Saturday, August 31, 2019

Strategic Plan

Using what you have identified in DQ 1 as a base, what elements are important when attempting to change an ingrained behavior in a company (e. g. improve customer service). (Hint: Insert the strategic planning process in your answer). How does identifying the best plan for this involve aspects of scientific and human management? Improving customer service is the one of the keys to success in healthcare facility. Ingrained behaviors of the healthcare professionals can hinder success. If the patients, families, community, and the list goes on are not happy with a healthcare facility it can cause some real problems for the facility. Any facility that has problems with ongoing ingrained behaviors need to revise their strategic plan and fix the problem. The key elements to strategic planning is the mission, objectives, plan of action, resources needed, plan how to measure the performance, and evaluation plan. The mission statement needs focus on the expectations of how the employees will act when working in the organization. The objective should be produced by the staff that will be monitoring it. The objective needs be attainable and clear on the focus of behaviors. The action plan is coming up with steps on how to reach goal of the objectives. This is good place for coming up with ideas on how to change the ingrained behaviors and throw out the old plans that are not working. The resources is a big part of the strategic plan because this where the facility comes up with resources they may need to complete the action plan. The resources for changing ingrained behavior could be education, money needed for the changes, and so forth. The evaluation system is where the strategic plan is being monitor for effectiveness. Ways to evaluate if the strategic plan is successful for changing ingrained behaviors is through random audits in the facility watching employees, doing a survey, talking with the stakeholders of the facility to see if they have noticed a change (Liebler & McConnell, 2008 5th ed. ). The scientific management examines improving work place performance with using easy elements and systems. This type of plan should be used when it comes to changing work place behaviors because one of its focuses is on performances in work place (â€Å"Scientific Management Progression in Hr†, 2008). Strategic Plan Using what you have identified in DQ 1 as a base, what elements are important when attempting to change an ingrained behavior in a company (e. g. improve customer service). (Hint: Insert the strategic planning process in your answer). How does identifying the best plan for this involve aspects of scientific and human management? Improving customer service is the one of the keys to success in healthcare facility. Ingrained behaviors of the healthcare professionals can hinder success. If the patients, families, community, and the list goes on are not happy with a healthcare facility it can cause some real problems for the facility. Any facility that has problems with ongoing ingrained behaviors need to revise their strategic plan and fix the problem. The key elements to strategic planning is the mission, objectives, plan of action, resources needed, plan how to measure the performance, and evaluation plan. The mission statement needs focus on the expectations of how the employees will act when working in the organization. The objective should be produced by the staff that will be monitoring it. The objective needs be attainable and clear on the focus of behaviors. The action plan is coming up with steps on how to reach goal of the objectives. This is good place for coming up with ideas on how to change the ingrained behaviors and throw out the old plans that are not working. The resources is a big part of the strategic plan because this where the facility comes up with resources they may need to complete the action plan. The resources for changing ingrained behavior could be education, money needed for the changes, and so forth. The evaluation system is where the strategic plan is being monitor for effectiveness. Ways to evaluate if the strategic plan is successful for changing ingrained behaviors is through random audits in the facility watching employees, doing a survey, talking with the stakeholders of the facility to see if they have noticed a change (Liebler & McConnell, 2008 5th ed. ). The scientific management examines improving work place performance with using easy elements and systems. This type of plan should be used when it comes to changing work place behaviors because one of its focuses is on performances in work place (â€Å"Scientific Management Progression in Hr†, 2008).

A House Divided Against Itself Cannot Stand

â€Å"A house divided against itself cannot stand† The phrase, â€Å"A house divided against itself cannot stand† became famous as a quotation from Lincoln’s â€Å"A house divided† speech delivered at 17 June 1858, in what was then the Illinois State Capitol in Springfield, upon accepting the Illinois Republican Party's nomination as that state's senator of the United States . The speech became the launching point for his unsuccessful campaign.Abraham Lincoln was not the first one who used the â€Å"A house divided against itself cannot stand† phrase: Sam Huston used it during the Senate debate on the Compromise of 1850,during the War of 1812; a similar line appeared in a letter from Abigail Adams to Mercy Otis Warren. Thomas Paine in 1776 and Thomas Hobbes, in 1651 used something very similar. We, as humans, are social beings†¦so we cannot live alone. We need friends and people with whom we can share our thoughts, our feelings, our life, our e xperiences and so on. For this reason we form all kinds of groups (friends group, school group, workplace group).If the members of a group are not united, they will be much more easier to defeat by a â€Å"common enemy† or by nature itself. If a group (house) is divided against himself, members will be more easier to beat one by one, then if they are united and their power cumulated. Even if, hypothetically, there is only one group and there will be no external danger, if the member of that group is disunited, the group could not stand and, sooner or later, if the conflicts are not solved, the group will divide in at least two other smaller groups( each one more powerless than the original group will be if its members are united).The â€Å"A house divided against itself cannot stand† phrase applies very well to smaller (but more bounding) groups. For example, a family where the partners are always arguing against each other, it will be very hard (if not impossible) to get over the life challenges and succeed together in life. It is even worse if that family involves at least a child, because it is very probably that he will follow his parents` example and be more rigid with his partner when he will grow up.Another good example are the groups formed in a world full of sharks all running for the biggest prey and winning: the businessman world. If two (or more) business associates are not united they will surely lose because bigger or more cunning sharks will profit from their division against each other. In conclusion a house divided against itself cannot stand (SEE What I did there? ) because it is much more difficult conquer it if its members are united than applying the famous quotation : divide et impera! .

Friday, August 30, 2019

Alcoholic Anonymous Reaction Paper Essay

Recently, I attended an A. A. meeting, which stands for, alcoholic anonymous. The meeting I went to was located in Penfield, NY at 1601 Jackson Road, area code 14526. It was called the Yellow House. When I walked in, everyone was very welcoming and nice. Many people stared at me intensely as I entered the Yellow House. I think they thought I was a recovering alcoholic, until I explained to them later that I was there to listen and observe for a school project for my drugs and behavior class. The place was very cozy inside, had a number of chairs lined up for everyone to sit down and coffee ready to drink. I sat down in one of the chairs. A lady came up to me and handed me a coin that said â€Å"24 hours recovery†; this was before I had the chance to tell her that I was there to observe for a school project. I guess when you go to an alcoholic anonymous meeting for the first time you get awarded a 24 hour recovery coin to make you feel good and know you’re doing something good to help you recover from your alcoholic addiction. The meeting started promptly at 5:30 P. M. like it said it would. The leaders read out announcements and let everybody know if someone new has showed up. If you’re new joining alcoholics anonymous, you introduce yourself by saying your name and stating you are an alcoholic, and then everyone else in the room say â€Å"hi†¦Ã¢â‚¬  whatever your name is to make you feel welcome. Then the person can either talk more about why they came or stop talking and then another person will randomly say their name and why they are attending and so on. There was a vast majority of adults and older people in their 50s or 60s. There were a couple grandfathers, grandmothers and one or two kids my age. I sat next to a kid who was around the same age as me and I felt shocked that he would be attending this type of meeting at such a young age. As the stories from the crowd of people kept going on, I recognized everyone clapping very deliberately and diligent at everyone’s accomplishments for the most little to no importance scenarios, for instance, a man got up and said he had been sober for 90 days and everyone clapped for a really long time. I also realized everyone laughed at everything that was the least bit funny to make it feel like a warm, comfortable, atmosphere. There are meetings every night at this place in Penfield at 5:30 P. M. Each meeting has a different name every night. The meeting I went to was called a â€Å"First Step† meeting. It was for people attending the yellow house or an alcoholic anonymous meeting somewhere for the first time and admitting they are an alcoholic and that they want to get sober. When you start the program, you commit yourself to following a â€Å"12 step program† and attending 90 days of alcoholics anonymous. The first step states â€Å"We admitted we were powerless over alcohol-that our lives had become unmanageable. † And when you finish the program, you end with the last step, step number twelve, which states: â€Å"Having had a spiritual awakening as the result of these steps, we tried to carry this message to alcoholics, and to practice these principles in all our affairs. † Attending the alcoholics anonymous groups around the world has changed many recovering alcoholics lives and brought stability to their mind body and soul.

