Thursday, November 28, 2019

Football at Slack Essay Example

Football at Slack Essay As the train approaches its destination, the poem gains momentum as though possessed of some new energy, then suddenly slows down. The philosophical discourse slackens too, as Larkin can no longer sustain the intensity of his superior knowledge that extends far beyond the superficiality of socially constructed rituals. He relinquishes the awareness that the journey was merely a frail / Travelling coincidence: the experience now inhabits the past, and Larkin releases his hold on it, leaving him free to pursue the fertile possibilities of the future. Larkin has taken us on a journey through more than simply space and time: it has been a journey through experience and knowledge. It has revealed and observed the substance of Englishness: its landscape and the people who inhabit it. The gentle closing lines of the poem: there swelled A sense of falling, like an arrow-shower Sent out of sight, somewhere becoming rain is an optimistic release of the true meaning of life that can never be fully sustained, or indeed realised, by most Englanders. In the poetry which makes up The Whitsun Weddings, Larkin presents the reader with a simple and uncomplicated depiction of the matter of England, through which it is easy to perceive what is the matter with England. Ted Hughes has an altogether different attitude towards the matter of England, and indeed towards poetry itself. There are few overt references to the English nation in his New Selected Poems 1957-1994, primarily because Hughes does not deem the rational division of the earth into separate states to be of any real importance. We will write a custom essay sample on Football at Slack specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Football at Slack specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Football at Slack specifically for you FOR ONLY $16.38 $13.9/page Hire Writer To him landscapes, animalistic forces and the scope of nature are not contingent upon the demarcation of a particular region they are equally in existence the world over. However, certain landscapes in his verse can be identified geographically, and many of these are of England, or at least an England of the past. For example, Remains of Elmet is a series of poems which has as its backdrop the last Celtic kingdom; within this geography Hughes brings together history and the activity of contemporary life to create a mythic effect. England is depicted through the portrayal of the whole of western civilisation. The sentiments contained in Hughes poetry apply to England because it has been shaped by the same processes as western culture, and both are now in the grip of a spiritual and natural paralysis. Hughes harbours a powerful contempt for western civilisation because its values and attitudes have impeded the operation of mans natural energy. 4 He conceives of civilisation as a cage from which man must break free and rediscover basic instincts. Thus the role of contemporary society is negated, and the logical rationalism of modernity is denied, in favour of the evocation of primitive but unrecognised natural forces at work in man and his environment. Hughes sees that being disconnected from this inner [primeval] world, life becomes empty, meaningless, sterile. 5, so he uses poetry as a means to discover this life by giving voice to the figure beneath the mask of civilisation. Social history becomes translated into a natural history by Hughes poetry: in October Dawn for example, the social is related to the evolution of the landscape. 6 October Dawn sets a precarious civilisation against the puissant force of nature, a battle which civilisation inevitably loses. This poem emphasises that western culture is subject to the benevolence of the earth, and can be reclaimed at any point. So A glass half full of wine is left out / To the dark heaven all night like an offering to placate some primeval god. Yet the insubstantial wine glass, an emblem of civilisation, is doomed as natural forces begin to conquer all things man-made: Ice/ Has got its spearhead into place. The delicacy soon gives way to something more forceful, which is reflected by the elemental and energetic diction: a fist of cold / Squeezes the fire at the core of the world. Such is the unbridled power of nature that it has eliminated the civilised man and all evidence of his existence, and reinstated the Mammoth and Sabre-tooth, but has only just begun its domination. The potential of the landscape is immense: And now it is about to start. Football at Slack appears in Remains of Elmet, a collection that focuses on a real world inhabited by real people as opposed to the mythopoeic world of Crow, for example. Here, the human and the elemental interact in an exhilarating celebration of vitality. But significantly the human activity of football, a game that occupies an increasingly central role in the culture of England, is contained within the bounds of the landscape: Between plunging valleys, on a bareback of hill. The football game is recounted in a gently mocking tone; the football players take on an absurd quality, and become almost clown-like figures: Men in bunting colours / Bounced, and The rubbery men bounced after it. There is something incongruous about the whole activity men flailing around in the landscape, chasing a ball while the enduring hillside looks on. As always, nature exercises control over the activities of man: The ball jumped up and out and hung on the wind / Over a gulf of treetops. Nature exerts its powers on the men, as though in teasing; for although: the rain lowered a steel press leaving the players practically submerged, they remain: washed and happy. Man interacts with the landscape, and there is the connotation that the landscape watches the match and is entertained by it. Hughes identifies in this football game a vestige of mans natural energy. Yet although in this instance the natural and the social operate side by side in a complicit agreement, Football at Slack carries the suggestion that the hillside could at any time unleash its power on the comical figures: a golden holocaust / Lifted the clouds edge. A bleak, physical landscape once again has supremacy over humankind, and primitive energies possess the advantage over the peculiarities of western civilisation. An awareness of the carnal mentality shared by animals and humans alike is basic to Ted Hughes. 7 The impulse to get back to a new and more vital life principle is ever present in his poetry -he strips humanity down to a bare animal in order to attempt a reconciliation with a consciousness that has insisted on the alienation from the inner life. The Long Tunnel Ceiling is a drama of consciousness, and illustrates the way in which the observation of animals, as representative of the true order of nature, provides the stimulus for the re-acquaintance with our true selves. In The Long Tunnel Ceiling, the sight of a trout in a canal marks a departure from the mundaneness of modern life, and the verse that contains it. The fish takes on the persona of a natural god, a: Master of the Pennine Pass, and in that capacity is exalted, indeed almost worshipped, by Hughes. The sighting of the: Molten pig of many a bronze loach triggers in the poet an imaginative flight into a mystical, natural landscape a flight on which he is accompanied by the reader: Brought down on a midnight cloudburst In a shake-up of heaven and the hills When the streams burst with zig-zags and explosions. An encounter with a single, inert fish initiates a mental and spiritual departure from the heedless bustle of modern life, with its: Lorries from Bradford [and] Rochdale that pass insistently overhead. The animal is accepted as a desirable and precious aspect of the self; against this knowledge, the industrial society that surrounds the poet and the trout fails to possess any meaning. We are left with an awareness of a wild god that flowers like a symbol of hope and sustenance amid the relentless passage of modern life. Her Husband is one of the few poems by Hughes to possess a socially oriented view. A precarious social hierarchy, with males assuming a higher status because they know: The stubborn character of money, is portrayed. The existence of humans and their ultimately insignificant social structures are sustained through the violation of the landscape. Thus civilisation is supported and underpinned by nature. Yet the poem suggests that the physical earth will revenge its desecration at the hands of ruthless humanity: Their jurors are to be assembled / From the little crumbs of soot. The transience and superficiality of western culture is contrasted with the enduring and far superior presence of the landscape and its fossil fuels: Their brief / Goes straight up to heaven and nothing more is heard of it. The farcical notion of the rights of humanity is burnt away as effortlessly as the coal. Hughes portrays basic natural forces with a language of energy and vigour, and in doing so creates a mythic dimension. The poetry of Ted Hughes is neither social commentary nor a straight-forward description of the geography of England. It condemns the whole of western culture, of which England is a part, for distancing itself and its people from the strong primitive urges that comprise the inner self. His aim is to: reconnect our own natural energies with those in the external, natural world8 through the medium of poetry. Both Philip Larkin and Ted Hughes both examine the matter of England, and expose its flaws. But their attitudes towards and treatment of this England differ radically. The term English poets seeks to unite the two perspectives of two poets that remain essentially irreconcilable.

