Monday, September 30, 2019

Love and Sacrifice Essay

Sacrifice is one of the purest and most selfless ways to love someone. There is no better way to show one’s loyalty or love for another than through sacrifice. The Kite Runner clearly demonstrates the sacrifices individuals made to make the ones they love happy. In Khaled Hosseini’s novel The Kite Runner, a little boy named Hassan demonstrates love and sacrifice the most. Hassan admires Amir an immense amount and his loyalty towards Amir is always present in everything he does. He constantly sacrifices things for Amir and does whatever he can to make Amir happy and Amir’s father Baba, very proud of Amir. Hassan makes sure Amir is always pleased and does anything and everything Amir tells him to do. Hassan has an unconditional love and loyalty towards Amir that he does not falter no matter how badly Amir treats him. Hassan is absolutely selfless; to a point where he sacrifices himself for the one thing he knows Amir has craved his whole life, his father’s admiration. When Hassan goes running for the blue kite, Amir asks him to come back with it and Hassan replies â€Å" For you a thousand times over!† (pg.71). Hassan has two choices; to give the blue kite, which will consequently betray his best friend Amir, or to be punished by Assef and his friends and keep the kite. His devoted love to Amir results in a horrible sacrifice. Hassan gets raped and does not even think twice about giving up the blue kite, the key to Baba’s heart. He stays loyal to Amir even though he pays a hard price. Hassan has always taken the blame for things Amir does or farthings Amir makes Hassan do. Hassan being the selfless person he is never speaks up for himself knowing that will only get his dear friend Amir in trouble. Hassan’s final sacrifice for Amir is deliberately planned by Amir himself. Amir cannot withstand the pain and guilt of knowing that he does nothing to help  Hassan from getting raped; he is selfish and a coward. He is reminded of this every time he looks at Hassan. He thinks if he can find a way to make Hassan and his father the servants of their house, Ali will then leave and rid him of his guilt and suffering. So he plants his new watch under Hassan’s bed and then accuses Hassan of stealing it. Knowing that Hassan will never disappoint him. He waits for Hassan to respond when Baba asks him if this is true. â€Å"Did you steal that money? Did you steal Amir’s watch, Hassan?† Hassan lies †¦ â€Å"yes† (pg.111) this is another sig nificant event where Hassan put Amir before himself selflessly. Baba Is always perceived as a wise man with strong morals and opinions in â€Å"The Kite Runner†. He is not a coward nor selfish, he stands up for what he believes is right and Baba is a very brave man. This is displayed when he sacrifices his life for a woman he does not know. He stands up and says, â€Å"Tell him I’ll take a thousand of his bullets before I let this indecency take place†. (Pg. 122) This act stops a Russian soldier from raping a woman that is carrying a baby on their way to America. This shows the love Baba has in his heart to help this woman from a terrible event that would have taken place if he had not stopped it. He has shown love and sacrifice for women he does not know and that shows his good character and bravery. Although Amir had feels his father never appreciated him enough his father makes a big sacrifice for Amir. With the war-taking place in Afghanistan, Baba knows it will not be a safe place for Amir to grow up and knows he has to do something about it. He leaves everything he has behind. He sacrifices everything he has for Amir, all his belongings, and his house, and where he grew up. He leaves his life behind so Amir can have a happy and safe life in America. He does not like America but he knows it is best for Amir. He puts Amir before himself, demonstrating another one of Baba’s selfless acts. Throughout the novel, Amir has some very negative personality traits. He is selfish, demanding, cowardly, disrespectful and jealous. He does not seem like the type of person that will do something for another out of the kindness of their heart. He always thinks about himself and what he wants. He has never sacrificed anything for the people he loves. Growing up with  the memory of Hassan’s rape still fresh in his mind like a situation that has just unfolded has finally opened his eyes and makes him realize he needs to be brave for once in his life. So Amir acts. He goes back to Afghanistan to find Hassan’s son, Sohrab. Rahim Khan’s advice, â€Å"There is a way to be good again† (pg.2) helps Amir to put his feelings into action. Assef, now a Taliban officer, beats Amir up badly, but this, heals Amir of his wrong doings from the past and he takes Sohrab back to America with him to live a good life. Amir finally puts someone before himself after all the sac rifices Hassan has made for him in the past. This shows the love and sacrifice he makes for Hassan’s child knowing it is the only way he can ever repay Hassan for the years of mistreatment in their childhood. The Kite Runner by Khaled Hosseini demonstrates a very good lesson on sacrifice and love. The novel is a perfect example of the ways Jesus shows us how to live our lives. â€Å"There is no greater love than to lay ones life down for a friend†.

Early Western Philosophy of Religion Essay

of the classical three laws of rational thinking. Claiming that every proposition is either true or not true, the first law summarily excludes the possibility of a middle-of-the-road alternative between two extremes. The second law states that it is not possible for something to be both true and not true at once and in the same contextual framework. The third law ascribes specific traits to everything. In other words, no two things are similar to each other (De Riemer, 2009). Augustine, the first Archbishop of Canterbury and one of the torchbearers of the Gregorian mission, challenged the validity of the law of the excluded middle by raising questions about the moment of death, when a person is alive and yet to die. Such a brief transition, according to him, does not conform to the basic assumption stated in the law of the excluded middle, for the dying instance falls in a temporal void where this law is nonfunctional (Stump & Kretzmann, 2001, p. 112). He, however, supported the law of noncontradiction on the basis of having certitude of knowledge about a given statement. Thus, he argued that â€Å"If there is one sun, there are not two† (Ibid, p. 163). In a way, Augustine endorsed inductive reasoning to substantiate his viewpoints on the foundational laws of thought. However, when it came to analyzing the law of identity, he discarded epistemological reasoning and embraced the core of Christian worldviews. The law of intrinsic essence of every being was, according to his opinion, a hypothesis that is relative to the monistic identity of the highest form of Being, e. g. God Himself. In other words, it is possible to develop collective identity given that it finds a stake similar to God’s image (Ibid, p. 87). Cosmological accounts of creation have been put forward by many of the early as well as modern thinkers. Various scientific theories have proved beyond doubt that our universe is not infinite. This proposition is tempting enough to ask what lies beyond the periphery. St. Thomas Aquinas, the medieval theologian and one of the seminal thinkers of his time, argued vociferously in favor of God’s existence on a cosmic level. His magnum opus Summa Theologiae is considered to be one of the treasure troves of philosophical treatises on creationism. Aquinas takes natural theology as the starting point of his argument. For nature, laws of existence are not rigid. It is possible for natural things to be born and destroyed, implying that everything is and is not at the same time. But it is truly impossible for anything to outlast its own expiration. What this means is that any form of existence is preceded by another form and that this chain continues backward till the creation of something that served independent of its own necessity for the sake of its succeeding creations. That something is nothing but what we believe as God (Meister, 2009, p. 67). I, despite being an atheist, strongly endorse the line of reasoning Aquinas used to prove God’s existence. He arrived at his intended position by means of teleological assumptions and subsequent cancellations – if A is true, A cannot be not true. This method of double negation, I believe, holds the secret to success of his originative theological account. References De Reimer, H. T. (2009). Infallible Logic, A Visible and Automatic System of Reasoning. Charleston, South Carolina: BiblioBazaar, LLC. Meister, C. (2009). Introducing Philosophy of Religion. New York: Taylor & Francis. Stump, E. , & Kretzmann, N. (2001). The Cambridge companion to Augustine. New York: Cambridge University Press.