Thursday, August 29, 2019

Emergency medical services ambulances issues Research Paper - 1

Emergency medical services ambulances issues - Research Paper Example This technique is costly to apply when selecting EMS technology. Assessment and selection of efficient and cost effective information technology devices have been some of the issues affecting emergency medical services in the recent times. Transmitting medical information directly to a hospital can help save time, money and more importantly save a patient’s life. The advent of onboard mobile gateway (oMG) wireless system from In Motion Technology British Columbia, Canada has made it possible to equip vehicles (ambulances) with computing devices that are able to communicate with each other in and outside the vehicle, using wired and wireless technology (Rich, 2012). The system being a multi purpose built communications processor minimizes proliferation of wireless accounts, radio modems and antennas by enabling local area network (LAN) devices to share assets with wide area network resources. The system is also self regulating thereby reducing the need for dispatchers since it can automatically sense, assess and select the best available network to provide a back up should the primary network fail. The central medical emergency dispatch (CMED) system is mostly suitable for voice communications. oMG has mobile da ta capabilities such as biometrics, LPR, and e-ticketing which provide officers with greater access to information in the field. With such tools and many more, officers do not have to radio a dispatcher to obtain information about vehicles or suspects. Secure, wireless wide area networking transit fleet operations are enhanced by the powerful oMG communications platform. All systems aboard an ambulance i.e. video surveillance, CAD/AVL etc are allowed access to multiple garage area and wide area wireless networks. This platform solves communications problems of health care professionals by providing a multi network environment with full access to

Wednesday, August 28, 2019

Written response Essay Example | Topics and Well Written Essays - 250 words

Written response - Essay Example hat he hoped that while they may not agree with or support what Kennedy had in store during his time in office that they would at least continue to support the efforts of freedom that Kennedy was instilling on the nation. This would help to ensure the survival and success of liberty, everything that the nation stands for. President Kennedy went on to discuss the purposes and benefits of unity. If we stopped fearing each other, we could become more successful in our endeavors. We could make advancements in science, medicine, and technology; instead of fearing these things, we can work together to make them work for us. However, states and countries must show honest sincerity when deciding to work together with the rest of the nation. As Kennedy said, â€Å"Civility is not a sign of weakness, and sincerity is always subject to proof.† Kennedy drew his address to a close with the immortal words that we have all become familiar with: â€Å"Ask not what your country can do for you - ask what you can do for your country.† He furthered his statement to encompass the world, saying, â€Å"Ask not what America will do for you, but what together we can do for the freedom of man.† Kennedy knew the importance of working together as a united world, becoming one instead of falling apart and going against each other as many. He extended his hand of freedom and peace to the entire human race, not just a select

Tuesday, August 27, 2019

Case Study The global pharmaceutical industry Coursework

Case Study The global pharmaceutical industry - Coursework Example Consequently, the pharmaceutical market acquired some remarkable character. Management was in the hands of medical practitioners while patients and payers had little awareness or authority. Thus, medical practitioners were inconsiderate to the costs however receptive to the sales endeavors of individual agents. This made possible several 'me too' drugs to realize significant profits on investment. It resulted in imitating well-known medicines that cut R&D risk considerably, while the market- place was exposed to products offering slight advantages for example a more suitable dosage type or fewer side effects, although with much the same beneficial effect. There were two major developments in the 1970s in the pharmaceutical industry. Firstly, the Thalidomide tragedy in sickness caused birth defects, initiated much tighter regulatory rules on clinical trials. Secondly, laws were endorsed to establish a permanent period on patent protection - usually 20 years from first report as a research invention. This produced the emergence of 'generic' drugs. Generics however have precisely the same dynamic constituents as the original brand, and vie on price. The influence of generic application is exemplified by Bristol Myers Squibb's brand Glucophage, a cure for diabetes, which produced US sales of $2.1bn in 2001. After the termination of the patent in January 2002, brand sales fell to $69m for the first quarter. Generics legislation had a significant influence on the industry, providing motivation for improvement and for a competitive market. The time during which R&D costs could be recouped was drastically curtailed, putting upward pressure o n prices. The introduction of generics, however, was very beneficial for society: valuable medicines became extremely cheap. Indeed, health economists have estimated that the social returns from pharmaceutical R&D exceed that appropriated by firms by at least 50 to 100 per cent. By the end of the 1970s generic entrants and more stringent controls on clinical trials had led to substantial increases in R&D spending. Pharmaceutical Industry Environmental Forces: An Introduction The pharmaceutical industry is remarkable in that a number of countries of the world are dependent on a 'monopsony' - there is in fact only one dominant buyer i.e. the government. In the 1980s, governments all

Monday, August 26, 2019

Ethics Case Study Essay Example | Topics and Well Written Essays - 1000 words

Ethics Case Study - Essay Example Jerry’s training within the medical field surrounds him to not be in a position from where he can prescribe anyone a medicine. This makes him disqualified to resolve an issue at hand, which in this case has happened when Dr. Williams was not present on his seat. There is a possibility that Dr. Williams has essentially forbidden dosage of Valium to a certain patient, and in this case if Jerry McCall prescribes usage of Valium just on the basis of being Dr. Williams’ friend, then this shall become an ethical issue all the same. Hence it would be fitting enough for Jerry McCall to keep himself at a distance from making that unethical move by prescribing medicine to this patient which basically transgresses his authority by quite a fair proportion. 2 Would it make a difference if the medication requested were for control of high blood pressure that the patient critically needs on a daily basis? Why or why not? One should believe that it would not be any different if the req uested medication controls high blood pressure. There would be no difference if the discussion centered on lowering it all the same. The reason for this is that the kind of medication required to be given by Jerry McCall or any other person in charge is uncalled for. He should seek the advice of Dr. Williams and since he is not present on his seat, it would be a wise decision to stay put and ask Dr. Williams’ friend to wait for a certain while. Dr. Williams alone would be the best person to suggest which medicine and how much dosage would be deemed as a fitting one for his friend under such a circumstance. The patient must know that Dr. Williams only can help him and no one else from his staff has the right or the authority to issue a refill order. 3 If Jerry calls in the refill and the patient has an adverse reaction while flying, is Jerry protected from a lawsuit under the doctrine of respondent superior? It is safe to suggest that Jerry McCall would not gain any protection from a lawsuit. This is because under the basis of the doctrine of respondent superior, if the patient feels that he has had an adverse reaction even though he is flying; there are serious legal issues which will come to the fore. There would be serious charges for Jerry McCall as he will be the one who brought about the medication realms towards the patient. Essentially speaking, it will also make Dr. Williams duty bound and thus he would also have to undergo the lawsuit as Jerry is his employee. Since the medication was never appreciated in the first place and was totally uncalled for, the role that Jerry plays under such a situation becomes even more significant. The reason for this is that he was never given the permission to provide for medication to patients as he does not qualify for any post within Dr. Williams’ office. One must not forget that he is an office assistant, and thus his job domains do not allow him to administer issuing a refill order for patients as an d when required by the patients. Hence, the lawsuit would come about on Jerry McCall as well as Dr. Williams for being negligent towards their duties and for being unethical within their working basis (Weber, 2000). 4 What is your advice to Jerry? If someone could give an advice to Jerry, it would be that he should perform his job alone and not think about doing something which can be regarded as an immoral act. He must not interfere within the working basis of his employer – Dr. Williams. If he does so, he will be able to maintain

Sunday, August 25, 2019

Civils Wars in augusta and Franklin Counties Research Paper

Civils Wars in augusta and Franklin Counties - Research Paper Example Possessing slaves served like a sign of class and riches. There were far larger figures of impoverished inhabitants in the South than there were the planter privileges. Therefore, when it approached down to it, slavery alienated more than just Augusta and Franklin. Therefore, when one gives the impression of being at the counties of Franklin, Pennsylvania and Augusta, Virginia the subject that bound out is the association of African-Americans to the surroundings where they stay. Liberated African-Americans of that time had noteworthy challenges that lessened from community hostility no matter which county they were. Introduction Prior to the war, in Augusta County, there was a liberated Black Entry. There were two hundred registered African Americans in Staunton, a major city in the county. Total registered free blacks were five hundred in the county as a whole. The free black inhabitants in Augusta turned down in the 1860s as a fraction of the entire population, just as it did in Fr anklin. This creates main troubles for these inhabitants. Having to register as a subject to community verification is wearisome since it gives the organization an authority over a person in a manner, which is similar to the Jewish inhabitants that had to have on the Stars of David in the period of World War II. In an editorial printed in The Vindicator in 1860, there were "Several liberated African-Americans existing in Staunton who are not registered and have no dealing in the municipality, according to the Vindicator. The document urges the powers to inform the free blacks to go away or undergo the legal penalties." It became an emblematic response to whichever African American that by law, the community could reach them (Ayers, 2004, P.56). Apparently, in the slave obsessed South there was a forbidden on the incorporation of the races by matrimony. Prior to the warfare, it became characteristically against the rule. In a different article printed by The Vindicator, a black male, Jack Sophia, escaped with a white woman, Gladys Pinkly. This editorial was in a pessimistic attitude and was emblematic of the response to such an episode. The pre-war survival of free-blacks in Augusta County was not a satisfying one for the majority of the parts. This, nevertheless, did not imply this action was elite to their account of southern generosity. In Franklin County that was situated in the Northern side, there was no slavery. When natives learned about the civil warfare for the first occasion, they believed that the North was extremely responsive to the African-American grounds and, whereas this was factual to a degree in that it was extreme better than the South, there were still extremely profound chauvinism existing in the northern county. Franklin County indeed had its share of problems with the Augusta County. With the deep-rooted hostility and deceit that existed among the black and white races, there are going to be inevitable predicaments even in the municipal ities and states where slavery did not apply. In Chambersburg, a major municipality in Franklin County, following to the Valley Spirit, 1 There was a "painted man" that was assassinated by white soldiers for no obvious explanation. This illustrates the disgraceful behavior that survived in both divisions of the counties. During the battle on both sides of the regions, some occasions should not go unmentioned. Before the North formally made the

Saturday, August 24, 2019

Child abuse Essay Example | Topics and Well Written Essays - 750 words - 1

Child abuse - Essay Example Taking a moment to know and understand some of these causes will help us to find ways of preventing child abuse. Some children have been found that they were abused by parents who had unexpected pregnancies and therefore resulted to unwanted children who end up being neglected and develop a very poor relationship with their biological mother or both parents. The parents who also physically beat their spouses are known to extend the same frustrations on their children. People who take drugs like alcoholic drinks and cigarettes or cocaine also have a tendency in abusing children. Other factors are unemployment and financial difficulties which are associated with increased rates of child abuse (Check, 1989). In a 2009 CBS News report, it was realized that child abuse in the US had become greater during the economic depression. An example was given of a father who was not a sole breadwinner . But when the father was in that role, the situation changed. In this discussion, I will talk about two factors, these two factors are; Alcoholic parents and Parents experience of violence. The problem is drinker parents and parent’s history of abusing by their family members are the most important reasons that lead parents to abuse their children. It is very important to prevent violence toward children. How do we prevent this issue? We have to stop and limit this concern by knowing the exact problem in terms of the effects it has on the children and then by addressing the solution. According to the studies from World Bank and World Health organization, â€Å"alcohol-related death and its impact is bad. The dangerous effects of alcohol use on health and the likelihood of becoming an addict have been recognized as dangerous issues of great concern for a long time (www.searo.who.int). Parents who drink alcohol or any other substances that cause them to get drunk will often abuse their children if the level of their drinking is too much. Drinking