Sunday, November 24, 2019

B Cells

B Cells B cells are white blood cells that protect the body against pathogens such as bacteria and viruses. Pathogens and foreign matter have associated  molecular signals that identify them as antigens. B cells recognize these  molecular signals and produce antibodies that are specific to the specific antigen. There are billions of B cells in the body. Unactivated B cells circulate in the blood until they come in contact with an antigen and become activated. Once activated, B cells produce the antibodies needed to fight against infection. B cells are necessary for adaptive or specific immunity, which focuses on the destruction of foreign invaders that have gotten past the bodies initial defenses. Adaptive immune responses are highly specific and provide long-lasting protection against the pathogens that elicit the response. B Cells and Antibodies B cells are a specific type of white blood cell called a lymphocyte. Other types of lymphocytes include T cells and natural killer cells. B cells develop from stem cells in bone marrow. They remain in the bone marrow until they become mature. Once they are fully developed, B cells are released into the blood where they travel to lymphatic organs. Mature B cells are capable of becoming activated and producing antibodies. Antibodies are specialized proteins  that travel through the bloodstream and are found in bodily fluids. Antibodies recognize specific antigens by identifying certain areas on the surface of the antigen known as antigenic determinants. Once the specific antigenic determinant is recognized, the antibody will bind to the determinant. This binding of the antibody to the antigen identifies the antigen as a target to be destroyed by other immune cells, such as cytotoxic T cells. B Cell Activation On the surface of a B cell is a B cell receptor (BCR) protein. The BCR enables B cells to capture and bind to an antigen. Once bound, the antigen is internalized and digested by the B cell and certain molecules from the antigen are attached to another protein called a class II MHC protein. This antigen-class II MHC protein complex is then presented on the surface of the B cell. Most B cells are activated with the help of other immune cells. When cells such as macrophages and dendritic cells engulf and digest pathogens, they capture and present antigenic information to T cells. The T cells multiply and some differentiate into helper T cells. When a helper T cell comes in contact with the antigen-class II MHC protein complex on the B cells surface, the helper T cell sends signals that activate the B cell. Activated B cells proliferate and can either develop into cells called plasma cells or into other cells called memory cells. Plasma B Cells ​ These cells create antibodies that are specific to a specific antigen. The antibodies circulate in bodily fluids and blood serum until they bind to an antigen. Antibodies debilitate antigens until other immune cells can destroy them. It can take up to two weeks before plasma cells can generate enough antibodies to counteract a specific antigen. Once the infection is under control, antibody production decreases. Some activated B cells form memory cells. Memory B Cells ​ This specified form of B cell enables the immune system to recognize antigens that the body has previously encountered. If the same type of antigen enters the body again, memory B cells direct a secondary immune response in which antibodies are produced more quickly and for a longer period of time. Memory cells are stored in the lymph nodes and spleen and can remain in the body for the life of an individual. If enough memory cells are produced while encountering an infection, these cells can provide life-long immunity against certain diseases. Sources Immune Cells and Their Products. NIAID National Institutes of Health. Updated 2008 October 02.Alberts B, Johnson A, Lewis J, et al. Molecular Biology of the Cell. 4th edition. New York: Garland Science; 2002. Helper T Cells and Lymphocyte Activation.

Thursday, November 21, 2019

WW2 Japan and China's war AKA the Second Sino japanese war Research Paper

WW2 Japan and China's war AKA the Second Sino japanese war - Research Paper Example The results of the war were that they were displaced from their homes and properties totaling to billions destroyed1. This paper examines into details second Sino-Japanese War and its effects. The second Sino-Japanese War origin is traced back to the incident in Manchurian which took place in September 1931. Japanese being effectively consolidated had occupied different territories and the Kwantung army went ahead to occupy Munchuria. After this, they established their puppet state In Munchuria known as Manchukuo in February 1932. The Chinese were not happy with this change, but the Japanese forced them to recognize the independence of their puppet states. They opposed this by conducting suppressed anti-Japanese activities and in the process forming an autonomous regional government in Northern China. However, the Japanese succeeds in their quest of forming puppet states because between the periods of 1933 and 1935, the Chinese people were forced through their armies to create two demilitarized autonomous areas to border their puppet state2. The break of the Second Sino-Japanese war was traced back to increased internal opposition to the Japanese government by Chinese citizens who saw that the Japanese policy of making their selves stronger before carrying out an attack was a threat to their sovereignty. In 1937, the Japanese soldiers headed for Beijing and Tainjin demanding that the Chinese soldiers were to surrender under their terms. This was because they knew that the military might of the Chinese could not match them as they were advanced weaponry. However, this did not go as planned because the Chinese clashed with the Japanese as they saw that they were slowly loosing their freedom and country to the Japanese who were foreigners in their land3. The Chinese initial response to this was to place their troops outside Shangai an area occupied by the Japanese. This act greatly agitated the Japanese as they saw this as an act of challenge to their

Wednesday, November 20, 2019

The Trial Process Essay Example | Topics and Well Written Essays - 750 words

The Trial Process - Essay Example The statements made during the opening statement are not to be considered as part of the evidence. Rather, they serve to build a connection between the two sides to the case and set straight the plot that the case is going to take, while trying to influence the juries with the arguments and the evidence available. Even though there is no argument of the case at this phase, the stage, as one of the component of the trial process serves to set the stage for the actual process of case trial (Wayne, 2003). The next component in the trial procedure is the prosecution’s case presentation, where the prosecutor presents the evidence and all the information necessary to the case, in an attempt to prove that the defendant is guilty before the court (Sadakat, 2005). The prosecutor has to prove beyond a reasonable doubt that the defendant is guilty of all the charges aligned with him. If he fails to do this amicably, then the defense can request that the case be dismissed at this stage, w ithout the need to proceed to offer the case defense. If the prosecutor provides sufficient evidence to prove that the defendant is guilty, then the next stage follows. The next component of the case is the direct and the cross examination of witnesses. Under this component, the witnesses are sworn under oath to give true and only facts regarding the case. Each side to the case will then examine the witnesses through a question and answer session, where the counsels of both sides asks the witnesses questions to unearth some facts and prove the allegations already given (Zuckerman, 2012). During the cross examination, all attempts are made to indicate the inconsistencies and the loopholes that are left unsealed by the witness testimonies. The need for this component as part of the trial process is to have each side to the argument discredit the other, based on the testimonies given (Wayne, 2003). The next component that follows is the defense’s case, where the counsel represen ting the defendant will present their case, indicating how the case presented by the prosecutor does not qualify to make the defendant guilty before the court (Zuckerman, 2012). The defense can also seek to show the court that the prosecutor lacks sufficient evidence to prove the case against the defendants. In doing this, the defense counsel may cite the weaknesses made by the witnesses during the testimony session. The need for this component of the trial process is to indicate how the prosecution’s evidence fails to meet the threshold of conviction that the defendant is guilty. At this stage, the defense calls their witnesses who also give the testimony, opposing the guilt of the defendant. After the defense makes their case, the prosecution can react to this, though only in relation to new suggestions that defense has noted which were not addressed by the prosecution (Sadakat, 2005). The next component of the trial process that follows is the closing argument. Here, the p rosecution presents their final arguments, addressing any relevant details to the case that they could have forgotten, in a summary manner. This is followed by the closing arguments given by the defense, summarizing their main points and giving any relevant information they could have skipped during the preceding stages (Wayne, 2003). Of importance is

