Tuesday, December 24, 2019

Diversity Is The Changing Demographics And Economics Of...

Concept paper By Masereh Jallow Topic: Diversity in Nursing Page 1 Topic: Diversity in Nursing Diversity: The changing demographics and economics of our growing multicultural world, and the long-standing disparities in the health status of people from culturally diverse backgrounds has challenged health care providers and organizations to consider cultural diversity as a priority. Culture is one of the organizing concepts upon which nursing is based and defined. Leininger (2002) defines culture as a set of values, beliefs and traditions that are led by a specific group of people and handed down from generation to generation. Culture is learned shared and transmitted values, life way practices of a particular group that guides thinking, decisions and actions in particular way. The most primary means to transmit culture and preserve it is communication (Berenson LD, 2011) Test book. Culture is not static; it is a dynamic ever-changing process. Cultural values and norms differ from one society to another. In health care settings, cultural awareness, sensitivity, and competence behaviors are necessary because even such concepts as health, illness, suffering, and care mean different things to different people. Knowledge of cultural customs enables health care providers to provide better care and help avoid misunderstandings among staff, residents/patients, and families. Understanding of cultural diversity is vital at allShow MoreRelatedThe Impact Of Diversity On Strategic Marketing1556 Words   |  7 PagesThe impact of diversity in strategic marketing in today’s society has increased in the American population. Before we get in depth with this let’s find out what is diversity marketing according to (diversity marketing) Customers in different cultures have different values, experiences, expectations, and ways of interacting. Even within a culture, such differences will be apparent between different subgroups not just ethnicity, but also age, gender, profession, religio n, family size, physical environmentRead MoreMulticulturalism : The New Reality Of Canada1353 Words   |  6 Pagesspeaking, be part of an expanding multicultural society has impacted Canada economically, demographically and socially. Thus, the presence of the variety of different cultures, languages and heritages, results in the need for the county to adapt and change, based on the new reality of Canada. With Canada’s demographic constantly increasing, significant changes are bound to occur within the economy. In particular, marketers will need to comprehend the changing Canadian identity, resulting in theRead MoreThe Geographic Diversity Of California1403 Words   |  6 Pages Diversity has been at the heart of from the beginning. Not only is it diverse among its people but also its geography. California has the greatest variety of regional landscapes, climate zones, flora, and fauna in all of North America. The geographical diversity of California is deeply tied the geological theories of it scientific origins especially its sculpting through the movement of plate tectonics. California consists of 11 diverse regions with diverse landscapes. Regional diversity was greatlyRead MoreMarketing and Page Ref14698 Words   |  59 PagesNOT a source of secondary data that Nathan might use? The Niketown running club that organizes twice weekly evening runs and follow-up meetings in the Nike Store is an example of which of the following? Legislation affecting business around the world will continue to ________. Currently, Diego Calabresa is employed by a firm that conducts marketing research and creates ads for other companies that target and promote their products to the right markets. Who is Diego s employer? Read MoreThe Number Of English Language Learners1973 Words   |  8 Pagesdouble in the upcoming twenty years. With growing changes in student demographics, one must question if changes should be made to teacher training to better prepare them to step into the classroom. Through this process, students demonstrated that a multicultural classroom environment is beneficial for both students and teachers, and the need for more teacher training programs that promote cultural sensitivity and bilingualism. Benefits of the multicultural training course for future teachers includeRead MoreEssay on Hsu Hua the End of White America1095 Words   |  5 Pagesmusic, sports and culture. Many of his articles have appeared in magazines such as The Village Voice, The Boston Globe, The Atlantic and The New York Times. In his article â€Å"The End of White America?† Hua Hsu attempts to convince the reader that demographic shifts, immigration and the increase of interracial marriages have resulted in the â€Å"beiging† of America. He supports this view by citing Census Bureau data and marketing research used by advertising conglomerates to create ads designed to appealRead MoreMoral Obligation has Taken Over the Civil Rights Movement1901 Words   |  8 PagesA continuation of civil rights movement is no longer important to campus –diversity, simply because of moral obligation or rights. Diversity efforts are important in towards 31st century because they are fundamental to the building blocks to excellence and quality. Diversity is not only black and white it is, race, ethnicity, gender, sexual orientation, ability, nationality, religion and many more combinations that make up a nation. (Williams Wade-Golden, 2008, p. B44). Higher education are attemptingRead MoreA Concept An alysis of Diversity Essay1418 Words   |  6 PagesDiversity has many definitions but only one true meaning. This concept Analysis is dedicated to exploring the broadened sense of diversity through active concepts with respect to term usage, and current literature research to support the understanding and relevance of the term itself. Search Terms: Diversity, Ethnic Variety, and Variation Introduction: Definition The dictionary definitions for the term â€Å"Diversity† are fairly similar in nature. The American Heritage Dictionary describesRead MoreNorms of Apple2130 Words   |  9 PagesDiversity and Cultural Norms of Apple October 7, 2010 Diversity and Cultural of Apple As our society continues to evolve, technology has created an outbreak of shortcuts for humans to make use of each day. As our ancestors has left us with such creations as electricity, the telephone, transportation and much more, geniuses of today’s world has taken society to another level. The technology that we use today allows us to do so much although we areRead MoreMarketing Is A Process By Individuals And Groups Obtain5963 Words   |  24 PagesSo that will make the industry come up with another plan and not just depend on the marketing concept alone and word of mouth. In today’s world marketing has changed tremulously since the early years. Marketing in the 21st century is all about delivering the customer experience (James Allen and Rob Markey). Our future generations that’s going to be part of our marketing, will have more income and less time and more choices. They will have different spending ways and patterns which will depend on