Sunday, September 29, 2019

Network security through quantum cryptography

Abstraction:Quantum cryptanalysis provides a secure means for administering secret keys between two parties on an optical web. A alone characteristic of the technique is that the secretiveness of the keys is independent of the resources available to a hacker. In peculiar, their secretiveness does non trust upon a hard mathematical job that could be solved, or a cagey algorithm that could be cracked or even some clever hardware that might one twenty-four hours be reverse engineered. In this study we focus on quantum cryptanalysis protocols and onslaughts.Introduction:Quantum Cryptography or Quantum cardinal distribution ( QKD ) takes advantage of certain phenomena that occur at the subatomic degree, so that any effort by an enemy to obtain the spots in a key non merely fails, but gets detected as good. Specifically, each spot in a cardinal corresponds to the province of a peculiar atom, such as the polarisation of a photon. The transmitter of a key has to fix a sequence of polarized photons, which are sent to the receiving system through an optical fibre or a similar medium. In order to obtain the key represented by a given sequence of photons, the receiving system must do a series of measurings. A few accounts are necessary before the full deductions of this process can be understood. A photon is an simple atom of visible radiation, transporting a fixed sum of energy. Light may be polarized ; polarisation is a physical belongings that emerges when visible radiation is regarded as an electromagnetic moving ridge. The way of a photon ‘s polarisation can be fixed to any desired angle ( utilizing a polarizing filter ) and can be measured utilizing a calcite crystal.History:The roots of quantum cryptanalysis are in a proposal by Stephen Weisner called â€Å" Conjugate Coding † from the early 1970s. It was finally published in 1983 in Sigact News, and by that clip Bennett and Brassard, who were familiar with Weisner ‘s thoughts, were ready to print thoughts of their ain. They produced â€Å" BB84, † the first quantum cryptanalysis protocol, in 1984, but it was non until 1991 that the first experimental paradigm based on this protocol was made operable ( over a distance of 32 centimetres ) . Aiming to make a web society that is safer and more convenient, Mitsubishi Electric ‘s encoding engineerings are altering the twenty-first century for the better. The secret to implementing quantum cryptanalysis is the usage of current optical fiber webs. Mitsubishi Electric has developed quantum-level engineering that enables the sensing of individual photons going through a long-distance fiber-optic communications link. This has made possible the successful execution of quantum cryptanalysis over a distance of 87 kilometres ( tantamount to the distance between Tokyo and Mount Fuji ) , a universe record. Furthermore, by uniting quantum cryptanalysis with current encoding engineerings like MISTY, it will be possible to offer high-velocity public presentation every bit good as forestalling eavesdropping.What is quantum cryptanalysis?Quantum cryptanalysis provides agencies for two parties to interchange coding key over a private channel with complete security ofcommunication. Qua ntum cryptanalysis uses individual photons of visible radiation to administer keys to code and decode messages. Because quantum atoms are changed by any observation or measuring, even the simplest effort at spying on the web interrupts the flow of informations and qui vives decision makers.Principle of Quantum CryptographyQuantum cryptanalysis solves the cardinal distribution job by leting the exchange of a cryptanalytic key utilizing conventional cryptanalysis algorithms between two distant parties with absolute security, guaranteed by the Torahs of natural philosophies. Therefore â€Å" quantum cardinal distribution † can be named as quantum cryptanalysis. Quantum cryptanalysis exploits the fact that harmonizing to quantum natural philosophies, the mere fact of encoding the value of a digital spot on a individual quantum object perturbs it in an irreparable manner, because the eavesdropper is forced to detect it. This disturbance causes mistakes in the sequence of spots exchanged by the transmitter and receiver. By look intoing for the presence of such mistakes, the two parties can verify whether their key was intercepted or non. That is why this engineering is used to interchange cardinal and non valuable information. Once the key is validated, it can be used to code informations. Quantum natural philosophies allows to turn out that interception of the key without disturbance is impossible.Quantum cryptanalytic protocols:BB84 PROTOCOL:A photon which is rectilinearly polarized has a polarisation way at 0 or 90 with regard to the horizontal. A diagonally polarized photon has a polarisation way at 45 ° or 135 ° . It is possible to utilize polarized photons to stand for single spots in a key or a message, with the undermentioned conventions: That is to state, a polarisation way of 0 ° or 45 ° may be taken to stand for binary 0, while waies of 45 ° and 135 ° may be taken to stand for binary 1. This is the convention used in the quantum cardinal distribution strategy BB84. BB84 is a quantum cardinal distribution strategy developed by Charles Bennett and Gilles Brassard in 1984. The protocol is demonstrably unafraid, trusting on the quantum belongings that information addition is merely perchance at the disbursal of upseting the signal if the two provinces we are seeking to separate are non extraneous. It is normally explained as a method of firmly pass oning a private key from one party to another for usage in erstwhile tablet encoding.Description:Note that the spot Bi is what decides which footing Army Intelligence is encoded in ( either in the computational footing or the Hadamard footing ) . The qubits are now in provinces which are non reciprocally extraneous, and therefore it is impossible to separate all of them with certainty without cognizing B. Alice sends over a public quantum channel to Bob. Bob receives a province, where represents the effects of noise in the channel every bit good as eavesdropping by a 3rd party we ‘ll name Eve. After Bob receives the twine of qubits, all three parties, viz. Alice, Bob and Eve, have their ain provinces. However, since merely Alice knows B, it makes it virtually impossible for either Bob or Eve to separate the provinces of the qubits. Besides, after Bob has received the qubits, we know that Eve can non be in ownership of a transcript of the qubits sent to Bob, by the no cloning theorem, unless she has made measurings. Her measurings, nevertheless, hazard upseting a peculiar qubit with chance ? if she guesses the incorrect footing. Bob returns to bring forth a twine of random spots b ‘ of the same length as B, and so measures the twine he has received from Alice, a ‘ . At this point, Bob announces publically that he has received Alice ‘s transmittal. Alice so knows she can now safely announce B. Bob communicates over a public channel with Alice to find which Bi? b'i are non equal. Both Alice and Bob now discard the qubits in a and a ‘ where B and B ‘ do non fit. From the staying K spots where both Alice and Bob measured in the same footing, Alice indiscriminately chooses K / 2 spots and discloses her picks over the public channel. Both Alice and Bob announce these spots publically and run a cheque to see if more than a certain figure of them agree. If this cheque passes, Alice and Bob proceed to utilize information rapprochement and privateness elaboration techniques to make some figure of shared secret keys. Otherwise, they cancel and start over.The stairss in the process are listed below:Alice generates a random binary sequences.Alice chooses which type of photon to utilize ( rectilinearly polarized, â€Å" Roentgen † , or diagonally polarized, â€Å" D † ) in order to stand for each spot in s. We say that a rectilinearly polarized photon encodes a spot in the R-basis, while a diagonally polarized photon encodes a spot in the D-basis. Let b denote the sequence of picks of footing for each photon.Alice uses specialised equipme nt, including a light beginning and a set of polarizers, to make a sequence P of polarized photons whose polarisation waies represent the spots in s.Alice sends the photon sequence P to Bob over a suited quantum channel, such as an optical fibre.For each photon received, Bob makes a conjecture as to whether it is rectilinearly or diagonally polarized, and sets up his measuring device consequently. Let B ‘ denote his picks of footing.Bob measures each photon with regard to the footing chosen in measure 5, bring forthing a new sequence of spots s ‘ .Alice and Bob communicate over a classical, perchance public channel. Specifically, Alice tells Bob her pick of footing for each spot, and he tells her whether he made the same pick. The spots for which Alice and Bob have used different bases are discarded from s and s ‘ .Examples:Let ‘s see the followers scenario, illustrated in Figure 1: Alice and Bob are linked together via a noiseless optical fibre. Eve, the eav esdropper, is capable of doing measurings on single photons go throughing through the fibre. See the instance in which Alice wants to pass on the binary sequence 00110 to Bob through this apparatus, utilizing BB84. Alice and Bob perform the stairss described in the old subdivision, detailed below. The inquiry Markss indicate spot places for which measuring will bring forth a random consequence ( 0 or 1 with equal chance ) . The whole procedure is illustrated in Figure 2, where alternatively of inquiry Markss.Alice prepares the binary sequence s = 00110, portion of which will be used subsequently as the common cryptanalytic key with Bob.Alice chooses a sequence of encoding bases at random, say b = RDRDD. ( Remember: â€Å" Roentgen † = rectilineal polarisation ( 0A ° or 90A ° ) ; â€Å" D † = diagonal polarisation ( 45A ° or 135A ° ) .Alice encodes s utilizing the bases B, to bring forth the sequence of photons with several polarisations 0A ° , 45A ° , 90A ° , 135A ° , 45A ° .Eve makes a random pick of measuring bases, eb = RRDDD.Eve intercepts each photon and measures it with her pick of footing, bring forthing a sequence of spots es = 0-10.Eve substitutes the ph otons she has intercepted, by encoding the spots obtained in the old measure with the bases chosen in measure 4. This is known as an â€Å" intercept-resend † onslaught.Bob receives the photons placed on the optical fibre by Eve, and measures them with a set of randomly chosen measuring bases b ‘ = RDDRD, obtaining eventually a sequence of spots s ‘ = 0-0.Alice and Bob compare their picks of footing and observe Eve ‘s presence with the 2nd spot, for which they used indistinguishable bases but obtained different spot values ; they discard the 3rd and 4th spot, go forthing s = 000 and s ‘ = 0? 0.The sequence of stairss in the BB84 quantum cardinal distribution strategy, in the presence of an eavesdropper. For the 2nd and 3rd spot in this illustration, Eve makes an wrong pick of measurement footing, indicated with ruddy coloured text. Bob makes an wrong pick of footing for the 3rd and 4th spot, likewise indicated in ruddy. For the 2nd spot, although Bob h as chosen the right footing ( D ) , the result of measuring does non fit the original spot encoded by Alice – this allows Alice and Bob to observe Eve ‘s presence.Attacks:In Quantum Cryptography, traditional man-in-the-middle onslaughts are impossible due to the Observer Effect. If Mallory efforts to stop the watercourse of photons, he will necessarily change them. He can non re-emit the photons to Bob right, since his measuring has destroyed information about the photon ‘s full province and correlativities.If Alice and Bob are utilizing an entangled photon system, so it is virtually impossible to commandeer these, because making three embroiled photons would diminish the strength of each photon to such a grade that it would be easy detected. Mallory can non utilize a man-in-the-middle onslaught, since he would hold to mensurate an embroiled photon and interrupt the other photon, so he would hold to re-emit both photons. This is impossible to make, by the Torahs o f quantum natural philosophies. Because a dedicated fibre ocular line is required between the two points linked by quantum cryptanalysis, a denial of service onslaught can be mounted by merely cutting the line or, possibly more sneakily, by trying to tap it. If the equipment used in quantum cryptanalysis can be tampered with, it could be made to bring forth keys that were non unafraid utilizing a random figure generator onslaught. Quantum cryptanalysis is still vulnerable to a type of MITM where the interceptor ( Eve ) establishes herself as â€Å" Alice † to Bob, and as â€Å" Bob † to Alice. Then, Eve merely has to execute QC dialogues on both sides at the same time, obtaining two different keys. Alice-side key is used to decode the incoming message, which is reencrypted utilizing the Bob-side key. This onslaught fails if both sides can verify each other ‘s individuality. Adi Shamir has proposed an onslaught which applies at least to polarisation strategies. Rather than try to read Alice and Bob ‘s individual photons, Mallory sends a big pulsation of light back to Alice in between familial photons. Alice ‘s equipment necessarily reflects some of Mallory ‘s visible radiation. Even if the transmission equipment is dead black it has some little coefficient of reflection. When Mallory ‘s visible radiation comes back to Mallory it is polarized and Mallory knows the province of Alice ‘s polarizer.Applications:Confidentiality of web communications, for illustration, is of great importance for e-commerce and other web applications. However, the applications of cryptanalysis go far beyond simple confidentialityCryptanalysis allows the web concern and client to verify the genuineness and unity of their minutess.Sensitive information sent over an unfastened web may be scrambled into a signifier that can non be understood by a hacker or eavesdropper utilizing an encoding algorithm, which transforms the spots of the message into an unintelligible signifier.There are many illustrations of information on unfastened webs, which need to be protected in this manner, for case, bank history inside informations, recognition card minutess, or confidential wellness or revenue enhancement records.Secure Video Conferencing can be achieved by Quantum Cryptography.Long-distance communications with quantum encodingWe find applications of quantum cryptanalysis in Government and Military Fieldss.The most straightforward application of quantum cryptanalysis is in distribution of secret keys.Another potentially applicable country of application is cryptanalysis: It is possible to build quantum channels that are immune to listen ining.We use quantum cryptanalysis to procure voice informations watercourse.Decision:Before two parties can direct information firmly, they must first exchange a secret key. This nevertheless presents a qu andary, sometimes called the ‘Catch 22 of Cryptography ‘ – how can the two parties exchange a cardinal in secret before they can pass on in secret? Even if the transmitter and receiving system found a channel that they believed to be unafraid, in the yesteryear there has been no manner to prove the secretiveness of each key. Quantum cryptanalysis solves this job. It allows the transmitter and receiving system to prove and vouch the secretiveness of each single key.Mentions:Cambridge Research LaboratoryScientific American magazine ( January 2005 issue )V. Makarov, D. Hjelme, Faked states on quantum cryptosystems, J. Mod. Opt. 45, pp. 2039-2047, 2001.T. Kum, I. Stork, F. N. C. Wong, J. H. Shapiro, Complete physical simulation of the entangling-probe onslaught on the BB84 protocol, arXiv.org,2006.Basicss of Network Security, PHI