Monday, November 18, 2019

The Usefulness of Marketing for Media and Entertainment Companies such Essay - 1

The Usefulness of Marketing for Media and Entertainment Companies such as Disney - Essay Example Strong brand imaging is important to engross higher customer equity. If taking the example of Disney, they are customer focused but their prices are not comparatively lower. Currently they are more conscientious about penetrating their existing market e.g., selling more to the prevailing consumers, continual expansion in marketing efforts to promote brands and improving the product quality to gain higher customer satisfaction by attaining expectations of customers. Their current marketing strategy can be analyzed as a â€Å"Brave† stroke of strategic mix. This entailed after observing the tremendous success of the movie â€Å"Brave† which performed terrifically on the box office as 13th top of the list movie consecutively yielding $66.7 Million. The analysts had topped up that Brave will barely be able to earn its cost on box office but its success made them to think about the Disney’s marketing strategies (Hughes, 2014). After examining the strategies of the Walt Disney and Time Warner, it has been concluded that customer affiliation is most important. Walt Disney has pointed on the right stroke by exploiting the exact opportunistic approach for example the strategic partners such as, McDonald. The characters embossment of Time Warner is reported as higher according to Gallup among the young generation yet the success rate of Disney is more than Time Warner (Gilchrist, 2013). The Dream works media entertainment also possesses a sustainable position in the industry but the character embossment and impact is not comparable because of strategic partnership and marketing practices (Hughes, 2014). Another important distinguishable feature of Disney’s marketing practice is the use of CSM (Corporate Social Marketing) (Robbins, 2014). Marketing is however important in this industry because all they have to disseminate and sell is the entertainment. It