Monday, December 16, 2019

Alcohol in Colonial America Free Essays

The first settlers arrived to the Americas and staked their claim on this new discovery. Something else was waiting for the settlers, a beverage of intoxication. Almost as quickly as they began to organize and sub-divide the land, the immigrants, and true natives to North America shared their beloved drink: alcohol. We will write a custom essay sample on Alcohol in Colonial America or any similar topic only for you Order Now Cultures of varied races arrived and shared in this most cherished drink. There were uses for alcohol in the earliest colonial times that went beyond a beverage to drink in festive gatherings. There are varied beliefs surrounding the conception of alcohol consumption and its effects on British Colonies. Some are true, others are false. I will construct an investigation surrounding the history of alcohol in Colonial America with persuasive evidence to support my findings. Alcohol, also commonly referred to as spirits in Colonial America had many uses. Alcohol, of course, was used in festive times, but it was also used in religious ceremonies as well and providing medicinal properties to aid in curing ailments. The initial impact of alcohol on the settlers led them to accept it for its varied uses. Although moderate use of alcohol was accepted, society, from its inception into the Americas, frowned upon individuals becoming overly intoxicated. In other words, drunkenness was viewed negatively. Since alcohol was considered a â€Å"gift from the gods† to the natives, the settlers, too, accepted its mind-altering properties as something almost sacred. The growing communities treasured it, just as the natives did. Time and abuse were two components that led to problems for alcohol consumption. Due to its success in the minds of settlers, they partook in alcohol consumption for all three meals of the day: beer with breakfast, hard cider with lunch, beer with supper. In fact, beer and hard cider were the most popular drinks for colonists. As the drinking continued, they wanted to learn how to brew beer. One of the initial problems—aside from increasing abuse of alcoholic drunkenness—was the lack of sufficient ingredients. Barley, grains, hops, and yeast were the main ingredients in a brewing beer. The colonies did not have an ample selection of hops and grains. Harvesting of barley and hops was not a common crop among farmers of this era. Many colonists tried different ingredients, but nothing satisfied the perfect blend of hops, barley, yeast, and grain. By the late 1600’s, cider became a top choice among colonists, mainly due the apple crops that were prevalent in colonial times. Mass production through efficient farming and harvesting by colonists was seen. Thanks again to England for the apples. Farmers increased their work load mainly due to the reward of the final product: cider matured into hard cider (which included alcohol). With the increasing popularity of beer and cider, the settlers discovered a need to increase their selection. The settlers started to import inexpensive yields of sugar cane and molasses to brew another popular drink: rum. Rum quickly gained in popularity for the following reasons: it was cheap to produce and tasted good. By 1700, in Boston, the first commercial distillery was opened. The increase in rum consumption was the first challenge to the beer market. Religion and alcohol found a common link. In fact, many taverns were required to be built near churches or the local town meeting house. The religious zealots accepted alcohol consumption—strictly in moderation, though. Drunkenness, of course, was viewed as sinful. Alcohol soon became a problem in the eyes of the church and laws were established surrounding alcohol. In 1697, in New York, they enacted a law that required all taverns to be closed on Sunday. They required that the Sabbath be set aside as a day solely for reconciliation with the Lord and prayer. In conjunction with the closure of taverns on Sundays, the church required further regulations against alcohol consumption on Saturday nights as well. The main concern for the church was that taverns were gaining more popularity than the Sunday services. The Reverend Charles Woodmason went one step further and cautioned parishioners with the thought that there was a competition between the church and tavern for souls. Reverend Charles was quoted was saying the following, the taverns had â€Å"more company of a Saturday, than in the church on Sunday. † As colonists went into the early part of the 19th century, religion encouraged moderation in any and all alcoholic drinks. Alcohol, aside from the churches persistent concern over drunkenness and a loss of parishioner appeal, had other uses. Alcohol was also widely used in the field of medicine. Many doctors and medical practitioners believed that some of the stronger spirits could prevent disease, cure some common infections, and offer relief to minor aches and pains such as headaches, sore joints and muscles. In these instances, doctors would prescribe rum, hard cider, or whiskey. Doctors also encouraged patients to increase alcohol consumption to relieve emotional or stressful problems in their daily life. In fact, doctors went so far as to prescribe families to drink alcohol in lie of water. They thought that water brought from Europe was contaminated, and, thus, could lead to serious illness. Alcohol consumption was also prescribed to children suffering from viral infections as well as aiding in their development into a stronger, more physically fit individual. A little whiskey and honey went a long way for a sick child. The unusual, or even outlandish, practices went further still: doctors prescribed hard liquor to women who were in labor, a means of numbing some of the intense pain suffered during labor. Midwives would brew what was coined â€Å"groaning ale. This groaning ale contained extremely high contents of alcohol and special spices, all in hopes of easing the child bearing pains. A variation to groaning ale was used by some doctors. This was a little less toxin on the mother and baby. Doctors concocted spirits that were used as an anesthetic. This anesthetic was less expensive and more readily available from household to household than the hard spirits used i n the groaning ale. Alcohol, as with many new products brought to civilized society, began as an innocent and purely beneficial product. Beyond the stress-reducing capacity for hard cider or beer, the early nutritionists thought alcohol had great nutritional value and needed to be added to a person’s health-conscious daily diet regime. Due to this initial nutritious appeal, politicians did not, initially, write legislation limiting alcohol consumption. It was not until 1619, in the state of Virginia, that the first law was passed to control alcohol use. Policy maker main objective was to restrict â€Å"drunkenness,† not prohibit the use of alcohol. This first law enacted a penalty against drunkenness which stated that if you were arrested for being drunk and disorderly, then the fine would be up to 5 shillings or imprisonment. In time, however, politician modified the law to only include a monetary infraction. The reasoning behind this law was because the lower-classes tended to be the ones caught in public, and politicians felt a fine would be viewed as more distressing to the lower-class and curtail drunkenness. The next state to enact legislation surrounding alcohol consumption was Maryland. In Maryland, in 1639, they attempted to limit the amount a person drank. According to law, it was illegal to be drunk in public: â€Å"drunkenness† was defined as â€Å"drinking with excess to the notable perturbation of any organ or sense of motion. † The penalty was the same as in Virginia: 5 shillings. In 1645, Massachusetts jumped on the alcohol bandwagon, passing a law that restricted the amount an individual could consume at any period of time. The law stated the following, â€Å"The courts consider it illegal to drink more than a pint of wine at a time. † Anything over a pint constituted inebriation. On top of this, Massachusetts instituted another statute for ale houses and tavern owners. This statute made it illegal for owners to serve a customer beyond the legal limit, a difficult law to follow. With this statute, however, both the proprietor and customer could be fined for disobeying this law (Austin, Gregory p. 230). The Plymouth colonies chose a different slant in enacting their alcohol legislation. Unlike the Virginian definition for â€Å"drunkenness,† in the Plymouth colony the focus was on motor skills. Plymouth went so far as to define the term which constituted a universal view—throughout almost every colony—that alcohol is not healthy, nor should it be considered beneficial to a person’s health. The Plymouth definition was as follows: they viewed being drunk—not by loss of mobility or amount consumed—but instead by the person’s ability speak clearly: â€Å"A person that lisps or faulters in his speech by reason of drink, or that vomits, or cannot follow his calling. † (Austin, Gregory, p. 240) When we look at gender, women were not considered part of the drinking culture. Most often, women drank in private (Salinger, Sharon p 223). According to historical record, women rarely drank in public in colonial times. It was viewed as unacceptable for a woman. Policy makers enacted different conditions and consequences for each gender. Women were rarely seen in bars and taverns in this period. The brewing of beer, up until the late 1700’s, was an art left for the women to complete. Men would be off at work during the day and women kept the house in order, which included beer and liquor. Home-brewing was very common. In fact, most households that drank brewed their own ale. The Spaniards arrived in the 1700’s and brought wine to the colonies. At the time, vineyards were unheard of; thus, without grapes they could not cultivate, ferment, and produce wine in the colonies. It was brought over on ship. The French soon followed and were able to cultivate the grapes on colony soil. Wine consumption gained in popularity, yet the hard cider was still the preferred drink among the middle class. Germans, too, became part of the alcohol dynamic. The Germans brought better techniques to brewing fine ales and were the first to bring ‘lagers’ to the Americas. All of these countries brought new ideas and new brewing methods to the colonies. In conclusion, it is apparent that the initial discovery of alcohol for the colonies was viewed as a sacred drink. The colonists took the vision of the natives and brought it into their lives as a daily staple. The harms and potential for dangerous situations soon became rampant with all the drunken colonists. Laws were passed and changes were made in various colonies in hopes of curtailing the problems associated with drunken behavior. Even the churches got involved. As new cultures landed from various countries, they discovered new varieties on crafting a very popular beverage. Regardless of all the dangers associated with alcohol consumption, I believe it’s going to continue to be a drink enjoyed throughout the world. How to cite Alcohol in Colonial America, Papers

Sunday, December 8, 2019

Trade Fairs and exhibitions and their economic impact on companies and countries free essay sample

marketing event. They are organized so that companies in a specific industry can showcase and demonstrate their latest products, service, study activities of rivals and examine recent market trends and opportunities. In contrast to consumer fairs, only some trade fairs are open to the public, while others can only be attended by company representatives (members of the trade, e.g. professionals) and members of the press, therefore trade shows are classified as either Public or Trade Only. A few fairs are hybrids of the two; one example is the Frankfurt Book Fair, which is trade-only for its first three days and open to the general public on its final two days. They are held on a continuing basis in virtually all markets and normally attract companies from around the globe. Trade shows and events have a detailed history of bringing together traders and customers, both B2B and B2C, under a single roof. At the worst point of the economic downturn a high number of businesses chose to withdraw from exhibiting at shows internationally. As a result of most companies getting out of the perils of the recession the attractiveness of exhibitions is beginning to increase again too. It presents companies with the opportunity to generate brand awareness to potential customers that they might not be able to reach using other promotional methods. Impact on companies Exhibitions as marketing tools Trade shows tend to be a celebration of success with successful companies exhibiting and successful companies visiting. Throughout the ages, trade fairs have been recognized as one of the most efficient and powerful tools for effectively doing business. They are a major portion of the marketing mix in the industrial marketplace. As a face-to-face meeting point, fairs and exhibitions are basically a target opportunity for achieving your trade objectives. They are a cost-effective means to reach your market audience in one time and in one place. There are not many other promotional methods that have the versatility to potentially appeal to all five senses. Key advantages of participating in a trade show Customer contact: Trade shows provide excellent venues for initiating contacts with new customers and developing new trade leads. Equally important they enable you to maintain and renew contacts with valued clients. An exclusive and favourable marketing tool as customer grievances or enquiries can be dealt with in person whilst providing businesses the chance to receive valuable criticism from previous and present customers. Product and service launch platforms: Live presentations and Demonstrations of your products and services speak for themselves, accelerating the selling process and generating new sales. introduction of new products to a large number of people. Depending on your type of business, product and market testing can be carried out at trade shows and exhibitions to gain industry or general opinion about your offering Marketing communications: Trade fairs focus media attention on your Company and products. Public relations efforts can be focused to raise the profile of your company image and brands. Exhibitions are open to a large and sometimes diverse range of audiences (usually the general public). This provides you with a perfect platform to promote your product or service to a broader group that may have little or no knowledge of your products and services. Improves corporate image, creates brand awareness Enhances goodwill, Exposes promising customers, Gains company publicity A high return/expense ratio: Trade shows are known to have a high return/expense ratio. An EEAA (Exhibition Association of Australia) survey showed that an average expenditure of 9% of companies marketing budgets in trade far events resulted in a return of 23% of business. Gathers competitor information: offers management the opportunity to walk around the exhibition themselves and inspect what the competition is doing and offer ideas on how they can improve what they are offering. Enable participants to stay on top of the latest industry trends, obtain competitor insights, as well as get new information of different fields. Being involved in a trade show or exhibition can provide you with opportunities to branch out to business-to-business trading Major exhibitions are global ‘meetings places’ providing a highly cost efficient environment in which very senior management can meet with other senior management to discuss partnerships and  joint ventures, to maintain and deepen business relationships and to identify new business opportunities. Disadvantages and risks of trade shows Confusing environment found in large shows Excessive frequency of trade shows High and rising costs of participation – travelling to the trade shows, displaying Trade shows require at least a day and probably more of your time. There will probably be quite a bit of competition at all shows. Choosing the wrong trade show to exhibit your businesss products or services can result in displaying to the wrong audience. Poor promotion can mean the costs of attending the trade show outweigh any revenue you gain. Impact on countries Trade and consumer shows enhance a city’s position in the marketplace Brings multiple economic benefits and job opportunities to local communities and cities. Trade shows not only directly generate business, jobs and government revenues, but also indirectly bring other multiple values both locally and nationally such as education and entertainment Connects individuals with feature product or service launches Problem-solving, education and networking opportunities Exhibitions make a significant contribution to many business sectors around the world. The more global a business sector the more important the role of trade shows in introducing vendors to buyers and ensuring that industry players maintain contact with industry developments Direct Benefits Direct revenue sources from trade and consumer shows include administration costs, hall or booth rental, employment spending, shipping costs, as well as spending on hotels and lodging, local attractions, entertainment, and restaurants. In order to set a trade or consumer show, a show producer or organizer has to conceptualize and develop the show, advertise and promote the show as well as to sell the show. They have to move in, set up, execute the show, move out, and do follow up. Behind the show, general contractors work with decorating, pope and drape set up, booth set up, carpet rental,  furniture rental, signage and graphics, on-site coordination of the show, advance planning for the show, cleaning, as well as drayage and material handling. In addition, specialty contractors who work with these shows include florists, catering, photography, transportation, telephone/internet/fax, booth personnel, AV rentals, security, electrical, plumbing/air/water, exhibit design and construction and publicity. These services directly create a great amount of revenues for local businesses and tax revenues. Trade and consumer shows also provide opportunities for tourism operators to promote their businesses directly to the tourism industry and purchasing consumer. Through trade and consumer shows, a city has a strong presence among brand retailers, tourist boards, business operators, and resort exhibitors who come to the city to interact directly with local citizens as well as tourists. Indirect Benefits Enhancing local brand recognition, increasing number of visitors, educate people, increase investment from people worldwide, promote a city, and other potential benefits. The Future of Trade Shows For thousands of years, men and women have gathered together in marketplaces to see, touch, smell and taste products, to shop, commune with their peers, catch up on the latest news/gossip, network, transact business and otherwise enjoy being together. While the marketplaces and products have varied over time and place, human beings still desire the opportunity to experience the marketplace firsthand all of this, in spite of the rise of online commerce, globalization, the Internet, mobile, telepresence and social networking technologies. Many predicted the demise of trade shows in the late 90s as the Dot.com era exploded. However, as weve clearly seen, trade shows as modern day face-to-face marketplaces have not fallen prey to the Internet; rather, I believe, they are more valued than ever. We are analog human beings in a digitized world. We crave physical stimuli and social interaction. Why do the masses still flock to the shopping malls every holiday when they can shop online from the comfort of their homes? Conclusion Trade shows have both pros and cons but I personally look into its advantages as it offers an opportunity to showcase its products in one location, and also it can create awareness in new prospects, reinforce existing customer relationships, provide product demonstrations for evaluation, and allow sales of products on the spot.