Friday, August 23, 2019

Risk management practices at HSBC Dissertation

Risk management practices at HSBC - Dissertation Example The paper tells that managing risks is integral to the overall strategy of banks but banks fail to manage risks. Several recent incidents and events have led banks to recognize that they are exposed to significant risks apart from the traditional credit and market risks. Scholars identify a positive relationship between risk management practices, understanding risk, risk identification, risk assessment and analysis, risk monitoring and credit risk analysis. While many banks failed, HSBC is one of the leading banks that have been able to sustain the financial recession and still maintain profits. It would be of immense value to the financial sector and particularly to the banks in the emerging economies to investigate into the strategies that HSBC adopted to suit the changing business environment. With the aim to investigate how HSBC manages risks in the interest of all its stakeholders, four objectives were set in Chapter I. All the objectives have been achieved. The study finds that HSBC has a robust strategy in place to manage risks. They take a cautious approach, train their business managers, have diversified portfolios with risk-graded products, focus on emerging markets, educate their clients and maintain adequate internal control procedures. Most importantly, their international strategy helps them sustain the external environment. All their measures start much before the event or the crisis which makes it easier for them to manage the risks. They employ the latest technology and software in all their processes. HSBC manages risks both through risk aggregation and risk decomposition. They consider risk as an opportunity and because they are able to manage risks better, they can deliver shareholder value. All of these factors have made them emerge successfully in turbulent times. The study concluded with recommendations for further areas for research. Table of Contents Chapter I: Introduction 1.1 Background 1 1.2 Rationale for study 3 1.3 Research Aims an d Objectives 5 1.4 Structure of the study 5 1.5 Limitations to the study 6 1.6 Chapter Summary 7 Chapter II: Literature Review 2.1 Chapter Overview 8 2.2 Definition and the concept of risks 8 2.3 Importance of risk management 9 2.4 Types of risks and the theoretical framework applied by banks 11 2.5 Why banks fail to manage risks 21 2.6 Risk management strategies adopted by banks 21 2.7 Mitigation of risks 23 2.8 Chapter Summary 24 Chapter III: Methodology 3.1 Chapter Overview 26 3.2 Introduction 26 3.3 Data and sources 27 3.4 Justification for secondary data 27 3.5 Sample 28 3.6 Theoretical framework for the study 29 3.7 Hypotheses of the study 30 3.8 Data analysis 30 3.9 Reliability and validity 31 3.10 Ethical concerns 31 3.11 Chapter Summary 31 Chapter IV: Findings 4.1 Chapter Overview 32 4.2 Presentation of Results 32 4.2.1 The UK banking sector 32 4.2.2 HSBC – overview 33 4.2.3 HSBC Strategy for risk management 33 4.2.4 Hypotheses 38 4.3 Analysis of Results 43 4.4 Chapt er Summary 49 Chapter V: Conclusion & Recommendations 5.1 Conclusion 50 5.2 Recommendations for further research 53 5.3 Learning outcome 53 References 55 Appendix 59 Tables and Figures Figure 2.1 Risk Architecture 17 Figure 4.1 Enterprise-wise risk management 35 Figure 4.2 Impaired loans to Gross Adnaces 38 Figure 4.3 Industry-wise credit risk 39 Figure 4.4 Credit Risk Profile 41 Chapter I: Introduction 1.1 Background Commercial banking relates to several activities such as providing products and services to the customer, engaging in financial intermediation and in management of risks (Sensarma & Jayadev, 2009). Banks have lately been reporting of difficulties faced by them but the risks taken by the banks have increased (Dedman & Robert-Tissot, 2001). For instance, the Asian financial crisis affected the performance of the region and led to an economic depression that impacted the financial institutions worldwide (Odit, Dookhan & Marilyn, 2011). Following the 2008 financial crisis, the banks reacted immediately to their capital structure concerning

Case Study (Skill Analysis) Essay Example | Topics and Well Written Essays - 1500 words

Case Study (Skill Analysis) - Essay Example Sophie Smith is a 44-year-old female who is two days post-operative, following an appendectomy. Sophie works as a real estate agent, weighs 46kgs and 168cm tall. Sophie has a story of rheumatoid arthritis and takes 10mg of prednisone daily and also has an allergy to penicillin. While changing her dressing you notice a thick yellow discharge oozing from the wound. Wound management following an appendectomy is essential for the complete recovery of Sophie. A comprehensive assessment of the present state of the wound is necessary as well as the stage of healing. Thus, it is important to obtain information from the client about factors that may affect wound healing. Consent is necessary so that nursing procedures can be carried out and prioritized according to the patient’s needs. The nurse’s role in wound management is critical not only to wound management but to maintenance of aseptic technique while doing nursing care. Identify and discuss the importance of obtaining inf ormation during a nursing admission in relation to post-operative assessment.The process of obtaining and communicating information during a nursing admission also refers to the nursing assessment and these can be obtained from the client, significant others, health team members, and client’s medical records (Funnell, Koutoukidis& Lawrence, 2009, p. 229). Obtaining information during a nursing admission is important in identifying areas needing nursing interventions. Obtained information may either be subjective or objective and includes nursing history, physical examination and observation, and laboratory and diagnostic tests. Applying Sophie’s case, obtaining information during a nursing admission requires explanation of the purpose and rationale for gathering information. Sophie must also be put in a quiet and private place for ease of patient during personal information gathering. Information such as medical diagnosis, previous admission to the hospital, clientâ₠¬â„¢s perception of condition, allergies, social data, activities of daily living, habits, and use of prosthesis are necessary because obtaining these information during a nursing admission will adjust the plan of care related to post-operative treatment. For instance, Sophie has a history of rheumatoid arthritis, takes 10mg of prednisone daily and has allergy to penicillin.These information has relevance to post-operative treatment as rheumatoid arthritis impairs healing, can cause deformities, and increase pressure on the soft tissues leading to increased risk of skin breakdown. Prednisone is a corticosteroid which also delayed healing by interrupting cellular division (Guo and DiPietro, 2010, p. 219). Sophie has allergy to penicillin and its significance include not giving Sophie penicillin to avoid allergic reactions and tests other antibiotics that will not produce allergic response because antibiotics are essential for wound healing and combatting infection. Identify and discu ss the nurse's role in consent procedures for patients undergoing a procedure involving general anesthesia.Surgical and invasive procedures involving administration of general anesthesia requires written consent. Nurses play a major role during consent procedures. Nurses provide the needed information of the individual and make sure that it is well-understood prior to administration of

Thursday, August 22, 2019

Integrating learning styles Essay Example for Free

Integrating learning styles Essay Facilitators use different learning styles such as auditory, kinetic, and visual methods to enhance each student’s ability to grasp material the simplest way possible. Through research, instructors have adapted many instructing methods to tap into each student’s learning style without alienated other strategies necessary for various learners. Auditory strategies may include speeches, tapes, or auditoria tutorials so the students can complete their work as they listen to the facilitator’s instructions thoroughly (Felder and Soloman, p.1). Instructors should emphasize the key words during their speeches to trigger the student’s critical listening skills. The keywords of the speech should be relative to their new material, but it must advise them on how to carry out the motions as well (Family Education, p. 2). As in online tutorials, the student must be able to hear the instructions and place the instructions in action by kinetic learning methods. Kinetic methods can include on-hands learning opportunities such as drawing, playing, or writing. An example of this would be to write out the format of a mathematical equation. The students learn to articulate the mathematical structure of the equation in order to answer the question more thoroughly (Felder and Soloman, p. 2). Instructors can use hands-on applications to break the barrier between the textbooks and the information’s overall objective. For instance, an electrical engineer must use their knowledge in the field in order to work diligently through their coursework. It is very important to give the students a chance to have a complete understanding of what their class material is about through kinetic methods. Visual instructions show students how to replicate the sequence for a given answer (Family Education, p. 1). For example, a student must know the basics of a mathematical equations in a more, in-depth way to capitalize on the verbal (auditory) and kinetic (working out) aspects of the subject matter. Reference Cited Felder, R. M. and Soloman, B. A. Learning Styles and Strategies. North Carolina State University. Retrieved October 25, 2006 from http://www. ncsu. edu/felder-public /ILSdir/styles. htm. â€Å"Visual, Auditory, Kinesthetic Learners. † (2006). Family Education. Retrieved October 25, 2006 from http://school. familyeducation. com/intelligence/teaching-methods/38519. html.

