Wednesday, July 31, 2019

Body Image in Brazil and Usa

Body Image in Brazil and USA Four thousand years ago the last of the mammoths were roaming the earth before extinction, anesthesia was still 3800 years away from being discovered, and tools were still being made out of stone. What else was happening that long ago? Humans were performing the first known cases of reconstructive and cosmetic surgeries, documenting back to skin grafts in ancient India. Between the first documented procedures and the early 1800's not a lot progressed aside from the basic tools being used. In 1827, Dr.John Peter Mettaue performed the first cleft palate operation using tools of his own design kicking off the modern plastic surgery advancements. Using the advancements in reconstructive surgeries became increasingly popular during World War I as it was used to save many soldiers' lives throughout the world. In the late 1940’s, following the second World War, the focus of plastic surgery began to shift from medical procedures to save lives in the milita ry to a more public and socialized practice. A boom in the 1960's spread rapidly after the introduction of silicone implants by Dr. Thomas Cronin.Sports Illustrated Magazine issued its first swim suit edition in 1964 featuring a five page spread of bikini clad perfect model bodies that the public was pressured to imitate. Despite the American involvement in Vietnam during the late 60's the trend continued to increase into the 70's when plastic surgery hit an all-time high due to the public discovery of its uses on all parts of the body. Over the decades, countries throughout the world including Brazil and The United States have adopted plastic surgery as an active part of their cultures despite monetary and health costs all because of media and social pressures.The United States and Brazil rank first and second in the world of most plastic surgery procedures, respectively. According to Dr. Daniela Dorneles de Andrade, a psychological research associate at the University of Vienna, t he United States alone underwent 30. 1 million cosmetic surgeries in the year 2009, enough cosmetic surgeries for one in every ten Americans to have undergone some sort of altering procedure. The United States is the only country to top the next leading country, Brazil, which reported 13. 7 million procedures.Based on its population, that amounts to one in every fifteen Brazilians volunteering for of these surgeries in the same year (Dorneles 75). The American Society of Plastic Surgeons reports the average cost of plastic surgery procedures being at five thousand dollars in the United States incurring a total revenue topping one hundred and fifty billion dollars a year from voluntary surgeries alone. The figure dwarfs Brazil's reported income from the same procedures however, topping just over fifty million dollars (ASPS).Professor Alexander Edmonds, of Macquarie University, reports that the lack of funds reported by Brazil is due to a philosophy that â€Å"the poor have a right t o be beautiful† (Edmonds, â€Å"Poor† 363). The thought that everyone has a right to undergo plastic surgery, even if they cannot afford it, has been adopted by many Brazilian surgeons. Brazilian surgeons have started clinics that are being funded by federal and municipal budgets to provide procedures to everyone regardless of economic ability (Edmonds, â€Å"Poor† 365). Such acts are not only costing people in American and Brazilian cultures money but also costing them their health.Both psychological and physical health are being put into jeopardy by the procedures themselves and also by the desire to have them done (Edmonds, â€Å"Learning† 470). Health care related spending has nearly tripled in the past three centuries, seventy-eight percent of which linked to complications of cosmetic surgery. Whether it is leaking silicone implants or infections, the surgeries that people are seeking out to make themselves more perfect on the outside are in fact lead ing to more problems than with what they started with (Dorneles 77).Why are people of the world putting themselves through these extensive procedures? University of Amsterdam professor, Alexander Edmonds, says it amounts to nothing more than acceptance and expectance. The pressure to appear as perfect as possible on the outside is largely placed upon the women in both Brazilian and American culture. Such pressure is put upon women, young women most heavily, by media and social groups alike. Social groups are driven by what they see in magazine or on television ads. Media thrives on what social groups are deeming appropriate amongst themselves.The vicious cycle of perfection that American teens and young adults face every day is the same pressure that is seen in Brazil. More and more young people are turning to evasive procedures to correct themselves every day. In 2010 the second most popular gift given to high school graduates in America, trailing closely behind a new car, was that of breast augmentations (Kreimer). These gifts are giving by family members or people who care about the young person's life and they feel that their child will thrive better in life if they help them achieve a better body.This thinking is passed on from generation to the next and is rapidly increasing. One teen who received such a gift was quoted saying, â€Å"My mother, grandmother, two aunts, and stepmother have implants, so if my mom is willing to pay for it, why not? † (qtd in Kriemer). The pressure to appear a certain way is becoming even more important to people of the world with no consideration for the health and financial implications. It is becoming accepted by cultures around the globe as a normal practice.If the past is any indication for the future this issue will become an uncontrollable epidemic. Something needs to be done about how media portrays people but are the thoughts of societies and morals of cultures being influenced by the media or is the media bei ng conformed by the cultures and societies serves? Works Cited ASPS (American Society of Plastic Surgeons). The Plastic Surgery Foundation, 2012. Web. 23 Oct. 2012. Dorneles de Andrade, Daniela. â€Å"On Norms and Bodies: Findings from Field Research on Cosmetic Surgery in Rio de Janeiro, Brazil. Reproductive Health Matters 18. 35 (2010) : 74-83. Print. Edmonds, Alexander. â€Å"Learning to Love Yourself: Esthetics, Health, and Therapeutics in Brazilian Plastic Surgery. † Routledge Journals 74. 4 (2009) : 465-489. Print. Edmonds, Alexander. â€Å"’The Poor Have the Right To Be Beautiful’: Cosmetic Surgery in Neoliberal Brazil. † Journal of the Royal Anthropological Institute 13. 1 (2007) : 363-381. Print. Kreimer, Susan. â€Å"Teens Getting Breast Implants for Graduation. † Womensenews. Women’s eNews Inc. , 6 June. 2004. Web. 26 Oct 2012.