Saturday, November 30, 2019

The Future Of Aviation Insurance Essays - Types Of Insurance

The Future Of Aviation Insurance Insurance and the Future of Aviation AVM 401 Analysis of Issues in the Aviation Industry Southern Illinois University, Carbondale September 26, 2000 Assignment #2 Introduction This report will discuss the future of the aviation industry and the effects of high insurance cost. As the industry enters into the millennium, the insurance industry must look at several problems that also face the aviation industry. Survival for the small FBO's is getting harder each day; the threat of financial devastation is real when it comes to lawsuits. General aviation may be forced to change its way of doing business and become more like the military and commercial airlines. One can only hope that society will change their attitude towards the aviation industry and the litigation that surrounds the industry. We all hope for a positive future for the community. Insurance and the Future of Aviation The aviation industry, as it is known today, has grown into a set of definable industries. Modern aircraft range from military to commercial airlines to the most diverse group, general aviation. Aviation has come a long way the last 100 years. The industry is still developing, with growth comes problems that must be solved before the industry can go to the next level. As the industry enters into the millennium, the insurance industry must look at several problems that face the aviation industry. Legal concerns, in many cases, they're influenced by our society. The court system plays a big part by their decisions that are passed down. It's rare when an aviation case goes to court, because insurance agencies know they'll lose when the jury hears the case. It's just too easy to prove pilot negligence; most aviation accidents result from pilot error. Also, when they do go to court, they very seldom mount a defense due to the unreasonable verdicts, and ridiculous awards. These practices has forced aircraft owners to stay away from new policies and let their insurance coverage lapse. Aircraft owners pay three to five times the amount for adequate liability coverage than their counter parts else where in the world. Survival for the small business operators is getting harder each day due to the General Aviation Revitalization Act (GARA); the threat of financial devastation is real when it comes to lawsuits. The (GARA) defects lawsuits from manufacturers to aviation service providers. FBOs' insurance rate are skyrocketing because of this, which contributes to the cycle by causing higher repair cost. Many small business operators really don't want to take the chance and can't afford the rising cost that's associated with liability insurance. ?As of February 2000 at least three aviation insurance under writers ceased writing coverage for the small business operators, saying it's a major risk? (Chappell, T. 2000, p.2). One of the main reasons is the cost to the underwriters. Aviation insurance companies have paid out a dollar and quarter for ever dollar they've taking in, for each of the last several years. No wonder so many are closing down, merging, or getting out of the historically riskier aviation activities (Chappell, T. 2000, P.2). General aviation may be forced to change its way of doing business and become more like the military and commercial airlines. Maintenance problems may be identified by computers, and then repaired by the manufacturers. The industry is coping with the mounting cost associated with liability insurance. ?Remove and replace maintenance? is the attitude the industry must lean towards. The manufacturers would set up new factory service centers and repair facilities for the general aviation customers. This system wouldn't help the rising cost of insurance, but maintenance and ground liabilities would rest on the shoulders of the manufacture. The market itself is shrinking, we've had a generation of pilots from WWII, Korea, and Vietnam that was introduced to aviation and trained at the government's expense. Because of modern technology, we'll never again have the numbers that we once had. The aging fleet and pilots can't help the situation that the industry is facing; the average aircraft age is 15 to 20 years, and the post Vietnam pilot is now 50 to 60 years of age. The underwriters are very worried about the age of both the pilots and the aircraft. During a telephone interview with Darrel Hyde

Tuesday, November 26, 2019

The Basics of Internet Business essay

The Basics of Internet Business essay The Basics of Internet Business essay The Basics of Internet Business essayIn modern e-commerce environment, the use of different online payment systems is quite common. However, there are both advantages and disadvantages of such payment systems. It is possible to identify the following reasons why Bonnie should offer additional online payment options to her online customers:Many customers are used to online payments using the most widespread payment processing systems Amazon Checkout, Google Checkout or PayPal. PayPal is one of the most trusted payment providers and PayPal payments are accepted worldwide. The customers who frequently use these systems will be more likely to purchase goods in Bonnies online store due to convenience.The charges for transactions in such online payment systems are significantly lower compared to the charges that Bonnie currently pays to CSP (Schneider, 2014), so her goods will be more competitive and Bonnie will receive higher profits.Payment processing in key online payment processing sy stems is often seamless and it is easy to see whether the payment was processed or not. Therefore, Bonnie can process payments faster and ship goods faster.At the same time, there are reasons why Bonnie should not use such online payment processing services:Bonnie will have additional responsibility she will have to managing client questions and requests related to these payment services, and will have to resolve customer disputes in these processing systems if there emerge such complaints.There are potential security issues related to establishing the connection between Bonnies website and external payment processing systems. Bonnie might have to introduce additional security measures; in particular, she should warn her clients about spoofing and general security measures related to online payments (Meng, 2012).Terms of contract with external payment service providers might require using the system for a particular time (or using at least a specified number of transactions), so if Bonnie decides to stop using a particular system, she might be unable to do it before the contract expires.

Friday, November 22, 2019

Cold Weather Reduces Hybrid Fuel Mileage

Cold Weather Reduces Hybrid Fuel Mileage It’s not just the frozen toes and icy temps that can get ya down at this time of the year. It’s filling up at the pump too. Yet even if you drive a hybrid- and love its feel good fuel mileage, they also take a hit in fuel economy when the mercury dips. Why does hybrid fuel economy drop in winter weather? Well, not only do hybrids suffer many of the same cold weather fuel economy losses of a conventional vehicle, but the hybrid electrical systems lose efficiency toowhich equates to a drop in mileage. Hybrid System Temperature – Just like the vehicles internal combustion engine, its hybrid system components (especially the battery) work best when they are warm. The onboard hybrid battery depends upon a chemical reaction to both release energy to the electric drive motor and accept charge during regenerative braking. This reaction is severely hampered when the battery is cold, so the engine runs longer and more frequently to make up the deficit while the battery warms up. Passenger Compartment Heat - Hybrids, just like conventional cars, rely on hot engine coolant circulating through the heater core (heat exchanger) to keep the cabin warm. Obviously, the engine needs to run more frequently to keep up with heater demand. The higher the heater setting, the longer the engine runs. Heavy Defroster Use - Running the defroster can also pull down the mileage. When the defroster is on, not only is it dispensing heat from the heater core, but it also runs the AC compressor to remove moisture from the air. Though its good for the compressor to run periodic cycles in the colder weather (to preserve the integrity of the internal seals), excessive use does reduce fuel economy. In most hybrids, the compressor is run by its own electric motor instead of a belt from the engine, but this doesnt allow the compressor to run penalty-free. That extra electric discharge will require more frequent recharging of the hybrid battery. Running the compressor does hurt fuel mileage. The following two points hybrids share with conventional vehicles: Unburned Fuel – Gasoline just doesn’t atomize and burn as well in a cold engine- tiny droplets of unburned fuel remaining in the cylinder are evacuated with the exhaust. That unburned fuel tallies up to a loss in power- using more fuel to go the same distance- not to mention, substantially increasing the your engines emissions. Tire Pressure Drops – It’s just a law of physics. Colder temperatures cause the pressure in those tires to drop, about 1 to 2 psi for every 10 degrees in temperature drop. Low tire pressure creates extra rolling resistance and friction, and hence, lost fuel economy. How to Improve Hybrid Fuel Mileage Watch that Thermostat - Just as youd turn down the heat in your house to save fuel, set the vehicles heater to the lowest comfortable level.Heat the Seats - If your hybrid has them, take advantage of the electrically-heated seats. The heat from the seats keeps you comfy and reduces the need to heat the whole cabin.Beat the Defroster Penalty - Setting the heater in defrost mode is the easiest way to quickly clear heavily frosted windows (especially the windshield). However, once the cabin is warm and the windows are clear, turn the defroster offin most cases, cabin heat will keep the windows fairly frost-free. Turn on the defroster and cycle only as needed.Garage It – If it’s available, use it. Even if it entails giving that extra junk to the local thrift shop first, parking your vehicle in a garage will keep it warmerand that means a shorter warm-up to reach optimum operating temperature.Get Your Act Together – Yes, organizing and pre-planning your errands will m aximize your time and fuel, since a warmed up car utilizes fuel more efficiently- in addition to making the most of your time as well. Ease Up With the Lead Foot – With black ice and slushy roadways a wintertime reality, not only is it safer to go easier on the accelerator, it’s a smart (and easy) way to save fuel.Check That Tire Pressure - Keep those tires inflated at (or even a bit above) the recommended range. Many manufacturers recommendations for tire pressure are suited for ride comfort while forsaking fuel economy. We usually run our tires several pounds higher for an extra bit of economy.