Friday, November 15, 2019

Researching The Computer Forensics Investigation Plan

Researching The Computer Forensics Investigation Plan The purpose of this paper is to review the basic methodologies and the appropriate processes that a computer forensic investigator goes through in conducting an investigation. It will give an idea to the reader about the planning and organization of an investigator who is involved in a computer related crime, the ways in which he will conduct the investigation such as basic preparation, use of the required tools and techniques, acquisition and analysis of the data, role in giving testimony, use of forensic laboratories or the guidance of all the staff working under the main investigator and even planning network forensics all of which are related to his work. The Computer Forensics Investigation Plan A computer forensic investigates data that can be retrieved form storage media of a computer such as a hard disk, it is also considered that to be a successful computer forensic the knowledge of many different platforms to perform computing is a must, for our case we will consider you as the chief forensic investigator in the state of Virginia, as a part of private enterprise you are assigned the role of planning the computer investigation of a suspected criminal activity, we will see from your perspective how you should conduct all the necessary procedures. We dont just need science; we need good science (Evans, 2004) Always analyze major issues in preparing for an investigation. The crime scene is considered to be a very sensitive place in terms of collecting proofs and evidences which are in many cases very vulnerable and can be very easily be manipulated so special attention is needed in every aspect of recovery methods in order to gain as much as possible. Before arriving at the scene of crime, it is mandatory that you should always take a systematic approach in problem solving like making an initial assessment about the case then determining a preliminary approach to the case, after that, create a detailed checklist of the objectivity of the case, analyze the resources needed, identify all the risks and try the very best to minimize them, also outline all the details known about the case until then in a systematic manner such as the situation in which you will be arriving, the nature and specifics of the case, the type of computer forensic tools which will be needed at the case and to check on the specific operating systems in disposal which assist in the forensics investigation process. Once at the crime scene, try to gather evidence to prove that the suspect violated the company policy or committed a crime, since this is a private sector investigation it includes corporate businesses, other agencies of government are not involved such as law enforcement. The law enforcement agencies act according to the federal freedom of information act or laws of similar descent according to their territory in all process. Investigating and taking control of the computer incident scene in the corporate environment is considered to be much easier than in the criminal environment because the incident scene is often the workplace, these workplaces have databases of computer hardware and software which can also be analyzed, proper tools can be adopted to analyze a policy violation if any. Many companies either state their policy right away or show some warning, some apply both whose purpose is to tell that they hold the complete right to inspect the computing assets of their respective subjects at will, in addition to that every company must describe when an investigation can be initiated and allow the corporate investigators to know that under what circumstances they can examine the computer of an employee, if the investigator finds about the wrongdoing of the employee then the company can file a criminal complaint against him. If any evidence is discovered of a crime during the investigation then the management must be informed of the incident, checking the incident itself that it meets the elements of criminal law, work with the corporate attorney and also to see that you dont violate any other constitutional law in all the procedure. Preparing for a computer seizure for search operation is one of the most important point in conducting computing investigation. In order to do this, some answers from the victim and an informant may be needed, informant can be a detective for the case, a witness, a manager or any coworker to the specific person of interest. If you can identify the computing system, then estimate things such as how many computer systems to process and size of drive on the computer of the suspect, also determine which operating systems and hardware are involved. Determining location of the evidence and the cases type is very crucial, it allows to determine if computers can be removed. If the removal of the computers will cause harm to the company then it should not be done in the interest of the company, problems in investigation may arise if the files are most probably hidden, encrypted or stored in some offsite, if the computers are not allowed to be taken for investigation then the investigator must determine the resources to acquire digital evidence and the proper tools which will be needed to make data acquisition faster. Also determine who is in charge of the respective systems (in corporate environment, usually one persons assistance from the company is required in this regard). Always keep some specialists who work on many different types of operating systems, servers or databases and properly educate those specialists in investigative techniques. Once arrived, securing the crime scene or the specific computer is the foremost priority of the investigation team, the purpose is to preserve the evidence and keep the acquired information confidential. The investigative team should define a secure perimeter using a special type of yellow barrier tape, it should also have the legal authority to keep the unnecessary people out but do not fail to comply the other law enforcers or obstruct justice in any manner possible. Only professional task force should handle the crime scene for evidence as any non professional law enforcer can manipulate or even destroy the vital piece of evidence which may be very crucial in the overall scenario. Remember that corporate investigators does not seize evidence very often, more brief guidelines for processing an incident or crime scene goes as follows, keeping a journal to document the activities, securing the scene in the sense of being professional and courteous with onlookers, removing all those personnel who are not associated with investigation, taking all the proper and necessary recordings in video of the area surrounding the computer, at the same time paying attention to all the major and minor details. Sketching the incident of the crime scene and checking the computers as soon as possible. While at the crime scene, dont ever cut the electrical power to a running system by pulling the plug unless it is an older Windows or DOS system (which in these days are very rarely found anywhere), instead apply a live acquisition by the proper acquisition methods if possible, when shutting down computers with Operating Systems such as Windows XP or later version of it or Linux/Unix then always remember to perform a normal shutdown of the system, this helps to prevent log files. Try the very best to save the data from the current applications as much safe as possible, properly record all active windows or other shell sessions, and photograph the scene. Also make notes of everything that is done even when copying the data from a live computer of a suspect, save open files to external storage medium such as a hard drive or on a network share (if somehow the saving mentioned is causing problems then save with some new titles), then close applications and shut down the computer. Further guidelines include on bagging and tagging the evidence which is done as follows, first assign a person to collect (and log) the evidence, then tag all the evidence which is collected with the present date/time, serial number or other features. Always keep two separate and different logs of evidence collected an keep control of the evidence at the crime scene. Always look for information related to the investigation such as passwords, PINs, passphrases, bank accounts and so on. Look at papers in places such as the drawers or even try to search the garbage can. Collect all the related documents and media which is associated with investigation such as manuals or software/hardware. Using a technical advisor of high degree experience and knowledge is a must, technical advisor can help to list the tools which are required to make progress at the crime scene, it is the person which can guide the investigation team about where to locate data and help the team in extracting the log records or other evidence form large servers. The advisor can also create or help to make a search warrant by finding what is needed by the investigators for the warrant. More brief responsibilities of the technical advisor includes to know the aspects of the seized systems, to direct the main investigator on handling sensitive material, helping in securing the crime scene, helping to plan the strategy for search and seizure (documenting it), document all the activities and helping in conducting the search and seizure. Documenting all the evidence in the lab is also a necessary process, which involves in recording the activities and findings as the investigators work; this can be done by maintaining a journal to record the steps taken as the investigator process evidence. The main objective is to produce the same results when the main investigator or any other repeat the steps that were taken to collect evidence, a journal serves as reference that documents all the methods that have been used to process evidence. For proper documenting the evidence, always create and use an evidence custody form, which serves the following functions such as identify who has handled the evidence and identify the evidence itself, properly listing all time and date of the handling of the evidence. Other information can also be added to the form such as specific section listing and hash values, try to include any other detailed information that might need for reference. Evidence forms or labels are present in the evidence bags that can be used to document the evidence. Forensic Tools Always prepare the tools using information from incidents and crime scenes, the initial response field kit should be light in weight and easy to transport form one place to another. An addition to the initial kit is the extensive response field kit which must include all the necessary tools. The items in an initial response field kit may include one digital camera or 35mm camera with film and flash, one flashlight, one laptop computer, one large capacity drive, one IDE ribbon cable (ATA-33 or ATA-100), one SATA cable, one forensic boot media containing the preferred utility, one FireWire or USB dual wire protect external bay, ten evidence log forms, one notebook or dictation recorder, ten computer evidence bags (antistatic bags), twenty evidence labels, twenty tape and tags, one permanent ink marker, ten external USB devices such as a thumb drive or a larger portable hard drive.(cited in Nelson, Phillips Stewart , 2004) Tools in an extensive response field kit may include varieties of technical manuals ranging from operating systems references to forensic analysis guides, one initial response field kit, one portable PC with SCSI card for DLT tape drive or suspects SCSI drive, two electrical power strips, one additional hand tools including bolt cutters, pry bar and hacksaw, one pair of leather gloves and disposable latex gloves (assorted sizes), one hand truck and luggage cart, ten large garbage bags and large cardboard boxes with packaging tape, one rubber bands of assorted sizes, one magnifying glass, one ream of print paper, one small brush of cleaning dust fro suspects interior CPU cabinet, ten USB thumb drives of varying sizes, two external hard drives (200 GB or larger) with power cables, assorted converter cables and five additional assorted hard drives for data acquisition. When choosing an appropriate tool, the investigator must be sure that the tool is properly functioning, and that the right person handles it during the investigation. In order to prepare the investigators team, investigator must review all the facts, plans and objectives with the entire team assembled, the main objectives of the scene processing should be to collect evidence and secure it. The speed of the response from the team is very crucial as it can cause evidence such as digital evidence to be lost. Laboratory A computer forensics lab is a place where computer forensics conduct investigation, store evidence and house the necessary equipment, hardware and software. A typical lab manager duties involve many tasks such as proper management for case study, helping to provide reasonable consensus for effective decisions, keep everyone up to date with proper ethics and any modifications if made, keeping a financial account and proper check and balance of the entire facility, keeping it updated according to latest trends in technology and promoting the required quality assurance, appoint a schedule that suits everyone, estimating the potential of investigators and assessing their requirements, proper estimation of results ( preliminary or final) or when they are expected, strictly manage all lab policies and keep an overall look on the safety and security of the entire facility. The staff members have duties which include knowledge and training of equipments relating to computer systems such as O perating systems and their file types, software and hardware. Other staff duties include knowledge and training of technical skills, investigative skills, deductive reasoning. Planning lab budget involves making proper divisions in costs on all bases from daily to annual expenses, gathering the available data of the past expenses and use it to predict or prepare for any future costs. The main expense for a lab comes from the trained personnel or the equipment they use such as hardware or software devices in their disposal. Always estimate the number of computer cases the lab expects to cover, always being notified about the advancements in technology in the respective field, try to make assessment about the computer related crimes ( their kinds), and use this information to plan ahead lab requirements and costs. While making good computer technology available is important, the costs and benefits of upgrading all computers to state of the art must be weighed. (cited in schwabe, 2001) Check statistics from the Uniform Crime Report, identify the specific software used to commit crimes. If youre setting a lab for any private corporation, remember to check the inventory of computing such as software or hardware, previous reported problems and the ongoing and future advancements in related computer technology. Managing time is also a major concern when choosing on the computing equipment for the purchase. Most of the investigation is conducted in the lab, so it should be secure as evidence may is very crucial and cannot afforded to be lost, manipulated, damaged, destroyed or corrupted. Always put emphasis in providing a secure and safe environment, keep proper inventory control of the assets (inform in advance if more supplies are needed). A safe and secure facility should always preserve the evidence data and keep it as it is, the minimum requirements for a secure facility are a medium or small sized room with true walls form the floor to ceiling, proper locking mech anism provided with the door access, secure container and log for visitors. Almost all of