Sustainable Packaging Will Require More Analysis Environmental Sciences Essay

The European Commission negotiations about how sustainable packaging will necessitate more analysis and certification to look at the existent bundle design, the stuffs that are used and the whole image of the packaging ‘s life rhythm. ( Environmental Marketing Claims, 2011 ) Bolyston ( 2009 ) has a different position and he belives that sustainable packaging dependent on the sum of sustainable energy used in each phase of the packaging ‘s life rhythm. The term ‘life rhythm ‘ means the merchandise goes through a series of phases that mold and develop the merchandise. The life rhythm would see all of the factors from the natural stuffs to how its manufactured, taking onto how its distributed which eventually guides it to the usage and disposal of it. Throughout all of these phases there would be assorted conveyance methods used to travel the merchandise onto its following phase. To sum up all of these stairss and phases is called the life rhythm of the merchandi se. It is indispensable to look at the life rhythm of packaging in order to determine countries and chances in which the packaging ‘s sustainability can be improved. Figure 8 is a diagram of the packaging ‘s life rhythm from The Sustainable Packaging Coalition ; this diagram aims to supply guidelines and rules for the development of sustainable packaging. The Sustainable Packaging Coalition claim that they have set themselves the mission to recommend and pass on a positive robust environmental option for sustainable packaging through functional packaging stuffs and systems that endorse economic and environmental supply ironss. The Sustainable Packaging Coalition characterizes sustainable packaging as follows: Is sourced, manufactured, transported, and recycled utilizing renewable energy Is physically designed to optimise stuffs and energy Meets market standards for public presentation and cost Maximizes the usage of renewable or recycled beginning stuffs Is good, safe and healthy for persons and communities throughout its life rhythm Is efficaciously recovered and utilized in biological and or industrial closed cringle rhythms Is made from stuffs healthy in all likely terminal of life scenarios Are manufactured utilizing clean production engineerings and best patterns. ( Sustainable Packaging Coalition, 2010 ) Figure 8. Diagram of boxing merchandise life rhythms The diagram above shows the procedure and stairss involved for packaging. It starts at the natural stuffs and goes to the terminal user. Each measure in this rhythm requires a signifier of energy but harmonizing to Boylston there are ways to cut this and cut down the sums used. Sustainability relies on tonss of different factors involved at each of these phases ; these factors need to be identified in order to turn to them with the right steps. For illustration if we look at stewardship, this is critical for assisting to safeguard the environment and protecting the employees that are pull outing the stuffs. The less distance the stuffs can go in the life rhythm the better, because this will intend it has taken less gasoline on transit. If we look at another facet of utilizing renewable energy at each phase this will add to do the packaging more sustainable. Reusability and recycling systems or compostability of packaging can to boot heighten sustainability. ( Boylston, 2009 ) Figure 9. Diagram of packaging ‘s upstream and downstream impacts. If we take a expression at the packaging merchandise life rhythm in a additive position we can to boot separate between upstream impacts from the extraction of the natural stuffs until the packaging is passed across to the consumer which is the downstream impacts, these are considered to be the impacts that occur through utilizing the packaging and the stairss taking to the terminal of its life. An illustration of this is the sums of energy required for the recycling procedure at the terminal of the packaging ‘s life. The different recycling methods used are composting, littering, and other possibilities are waste-to-energy workss which means energy can be produced once more from the waste merchandise. A life rhythm appraisal is normally used as a tool to analyze the life rhythm of packaging. The purpose of a life rhythm appraisal is to compare the full scope of societal and environmental amendss, which can be identified to merchandises or services, so least troublesome one, can be selected. There are tonss of different types of life rhythm appraisals know with different Scopess. The range varies from cradle to gate to cradle to cradle attacks and furthermore there are types such as the LCA procedure that addresses the environmental inputs and end products compared to other attacks that address the economic inputs and end products. Now that I have described the packaging life rhythm, we furthermore need to advert that companies such as 3M or Wal-Mart are presently developing their ain definition or usher lines that drive sustainable packaging within their supply concatenation. Wal-Mart claims, its primary mark is to be boxing impersonal by 2025, this means that all packaging recovered or recycled at their shops will be equal to the sum of packaging used by the merchandises in the shelves. Wal-Mart has introduced a set of steering rules called the â€Å" Seven R ‘s † to assist them accomplish their mark. These Principles are: Remove, Reduce, Reuse, Renew ( able ) , Recycle ( able ) , Revenue and Read. Relative to this Wal-Mart have introduced a packaging scorecard, this is a measurement tool that â€Å" allows providers to measure themselves comparative to other providers, based on specific prosodies. The prosodies in the scorecard evolved from a list of favourable properties announced earlier this twelvemonth, known as the â€Å" 7 R ‘s of Packaging † . ( Wal-Mart, Scorecardmodeling.com, 2009 ) 3M utilizations Boxing standards in coaction with the Environmental Protection Agency, this is much the same as Wal-Mart. 3M have set minimising packaging waste as there top purpose and they are have now realised that the most waste is coming from fresh natural stuffs, this is non merely bad for the environment but is non really economical. 3M began by trying to extinguish as much waste as possible through pollution bar, and so the staying waste was reused, recycled, converted to energy, or incinerated to make new energy. Regardless of the packaging life rhythm appraisal, there are related analytical methodological analysiss such as ecological footmark, which is calculated by comparing the biological resources available in a given part to resource demands of a population. The web of users of the Global Footprint Network has developed criterions. The criterions are available on footprintnetwork.org in order to assist to turn to computation niceties, including transitions, step of land/sea packages, turn toing atomic power, changing informations beginnings, import/export informations and biodiversity among others. ( Global Footprint Network, 2012 ) Another well-known footmark is the C footmark, which represents a subset of the ecological footmark and of the more comprehensive life rhythm appraisal.Laws and Regulations that consequence packaging?Regulations are at that place to give companies a mark or a way to head towards. There is directing 94/62/EC set by European Commission Environment that is †Å" aimed to harmonise packaging waste, on the one manus seeking to halt or forestall the harm of packaging to the environment and on the other manus they do n't desire to curtail or falsify the competition within the community. It besides contains commissariats on the bar of packaging waste, on the re-use of packaging and on the recovery and recycling of packaging waste. † ( European Parliament and Council Directive, 2010 ) These ordinances or directives have focused on waste decrease and resources but they have failed to look at the societal impacts of packaging. Boylston points out that we have a bigger job to get the better of before we more towards more sustainable packaging and that is with today ‘s companies turning in size there is an disposition towards specialising, this merely breaks up the different sections and isolates them. So the different section terminal up really incoherent with each other so they lose the connectivity between all the sectors. An illustration of this would be the packaging interior decorator working following to the in writing interior decorator, this is so they can pass on and work as a squad.MaterialsSustainable packaging relies upon the right stuff picks. I will be carry oning an probe to look at the measures of packaging waste along with the assortment of stuffs that end up as waste. In add-on to this I will spread out and make further research on paper and plastics. Looking at the solid waste study from 2010 from the European Environmental Agency it is clear to me that out of 250 million dozenss of waste 30 % is from containers and packagings and this is before recycling. The 2nd pie chart indicates that paper and plastics biggest supplies to waste. Figure 10 Figure 11 The recycling and composting of packaging prevented 85.1 million dozenss of stuff off from being disposed of 2010, up from 15 million dozenss in 1980. This prevented the release of about 186 million metric dozenss of C dioxide equivalent into the air this is the equivalent to taking 36 million autos off the route for a whole twelvemonth! ( European Environmental Agency, 2013 )PaperThe ingestion of paper on a planetary graduated table is more than 350 million dozenss per twelvemonth, that is a monolithic 1 million dozenss per twenty-four hours and if it takes approximately 17 trees to do one ton of paper. So its non unpredictable that the paper industry are accountable for approximately 40 % of commercial harvest home of wood, and now seeking to terrorise the last few rain forests which contain and provide a home ground for the endangered species. Jedlicka provinces, â€Å" The paper industry is the 4th largest nursery gas subscriber among makers and a immense consumer of energy. Fur thermore the paper production is associated with toxic bleaching processs. † ( Jedlicka, 2009 ) The benefits far outrun the bad points of paper. Paper is a really various stuff ; this is why it is used for packaging. The added benefits for utilizing paper as packaging is its lightweight and easy printed on and yet it can make all this and still be lasting and are easy recycled. There are more options for what paper can be made from it does n't hold to be wood it can be made of hemp, kenaf straw, exchange grass and it can be made from a assortment or pulped fibres from workss. As bloylston describes about the monolithic measures of paper that out at that place in the universe, all of which require a high degree of post-consumer waste ( PWC ) paper stock picks should imply the biggest precedence. Paper can be recycled up to seven times. ( Bolyston, 2009 ) One metric ton of recycled paper will salvage 17 trees, seven thousand gallons of H2O, three three-dimensional meters of landfill infinite, two barrels of oil and four thousand one hundred kW of electricity. The recycled paper uses 60 per centum less energy to bring forth so ordinary paper ; the energy saved would be plenty to run the mean place for six months. ( Statistics from Recycle bank.com, 2013 ) In order for there to be more paper packaging, the interior decorators have to back up this. The Environmental Protection Agency has made some recommendations which will assist to do packaging more sustainable, these recommendations are to utilize less material, extinguishing toxic components and doing it more readily reclaimable ( Environmental Protection Agency, 2013 )PlasticFictile packaging plays a immense function in today society, you can see this when walking about supermarkets and the egos are full of fictile containers. The word plastic is the common name given to the man-made organic polymers. As defined plastics are normally made from high polymer mass ‘ they can incorporate other stuffs to do it cheaper or to better its public presentation. There are two chief types of plastic, thermosetting and thermoplastics. Thermosetting plastics can merely be heated up and shaped one time ; because once they go cold they stay solid. Unlike Thermoplastics, which soften and melt when around plenty heat, these can be shaped multiple times when heat is applied. Jedlika says that plastics have many benefits such as it is lightweight, lasting, provides a gas and wet barrier and can sometimes retain its recycling value. ( Jedlika, 2009 ) The ground plastics are so popular is because it ‘s various and easy to fabricate with it is besides is unaffected by H2O. A down side to plastic is the additives used can do the plastic toxic and stuffs flow is for downcycling alternatively of true recycling. The recycling rate of plastic has stabilized at around 25 % , but this is n't an equal sum compared to the sum that is freshly produced. One ton of recycled plastic will salvage about five 1000s seven hundred and 70 four Kilowatt-hours of energy, six hundred and eighty five gallons of oil and about 30 lbs of air pollutants. ( Statistics from Recycling Bank, 2013 ) There is a new alternate to petrol-based plastics, which is more environmentally friendly plastic called bioplastics. These plastics are biodegradable and are created from renewable beginnings such as murphies or Beta vulgariss and maize. Boylston argues, â€Å" however, bioplastics besides need the installations for aggregation and must non deduce from needed nutrient beginnings † ( Boylston, 2009 ) There is a immense measure of stuffs that could be used for packaging. There is so much information about new packaging stuffs and the different engineerings available that there are dedicated web sites and forums full of up to day of the month information and ordinances. To wrap up this subdivision I have come to the decision that sustainable packaging is non merely about the stuffs its made from but you have to look at the bigger image merely as Jedlika states â€Å" If a interior decorator merely picks a random stuff out of his or her list of â€Å" charming green stuffs † and does n't really cognize why the stuff is environmentally friendly, or even how it is applied right, so the replaced stuff can do impacts far worse. † ( Jedlika, 2009 )Case surveies and Primary researchI have selected to make my instance surveies on these companies because they show how different sized sectors either contribute or counteract sustainable packaging. The purpose of this subdivision is non to compare to find a 100 % sustainable packaging but to look how their concern delivers profitable value, the environmental betterments and client satisfaction. First, Waitrose supermarkets are a nutrient retail merchant in England ; they have been portion of The John Lewis Partnership since 1937, the first Waitrose supermarket opened in 1955. Waitrose is one of England ‘s taking supermarket retail merchants using over 37,000 people. Waitrose has a sum of 280 subdivisions throughout England, Scotland and Wales. Locations range from high streets to the border of towns ; the shops vary in size excessively. The company is dedicated to offering quality, value and client service. In footings of packaging Waitrose has aimed to cut down nutrient packaging by 50 per centum by 2016/17, based on like for like use since 2005. ( John Lewis partnership.co.uk, 2012 ) Second, Innocent is a drinks company based in England and was founded in 1999. The companies chief concern is from doing fruit smoothies, a choice of fruit juices and vegetable pots, all of these merchandises are all sold in a broad scope of supermarkets and teashops nationally. Sing the company started at a music festival, they have grown well over the old ages and are now spread outing into the European market. They have set their marks high when seeking to be sustainable ; they have achieved this by inculcating sustainability into the packaging from the beginning. The company besides likes to move ethically in all countries of the company. ( Innocent drinks, 2012 ) Decision Within the statement of this thesis I have tried to bring forth an evenhanded discourse on the deductions of sustainable packaging with both positive and negative positions. The research has indicated that there is adequate grounds for sustainable packaging to be used in companies furthermore it will besides profit the environment and society. The research inquiry I set out to reply was is sustainable boxing feasible given the current economic and political clime.

