not be done in the interest of the company, problems in investigation may arise if the files are most probably hidden, encrypted or stored in some offsite, if the computers are not allowed to be taken for investigation then the investigator must determine the resources to acquire digital evidence and the proper tools which will be needed to make data acquisition faster. Also determine who is in charge of the respective systems (in corporate environment, usually one persons assistance from the company is required in this regard). Always keep some specialists who work on many different types of operating systems, servers or databases and properly educate those specialists in investigative techniques. Once arrived, securing the crime scene or the specific computer is the foremost priority of the investigation team, the purpose is to preserve the evidence and keep the acquired information confidential. The investigative team should define a secure perimeter using a special type of yellow barrier tape, it should also have the legal authority to keep the unnecessary people out but do not fail to comply the other law enforcers or obstruct justice in any manner possible. Only professional task force should handle the crime scene for evidence as any non professional law enforcer can manipulate or even destroy the vital piece of evidence which may be very crucial in the overall scenario. Remember that corporate investigators does not seize evidence very often, more brief guidelines for processing an incident or crime scene goes as follows, keeping a journal to document the activities, securing the scene in the sense of being professional and courteous with onlookers, removing all those personnel who are not associated with investigation, taking all the proper and necessary recordings in video of the area surrounding the computer, at the same time paying attention to all the major and minor details. Sketching the incident of the crime scene and checking the computers as soon as possible. While at the crime scene, dont ever cut the electrical power to a running system by pulling the plug unless it is an older Windows or DOS system (which in these days are very rarely found anywhere), instead apply a live acquisition by the proper acquisition methods if possible, when shutting down computers with Operating Systems such as Windows XP or later version of it or Linux/Unix then always remember to perform a normal shutdown of the system, this helps to prevent log files. Try the very best to save the data from the current applications as much safe as possible, properly record all active windows or other shell sessions, and photograph the scene. Also make notes of everything that is done even when copying the data from a live computer of a suspect, save open files to external storage medium such as a hard drive or on a network share (if somehow the saving mentioned is causing problems then save with some new titles), then close applications and shut down the computer. Further guidelines include on bagging and tagging the evidence which is done as follows, first assign a person to collect (and log) the evidence, then tag all the evidence which is collected with the present date/time, serial number or other features. Always keep two separate and different logs of evidence collected an keep control of the evidence at the crime scene. Always look for information related to the investigation such as passwords, PINs, passphrases, bank accounts and so on. Look at papers in places such as the drawers or even try to search the garbage can. Collect all the related documents and media which is associated with investigation such as manuals or software/hardware. Using a technical advisor of high degree experience and knowledge is a must, technical advisor can help to list the tools which are required to make progress at the crime scene, it is the person which can guide the investigation team about where to locate data and help the team in extracting the log records or other evidence form large servers. The advisor can also create or help to make a search warrant by finding what is needed by the investigators for the warrant. More brief responsibilities of the technical advisor includes to know the aspects of the seized systems, to direct the main investigator on handling sensitive material, helping in securing the crime scene, helping to plan the strategy for search and seizure (documenting it), document all the activities and helping in conducting the search and seizure. Documenting all the evidence in the lab is also a necessary process, which involves in recording the activities and findings as the investigators work; this can be done by maintaining a journal to record the steps taken as the investigator process evidence. The main objective is to produce the same results when the main investigator or any other repeat the steps that were taken to collect evidence, a journal serves as reference that documents all the methods that have been used to process evidence. For proper documenting the evidence, always create and use an evidence custody form, which serves the following functions such as identify who has handled the evidence and identify the evidence itself, properly listing all time and date of the handling of the evidence. Other information can also be added to the form such as specific section listing and hash values, try to include any other detailed information that might need for reference. Evidence forms or labels are present in the evidence bags that can be used to document the evidence. Forensic Tools Always prepare the tools using information from incidents and crime scenes, the initial response field kit should be light in weight and easy to transport form one place to another. An addition to the initial kit is the extensive response field kit which must include all the necessary tools. The items in an initial response field kit may include one digital camera or 35mm camera with film and flash, one flashlight, one laptop computer, one large capacity drive, one IDE ribbon cable (ATA-33 or ATA-100), one SATA cable, one forensic boot media containing the preferred utility, one FireWire or USB dual wire protect external bay, ten evidence log forms, one notebook or dictation recorder, ten computer evidence bags (antistatic bags), twenty evidence labels, twenty tape and tags, one permanent ink marker, ten external USB devices such as a thumb drive or a larger portable hard drive.