the workers in the facility should be given the same level of access. Always brief the staff about the security policy, it is a must. The evidence lockers used in the lab must be kept secure enough such that any unauthorized person may not access it at all, some recommendations for securing storage containers include locating the containers in a properly defined restricted area, limiting people who will have the access to the storage containers, keeping a record on the authority of everyone who has access to the containers and keeping the containers locked when not in use. If a combination of locking system is used, then provide equal measure of security for both the contents of the container and the combination, always destroy the combinations that were previously held when setting up new combinations, only those persons who have the proper authority should be allowed to change the lock combinations, try to change the combination every three or six months or whenever required. When using a key padlock, authorize a personnel as the main key custodian, keep duplicate keys and print sequential numbers on all of them, keep a registry which has a record of keys that are assigned to the authorized personnel, conduct audits on weekly or monthly basis, try to place keys in a secure container after taking an inventory of keys, keep the level of security the same for all the keys and evidence containers, replace the old locks and keys on an annual basis and dont use a master key for several locks. Containers should be strong, safe and as much indestructible as possible with external padlock system and a cabinet inside, try to get a media safe if possible (to protect evidence form damage), keep an evidence storage room (if possible) in lab and keep a well organized evidence log which is used to keep update on all the occasions when the container of the evidence is opened or closed. Always maintain a security policy and enforce it (log signing in for visitors in a way that those personnel are considered to be visitors who are not assigned to lab, these visitors should always be escorted in all times), using indicators (visible and/or audible) is also a necessity inside lab premises, install an intrusion alarm system and hire a guard force for your lab. In civil litigation, investigator may return the evidence after using it (when issued a discovery order),if the investigator cannot retain the evidence then make sure it make the correct type of copy( copy in cases of data from disks or other hard drives, logical or bit stream), ask the supervisor or your client attorney on the requirements, you should usually only have one chance, create a duplicate copy of the evidence file, make minimum two images of evidence(digital) using separate methods, try to copy the host protected part of a disk, size is the biggest concern ( such as in raid redundant array of independent disks) systems which have terabytes of data), Some investigation needs to be conducted in the laboratory because of the proper tools and technicians available there who know how to deal with the evidence correctly without tampering it, Investigator might need to have the proper permission of the authority in charge if it wants the system moved to the laboratory, when permission provided, the investigator have a given time frame in which it must perform its task and then deliver the system back to where it came from. Log files Log files are those which lists all the actions that have happened, such as in Web servers which maintain log files to list every request made to the main Web server, using the log file analysis tools, the user can gave a very good assessment of where the visitors came from or how often they return or even how they go through a site, in addition to log files there are cookies, when used, they enable the Webmasters to log far more detailed information about the user on how it is accessing a site. Logs are also considered to be an independent, machine-generated record of what happened within a network for both system and user activity. When set up properly, and with the appropriate due care, logs can provide an immutable fingerprint of system and user activity. In many cases, the logs tell a story as to what really happened in an incident. They can tell you what systems were involved; how the systems and people behaved; what information was accessed; who accessed it; and precisely when these activities took place. (Cited in Musthaler, 2010) Given the overview of logs on what they can provide, the regulations such as the PCI DSS (payment card industry DSS), the FRCP (civil procedures federal rules), the HIPAA (which is an act regarding the health insurance) and many other regulations, all consider logs and log management to be the very basic and essential necessity for proper and efficient data management. Logs can be used to capture many vital sources of information which beside protecting the core data can also help in supporting forensic analysis and incident response if a data breach has occurred or other forms of electronic crime, such as fraud. The overall log monitoring can be hurdled because of the extremely large amount of fair data capture and the unwillingness, lack of will or errors in properly managing, analyze and correlating that data. The overall conclusion (in mismanagement) can cost hugely as if some suspicious activity or breach really happens, then a lot of time ( possibly many months ) may require to detect the fault, there is even no guarantee if the fault will be detected. In order to have logs admissible in court as evidence of a crime, an organization must prepare and execute due care with the log data. Log data must be viewed and treated like a primary evidence source. Here are some best practices that can help ensure log data and log management practices properly support forensic investigations. Have a clear corporate policy for managing logs across the entire organization. Document what is being logged and why, as well as how the log data is captured, stored and analyzed. Ensure that 100% of log-able devices and applications are captured and the data is unfiltered. Have centralized storage and retention of all logs, with everything in one place and in one format. Ensure the time synchronization of logs to facilitate correlating the data and retrieving data over specific timeframes. Ensure the separation of duties over logs and log management systems to protect from potential internal threats such as a super user or administrator turning off or modifying logs to conceal illicit activity. Always maintain backup copies of logs. Have a defined retention policy that specifies the rete ntion period across the organization for all log data. Organizations should work with legal counsel to determine the best time frames and have log data incorporated into an overall data retention policy. Have a defined procedure to follow after an incident. Test the incident response plan, including the retrieval of backup log data from offsite storage. (Musthaler, 2010) Further quotes form Brian Musthaler include, If an incident or data breach is suspected, there are several steps to take right away: Increase the logging capability to the maximum and consider adding a network sniffer to capture additional detail from network traffic. In an incident, its better to have more data rather than less. Freeze the rotation or destruction of existing logs to prevent the loss of potential evidence. Get backup copies of the logs and make sure they are secure. Deploy a qualified investigations team to determine the situation. (Musthaler, 2010) With the appropriate care, logs can provide solid forensic evidence when and if it is needed, as far as the job of a computer forensic investigator is concerned, his log begins when he starts an investigation, logs can be made of many things such as events, system security, firewall, audit, access and so on. (cited in PFI, 2010) Equipment can be recorded in the log by many ways, audio logs can be made which can store audio files, picture logs can be made which can store digital pictures taken during an investigation. Equipments are recorded according to the type of its contents with the appropriate tools. The final log is stored at the very end after possibly remodifying or revising previous logs. Data acquisition For the process of acquiring data in an investigation, we will consider following techniques, There are two types of data acquisition, static acquisition and live acquisition which basically involves the following four type of acquisition techniques, bit-stream disk-to-disk, bit-stream disk-to-image file, sparse and Logical. Bit-stream disk-to-image file is the most common method, it makes many copies and all of the copies made are replications of the original drive bit-by bit, similar type of process is happening in everyday scenario concerning a common personal computer, when we copy and paste files from one place to another or when we make multiple copies of a data file then the exact copy of the original data file is made available in many places. It is very simple, easy and with very nominal training can be performed on the target system therefore it is the most preferred method as well. The tools used in it are EnCase, ProDiscoer, FTK, SMART. Disk-to-disk method (bit-stream) is applied in the case of disk-to-image copy being impossible mainly due to hardware or software errors or incompatibilities, this problem comes when at most of the time dealing with very old drives. It adjusts target disks geometry to match the drive of the suspect (geometry of track configuration), tools used in this form are SafeBack, EnCase, , and Snap Copy. Logical acquisition and Sparse acquisition are used when the total time of the investigator is very short and the target disk is very large. This type of acquisition only searches and retrieves the selected file which is of particular interest, comparing this to Sparse acquisition which deals with data collection but again the data collected is very nominal. Data analysis Data analysis(for a computer forensic investigator) includes mostly examining digital evidence which depends on the following main factors, the nature of the case, the amount of data to process, the search warrants and court orders and the company policies. Scope creep happens when investigation expands beyond the original description which should be avoided in all cases. Few basic principles apply to about the entire computer forensics cases such as the approach taken depends largely on the specific type of case being investigated. Basic steps for all computer forensics investigations for analysis include the following points such as for target drives, using only recently wiped media that have been reformatted and inspected for computer viruses, noting the condition of the computer when seized, removing the original drive from the computer to check date and time values in the systems CMOS, record how to acquire data from the suspects drive, process the data methodically and logically, listing all folders and files on the image or drive Also try to examine the contents of all data files in all folders starting at the root directory of the volume partition, try to recover all the file contents that are password-protected and can be related to the investigation, identifying the function of every executable file that does not match known hash values and maintain control of all evidence and findings and also document everything as being progressed through the examination. Refining and modifying the investigation plan includes determining the scope of the investigation and what the case requires, determining if all the information should be collected and what to do in case of scope creep. The main aim should be to start with a plan but remain flexible in the face of new evidence. Data can be analyzed using many tools from the forensic toolkit such as supported file systems (FAT12/16/32, NTFS, Ext2fs, and Ext3fs). FTK can a very powerful tool that can analyze data from several sources including image files from other vendors, it produces a case long file. FTK also analyzes compressed files, reports can also be generated in it using bookmarks. Other analyze tools include searching for keywords (indexed search, live search or using advanced searching techniques such as stemming). In order to identify different types of data such as images, email and so on, the investigator should examine the data format and then according to that format, it should deal with the file with the appropriate tool. Working with law enforcement The status of individuals under law is no longer in doubt: individuals are subjects of law and as such are accorded rights. Yet rights are illusory without the procedural capability to enforce them. They are no more than high-minded principles if individuals whose rights have been violated have no avenue for complaint and relief. (Cited in Pasqualucci, 2003) There are basically two types of computer investigations, public and private(corporate), the public investigations involve government agencies responsible for criminal investigation and prosecution, the organizations involved must observe legal guidelines provided to them by the authority, other legal rights such as law of search and seizure helps in protecting rights of all people including suspects. Of the everyday problems of the criminal justice system itself, certainly the most delicate and probably the most difficult concern the proper ways of dealing individually with individuals.(Cited in Winslow, 1968) Investigator working with the law enforcement must always abide by the federal and constitutional laws in conducting and performing entire process of investigation. Criminal cases at law enforcement goes through three main steps, first the victim (any individual or company) will contact the law enforcement agency by making a complaint, then acting on behalf of that complaint, the investigator will be assigned by the government authority to conduct a balanced and proper investigation and will be asked to present all the findings directly to the law agency, the investigator will interview the complaint and will write a report about the crime, police blotter may provide a record of clues to crimes that have been committed previously (related to the ongoing investigation). The investigator collect, delegate and process the information related to the complaint. As the investigator build a case, the information is turned over to the prosecutor. An affidavit is a sworn statement of support of facts about evidence of a crime which is submitted to a judge to request a search warrant; the judge must approve and sign a search warrant before it can be used to collect evidence. The chain of custody is the route the evidence takes from the time investigator finds it until the case is closed or goes to court, throughout the case, the evidence is confiscated by the investigator who has the proper right under the law to maintain and keep the evidence immutable. Other concerns which need to be addressed when bringing law enforcement to the scene is that the officers should follow proper procedure when acquiring the evidence such as in digital evidence which can be easily altered by an overeager investigator, special concerns should be given to the information on storage media such as hard disks which are password protected. Network forensics Network forensics is the job of finding the information about how a perpetrator or an attacker gained access to a network, it involves systematic tracking of incoming and outgoing traffic to find out how an attack was carried out or how an event occurred on a network, the forensic expert should be very well experienced and be familiar with many previously related cases of network because the intruders which the network forensic searches for always leave some sort of trail behind, this trail