Saturday, September 28, 2019

Role of education in a developed country

Ads not by this site About the role of education in a developed country. Over the years, mankind has recognized the need of maintaining an educated civilization as being part of the patterns and orders of evolution. It is fairly safe to say that without education there cannot be any progress on a social, moral as well as economic scale. Knowledge and culture are the basic elements to a thriving and prosperous society. From a social point of view, education is a matter of acquiring the ability to adapt to demanding situations.Due to the continual change in modern means of living there has been an increased number of social issues needing to be dealt with. As a rule, the more articulate our need to prosper, the more detrimental we find ourselves to react to negative stimuli. Thus education supports us in developing the necessary mental capacity of overcoming such internal conflicts. For instance, a narrow-minded person has the tendency of reacting in a violent and self- deprecating way , while a broad-minded one will discover solutions to problems nstead of aggravating them.From a moral point of view though, education still stands as a major influence on both the form and content of our society. Clearly, we develop a mutual understanding of the unspoken rules which are at the very essence of a nation. To cast some light on the issue of moral values, teachers instigate in their students the importance of education in relation to personality development. In effect, Ireland is a great model of a healthy educational system, thus being one of the ost highly regarded nations on behalf of teaching methods.However, education does not only clear the path towards a brighter society, but it also enhances the opportunities and chances of citizens to find a stable working place. The unemployment rate is lower in developed countries than in illiterate ones such as the African villages. All of this being due to the higher level of knowledge. In other words, the more educated a n ation, the higher the chances of important discoveries taking place.Also, it has been proven that educated people have a lesser chance of contracting mental illnesses. To conclude, there is enough evidence to support the view that a country is more prosperous and thriving than other ones as long as the level of education among its population is above the average. As Horace Mann said â€Å"A human being is not attaining his full heights until he is educated. â€Å"

A Group Decision-making Technique in the Marketing Project Team Case Study - 25

A Group Decision-making Technique in the Marketing Project Team - Case Study Example More importantly, the project team would have employed a critical analysis technique in decision making. This means that the group members should have lost their individuality and the possible psychological intimacy barriers that would have existed among them and as a result give objective critique to the contributions of each member. Moreover, the project group should have come up with criteria for evaluating the decisions made (Chen and Kyaw-Phyo 37). This is important because it would have enabled the most creative ideas which were in conformity with the needs of the client company to be included in the final decision about the design and presentation of the advertisement. The technique of evaluation in decision making would have also helped the group to select the best idea through a group cohesion approach and equal participation in the evaluation and decision making. As a result, dissimilarity would have been achieved in the implementation of the decision. Collaborative communication would have been employed by the project team to ensure effectiveness and conformity of the marketing idea with the norms and needs of the client company. Active participatory communication should have also been used by the project team (Lee 210). This means that all members of the team should have been given a chance of communicating their idea elaborately and hence leading to the evaluation process. Participatory and collaborative communication should have been used by the group in the evaluation process so that the teamwork process would have cohesively reached the idea that was in conformity with the set criteria and purpose of the project. Because active participation in communication was not used, it was only Conner who had the chance of communicating his idea to the team. Derek was passive in the communication process and as a result, his idea of the advertisement was not presented to the group regardless of the fact that this idea was very congruent with the needs of the client and the image the company wanted to portray to the market.