(cited in Nelson, Phillips Stewart , 2004) Tools in an extensive response field kit may include varieties of technical manuals ranging from operating systems references to forensic analysis guides, one initial response field kit, one portable PC with SCSI card for DLT tape drive or suspects SCSI drive, two electrical power strips, one additional hand tools including bolt cutters, pry bar and hacksaw, one pair of leather gloves and disposable latex gloves (assorted sizes), one hand truck and luggage cart, ten large garbage bags and large cardboard boxes with packaging tape, one rubber bands of assorted sizes, one magnifying glass, one ream of print paper, one small brush of cleaning dust fro suspects interior CPU cabinet, ten USB thumb drives of varying sizes, two external hard drives (200 GB or larger) with power cables, assorted converter cables and five additional assorted hard drives for data acquisition. When choosing an appropriate tool, the investigator must be sure that the tool is properly functioning, and that the right person handles it during the investigation. In order to prepare the investigators team, investigator must review all the facts, plans and objectives with the entire team assembled, the main objectives of the scene processing should be to collect evidence and secure it. The speed of the response from the team is very crucial as it can cause evidence such as digital evidence to be lost. Laboratory A computer forensics lab is a place where computer forensics conduct investigation, store evidence and house the necessary equipment, hardware and software. A typical lab manager duties involve many tasks such as proper management for case study, helping to provide reasonable consensus for effective decisions, keep everyone up to date with proper ethics and any modifications if made, keeping a financial account and proper check and balance of the entire facility, keeping it updated according to latest trends in technology and promoting the required quality assurance, appoint a schedule that suits everyone, estimating the potential of investigators and assessing their requirements, proper estimation of results ( preliminary or final) or when they are expected, strictly manage all lab policies and keep an overall look on the safety and security of the entire facility. The staff members have duties which include knowledge and training of equipments relating to computer systems such as O perating systems and their file types, software and hardware. Other staff duties include knowledge and training of technical skills, investigative skills, deductive reasoning. Planning lab budget involves making proper divisions in costs on all bases from daily to annual expenses, gathering the available data of the past expenses and use it to predict or prepare for any future costs. The main expense for a lab comes from the trained personnel or the equipment they use such as hardware or software devices in their disposal. Always estimate the number of computer cases the lab expects to cover, always being notified about the advancements in technology in the respective field, try to make assessment about the computer related crimes ( their kinds), and use this information to plan ahead lab requirements and costs. While making good computer technology available is important, the costs and benefits of upgrading all computers to state of the art must be weighed. (cited in schwabe, 2001) Check statistics from the Uniform Crime Report, identify the specific software used to commit crimes. If youre setting a lab for any private corporation, remember to check the inventory of computing such as software or hardware, previous reported problems and the ongoing and future advancements in related computer technology. Managing time is also a major concern when choosing on the computing equipment for the purchase. Most of the investigation is conducted in the lab, so it should be secure as evidence may is very crucial and cannot afforded to be lost, manipulated, damaged, destroyed or corrupted. Always put emphasis in providing a secure and safe environment, keep proper inventory control of the assets (inform in advance if more supplies are needed). A safe and secure facility should always preserve the evidence data and keep it as it is, the minimum requirements for a secure facility are a medium or small sized room with true walls form the floor to ceiling, proper locking mech anism provided with the door access, secure container and log for visitors. Almost all of the workers in the facility should be given the same level of access. Always brief the staff about the security policy, it is a must. The evidence lockers used in the lab must be kept secure enough such that any unauthorized person may not access it at all, some recommendations for securing storage containers include locating the containers in a properly defined restricted area, limiting people who will have the access to the storage containers, keeping a record on