Wednesday, August 21, 2019

Devoted For Multi Vendor Network

Devoted For Multi Vendor Network 1 Introduction This document is comprised of two chapters, one each for two case studies given in the assignment. First chapter defines the diskless workstations and introduces the characteristics of diskless workstations. It also introduces the choices available in the thin client market. First chapter also discusses on how to choose an operating system for the diskless workstations. Later in the chapter, a discussion is made on interdependence among workstation and network hardware, when it comes to implementing diskless workstations in the network. Chapter two is devoted for multi-vendor network concept/ Strategy. First, it discusses the pros and cons of multi-vendor networking systems. Then it evaluates the impact of current network technology and standards. Furthermore the chapter contains a discussion on how network protocols facilitate multi-vendor networks. In the final part of this document the role of the software and hardware components and also the guidelines for selecting server types for multi-vendor networks is also discussed. 2 Case 1 Task 1.1 a) Diskless Workstations Diskless workstation is a computer system with no disk drives installed locally; therefore booting its operating system from a server in the local area network. Sometimes when a computer system is having a disk drive but do not using it, that system is also called a diskless workstation. Diskless Workstations provide less costly but more secure networking solutions for enterprises. Characteristics of diskless workstations are, The operating system is loaded from the server when booting up. Obviously all the other software resides in the server. (Firmware is installed on the diskless workstations itself to initiate the boot process) Processing is done in the diskless workstations, not in the server. In some implementations, processing is also done on the server and those diskless workstations are originally called Thin clients. Both the raw data and processed data are stored in the server. Diskless workstation fetches them when needed. Choices available on the market Conventional Diskless workstations with lower processing power and memory. E.g. Dell Wyse R Thin client High performance Thin clients like HP t510 Flexible Thin Client Server choices Almost all the Linux flavours such as Ubuntu, openSUSE and etc. supports network booting and therefore can be installed on our centralized server. Also windows XP, Vista, 7 and 8 supports booting over the local area network and therefore those operating systems can also be deployed. There are user friendly third party software available in the internet to facilitate easy deployment of diskless workstations in the company networks. When choosing an operating system for the diskless workstations following facts can be considered. Linux Operating systems and the software are totally free, whereas windows operating systems cost hundreds of US dollars (Agrawal et al, 2005). Linux supports many more processor types and architectures than windows does. Since Linux is open source, an experienced IT administrator can change the behaviour of operating system as needed. Linux is extremely stable. It offers a feature called memory protection which prevents a crashed application from crashing the entire system (Agrawal et al, 2005). Linux offer more security than windows does. Linux doesnt have viruses and malwares as windows and therefore the server can operate freely without a danger to its operating system or data stored in it. Linux outperforms windows when it comes to multi user workstations. But sometimes Linux is more resource hungry than other workstations (Agrawal et al, 2005). Both Linux and Windows supports multi-tasking. b) Interdependence of workstation hardware with other network components Diskless workstations have their operating systems in the server. When workstation needs to use a network component like a printer, the server will have to communicate with that network component. I.e. server has to communicate on behalf of all the diskless workstations. This can lead to congestions and increase in traffic. Also, all the network computers are using the server hard disk, CPU, Memory and etc. workstation (Client) hardware has to wait until server hardware provides the data it requested. So the bottom line is deploying diskless workstations/ Network computers in the network will increase the Interdependence of workstation hardware. Therefore it is very important to install reliable hardware and software components in the server, and implement backup techniques and redundancy techniques for the server. Task 1.2 a) Benefits and constrains of different network topologies Network topologies characterize the way in which network elements (Nodes) are interconnected to each other in a network. There are four standard network topologies to be identified. (Tanenbaum 2006) 1) Bus topology 2) Ring topology 3) Star topology 4) Mesh topology Bus topology All the nodes are connected to a single cable called a Bus. Benefits 1) Easy to implement 2) Requires less cable length, and therefore it is cheaper 3) If a node (Computer) fails, that does not affect others Constrains 1) Suitable only for networks with few computers (Lowe 2008) 2) If the cable breaks from a point, entire network will fail Ring Topology Network nodes are connected as a ring. When two nodes are communicating, data must travel through all the intermediate nodes (Lowe 2008) Benefits 1) Easy to implement 2) Easy to troubleshoot Constrains 1) If a node fails, entire network will fail Star topology Each and every computer is connected to a hub or switch. Benefits 1) Centralized nature gives simplicity (Easy to troubleshoot) (Lowe 2008) 2) If a node (Computer) fails, that does not affect others Constrains 1) If the hub fails, entire network fails 2) Require more cable lengths Mesh Topology Each and every node is connected to each other Benefits 1) Offers redundancy 2) Easy to troubleshoot 3) Multiple conversations can take place at same time Constrains 3) Waste of resources 4) Require more cable lengths and therefore expensive Network computer was originally a trademark of Sun Microsystems for their diskless workstations. Later this term was used for all the diskless workstations. Thin client is also a diskless workstation, but unlike diskless workstation, thin client does the processing on the server. For network computers and thin clients, mesh topology is not suitable. In mesh topology all the clients are connected with each other, but these connections are useless. Since the server is connected to all the clients and server has the files and processed data, it can directly transfer them to the desired destinations. Bus topology and ring topology are too risky and it is also a waste of resources. If the network has the star topology; i.e. each and every diskless node is connected to the centralized server using a dedicated path the resources will be used in an efficient manner. b) Impact of current network technology on network computers One can think, if the files are stored on a remote server, then to access those files from the thin client will take more time than a normal workstation does. Also in one particular implementation of a thin client all the processing is done in the server. But thanks to the modern LAN technologies that is not a problem at all. Gigabit Ethernet provides 10-100 gigabits per second data rates within the LAN. Also in the last decade hard disk drives and processors evolved a lot giving greater speeds, memory capacities and performance to the network. Since all the clients are storing their data on central server, server needs to have high capacity hard disks with higher access speeds. Also the technology has become cheaper over the time. These facts really help the evolvement of network computer concept. c) How network protocols enable the effective utilization of Network computers It is evident that a network with diskless workstations/ Network computers has much data to be transferred back and forth between the server and itself than a network with normal PC workstations. So there will be more traffic in the network and almost all the time server will be accessed by many client workstations. This will lead to collisions and collisions will trigger retries from the clients and that will also add up to the network traffic, thus making exponential growth of the traffic. Therefore an impressive multiple access protocol is needed for the network, in order to effectively utilizes the true strength of network computers. TCP/IP protocol stack provides a powerful multiple access technology in its data link layer. Ethernet, fast Ethernet and Gigabit Ethernet are some of the most important physical layer protocols that enable fast communication between network computers. 3 Case 2 Task 2.1 a) Benefits and constrains of Network systems and topologies in multi-vendor networks When a network evolves with the time the enterprise would want to purchase more equipment for the network. But by now there may be cheaper products in the market, from other vendors than your original vendor. So multi-vendor networks can save initial cost for the evolved network. Also when a new technology is introduced by a different vendor, that saves time and cost, it is good to purchase those equipments than sticking to the same vendor. Different vendors have different configuration changes, different user interfaces different terms and etc. Therefore working in a multi-vendor system is a harder job and requires more expertise and experience. Also it will require training programs for existing professionals and it may demand more IT professionals for the company. If we consider star topology, each node is connected to the hub or switch. Therefore at most only two nodes of different vendors will be communicating with each other physically. But if we take mesh topology, the situation is different. Each node is connected with every other node in the network. Therefore a machine built by a particular vendor will have to communicate with many more machines manufactured by different vendors. b) Impact of Current Network Technology for the multi-vendor networks New network operating systems are compatible with each other. Services are built in to those operating systems and therefore they can co-exist after little or no configuration changes are done. Network protocols are standardized by IEEE to maintain consistency in networking devices and operations. This facilitates the multi-vendor network environments to grow popularity. c) Duty of Network Protocols in multi-vendor network environments Different network components may have different hardware and/or software specifications. They may be manufactured by different vendors. But at the end of the day, a network administrator must be able to connect all those network components with each other and build a working network. This is achieved by the use of network protocols. (Lammle 2007) Generally todays multi-vendor networks use TCP/IP protocol stack which comprises of five layers. A layer normally has two interfaces with the immediate bottom layer and the immediate top layer. Each layer provides a set of functions to the layer above, and relies on the functions of the layer below (Kozierok 2005). Interface on the top will clearly specify the services that are available from that layer. And Interface on the bottom will clearly specify the services that required from the immediate bottom layer (Kozierok 2005). So, as long as network components manufacturers stick to this layered protocol architectures, it does not matter how the hardware work, what are the hardware and software specifications inside and etc. d) Role of software and Hardware in multi-vendor networks Different vendors will implement the same process using different hardware units with different performance. Even though the hardware is vendor specific, sometimes same software can be installed on them and then the user will have the same interfaces and that will hide the complexity induced by the multi-vendor network for some extent. But sometimes the vendor itself develops the software that runs on its hardware and that will increase the overhead of remembering configuration settings and menu items for different vendors. So in a multi-vendor network environment the job of the hardware would be to perform the task in a unique way with its available hardware chips and processing powers. The job of the software is to control the unique hardware as needed but presenting common configurations settings and interfaces to the user. e) Server types for multi-vendor networks When selecting a server for a multi-vendor network environment, the IT administrator must take into account the vendors that are in the network. Some vendors are interoperable while some are not. Server can be used to make communication possible among those non interoperable vendors and that technique is called Server Interoperability. This is accomplished by installing communication services on the server as opposed to the other approach where software are installed on the clients to make communication compatible. This way we can connect an Apple Macintosh client to a Windows network environment. Microsoft Windows provides software that facilitates network services for Apple Macintosh and Linux clients. Some modern servers have these services built into them, so that the network administrator doesnt have to worry about it. 4 Conclusion From this assignment I was able to sharpen my knowledge on Diskless workstations and thin clients. I identified the characteristics of diskless workstations and the choices available on the market; both in hardware aspect and in software aspect. I discussed about the network operating systems available for the diskless workstations and also about the interdependence of workstation hardware in the context of networks with diskless workstations. Also, in order to provide answers for task 2, I studied about the advantages and dis advantages of multi-vendor network Strategy. Then I discussed the impact of multi-vendor network Strategy on current network technology and standards. Also I studied about how network protocols enable machines of different vendors coexist in the same network. Also I did a small research about selecting a server for a multi-vendor network environment and about the role of software and hardware in a multi-vendor network. That was really helpful for me and the results were introduced in the latter part of the assignment.