Wednesday, November 13, 2019

Comparing Franz Kafka and Gregor Samsa in The Metamorphosis Essay

Similarities between Franz Kafka and Gregor Samsa in The Metamorphosis It is unusual to say the least to open a book and the first line is about the main character waking up as a large insect. Most authors’ use symbolism to relate the theme of their work, not Franz Kafka. He uses a writing method that voids all aspects and elements of the story that defy interpretation. In doing this, he leaves a simple story that stands only for an objective view for his own thoughts and dreams. Kafka focuses the readers’ attention on a single character that symbolizes himself and his life, not Everyman as some authors do. This method is displayed in most of his literary works. To understand how this method is recognized, readers must study the author’s background during the period of writing and basic history to understand this author’s motive. In his short story, â€Å"The Metamorphosis†, there are multiple similarities between Kafka’s true life and Gregor Samsa’s. Before the similarities are displayed, the justifications behind this premise are as follows. Kafka’s works demonstrates the use of a self-nulling reference system in order to void possibilities of critics attempting to use hermeneutics (Thiher, 50). Hermeneutics is the methodology of interpretation. Examples of this method can be found throughout the story in the use of the realistic and unrealistic elements intertwined in different situations. â€Å"Kafka’s Metamorphosis validates contradictory readings that cancel coherent interpretation,† is a quote by confirmed critic Gavriel Ben-Ephraim(451). A specific example can be located in Part I, when Gregor attempts to rise from bed and fails. He thinks to himself, â€Å"What a job I’ve chosen.† In truth, he did not h... ..., Gavriel. â€Å"Making and Breaking Meaning: Deconstruction, Four-level Allegory and The Metamorphosis.† Midwest Quarterly. 35 (1994): 450-67. Sources Consulted â€Å"Franz Kafka/The Metamorphosis.† Literature, Arts, and Medicine Database. Corngold, Stanley, ed. Oct. 2002.New York U. 21 Oct. 2002. . â€Å"Biography/Franz Kafka.† Literature Research Center. 2002. Thomas Gale Group. 21 Oct. 2002. . Goodwin, Evan. â€Å"little blue light-Franz Kafka.† little blue light. 6 May 2002. 13 November 2002. . Stephens, J. â€Å"Franz Kafka’s personal life reflected in the Metamorphosis† The Kafka Project. 1999-2002. 13 November 2002. . Comparing Franz Kafka and Gregor Samsa in The Metamorphosis Essay Similarities between Franz Kafka and Gregor Samsa in The Metamorphosis It is unusual to say the least to open a book and the first line is about the main character waking up as a large insect. Most authors’ use symbolism to relate the theme of their work, not Franz Kafka. He uses a writing method that voids all aspects and elements of the story that defy interpretation. In doing this, he leaves a simple story that stands only for an objective view for his own thoughts and dreams. Kafka focuses the readers’ attention on a single character that symbolizes himself and his life, not Everyman as some authors do. This method is displayed in most of his literary works. To understand how this method is recognized, readers must study the author’s background during the period of writing and basic history to understand this author’s motive. In his short story, â€Å"The Metamorphosis†, there are multiple similarities between Kafka’s true life and Gregor Samsa’s. Before the similarities are displayed, the justifications behind this premise are as follows. Kafka’s works demonstrates the use of a self-nulling reference system in order to void possibilities of critics attempting to use hermeneutics (Thiher, 50). Hermeneutics is the methodology of interpretation. Examples of this method can be found throughout the story in the use of the realistic and unrealistic elements intertwined in different situations. â€Å"Kafka’s Metamorphosis validates contradictory readings that cancel coherent interpretation,† is a quote by confirmed critic Gavriel Ben-Ephraim(451). A specific example can be located in Part I, when Gregor attempts to rise from bed and fails. He thinks to himself, â€Å"What a job I’ve chosen.† In truth, he did not h... ..., Gavriel. â€Å"Making and Breaking Meaning: Deconstruction, Four-level Allegory and The Metamorphosis.† Midwest Quarterly. 35 (1994): 450-67. Sources Consulted â€Å"Franz Kafka/The Metamorphosis.† Literature, Arts, and Medicine Database. Corngold, Stanley, ed. Oct. 2002.New York U. 21 Oct. 2002. . â€Å"Biography/Franz Kafka.† Literature Research Center. 2002. Thomas Gale Group. 21 Oct. 2002. . Goodwin, Evan. â€Å"little blue light-Franz Kafka.† little blue light. 6 May 2002. 13 November 2002. . Stephens, J. â€Å"Franz Kafka’s personal life reflected in the Metamorphosis† The Kafka Project. 1999-2002. 13 November 2002. .

Sunday, November 10, 2019

Mckesson Corporation: Competitive Environment Trends and Business Model Assessment