the authority of everyone who has access to the containers and keeping the containers locked when not in use. If a combination of locking system is used, then provide equal measure of security for both the contents of the container and the combination, always destroy the combinations that were previously held when setting up new combinations, only those persons who have the proper authority should be allowed to change the lock combinations, try to change the combination every three or six months or whenever required. When using a key padlock, authorize a personnel as the main key custodian, keep duplicate keys and print sequential numbers on all of them, keep a registry which has a record of keys that are assigned to the authorized personnel, conduct audits on weekly or monthly basis, try to place keys in a secure container after taking an inventory of keys, keep the level of security the same for all the keys and evidence containers, replace the old locks and keys on an annual basis and dont use a master key for several locks. Containers should be strong, safe and as much indestructible as possible with external padlock system and a cabinet inside, try to get a media safe if possible (to protect evidence form damage), keep an evidence storage room (if possible) in lab and keep a well organized evidence log which is used to keep update on all the occasions when the container of the evidence is opened or closed. Always maintain a security policy and enforce it (log signing in for visitors in a way that those personnel are considered to be visitors who are not assigned to lab, these visitors should always be escorted in all times), using indicators (visible and/or audible) is also a necessity inside lab premises, install an intrusion alarm system and hire a guard force for your lab. In civil litigation, investigator may return the evidence after using it (when issued a discovery order),if the investigator cannot retain the evidence then make sure it make the correct type of copy( copy in cases of data from disks or other hard drives, logical or bit stream), ask the supervisor or your client attorney on the requirements, you should usually only have one chance, create a duplicate copy of the evidence file, make minimum two images of evidence(digital) using separate methods, try to copy the host protected part of a disk, size is the biggest concern ( such as in raid redundant array of independent disks) systems which have terabytes of data), Some investigation needs to be conducted in the laboratory because of the proper tools and technicians available there who know how to deal with the evidence correctly without tampering it, Investigator might need to have the proper permission of the authority in charge if it wants the system moved to the laboratory, when permission provided, the investigator have a given time frame in which it must perform its task and then deliver the system back to where it came from. Log files Log files are those which lists all the actions that have happened, such as in Web servers which maintain log files to list every request made to the main Web server, using the log file analysis tools, the user can gave a very good assessment of where the visitors came from or how often they return or even how they go through a site, in addition to log files there are cookies, when used, they enable the Webmasters to log far more detailed information about the user on how it is accessing a site. Logs are also considered to be an independent, machine-generated record of what happened within a network for both system and user activity. When set up properly, and with the appropriate due care, logs can provide an immutable fingerprint of system and user activity. In many cases, the logs tell a story as to what really happened in an incident. They can tell you what systems were involved; how the systems and people behaved; what information was accessed; who accessed it; and precisely when these activities took place. (Cited in Musthaler, 2010) Given the overview of logs on what they can provide, the regulations such as the PCI DSS (payment card industry DSS), the FRCP (civil procedures federal rules), the HIPAA (which is an act regarding the health insurance) and many other regulations, all consider logs and log management to be the very basic and essential necessity for proper and efficient data management. Logs can be used to capture many vital sources of information which beside protecting the core data can also help in supporting forensic analysis and incident response if a data breach has occurred or other forms of electronic crime, such as fraud. The overall log monitoring can be hurdled because of the extremely large amount of fair data capture and the unwillingness, lack of will or errors in properly managing, analyze and correlating that data. The overall conclusion (in mismanagement) can cost hugely as if some suspicious activity or breach really happens, then a lot of time ( possibly many months ) may require to detect the fault, there is even no guarantee if the fault will be detected. In order to have logs admissible in court as evidence of a crime, an organization must prepare and execute due care with the log data. Log data must be viewed and treated like a primary evidence source. Here are some best practices that can help ensure log data and log management practices properly support forensic investigations. Have a clear corporate policy for managing logs across the entire organization. Document what is being logged and why, as well as how the log data is captured, stored and analyzed. Ensure that 100% of log-able devices and applications are captured and the data is unfiltered. Have centralized storage and