Monday, August 19, 2019

Grandmas House Essay -- Descriptive Essay About A Place

Grandma's House My most distinct childhood memories are at my Grandma Darlene's house, a quaint trailer on the edge of Anderson. Grandma lives near the end of a tiny little dirt road and has lived there for more than thirty years. We can barely get through the door because there are mountains and mountains of boxes, clothes and barrels filled with who knows what. At the bottom of all that there is a fairly large wooden rocking bench, my great uncle made right before his wife died. Cushioning these layers upon layers of junk is a nasty, old, mated scrap of carpet. The carpet is a burnt orange, calico color that has been stepped on and had people's shoes wiped off on more times than a welcome mat. Bordering the side of the porch is a barbecue from what looks like it is from the 1950's. It's all charred and where the black paint once was now is a thick coating of orange rust. In the corners there are millions of spiders that have taken up residence. Once we conquered the spiders and climb over the massive piles of boxes, we open the spring loaded door and the smell of coffee and burning wood rushes over us. As we entered the living room we traveled back in time, to an old yet still messy Victorian house. In front of the door the floor is tile; four or five of the tiles are broken where my Papa dropped a hammer years ago. As we move deeper into the living room the floor changes to a gray carpet with yellow and brown stains in many different places. The big windows are draped with large lacey curtains and doilies surround the coffee table and all the sides' tables. We bounce down on a blue floral couch and set our stuff on the oak wood coffee table that is less than ten inches from our shins. Beneath this table there are golden po... ...ig would scream over and over again until the lid was shut. Then in would come Grandma with her hands on her hips looking at us like we were so silly. In the end we would always get a cookie. My Grandma Darlene's house is the simplest, homiest, and most wonderful place I could ever imagine. Her place might not seem like much but it's the little things that are most important. Her house contains so many of my fondest memorize. When I'm busy, angry or just frustrated, I wish and think back on the times when Ashley and I would dump the whole box of lucky charms all over the floor and only the marshmallows. It the simple things I miss like watching Scooby-Doo in my PJ's on Sunday morning, making sparkly crafts and play baseball. All of these fun thing where done at my grandma's and I'm sure there will be a lot more to do when I go over there this Thanksgiving.

Sunday, August 18, 2019

Essay --

Air superiority will continue to be vital for the preservation of the U. S. Military well into future contingency operations. Airpower is one of the military’s greatest strengths providing global reach and deterrence, and will continue well into the time to come. However, the traditional air missions of air combat and bombing are being replaced by Unmanned Aerial Vehicles (UAV’s) and intelligence, surveillance, and reconnaissance (ISR) capabilities only imagined in the past. UAV’s are not only in great demand by forces deployed in Afghanistan, they are also at work in a wide range of civilian applications, from law enforcement surveillance to mundane tasks such as checking remote pipelines or monitoring livestock. 1 The demand is so high that it surpasses supply, which naturally means fast track development of new systems, to meet the needs of increasing requirements. 2 For example, Lockheed Martin is developing a football sized UAV that can fly in and out of the water. This adds to the reach of a submarine by having its own fleet of small flying UAV’s that can search a grid the ...

Saturday, August 17, 2019

Virgin Corporate Strategy

VIRGIN’S GROUP CORPORATE STRATEGY DIVERSIFICATION 1. Introduction The Virgin Group is one of Britain’s biggest and successful empires in the 21st century. The company has successfully incorporated a great number of diverse industries under the Virgin brand. This includes travel, mobile, financial services, leisure, cosmetics, retail, and music businesses. Virgin has been able to dominate the British market and has therefore continued to rapidly expand into other regions such as the United States, Canada and Australia. The enterprise was founded by Sir Richard Branson in 1970 as a simple mail-order record retailer and has grown into one of the most prosperous business empires in the business world. To date, the Virgin Group has globalized and established in over 200 small to mid-sized firms, employing over 25,000 people. As a result, the company has exceeded over $7 billion in revenue in 2002. Each one of Virgin’s 200 firms operates as a single entity. Branson either holds ownership of a firm as CEO, or has a minority or majority stake. The Virgin Group does not hold a hierarchal presence within the empire, which allowed its various subsidiaries to operate in an autonomous manner. 2. Richard Branson: The strategic thinking As the creator of Virgin and a famous personality around the world, Richard Branson has created an entrepreneurial culture that is carried throughout the Virgin group of companies. His anti-corporation and anti-bureaucracy spirit resulted in a flat organizational structure with transparency and quick communication; his loyalty and care for friends let to an organization with great employee focus, and also attracted some of the best people to work for him for a moderate salary. Looking into his kind of strategic thinking, we can see that it is characterized by having a strong relationship with risk. His attitude towards risk is explorative, willing to take risks in order to enter into completely new businesses that the company knew nothing until now. In addition to this, their type of thinking, as an mage of their leader, is characterized by being intuitive, requiring no systematic risk analysis, based largely only in the rapid perception of alternative strategic intuition. This kind of thinkers are formerly known as entrepreneurs but in this situation combined with a strong social component as Sir Richard Branson often uses himself to convey the group’s message into the media or as a tool to promote the group’s brand. Is this kind of strategic thinking that explains the high level of unrelated diversification of the group that we are exploring in this report. 3. Organizational Analysis and Corporate Strategy Values The Virgin Group’s overall brand identity is built upon the founder Richard Branson’s philosophy which states that â€Å"if you keep your staff happy then the customer will be happy, and if you keep the customer happy then the shareholders are happy†, â€Å"shape the business around people†, â€Å"Build don’t buy†, â€Å"Be the best, not the biggest†, â€Å"Pioneer, don’t follow the leader† or â€Å"staff first, then customers and shareholders† are some the main guidelines of Richard Branson and we can see it as some of the company values. This underlying belief transcends into each one of Virgin’s subsidiaries and into each individual organizational culture. This is evident in the way in which members of the Virgin group interact with one another, as it is apparent that all members at Virgin agree strongly about certain beliefs, values, and assumptions, which are reinforced within the company. Virgin has continually retained a strong belief that it is their employees who: deliver brilliant customer service; give the company its personality, shape its culture, and innovate. They are viewed as Virgin’s greatest asset and as such, management believes that employees should be treated with respect. Management looks after their employees’ welfare and allows them the freedom to grow and be themselves. Virgin actively encourages personal expression, whether it is in their speech, creative and conceptual thinking, or dress code. It is these fundamental values and beliefs that have allowed Virgin to thrive in such a competitive environment, challenge new opportunities and excel in its markets, while still continuing to operate with integrity. As we know the core competencies of a company should meet three requirements: -Significant value creation for the clients Difficulty of imitation by competitors -Access to new markets As we look into Virgin we can see that each subsidiary shares a set of values that are continually strengthened: value for money, excellent quality products, brilliant customer service, innovation, competition and consistently having fun throughout the process. Virgin would only put its name to a project if it met four out of five criteria: it must be innov ative, challenge authority, offer value for money by being better than the competitors, be good quality, and the market must be growing. In such a large conglomerate empire as the Virgin Group, these broad set of fundamental beliefs continually work to strengthen the company’s brand as well as its culture. 3. Corporate Strategy formulation: Diversification Entering new markets using the brand Virgin is the strong asset of the group. Diversification is the name of this process in which Virgin leveraged his brand recognition as a form of growth strategy for the company. It seeks to increase profitability through greater sales volume obtained from new products and new markets. There are two kind of reasons for which a company look for diversification: – Defensive reasons which may be spreading the risk of market contraction, or being forced to diversify when current product or current market orientation seems to provide no further opportunities for growth. – Offensive reasons may be getting into new positions, taking opportunities that offers greater profitability than expansion opportunities, or using retained cash that exceeds total expansion needs. Instead of focusing in increasing the main competencies of their initial core business Virgin focused in diversifying risk acquiring new skills, new techniques and new facilities hence through an offensive strategy. Therefore, they followed not the internal development of new products or markets or acquisition of new firms but alliance or joint ventures with a complementary company which could enable them to operate in a new and unrelated market based on a set of attributes and values rather than a market sector. It was about being the consumer's champion! We can all this type of strategy as Conglomerate diversification (or lateral diversification). The corporate strategy of the Virgin Group is to operate like a venture capital firm based on the Virgin brand. This strategy involves non-related diversification at the individual business unit level. By leveraging on the Virgin Brand which has established prominence in the minds of consumers, Virgin is able to enter new business areas s haking up existing orders. Branson’s has entered in a business after another in which he perceived a set of consumers that were being underserved by a complacent and dominant player. The unique Virgin culture also allows Virgin to execute its ventures very effectively which were inspired in the keiretsu system as Branson was a convicted fan of the Japanese approach to business and â€Å"their commitment to long-term development and focus on organic growth†. The similarities are in a sense that Virgin is a group of companies pretty much diversified which have formal links in management and financial and also share a common identity. The formal linkages between the companies are, as we saw in the case, the ownership, the brand and the management. In order to protect the brand Virgin and Branson’s name the group is keeping some companies that are running with losses. Speaking in financials they are selling some of the most profitable companies as Virgin Records to finance the new start-ups. This is due to the fact that they identify a company operating in a segment which is clearly moving toward maturity to decline and instead of keeping it they sell moving to a new and growing market through diversification. The Virgin Group covers a wide range of industries-from Travel and Tourism (Limousines, Vacations, etc. , Leisure and Pleasure (Spa, Games, etc. ), Social and Environment (Green Fund, Virgin Earth), Beverages (wines and soft drinks), Media and Telecommunications (Radio, Broadband, Mobile, etc), Books, Clothing, Finance and Money, and Health (Health Bank, Life Care). But despite its diversification in terms of industries and products, it never diversified its brand names. All of its services and products in every in dustry have the name Virgin affixed to it. Virgin is a strong but universal brand name; so universal that many analysts believe the group should franchise to others unrelated companies. The Virgin brand made it possible to overcome barriers to entry in various industries and sectors and has been the group’s most important asset, together with Richard Branson. 4. Virgin Cola: Overview of Strategy Formulation Virgin Cola was created up during the early 1990s in a joint venture with Cott, a Canadian company that specializes in bottling own-label drinks for the UK market. Cott was looking for a major international brand that could have global appeal. That’s when Richard Branson attempted to extend the Virgin franchise into the cola market. Using the brand pattern in the Virgin Group’s diversification strategy, Branson claimed to fight the incumbents, Coca-Cola and Pepsi Cola in alliance with an organization with core competencies in this area. Within a few months of its release, Virgin Cola had a 50% market share in the outlets that sold it. As Virgin stands for value of money, quality, innovation, fun and a sense of competitive challenge they focus in the brand awareness to create the differentiation from the main competitors. Cross-promotion has been Branson's main weapon, serving Virgin Cola on Virgin Atlantic flights and (until they closed down) at Virgin Cinemas. In fact, we can see that this pattern was repeated successively in each new diversification, in each one was followed by expansions of the products markets, based either on new strategic alliances or within internal development and Virgin Cola followed the trend and also increased the portfolio and created new products (flavor expansions). The strong brand positioning and the innovative character were the key issues in the product differentiation options which can be can be explained due to the client’s linkage with the High risk perception associated with the product’s potential malfunction and the client’s low level of confidence in the choice of the product. We can also observe several stages of internationalization to countries where there was an Anglo-Saxon matrix, in this case France, Belgium, South Africa and later on the US. We can also see that there are still some actions regarding vertical integration, but more with a commercial purpose rather than operational. So far it has failed to overtake Pepsi in the UK as Richard Branson claimed it would, and unlike Pepsi or Coke it's relatively hard to find cans of Virgin Cola on sale anywhere as they have a weakness in distribution channels.