Thursday, November 21, 2019

Formal report and work plan Assignment Example | Topics and Well Written Essays - 1250 words

Formal report and work plan - Assignment Example Miller, F.W., Alfredsson, L., Kostenbader, K.H., Kamen, D.L., Nelson, L.M., Norris, J.M., and De Roos, A.J. (2012) Epidemiology of environmental exposures and human autoimmune diseases: Findings from a National Institute of Environmental Health Sciences expert panel workshop, Journal of Autoimmunity, 39 (4), 259-271. McMichael, A.J., Neira, M., Bertollini, R., Campbell-Lendrum, D., and Hales, H. (2009) Climate change: A time of need and opportunity for the health sector, Lancet, Retrieved from http://wwwlive.who.int/globalchange/news/our_lancet_viewpoint.pdf Pleil, J.D. (2008) Role of exhaled breath biomarkers in environmental health science, Journal of Toxicology and Environmental Health Science, Part B, 11: 613-629. 5. Information to be provided to Consultants: Definition of career Environmental health science has been defined as â€Å"the study of the linkage from environmental pollution sources to eventual adverse health outcomes† (Pleil, 2008, p.613). ... duties of an environmental health professional include, apart from diagnosing and treating environmental health problems, â€Å"promoting public understanding, monitoring and reporting the health effects of environmental change, and proposing and advocating local adaptive responses† (McMichael, Friel, Nyong, and Corvalan, 2008, p.193). Personality types Professionals with social and environmental awareness and commitment are good for this profession (McMichael, Friel, Nyong, and Corvalan, 2008, p.193). Placement opportunities The major opportunities in this sector have been evolving from the adverse impacts of climate and other environmental changes (McMichael, Neira, Bertollini, Campbell-Lendrum and Hales, 2009, p.1). Health inequalities caused by environmental pollution are on the rise and â€Å"health professionals have a vital contributory role in preventing and reducing the health effects of global environmental change† (McMichael, Friel, Nyong, and Corvalan, 2008, p.191). Hence this career field presents placement opportunities in almost all industries and institutions. 6. Additional Resources a) The website, www.environcorp.com b) The government website, www.dhhs.ne.gov.com c) The Registered Environmental Health Specialist Program of the government in California. d) National Environmental Health Association and their website, www.neha.org e) Environmental Health Services Program f) Environmental health specialist registration norms of different state governments g) Chartered Institute of Environmental Health, UK 7. Graphics An instance of environmental health assessment: Environmental Health Specialist job trends: Alcoa-Kofem Environmental, Health and Safety Strategy: A graphical model Cover Page A Guide to Career of Environmental Health Specialist Prepared for:

Tuesday, November 19, 2019

Self Control Theory of Crime Essay Example | Topics and Well Written Essays - 1500 words

Self Control Theory of Crime - Essay Example According to Hirschi (1969), processes of socialization result in the development of self control which causes us to avert from criminal behavior. Criminal behavior occurs when moral codes and shared norms are not internalized and when individuals are not incorporated into a community (Nye, 1958, p. 4). Social control theory derives from Hobbes’ social contract theory, which claims that our desire to belong to society causes us to sacrifice the freedom to act as we please in order to promote our co-existence. We do not act in a way that damages the freedom of those around us, and in doing so we become â€Å"contented with so much liberty against other men as he would allow other men against himself" (Hobbes, 1985, p. 1651). Indeed, self control theory claims that a society’s norms must be ‘concrete’ enough to be effective and to prevent criminal behavior (Reiss, 1994). Garland views social control theory as â€Å"†¦a functioning system†¦which is also dependent on other forms and other social relations† (1993, p. 283). Social control thus adds a two-faceted dimension to the concept of criminal behavior. For example, it is a valid element of knowledge that criminal behavior if detected will attract sanctions. ... l norm which recognize â€Å"the competence of inner-city communities to control law enforcement† (Waldeck, 1999, p.2; Wilson and Kelling, 1982, pp.29-31). Conflict Theory Conflict theory mainly derives from Marx’s claim that crime is inevitable in societies which are capitalist. This is because such societies cause some groups to become segregated and less equal than others. Members of such groups may thus turn to criminal behavior in order to establish material equality with other groups. Conflict theory is based on the core notion that social contracts do not exist between citizens and the state, and because societies continually change, this causes social conflicts to arise. Citizens from different social classes, with different interests are a part of society, but their interests often do not correspond (Sellin, 1983). On the contrary, the lack of common interests between individuals and classes causes conflict (Vold, 1958). A society is collective in that the acti ons of its individual members cause it to progress – it is essentially limited to the actions of its individuals. Depending on which group or class has access to the coercion of the law, inequality may arise and cause those who are less equal to be oppressed. This inequality causes the conflict which in turn causes individuals to commit crime in an attempt to re establish equality. Reiman describes the conflict theory as â€Å"The Rich Get Richer and the Poor Get Prison† (2000); he portrays crime as the result of a struggle between crime and formal laws which govern when it occurs and how it is to be punished. Rather than being a collective social concept, crime is defined by elite groups which prohibit behavior which has the potential to damage their interests. Crimes such as theft and trespass are

Saturday, November 16, 2019

Young People and the Vote Essay Example for Free

Young People and the Vote Essay Since the end of the Watergate Era in the mid-1970s, voter participation among those ages 18-30 had been on the decline. (To Be Young and Voting, 2008) However, in the past fifteen years, a reversal of that trend appears to be occurring. Beginning in the Clinton Era, youth participation in the political process has been on the rise. (To Be Young and Voting, 2008) Several reasons have been put forth for the rise in youth participation in the voting process. Of the various reasons purported, the one that makes the most sense is an increased dissatisfaction about the status-quo among younger people. (To Be Young and Voting, 2008) That is, in more recent years, there is a perception among young people that the country is going in the wrong direction. Evidence indicates a dramatic increase in the interest level of people under the age of thirty in the presidential elections. (Shaw, 2008) Part of the reason behind this is simple. The candidates themselves have been younger. 1992 found the first baby-boomer candidate for a major party, who was only in his 50s at the time of his election. In 2008, Barak Obama is even younger, at 47. Both of these candidates have made concerted efforts to reach the younger demographic. Clinton in 1992 played the saxophone on MTV as part of a get-out-the-vote campaign. Obama has been making similar efforts by appearing on popular TV entertainment shows, such as Letterman, The Daily Show and others. His opponent, John McCain, also appears quite often on these shows, which indicates that both parties recognize the potential voting strength of the younger demographic. Both campaigns have attempted to use the Internet to attract younger voters. (Nagourney Thee, 2008 The first significant organization effort in history on the internet was initiated by the Obama campaign. (Nagourney Thee, 2008Both candidates make use of websites, e-mail, and viral posting more now than in any time in history. It has been suggested that the candidates’ use of sharing sites such as You-Tube, and social networking sites such as Face Book and My Space have proven to be instrumental in garnering interest among younger voters. In addition to events and activities aimed at younger voters, the major candidates have embraced themes that resonate with the younger demographic. .(The Youth Vote, 2008) Both major candidates have embraced â€Å"Change† as a central theme. This coincides with a consistent trend among young voters, who tend to support a difference in the status-quo. .(The Youth Vote, 2008) As with most Americans, younger voters have expressed dissatisfaction with the direction of the country, with nearly half of respondents to a recent poll indicating that the nation was a better place to live in the 1990s than it is now. The popularity of both the sitting President, and the current Congress are at historical lows. .(The Youth Vote, 2008) Troubles with the economy, gas prices, and dissatisfaction with the war in Iraq have fed the notion of the need for change. (Shaw, 2008) The â€Å"change† theme seems to coincide with some of the more divisive issues in both traditional and modern partisan politics. .(The Youth Vote, 2008) According to polls, younger people are trending to the Democratic Party, indicating that the Democrats are doing a superior job convincing young people that they are the party of change. (Nagourney Thee, 2008)An increasing number of young people are socially liberal, with liberal viewpoints on gay marriage, immigration and government programs. (Dionne, 2008) Combined with the perception that the current administration has been doing a poor job on fundamentals such as the economy, the wars in Iraq and Afghanistan, younger people are beginning to flock to the Democratic Party in large numbers. (Dionne, 2008) The character of the various candidates in this election has also sparked interest among younger voters. At various times since the primary season, the major parties have offered: The first viable African American, a female who is the spouse of a former president, a Mormon, and a Former POW. All of these are firsts in major elections in the United States. The â€Å"Final Four† has generated quite a bit of youth interest, as well. Sen. McCain’s choice of running mate, Alaskan governor Sarah Palin, was the focus very recently of much attention owing to her youth, style of speaking, and the ability of a very popular actress, Tina Fey, to do a spot-on impression of her. A popular former cast-member of Saturday Night Live, Fey has injected a large political element into a variety show that has long appealed to younger viewers. There has been a marked contrast between the two presidential candidates with respect to age. John McCain, at 72 years of age, is the oldest candidate ever to run for president on a major party ticket, while Barak Obama is among the youngest at 47. The Democrats have made a considerable effort to portray Sen. McCain as out of touch, noting, among other things, his admitted inability to use the internet. (Nagourney Thee, 2008 Overall, youth participation in the political process in this election cycle has increased for numerous reasons. The primary underlying reason for this increase is a pervasive dissatisfaction with the direction of the country politically, socially, and economically. This, combined with a concentrated effort by both parties to mobilize younger voters, use of internet, and the age contrast of the candidates have combined to produce what may be the largest turnout of voters 18-30 since the voting age was lowered in 1972. References Dionne, E. J. (2008) â€Å"The Year the Youth Vote Arrives†. The Washington Post. July 25th, 2008. Nagourney, A. Thee, M (2007) â€Å"Young Americans are leaning Left, New Poll Finds†. The New York Times. June 27th, 2007. Shaw, M. (2008) â€Å"Talking Politics. † The Wilson Daily Times. Feb 9th, 2008 â€Å"The Youth Vote† (2008) The Washington Times. June 4th, 2008. â€Å"To Be Young and Voting† (2008) The Christian Science Monitor. May 5th, 2008.