McKesson Corporation: Competitive Environment Trends and Business Model Assessment U07a1, DB8004 – Strategic Thinking and Innovation, Section 01 McKesson Corp: Competitive Environment Trends and Business Model Assessment McKesson Corporation is largest health-care provider in the United States; as of 2011 it ranked as the third largest company in the state of California; where the company is headquartered. On the Fortune 500 list McKesson is ranked 15 (â€Å"Fortune 500,† 2011), McKesson consisted of several Strategic Business Units (SBUs).McKesson’s SBUs are divided into two primary categories: Distribution Solutions and Technology Solutions. The Distribution Solutions service all 50 states and deliver pharmaceuticals to institutional providers such as hospitals and health care systems; and also distributes to retail pharmacies; physician offices, surgery centers, long-term care facilities, and home care businesses. McKesson Canada, which is a part of McKesson, is a leading distributor in Mexico via its equity holding in Nadro. McKesson Distribution Solutions consist of the following SBUs (McKesson, n. . ): †¢McKesson Medical-Surgical †¢McKesson Patient Relationship Solutions †¢McKesson Pharmaceutical †¢McKesson Pharmacy Systems †¢McKesson Specialty Care Solutions †¢Moore Medical †¢Plasma and BioLogics †¢Zee Medical McKesson Technology Solutions consists of software, services and consulting to hospitals, automation, imaging centers, physician offices, home health care agencies, and payors. The Technology-Solutions of McKesson Provide an avenue to improve health care safety, manage revenue streams and resources, and reduce the cost and variability of health care. McKesson Technology Solutions consist of the following SBUs (McKesson, n. d. ): †¢McKesson Automation †¢McKesson Health Solutions †¢McKesson Provider Technologies †¢RelayHealth McKesson is one of the most successful compan ies in its industry in the United States. From a strategic management and planning perspective McKesson believe in unity within its divisions. Although the businesses are separate entities, there are some similarities in reference to management and interface with the parent company.The focus on this paper will be on McKesson Medical-Surgical, which is a SBU of McKesson Distribution Solutions; and the interface with the parent company; McKesson Corporation. McKesson Medical-Surgical Interface with McKesson Company McKesson as a company believe in unity; especially from a management perspective. This company has consistently acquired other companies; and has successfully managed to bring unity within each SBU based on the management goals of the parent company.According to Raynor, (2007), â€Å" McKesson has acquired approximately 75 companies since 1995 that have been aligned with or assimilated into our assorted business units. Our size and breadth of products and services fostered variability in HR practices that diluted our efforts to become a more seamless â€Å"One McKesson. † Accordingly McKesson embarked on a series of initiatives to standardize, improve and automate, where possible, its HR processes. Human Resources and Organization Management Team McKesson created a team of Human Resource and Organizational Effectiveness (OE) professionals in 2004.The focus of this team was to develop best practices and improved quality via a buy-in from all the business units. If a consensus is not met after voting on an issue, an 80 percent majority vote is required to move on (Raynor, 2007). Performance Management Team McKesson has created a weekly meeting for over a year for the Performance Management Design Team, which met virtually via conference call or web meeting. This team was also designed to focus on more unity within the company. The team was responsible for creating roles and responsibilities for performance management; with emphasis on employee i nvolvement.New competency model was developed to redefine the rating scale. ePeformance was implemented; via a PeopleSoft module and customized to support the newly created program and standardized performance practices (Raynor, 2007). McKesson Supply-Chain Management McKesson experience with its acute-care distribution business; which is also the bread and butter in the more recent years for McKesson; effective supply chain management has created success for various SBUs within the company. Supply chain management has been consistent within McKesson Corporation throughout all the SBUs.The consistency is the belief in building strong relationships with customers, offering innovative supply chain management products and services; a creating innovative technology solutions. This consistency has also allowed the company to grow by adding new customers and increasing the business with their existing customers (Smith, 2006). Environmental Trends and Current Business Model McKesson Medica l-Surgical is a spin-off of what used to be a drug wholesaler; Gil Minor III created what is currently considered a powerhouse medical and surgical box; which is where the market was trending (Smith, 2006).The company has taken advantage of creating convenience in the medical industry. Instead of selling from a brick and mortar pharmacy, this company has taken advantage of selling via supply chain directly to its customers as well as on-line sales. From a strategic perspective the company has managed to create success in various ways. McKesson business units’ success is based on consistency, innovation, creativity, from one division to another. The company has taken medical supplies and services to a different a level.They are not the typical CVS or Eckerd Drug store; the company caters more to medical professionals, such as doctors, psychiatrists, but more to medical professions who have connections with hospitals. The company also provides medical supplies and services to m ost major hospitals as well as other medical institutions. The innovation of the supply chain management, medical technologies, and the acquisitions and expansions has been successful for McKesson. A key element is also their ability to place the customer first.From a strategic management and planning perspective, below are some of the strategies used by McKesson to build and sustain success in their businesses. McKesson Strategies Incorporated This Millennium| McKesson Technology and Information Technology & Other Changes| Provide service physician practices that are connected with large hospital systems. | Ongoing investment in technology has helped to differentiate McKesson in the market and has been a key element in its success| Rarely pursue the individual physician market, since distributing to so many mall, individual offices is not our core competency. | Continue to invest in creating innovative technology solutions that help improve the supply chain. | Offer third-party-log istics services to certain manufacturers, which have proven to be fruitful partnerships for both parties. | QSight, an innovative inventory management program allows hospital professionals to manage clinical inventory with an easy-to-use Web-based platform| Offer Integrated Service Center model to customers who might wish a different distribution model from traditional distribution. Acquisition and Expansion | McKesson does not sell pharmaceuticals, over-the-counter pharmacy goods or medical surgical products directly to consumers| Putting the customer first| (Smith, 2006) McKesson business model relate to various environmental trends; such as new and innovative technologies, with cutting edge improvements. Creation of a cutting-edge supply chain management; which is currently an important trend with many companies that are trying to improve their bottom line and stream line their business(es).McKesson also provide supplies and services to home health care, and been very successful with acquisitions and expansions. The environmental trends support the current business models and have created success within the company as well as the various divisions. McKesson Business Model Success According to Acur & Bititci (2003), â€Å"Today’s globally competitive environment is complex, dynamic and unpredictable. To deal with this level of change, uncertainty and complexity companies need to develop and review their strategies almost continuously to stay ahead of the competition.Within this dynamic environment strategy management requires considerable resources and effort in terms of managerial time, with increasing pressures for innovation, knowledge sharing and co-operation. † McKesson has proved that it is on the leading edge of technology in its industry; the company is continuously working toward new innovative ideas to create more efficient; better service; much of the operation has been focus on supporting supplies from a global supply chain manageme nt perspective. McKesson is the longest-operating company currently in the healthcare industries.The Medical-Surgical business unit of McKesson, similar to McKesson as a whole has been efficient with its strategic management and planning as well as successful as a SBU of McKesson. McKesson Annual Report as of Fiscal Year End March 31, 2011 shows the Medical-Surgical Distribution and a service has increase consecutively since 2009. McKesson Business Model Reinventions McKesson has reinvented several models within the last five years which have proven to been successful for the company as a whole and its strategic business units.Value creation and strategies should be identified at each business unit within an organization to create an integrated approach to strategic management. Strategic objectives should be deployed and implemented. To compete from a global environment; which is constantly changing the operational environment of a business strategy planning and management should be a continuous process, which will provide a closed-loop-control system which will facilitate management of the organization performance as a whole as well as individual business units (Acur, et al, 2003).McKesson has reinvented their supply-chain planning and management from business unit to business unit. New and innovative technologies; placing the customer first; expansion and acquisition is what McKesson has done repeatedly and been success as whole as well as with its individual business units. Key Resources and Generic Strategy Deployed Within the Business Model One of McKesson’s key resources within the Medical-Surgical Business Units is the uniqueness of its distribution – supply chain.Unlike some pharmaceutical that companies focus on distribution to Walgreens, CVS, Walmart, and other similar store chains; McKesson focus its supply chain on physician who have practices which are connected to large hospitals. McKesson supply-chain increase efficiencies from an operational perspective with its electronic ordering and purchasing system; with the improved system the company can offer faster and better customer service and deliveries. Another area in which McKesson offer uniqueness from a company and business unit perspective is managing their human resources to help impact the bottom line – from a financial point of view.According to Raynor (2007), â€Å"Performance management is increasingly regarded as a business process with real bottom-line impact, versus an HR program. † â€Å"Instead of being viewed as an HR program, performance management was now discussed in terms of business impact. † Summary From management perspective sustainability is the ability to meet the needs of the present, yet not compromise the ability to meet future needs (Haugh & Talwar, 2010). McKesson Medical-Surgical Business Unit financial in the last few years has reflected financial sustainability.McKesson’s supply chain operation from a global perspective, the ability to continuously improve and create new technologies; as well as new ways of doing business in the pharmaceutical industries has placed McKesson above many other pharmaceutical companies. The focus on human resource development with the creation of the Performance Management Design Team places McKesson and its business units above many companies today. All companies have various resources which play an active role in the performance of a company.However, most companies under-rate the importance of in my opinion their internal customers. Employees play an active part in how a company performs financially. From a psychology perspective a happy person is can think better and perform better than one who is unhappy. Knowing how to manage ones human resource can improve how a company perform; and can increase innovative ideas from employees. All other resources can only be a good as a company’s human resource. References Acur, N. , & Bititci, U. (20 03). Managing strategy through business processes.Production Planning & Control, 14(4), 309. Retrieved from EBSCOhost. Fortune 500: 15. McKesson. (2011). Retrieved from http://money. cnn. com/magazines/fortune/fortune500/2011/snapshots/2219. html Haugh, H. M. , & Talwar, A. (2010). How Do Corporations Embed Sustainability Across the Organization?. Academy of Management Learning & Education, 9(3), 384-396. doi:10. 5465/AMLE. 2010. 53791822 Leveraging Business Intelligence for Revenue Improvement. (2008). hfm (Healthcare Financial Management), 62(8), 1-8. Retrieved from EBSCOhost.McKesson. (n. d. ) McKesson About 2BU Our 2BU Company Businesses 2BBusinesses. Retrieved August 20, 2011, from http://www. mckesson. com/en_us/McKesson. com/About%2BUs/Our%2BCompany/Our%2BBusinesses. html Raynor, E. (2007). Developing the Performance Culture at McKesson Medical-Surgical. Organization Development Journal, 25(4), P19-P25. Retrieved from EBSCOhost. Smith, C. (2006). Distributor CEO extends reach from hospital bedside to the home. Healthcare Purchasing News, 30(9), 16-21. Retrieved from EBSCOhost.