Friday, September 27, 2019

Slavery in the American Colonies Essay Example | Topics and Well Written Essays - 500 words

Slavery in the American Colonies - Essay Example According to the discussion  America since its very beginning practiced cruel racism which does not have any true scientific or biological base. Ethnic segregation and discrimination was very much evident in all areas. This practice started long years back and was followed by people and transferred to the next generations. It later became a political phenomenon. The white majority was found to be proud in their own race (a part of heritage). They were of the belief that they are superior to others in race as well as culture. They tried to put the minorities down in order to strengthen their own group. They developed extreme hatred towards the black minorities and had an overall sense of bigotry. The black minorities were oppressed to the core and were denied all rights. The demands and opinion of the blacks were never considered at all.  From this essay it is clear that  Story of the elimination of slavery from the American land is quite long. Slavery is the core reason the nat ion witnessed the disastrous civil war. United States started practicing slavery as early as 1619. Towards the closing of American Revolution, majority of the northern states stopped slavery, while the plantation economy of the South continued practicing it. In the years before the Civil War all the issues were centered on the issue of slavery. This started with the debates made on the three-fifths clause on the Constitutional Convention of 1787.... In the years before the Civil War all the issues were centered on the issue of slavery. This started with the debates made on the three-fifths clause on the Constitutional Convention of 1787. It further proceeded with the Compromise of 1820, the anti-slavery Gag Rule, the Nullification Crisis, and finally the Compromise of 1850. In the first half of the nineteenth century slavery was supported by the Southern politicians. They maintained the control of the federal government. Though they had most of their Presidents hailing from the South, they were very serious about maintaining a balance of power in the Senate. New states joined the Union and several compromises appeared to keep an equal number of free and slave states. In 1820, Missouri joined as a slave state and Maine came as a free state. The balance got disrupted in 1850 as Southerners allowed California to come as a free state in return for laws upholding slavery. The balance was later disturbed with the joining of free Orego n and Minnesota. The increase of the gap between free and slave state illustrates the changes happening in each region. When South, with a slow population growth, adopted an agrarian plantation economy, North adopted industrialization. They had large urban areas, with large infrastructures. They witnessed increased birth rates and a large inflow of European immigrants. The increase in population made South to keep a balance in the government. This lead to the addition of several free states. An anti-slavery president was also appointed. The political issue that ultimately took the nation towards the war was nothing but slavery in the western territories acquired during the Mexican-American War. The same

Security Network Intrusion detection system (IDS) Essay

Security Network Intrusion detection system (IDS) - Essay Example 1) The first and foremost thing is to have a grip upon the mental approach. I would try to stay composed and relaxed rather than getting panicked. I would analyze the whole situation cool mind. Whenever a network is established, problems like these are likely to occur and companies always have a well organized solution for this. So, there is no need to get horrified. 2) Under such a situation, it becomes important to isolate the affected computer immediately. An affected machine on a network can cause all other machines on that network to be affected. I would unplug the cable and then disconnect the affected computer both from the internet and the network. This way, the intruder will not be able to have an access to the machine nor will he be able to attack other computers on the network by means of the affected one. 3) I would block the port 3389 temporarily. TCP port 3389 is the Remote Desktop Protocol (RDP) that enables a user to connect to a computer on a network. I will find out if VPN (virtual private network) had been established to protect the RDP or port 3389 traffic. I would make arrangements for the establishment of site-to-site VPN tunnel before reconnecting the computer to the network so as to secure the RDP traffic from Address Resolution Protocol (ARP) poisoning (Savill, 2008). Further investigations include: Were there passwords and sensitive information saved on the computer like ISP access passwords? These must be changed at once. How long has the intrusion gone undetected? The chances of co-computers on the network being affected increase with the time the affected one keeps on working on the network. I would investigate if the computer had updated anti-virus and desktop firewall software installed. I would make backups of all sensitive information and format the operating sys tem. Then, I will reload the sensitive information from backup files while scanning them

Thursday, September 26, 2019

Johnson's Great Society Programs Essay Example | Topics and Well Written Essays - 2000 words

Johnson's Great Society Programs - Essay Example After Johnson’s success in the 1964 election he decided to fulfill the above three basic purposes through some well thought out strategies like development of new Medicaid and Medicare programs to provide health care facilities to all, funds were provided for education and urban development. Creation of new cabinet offices as the Departments of Transportation, and new agencies like Equal Employment Opportunity Commission were created to help people and at the same time they expanded the powers of the federal government to achieve the objectives. Poverty was reduced though programs like Head Start, job training, legal services, and scholarships for poor college students which were under the Office of Economic Opportunity (p. 972). Equality was achieved through the Voting rights Act of 1965 and immigration reforms through the Hart Celler Act of 1965. 2. What were the sources and significance of the rights revolution of the late 1960s? Despite the efforts for equality and freedom by Johnson during his tenure, there were still some major groups that felt dissatisfied, who had never spoken up for themselves and who were finally realizing in this new wave of liberalization that their freedom was also lost and for getting that freedom back they had to do something. Blacks had always been prejudiced and finally they were getting their due back though slowly. However, other groups like feminists, homosexuals, Mexican-Americans, Indian-Americans never got a chance to talk about their freedom and it was in the late 60s that with developments like Betty Friedan’s The Feminine Mystique, formation of the Mattachine Society, latino activism, upsurge of Indian militancy laid the foundation for the rights revolution. One of the major significance of the rights revolution was that indirectly the judiciary system established itself as the system capable of upholding what’s right for the society gaining their trust. With landmark rulings in cases like New York Times v. Sullivan and Loving v. Verginia, the court sought to achieve civil rights and racial equality. â€Å"The Court simultaneously pushed forward the process of imposing upon the states the obligation to respect the liberties outlined in the Bill of Rights. It required states to abide by protections against illegal search and seizure, the right of a defendant to a speedy trial, the prohibition against cruel and unusual punishment† (p.996). Besides policing the states, the court also upheld the right to privacy. â€Å"The rights revolution completed the transformation of American freedom from a set of entitlements enjoyed mainly by white men into an open-ended claim to equality, recognition, and self-determination (p. 997). 3. In what ways was 1968 a climactic year for the Sixties? The Sixties brought major changes to American society and the changes weren’t just good, progressive changes in the attitude of the people but the decade also saw rise of drug culture a ll in the name of freedom. The decade was about freedom: freedom from poverty, freedom from racialism, freedom from inequality and freedom from all sorts of restrictions. And all the developments and changes throughout the decade came to a climax in 1968. The long subdued rebellion in Vietnam finally came into full power in January 1968, which strengthened

Essay on social work's theory Example | Topics and Well Written Essays - 2250 words

On social work's theory - Essay Example roviding services (e) with most of these services located within the context of the welfare state and (f) social work is a composite of knowledge, skill and values (Ife, 1997). This has been the traditional framework within which social work has been existing, but this is becoming â€Å"increasingly out of step with the reality of the contemporary practice context†.(Ike, 1997: 12). The hitherto existing system has produced an increase in individual worker case loads, with less levels of control over one’s work while also faced with ethical dilemmas. The disparity between the traditional role that has been ascribed to social work and the reality of actual practice has resulted in critical reviews being instituted of the existing theories that drive social work and how they can be improved. This essay will examine and critique two specific social work theories (a) crisis intervention theory and (b) feminism. A crisis occurs when there is a source of stress that arises in the environment. There are three interrelated factors that are responsible for the generation of a crisis (a) a hazardous event which poses a threat (b) the threat is posed to the person’s instinctual needs, which may also be linked to earlier threats that may have occurred, thus making a person vulnerable to the threat and (c) the inability to respond appropriately to the crisis with an adequate level of coping mechanisms.(Rapoport, 1965:25-26). Dealing with crises is an integral part of social work, because it is a time when people need help. Situations presenting danger or opportunity call for effective decision making by social workers. The crisis theory states that in a developmental or situational crisis, the habitual ways of coping do not work, either because the situation is too new and has not been anticipated or because the events in question are too overwhelming for individuals to deal with. The underlying assumption of the crisis theory is that there are a number of needs, such as

Write a 5-10 page paper that addresses the assignment questions

Write a 5-10 page paper that addresses the questions - Assignment Example Extraversion refers to arrange of activities, the urgency of activities falling outside the team context as well as using external approaches to energy creation. Conscientiousness is the habit of depicting self-discipline, acting in a responsible manner and aiming at extraordinary achievements. Openness to experience is the appreciation of emotions, adventures, new ideas and diversity in experience. Finally, neuroticism refers to the habit of experiencing negative emotions like anxiety, anger, as well as depression (Lussier & Achua, 2010). In the marketing game, I saw participants who lost control of their emotions due to the attempt of the other team members to intimidate them thus leading to declining in the overall productivity of these participants. Interestingly, other team members were able to keep up with self-control even in the face of situations that a typical employee would use to act in a different manner. Also, there were team members who could not just cope with the diversities within the team. Many were the instances whereby a team member would propose a new idea only for other people to ridicule the idea. The same team had members who depicted the belief that connecting with other people in a work context brings about heightened productivity alongside a respect-filled work environment. Further, there were members who were free to communicate new ideas thus conveying an ever-learning attitude, and ready to share the new discoveries with team members. Overall, the aforementioned behaviors were to a great extent influenced by variables like emotional stability, personality, readiness to learn new skills and diversity in conjunction with enterprise-based variables like job structure and design, resources and leadership. In a typical work context, the group that was able to keep calm even during potentially intimidating moments would hint managers of working with a lot that is adaptable to pressure,

Wednesday, September 25, 2019

The website of National Weather Service Weather Forecast Office Essay - 1

The website of National Weather Service Weather Forecast Office - Essay Example In this paper it is necessary to describe how the website of â€Å"National Weather Service Weather Forecast Office† (n.d.) supports the learning objective: use weather observations, analysis, and forecasting to determine risk management policies for critical weather situations and severe storms.In this paper it is necessary to describe how the website of â€Å"National Weather Service Weather Forecast Office† (n.d.) supports the learning objective: use weather observations, analysis, and forecasting to determine risk management policies for critical weather situations and severe storms. First of all it is necessary to mention that it is a site of the famous National Weather Service (NWS) which is a leading meteorological information source since its foundation in 1890. The tasks of the site not only give information on prediction of seven-days forecasting, but also sever weather warnings. This source proposes a wide range of products and services which can be used by t he emergency managers, the media and the public, and gives a brief of the products which include all-important principal information. For instance, the aviation forecast observations, daily fire weather forecasts and marine forecasts are presented here.   The site analyzes and strongly presents the temporary observed and climatic tendency of downfall across the 48 United States and Puerto Rico. The given information about precipitation relies on a radar-only, gauge-only, satellite-only sensor. Precipitation data are updated six times per day.   The Fire Weather Program is offered to federal and state land management agencies. This program provides the action of preventing, extinguishing the fire, and management of forest and grasslands fires.   In conclusion, as one of the leading data collection site, it shares necessary information about conditions of surface and upper air, pressure of air and so on. The source offers short-term and long-term models of atmosphere which are s hared with government agencies; it presents researches reports and storm surveys. Thus, the National Weather Service is close in touch with government and media emergency agents to provide all-important data about storm.  Ã‚  