Tuesday, July 30, 2019

E Fraud Essay

An e- fraud is considered to be an electronic crime that affects not only individuals businesses and governments but also allows for very negatively intelligent people and hackers to use their intelligence to log into other’s accounts use their credit card numbers and banking password and transact huge amounts of trade and money . it has been seen that e fraud is on the increase and this is because of the low levels of awareness, the inappropriate counter measures that are ineffective to handle this kind of fraud has led to e frauds being on the increase . The only area that has been actively involved in reducing the impact of fraud is the technical side leaving the other so many variables out of the purview of the e fraud scenario. This has made e fraud even more easier because there have been no mechanisms to reduce these occurrences and even if there are there has been limited penalties issued to the frauds that happen on the cyber space. Introduction: The complexity of modern enterprises, their reliance on technology, and the heightened Interconnectivity among organizations that is both a result and a driver of e-business these are rapidly evolving developments that create widespread opportunities for theft, fraud, and other forms of exploitation by offenders both outside and inside an organization â€Å" (KPMG 2000) The paper tries to assimilate and analyze the strategies that can be adopted by everyone who deals on the cyber space to protect their information and finances securely. This paper also tries to analyze why such frauds occurs and what can be done by stakeholders to minimize the occurrences and is it worthwhile an attempt to bring in a global governance ordinance which could help businesses and agencies nab the criminals . It is recorded that global e commerce sales are steadily growing and with this the e commerce fraud too. The eco system which has promoted the concept of ecommerce streams from the millions of shoppers and customers who use their debit and credit cards . Though online shopping is projected to be a very safe way of shopping and bank transactions through secured payment modes, frauds have been continually on the increase . It has been objectively researched that e commerce transactions have to be highly secured . Every transaction has to be screened for the following inputs . 1. Risk based authentication should be enabled for every transaction and to prove the integrity of the user. 2. Card holders‘s data has to be tokenized so that consumers identity can be authorized and protected. . Reputed brands should shut down phishing and Trojan attacks that make easy e commerce frauds. Some practical applications for reducing e commerce brands: Fraud detection and prevention by addressing the critical needs of the entire credit card eco system. Evaluating transactions for the risk and balancing risk activities in cards . High transaction abandonment rates that results from poor user experience . Reducing the compliance costs so that we e commerce frauds commitment costs become high . The following diagrammatic representation shows how the personal data ecosystem is subject to hacking by very professional hackers. (source:Google. com) Credit card fraud The credit card industry reports huge frauds conducted over the internet in the US alone, in the year 2010, $8. 6 billion card frauds occurred (Aite Group study). With worldwide electronic information sourcing and data storage and the thousands on online purchasing that is going on, the frequency of card usage has increased and this has resulted in financial institutions and cardholders becoming victims of e fraud . Countries worldwide have set up agencies to monitor e fraud and have their own agencies to take care of such crimes especially those related to the cyber space and those which happen on cyberspace and in ecommerce space . E commerce sales is expected to total almost $1 trillion by 2013. Ecommerce fraud is also growing along with this. Fraudulent transactions rose from 2. 7 billion in 2010 to $3. 4 billion in 2011 and are expected to grow exponentially. The use of internet has made these frauds possible. There are many reasons why these frauds occur. . The increasing complex software that is now being used to relay ecommerce has made the systems vulnerable to attacks . 2. There are thousands of malicious codes and other tools that help hackers and attackers . 3. The increasing use of high speed internet at homes with very little security makes attack much easy . 4. The rate at which technology is changing and the ease of adaptation to the new technology and the users rather slow pace in adopting to good computer security practices is another compelling reason for fraud . . the hidden costs that are involved in an ecommerce portal goes unnoticed because the security systems that have to take care of this and when systems are set up, there is always the likelihood that ambitious technology experts give least preference to securing the information site and privacy conditions People and business which conduct business online do not inform people of the expected frauds that could occur due to ecommerce transactions, because of this frauds happen . The lack of proper governance and regulation regarding type of penalties and punishments that would be given to fraud committers is rather slack . There are no world wide global laws to tackle such frauds and hence frauds that are committed online find no jurisdictional limits and so governments do not know how to pin point the responsibility . This loop hole has been used by fraudsters . The online world is full of pseudonyms and pseudo identities . Hence tracking such frauds also becomes very difficult. There are no experts who could be given the responsibility of tracking and strategizing how such frauds occur . Though technology now is slowly trying to understand the macro environment of the fraud related scenarios, the risk and costs associated with bringing in security is very high and hence the adaptability of such scenarios cannot be done by all firms who have e commerce portals . Stakeholders involvement in the vulnerability that exists across the value chain is seen as the most critical issue in a fraud . Crime congress global: This is an imitative taken by the agency to help stakeholders and victims of e commerce fraud to find effective solutions. This proves information security in all countries of the world to meet the challenges arising from e commerce. This agency prominently uses technology and provides technology solutions in partnership with the business community to prevent frauds through information security technology and information risk management, forensics, investigations, audit, risk, compliance and fraud. This agency has been conducting global awareness programs for reaching out to institutes, businesses and government to partner in helping reduce ccurrences of e fraud to strategic and technological challenges. This is a strategic initiative involving al stakeholders to proactively reduce the risks of ecommerce frauds and to defend IT systems from those threats which are emerging and to comply with relevant legal and regulatory laws . this initiative is a step towards combating the threat of the increasing cases of fraud. This partnership brings out very important initiatives to protect not only customers but a lso business houses from succumbing to the increasing menace of hackers. Technology solutions and other security solutions are placed in a consultative approach towards tackling this . If an international business committed copyright infringements then legal action under Criminal Jurisprudence legal action can be resorted to under Article 61 Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs) where the loser has got legal recourse to his stolen property by means of criminal sanctions and which will thereby allow for legal and criminal punishment of the infringement and the infringer . t has been felt that all types of infringement should be punished with criminal sanctions. People can appeal under this act for legal action or they can hotlist an organization under cyber space if there are cases of patent stealing and web site hacking. The Copyright, Designs and Patents Act 1988 also known as the CDPA can be used in cases where infringement has taken place. If an international business committed copyright infringements or steals a pa tent then as a victims we can take recourse under the above mentioned acts which give protection to IRP which are stolen and pirated and copied.. Early referral is said to be the best away to ensure that the evidence is properly secured and that all the investigative revenues are fully explored with the possible undercover law enforcement activities. Perhaps, communication with the law enforcement activities allows the victim to coordinate civil proceedings with the possible criminal enforcement. Though legally recourse is available it is easy to settle out of court because protection of copyright is a prelude to production of the material or product. People who invent need to protect their patents. Once the patent is protected then it cannot be copied or pirated as punishments are very severe in such cases. With so many innovations taking place in the US especially with cyber technology there has been very serious issue of pirating software and the Beijing convention has called for all member countries to come out with anti pirating laws which could effectively punish those who are caught. USA will have to worry about the number of infringements that are taking place. It has admitted legal course in serious cases but USA is neither able to gun down the culprit nor is it able to find means of putting an end to it because of the geographical distance which makes it impossible to monitor the use of technology. USA is very careful in dealing with countries where incidences of Infringement are very high and tries to bring in severe legal clauses to protect their interests. Computer forensics investigator and other laws A computer forensics investigator works with a pre determined notion of computer crimes. But that is not a sufficient coverage that should be catered. A computer forensics investigator looks upon other law system too such as data protection, data integrity, data control, audit of data components, investigation around the computer and etc. A forensics investigator moves with an initial priority of computer crime. But he should be well governed with other laws. This helps him to establish himself more concretely on the crime scene. He is prepared with the notion of covering up the areas totally in order to fully satisfy himself on the grounds that nothing is left behind. He checks into the data system, recovers the data, checks the integrity of the data, protects the data, looks for evidences around the computer, checks the network system of the accused person, goes more deeply with the computing system to enable him searching beyond the computers to narrow down his investigation procedure. Some other laws such as, human rights, digital rights, information system laws, computer laws are of special interest to him. This gives him the power to deal with any case that involves ethical computer crime. He is much more developed investigator if he is well adverse with the above law system. E – Discovery E Discovery or Electronic Discovery refers to discovery in civil litigation. This discovery process deals with the exchange of information in the electronic format. Electronic Discovery is pretty useful for the forensics analysis. We know that Forensics analysis deals with the investigation of crime scene involving computer and cyber crimes and evidence is the prime source of investigation that leads to a successful procedure. Hence the investigator is pretty much confident about the E Discovery System. The investigator with the help of E Discovery processes such as Electronic messages, voicemail; smart phones etc recover every bit of information that is required in the gathering of evidence required for the forensics investigation. The whole process of collection data through E discovery and jotting it down to the report makes it much easier for the investigator. The E discovery has led to new developments and changes in the investigation system of the cyber crimes. With latest e discovery modes as mentioned above, an investigator is much more confident about its movement into the IT system of the accused criminal, and supporting the cause with rather strong and reliable evidences gathered. E discovery is a radical change in the process of investigation and has led to much more focused and integrated system of computer investigation. Conclusion The whole conclusion is based on the cyber crimes and the enacting system of law prevailing. The cyber crimes have increased in geometric progression over the years which have led to many disasters and crimes. With the increased number of crimes taking place day in day out, the laws have been made much stricter in order to ensure that the numbers of crime taking place gets minimized and there is a fear of messing up the computer system. The laws have addressed the message of intent of distorting computer systems which will constitute a crime. Many forensics investigators have been seen in the picture off late which governs the system of computer crime. These investigators are well adverse with the system laws and crime scenes. They effectively handle the situation and get to the desired results enabling quick and accurate reply to crime involved. Thus the laws have been successful over the years in minimizing computer threats and crimes. Ecommerce has revolutionized trade in many ways and consumers have also been cheated in ways that were unknown in traditional sales. In order to protect the consumers, traders on the internet and operators in the cyber space have got together to form associations and laws that would protect the consumers in the text of ecommerce. Though every country has passed consumer protection acts which are rules and regulations to protect the consumers from fraudulent trade practices in the market. There laws were enacted to protect the consumers and give them rights to ensure that they obtain truthful information and right products as so designed by the seller. The laws have been designed to protect consumers from businesses indulging in unlawful and unfair practices . The governments of all countries have passed regulations to protect the rights of consumers especially in those products where health and safety are chief ingredients. Consumer protection is also in the form of consumer rights which consumers can exercise through redressal grievance and consumer courts. This is the history behind the concept of consumer protection. In direct contrast to the traditional business where the buyer and seller are in direct contact with each other and the buyer can inspect the goods before buying, in ecommerce the communication is only through an electronic form and business is conducted in a paperless environment. More importantly the internet or e transactions play a very important role in helping buyers and in assisting in choice comparisons and locating a product on the internet. (http://www. apec. rg/apec/apec_groups/som_special_task_groups/electroniccommerce. html. Accessed on 13/2/04) Consumer concerns in e commerce starts form the point of instance as the buyer is not known to the seller and vice versa and hence the privacy and confidentiality aspect of a trade which has to be concluded needs authenticity. Consumers are worried about 1. The unfair marketing practices that sellers resort to on the web. 2. The terms of sale, refunds, cancellation of orders, warranty conditions 3. Enforceability of the contract, performance and non performance. . Delivery time, late deliveries and no delivery verification. 5. The most illegal use of information available on credit cards payment made for online purchases. 6. Fraud and cheating because transactions are not authenticated by any physical source. 7. unsafe products not confirming to safety standards. 8. Misuse of personal information for other purposes. Since majority of e commerce transactions lead to the buyer being put to a disadvantage the Issues relating to consumer disputed have to be minimized and arbitrated. t is all the more difficult because the sellers are beyond national jurisdiction as it happens on cyberspace and SO the risks that arise out of such trade has to be taken care of and the consumers have to be suitably protected. a landmark development n the form of the E -Commerce group otherwise known as The Electronic Commerce and Consumer Protection Group is constitute d by leading companies on the net like America Online, AT&T, Dell, IBM, Microsoft, Network Solutions and Time Warner. These companies predominately deal in online sales of their products and so recognize the growing need of consumer protection and have addressed issues regarding consumer protection as best practices of industry and have created an environment which would allow consumers to resolve disputes arising on cyber space. The American Bar Association Task Force on E-commerce and Alternative Dispute Resolution is one of the best reference guide to consumer protection on the cyber space. This organization was asked to suggest workable guidelines that parties dealing in online transactions can use for ODR’s (online dispute redressal) . the complexity further arose from the fact that there was multijurisdictional disputes arising from B2B and B2c businesses. (THIS IS THE LAW ENFORCEMENT AND IS REFREED TO IN EXACT TEXT) To quote the words of the task force of the Ecommerce group â€Å"that there are many ways to help prevent as well as to help resolve disputes or complaints that arise from e-commerce transactions, the Task Force makes the following recommendations and observations: 1. E-commerce businesses should place an enhanced emphasis on all stages of dispute prevention, complaints handling, and effective methods of redress through ADR and ODR. 2. Internet merchants, governmental and nonprofit entities should place a greater emphasis on consumer education and the prevention of e-commerce disputes. 3. Protecting consumers requires adequate standards and codes of conduct for ecommerce businesses. 4. Internet merchants should be encouraged to participate in and subscribe to relevant e-commerce codes of conduct and trust mark programs. 5. Internet merchants should develop or continue to improve on their in-house complaints handling mechanisms, and educate consumers as to how to use these in-house procedures effectively. 6. For consumers, recourse to in-house complaints mechanisms is normally the first and best means to obtain redress from reputable merchants. Accordingly, consumers should be encouraged to utilize the in-house complaints handling mechanisms offered by reputable Internet merchants before resorting to third party dispute resolution mechanisms. 7. at present, the lack of ODR does not appear to be a material impediment to the growth of B2C e-commerce. . At present, ODR is subsidiary to other higher priority consumer protection activities, including consumer education and use of measures that help prevent or decrease the incidence of fraud in Internet transactions. 9. Recognizing that enforcement of outcomes and decisions reached through ODR may be difficult, consumers should be encouraged to consider using other dispute prevention mechanisms such as escrow services and credit card charge back mechanisms when transacting online. 10. Rather than create a code of conduct for ODR Service Providers, the Task Force has drafted Recommended Best Practices by ODR Service Providers. 1. The Task Force recommends the creation of a new informational entity (referred to as the ADRCenter) that would provide information about ODR in an effort to educate and familiarize consumers, businesses, lawyers and other professionals with this new type of service. 12. For the advancement of ODR as an effective and efficient means of cross-border dispute resolution for both B2B and B2C transactions, there needs to be an appropriate emphasis on the development of interoperable communication and data-sharing platforms. 3. The Task Force believes that much of the education that will be useful for consumers will also be useful for businesses – especially small to medium sized enterprises and those who are ne w to the Internet marketplace and to cross-border transactions. ( Task force quoted verbatim) among all of ecommerce frauds the greatest of consumer complaints arose from identity thefts. The Federal trade commission has released statistics stating that out of 2004,000 complaints received from consumers 42% elated to fraud and identity of the seller, followed by internet auctions which constituted 10%,followed by other non performances like non delivery of goods, inferior quality goods, trial offers from the net, shop at home offers and so on. This only reiterates that consumers have to be protected and laws of cyber space have to be strictly regulated to afford consumer protection. Consumer protection measures were seen very importantly in the light of an interactive poll which shows the increased awareness of consumers against online frauds . They were dissuaded by online shopping and cited some of the reasons why they had not shopped recently. 57% said that they were worried about their credit card number being stolen,57% were worried about confidentiality measures being violated,38% doubted the integrity on the seleers,26% wanted some personal attention to be given while they shopped,37% doubted the reliability of the sellers,47% said that wanted to physically inspect the product and 25% cited many unknown reasons. source: Harris interactive)It was increasingly felt that consumer education will be able to help protect consumers better. It also shows increased concerns about consumers not knowing how to transact online. It is suggested that traders using the electronic media need to given all information that is required for consumers to feel safe about shopping online . Quoting Internet merchants association ,† Merchants need to have greater and enhanced disclosure on their websites as well as heightened compliance with relevant consumer protection law. † Another pertinent consumer protection data and study conducted by a New Zealand organization on 700 web sites explicitly brought out the consumers heightened awareness of ecommerce frauds and consumers came out with their reasons of the need for protecting their rights against fraudulent organizations. They said that 50% of the vendors had not installed security measures on the payment options, 62% did not speak of refund policies, 78% said that the vendors did not advice customers of how to lodge complaints,90% said that they did not know about laws pertaining to consumer redresses and 25% said that the vendors did not show physical address. Despite all this majority of consumers preferred to shop online so laws pertaining to consumer protection need to be implemented in its fullest sense. Consumers International released its Privacy@ net study in which it concluded: that though almost all the traders online collected data regarding the personal information of the buyers very few of them institutionalized a privacy policy regarding the use of the information that the buyer gave. Though these were correct measures to provide security, majority of these proved meaningless to the buyers. it was very common in the US and Europe to find traders giving scant respect to global standards on data privacy. Even the basic principles of informing the customers of how the data will be used, how the firm will access the data , how the consumer can use the data and how the security of the data is sought and maintained is not disclosed. A comparative study of the sites of USA and UK are no different with regard to privacy policy as both played on the information made available to them. The US online trading sites set decent privacy policies which looked good enough to follow. In The European trading sites the consumers had the law backing them up and the presence of an ombudsman and a government representative in the form of a data protection officer took care of the consumer rights and protection if breached. He also intervened to speak on behalf of the consumers if the law was tampered with . in fact it is sad to know that both the countries have left little choice to consumers in terms of data protection.. † This was a comparative study of the European merchants and the USA merchants. But both of them accepted the fact that consumer protection was a must if their sales and revenues had to increase. As a step towards greater protection measures to consumers the task force on ecommerce and protection said that various disputes redressal mechanisms have to be introduced in the form of dispute prevention like education of consumers, feedback collection from consumers, ombudsman appointments, negotiations, mediation, arbitrators, and assessment of valid consumer grievances.