50 Cent Curtis Jackson Critical Essay

Curtis James Jackson, known worldwide as 50 Cent, is one of the most successful rappers of his time. He has produced many hits as a singer, and one of his greatest hits is Many Men. The song was produced in 2003 in the album, Get Rich or Die Tryin. 50 Cent wrote Many Men after he was caught in a shooting where he was shot nine times from his hand, legs, and his chest. He miraculously survived the shooting. Once recovered from the shooting was when 50 Cent decided to write one of the greatest hits of all time that he has ever produced. The song shows a lot of emotion since it was about the shooting that almost took his life away. He talks about how a lot of people wish death against him when he’s trying to accomplish and succeed in life as a rapper. The reason why 50 Cent wrote this song was to express himself how he felt about the fact that people wanted him dead and actually tried to take his life away. The song starts off by saying, â€Å"Many men, wish death upon me blood in my eye dawg and I can’t see I’m trying to be what I’m destined to be And niggaz trying to take my life away† (Jackson). This quote explains the distress in 50 Cent’s voice by saying these lyrics. This quote means a lot, 50 Cent lets us know that many people wish he was dead, he also reflects to the night of the shooting with the blood in his eye, and how he’s trying to become a rapper and succeed and become famous while people are trying to take his life away. Those couple of lines shows a lot of where 50 Cent comes from. As a young boy he had a very hard lifestyle, dealing drugs and robberies were part of his daily routine as he would make a living. Working on music really helped straighten him up as he focused on becoming a name in the rap industry and getting away from the drug business. There were a lot of people that had hate on 50 Cent, which led to the shooting that night and which was meant to take his life away. The beat to the song goes really well to the flow of the lyrics, and makes the listeners really get zoned in to the song and to what message he’s trying to say in it. The chorus talks about people wishing death upon him and how he doesn’t cry anymore and doesn’t look up to the sky anymore, and for the lord to have mercy on him. He makes the readers feel the pain he went through and the pain he still goes through being 50 Cent. Being rich and famous like 50 Cent doesn’t mean you have everything made for you. Having a substantial amount of fame can sometimes lead to trouble, as we saw with the accident with 50 Cent. In the chorus it says, â€Å"Many men, many, many, many, many men Wish death ‘pon me Lord I don’t cry no more Don’t look to the sky no more Have mercy on me Have mercy on my soul Somewhere my heart turned cold† (Jackson). By 50 Cent saying this, you can easily comprehend the pain he was in and the damage that will always be there with him, both physically and mentally, for the rest of his life. The beginning of the song starts off with 50 Cent and a friend talking to each other. You can then hear a car racing towards them and braking really hard, and then you hear the shots being fired. He does this to reflect back to the shooting. By doing this he lets people know what this song was meant for and why he made it. Even though it was a horrific scene, he reflects on it to show people what he’s all about and how he came back from it. The lyrics for this song come from his bottom of his heart. He expresses himself in a very unique way, something not every rapper can do. The fact that he sings about his life gives the song more meaning to it, especially since it was about him in the brink of losing his life. One of the verses that stand out the most in the song says, â€Å"Are you illiterate nigga? You can’t read between the lines In the bible it says, ‘what goes around, comes around’ Almost shot me, three weeks later he got shot down Now it’s clear that I’m here, for a real reason ‘Cause he got hit like I got hit, but he ain’t fucking breathing† (Jackson). This verse really stands out in this song. He starts off by calling out the guy who shot him saying if he’s an â€Å"illiterate nigga†, and then referring to the bible in a very straight forward manner. He then refers to the guy shooting him and how three weeks later he got shot, so that’s how the bible line comes to play. He then says how the guy got shot just like he did but the shooter actually died unlike 50 Cent, that’s how he knows he’s meant to be in this world and things happen for a reason. By referring to the bible in that verse, it shows how 50 Cent is close to God and that he has a relationship with him. He uses another line in his song that refers to God and he says, â€Å"Every night I talk to god, but he don’t say nothing back I know he protecting me, but I still stay with my gat†. Once again this shows how he has a relationship with God. Mentioning God in a song must be really special for him. Even though he says how he knows he’s being protected by God, the line after that means that he still carries a gun with him. This shows how the incident really got to him to the point where he needs to carry a gun with him to feel safe even though he knows God is protecting him and by his side. Overall the song Many Men in the album Get Rich or Die Trying was an absolute success. 50 Cent expresses his feelings in a very unique way to the people about an incident that almost took his life away. As we may know now, 50 Cent is in this world for a reason. He would always be remembered as one of the greatest rappers of all time and for the name that he made for himself. Like he says in his song, â€Å"You can call me the Don†.

Friday, August 16, 2019

Life Dosen’t Frighten Me Essay

The speaker takes on the stance that she is fearless against common fears in life She deals with her fears in an imaginary sort of way. She faces them with a magic charm ‘ that she keep[s] up [her] sleeve, not in a realistic way by marching up to them and facing them with courage, for example. The author denies that she actually has any fears. Magic, the way she deals with her fears , is not real therefore I believe she is in denial of her fears I don ‘t think the author is afraid of what anything in the actual poem I think that she has probably already faced and conquered these particular fears or been subjected to them at some point already in her life. This is why she does not fear them because they are not unknown. The author should not be afraid of these fears because they are mostly childhood fears I think she strongly refused to be afraid of them because they are childish fears If the author was actually afraid of shadows, noises, ghosts, dogs being alone, stranger s, and boys, I ‘d take it that she was very childish in her manners and had not been exposed to much in her life . While most children fear these things initially , they grow up and overcome those fears as they face life. I think that if the writer were to be afraid of these , she may possibly be classified in a stereotypical manner of a young girl , but certainly not a woman , especially in the twenty first century where woman ‘ suggest strength and power almost equal to that of man. However, girl ‘ still holds the stereotype of weaker frailer, and in need of being protected (from things such as fears I do not find it interesting at all that of these things frighten the speaker. I think the speaker is trying to be convey strength, but it is such an immature strength , that it is a very weak argument. According to the fifth stanza , the speaker seems to be saying that boys are nasty brutes who pick on the girls who appear to be extremely girly. The speaker probably fits in physically and stereotypically with the children , but mentally, emotionally, and intellectually she is older since she can detach herself from life . She is more artistic and free in that sense than her peers. Other indicators that the speaker is fearless is how she makes the ghosts go away I go boo. Make them shoo ‘ and her sense that anything is possible I can walk the ocean floor. And never have to breathe. Strangers in the dark frighten me slightly as do panthers, but only if they are loose.