retention of all logs, with everything in one place and in one format. Ensure the time synchronization of logs to facilitate correlating the data and retrieving data over specific timeframes. Ensure the separation of duties over logs and log management systems to protect from potential internal threats such as a super user or administrator turning off or modifying logs to conceal illicit activity. Always maintain backup copies of logs. Have a defined retention policy that specifies the rete ntion period across the organization for all log data. Organizations should work with legal counsel to determine the best time frames and have log data incorporated into an overall data retention policy. Have a defined procedure to follow after an incident. Test the incident response plan, including the retrieval of backup log data from offsite storage. (Musthaler, 2010) Further quotes form Brian Musthaler include, If an incident or data breach is suspected, there are several steps to take right away: Increase the logging capability to the maximum and consider adding a network sniffer to capture additional detail from network traffic. In an incident, its better to have more data rather than less. Freeze the rotation or destruction of existing logs to prevent the loss of potential evidence. Get backup copies of the logs and make sure they are secure. Deploy a qualified investigations team to determine the situation. (Musthaler, 2010) With the appropriate care, logs can provide solid forensic evidence when and if it is needed, as far as the job of a computer forensic investigator is concerned, his log begins when he starts an investigation, logs can be made of many things such as events, system security, firewall, audit, access and so on. (cited in PFI, 2010) Equipment can be recorded in the log by many ways, audio logs can be made which can store audio files, picture logs can be made which can store digital pictures taken during an investigation. Equipments are recorded according to the type of its contents with the appropriate tools. The final log is stored at the very end after possibly remodifying or revising previous logs. Data acquisition For the process of acquiring data in an investigation, we will consider following techniques, There are two types of data acquisition, static acquisition and live acquisition which basically involves the following four type of acquisition techniques, bit-stream disk-to-disk, bit-stream disk-to-image file, sparse and Logical. Bit-stream disk-to-image file is the most common method, it makes many copies and all of the copies made are replications of the original drive bit-by bit, similar type of process is happening in everyday scenario concerning a common personal computer, when we copy and paste files from one place to another or when we make multiple copies of a data file then the exact copy of the original data file is made available in many places. It is very simple, easy and with very nominal training can be performed on the target system therefore it is the most preferred method as well. The tools used in it are EnCase, ProDiscoer, FTK, SMART. Disk-to-disk method (bit-stream) is applied in the case of disk-to-image copy being impossible mainly due to hardware or software errors or incompatibilities, this problem comes when at most of the time dealing with very old drives. It adjusts target disks geometry to match the drive of the suspect (geometry of track configuration), tools used in this form are SafeBack, EnCase, , and Snap Copy. Logical acquisition and Sparse acquisition are used when the total time of the investigator is very short and the target disk is very large. This type of acquisition only searches and retrieves the selected file which is of particular interest, comparing this to Sparse acquisition which deals with data collection but again the data collected is very nominal. Data analysis Data analysis(for a computer forensic investigator) includes mostly examining digital evidence which depends on the following main factors, the nature of the case, the amount of data to process, the search warrants and court orders and the company policies. Scope creep happens when investigation expands beyond the original description which should be avoided in all cases. Few basic principles apply to about the entire computer forensics cases such as the approach taken depends largely on the specific type of case being investigated. Basic steps for all computer forensics investigations for analysis include the following points such as for target drives, using only recently wiped media that have been reformatted and inspected for computer viruses, noting the condition of the computer when seized, removing the original drive from the computer to check date and time values in the systems CMOS, record how to acquire data from the suspects drive, process the data methodically and logically, listing all folders and files on the image or drive Also try to examine the contents of all data files in all folders starting at the root directory of the volume partition, try to recover all the file contents that are password-protected and can be related to the investigation, identifying the function of every executable file that does not match known hash values and maintain control of all evidence and findings and also document everything as being progressed through the examination. Refining and modifying the investigation plan includes determining the scope of the investigation and what the case requires, determining if all the information should be collected and what to do in case of scope creep. The main aim should be to start with a plan but remain flexible in the face of new evidence. Data can be analyzed using many