Monday, July 29, 2019

Application Of GPS To Disaster Management Information Technology Essay

Application Of GPS To Disaster Management Information Technology Essay GPS is particularly useful during disasters because it operates in any weather, anywhere and at all times. While it functions simply to give the location of the receiver, the level of precision of GPS makes it quite useful in disaster management. GPS find its greatest utility during the response and recovery phases; however it can also be utilized during preparedness and mitigation phases. An important application of GPS in EDM is tracking of emergency vehicles or supplies. In this application the GPS receiver attached to the vehicle and the location is overlaid onto a map. Other applications include the monitoring the height of waves. GPS units are fixed to buoys and the height of the units are can be determined to within centimetres any significant change in wave height or velocity can trigger an alarm for a tsunami or sea surge. Volcanoes can also be monitored using GPS. By measuring the deformation of the ground, inferences about volcanic activity can be made. Remote Sensing and Flooding Flooding is one of the most frequently occurring hazards. With flooding comes the risk of damage or disruption to normal living including communication, transportation, the environment and infrastructure. Given the magnitude of disruption that can take place, it may be difficult for disaster managers to gain access to remote areas or areas that have been cut off as a result of the disaster. Remote sensing as a technological tool would greatly assist this process as it would allow users of the technology the opportunity to view what is taking place in an affected area, without jeopardizing the safety of the user, since they will not actually be at the site. It is always going to be difficult, if not impossible, for planners to identify all the areas likely to experience flooding in any location. The use of technology however, in determining flood potential could highlight features of the geography that could make the community susceptible to the hazard. Types of flooding su ch as flash flooding, which usually take place in a relatively short time, with little or no warning could prove potentially dangerous for disaster managers if they attempt to physically go into an area that has been experiencing continuous rainfall. While the task of providing assistance to victims is critical and time dependent, a physical presence in the affected area could increase the persons at risk. Using remote technology however, would allow response workers to stay away from danger zones while at the same time gather pertinent information to facilitate timely response, rescue and relief efforts. Floodplain mapping is a useful indication of flood possibilities in an area and remote sensing can aid the process of identifying flood plains. The technology would generate satellite imagery of the area in question, which would allow for proper planning and timely rescue efforts should the need arise. The detailed photography produced from remote sensing provides accurate informat ion and can restrict efforts to the affected area. Other characteristics that could be identified about a geographic region using remote sensing include land-use classification, historical data, soil coverage, and soil moisture.

Introduction to legal frame work Assignment Example | Topics and Well Written Essays - 3000 words

Introduction to legal frame work - Assignment Example lly an individual that carries on business activities on his own account and is singularly responsible for all the losses and profits that are made by his business. In managing the business enterprise, a sole trader is tasked with the responsibility of acting as both the risk bearer and the owner of his business. He is expected to use his own labor and skill as well as use his own capital in addition to his also being entitled to all the profits that the business organization is able to make. As a result of his having unlimited liability, a sole trader is personally responsible to all the creditors of the business enterprise and he alone bears the complete risk of the failure or success of the business organization. In the event that the business enterprise happens to be particularly large, a sole trader has the option of employing a large number of people to help him in effectively managing the business operations. He also has the option of borrowing funds to be used in financings the operations of his expanding business. Canwell (2005), points out that about 63 percent of all business organizations in the United Kingdom are noted to be run as single-person enterprises. Some of the advantages of this business structure include the fact that the registration of a small business in the United Kingdom is relatively straight forward, its record keeping is simple and the owner gets to enjoy keeping all the profits that are made by the business organization after paying taxes. Opting to operate as a sole trader provides the business owners with the opportunity of being able to test the market before they can go on to get involved in some of the more complicated forms of business structures. The main disadvantage with this form of business structure is that the current laws do not make any distinction between the sole trader and the business. It is this aspect that causes the trader to have unlimited liability. Having unlimited liability means that any debt that the

Sunday, July 28, 2019

Your relationship to pharmaceuticals Essay Example | Topics and Well Written Essays - 250 words

Your relationship to pharmaceuticals - Essay Example Not only the pharmaceutical industry gives small gifts to the consumers to boost their sales, but some pharmaceutical companies really resort to connivance with doctors to increase the sale of their products. Well, in China the pharmaceutical companies are not run this way. Had it been so, I would have certainly felt very angry. Though running a pharmaceutical company tends to be a business, still one simply cannot take the pharmaceutical industry as any other industry. Pharmaceutical industry happens to be different from other industries. The pharmaceutical industry aims at curing people and improving their health. It directly relates to saving the lives of the people who consume the medicines manufactured by it. Thereby, it is indeed understandable that why one does not expect the pharmaceutical industry to ruthlessly behave as any other industry. However, after watching this video I really felt disheartened and discouraged to know that the pharmaceutical companies are run like oth er companies and their main motive is to make profits. With the large amounts of money that the pharmaceutical companies have at their disposal, they can invest much in trying to make the medicines cheaper and affordable. This will indeed save the lives of many people. Besides, there are many people in the US who belong to the marginalized sections of the society and who do not afford to buy costly medicines. It is this segment of the population that suffers most from the greed of the pharmaceutical

Saturday, July 27, 2019

Javascript Sanboxing Essay Example | Topics and Well Written Essays - 250 words

Javascript Sanboxing - Essay Example Recent statistics has proven that the sandboxing application is essential in offering security and prevention of malwares to the computers. Sandboxing keeps the privileges of any attack or threat low. Any malware cannot execute on a system without authorized permissions. During installation or uninstallation of any new software in the computer, there are no traces left likely to harm the computer. In addition, it allows restoration of the computer to the original state after some changes have been made. It is also safe to browse on the internet, as the application does not remember the malicious sites visited (Resig 2013, pg. 28). Contrary to the immense benefits the system offers, the application is also at risk of attacks by malwares since it is not secure in all angles. In essence, the advanced threats do bypass the security controls; hence, it is not very efficient in its functions. One cannot have total trust on its operations. Therefore, all an attacker needs to do is to escalate the privilege of a vulnerability, then exploit the system (Saxena et al. 2010, pg.