Response to James Baldwin Artical Essay Example | Topics and Well Written Essays - 750 words

Response to James Baldwin Artical - Essay Example The article also analyses the pattern of how persons from England speak to how individuals born in America communicate and finally how various races such as blacks do (Baldwin, 2). He adds that language is the vivid key to identity and when it misses you have nothing. The article also looks at how language ranges from region to another. Furthermore, article written by James Baldwin highlights how some words and phrases were transferred from the Black English into White English after their meanings were altered a little bit. Baldwin uses various examples such as â€Å"Jazz† and â€Å"sock it to me.† Finally, Baldwin states that the language portrays the private identity of the speaker; by the way one use the language, they reveal information about their parents, their school, their salary, their self-esteem and probably future. Baldwin makes a good argument in his article and applies a lot of logic to support what he claims. Language spoken by our societies brings people together. People develop a sense of belonging, and they leave the side by side. The same language may also be used to divide the same society. As the writer says â€Å"It goes without saying, that language by itself is also a political instrument, means, and proof of power.† This quote is essential as it adds to our understanding of language variations and issues of social justice since language is power. In addition, language is a â€Å"political instrument† and controlling language in a way gives people power. Language is a great instrument for societal growth and development. Moreover, language is the vivid key to identity and when it lacks one has nothing because it varies with geographical distance. Most importantly the analysis of this specific quote points to the fact that if an individual has good communication widely ranging worldwide then that individual has a grand power.

Tuesday, September 24, 2019

Google in China Analysis 2 Vo Essay Example | Topics and Well Written Essays - 500 words

Google in China Analysis 2 Vo - Essay Example een identified among the Chinese internet users as they prefer localized search engines over foreign ones, here Google encountered a positioning enigma as well. As for the usage patterns are concerned then Chinese market is substantially different in more than one ways. They do more blogging, a more thorough browsing and more localized way of searching the internet. Apart from these, censorship and repressive strategy over internet browsing are some more barriers that are placed to Google’s progress in the Chinese market. However with a population of more than 1 billion people and one of the fastest internet penetration rates, Chinese market cannot be ignored by a player like Google (Lawrence, 2009). The Chinese Internet market comprised of 103 million internet users in 2005 and this number grew exponentially to 316 million till April 2009. In 2005, entertainment was the main reason for internet usage in China with around 38% of the users identifying it as their sole purpose of browsing; however till 2009 the trend has shifted to more sophisticated browsing habits such as news 79%, Blog 54%, Search 68% and Email 57%. In 2005, 69% of users had internet access at home while 38% at work, in 2009 the scenario has changed and internet cafes and schools have also emerged as centers with internet access (Lawrence, 2009). In 2009 dimensions of entertainment have also developed and gaming and social networking have also become integral components of the category. Internet penetration rate in China is 25% and this makes China a great market for players like Google to capitalize up on. In 2005 one in seven users was above 30 years of age but in 2009 the average age group is 25 years, indicating youth dominance among internet users. In all in all Chinese internet market shows sustainability and signs of growth and further development. In US average internet user age is 42 with annual penetration rate of 3% suggesting that it has reached the saturation level and newer

Analysis Politics of Japan Research Paper Example | Topics and Well Written Essays - 3750 words

Analysis Politics of Japan - Research Paper Example It brought in an overwhelming substance on the part of the Japanese people, the political scientists and analysts, and historians as well as its foreign alliances for the reason that the political party which ruled for the nearly half-a-century was defeated for a whimsical short period of time. "The summer 2009 electoral victory of the opposition Democratic Party of Japan (DPJ) over the long-ruling Liberal Democratic Party (LDP) holds historical significance, not only for political scientists but also for the people of Japan, and possibly for the country’s Asian neighbors and the United States as well." (Pekkanen and Krauss, 2010, p. 05) While it is no longer ruling now, the success history of the LDP has been very convincing. It is considered to be one of the most successful political parties ever formed in the entire political history of the world. Pekkanen and Krauss (2010) state that since 1995, there was a non-stop dominion by the LDP over Japan until a short stoppage for ten months from 1993 - 1994. In the House of Representatives - albeit being minor nevertheless the more dominant house - the party hoarded an astonishing reputation when it did not commit any lost for more than 50 years up until August of 2009. Seen this way, the downfall of LDP presents a thought-provoking question as to why it was defeated within a fleeting period of time. It had become a norm for the Japanese people to live under the governance of the LDP. As we can recall, the only disruption to their reign was when a minute cluster decided to separate from the LDP in order to take hold of supremacy and influence as part of a different union that did not do more than just to ratify laws and proposals prior to its disintegration. Japan democracy works in accordance with the electoral consequences that took place in the past. Approximately 60% of all LDP officeholders were produced and many other currently serving and past officials were unseated.  

Monday, September 23, 2019

Romeo and Juliet by Franco Zeffirelli Research Paper

Romeo and Juliet by Franco Zeffirelli - Research Paper Example â€Å"Franco Zeffirelli's Romeo and Juliet is a lovely, sensitive, friendly popularization of the play—the lovers, Leonard Whiting and Olivia Hussey, as young and full of life as they ought to be, Italy of its time there intact, a lot made of the relationship between Romeo and Mercutio, beautifully played by John McEnery† (Adler). Certainly, the actors were not experienced because of a very young age, but this inexperience was their main advantage. They did not play any parts, they were natural. A wise director Franco Zeffirelli understood that nothing can express youth better than youth itself. Adult experienced actors would never manage to embody and express all the charm of the youth and the first love. Adults have already lost the capacity to feel all this thrill and delight and what is more, they will never die for love. There are people who were lucky to witness the shooting of the film. â€Å"Hussey and Whiting were so good because they didn't know any better. A nother year or two of experience, perhaps, and they would have been too intimidated to play the roles. It was my good fortune to visit the film set, in a small hill town an hour or so outside Rome, on the night when the balcony scene was filmed. I remember Hussey and Whiting upstairs in the old hillside villa, waiting for their call, unaffected, uncomplicated. And when the balcony scene was shot, I remember the heedless energy that Hussey threw into it, take after take, hurling herself almost off the balcony for hungry kisses. (Whiting, balanced in a tree, needed to watch his footing.)† (Ebert). This valuable passage written by a person who saw shooting with his own eyes testifies that actors did not play any parts, they were... The researcher of this paper presents an analysis of the great screening of the masterpiece, entitled Romeo and Juliet and presented by Franco Zeffirelli in 1968. The researcher states that this movie is the best screen version of the play. The plot of the â€Å"Romeo and Juliet† seems plain, but its salt is the great misunderstanding that caused a great tragedy. It seems that Shakespeare plays with readers in order to awake sorrow and the feeling of vexation. Romeo and Juliet are innocent creatures, who can’t be accused of what they did. The researcher also mentiones that it is necessary to analyze the music used in the movie. Music is stated to be a very important component of every movie. It is a correctly chosen music that makes a Romeo and Juliet movie successful. Certainly, the film contained the scenes, which were very difficult for young people to express and here we should admit the talented direction of Zeffirelli. He made everything perfect: every scene, ever y glance, every motion of the main heroes. The reseracher then concluds that for the poetry, and the fine archaic dignity of Romeo and Juliet, the story could be taking place next door. It is stated to be the "sweetest, the most contemporary romance on film this year†. Critics and the researcher both mentioned this movie as a great work, every detail of which was thoroughly thought out by the director and producers and had its deserved success: it certainly became the best screening of the â€Å"Romeo and Juliet† in the world.

Important reflections about higher education in marketing Essay

Important reflections about higher education in marketing - Essay Example So, if the young Arabs are not well versed in marketing, they cannot contribute any significant change and cannot bring any economic development to their homeland. Although there is a growing trend of use of application of marketing, especially in the UAE, many people in these states are not well aware of the importance and its application in their particular environment. Considering the importance of marketing on the one hand and the lack of proper awareness among the native people, on the other hand, the advocates of marketing studies have been split into two groups. The one group believes that the marketing concept is not applicable in Arabian countries due to the fact that in these countries marketing principles cannot be applied as the supply of goods and services here is much greater than demand. Their argument against marketing principle application is based on the assumption that the marketing concept has been essentially a tool of developed countries, a means by which the pr oducts of buyers’ market economies are marketed. Thus, they further argue that marketing is not a discipline of globally accepted principles that may be applied to a subset of national economies. However, although they advocate marketing research and studies in order to apply its principles in the local market to boost its economy, they show their concern for the lack of adequate marketing knowledge and the shortage of marketing expertise which are the significant barriers to the applicability of the discipline.... he assumption that the marketing concept has been essentially a tool of developed countries, a means by which the products of buyers' market economies are marketed. Thus, they further argue that marketing is not a discipline of globally accepted principles that may be applied to a subset of national economies (Bartels, 1983). Although, the logic offered by this group appeals to some extent and people who are already reluctant for marketing studies take it for granted, there is the other group who favor marketing studies and application in these states. However, although they advocate marketing research and studies in order to apply its principles in the local market to boost its economy, they show their concern for the lack of adequate marketing knowledge and shortage of marketing expertise which are the significant barriers to the applicability of the discipline (Kaynak and Hudanah, 1987). The opinion of this group strongly convince us because the one main problem in economic development of the United Arab Emirates is that unfortunately there has been very little attention placed to study the marketing principles and investigate the shortcomings and opportunities of local market. Indeed it can be said that marketing as carried out in UAE with an emphasis on inducing new needs and wants, may not be of pri me concern in the development of our economy because the marketing concept is more than a quest for new needs and wants. It is basically a framework of analyses, tools and skills which provides executives with the ability to match organizational resources and competences to the needs of society (Maholtra, 1986). Thus, from the above arguments given for and against of marketing, it can be concluded that the marketing discipline can be effectively employed in order