tools from the forensic toolkit such as supported file systems (FAT12/16/32, NTFS, Ext2fs, and Ext3fs). FTK can a very powerful tool that can analyze data from several sources including image files from other vendors, it produces a case long file. FTK also analyzes compressed files, reports can also be generated in it using bookmarks. Other analyze tools include searching for keywords (indexed search, live search or using advanced searching techniques such as stemming). In order to identify different types of data such as images, email and so on, the investigator should examine the data format and then according to that format, it should deal with the file with the appropriate tool. Working with law enforcement The status of individuals under law is no longer in doubt: individuals are subjects of law and as such are accorded rights. Yet rights are illusory without the procedural capability to enforce them. They are no more than high-minded principles if individuals whose rights have been violated have no avenue for complaint and relief. (Cited in Pasqualucci, 2003) There are basically two types of computer investigations, public and private(corporate), the public investigations involve government agencies responsible for criminal investigation and prosecution, the organizations involved must observe legal guidelines provided to them by the authority, other legal rights such as law of search and seizure helps in protecting rights of all people including suspects. Of the everyday problems of the criminal justice system itself, certainly the most delicate and probably the most difficult concern the proper ways of dealing individually with individuals.(Cited in Winslow, 1968) Investigator working with the law enforcement must always abide by the federal and constitutional laws in conducting and performing entire process of investigation. Criminal cases at law enforcement goes through three main steps, first the victim (any individual or company) will contact the law enforcement agency by making a complaint, then acting on behalf of that complaint, the investigator will be assigned by the government authority to conduct a balanced and proper investigation and will be asked to present all the findings directly to the law agency, the investigator will interview the complaint and will write a report about the crime, police blotter may provide a record of clues to crimes that have been committed previously (related to the ongoing investigation). The investigator collect, delegate and process the information related to the complaint. As the investigator build a case, the information is turned over to the prosecutor. An affidavit is a sworn statement of support of facts about evidence of a crime which is submitted to a judge to request a search warrant; the judge must approve and sign a search warrant before it can be used to collect evidence. The chain of custody is the route the evidence takes from the time investigator finds it until the case is closed or goes to court, throughout the case, the evidence is confiscated by the investigator who has the proper right under the law to maintain and keep the evidence immutable. Other concerns which need to be addressed when bringing law enforcement to the scene is that the officers should follow proper procedure when acquiring the evidence such as in digital evidence which can be easily altered by an overeager investigator, special concerns should be given to the information on storage media such as hard disks which are password protected. Network forensics Network forensics is the job of finding the information about how a perpetrator or an attacker gained access to a network, it involves systematic tracking of incoming and outgoing traffic to find out how an attack was carried out or how an event occurred on a network, the forensic expert should be very well experienced and be familiar with many previously related cases of network because the intruders which the network forensic searches for always leave some sort of trail behind, this trail

Wednesday, November 13, 2019

Comparing Franz Kafka and Gregor Samsa in The Metamorphosis Essay

Similarities between Franz Kafka and Gregor Samsa in The Metamorphosis It is unusual to say the least to open a book and the first line is about the main character waking up as a large insect. Most authors’ use symbolism to relate the theme of their work, not Franz Kafka. He uses a writing method that voids all aspects and elements of the story that defy interpretation. In doing this, he leaves a simple story that stands only for an objective view for his own thoughts and dreams. Kafka focuses the readers’ attention on a single character that symbolizes himself and his life, not Everyman as some authors do. This method is displayed in most of his literary works. To understand how this method is recognized, readers must study the author’s background during the period of writing and basic history to understand this author’s motive. In his short story, â€Å"The Metamorphosis†, there are multiple similarities between Kafka’s true life and Gregor Samsa’s. Before the similarities are displayed, the justifications behind this premise are as follows. Kafka’s works demonstrates the use of a self-nulling reference system in order to void possibilities of critics attempting to use hermeneutics (Thiher, 50). Hermeneutics is the methodology of interpretation. Examples of this method can be found throughout the story in the use of the realistic and unrealistic elements intertwined in different situations. â€Å"Kafka’s Metamorphosis validates contradictory readings that cancel coherent interpretation,† is a quote by confirmed critic Gavriel Ben-Ephraim(451). A specific example can be located in Part I, when Gregor attempts to rise from bed and fails. He thinks to himself, â€Å"What a job I’ve chosen.