Friday, July 26, 2019

Evolution of marketing strategy Case Study Example | Topics and Well Written Essays - 3250 words

Evolution of marketing strategy - Case Study Example By selling a product via targeting the customers' desires (emotions), H-D was able to capture people from all walks of life. From top executives to blue-collar workers, a diverse group of people bought into the lifestyle and sense of belonging to an elite group that H-D had created. This occurred because H-D staff members from all various positions, departments, and socioeconomic status were involved in the company's decision making regarding the changes. Vedpuriswar (2003) reports, "By 1986, H-D had regained 25% of the US motorcycle market'it went public on the New York Stock Exchange'From 1988 t0 1995, annual shipments'more than doubled. Although H-D generated more than $1.3 billion revenues in 1995, it spent less than less than $2 million in advertising'In H-D achieved its 18th consecutive year of growth, outselling all other manufacturers in the heavyweight category for the third straight year'" H-D had the right idea when it focused on people being the greatest competitive advantage. By focusing on four marketing objectives, H-D was able to capture both beginners and those who had already fallen in love with its products. After much research, it was able to gear its motorcycles, pricing, advertising, and all other aspects to enthusiasts and non-enthusiasts. H-D used the same the same research and customized approach to target the international market by keeping motorcycle production below demand. The freedom and liberty of America was the symbol that H-D used to sell its products. The image that the company sold was the niche that made it successful above its competitors. With products ranging from motorcycles to clothing to financing, H-D's marketing mix was advertised in that many found surprising. The company wanted to get the general public's attention. H-D also combined forces with other companies such as Ford to create limited edition of vehicles. Hence, the community of customers that H-D built is from all walks of life. Membership, with purchase of a motorcycle, allowed customers to attend unique activities and functions (at local, regional, national, and international levels), which allowed them to share their love of riding and to Last Name 3 belong to a special community of those who share the same interests. Brand loyalty was the result of all this research and hard work and it proved to be extremely successful. The brand and licensing was sold to various companies in the United Stated and other countries. Eighty licenses covered eighteen product categories worldwide. The H-D brand can be found on cafes, dolls, children's wear, toys, etc. As with anything in life, with the pros are the cons; with the advantages there are usually disadvantages. A disadvantage was that H-D listened to their customers so well and created such a desire that they could not keep up with the demand at the current level of production. Some executives are concerned that the H-D brand, which exemplifies ruggedness and masculinity, may be disastrous as it goes into a category that does not live up to this hardcore image and value. They feel that the company may have ventured into territories that it had no business in dealing with which may have led to devastating

Thursday, July 25, 2019

Cancer Essay Example | Topics and Well Written Essays - 1250 words - 3

Cancer - Essay Example Cancer may affect people of all ages, but the chances of occurrence increases with age. Though it is found to affect people all over the world, it is identified as one of the major causes of death in developed countries. Cells do divide and proliferate in most tissues, but the body exercises strict control over the proliferation and death of cells, in order to maintain a balance. The mutations in cell DNA sometimes disrupt this control, leading to cancer. The result is usually a tumor, which may be benign or malignant. Benign ones neither spread to other tissues nor invade others, and is not life threatening except in some cases where their presence compresses critical organs etc. Malignant tumors are life threatening since they invade and spread to other tissues. Cancer can be of many types and are usually identified by the location of the most severe manifestation of the disease. The site of occurrence, character of malignancy, and evidence of metastasis etc determine the severity. Examination of the affected tissue by a pathologist is essential to arrive at a definite diagnosis. Surgery or biopsy is needed to extract tissue. Once identified, there are specific treatments for cancer depending on l ocation, severity and other factors. Common forms of treatment are surgical removal, chemotherapy and radiotherapy. Many cancers can be cured by proper and timely treatment. Untreated cancers may eventually result in death. It is commonly believed that cancer strikes for no apparent reason. Such a belief has grown since medical science has so far not been able to identify a direct, one-to-one reason for the occurrence of cancer. However, despite being unable to identify every cause, it has been possible to identify many of the factors that cause cancer. The causative factors are either intrinsic, such as heredity, diet or hormones or extrinsic, such as chemicals, radiation, viruses or bacteria. The common perception that smoking causes cancer arises from this

Wednesday, July 24, 2019

Drug Testing in High School Athletics Essay Example | Topics and Well Written Essays - 750 words

Drug Testing in High School Athletics - Essay Example The researcher states that despite the fact that some critics give low credit to the drug testing policy in high school, it is morally right to carry out the activity. It serves the country a long-term goal of fighting against drug abuse that is very common in high schools. The government has an obligation to ensure that its citizens learn to observe culturally acceptable values by instilling discipline to children when they are in schools. The students will grow up knowing that the law disallows drugs and substance abuse. However, the parents have an upper hand in ensuring that their children do not end up in drug dens but because of their tight schedules and prioritization of career and professional development, they do little. The teachers and the government are left with the hard task of making eliminating the bad behavior from the students. There, the government has an ethical obligation to carry on with the program despite the critics and controversies surrounding the issue. Th e thought of prevention is better than cure is a valid statement when it comes to drug testing in schools. The government together with school’s administration will acquire valid findings to aid in making sound decisions. A school’s management can establish rules and regulations regulating the usage of drugs among their students. This means that before a student is admitted, they are asked to ensure they drug and to certify their will abide by the law. A strict penalty the school can demonstrate is to expel students found abusing drugs.

Tuesday, July 23, 2019

HR contributes at SYSCO Case Study Example | Topics and Well Written Essays - 250 words

HR contributes at SYSCO - Case Study Example Administrative roles include recruitment and selection focus and supervisory training that deals largely with policy and procedures. Communications of pre-existing OSHA regulations and compliances may have impacted safety, such as developing a marketed campaign to develop a corporate culture of safety through vision or mission discussions company-wide. Training for better job competency could have also impacted safety positively. Employee turnover might have been improved by creating softer HR policies that included training for autonomous work, creating a unified organizational culture, or flexible job strategies to provide motivation. Programs such as this usually build more dedication in employees by appealing to their psycho-social needs. Increases in customer satisfaction could be attributed to the benefits of the workplace climate survey to show employees that they are valuable members of the organization to appeal to their need for shared business decision-making. This makes for more productive outputs by employees by decentralizing

Bathsheba and Fanny Essay Example for Free

Bathsheba and Fanny Essay She later married him after he had ordered the killing of her husband. We can relate this story back to the character of Bathsheba Everdene by saying that she was willing to marry someone who she did not love, but for security, like what happened to her with Boldwood and Troy. Not surprisingly though, being so independent she does not rate marriage very highly, I should not mind being a bride at a wedding if I could be without having a husband. This shows us that she is not very keen on the love and marriage scene. Her surname Everdene can also be linked into how she saw herself a fair product of nature and as the meaning of her surname suggests just this, by its meaning: Timeless qualities of nature. This may also have relevant as to where she felt most comfortable, where she did not have to act or have to impress anyone. I think her surname shares a link to the real Bathsheba, the hardworking, independent, country girl, this is why she was so successful in the managing of her uncles farm. It gave her a chance to unwind and clear her mind from all the turmoil that surrounded her constantly. Hardy is not the only person who tells us about Bathsheba. Other characters also make statements about her, she is so good looking and an excellent scholar, we are told this by her aunt, she says this to try and stop Gabriel from proposing marriage to Bathsheba early in the book. Troy also tells us about Bathsheba as well, I said you were beautiful and Ill say so still, by so you are. Troy says this to flatter her and to seduce her; unfortunately Bathsheba is weak in this sense and is easily flattered, so she falls for Troy. Although, in saying this, by the end of the novel she reveals an inner strength which is demonstrated by her being able to endure troy and Fanny being buried together and by her keeping Fannys lock of hair as a momenta of the poor girl. It is this inner strength which illuminates her need and love for Gabriel, who has remained true and loyal to her throughout her progress. On the other end of the social scale we are told of Fanny Robin, she is a direct contrast to Bathsheba: she is blonde and fragile while Bathsheba is dark and lively. She is portrayed as a shadowy figure adding mystery to the plot. We first meet Fanny in chapter seven, in Weatherbury churchyard where she will finally be buried. We are told that When abreast of a trunk, which appeared to be the oldest of the old, he became aware that a figure was standing behind it. This quote shows us that Fanny was a shy girl and that she did not want to be noticed by anyone if she could help it. Hardy evokes sympathy for Fanny when she and Gabriel meet for the first time, as Gabriel notices that she is rather weak and vulnerable. I am rather poor and I dont want people to know anything about me, Then she was silent and shivered. Fanny clearly wants to go unnoticed and she appears to be cold and undernourished which would lead us to believe that she was probably unemployed and very poor. Gabriel feeling sorry for Fanny offers her a shilling Yes, I will take it. Fanny accepts the shilling like a child would a sweet. Like Bathsheba, Fanny can also act unconventionally, for example when she runs off to marry Troy although she is depicted as a vulnerable girl in a hostile landscape. This is effective in that it draws the readers sympathy for Fanny because of her weak stature and the harsh surroundings that she had to cope with each day. Ironically though her letter rejoicing in her forthcoming marriage is somewhat naive and premature. Through this Hardy again evokes sympathy and pity for Fanny when she muddles the churches and faces Troys fury, but this is what Troy needed; a chance to abandon Fanny and marry his rich and beautiful mistress, but unknown to Troy, Fanny is pregnant and destitute. Fanny is a victim of circumstance, a shadowy presence who reveals Troys fickleness when he flirts with Bathsheba. Fanny would now be frowned upon due to the fact that she was pregnant and was giving birth to an illegitimate child, although this was not her fault she would still have faced prejudice. This, also draws sympathy from the readers for Fanny because it is a problem that faces women in even our modern world today. So, Fanny conceals her pregnancy and supports herself as a seamstress until she goes to Casterbridge workhouse to have her baby. I personally feel sympathy for Fanny in this situation because she could have gone to Troy and demanded that he take care of her and the unborn baby, but she didnt, and in doing so showed that she had respected Troys decision to marry Bathsheba. She realised how her social status and upbringing would have affected Troy, and in doing so she left him alone. I think this shows great courage and unselfish behaviour from a woman who had so little, but yet payed the ultimate price. Hardy evokes sympathy by describing in harrowing detail her last journey, especially with the picture of her little arms resting on a large dog. Her death caused by giving birth to an illegitimate child. Fannys fear that she will never see Troy again Perhaps I shall be in my grave is prophetically ironic. Ironically she has more power in death than in life. Her beauty in the coffin reduces Troy to abject shame and reawakens his true love, as he regards Fanny now as his very wife Fanny is then put in a coffin and Gabriel leaves her coffin to rest at Bathshebas house, which is near to where she will be buried. On the coffin though it said Fanny Robin and Child. Gabriel took his handkerchief and carefully rubbed out the two latter words, leaving one inscription Fanny Robin only. Gabriel did this to protect Bathsheba from getting hurt and to maybe protect Troy from the embarrassment, as he was the father of an illegitimate child. Her character is simply drawn from her naive honesty and her forlorn faith in her lover. In many ways, Fanny represents the plight of the Victorian working- class female who strays outside the narrow confines of society rules. In the end Hardy left Fanny on a very sombre and sad note The persistent torrent from the gurgoyles jaws directed all of its vengeance into the grave. The rich tawny mould was stirred into motion, and boiled like chocolate. This is where Hardy has evoked the most sympathy for Fanny, and I am sure other readers of the book would agree with me. Hardy presents these two characters very differently. He portrays Bathsheba as a self- assured, independent, confident woman who was deserted by her husband because he had realised his mistake, leave her to pick up the pieces of what I think was a shattered life and one that was in turmoil, dismay and sadness. This is how Hardy has tried to draw sympathy for Bathsheba, by describing how Troy mistreated her and used her for her wealth; this is the only place in the book that you really feel sympathy for Bathsheba. With the character of Fanny Hardy was able to draw a lot more sympathy from the readers due to the reality of her character and that did happen in those days. Fanny was the total contrast to Bathsheba she was the shy and dark and lonely figure who was never paid any attention to; she was poor and weak. She was never, I think, truly happy with who she was and how people, especially Troy treated her and Troy only realised how special she was until it was too late. The most striking scene in the book was definitely when the gurgoyle was dripping water all over Fannys grave and ruining it. This is when we as readers, we sit back and are made to think of the things in our life that we take for granted each day, just expecting them to always be there, and one day they wont and then we will truly realise how much we had loved them, as Troy found out when Fanny died. Hardy has presented these characters in the most appropriate and effective way in order to draw sympathy from them. I do think now, that this book is not just to be read but it has been written to make you think about the things that you cherish most in life, and dont make the mistake of not appreciating them.