Thursday, November 14, 2019

The cultural relevance of the Bic Maxi lighter :: Culture Cultural Lighters Essays

The cultural relevance of the Bic Maxi lighter According to William J. Thomson, the natives of Easter Island’s â€Å"method of obtaining ï ¬ re requires considerable preparation of material and patience on the part of the operator. A pointed stick of hard wood is rubbed against a piece of dry paper-mulberry until a groove, is formed, which ï ¬ nally becomes hot from the friction and ignites the lint or ï ¬ ber thrown up at the end of the groove. This is blown into a ï ¬â€šame, and dried grass added to it until the ï ¬ re is sufï ¬ ciently established.†1 Society is still dependent on ï ¬ re today. If not for bare survival, ï ¬ re is used for some simple enjoyments of life: candle lights, barbecues, ï ¬ replaces, etc. But contemporary methods of obtaining ï ¬ re often simply require a ï ¬â€šick of the thumb. The portable disposable cigarette lighter is a very ubiquitous tool used by many of us who require a ï ¬â€šame once in a while. This paper will discuss the Bic Maxi lighter (ï ¬ g. 1 soon) a nd its relationship with some of western culture’s contemporary issues, mainly: branding, individual responsibility, the mainstream and ecology. It will illustrate the Maxi’s cultural relevance by presenting the implications of its belonging to the Bic brand, some background issues related to the Child-Guard mechanism, its popularity and omnipresence, and its impact on the environment. Will follow a discussion of the eminent disappearance of the Maxi as a product dependent on a socially deviant behavior. It is branded Although they are regarded by many as threatening to our health, destructive to our environment and corrupting our children, brands are an important part of the postindustrial commercial life.2 Many recent books have been chanting an anti-brand rhyme: Eric Schlosser’s Fast Food Nation (2001), Franà §ois Dufour and Josà © Bovà ©Ã¢â‚¬â„¢s The World is Not for Sale (2001), and most importantly, Naomi Klein’s No Logo: Taking Aim at the Brand Bullies (2000). But still, brands are everywhere: â€Å"products, people, countries and companies are all racing to turn themselves into brands — to make their image more likeable [sic] and understandable.†3 Madonna, Canada, Starbucks, Martha Stewart, The European Union, Microsoft are all selling the greatness of being alive, surrounded by their music, culture, coffee, craft, money, software, etc. Historically, brands were â€Å"a form not of exploitation, but of consumer protection. In pre-industrial days, people knew exactly what went into their meat pies and which butchers were trustworthy; once they moved to cities, they no longer did.

Monday, November 11, 2019

Ici Pakistan

Title: ICI Pakistan Ltd. (ICI) – Financial and Strategic SWOT Analysis Review Price: $125. 00 Provider: GlobalData Date: 04 Jan 2013 Pages: 34 Type: AcrobatPDF Companies referenced: ICI. KA Available for Immediate Download Summary: ICI Pakistan Ltd. (ICI) – Financial and Strategic SWOT Analysis Review Summary ICI Pakistan Limited (ICI) manufactures and markets industrial and consumer products. The company’s products include polyester fibres, soda ash, petrochemicals, adhesives, acrylic plastics, explosives, water treatment additives, canola, corn seed, sunflower, fodder, vaccines, antibiotic, antiprotozoals and anthelmintics.ICI’s products find applications in various markets such as textiles, decorative, refinish, automotive and industrial. This comprehensive SWOT profile of ICI Pakistan Ltd. provides you an in-depth strategic SWOT analysis of the company's businesses and operations. The profile has been compiled by GlobalData to bring to you a clear and an unbiased view of the company's key strengths and weaknesses and the potential opportunities and threats. The profile helps you formulate strategies that augment your business by enabling you to understand your partners, customers and competitors better.The profile contains critical company information including: – Business description – A detailed description of the company's operations and business divisions. – Corporate strategy – Analyst's summarization of the company's business strategy. – SWOT Analysis – A detailed analysis of the company's strengths, weakness, opportunities and threats. – Company history – Progression of key events associated with the company. – Major products and services – A list of major products, services and brands of the company. – Key competitors – A list of key competitors to the company. – Key employees – A list of the key executives of the company. Ex ecutive biographies – A brief summary of the executives' employment history. – Key operational heads – A list of personnel heading key departments/functions. – Important locations and subsidiaries – A list and contact details of key locations and subsidiaries of the company. – Detailed financial ratios for the past five years – The latest financial ratios derived from the annual financial statements published by the company with 5 years history. – Interim ratios for the last five interim periods – The latest financial ratios derived from the quarterly/semi-annual financial statements published by the company for 5 interims history.Note: Some sections may be missing if data is unavailable for the company. Key benefits of buying this profile include: You get detailed information about the company and its operations to identify potential customers and suppliers. – The profile analyzes the company's business structure , operations, major products and services, prospects, locations and subsidiaries, key executives and their biographies and key competitors. Understand and respond to your competitors' business structure and strategies, and capitalize on their weaknesses. Stay up to date on the major developments affecting the company. The company's core strengths and weaknesses and areas of development or decline are analyzed and presented in the profile objectively. Recent developments in the company covered in the profile help you track important events. Equip yourself with information that enables you to sharpen your strategies and transform your operations profitably. – Opportunities that the company can explore and exploit are sized up and its growth potential assessed in the profile. Competitive and/or technological threats are highlighted. Scout for potential investments and acquisition targets, with detailed ins†¦

Saturday, November 9, 2019

Crime Does Not Pay Essay

Chris Paciello could be aptly described as a violent nice-looking hoodlum and lover. There was not much account on Paciello’s childhood life. However, his real name was Christian Ludwigzen and he was identified as a â€Å"thug wrapped up† in New York’s mob scene prior to his reinvention of himself in Miami. From 1987 to 1993, he was engaged in various robberies and theft cases, robbing establishments such hardware stores, video shops and pharmacies, and even pet store. He was also involved in some club and bar brawls and became in touch with the notorious gang of violent Brooklyn mobster. However, when things got rough with him, he fled to Miami to start a fresh new life. He reinvented himself, and transformed the Miami Beach area into a prime nightlife destination through his club Liquid which became the hottest place in America, using ill-gotten funds which he extracted from his robbery activities and his connection with the gang of violent mobster back in Brooklyn. Thus, Paciello was making legal money from his illegal funds, and making good reputation in the eyes of the public out of his relationships with famous women. In other words, he became a better person for being a womanizer. Pacillo’s connections with very popular people worked best for him as he quickly complete his own transformation. From a notorious robber connected to a dreaded gang of violent mobster, he is now a respectable, rich businessman, and lover of highly socialite women. His past crimes were already covered by the make-over he had made. He is now somebody who is greatly contributing to Miami’s economy. The question therefore is, if a person is contributing significantly to the economy, can he find favor in the law? Perhaps this could be the reason that many of his previous court cases were either dissolve or he got acquitted. But as the saying goes â€Å"Crime does not pay,† justice never sleep. His connection with outlawed mobsters leads to his own downfall as various cases sprang up against him including a homicide case. According to one law enforcer, Paciello was facing 30 years to life in jail but this was commuted to seven years imprisonment because he gave information about the bigger bosses of the violent mobsters. Could this be a form of bribery? I do not know, but it surely does him a great deal of favor.

Thursday, November 7, 2019

How to Convert Grams to Moles and Vice Versa

How to Convert Grams to Moles and Vice Versa This worked example problem shows how to convert the number of grams of a molecule to the number of moles of the molecule. Why would you need to do that? This type of conversion problem mainly arises when you are given (or must measure) the mass of a sample in grams and then need to work a ratio or balanced equation problem that requires moles. Key Takeaways: Converting Moles to Grams (and Vice Versa) Grams and moles are two units to express the amount of matter in a sample. There is no conversion formula between the two units. Instead, you must use atomic mass values and the chemical formula to do the conversion.To do this, look up atomic masses on the periodic table and use the formula mass to know how many atoms of each element are in a compound.Remember, subscripts in a formula indicate number of atoms. If there is no subscript, it means there is only one atom of that element in the formula.Multiply the number of atoms of an element by its atomic mass. Do this for all the atoms and add the values together to get the number of grams per mole. This is your conversion factor. Grams to Moles Conversion Problem Determine the number of moles of CO2 in 454 grams of CO2. Solution First, look up the atomic masses for carbon and oxygen from the periodic table. The atomic mass of C is 12.01, and the atomic mass of O is 16.00. The formula mass of CO2 is: 12.01 2(16.00) 44.01 Thus, one mole of CO2 weighs 44.01 grams. This relation provides a conversion factor to go from grams to moles. Using the factor 1 mol/44.01 g: moles CO2 454 g x 1 mol/44.01 g 10.3 moles Answer There are 10.3 moles of CO2 in 454 grams of CO2. Moles to Grams Example Problem On the other hand, sometimes youre given a value in moles and need to convert it to grams. To do this, first calculate the molar mass of a sample. Then, multiply it by the number of moles to get an answer in grams: grams of sample (molar mass) x (moles) For example, find the number of grams in 0.700 moles of hydrogen peroxide, H2O2. Calculate the molar mass by multiplying the number of atoms of each element in the compound (its subscript) times the atomic mass of the element from the periodic table. Molar mass (2 x 1.008) (2 x 15.999) Note the use of more significant figures for oxygenMolar mass 34.016 grams/mol Multiply the molar mass by the number of moles to get the grams: grams of hydrogen peroxide (34.016 grams/mol) x (0.700 mol) 23.811 grams There are 23.811 grams of hydrogen peroxide in 0.700 moles of hydrogen peroxide. Performing Grams and Moles Conversions Here are some tips for performing these conversions: The two problems most commonly encountered are setting up the problem incorrectly, so the units dont cancel out and give the correct result. It helps to write out the conversion and make sure units cancel. You may want to draw a line through them in complex calculations to keep track of active units.Watch your significant figures. Chemistry professors are unforgiving when it comes to reporting an answer, even if you set up the problem correctly. Moles to Grams Conversion Problem Sometimes you are given moles and need to convert it into grams. This worked example problem shows you  how to convert moles to grams. Problem Determine the mass in grams of 3.60 mol of H2SO4. Solution First, look up the atomic masses for hydrogen, sulfur, and oxygen from the  periodic table. The atomic mass is 1.008 for H, 32.06 for S, and 16.00 for O.  The formula mass  of H2SO4  is: 2(1.008) 32.06 4(16.00) 98.08 Thus, one mole of H2SO4  weighs 98.08 grams. This relation provides a conversion factor to go from grams to moles. Using the factor 98.08 g / 1 mol: grams H2SO4   3.60 mol x 98.08 g / 1 mol 353 g H2SO4 Answer There are 353 grams of H2SO4 in 3.60 moles of H2SO4.