Sunday, September 22, 2019

Chinese video gaming Essay Example | Topics and Well Written Essays - 750 words

Chinese video gaming - Essay Example It is obvious that this independence has definitely led to positive results for the country’s development. However, there are certain other aspects of the Chinese gaming industry that come to the fore on a closer analysis. The industry does not only have a positive side to it, there are also some negatives and drawbacks that can be seen. This is mainly in terms of the strict â€Å"state censorship† that the imported games pass through before reaching the markets of China (Wolf 108). Due to the various strict ideals of the government of China, it is not easy for foreign games to be sold in the markets. The content of every game is thoroughly checked and those found inappropriate are either deleted from the games, or the game is banned altogether. The gamers, however, are not satisfied with the new version of the games and, therefore, they resort to pirated full versions of the game. The gamers fail to understand that the real objective behind this censorship is to  "promote domestically made games,† in order to â€Å"protect the Chinese market† (Wolf 108). Studies have proved that the online games in China are now the â€Å"mainstream form of game consumption† and that the â€Å"market share of imported games† is on the decline (Wolf 109). This is significantly so because the broadband development in the country has been increasing considerably and due to the fact that China has not turned into the â€Å"second biggest internet market† on the face of earth (Chung). Piracy in China is a major problem and it has created conflicts with â€Å"game manufacturers in Japan and United States,† putting the membership of China in the â€Å"global gaming community† into jeopardy (Wolf 109). The game manufacturers are forced to produce online games and are reluctant to... With the massive advances in technology, man has transformed the impossible into the reality. Almost all fields have reached greater heights with the constant innovations in technology. This is especially so in the case of the entertainment field, including various industries such as movies, music, dance, gaming etc. The modern technologies in video gaming have taken entertainment to the next level through the creation of interactive user interfaces. For example, there are a lot of motion sensitive games that have become highly popular among the modern generation. These games are designed in such a way that the game processor detects the movements of the human body and replicates those movements into the respective characters of the game. These types of games are popular throughout the world and the gaming industries of different countries, seeing the potential of this sphere, plan to work hard towards tapping this niche much more. One such country that has recognized the significance of this field is China and its gaming industry, which is now â€Å"one of the fastest growing interactive entertainment† industries worldwide. Piracy in China is a major problem and it has created conflicts with â€Å"game manufacturers in Japan and United States,† putting the membership of China in the â€Å"global gaming community† into jeopardy. The game manufacturers are forced to produce online games and are reluctant to manufacture other games due to fear of piracy. Thus, the Chinese government needs to implement laws and devise ways in which it can get rid of piracy once and for all. The gaming industry in China is greatly influenced by â€Å"South Korea and the United States† and, therefore, it does import games from these countries in addition to Japan

Reincarnation and Past Lives Essay Example for Free

Reincarnation and Past Lives Essay Reincarnation is the belief that when one dies, ones body decomposes but something of oneself is reborn in another body. It is the belief that one has lived before and will live again in another body after death. The bodies one passes in and out of need not be human. One may have been a Doberman in a past life, and one may be a mite or a carrot in a future life. Some tribes avoid eating certain animals because they believe that the souls of their ancestors dwell in those animals. A man could even become his own daughter by dying before she is born and then entering her body at birth. The belief in past lives used to be mainly a belief found in Eastern religions such as Hinduism and Buddhism, but now is a central tenet of much woo-woo like dianetics and channeling. In those ancient Eastern religions, reincarnation was not considered a good thing, but a bad thing. To achieve the state of ultimate bliss (nirvana) is to escape from the wheel of rebirth. In most, if not all, ancient religions with a belief in reincarnation, the soul entering a body is seen as a metaphysical demotion, a sullying and impure rite of passage. In New Age religions, however, being born again seems to be a kind of perverse goal. Prepare yourself in this life for who or what you want to come back as in the next life. Belief in past lives also opens the door for New Age therapies such as past life regression therapy, which seeks the causes of todays psychological problems in the experiences of previous lives. L. Ron Hubbard, author of Dianetics and the founder of Scientology, introduced his own version of reincarnation into his new religion. According to Hubbard, past lives need auditing to get at the root of ones troubles. He also claims that Dianetics gave impetus to Bridey Murphy and that some scientologists have been dogs and other animals in previous lives (A Note on Past Lives in The Rediscovery of the Human Soul). According to Hubbard, It has only been in Scientology that the mechanics of death have been thoroughly understood. What happens in death is this: the Thetan (spirit) finds itself without a body (which has died) and then it goes looking for a new body. Thetans will hang around people. They will see a woman who is pregnant and follow her down the street. Then, the Thetan will slip into the newborn usually two or three minutes after the delivery of a child from the mother. A Thetan usually picks it up about the time the baby takes its first gasp. How Hubbard knows this is never revealed. Channeling, like past life regression, is distinct from reincarnation, even though it is based on the same essential concept: death does not put an end to the entirety of ones being. In classical reincarnation, something of the consciousness of the deceased somehow enters a new body but as that body grows only one unified consciousness persists through time. Channeling might be called temporary intermittent past life invasion because there is a coming and going of the past life entity, which always remains distinct from the present self-conscious being. For example, JZ Knight claims that in 1977 the spirit of a Cro-Magnon warrior who once lived in Atlantis took over her body in order to pass on bits of wisdom hed picked up over the centuries. Knight seems to be carrying on the work of Jane Roberts and Robert Butts, who in 1972 hit the market with Seth Speaks. Knight, Roberts, and Butts are indebted to Edgar Cayce, who claimed to be in touch with many of his past lives. One would think that channeling might muck things up a bit. After all, if various spirits from the past can enter any body at any time without destroying the present person, it is possible that when one remembers a past life it is actually someone elses life one is remembering. From a philosophical point of view, reincarnation poses some interesting problems. What is it that is reincarnated? Presumably, it is the soul that is reincarnated, but what is the soul? A disembodied consciousness? Reincarnation does seem to offer an explanation for some strange phenomena such as the ability of some people to regress to a past life under hypnosis. Also, we might explain child prodigies by claiming that unlike most cases of reincarnation where the soul has to more or less start from scratch, the child prodigy somehow gets a soul with great carryover from a previous life, giving it a decided advantage over the rest of us. Reincarnation could explain why bad things happen to good people and why good things happen to bad people: they are being rewarded or punished for actions in past lives (karma). One could explain deja vu experiences by claiming that they are memories of past lives. Dreams could be interpreted as a kind of soul travel and soul memory. However, past life regression and deja vu experiences are best explained as the recalling of events from this life, not some past life. Dreams and child prodigies are best explained in terms of brain structures and genetically inheritable traits and processes. And since bad things also happen to bad people and good things also happen to good people, the most reasonable belief is that there is no design to the distribution of good and bad happening to people. Stories, especially stories from children, that claim knowledge of a past life, abound. One collector of such stories was the psychiatrist Ian Stevenson, who made a weak case that the stories offered scientific evidence for reincarnation. Finally, since there is no way to tell the difference between a baby with a soul that will go to heaven or hell, a baby with a soul that has been around before in other bodies, and a baby with no soul at all, it follows that the idea of a soul adds nothing to our concept of a human being. Applying Occams razor, both the idea of reincarnation and the idea of an immortal soul that will go to heaven or hell are equally unnecessary. Reference http://www.skepdic.com/reincarn.html