Thursday, August 15, 2019

Constitutional Commissions of the Philippines

Civil Service Commission FUNCTIONS: The Civil Service Commission has the ff. powers and functions: 1. Administer and enforce the constitutional and statutory provisions on the merit system. 2. Prescribe, amend, and enforce suitable rules and regulations for carrying into effect the provisions of the Decree. 3. Promulgate policies, standards, and guidelines for the Civil Service adopt plans and programs to promote economical , efficient, and effective personnel administration in the government. 4. Supervise and coordinate the conduct of civil service examinations. 5.Approve appointments, whether original or promotional, to positions in the civil service. 6. Inspect and audit periodically the personnel work programs of the different departments, bureaus, offices, agencies and other instrumentalities of the government. 7. Hear and decide administrative disciplinary cases instituted directly with it or brought to it on appeal. 8. Perform such other functions as properly belonging to a ce ntral personnel agency. NUMBER OF COMMISSIONERS: Civil Service Commission is composed of a Chairman and two Commissioners. QUALIFICATIONS: 1. They must be natural-born citizens of the Philippines . They must be at least 35 years of age at the time of their appointment (rather than assumption of office)3. They must be persons with proven capacity for public administration. Knowledge of law or experience in the practice of law is not required by the Constitution presumably because the position calls more for administrative ability rather than legal competence. There must be a showing that they have been in the service as an effective public administrator. This is necessary because the Commissioners are responsible for an agency that performs significant functions . They must not have been candidates for any elective position in the elections immediately preceding their appointment. This requirement insures the political neutrality of prospective appointees and effectively precludes th e appointment of political lameducks. TERM: 7 years of term without reappointment †¢ Commission on Elections FUNCTIONS: The  Commission on Elections  has the following powers and functions: 1. Enforce and administer all laws related to the conduct of elections, plebiscite, referendum and recall. 2.Judge all contests relating to elections, results, and qualifications of all elective regional and provincial and city officials; 3. Deputize law enforcement agencies of the Government, including the Armed Forces of the Philippines, to ensure free, orderly and honest elections; 4. Register and accredit political parties; 5. Recommend to the Congress effective measures to minimize election expenses and prohibit all forms of election frauds and malpractices, political opportunism, guest or nuisance candidacy or other similar acts; and 6.Submit reports to the President, the Congress on the conduct of each election, plebiscite, referendum or recall. NUMBER OF COMMISSIONERS: The Commis sion on Elections is composed of a Chairman and 6 Commissioners. QUALIFICATIONS: 1. They must be natural-born citizens of the Philippines. 2. They must be at least 35 years of age at the time of their appointment. 3. They must be at least holders of a college degree. 4. They must not have been candidates for any elective position in the immediately preceding elections. TERM: 7 years of term without reappointment Commission on Audit FUNCTIONS: The  Commission on Audit  has the following powers and functions: 1. Examine, audit and settle, in accordance with law and regulations, all accounts pertaining to the revenues and receipts of aid expenditures or uses of funds and property of the government and all government-owned or controlled corporations; and 2. Submit to the President and the Congress an annual financial report of the government including government-owned or controlled operations, and recommend measures necessary to improve their efficiency and effectiveness.NUMBER OF C OMMISSIONERS: The Commission on Audit is composed of a Chairman and 2 commissioners. QUALIFICATIONS: 1. They must be natural-born citizens of the Philippines. 2. They must be at least 35 years of age at the time of their appointment. 3. They must be certified public accountants with not less than 10 years of auditing experience or members of the Philippine Bar who have engaged in the practice of law for 10 years. 4. They must not have been candidates for any elective position in the elections preceding their appointment. TERM: 7 years of term without reappointment