Tuesday, November 5, 2019

Sphinx Moths, Family Sphingidae

Sphinx Moths, Family Sphingidae Members of the family Sphingidae, the sphinx moths, attract attention with their large size and ability to hover. Gardeners and farmers will recognize their larvae as the pesky hornworms that can wipe out a crop in a matter of days. All About Sphinx Moths Sphinx moths, also known as hawkmoths, fly fast and strong, with rapid wingbeats. Most are nocturnal, though some will visit flowers during the day. Sphinx moths are medium to large in size, with thick bodies and wingspans of 5 inches or more. Their abdomens typically end in a point. In sphinx moths, the hindwings are markedly smaller than the forewings. Antennae are thickened. Sphinx moth larvae are called hornworms, for a harmless but pronounced horn on the dorsal side of their hind ends. Some hornworms do significant damage to agricultural crops, and are therefore considered pests. In their final instars, sphinx moth caterpillars can be quite large, some measuring as long as your pinky finger. Classification of Sphinx Moths Kingdom – AnimaliaPhylum – ArthropodaClass – InsectaOrder – LepidopteraFamily - Sphingidae The Sphinx Moth Diet Most adults nectar on flowers, extending a long proboscis to do so. Caterpillars feed on a range of host plants, including both woody and herbaceous plants. Sphingid larvae usually have specific host plants, rather than being generalist feeders. The Sphinx MothLife Cycle Female moths lay eggs, usually singly, on host plants. Larvae may hatch within a few days or several weeks, depending on species and environmental variables. When the caterpillar reaches its final instar, it pupates. Most Sphingid larvae pupate in the soil, though some spin cocoons in leaf litter. In places where winter occurs, Sphingid moths overwinter in the pupal stage. Special Adaptations and Defenses of Sphinx Moths Some sphinx moths nectar on pale, deep flowers, employing an unusually long proboscis. The proboscis of certain Sphingidae species can measure a full 12 inches long. Sphinx moths are also famous for their ability to hover at flowers, much like hummingbirds. In fact, some Sphingids resemble bees or hummingbirds and can move sideways and stop in midair. Range and Distribution of Sphinx Moths Worldwide, over 1200 species of sphinx moths have been described. About 125 species of Sphingidae live in North America. Sphinx moths live on all continents except Antarctica.

Saturday, November 2, 2019

Law and ethics Essay Example | Topics and Well Written Essays - 750 words - 1

Law and ethics - Essay Example In the business world, the main reason for setting up an enterprise is to make profits and expand further. In this regard, the prime goal in business is maximizing inputs and limiting outputs within the company (Shaw 15). Business competitions are considered setbacks which require companies to implement brilliant strategies to overcome and remain relevant within the business community. According to the excerpt given, Jennifer can use the information to her business advantage but the success would not be just in that it was achieved in an unethical way. Studies reveal that competitive intelligence may not be unethical but Jennifer is faced by two dilemmas; business prosperity or lack of integrity. The process of decision making plays a significant role in the running of an organization. For the betterment of the organization, making decisions must at least be based on accurate statistics, scientific studies or certain principals. Being a leader and a level manager, the decisions made by Jennifer will influence those around her. The resolution of the two issues will affect Jennifer, the company as a separate entity and the competitor whose private data is publicized. Being in Jennifer’s position, her integrity as a businessperson will be affected in whatever choice she chooses to undertake. If she chooses to use the competitor’s information, her lack of integrity will render the enterprise’s success unethical. Consequently, if the business is passed to other business partners, they will lose faith in her management skills. Faith from business partners is important especially during transactions since business partners rely on the history of other business partners for decision-making purposes. The resolution to inform the competitor company of the breach would earn her respect from other partners and likely to have impacts in her business on the long run. The information leak is on the internet which she cannot control but through

Thursday, October 31, 2019

France Past Present and Future Research Paper Example | Topics and Well Written Essays - 1250 words

France Past Present and Future - Research Paper Example It started with the formation of Occidental France which came into existence due to Treaty of Verdun in the year 843.The first kings were called the Capetians, who came into power with a lot of aspirations to expand their territories. They exerted much pressure on churches,towns and the people who existed in those days.This kingdom was regularly faced with challenges due to inflation from kings of England. The re-annexations of Languedoc and Normandy in the 13th century marked an important step in the unification of the kingdom. In the 9th century, France lost the County of Barcelona.Later, Louis XI re-captured it back together with his other prerogatives. The prerogatives gained back were Burgundy, Anjou and Provence which from 1481-1482 had been part of the Holy Roman Empire. Further unification of the kingdom came about when Anne of Brittany got married to Charles VIII first and later to the Louis XII. Earlier the two had remained as distinct regions but that marriage brought about the annexation of the two into the French Kingdom in the year 1532. Louis XIV and Richelieu from 1635-1748 embarked on a mission to further expand the territories of the French Kingdom towards the Rhine and the north.This is because after the French had lost the French Flanders in 1526, the Austrian royal houses situated near f the French Capital had started to pose some danger. Later between the year 1648 and 1789 other territories such as the Alsace, Franche-Comtà © and Artois were annexed into the French Kingdom.The annexation of Duchy of Lorraine came in 1766 and together with the purchase of Corsica in 1768 led to formation of a strong consolidated block. The period of French Revolution by the First Empire enabled French Kingdom toexpand temporarily on the left bank of River Rhine.The kingdom during this period remained somehow stable until 1789 when it became vague due to lack of a particular line.In 1815,

Tuesday, October 29, 2019

Cash Flow and Profit Essay Example | Topics and Well Written Essays - 250 words

Cash Flow and Profit - Essay Example In most cases, cash flow is much important for small scale business than profits. Because of cash flow, a business may run properly. It is that money that is essential in running and managing a business without it,  a firm may be sent out of business. Additionally, cash flow is that money that a firm needs to continue paying its bills at the end of each month (Rosemary, 2015). Also, it is necessary to have cash flow as opposed to profits. Without cash flow, you may make profits but that would not be good for a company with long term goals. Profits may be good for a company, but cash flow is something that is a must for every business as it puts the company in a position to stand on its own even in times that are hard. A good example of a company that had much cash flow was Amazon (Stever Robbins Inc 2015). Despite making losses for some time, the cash flow available made it possible for the company to run for long enough to start realizing profits. Despite the differences between cash flow and profits, these two items are important to any business. Cash flow ensures that a business can stand on its own and profits put a business in a better position to expand its