† In truth, he did not h... ..., Gavriel. â€Å"Making and Breaking Meaning: Deconstruction, Four-level Allegory and The Metamorphosis.† Midwest Quarterly. 35 (1994): 450-67. Sources Consulted â€Å"Franz Kafka/The Metamorphosis.† Literature, Arts, and Medicine Database. Corngold, Stanley, ed. Oct. 2002.New York U. 21 Oct. 2002. . â€Å"Biography/Franz Kafka.† Literature Research Center. 2002. Thomas Gale Group. 21 Oct. 2002. . Goodwin, Evan. â€Å"little blue light-Franz Kafka.† little blue light. 6 May 2002. 13 November 2002. . Stephens, J. â€Å"Franz Kafka’s personal life reflected in the Metamorphosis† The Kafka Project. 1999-2002. 13 November 2002. . Comparing Franz Kafka and Gregor Samsa in The Metamorphosis Essay Similarities between Franz Kafka and Gregor Samsa in The Metamorphosis It is unusual to say the least to open a book and the first line is about the main character waking up as a large insect. Most authors’ use symbolism to relate the theme of their work, not Franz Kafka. He uses a writing method that voids all aspects and elements of the story that defy interpretation. In doing this, he leaves a simple story that stands only for an objective view for his own thoughts and dreams. Kafka focuses the readers’ attention on a single character that symbolizes himself and his life, not Everyman as some authors do. This method is displayed in most of his literary works. To understand how this method is recognized, readers must study the author’s background during the period of writing and basic history to understand this author’s motive. In his short story, â€Å"The Metamorphosis†, there are multiple similarities between Kafka’s true life and Gregor Samsa’s. Before the similarities are displayed, the justifications behind this premise are as follows. Kafka’s works demonstrates the use of a self-nulling reference system in order to void possibilities of critics attempting to use hermeneutics (Thiher, 50). Hermeneutics is the methodology of interpretation. Examples of this method can be found throughout the story in the use of the realistic and unrealistic elements intertwined in different situations. â€Å"Kafka’s Metamorphosis validates contradictory readings that cancel coherent interpretation,† is a quote by confirmed critic Gavriel Ben-Ephraim(451). A specific example can be located in Part I, when Gregor attempts to rise from bed and fails. He thinks to himself, â€Å"What a job I’ve chosen.† In truth, he did not h... ..., Gavriel. â€Å"Making and Breaking Meaning: Deconstruction, Four-level Allegory and The Metamorphosis.† Midwest Quarterly. 35 (1994): 450-67. Sources Consulted â€Å"Franz Kafka/The Metamorphosis.† Literature, Arts, and Medicine Database. Corngold, Stanley, ed. Oct. 2002.New York U. 21 Oct. 2002. . â€Å"Biography/Franz Kafka.† Literature Research Center. 2002. Thomas Gale Group. 21 Oct. 2002. . Goodwin, Evan. â€Å"little blue light-Franz Kafka.† little blue light. 6 May 2002. 13 November 2002. . Stephens, J. â€Å"Franz Kafka’s personal life reflected in the Metamorphosis† The Kafka Project. 1999-2002. 13 November 2002. .

Sunday, November 10, 2019

Mckesson Corporation: Competitive Environment Trends and Business Model Assessment

McKesson Corporation: Competitive Environment Trends and Business Model Assessment U07a1, DB8004 – Strategic Thinking and Innovation, Section 01 McKesson Corp: Competitive Environment Trends and Business Model Assessment McKesson Corporation is largest health-care provider in the United States; as of 2011 it ranked as the third largest company in the state of California; where the company is headquartered. On the Fortune 500 list McKesson is ranked 15 (â€Å"Fortune 500,† 2011), McKesson consisted of several Strategic Business Units (SBUs).McKesson’s SBUs are divided into two primary categories: Distribution Solutions and Technology Solutions. The Distribution Solutions service all 50 states and deliver pharmaceuticals to institutional providers such as hospitals and health care systems; and also distributes to retail pharmacies; physician offices, surgery centers, long-term care facilities, and home care businesses. McKesson Canada, which is a part of McKesson, is a leading distributor in Mexico via its equity holding in Nadro. McKesson Distribution Solutions consist of the following SBUs (McKesson, n. . ): †¢McKesson Medical-Surgical †¢McKesson Patient Relationship Solutions †¢McKesson Pharmaceutical †¢McKesson Pharmacy Systems †¢McKesson Specialty Care Solutions †¢Moore Medical †¢Plasma and BioLogics †¢Zee Medical McKesson Technology Solutions consists of software, services and consulting to hospitals, automation, imaging centers, physician offices, home health care agencies, and payors. The Technology-Solutions of McKesson Provide an avenue to improve health care safety, manage revenue streams and resources, and reduce the cost and variability of health care. McKesson Technology Solutions consist of the following SBUs (McKesson, n. d. ): †¢McKesson Automation †¢McKesson Health Solutions †¢McKesson Provider Technologies †¢RelayHealth McKesson is one of the most successful compan ies in its industry in the United States. From a strategic management and planning perspective McKesson believe in unity within its divisions. Although the businesses are separate entities, there are some similarities in reference to management and interface with the parent company.The focus on this paper will be on McKesson Medical-Surgical, which is a SBU of McKesson Distribution Solutions; and the interface with the parent company; McKesson Corporation. McKesson Medical-Surgical Interface with