Monday, July 22, 2019

Evaluating the non-survival of best technologies in the long-term Essay Example for Free

Evaluating the non-survival of best technologies in the long-term Essay Abstract The essay under consideration analyzes the factual statement that best technologies do not survive in the long term. The statement has been considered under real life incidences, scenarios, and personal experiences, by virtue of which, several conclusions have been obtained and justified through relevant logic.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Technology, for the purpose of this paper, has been restricted to the IT only; however, there are other implications and applications. There are several reasons for failure in long term survival of even the best technologies. Some of them are found to be of the highest probability of occurrence, others seem rather less risky.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   However, analyzing these is extremely important because technology research and development, and implementation require major cash outflows that need to be controlled and planned well in order to avoid struggle for survival. It is also worth mentioning that in majority of the circumstances, latest technologies are implemented without prior research of their impact. Avoidance to this can also make things much easier. Introduction As the facts state, and are known to all, that not more than 10% infact even lesser projects are successful across the IT industry due to several reasons [1]. Similarly, technologies that are really tremendous also do not survive in the long run. Technology may have several definitions, however, the easiest to comprehend definition is: Technology can be defined as the applied part of research and development. Elaborating on the above-mentioned definition, any organization may conduct RD activities but just the part of it that is applied is converted into technology [2]. Technology is generally associated to IT and pertinent topics only; however, technology applies to enhancements and advancements of any entity. Despite this, the scope of this paper restricts the view of technology to IT hardware and software, and pertinent entities/issues only. There are several issues and causes that pertain to the long term success of a technology. Relevance Study of this non-survival is not just important, but is critical to know and analyze. The prime reasons being that it is only its study and exploration that possibly may lead to non-repetition of such issues in the future [7]. However, the past shows history otherwise i.e. repetition of these issues has been witnessed in several failure cases. Also a point where this study gains extreme criticality is the fact that research and development costs and involves huge some of money that needs to be compensated (pay-back) once the technology is commercialized. If it, however, fails to deliver and sustain, survive in the long term, all efforts of RD simply go to waste [3]. Analysis of Issues For deeper analyses, it is most important to define the exact meaning of the topic. Survival in the long run implies that as a technology grows in its PLC (Product Life Cycle), it should have added customer base. When it is being said that best technologies do not survive in the long run, this statement implies that even the best of technologies are unable to sustain their competency in the long run, thus losing out the customer base. Or in other words, the possibility and cases that lead to a decline, referring to the query that why are technologies not able to survive for a longer term of life [16], [4]. Therefore, hypothetically, if the technology losses its clients due to some issues pertinent to the technology itself, the technology may be pronounced as a failure or non-survivor during the long term [17]. For further analyses of the issues that lead to the non-survival of some great technologies, the initial step should be their identification and then exploration. Following are the major issues pertinent to this: Extra-ordinary Expectations It can also be called as the inability of technologies to deliver what is actually expected from them. This can be a dual-sided problem. On one side, it is possible that during the phase of research and development, many technologies are elaborated and exposed to media and other stakeholders as the ultimate benchmarks beyond which no further development may take place. In such a scenario, technologies are bound to perform much below the ‘speculation-built’ expectation of the target audience. The other side is the fact that the technology may be elaborated upon parity to what it actually is, however, it may truly be below par. Thus gradually, those who adapted that technology, move towards a substitute or the previously run satisfying technology, as the case may be, in the long run; this is a trend that leads to the new technology not surviving in the long run [5]. Timing of Updates Updates are another wide issue why technologies may fail. Updates can be identified as patches or additional utilities that enhance the working of a technology. As the world is highly dynamic, technology keeps advancing, thus requiring timely updating of technology. In this regard, there are two prime concerns why a technology may fail [8]: Mistimed Updates The updates may not be timed as appropriately as required. For example, a software vendor may provide an anti-virus update of their software 6 months after that virus has started its destruction. Such updates are mistimed updates that do not satisfy the customers and may cause a technology failure. Irregular Updates A similar concept is of irregular updates. For example, a software vendor may actually provide updates with the first one in first month and then on randomly after any variable interval of time. This again is a hassle for the customer to actually update the technology as per a random walk. The issue might be as critical as it may not sound, and may actually cause the customers to walk away from such technologies causing them to fail. The implementation of a modern technology, which is definite to be costly, leads to the customer expectation of after sales services including regular updates and renewal versions are the primary expectation that a customer may hold. Failure to deliver these may cause the customers to shift to alternatives, causing a decline in the usability of technology. This decline denies the chances of survival in the long term. Costly Maintenance The technology may effectively be the best and most advance; however, its maintenance cost may be on the similar height due to lesser expertise in the advance technology, costly equipments, etc. The lesser expertise may increase the dependency on a single vendor, pushing him into premium charging from the customers, and as a result, customers might want to shift to an alternative or to the previously held technology, that again leads to survival issues for new technologies in the long run [11]. Compatibility Issues In the long run, organizations need to interact with their value/supply chain and thus requiring compatibility among the systems of the two organizations i.e. the technology each has implemented respectively. Failing to endure compatibility may lead to an eventual failure of the technology; primarily because organizations are most definite not to prefer technology that is incompatible with others, unless the organization stands tall in a commanding position in the value chain. Further Advancements in Technology Also referred to as Constructive-Destruction by some authors, technology may fail due to rapid development in the similar field enhancing the scope of accomplishments through enhancements, while these enhancements may fall beyond the scope of the previous technology, causing customers to shift to the latest technology for added services obtainable from the same. Thus, technological advancements may actually lead to the existing technologies not surviving for long. This can also be rephrased as the obsolesce factor [9]. Consider the example of type-writers; these were considered a tremendous technology of their time. However, the advent of computer (keyboard and printer) actually ruined the existing technology of type writers. Another example can be the shift from Infrared to Bluetooth technology in terms of wireless mediums. Alignment of Business Strategy Vs. IT Strategy At times a tremendous technology may just not survive due to absence of in-built/default best practices that may align the IT strategy to the business strategy. Generally, the best practices are indulged, particularly in case of ERP (Enterprise Resource Planning) tools, whereby organizations while implementing these technologies, tend to perform BPR (Business Process Re-engineering). This in-turn has an effect on the whole of the business strategy and of course; BPR at that stage assures the appropriate alignment of the two strategies. Failure to align suitably may not be depicted at once; however gradual illustration of the same would encourage firms to shift their IT solutions and vendors, causing the decline of users and thus, creating a survival struggle. Lack of Vendor Support The best of the best technologies may not survive for even a shorter spam of time if the vendor support is lacking or missing. Many individuals and corporate clients may, for instance, find Linux a better operating system than many others even including Windows. However, lack of support leads to the survival struggle. There are firms working on providing its support but the current market share of it vs. windows says the whole story [10]. Lack of Monitoring Control on the Implementation Due to lack of monitoring and controlling the implementation of a technology, things may seem alright as implemented for a short spam of time. However, in the long run, as soon as problems start to appear, the think-tanks may blame the actual technology. Again, the reduction in usage rate assures a decline and a struggle for survival in the long run. Lack of Creativity Innovation Technological development is no short term or ‘once-done’ sort of a task. For staying in business, a technology related firm must assure constant creativity and innovation in the technology launched in the first go. Creativity, innovation, and basically something new; if these factors missing from the approach, mission, and vision of a technology provider organization, in that case it is certain that the organization itself may not survive in the long run, let alone the technology it is developing. Life Expectancy Expected useful life of technologies has decline tremendously over the past decade. With new technology developed almost all the time anywhere in the world, the product life cycle has reduced x-axis value. In such a scenario, even the best of the best technologies struggle to survive in the long run. This primarily pertains to the competition that has developed so drastically that no technological advancement actually remains advancement over a period of time. In such a scenario, firms should come up with new research and development that could actually be deployed in technology useful for an organization in developing its competency [6]. Technology Migration Strategies A technology should be adaptive in nature, and should be able to comprehend migration strategies across different technologies. Migration here may also imply the development of compatibility with other technology. This becomes more crucial when technological platform has to be changed or back ups need to be regenerated. A weak technology in this regard is most definite to create a non-survival scenario among existing technologies [12]. Conclusion Understanding the root causes of failure is the first step towards its elimination [18], [19]. Technology is useless without application. It can be viewed from the above argument that technology that has the above-mentioned loopholes, may not survive in the long run. A simplest and most routine example that can be considered is the WINDOWS vs. DOS operating systems. Most of the above mentioned problems, if not all, were presence in the DOS systems and absent from the WINDOWS platform, and the stories of survival and accomplishments are known to all [13]. To conclude, it can actually not be said with extreme confidence that best technologies do not survive in the long-run at all. In the long-run, there are further advancements that lead to the non-survival of previous technologies [14]. However, there are some technologies that are still existent in the world from the past and are expected remain so. One of the prime examples of the same is a wheel. Wheel probably is man’s finest creation, and possibly the advent of technology in human age [15]. Despite of prospering a lot today, wheel exists in this world today even in its basic form, let alone the advance version. But yes, mostly technologies do not survive in the long run because they are substituted through their or a substitute advance versions [20]. References James A. O’Brien (1999) Management Information Systems: Managing Information technology in the Internetworked Enterprise, 4th Edition Adas, Michael (1989). Machines as the Measure of Men: Science, Technology, and Ideologies of Western Dominance. Ithaca: Cornell University Press. ISBN 0-8014-2303-1. Monsma, Stephen V., et al. (1986). Responsible Technology: A Christian Perspective. Grand Rapids, Mich.: W.B. Eerdmans. ISBN 0-8028-0175-7. Noble, David F. (1984). Forces of Production: A Social History of Industrial Automation. New York: Knopf. ISBN 0-394-51262-6. Roussel, Philip A.; Kamal N. Saad, and Tamara J. Erickson (1991). Third Generation R D: Managing the Link to Corporate Strategy. Boston, Mass.: Harvard Business School Press. ISBN 0-87584-252-6. Davis, Aquilano Chase (2003) Fundamentals of Operations Management, 4th Edition Applegate, Austin McFarlan (2003) Corporate Information Strategy Management, 6th Edition R. Ray Gehani (2003) Management of Technology Operations Rory Burke (2000) Project Management: Planning Control Techniques, 3rd Edition Camp, J. (2000), Trust and Risk in Internet Commerce, MIT Press, Cambridge MA Goodhart, C and M Krueger (2001) The impact of technology on cash usage, London School of Economics Financial Markets Group Discussion paper no 374, April. NARA/Long-Term Usability of Optical Media [Internet]. Available from: http://palimpsest.stanford.edu/bytopic/electronic-records/electronic-storage-media/critiss.html [Accessed 9 April 2007] How Failure Breeds Success [Internet]. Available from: http://www.businessweek.com/magazine/content/06_28/b3992001.htm [Accessed 9 April 2007] Technology and Educational Revolution: Ending the Cycle of Failure [Internet]. Available from: http://www.tltgroup.org/resources/V_Cycle_of_Failure.html [Accessed 9 April 2007] Technology Failure Analysis: Understanding Why A Diabetes Management Tool Developed for A Personal Digital Assistant (PDA) Didn’t Work in a Randomized Control Trial [Internet]. Available from: http://www.pubmedcentral.nih.gov/articlerender.fcgi?artid=1480274 [Accessed 9 April 2007] Failure Causes [Internet]. Available from: http://www.it-cortex.com/Stat_Failure_Cause.htm [Accessed 9 April 2007] Failure Analysis and Root Causes Determinations for the Legal Profession webinar March 27th [Internet]. Available from: http://www.storksmt.com/page.html?id=12753 [Accessed 9 April 2007] To Avoid Failure You Must First Understand Failure [Internet]. Available from: http://www.tfdg.com/index.cfm?page=45 [Accessed 9 April 2007] When Technology Fails: They Key to Dealing with Technology Failure is to Prepare for it [Internet]. Available from: http://globeandmail.workopolis.com/servlet/Content/rprinter/20020703/cpsa-techfail [Accessed 9 April 2007] The Daily (2004), Electronic Commerce and Technology, 16 April [Internet]. Available from: http://www.statcan.ca/daily [Accessed 9 April 2007]