Sunday, October 27, 2019

E-voting system

E-voting system CHAPTER 1: INTRODUCTION Introduction Motivation Objectives The aim of this project is to design an e-voting system that makes use of Java and Bluetooth technologies. The specific objectives of this project are: To create voting software that using Java 2 Micro Edition (J2ME) that can run on any mobile devices which will act as server and clients. To develop Java 2 Micro Edition (J2ME) based voting system that able to fully utilize the functionality of Bluetooth technologies by transferring data (voter database, voting records, etc.), between two mobile devices. To build a low cost and reliable client-server based voting system. Outline of Thesis The content of this thesis is organized according to the chapter. Chapter 1 is mainly about the brief introduction of the project done with some motivation and objectives. Chapter 2 is generally about the literature review of Java 2 Micro Edition (J2ME), Bluetooth and JSR-82 technologies, and also overview about the BVote itself. Next, Chapter 3 is about the methodology and details of the design whereas Chapter 4 is about the implementation of program through simulator and hardware devices since it is the output of the work done on Chapter 3. Chapter 5 is in relation to the presentation of data of the program with some program module hierarchy and classes used for Java programming. Then, Chapter 6 is concerning the discussion about the program outcome and its limitation. Finally, Chapter 7 is the final part of any reports or thesis which is the conclusion and some recommendations for future research. CHAPTER 2: LITERATURE REVIEW Overview of Java Micro Edition (Java ME) Introduction Java is a programming language originally developed by James Gosling at Sun Microsystems, which is now a subsidiary of Oracle Corporation. It was released in 1995 as a core component of Sun Microsystems Java platform. Java is general-purpose, concurrent, class-based, and object-oriented, and is specifically designed to have as few implementation dependencies as possible. It is intended to let application developers write once, run anywhere. Recognizing that one size doesnt fit all, Sun has defined and supports four editions of Java aiming different application environments and segmented many of its APIs so that they belong to one of the platforms. The platforms are: Java Card aimed for smartcards. Java Platform, Micro Edition (Java ME) aimed at small and memory constrained devices by means of environments with limited resources. Java Platform, Standard Edition (Java SE) aimed at standard desktop and workstation environments. Java Platform, Enterprise Edition (Java EE) aimed at heavy duty server systems, large distributed enterprise or Internet environments. Java ME was formerly known as Java 2 Platform Micro Edition (J2ME), is a Java platform designed for mobile devices and embedded systems. Java ME technology was originally created in order to deal with the constraints associated with building applications for small devices with as little as 128KB of RAM and with processors a lot less powerful than those used on typical desktop and server machines. Thus, Sun defined the basics for Java ME technology to fit such a limited environment and make it possible to create Java applications running on small devices with limited memory, display and power capacity. There are three core concepts in the Java ME technology: Configuration provides the most basic set of libraries and virtual machine capabilities for a broad range of devices. Profile set of APIs that support a narrower range of devices. Optional package set of APIs in support of additional, common behaviours that dont really belong in one specific configuration or profile J2ME consists of a set of profiles. Each profile is defined for a particular type of device and consists of a minimum set of class libraries required for the particular type of device and a specification of a Java virtual machine required to support the device. A profile itself does not do anything; it just defines the specification. Since profiles are subsets of configurations, profiles are implemented with a configuration. Ultimately, Java ME platform has been divided into two base configurations which is Connected Device Configuration (CDC) and Connected Limited Device Configuration (CLDC). Java ME was designed to use profiles and configurations to enables devices of varying ability to able to run Java ME applications on the Kilobytes Virtual Machine (KVM), which is the micro version of Java Virtual Machine (JVM). Figure 1 illustrates how the CDC and the CLDC together make Java ME. The diagram also shows an overview of the components of Java ME architecture, and how it fits in the overall Java model. Configurations Configuration is a preliminary Java platform for devices with similar requirements with respect to total memory, processing speed, power and display constraints. Specifically, a configuration consists of Java language features, JVM features and a limited set of generalized APIs. Configurations are closely linked with JVM. In fact, configuration is a term identifying Java language features as a set of APIs and a specific JVM for that particular configuration. The dividing line as to what configuration applies to a device is for the most part, dependent on the memory, processing power, network connectivity and display constraints of a device. Connected Limited Device Configuration (CLDC). The Connected Limited Device Configuration (CLDC) is a fundamental part of the architecture of the Java ME that targeting resource-constraint devices like mobile phones. It is specifically designed to meet the needs for a Java platform to run on devices with limited memory, processing power and graphical capabilities. CLDC contains a strict subset of the Java-class libraries, and is the minimum amount needed for a Java virtual machine to operate. CLDC is basically used to classify myriad devices into a fixed configuration. When coupled with one or more profiles, the CLDC gives developers a solid Java platform for creating applications for consumer and embedded devices. CLDC is designed to bring the many advantages of the Java platform to network-connected devices that have limited processing power, memory, and graphical capability. Target devices typically have the following capabilities: A 16-bit or 32-bit processor with a clock speed of 16MHz or higher. At least 160 KB of non-volatile memory. At least 192 KB of total memory available for the Java platform. Low power consumption, often operating on battery power. Connectivity to some kind of network, often with a wireless, intermittent connection and limited bandwidth. On top of the different configurations Java ME platform also specifies a number of profiles defining a set of higher-level APIs that further define the application. A widely adopted example is to combine the CLDC with the Mobile Information Device Profile (MIDP) to provide a complete Java application environment for mobile phones and other devices with similar capabilities. Connected Device Configuration (CDC) CDC is a specification of a framework for Java ME applications describing the basic set of libraries and virtual-machine features that must be present in an implementation. The targets for CDC-based technology comprise a broad range of consumer and embedded devices like smart communicators, pagers, high-end personal digital assistants (PDAs), and set-top boxes. Within this range, CDC is the basis for several standard API bundles that address the needs of developers of applications for specific categories of devices. Devices that support CDC typically include a 32-bit microprocessor/controller and make about 2 MB of RAM and 2.5 MB of ROM available to the Java application environment. The CDC configuration was designed to bring the many advantages of the Java platform to a broad range of network-connected consumer and embedded devices. CDC versus CLDC The CLDC is different from, yet also a subset of the CDC. The two configurations are independent of each other, however, so they should not be used together to define a platform. The CLDC is a proper subset of the CDC. Neither the CLDC nor the CDC is a proper subset of the J2SE platform, however, because both of these configurations add new classes necessary to deliver services on their respective families of devices. Like the CDC, the CLDC specifies the level of support of the Java programming language required, the required functional support of a compliant Java VM, and the set of class libraries required. Figure 2 shows the relationship between the two configurations and the J2SE platform. Profiles Profiles are an extension of its underlying configuration. A profile simply is a set of APIs but unlike configurations, profiles are closer and specific to the target device capabilities. They are intended to include device specific APIs providing those functionality missing at configuration level such as user interface, persistence, etc. Profiles obtain the required foundation from configuration and hence are layered above configurations. Currently, there are a handful profiles available and a few more are being finalized. MIDP is a profile supported by CLDC while CDC support three different profiles namely the Foundation Profile (JSR 219), Personal Basis Profile (JSR 217) and Personal Profile (JSR 216). Foundation Profile (FP) Foundation Profile is the most basic of the CDC family of profiles. It is a skeleton upon which a developer can create a new profile. The FP APIs, together with CDC APIs provides a complete Java ME JRE for consumer electronics and embedded devices. It is a set of Java APIs tuned for low-footprint devices that have limited resources that do not need a graphical user interface system. It provides a complete Java ME application environment for consumer products and embedded devices but without a standards-based GUI system. Version 1.1.2 is specified in JSR 219 and implements a subset of Java SE 1.4.2, including a set of security-related optional packages, such as Java Authentication and Authorization Service (JAAS), Java Secure Socket Extension (JSSE), and Java Cryptography Extension (JCE). The Mobile Information Device Profile (MIDP) The Mobile Information Device Profile (MIDP), combined with the Connected Limited Device Configuration (CLDC), is the Java runtime environment for todays mobile information devices such as phones and entry level PDAs. MIDP provides the core application functionality required by mobile applications including the user interface, network connectivity, local data storage, and application lifecycle management. Currently, there are three version of MIDP which are MIDP 1.0, MIDP 2.0 and MIDP 3.0. With the configuration and profiles, the actual application then resides, using the different available APIs in the profile. Following in the tradition of Java parlance, MIDP applications are called MIDlets. A MIDlet is a Java application that uses the MIDP profile and the CLDC configuration, created by a Java ME software developer, such as a game, a business application or other mobile features. These MIDlets can be written once and run on every available device conforming to the specifications for Java ME technology. The MIDlet can reside on a repository somewhere in the ecosystem and the end user can search for a specific type of application and having it downloaded over the air to another device. Kilobyte Virtual Machine (KVM) The Kilobyte virtual machine (KVM) is a virtual machine derived from the Java Virtual Machine (VM) specification. The VM that comes with the CLDC reference implementation is called the Kilobyte Virtual Machine (KVM) because it uses only a few kilobyte of runtime memory as opposed to megabyte. It is a reference implementation that adheres to the CLDC specifications description of a compliant VM. It is designed for small devices as it has a small memory footprint. It supports a subset of the features of the higher end JVM. For low-end, resource-limited products, Java ME and the KVM support minimal configurations of the Java virtual machine and Java APIs that capture just the essential capabilities of each type of device. KVM can be deployed flexibly to address a range of trade-offs between space and functionality. The KVM is engineered and specified to support the standardized, incremental deployment of the Java virtual machine features and the Java APIs included in the Java ME architecture. Overview of Bluetooth Technology Introduction Bluetooth is a proprietary open wireless communication protocol for exchanging data over short distances by using short length radio waves from fixed and mobile devices, creating personal area networks (PANs). The Bluetooth wireless connectivity technology was originally envisioned in 1994 by Ericsson as a way for mobile devices to communicate with each other at short ranges up to 30 feet, or 10 meters. While Bluetooth is positioned as a replacement for cable, infrared, and other connection media, it offers a variety of other services, and creates opportunities for new usage models. It can connect several devices, overcoming problems of synchronization and it works quietly, unconsciously, and automatically in the background. Bluetooth has client-server architecture. In client-server architecture, the one that initiates the connection is the client, and the one who receives the connection is the server. Bluetooth is a great protocol for wireless communication because its capable of transmitting data at nearly 1MB/s, while consuming 1/100th of the power of Wi-Fi. In order for Bluetooth devices to communicate properly, they all need to conform to the Bluetooth specification. The Bluetooth specification, like any other specification, defines the standard that a Bluetooth device should adhere to, as well as rules that need to be enforced when communicating. The Bluetooth protocol stack and profiles together comprise the Bluetooth specification. Bluetooth Protocol Stack Bluetooth uses a variety of protocols. Core protocols are defined by the trade organization Bluetooth Special Interest Group (SIG). Additional protocols have been adopted from other standards bodies. The Bluetooth stack is the software or firmware component that has direct access to the Bluetooth device. The Bluetooth protocol stack is split in two parts: a controller stack containing the timing critical radio interface, and a host stack dealing with high level data. It has control over things such as device settings, communication parameters, and power levels for the Bluetooth device. The stack itself consists of layers, and each layer of the stack has a specific task in the overall functionality of the Bluetooth device. Since Bluetooth device manufacturers are not required to use all of the layers in the stack, listed below are the overview of the core protocols and those adopted protocols that are widely used and implemented in almost every Bluetooth