McKesson Company McKesson as a company believe in unity; especially from a management perspective. This company has consistently acquired other companies; and has successfully managed to bring unity within each SBU based on the management goals of the parent company.According to Raynor, (2007), â€Å" McKesson has acquired approximately 75 companies since 1995 that have been aligned with or assimilated into our assorted business units. Our size and breadth of products and services fostered variability in HR practices that diluted our efforts to become a more seamless â€Å"One McKesson. † Accordingly McKesson embarked on a series of initiatives to standardize, improve and automate, where possible, its HR processes. Human Resources and Organization Management Team McKesson created a team of Human Resource and Organizational Effectiveness (OE) professionals in 2004.The focus of this team was to develop best practices and improved quality via a buy-in from all the business units. If a consensus is not met after voting on an issue, an 80 percent majority vote is required to move on (Raynor, 2007). Performance Management Team McKesson has created a weekly meeting for over a year for the Performance Management Design Team, which met virtually via conference call or web meeting. This team was also designed to focus on more unity within the company. The team was responsible for creating roles and responsibilities for performance management; with emphasis on employee i nvolvement.New competency model was developed to redefine the rating scale. ePeformance was implemented; via a PeopleSoft module and customized to support the newly created program and standardized performance practices (Raynor, 2007). McKesson Supply-Chain Management McKesson experience with its acute-care distribution business; which is also the bread and butter in the more recent years for McKesson; effective supply chain management has created success for various SBUs within the company. Supply chain management has been consistent within McKesson Corporation throughout all the SBUs.The consistency is the belief in building strong relationships with customers, offering innovative supply chain management products and services; a creating innovative technology solutions. This consistency has also allowed the company to grow by adding new customers and increasing the business with their existing customers (Smith, 2006). Environmental Trends and Current Business Model McKesson Medica l-Surgical is a spin-off of what used to be a drug wholesaler; Gil Minor III created what is currently considered a powerhouse medical and surgical box; which is where the market was trending (Smith, 2006).The company has taken advantage of creating convenience in the medical industry. Instead of selling from a brick and mortar pharmacy, this company has taken advantage of selling via supply chain directly to its customers as well as on-line sales. From a strategic perspective the company has managed to create success in various ways. McKesson business units’ success is based on consistency, innovation, creativity, from one division to another. The company has taken medical supplies and services to a different a level.They are not the typical CVS or Eckerd Drug store; the company caters more to medical professionals, such as doctors, psychiatrists, but more to medical professions who have connections with hospitals. The company also provides medical supplies and services to m ost major hospitals as well as other medical institutions. The innovation of the supply chain management, medical technologies, and the acquisitions and expansions has been successful for McKesson. A key element is also their ability to place the customer first.From a strategic management and planning perspective, below are some of the strategies used by McKesson to build and sustain success in their businesses. McKesson Strategies Incorporated This Millennium| McKesson Technology and Information Technology & Other Changes| Provide service physician practices that are connected with large hospital systems. | Ongoing investment in technology has helped to differentiate McKesson in the market and has been a key element in its success| Rarely pursue the individual physician market, since distributing to so many mall, individual offices is not our core competency. | Continue to invest in creating innovative technology solutions that help improve the supply chain. | Offer third-party-log istics services to certain manufacturers, which have proven to be fruitful partnerships for both parties. | QSight, an innovative inventory management program allows hospital professionals to manage clinical inventory with an easy-to-use Web-based platform| Offer Integrated Service Center model to customers who might wish a different distribution model from traditional distribution. Acquisition and Expansion | McKesson does not sell pharmaceuticals, over-the-counter pharmacy goods or medical surgical products directly to consumers| Putting the customer first| (Smith, 2006) McKesson business model relate to various environmental trends; such as new and innovative technologies, with cutting edge improvements. Creation of a cutting-edge supply chain management; which is currently an important trend with many companies that are trying to improve their bottom line and stream line their business(es).McKesson also provide supplies and services to home health care, and been very successful with acquisitions and expansions. The environmental trends support the current business models and have created success within the company as well as the various divisions. McKesson Business Model Success According to Acur & Bititci (2003), â€Å"Today’s globally competitive