Wednesday, August 14, 2019

Critiquing nursing research Essay

Through the Nursing and Midwifery Council (NMC) code of professional conduct (NMC, 2004) nurses supply high standards of care to patients and clients. One code nurses adhere to is clause 6 which pronounces nurses must maintain professional knowledge and competence, have a responsibility to deliver care based on current evidence, best practice and validated research (NMC, 2004). Validated research involves critiquing and acquiring the skills of synthesis and critical analysis, this enables nurses to distinguish the relationship between theory and practice in nursing (Hendry & Farley 1998). This assignment will critique the research paper â€Å"Patients’ case – notes: look but don’t touch† written by Bebbington, Parkin, James, Chichester and Kubiak (2003) (Appendix 1) using Benton and Comack’s (2000) framework (Appendix 2). This was selected because of the publicity that surrounds hospital acquired infection (Barrett, 2005). TitleThe framework suggests the title should be concise, informative, clearly specify the content and indicate the research approach. The title of the paper is concise; however it gives no information of content or research subject. Moreover the research approach is unidentified consequently the reader is unsure what kind of research has been performed, perhaps an alternate title could have been â€Å"Case notes, do they pass infection: A quantitative study†. This may indicate that the authors have not used a standard format which Benton (2000) states reports should follow; nevertheless the title captured the imagination of the reader and warrants further reading. AuthorsAccording to the framework, the author(s) should possess appropriate academic and professional qualifications and experience; this according to Carter & Porter (2000) establishes integrity. The qualifications and experiences of the authors are not documented. This could indicate the authors have no relevant qualifications or experiences in this field. However further reading identifies where the authors work which could be relevant to their subject, although there is no indication of their occupation. However the reader performed an online search and found the authors have had previous papers published suggesting research experience,  which gives confidence in their abilities. AbstractThe framework states an abstract should be included, should identify the research problem, state the hypotheses, outline the methodology, give details of the sample subjects and report major findings. The abstract is included and is outlined which makes it distinctive and captures the attention. Burns and Grove (2003) states this helps to influence the reader to read the remainder of the report. Additionally a distinctive abstract is beneficial for a rapid summary (Parahoo, 1997). The search question is included and is noticed immediately on the first line. Also incorporated are the methodology, sample subjects and major findings. Yet they do not state the hypothesis. The abstract is clear and precise which gives the reader belief in the capability of the researches. IntroductionThe framework indicates the introduction should clearly identify the problem, include a rationale and state any limitations. The problem is identifiable and the rational is included, nevertheless the reader would have liked to see these presented earlier in the introduction. Dempsey & Dempsey (2000) concur and states the research problem should be identified early and Polit & Beck (2004) add that readers profit from learning the problem immediately. The authors did not indicate any limitations which could suggest inexperience or could question their professional responsibility (Polit & Beck, 2004), however the reader perceives a limitation as being only one study of hospital inpatients notes have been reported thus only one study to compare findings. Literature reviewThe, framework indicates the literature review should be current, identify the underlying theoretical framework, produce a balanced evaluation of material and to look for absent references. The authors’ literature reviews produce twelve references which range from 1967 to 2002, four were classed as outdated (Burns & Grove, 2003) and nine were classed current. Although the reference from 1967 is outdated it is reasonable the authors included it since it is the only research paper found on their particular subject. However this causes the reader to speculate the reason this subject was studied. Because the authors and the reader did not  discover any other literature concerned with the subject this, could indicate that the authors’ literature search was comprehensive which could prove validity of the study. However it is wondered if other researches believed case notes were irrelevant compared to other objects in the hospital or if this is ground breaki ng research. Improvement could have been made by the authors including the search engines they had used as this would allow replication and evaluation of the paper. The literature the authors cited used a quantitative approach as did the authors themselves thus identifying and employing the underlying theoretical framework and giving credibility to the paper. Cutlcliff & Ward (2003) suggests the literature review guides the researcher in discussing the results of the study in terms of agreement or non agreement with other studies, however there is no evidence of evaluation of material that supports or challenges the position being proposed .This suggests the researches appear to have only reported the finding of other studies and not examined the material, which, Peat (2001) states is essential for making decisions about whether or not to change practice on the basis of published report. The outcome is a research paper without critical analysis which Beyea & Nicoll (1998) states is central to the delivery of evidence based patient care. Following duplication of the researches literature search using their keywords the reader could find no important references omitted which leads to the belief that they performed the search methodically. However it was discovered that one important reference in the text (Semmelweis) had been omitted in the reference list. This leads the reader to question if other things may also have been omitted resulting in an unsound paper. The hypothesisThe framework asks if the hypothesis is capable of testing and if the hypothesis is unambiguous. There is no hypothesis in the paper only a research question. Cormack (2000) states that hypothesis can only be stated for studies which predict a relationship between two variables. Polic & Becks (2004) concur and believe hypotheses are predictions of expected outcomes. Since the authors do not state an expectation of the outcome they did not need to incorporate a hypothesis. This could suggest an understanding of research giving the reader faith in their capabilities. Operational definitionsThe framework suggests the terms used in the research problem should be clearly defined. The terms that the author’s employ are clearly defined and can be found effortlessly. Nevertheless they are very limited in respect of the paper and the reader speculated how they found eleven of the twelve references using the keywords since they related to other objects. This could indicate that they decided upon key words prior to performing the literature research, thus limiting their search (Tarling & Crofts, 2002) which questions the validity of the paper. The reader searched Blackwell Synergy using own keywords such as hospital equipment, contamination and bacteria. Many more articles were discovered indicating the authors did not perform an adequate literature search. MethodologyThe framework indicates that the methodology should clearly state the research approach, appropriate to the research problem and if strengths and weaknesses are noted. Although the authors do not identify the study as quantitative the reader understands that it is since it uses findings that can be measured and deals with quantity of results as opposed to interpretation (Munhall, 2001). Additionally the reader believed it is a deductive study since the authors looked at cross infection and objects in the hospital setting and narrowed it down to cross infection and case notes. No strengths or weaknesses were acknowledged, which, Byrne (1998) states is needed so the reader can ascertain if the research is valid. Furthermore the authors state they sampled the spine of the case notes because this is where most hand contact occurs while reading them, however perhaps it could have been suggested sampling the inside since in, my experience, this is where most hand contact occurs. The researches also stated they did not wash their hands until the last set of notes had been tested because it simulates the typical daily handling of notes by HCW’s. However the Department of health (2000) state before and after patient contact hands should be washed, consequently the validity of their approach is questionable. Finally the reader would have liked the researches to explain why the notes were incubated at 37 degrees since an assumption could be made that they are simulating a hospital environment. SubjectsThe framework suggests the subjects should be clearly identified in  the title abstract and methodology. In this paper there are no subjects only case notes. However the reader would have liked there to be a rationale why the authors chose case notes as this according Polit & Beck (2004) gives the reader an understanding of the strengths and weaknesses of the sampling plan. Sample selectionThe framework suggests the selection approach is congruent to the methodology, clearly stated and if sample size is clearly stated. It appears that convenience sampling was utilised though this is not clear; Burns & Grove (2003) suggest this approach should be avoided however as it provides the opportunity for bias. Since the sample selection method is unclear, it may have been inappropriate, denoting further flaws which affect the remainder of the paper. The sample size is clearly stated however but should have been included in the methodology giving the reader a reference when reading it. Data collectionThe framework asks if the data collection procedures are adequately described. The authors describe the data collection procedure as recorded and analysed. This gives the reader no understanding of how the data was collected, who document it, who interpreted it and where it was stored. This could have implications on the results since there may have been weaknesses in these areas such as the reliability of the collection tools, if the people who recorded and analysis it had training and if there could there be any contamination to the notes. Ethical considerationsThe framework asks if the study involves humans has the study received ethics committee approval, if informed consent was sought, if confidentiality was assured and anonymity guaranteed. Although the study does not directly involve human subject’s research involving personal information relating to human subjects requires the approval of the local ethics committee. (Cormack, 2000)(Royal college of physicians, 1998) The authors make no reference these three ethical codes so it is unknown if the patients agreed to their case notes being tested. This implies no consideration of ethical issues from the authors and questions what other considerations they have overlooked. ResultsAccording to the framework the results should be clearly presented, internally consistent, have sufficient detail to enable the reader to judge, and asks how much confidence can be placed in the finding. The results that the authors present are unclear and misleading since the first two lines state 227/228 case notes contained bacteria; however it continues to inform that most were â€Å"environmental†. The authors use a table to portray their results which Crooks & Davis (1998) suggests is all that is needed to convey information. However the table appears complex, confusing and impossible to understand; therefore the reader would question the internal consistency. In addition since the results are difficult to interpret the reader can not judge the reliability of the findings. Data analysisThe framework states the approach should be appropriate to the type of data collected, statistical analysis should be correctly performed, should be sufficient analysis to decide whether significant differences are not caused by differences in other relevant variables and if the complete information is reported. The authors approach was appropriate to the type of data collected since no other approach would be suitable. Nevertheless the researches do not state how they analysed the statistics so the reader can not judge any limitations. DiscussionThe framework states the discussion should be balanced, drawn on previous research, weaknesses of the study acknowledged and clinical implications discussed. The discussion is not balanced since it focus upon the findings of pathogenic bacteria on case notes and subsequently formulates assumptions about MRSA surviving on case notes without research to back this up. It vaguely draws upon the only previous research and mentions the result, which contradicts their own findings. No failings or limitations of the study or literature review are recognized implying no review or evaluation of the literature, which, according to Benton & Cormack (2000) is central to the research process. One clinical implication is discussed briefly however the reader should remember that the authors have not proved the transmission of bacteria on case notes to HCW’s hands only the potential. ConclusionThe framework asks if the conclusions are supported by the results obtained. The conclusion the authors established was the possibility of transferring bacteria, however since the results are indecipherable it is impossible to determine if the conclusions are supported by the results. RecommendationThe framework states the recommendations should suggest further areas for research, and identify how any weaknesses in the study design could be avoided in future research. There is no suggestion for further research; no weaknesses in the study design mentioned and no recommendations on how issues can be avoided. Therefore the reader believes this paper does not establish contamination from case notes, so is unreliable and lacks validity. Application to practiceThe Department of Health (2005) states Clinical governance is the system through which National Health Service organisations are accountable for continuously improving the quality of their services and safeguarding high standards of care. Elcoat (2000) adds evidence-based practice and evidence-based nursing have very strong positions in the Clinical Governance agenda of quality improvement. Evidence-based practice can be defined as using contemporaneous best evidence ensuring actions are clinically appropriate cost effective and result in positive outcomes for patients (Trinder & Reynolds, 2000). Therefore every healthcare team member has to critique evidence, assess its reliability and application before combining it with their own clinical expertise (DePoy & Gitlin, 1998). Before knowing how to critique I did not understand why nurses had to review articles and I would have taken them on face value, however since critiquing this article I have realized it is a very important part of my practice and taking articles on face value is unsafe practice. The authors discussed some important issues concerning cross infection and as a consequence I have reflected more on cross infection in my clinical area. This leads me to believe that every research paper is of value and has something to give to the reader. However the article will have little impact on my practice since the recommendation of hand washing before and after patient contact is already integrated in my nursing practice. References Barrett , S. P. (2005). What’s new in infection control? Medicine Publishing Company,33(3), i-iii. Retrieved July 5, 2006, from http://www.atyponlink.com/MPC/doi/abs/10.1383/medc.2005.33.3.iBebbington, A., Parkin, P.A., Chichester, L. J., & Kubiak, E. M. (2003). Patients’case notes: look but don’t touch. Journal of Hospital Infection. 55, (4). Benton, D., & Cormack, D. (2000). Reviewing and evaluating the literature. In D. Cormack (Ed.). The research process in nursing (4th ed.). Oxford, UK:Blackwell Science. Beyea. S, Nicoll, L. (1998). Writing an integrative review. Association ofpreoperative Registered Nurses Journal. 67, 4, 877-880. Burns, N., & Grove, S. (2003). Understanding nursing research (3rd ed.). Philadelphia:SaundersByrne, D. W. (1998). Publishing medical research. Philadelphia: Lippincott Williams &Wilkins. Carter, D. & Porter, S. (2000). Validity and reliability. In D. Cormack (Ed.), Theresearch process in nursing (4th ed.). Oxford, UK: Blackwell Science. Cormack , D. (Ed.). (2000). The research process in nursing (4th ed.). Oxford: BlackwellPublishing. Crookes, P. A., & Davies, S. (Eds.). (2004). Research into practice: essential skills forreading and applying research in nursing and health care. Edinburgh: Baillià ¨reTindall. Cutcliffe, J. R., & Ward, M. (Eds.). (2003). Critiquing nursing research. Wiltshire: M A Healthcare Limited. Dempsey, P., & Dempsey, A. (2000). Understanding nursing research; process, critical appraisal & utilization (5th ed.). Philadelphia: Lippincott Williams & Wilkins. Department of health. (2001). The Epic project: developing national evidence-basedguidelines for preventing healthcare associated infections, phase 1: guidelines forpreventing hospital-acquired infections .Journal of Hospital Infections 47 (suppl): S1-82Department of Health. (2005). Clinical Governance. Retrieved July 12, 2006,fromhttp://www.dh.gov.uk/PolicyAndGuidance/HealthAndSocialCareTopics/ClinicalGovernance/fs/enDePoy, E., & Gitlin, L. N. (1998). Introduction to research: understanding and applying multiple strategies. Philadelphia: MosbyElcoat, D. (2000). Clinical Governance in action: key issues in clinical effectiveness. Professional Nurse.18 (10). Hendry, C., & Farley, A. (1998). Reviewing the literature: a guide for students. Nursing Standard. 12(44). Munhall, P. L. (2001). Nursing research: a qualitative perspective (3rd ed.). Boston: Jones and Bartlett Publishers. Nursing & Midwifery council. (2004). Code of professional conduct. London: Nursing & Midwifery council. Peat, J. (2001). Health science research; a handbook of quantitative methods. London: Sage. Parahoo, K. (1997). Nursing research: principles, process and issues. Basingstoke: Macmillan. Trinder, L., & Reynolds, S. (2000). Evidence-based Practice. A Critical Appraisal.

Tuesday, August 13, 2019

European Law Free movements of goods (EU project) Essay

European Law Free movements of goods (EU project) - Essay Example This paper aims at critically discussing the implication of this statement through the use of decided cases and other resources. Dassonville also referred to as Procureur du Roi v Benoà ®t and Gustave Dassonville was a case that took place in the European Court of Justice. Dassonville was focused at reversing the provisions of the Royal Decree and the arguments of Procureur du Roi regarding the selling of spirits in Belgium. Belgian Act of 1927 indicated that destinations of spirit’s origins are subject to the government and such destinations of origin are officially adopted1. The Royal Decree of 1934 indicates that it is prohibited on pain of penal sanctions to display, import, display for sale, or transport for the purpose of sale, or delivery, spirits that bears a designation of origin duly adopted by the government if the spirits are not accompanied by official documents that indicate the right to such destination. Notable aspect to note is that the destination of origin Scotch whisky has been adopted by the Belgian Government. The implications of these provisions are clearly depicted in Dassonvil le case. Gustave Dassonville, an established wholesaler based in France and Benoit his son who was the business manager situated in Belgium, imported Scotch whisky which they referred to as Johnie Walker and Vat 69. Gustave had purchased the brands from the French distributors2. In order to ensure that they are sold in Belgium and that they are in line with the Royal Decree, Gustave affixed labels that had the printed words â€Å"British Customs Certificate of Origin†. This was then followed by hand written notes of the date as well as the number of the French excise bond on the permit register. The excise bond was the official permit adopted by French as the method of accompanying brands that bearded a destination of origin. However, the French government does not require a certificate that indicates the