Sunday, July 21, 2019

Explore Travelling Constraints People Face Tourism Essay

Explore Travelling Constraints People Face Tourism Essay Various number of research studies explore travelling constraints people face. In contrast to motivations that push people towards travelling, the overshadowing constraints of traveling could prevent the travelers from engaging in travel although the motivation may perhaps exist (Page and Hall, 2003). Financial Considerations In 2007(DSS, 2008), it was presumed that the income of an individual has a relationship with the number of foreign trips made by him/her yearly. Key findings (DSS, 2005) discovered that the household income of an individual is a critical factor that influences the choice of travelers while deciding the amount of money he/she would spend in travelling for each trip. A study in consumer behavior revealed that people of higher income are likely to explore more for products/services information (Andereck and Caldwell, 1994; Runyon and Stewart, 1987; Robertson, Zielinski and Ward, 1984; Newman, 1977). Heung and Chu (2000) found that tourists with lower income are more concerned about the pricing in comparison to tourists with higher income. In Zhang et al. (2004)s research also stated that respondents with higher income considered travel cost less significant than the lower income groups. Travel expenditure patterns play a fundamental role for travel planners and destination marketers (Jang et al., 2004). The rise in international tourism expenditure had reached 5.6% (adjusted for exchange rate fluctuations and inflation) in 2007, (WTO, 2008). WTO stated that almost 80 countries received more than USD1 million from international tourism in 2007. Hong et al. (2005) revealed that monetary factors specify a notable positive correlation between income and travel spending. Nicolau and Mas (2006), suggest that at the time of selecting a destination for travelling, the motivations of a tourist pacify the effect of prices. A particular group of people is reluctant to pay more for costly places where family or friend dwells, however they are keen to pay to explore new places. According to Nicolau and Mas (2006), travelers who are opting for culture are commonly more willing to pay higher prices, while those looking for climate are less eager. Whilst the majority of travelers spend consciously, there appears to be a tendency of people choosing a destination which offers better exchange rate so more could be spend while paying less. Dwyer, Forsyth and Rao (2002) recommended that price competitiveness is a general concept covering price discrepancies coupled with exchange rate movements and qualitative factors that have an effect on the attractiveness of a destination. The exchange rate movements have largely been altered by the structure of price within respective countries, which has resulted in either an increase or drop in price in travelling segment. In addition, their study discovered that countries like Thailand, Indonesia and Turkey took the advantage from the devaluation of their respective currencies which were compensated by the increases in the consumer prices in these countries. Whereas, Zhang et al. (2009) concluded that other factors remained constant, the chief motivation for a traveler would be the decline i n currency of the domestic market. For example, the higher the US dollar to Thai baht, the more probability of tourists to choose Thailand as their destination as tourists expenditures could be a lot lesser than USA or Europe countries. Distance and Time According to Nicolau and Mas (2006), the significant influence of distance on travelers motivations is balanced out at the time of deciding the destination to travel. The research carried out in Spain concluded that the traveler has a preference for shorter distances and is not inclined towards extended and time-consuming journeys. Nonetheless, travelers favor longer trips if they are visiting their family or friend or exploring new places. While some of the likely causes of short distance travelling could be lack of time availability or economic constraints. Zhang et al. (1999)s study revealed that people with higher income have a tendency to opt for longer journeys, however the correlation is not linear and the higher the tourists perceive their incomes the longer will be the travelling distance. Safety, Security and Visa Issues Mansfeld and Pizam (2006) suggest that travelers may possibly have safety and security concerns because of issues such as war, civil unrest, terrorism, disease, crime (specifically theft), catastrophes caused by human or technical error, natural disasters, and dangerous wildlife. Beirman (2003) stated that the key determinant in travelers choices to go visit a destination is the perception of safety and security. Researchers say that episodes like the terrorist attacks on September 11, 2001, SARS in March 2003, Tsunami in December 2004 and Swine Flu influenza in April 2009 had tremendously damaged and threatened the travel and tourism industry. Regarding this, Dickman (2003) pointed out that the lack of confidence in an individual could be one of the possible reasons that they are expected to respond strongly on negative conditions like epidemics, disasters and terrorism. Pakistan faced the most prominent plummet in visa issuance for USA after the terrorist attack on the World Trade Centre. In 2002, the number of tourist and immigrant visas issued to Pakistani citizens fell approximately 70 percent and 40 percent respectively, in comparison to 2001. International tourism to America chopped down for nearly three years following 2001 incident. The total number of Americans who traveled internationally also decreased past 9/11, the Office of Travel and Tourism Industries reports (Jason and Dalia, 2011). Even though travel surveys time after time discover that safety and security are vital concerns among travelers (Poon and Adams, 2000), the latest research conducted by Valencia and Crouch (2008) testing travelers response to risk uncovered that 33% of the surveyed respondents would go ahead as planned regardless; 21% would decide to relocate to another safer destination and 19% would delay their trip. On the contrary with a natural disaster, 36% preferred to reschedule their trip and 19% chose to go to a safer destination and 15% would go ahead with their trips as planned. Likewise, the results in Rittichainuwat and Chakraborty (2009) carried out in Thailand, also discovered that a mean of 2.89 respondents were not put off entirely (by travel risks or epidemics but would decide to visit another safer destination (mean=3.56). Moreover, PATA and Visa (2008) study proved that out of 52% of travelers whose travel plan has been affected by the economic crisis, 75% would switch to less co stly destinations and 31% would delay their trips. In the survey by Zhang et al.(2004), Hong Kong natives identified epidemics as a main aspect while travelling, followed by safety, disaster, good value for money, political and social environments. Pakistanis face the visa restrictions when travel to USA. There is also a lot of abhorrence for USA in Pakistani society because of the losses of their lives during war on terror (Shahnaz, 2012) Edgell (1994) specifies that outbound tourists are commonly affected by different governmental policies and restrictions of various countries. Particularly rules regarding the imposition of restrictions such as limited visa grants, exit visa requirements, limited access to foreign currency and restricted allowances for foreign travel services are widespread. Socio-demographic constraints Researchers suggest that socio cultural, demographic and economic features like nature of society i.e. patriarchal or matriarchal, age, family life cycle stage, influence of family, education, profession, economic position and self-concept also influence decision making in travelling. Constraints in travelling choices are principally linked to gender, life cycle and cultural factors (Jackson, 1991; Shaw, 1994). Factors like family, work, domestic responsibilities, determine the quantity and quality of time accessible for traveling and act as constrictions for some individuals. Although constraining features affect both genders, the extent to which either gender is affected is poles apart. The limitations operate on females more than on males (Sonia, 2011). Apostolopoulos and Sonmez (2001) propose that despite the fact that womens travel patterns and trends reflect their individual societal customs and principles, cultural or religious limitations in regards to their societal positions and socio economic restrictions are expected to decide their travel capabilities and methods (Bartos, 1982; Myers and Moncreif, 1978; Schul and Crompton, 1983; Van Raaij Francken, 1984). In accordance with tourism decision making research DeCrop (2005) has explained the family as a Decision Making Unit (DMU) in which fundamental decisions of life are discussed. When it comes to travelling decisions, in addition to family, close social circles e.g. friends etc. possibly signify significant DMUs as well. The value of family and the influence of each family member are crucial in deciding the liberty that one associate exercises in making independent decisions. The findings, however, point out that females are by and large more controlled by family responsibilities and approvals than males. It is evident that lesser the limitations operating on an individual the more will be the participation in traveling (Sonia, 2011).