environment is complex, dynamic and unpredictable. To deal with this level of change, uncertainty and complexity companies need to develop and review their strategies almost continuously to stay ahead of the competition.Within this dynamic environment strategy management requires considerable resources and effort in terms of managerial time, with increasing pressures for innovation, knowledge sharing and co-operation. † McKesson has proved that it is on the leading edge of technology in its industry; the company is continuously working toward new innovative ideas to create more efficient; better service; much of the operation has been focus on supporting supplies from a global supply chain manageme nt perspective. McKesson is the longest-operating company currently in the healthcare industries.The Medical-Surgical business unit of McKesson, similar to McKesson as a whole has been efficient with its strategic management and planning as well as successful as a SBU of McKesson. McKesson Annual Report as of Fiscal Year End March 31, 2011 shows the Medical-Surgical Distribution and a service has increase consecutively since 2009. McKesson Business Model Reinventions McKesson has reinvented several models within the last five years which have proven to been successful for the company as a whole and its strategic business units.Value creation and strategies should be identified at each business unit within an organization to create an integrated approach to strategic management. Strategic objectives should be deployed and implemented. To compete from a global environment; which is constantly changing the operational environment of a business strategy planning and management should be a continuous process, which will provide a closed-loop-control system which will facilitate management of the organization performance as a whole as well as individual business units (Acur, et al, 2003).McKesson has reinvented their supply-chain planning and management from business unit to business unit. New and innovative technologies; placing the customer first; expansion and acquisition is what McKesson has done repeatedly and been success as whole as well as with its individual business units. Key Resources and Generic Strategy Deployed Within the Business Model One of McKesson’s key resources within the Medical-Surgical Business Units is the uniqueness of its distribution – supply chain.Unlike some pharmaceutical that companies focus on distribution to Walgreens, CVS, Walmart, and other similar store chains; McKesson focus its supply chain on physician who have practices which are connected to large hospitals. McKesson supply-chain increase efficiencies from an operational perspective with its electronic ordering and purchasing system; with the improved system the company can offer faster and better customer service and deliveries. Another area in which McKesson offer uniqueness from a company and business unit perspective is managing their human resources to help impact the bottom line – from a financial point of view.According to Raynor (2007), â€Å"Performance management is increasingly regarded as a business process with real bottom-line impact, versus an HR program. † â€Å"Instead of being viewed as an HR program, performance management was now discussed in terms of business impact. † Summary From management perspective sustainability is the ability to meet the needs of the present, yet not compromise the ability to meet future needs (Haugh & Talwar, 2010). McKesson Medical-Surgical Business Unit financial in the last few years has reflected financial sustainability.McKesson’s supply chain operation from a global perspective, the ability to continuously improve and create new technologies; as well as new ways of doing business in the pharmaceutical industries has placed McKesson above many other pharmaceutical companies. The focus on human resource development with the creation of the Performance Management Design Team places McKesson and its business units above many companies today. All companies have various resources which play an active role in the performance of a company.However, most companies under-rate the importance of in my opinion their internal customers. Employees play an active part in how a company performs financially. From a psychology perspective a happy person is can think better and perform better than one who is unhappy. Knowing how to manage ones human resource can improve how a company perform; and can increase innovative ideas from employees. All other resources can only be a good as a company’s human resource. References Acur, N. , & Bititci, U. (20 03). Managing strategy through business processes.Production Planning & Control, 14(4), 309. Retrieved from EBSCOhost. Fortune 500: 15. McKesson. (2011). Retrieved from http://money. cnn. com/magazines/fortune/fortune500/2011/snapshots/2219. html Haugh, H. M. , & Talwar, A. (2010). How Do Corporations Embed Sustainability Across the Organization?. Academy of Management Learning & Education, 9(3), 384-396. doi:10. 5465/AMLE. 2010. 53791822 Leveraging Business Intelligence for Revenue Improvement. (2008). hfm (Healthcare Financial Management), 62(8), 1-8. Retrieved from EBSCOhost.McKesson. (n. d. ) McKesson About 2BU Our 2BU Company Businesses 2BBusinesses. Retrieved August 20, 2011, from http://www. mckesson. com/en_us/McKesson. com/About%2BUs/Our%2BCompany/Our%2BBusinesses. html Raynor, E. (2007). Developing the Performance Culture at McKesson Medical-Surgical. Organization Development Journal, 25(4), P19-P25. Retrieved from EBSCOhost. Smith, C. (2006). Distributor CEO extends reach from hospital bedside to the home. Healthcare Purchasing News, 30(9), 16-21. Retrieved from EBSCOhost.