device: L2CAP: The Logical Link Controller and Adaptation Protocol used to send packets between host and client. This layer is the multiplexer of all data passing through the unit. It receives application data and adapts it to the Bluetooth format. Qualities of Service (QoS) parameters are exchanged at this layer. LMP: The Link Manager Protocol uses the links set up by the baseband to establish connections and manage piconets. Responsibilities of the LMP also include authentication and security services, and monitoring of service quality. SDP: The Service Discovery Protocol is used to find services on remote Bluetooth devices. HCI: The Host Controller Interface is the interface between the radio and the host computer. HCI is the dividing line between software and hardware. The HCI is the driver interface for the physical bus that connects these two components. RFCOMM: The Radio Frequency COMMunication is very easy and uncomplicated. Widely known as the virtual serial port protocol, it is used to stream simple data. OBEX: The Object Exchange communication protocol is used to exchange physical data such as files, images, and so on in binary format. Bluetooth Profiles Bluetooth profiles are intended to ensure interoperability among Bluetooth-enabled devices and applications from different manufacturers and vendors. A Bluetooth profile is a designed set of functionality for Bluetooth devices that defines the roles and capabilities for specific types of applications. If Bluetooth-enabled devices want to interact, having the bare minimum Bluetooth stack is not enough. It also needs to conform to a particular profile. Listed are some of the Bluetooth profiles: The Generic Access Profile defines connection procedures, device discovery, and link management. It also defines procedures related to use of different security models and common format requirements for parameters accessible on the user interface level. At a minimum all Bluetooth devices must support this profile. The Service Discovery Application and Profile defines the features and procedures for an application in a Bluetooth device to discover services registered in other Bluetooth devices, and retrieves information related to the services. The Serial Port Profile defines the requirements for Bluetooth devices that need to set up connections that emulate serial cables and use the RFCOMM protocol. The LAN Access Profile defines how Bluetooth devices can access the services of a LAN using PPP, and shows how PPP mechanisms can be used to form a network consisting of Bluetooth devices. The Synchronization Profile defines the application requirements for Bluetooth devices that need to synchronize data on two or more devices. Bluetooth Network Topology Bluetooth-enabled devices are organized in groups called piconets or also known as Personal Area Network (PAN). A piconet consists of one master and up to seven active slaves. The slaves in a piconet can only link to the master. Slaves cannot directly transmit data to one another. In fact, the master acts as a switch for the piconet and all traffic must pass through the master. A master and a single slave use point-to-point communication. If there are multiple slaves; point-to-multipoint communication is used. A master unit is the device that initiates the communication. A device in one piconet can communicate to another device in another piconet, forming a scatternet. A Bluetooth unit can be a slave in two or more piconets, but only one Bluetooth can be a master. Devices that participate in two or more piconets may act as gateways, forwarding traffic from one piconet to another.Notice that a master in one piconet may be a slave in another piconet: The basic concepts of any Bluetooth application consist of the following five components: Stack Initialization Device Management Device Discovery Service Discovery Communication Bluetooth vs. Infrared The major difference between the two methods of data transmission is that Bluetooth is based on radio technology (from 2.4GHz bands upwards), while Infrared utilizes invisible light in the 400 700nm wavelength. Infrared is fairly reliable and doesnt cost much to build into devices but it does have drawbacks: Its line-of-sight, so a sender must align with its receiver. Its one-to-one, so a device cant send to multiple receivers at the same time. Infrareds advantages are consequences of its disadvantages: Because its line-of-sight, interference is uncommon. Because its one-to-one, message delivery is reliable: each message sent goes to the intended recipient no matter how many infrared receivers are in the room. Bluetooth vs. 802.11b Both Bluetooth and IEEE 802.11b are wireless communication protocols and both operate in the 2.4GHz band, but they are designed to accomplish different goals. A major difference is that 802.11b was not designed for voice communications, while any Bluetooth connection can support both data and voice communications. The 802.11b protocol is designed to connect relatively large devices with lots of power and speed, such as desktops and laptops. Devices communicate at up to 11 Mbit/sec, at greater distances (up to 300 feet, or 100 meters). By contrast, Bluetooth is designed to connect small devices like PDAs, mobile phones, and peripherals at slower speeds (1 Mbit/sec), within a shorter range (30 feet, or 10 meters), which reduces power requirements. Overview of Java APIs for Bluetooth Technology (JSR-82) Java APIs for Bluetooth Wireless Technology Bluetooth is an important emerging standard for wireless integration of small devices. The specification standardizes a set of Java APIs to allow Java-enabled devices to integrate into a Bluetooth environment. Previously, there has been no standardized way to develop Bluetooth applications until JSR 82 came into play JSR-82 is a standard defined by the Java Community Process for providing a standard to develop Bluetooth applications using the Java programming language. It is the first open and non-proprietary standard for developing Bluetooth applications. The JSR-82 API hides the complexity of the Bluetooth protocol stack behind a set of Java APIs that allow to focus on application development rather than the low-level details of Bluetooth, by exposing a simple set of Java APIs. JSR 82 is based on version 1.1 of the Bluetooth Specification. JSR 82 consists of two optional packages: the core Bluetooth API and the Object Exchange (OBEX) API. The latter is transport-independent and can be used without the former. The Java APIs for Bluetooth do not implement the Bluetooth specification, but rather provide a set of APIs to access and control a Bluetooth-enabled device. JSR 82 concerns itself primarily with providing Bluetooth capabilities to J2ME-enabled devices. Java APIs described in the JSR-82 interface for following Bluetooth Protocols/Profiles: SDAP Service Discovery Application Profile RFCOMM Serial Cable Emulation Protocol L2CAP Logical Link Control and Adaptation Protocol GOEP Generic Object Exchange (OBEX) Profile The API Architecture The goal of the specification was to define an open, non-proprietary standard API that can be used by all J2ME-enabled devices. Therefore, it was designed using standard J2ME APIs and CLDC/MIDPs Generic Connection Framework. JSR 82 requires that the Bluetooth stack underlying a JSR 82 implementation be qualified for the Generic Access Profile, the Service Discovery Application Profile, and the Serial Port Profile. The stack must also provide access to its Service Discovery Protocol, and to the RFCOMM and L2CAP layers. The APIs are designed in such a way that developers can use the Java programming language to build new Bluetooth profiles on top of this API as long as the core layer specification does not change. JSR 82 includes APIs for OBEX and L2CAP so that future Bluetooth profiles can be implemented in Java, and these are already being used for that purpose. Figure 4 shows where the APIs defined in this specification fit in CLDC/MIDP architecture. Capabilities of JSR-82 These are the properties and capabilities of JSR-82 in a nutshell. The JSR-82 API is intended to provide the following capabilities options: Manage the Local Bluetooth Device settings. Discover other Bluetooth devices in the neighbourhood. Search for Bluetooth services on the discovered Bluetooth devices. Connect to any of those Bluetooth services and communicate with it. Register a Bluetooth service on the Local Bluetooth Device, so that other Bluetooth devices can connect to it. Establish RFCOMM, L2CAP, and OBEX connections between devices Manage and control the communication connections. Provide the security to all of the above options. Reasons on Using Java Platform Micro Edition (Java ME) Java ME has significant advantages over other languages and environments that make it suitable for Bluetooth Voting System (BVote). The advantages of Java are as follows: Most of mobile devices nowadays are compatible and supports Java ME application development. Java ME has a particularly high market penetration. According to Morales and Nelson, approximately 68% of mobile phones are Java ME capable, which equates to more than 350 million Java ME capable mobile devices worldwide. Java ME is an open source and free. There are no licensing expenses needed for the SDK. Java ME is platform-independent. Java has the ability to move easily from one computer system to another.Java is a platform-independent at both the source and binary levels. It can run on any operating system without modification Simplicity and ease-of-use. Java was designed to be easy to use and is therefore easy to write, compile, debug, and learn than other programming languages. Java uses automatic memory allocation and garbage collection. In addition, the I/O and network library is very easy to use. Java ME is robust. Java compilers are able to detect many problems that would first show up during execution time in other languages. Java ME is interpreted. An interpreter is needed in order to run Java programs. With Java, the program need only be compiled once, and the bytecode generated by the Java compiler can run on any platform. Reasons on Using Bluetooth Technology There are various reasons to use a Bluetooth technology. These reasons are mainly based on the advantages of the Bluetooth technology itself that it offers to users. Availability of Bluetooth connectivity wireless technology in mobile devices. Bluetooth has already become a standard inclusion and important feature on most mobile phones nowadays. No cost per transmission. As an alternative for the current Short Message Services (SMS) that would be charge per transmission, Bluetooth cost no charge for its communication. Low energy consumption as Bluetooth uses low power signals. Thus, the technology requires little energy and hence uses less battery or electrical power. Standardize technology. Since Bluetooth is a standardized wireless specification, a high level of compatibility among devices is guaranteed. In addition, Bluetooth is a universal, world-wide, wireless standard. Ability to keep information private. In order to make a transfer or allow someone to access the files in the phone, it will need to give the access by accepting or rejecting the request through the phone. Therefore, authentication will prevent unauthorized access to important data and make it very difficult to listen in. Signals are omni-directional and can pass through walls. Communicating devices do not need to be aligned and do not need an unobstructed line of sight. Besides, Bluetooth uses frequency hopping. Its spread spectrum approach greatly reduces the risk that communications will be intercepted. Overview on Bluetooth Voting System (BVote) The name of this project is BVote. BVote is being developed using Java 2 Micro Edition (J2ME) programming language in order to create an open source, freely available and platform-independent mobile voting platform with basic connectivity options to expedite the process of data transfer and multi-user collaboration. It consists of two parts which are server and client. The server is the one that become the administrator. The administrator is responsible to manage all the registration of the voters and set the question(s) of the voting. As for the client, it can only log in the voting system as a voter and vote for the question that is being sent. In order to create such a program like BVote, it must meet some basic requirements before the application can be run. Firstly, as BVote is being developed using J2ME, therefore both server and client must use mobile devices as their platform. In addition, both server and client must be able to communicate with each other through Bluetooth technology. Last but not least, since BVote is voting system application software, BVote must accept processing, storing, and updating functions especially for the server part. Research on E-Voting System http://en.wikipedia.org/wiki/Electronic_voting http://en.wikipedia.org/wiki/Electronic_voting_examples http://en.wikipedia.org/wiki/Indian_voting_machines http://www.topbits.com/e-voting.html http://www.howstuffworks.com/e-voting.htm http://avirubin.com/vote/analysis/ CHAPTER 3: DESIGN METHODLOGY AND DETAILS This chapter addressed issues that arise when implementing and using the Java APIs for Bluetooth Wireless Technology and designing the software application using Java 2 Micro Edition (J2ME). Lastly, this section discusses issues on the hardware and technology that involved on the implementation and development of Bluetooth Voting System. Hardware Mobile Phone Mobile phone is acting as the main hardware for Bluetooth Voting System, both for server and client part. Nowadays, a mobile phone in market is growing up rapidly with respectively to mobile technology. The fast growing of the mobile technology has benefited and improved the quality of life. In addition, the Bluetooth technology has become the main features in all the latest product of mobile devices available on market. With this specification, the objective to develop a low cost system has been met. As this project make the most of the Bluetooth as a connection medium for voting process, mobile phone has been fully utilized due to its ability in supporting Bluetooth. PC or Laptop In the development work, PC has been used as a workstation for programming and simulation process. For the simulation purpose, it had been perform in PC by using Java IDE and mobile phone emulator generated by Sun Wireless Toolkits. After the simulation work is done, a .jar executable file will be installing in mobile phones for real time hardware testing. Software and Development Toolkit The following software will be used: J2SDK1.5.0 Eclipse 3.0.1: one of the best Java IDE 😉 J2ME Wireless toolkit 2.2 EclipseME 0.7: Eclipse plugin to help develop J2ME code ProGuard 2.1: class file shrinker and obfuscator. Wireless Toolkit 2.5.2 The Sun Java Wireless Toolkit for CLDC (formerly known as Java 2 Platfo