Saturday, July 20, 2019

Prohibition :: essays research papers

Prohibition was a period in which the sale, manufacture, or transport of alcoholic beverages became illegal. It started January 16, 1919 and continued to December 5, 193. Although it was formed to stop drinking completely, it did not even come close. It created a large number of bootleggers who were able to supply the public with illegal alcohol. Many of these bootleggers became very rich and influential through selling alcohol and using other methods. They started the practices of organized crime that are still used today. Thus, Prohibition led to the rapid growth of organized crime.   Ã‚  Ã‚  Ã‚  Ã‚  The introduction of prohibition in 1919 created numerous opinions and issues in American society. Prohibition has been a long-standing issue in America, with groups promoting it since the late eighteenth century. The movement grew tremendously during the nineteenth century. When the United States entered World War 1 in 1914, there was a shortage of grain due to the long demands to feed the soldiers. Since grain is one of the major components in alcohol, the temperance movement now had the war to fuel their fight. Thus, the war played a large part in the introduction of Prohibition. During the net five years many states enacted their own prohibition laws, and finally, on December 16,1919, Amendment 18 went into effect. It states that, â€Å"†¦the manufacture, sale, or transportation of intoxicating liquors†¦. For beverage purpose is hereby prohibited.†(Constitution)   Ã‚  Ã‚  Ã‚  Ã‚  The public reaction to the introduction of Prohibition was largely mixed. The temperance organizations were rejoiced. Over a century of work had finally paid off for them. The rest of the country, however, was less than pleased. Many saw it as a violation of their freedom, and others wanted to keep drinking. It did no take a long time before people began to protest.   Ã‚  Ã‚  Ã‚  Ã‚  The public demand for alcohol led to a soaring business for bootleggers. When prohibition began, people immediately wanted a way to drink. Therefore, the profitable bootlegging business was born. Before Prohibition gangs existed, but had little influence. Now, they had gained tremendous power almost overnight. Bootlegging was easy; some gangs even paid hundreds of poor immigrants to maintain stills in their apartments. Common citizens, once law abiding, now became criminals by making their own alcohol. However, this forced risks for those who made their own. The less fortunate Americans consumed homemade alcoholic beverages that were sometimes made with wood alcohol. In return, many died due to alcohol poisoning.

The Mantle of the Prophet Essay -- Islamic History, Mothhahedeh

Roy Mottahedeh is a professor of Islamic history at Harvard University. He has written widely in the history of Islam and religion. The Mantle of the Prophet is one of the books that Mottahedeh wrote. In this book, Mottahedeh covers different aspects that include Islamic faith, Iranian city of Qom, traditions derived from the history of Iran, political change in Iran and secular Islamic learning among other issues. Ali Hashemi and Parviz studied together in the same elementary school courtyard. However, each of them took different turns. This paper is a review of The Mantle of the Prophet by Roy Mottahedeh. It will discuss the similarities and differences of the ideologies of Hashemi and Parviz and their oppositions to the Shah. It will also discuss their social backgrounds and cultural influences on their outlook of the world. The book begins with a detailed description of Qom, an Iranian city where Ali Hashemi, the main point of reference, in the book was born. Mottahedeh also describes the Shi’ite faction of the Islamic faith that entails learning and tradition, in Iran. Mottahedeh managed to introduce readers to political climate, history and tradition from the middle of the twentieth century. Mottahedeh recounts the life of Ali Hashemi from his childhood through his education into adulthood. Ali Hashemi is the contemporary mullah of Qom. The book portrays Ali Hashemi as an alias of a mullah in the University of Tehran. This presents Ali Hashemi as a scholar just like Parviz. However, Hashemi is still engrossed in Islamic religion unlike Parviz. Mottahedeh used Hashemi to bring a clear picture of culture and history in Iran, in different times. Mottahedeh used Hashemi to create a scenario that depicts trends and issues that i... ...ries and the 1979 revolution. The author presents Iran through the leadership of mullahs and shah tradition. The book has rich information covering the history of Iran. Mottahedeh managed to develop an impressive book that satisfies the curiosity of a reader wanting to understand the history, culture and political atmosphere of Iran through the eighteenth, nineteenth and twentieth century. Roy Parviz Mottahedeh and Ali Hashemi represent two views of Islamic learning and Iranian history and culture. While Ali Hashemi represents a religious view of Islamic learning and history of Iran, Parviz represents a secular view of Islamic learning and ambiguity of culture in Iran. The two views help to bring out the ways in which Islamic religion and culture influenced political atmosphere, in Iran especially at a time when politics in Iran was shaped by religion.

Friday, July 19, 2019

Hosting a Successful Barbecue (Actually a Beer-B-Q) :: Free Expository Process Essays

How to Host a Successful Beer-B-Q Beer-B-Q's are great fun. They're like a mix between a full-blown keg party and a quiet barbecue. Beer-B-Q's are more relaxed than a keg party, with great food, but they're more fun than a simple barbecue. And throwing a great Beer-B-Q is much easier than you may think. First, a good location is a must. A secluded backyard is preferred, especially if it's big and has a deck and a pool or spa. However, a public park that has grills, and where alcohol is allowed, can work as well, but keep the noise level down to avoid any law enforcement attention. Second, you need good weather, so plan your Beer-B-Q for sometime between late May and early September for the best weather in this area. Memorial Day to Labor Day is always a good bet for the perfect Beer-B-Q season. Now that you've picked a date and have your location, the real preparation begins. Okay, first major step is food. Make sure to account for any vegetarians in your group of friends. Boca Burgers or GardenBurgers are good choices for vegan and vegetarian party guests, as both products are made with no animal products. Now, for the real carnivores you're sure to invite, keep your patties at or above a quarter pound size. Even more important than that, however, is the fat content of your patties. Get 98% Fat Free or better patties. Why? We don't care about watching waistlines! However, most of the fat in a patty gets burned off on the grill, shrinking the overall size of the patty. So a 98% Fat Free quarter-pound patty is going to be bigger than a regular quarter-pound patty. I hope that makes sense. Hot dogs are also always a good bet, and Oscar Mayer and Ballpark are perennial favorite brands. Be sure to have plenty of condiments, chips, salad or fruit, and soda for the underage or designated driver guests. Next up is music. Get a stereo. If you're lucky enough to be throwing the Beer-B-Q at a house with those neat outdoor speakers hooked up to the indoor stereo, you're probably set. Otherwise, get your hands on a 3-Disc or 5-Disc portable CD player with speakers that detach from the main unit. You won't have enough outdoor electrical outlets for a component system, so leave the big boy at home. As for music itself, keep it mixed up.