Friday, November 8, 2019

Animal Rationality essays

Animal Rationality essays I bark, therefore I am: The question of rational animals Many individuals look at their dog or cat and wonder what the furry little creatures are thinking or question the reasoning behind a particular action. Here is encountered a very large debate in the philosophical and psychological world. Are certain animals, other than humans, rational creatures? Of course, there are people who sit on both sides of the fence on the rationality issue. Donald Davidson, author of "Rational Animals", proposes that no other creature on the face of the earth has the ability to rationalize, besides the human. Mr. Davidson derives a particular formula for proving, in his mind, that his hypotheses are correct. I, however, differ with Davidsons views and even question his logic at points. Throughout the course of my essay, I will describe Davidsons progression of thought as well as confirm his theory unworkable. By proving against Davidsons theory, I hope to undoubtedly show that there are, in fact, certain rational higher-level animals. Donald Davidson attempts to beat down any arguments for animal rationality in his essay, "Rational Animals". Davidson does do a relatively good job of convincing the reader of his notions. By proposing a progression of four interlocked steps, which condenses to only two later in the essay, Davidson hopes to dissolve any doubt that animals do not have rational minds. First, Davidson proposes that animals do not have a network of beliefs. Both Davidson and I agree on our definition of what a belief is. A belief is the knowledge of a certain idea, object, or concept. In regard to describing the term "network of beliefs", a quotation from Davidsons essay works the best: "One belief demands many beliefs, and beliefs demand other basic attitudes such as intentions, desires, . . . " (Davidson, 473). Therefore a network of beliefs is one or many deeper beliefs about a particular belie...

Wednesday, November 6, 2019

Medical Ethics essays

Medical Ethics essays The Hippocratic oath has been used for centuries, and was created to provide standards for physicians in the past. The oath is still used today, but it is usually a revised version of the oath. There are opposing views on rather the oath should have been modernized or not, and rather the new modernized oath is equivalent to the qualities stressed in the original Oath. The father of medicine, Hippocrates, created the Hippocratic oath. The exact date is argued, some experts say it was established in the sixth century B.C. while others say it was the fourth century B.C. The original form of the Hippocratic oath doesnt allow abortion, euthanasia, surgical procedures, and sexual relations with patients. The oath has been used through decades and most medical schools to this day take a type of the Hippocratic oath. This oath has stood the test of time, but does undoubtedly need the reforms that have been applied through the years. Many argue that it is a tradition and should not be changed, but with advancing technology some parts must be changed. One aspect that should not be changed in the Hippocratic oath is do no harm. Doctors have control over many peoples lives daily, which provides them the knowledge and opportunity to either heal or kill. The Hippocratic oath stresses that a doctor should not use his or her skills to harm the patient. Doctors are expected to value humanity and provide compassionate care, and this is a major common understanding. Having one ethical guideline helps physicians to make the correct decisions. Hippocrates wanted people to trust and respect the person they trust with their life to; therefore, he established an ethical guideline. The Hippocratic oath was first changed due to the Nuremberg trials. It was revised to prevent physicians from discrimination, and not providing the same care to all people. This fi ...

Monday, November 4, 2019

Operation Anaconda 2 Essay Example | Topics and Well Written Essays - 1000 words - 1

Operation Anaconda 2 - Essay Example The unique geographical setting of The Gardez-Khost -Shahi-Kot areas in Afghanistan, which consist of harsh climate and high altitude, fostered the growth of Taliban and Al-Qaeda militants. So, the research and task collection conducted by various intelligence organizations under the direct control of United States Army Special Forces and Joint Special Operations Command proved much important to the Operation Anaconda. Several intelligence agencies like Central intelligence agency (CIA) and Federal Bureau of Investigation (FBI) played significant role in different levels of the operation. For instance, CIA paramilitary forces participated in the mission among special operation forces. Other agencies are: Bureau of intelligence and research, Defense Intelligence Agency (DIA), Imagery Intelligence, National Reconnaissance Office, National Geospatial-Intelligence, signal intelligence, Human Intelligence, (HUMINT) and SOF military Reconnaissance. The Special reconnaissance (SR), controll ed by small division of well qualified military workforce played the crucial role in research and task collection stages. So, one can see that the research and task collection conducted by various intelligence organizations in the Gardez-Khost Shahi-Kot areas prove the strengths and limitations of various intelligence organizations in critical situations. Human intelligence (HUMINT) is the oldest method of intelligence service which collects information from human source. The most important and famous intelligence department in the united state is the CIA. During Operation Anaconda, The combined joined task force mountain’s intelligence wing relied upon human intelligence. But in Gardez-Khost -Shahi-Kot areas, the human intelligence personal failed to recognize the exact number of militants and their strength. The Signals intelligence (SIGINT) provided information on presence of Taliban leaders

Friday, November 1, 2019

Services Marketing Essay Example | Topics and Well Written Essays - 1500 words

Services Marketing - Essay Example Services industries primarily provide intangible products to customers by offering services. Retail, transports, food services etc are the example of services industries (Pezzullo, 1998, p.194). The marketing activities in services sectors are known as services marketing. Marketing is one of the major activities in business organisations and its importance and necessity have been multiplied with increasing completion and market size. There are certain differences between marketing activities of manufacturing industries and services industries. For example, in services marketing there are 7 Ps instead of 4 Ps which include product, price, promotion, place, people and physical evidences (Jobber and Fahy, 2008, p.177). Therefore, managing the marketing activities in service business is difficult as management has to consider many aspects at the same time. This paper will attempt to assess an organisation engaged in services business using various management models and tools for offering a set of conceivable and effective recommendations. In this respect, at first, a brief description of the company will provided to understand its nature of business and other aspects. In order to analyse the company’s business environments management analytical tools will used. Finally, based on the research findings, conclusion and recommendations will be made. 2. Brief Description of EasyJet Airline-211 EasyJet is a UK based airline company and it is one of the leading airline services providers in entire Europe. This airline company aims to become a low cost airline service provider in Europe. Stelios Haji-Ioannou, a Greek business started an airline business with two leased aircraft and he named this airline ‘EasyJet’. The growing importance of airlines services and EasyJet’s efficient performances, made this airline as a one of the market leaders. By the end of 2009, EasyJet became pan airline that operated with â€Å"over 400 routes with over 175 a ircraft in 27 countries† (EasyJet Plc-a, n.d.). Its efficient business and services strategies have led to increase the popularity of the company, and during 2009, nearly 50% of its total passengers were recorded as non-UK people. The business model of EasyJet includes five major values that have enhanced its business activities and these values are safety, teamwork, pioneering, passionate and integrity. Its present headquarter is in Luton, England and it has â€Å"over 7,300 people including 1,900 pilots and 4,300 cabin crew† (EasyJet Plc-b, n.d.). In order to manage its sustainability issues, it has also included its responsibilities towards society, corporate, environments and community. Due to efficient managements and growing market size, the financial position of the company has become stronger in UK airline industry. 3. Swot Analysis In order to access a company’s internal & external position and external opportunities and strengths, SWOT is one of the mos t widely used tools. SWOT analysis is very helpful in providing a summary concept of various internal and external factors which are very important for strategic managements and decision making process. Carlock and Ward has been able to identify the importance of SWOT analysis and in this respect they have commented that â€Å"the SWOT analysis helps to capture data in order to qualitatively plot the firm on the