Thursday, July 18, 2019

Coleman Hawkins

The 20’s were a turning point in the history of music, which coincides with a turning point in the mindset of African Americans, especially in large cities like New York. The black entertainment industry, up until now, had always been a white mans exhibition of the Negro for white audiences (Cooper). The Harlem renaissance and the idea of the ‘New Negro’ was a precursor for a wave of African American musicians and songwriters who would not be restricted to the same conventions which their predecessors were.Coleman Hawkins learned to play the piano at the age of 5, and two years later he moved on to the cello. At 9 he learned the saxophone and by the time he was twelve he was playing in the Kansas City Theatre Pit Band. Which black musician was most frequently broadcasted throughout the 1920’s?  Coleman Hawkins first inserted himself into the Jazz scene in 1921, at the very beginning of the Jazz age and the roaring 20’s. He played alongside the trav elling blues and vaudeville star, Mamie Smith. After playing this background role for 2 years, he joined Fletcher Henderson’s Orchestra.This would reinvent Coleman Hawkins as a lead soloist and a big star of American jazz, a title that he retained for more than 40 years (Yanow). Hawkins should be included in this course because he was a major part of the swing jazz and big band movement, both in America and Europe, while reinventing the tenor saxophone as a Jazz instrument and an art form. His single, ‘Body and Soul’, was not only outrageously popular, but did so while defying many of the swing conventions of jazz music at the time.He was also one of the pioneers of early bebop and was a huge influence on later musicians such as John Coltrane and sonny Rollins. Fletcher Henderson’s Orchestra was one of the most popular and influential ‘Hot Jazz’ bands of the 20’s, and Coleman Hawkins was a full time member for 11 years and was considere d the centerpiece of the band (Oxford). Their home was the Roseland Ballroom. This dance club would later be known as the best dance club in New York. (Oxford). They also frequented the Savoy Ballroom, the most popular Black and Tan dance club in New York.This club was influential because it was a mixed race club where both blacks and whites came to dance, and racial differences were largely left at the door. â€Å"The Savoy was a building, a geographic place, a ballroom, and the soul of a neighborhood. It personified a community and an era, and became a monument to the music and dance of ‘swing’† (Engelbrecht 3). Fletcher Henderson and his Orchestra were likely the most influential swing group of the 1920’s. One measurement of this is how often Henderson and his band were recorded and broadcasted. Henderson was the most frequently recorded black musician in the first decade of Jazz’s recorded history† (Magee 8). Jeffrey Magee also notes that his highest frequency of recordings took place between 1923-1927. During this time period Coleman Hawkins was a permanent member of Henderson’s Orchestra. â€Å"The Bands instrumental star was definitely Hawkins† (Chilton 26). In the years before and after Louis Armstrong was part of Henderson’s Orchestra, Hawkins was the main soloist. â€Å"Louis influenced the band greatly by making the men swing-conscious with that New Orleans style of his.That same effect that Hawkins had on reeds, that right down-to-earth swing, with punch and bounce† (Fletcher Henderson). Coleman Hawkins had a unique style of improvisation on the tenor saxophone, which was copied by almost all tenors after Hawkins got big in the New York jazz scene. Coleman Hawkins style of playing the Tenor saxophone was his own, and was almost entirely different from anything previously heard on the tenor sax, which, in the early 20’s was still primarily a marching band instrument. Hawkins arrived at his own [Musical] style without apparently being heavily influenced by anyone in particular†(Chilton 18). Hawkins, who is widely known as a modest and unassuming man (Chilton 27), made a statement saying that, â€Å"I guess its true that I introduced a new style, a new way of playing tenor. I had a much heavier tongue, for one thing, than most of the others, and their tone was kind of thin†(Chilton 27). However, Hawkins improvisational style was not a fixed entity. He strived to move away from the bad habit of ‘slap tonging’, and began to experiment with less conventional soloing techniques. Hawkins was beginning to experiment successfully with the use of 9th chords and augmented runs as part of his improvisations, often showing his confidence by including ‘surprising notes’. †(Chilton 34). Hawkins began to put a European emphasis on his improvisations in his emphasis of the weak and strong beats (Williams 8). During the 20â₠¬â„¢s Hawkins was the top tenor saxophonist in New York, and many young sax players copied his smooth and often atonic style. â€Å"Bud Freeman was about the only tenor who didn’t sound like a replica of the hard-toned Hawkins†(Yanow).Although Coleman’s style became outdated by the 50’s with the entrance of revolutionary tenor saxophonist Lester Young (Yanow), his style was still a huge stepping stone in the history of improvisational Jazz. â€Å"Jazz improvisation has travelled a long road of development†¦This evolution [was] instigated by the titans of jazz history of the last 40 odd years: Louis Armstrong, Coleman Hawkins, Lester Young†¦etc†. Hawkins added much of his own creative musical input to his music and to the 1920’s Jazz scene in New York. Adolphe Sax invented the Tenor sax for the purpose of being a military band instrument.As the tenor sax migrated to middle class America it was adopted as a marching band instrument. Coleman Hawkins was the first musician to play jazz on the Tenor sax, and he was certainly not the last (Yanow). â€Å"The prelude to jazz tenor saxophone originates from the Wilbur Sweatman Orchestra. The sound quality is quite primitive†¦there seem to be no tenor sax solos† (Evensmo 11). Sweatman’s orchestra played prearranged music, leaving no room for improvisation, which means that their music cannot be called jazz, and falls into the category of ragtime, which is largely prearranged.Therefore, when Coleman Hawkins joined Fletcher Henderson’s orchestra, the jazz tenor saxophone was created (Evensmo 11). Since that point, there has been a plethora of tenor saxophonist’s in jazz. Many, like Coltrane and Sonny Rollins would become extremely influential jazz musicians of the bebop era. Body and Soul was Coleman Hawkins’ most influential song, and also marked a turning point in Jazz (Moore). The song was a commercial success and was enormously popular among jazz audiences(Moore), however, critics also recognize the song as a musical and improvisational masterpiece. Right away, the Hawkins version of â€Å"Body and Soul† became one of the essential documents of jazz. It was not only a hit on jukeboxes until the 1950s, but also a textbook lesson in ballad playing. †(Moore). The song ‘Body and Soul’ was originally a Tin Pan Alley hit, and was covered by various artists before Coleman Hawkins. The rhythm section in the song is very understated, and the songs chorus is played twice through while Hawkins improvises (oxford). The nature of Hawks solo is what makes this song a masterpiece. In Body and Soul, Hawkins did not use standard blues riffing, hich collects each part of the solo into even, neat sections. Instead Hawkins toyed with â€Å"Sharp cornered phrases and endless lines that were the jazz equivalent of run on sentences†. Apart from the first 4 bars, Hawkins only rarely alludes to th e melody of the original song. Instead he essentially left his solo entirely free form, which was relatively uncommon at the time in swing music1. â€Å"He danced at the upper extremes of chords, foreshadowing the altered harmonies that later were so important to bebop. But he was hardly academic. His spry, seductive tone gave every phrase an unmistakable passion. 1. Body and Soul was not only a masterpiece, it also hinted at the beginning of a new era in jazz. â€Å"When the record first came out, well, everybody said I was playing the wrong notes. It was funny to me†1. This recording was a step for jazz towards a more free form, atonic, and creative art form called bop. The remarkable thing is that Hawkins made this step while retaining mass appeal. In the 40’s and 50’s bop began to replace swing as the main popular form of jazz, although it took on a distinctively different role as a counterculture art form.Most swing musicians resented this new, edgy jazz, but Hawkins encouraged it to such a large extent that he made an effort to systematically employ and collaborate with all of the up and coming jazz artists. â€Å"Unlike others of his generation, whose attitude towards bop ranged from resentment to hostility to bemused indifference, Hawkins championed the music, earning him a degree of loyalty† 2. Hawkins was a role model to young bebop prodigies such as Kenny Clarke, Oscar Pettiford, Fats Navarro, Max Roach and especially Thelonious Monk, who remained a lifelong friend of Hawkins till his death2.It was not that these new up and coming jazz artists were looking to model their musical style after Hawkins’. Rather, they looked at Hawkins commitment to improvisation and craftsmanship and the extraordinary achievements that he’d made, being a wealthy, self made black musician in mid-century America. A 1946 recording session called ‘Bean and the Boys’; which included Fats Navarro, Milt Jackson and Max Ro ach; paid tribute to Hawkins relationship with his young proteges2. In 1944 Hawkins was involved with what is known as the first bop recording session with Dizzy Gillespie and Don Byas3.Although this classification may be somewhat arbitrary, there is no doubt that Hawkins was hugely important to early bop. His 1948 recording ‘Picasso’, a 3 minute tenor sax solo with no supporting instruments, was a creative step for jazz as the first unaccompanied sax solo recorded3. In this recording Hawkins expanded on many of musical ideas, which he pioneered in ‘Body and Soul’, and by taking out the rhythm section Hawkins is able to play an even more ‘free form’ solo which is not locked into a time signature or rhythmic scheme4.Although Hawkins was not himself part of the bop generation, he certainly was an instigator and a catalyst of the bebop revolution. â€Å"The Peculiar combination of personal traits and musical abilities that marked Hawkins – steely ambition, a strong intellect, and virtuosity – characterized the bebop revolution†1. At the start of the 1950’s, Lester Young had become a much bigger influence on young tenor saxophone players than Coleman Hawkins was. However, Hawkins stuck to his melodic, edgy style of improvising and continued to play with various bands including a quintet with Roy Elridge.Around this time Hawkins image and influence went through a resurgence period, when Sonny Rollins, the up and coming bebop tenor saxophonist, claimed that Hawkins was his main musical influence1. In an interview Rollins said, â€Å"Coleman Hawkins had a more intellectual approach maybe to music. He played a lot of very difficult things. So he became my idol†2. Like Hawkins, Rollins went on to have a long, successful career, which was characterized by many of the same qualities that Hawkins possessed.Listening to Rollins and Hawkins recordings side by side displays the distinct influence that Hawk had on Rollins. Sonny has a distinctive style of swing that takes elements from the 1930’s Harlem sound that Hawkins was a part of and Rollins grew up with3. However, similar to Hawkins, Rollins style did evolve greatly over his career. â€Å"Rollins has a seemingly bottomless reservoir of musical knowledge (ranging from jazz standards and pop, to folk songs and classical music)†3.The most important trait, which was passed on from one tenor sax great to another, was the truly progressive nature of jazz. â€Å"Coleman Hawkins†, Sonny Rollins said recently, â€Å"was of [jazz’s] most prominent ‘Role Models’: The prototypical progressive jazz musician. Coleman Hawkins was the foremost tenor sax player of the 20’s and 30’s, and played with some of the most influential bands and musicians of the swing era1. Fletcher Henderson’s band was likely the most influential group of musicians to affect the 1920’s swing danc e craze, and Hawkins played a prominent role in the orchestra2.In1934 he left America for Europe as the one of the most prominent swing musicians in New York3. He came back 5 years later to find that nothing had changed in the New York jazz scene. He went on to cut his most beautiful and influential record, Body and Soul3. In his later years, when jazz began to change around him he did not resist. He encouraged the change and allowed his own musical style to develop as well4. The one thing that remained true for Coleman Hawkins throughout his career was his commitment to jazz as a malleable and ever-changing entity.At the beginning of his career we see this when he â€Å"rescued the tenor saxophone from the oblivion of the circus†5 and turned it into an art form, and we see it in his later years when he passes on these same ideals to the next generation of jazz. He was ‘the King of the Tenor Saxaphone’, and was an extraordinary influence to the evolution of jazz. ——————————————– [ 1 ]. Moon 2 Deveaux 38 [ 2 ]. Deveaux, 39 2 Deveaux, 38 3 Yanow 4Oxford [ 3 ]. Yanow 2 http://www. achievement. org/autodoc/printmember/rol0int-1 3 Carroll [ 4 ]. Magee 7 2 Chilton 23 3 Moon 4 Deveaux 39 5 Chilton 45