Saturday, September 21, 2019

Online Information system Essay Example for Free

Online Information system Essay Nowadays, technology has reached its highest level and is in the phase of developing more with the new innovations. Innovations that helps a lot of people to have a more convenient way to do enormous job to be done in a short period of time. Almost public high schools like Bernardo Lirio Memorial National High School (BLMNHS) are still handling their student record by means of using file document in a manual manner. The grades of the student are computed and recorded manually which it took time for the teachers to be done. Especially when a high school’s population increases annually, the ease of data handling needs more effort to taken care off. The manual saving of files in BLMNHS needs more file cabinets in order to save their school records. There are cases that some files are being lost and never been find or have been misplaced. There are also incidents that teachers are having mistakes in writing their student grades and records and they have to make a way to reedit the data and give them a lot of time and effort. As one of the first web-based of information system in computer technology in education, Online Student Information System (OLSIS) is made for educational establishment to manage student data. It is a database controlling student records, information, schedules, subjects, and grades. Information System (IS) helps users to become instructive, which means making it easy for them to organize, analyze, search and use old information to create new ones. As an order, it focuses on exploring the interface between Information Technology (IT) and Computer Science (CS). Computer Science (CS) focuses on information technology which is a software development. While Information Technology (IT) is involved with the manipulation, storage of data and information, and management of computer systems with companies, universities, and other organizations. The developers chose Bernardo Lirio Memorial National High School (BLMNHS) as their client because they need technology assistance. Since the populations of the students in BLMNHS are increasing yearly they decided to make this website to facilitate the keeping of records of each student. This project is an online student information system made for BLMNHS in order to manage their student data that should be handled for their school needs. The system helps especially those incoming first year students to inquire online. It also helps the faculty and the school administration in terms of handling of records. They can also upload their class and teacher schedules. The students can have their own account wherein they can view their grades, schedule and activities. Parents can also have an access of their child account. The faculty and the school administration can also have their own accounts for data handling. This online information system is created for schools that are in need of data handling. This project will benefit the school in terms of grade record handling for the teachers, accessible grade records for the student and their parents and other data that the school needed to be handled online. Project Context The developers decided to apply this web information system to BLMNHS because the purpose of the developers is to help them ease their job and to enhance the productivity of every person involved in school management. At present, the school management and it’s all procedures are done manually. It creates a lot of problems due to the wrong entries of adding data which causes duplication and redundancy of student record and grade setup. Since their data are stored in file cabinets, searching for data adds a lot of time for them to find it out. The developers proposed this system to maximize and minimize this kind of manual arrangement of data for the users to have a convenient way of handling their data. The system will solve the problem such as mistakes through proper checks and validation control methods in checking of student record, teacher’s record, grading reports. Purpose and Description The proposed system is an online school portal for BLMNHS that will help school teachers in handling their student’s data. It is a convenient way to access their data because it can be viewed over the internet. The confidentiality of their files is still maintained through the use of faculty no. and password in order to avoid from intruders. The privacy of the proposed system should also maintain for the school’s policies in the confidentiality of their school records. The students can also have an access in their school performances, school activities, health record and class schedules, these records can be viewed on their student profile. In this system, the parents have also their account wherein they can monitor their children’s records, like they can view their children’s grade, schedules, health record and their activities in school. The main purpose of the developed system is to give an ease of use in data handling in order to have a more efficient way of adding, deleting and editing of the data that should be managed and maintain. It woul help the client into a convenient way of accessing their data throughout the internet. This would benefit the students and teachers of Bernardo Lirio Memorial National High School (BLMNHS), the parents, other public high schools. The users should also have the knowledge of browsing the internet especially the said website. The developers used a web designing software in order to build an interface and functionalities for the future users of the system. A Server is also used to view the created website over the internet. For data handling we use database software that could handle and manage a large amount of data. Objectives The main objective of the said project is to develop a web information system that will computerize and organize different modules in Bernardo Lirio Memorial National High School (BLMNHS). Specifically it aims to: 1. Identify the present student information system used by BLMNHS in terms of: 1. 1 facilities and resources 1. 2 technology utilization 2. Provide a better service for the students and faculty of BLMNHS with the following features: 2. 1 Submission of grades 2. 2 Viewing of Schedules and Subjects 3. Determine the level of acceptance of the developed web services among faculty and students of Bernardo Lirio Memorial National High School relative to: 3. 1 user interface 3. 2 compatibility functionality in terms of browser 3. 3 contents components 4. Perform beta testing on the developed web services. Scope and Limitation The developers would like to improve and build up the web information system for BLMNHS. The study will focus on the transformation of manual Online Student Information System of BLMNHS. The aim of the project is to concentrate on data handling of records of each student like grades, subjects, schedules, and medical record. Each student’s parent would also have their own account in which they could access their child’s grade records and schedules. Students are not able to edit or manipulate their records within the website, instead, the website administrator are the only one who can edit this data. Parents should register first their accounts via their child’s designated LRN, but they can create their own username and password in order to secure their accounts. Faculty could also have their own account wherein they are the one’s who record each of their student’s school performances, in terms of grades and class schedules. They could also upload their files but this data are only seen by their co-faculty members and also by the website administrator. The website administrator accesses all data that the website should maintain. It is also responsible for user requests wherever they could have problems in their profile. The entrance examination will not be covered by the study for the reason that the examination should not be taken online due to the possibilities that it may have leakage during the examination. Definition of Terms These terminologies were gathered by the researcher for better and clearer understanding about the study. It also sets as reference for each system’s functionalities. Backend. Backend is everything that happens before it gets to your browser. A backend can be very simple or very complicated. [1] It is hidden by a user and can only access by the administrator of the system. It is where the data are being stored and operated. Client-server. It describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request It serves as the administrator’s task to manipulate and control the system through peer-to-peer or network. [7] It is a correlation of program that fulfills request and delivers the response, and vice versa that creates a one line process. Database server. Database server is the term used to refer to the back-end system of a database application using client/server architecture. The back-end, sometimes called a database server, performs tasks such as data analysis, storage, data manipulation, archiving, and other non-user specific tasks. [4] It is a kind of internet service that provides databases for websites; it acts as the backend of the system. Data Flow Diagram (DFD). A data flow diagram (DFD) shows how data moves through an information system but does not show pogram logic or processing steps. [2] It also illustrates the data flow of each function of the system. It also shows on how each data has been processed and the corresponding end users of this system. Domain name. Provides the ability to refer to IP devices using names instead of just numerical IP addresses. Allows machines to resolve these names into their corresponding IP addresses. [2] It also serves as an identification name for the website. Frontend. It is the part of the web that you can see and interact with. The Frontend usually consists of two parts: the design and frontend development. [1] It also serves as the user interface of the system. It is accessed by the user. IP (Internet Protocol). A packet-switching technology that is deisgned to get packets from point A to B in whatever way is most effective, without the user necessarily having any ability to know what route will be taken. [3] It acts as the address number of each data from a computer that has been sent to another computer. It also sets as identification for each computer in the internet. Text Editor. A text editor is a computer program that lets a user enter, change, store, and usually print text It is a programming tool used for editing plain text files. [8] It is used mostly for webpage designing and integration. Web host. Hosting (also known as Web site hosting, Web hosting, and Webhosting) is the business of housing, serving, and maintaining files for one or more Web sites. [9] It is a kind of Internet service that allows orgranizations to make their website accessible via World Wide Web. CHAPTER 2 REVIEW OF RELATED SYSTEMS In this chapter presents the related studies that have been done over the past years. This includes the foreign studies, local studies and the technical background which includes the software that will be used throughout the process of creating the study. Related Systems The Degif developed the system â€Å"School Management System† for KokebeTsebah Secondary School†. It has been shown that the system effectively registers students along with parental information, easily retrieves information about a student and generates the required reports such as transcript, report card and timetable. In addition to generating a feasible master timetable it produces a timetable for each teacher. Furthermore it has been shown that the web application of the system helps attendance recording by the homeroom teacher and parents can view the status of their children using the Internet or Intranet of the school. Most educators like the systems if they work smoothly and help students learn, according to teachers and teacher-union representatives. Brian Lewis, chief executive of the International Society for Technology in Education, a Eugene, Ore. , professional group, says the systems can foster a strong home-school connection and allow busy parents to be involved—and let them step in early if a child is struggling. Bill Erneste, a math teacher for 20 years, says one of the biggest advantages these systems have over paper grade books is that parents and teachers are communicating without even a phone call. At Park Hill High School in Kansas City, Mo. , where he teaches, he likes posting links to instructional materials that students and families can use at home. Plus, teachers say online reporting makes it easier to collaborate and share information. Other teachers, however, regard posting grades and assignments as an administrative burden, especially for inexperienced educators who often need to spend more time planning lessons and managing their classrooms. Some parents misuse the systems by trying to micromanage their childrens work or overreacting to minor missteps, creating extra work for teachers. Also, problems arise when schools use multiple programs that dont share data, requiring teachers to enter data more than once. [10] The developers found out that there are related systems that exist outside the country so it is a proof that â€Å"Online Student Information System for Bernardo Lirio Memorial National High School† is convenient to use and lastly, it can improve the services of the school to its students. The Student Information system Via-Wapsite was developed to provide a system in wap-based information retrieval system of student. The system has also provided an alternative, efficient and reliable system that provides an easier way to access student information system and verify grades through mobile phones. And also the developers want to provide a system that has a key access and menu-driven interface for students and also for the administrator. [11] On the other study the developers developed the online submission of grades of the faculty to the registrar and the online viewing of student’s grades. It will diminish the hassles in walking right through the registrar office. The system developed only in authorized persons. [12] The Online Student Information System for F. L Vargas College Tuguegarao City cited that maintaining student’s records manually is a very difficult task and time consuming. The said school are still using filling cabinet to store their files, there are some incident that some of the files are lost. [13] The Student Information System of Southgate Institute of Malvar is specifically about the arrangement of different modules into one whole school system. One of the objectives of this study is to remove the deficiencies of current system and build up new computerized system, it shall be faster and will able to produce results of various queries. [14] The developers found out that the system has its potential to provide greater conveniences and accessibility to the students since student can access information despite of their location and time at their convenience. All these systems are related in the sense that systems aimed to lessen the problems encountered by the students, faculty and other respondent during enrollment and school days. The preceding review shows the transition from a manual system into a computerized system. As similar applications for the enlistment process have not been implemented yet in Bernardo Lirio Memorial National High School the results of this study may provide additional information on the subject and may become an effective tool to push the computerization of many transactions done in school. The study shows that the proposed system is feasible and had a chance to be implemented. The proposed system was developed and concentrated only in high school. The difference of the proposed system from other system that has been done is that it is made exclusively for a certain High School. Nowadays the existing school online websites services are made only for tertiary levels. The developers want to bring the benefits of technology to high schools in which students can have their own accounts and also for their parents. Teachers, administration and staff have their own accounts also for their school monitoring activities, updates and grade records. The system is comprised of a newer networking technology technique, thus a faster and real time online student information system. Technical Background In building a website there are different softwares that can be used in which it should includes programming language, database and server. Here are the programs that are used in order to build the Online Student Information System of Bernardo Lirio Memorial National High School. The PHP Hypertext Preprocessor allows web developers to create dynamic content that interacts with databases. (Mike Chapple, 2008). The proponent used this language for the ease of making website. The language was one of the most recommended in terms of making websites. PHP is also great for creating database-driven Web sites. Most web hosting providers support PHP for use by their clients. It is originally designed to create dynamic web pages. PHP is very fast and lightweight. MySQL It is an open source RDBMS package for back end tool for managing the database as this allows users to manage the database very efficiently and controls data redundancy and inconsistency. It allows enforcing various data integrity constraints on the data being entered into the tables. Database can be accessed using GUI provided by the system (Angela Bradley, 2006). MySQL serve as the database of the system. The proponents believe that MySQL was the most reliable to managing database because most of the web developer used it. Database can be accessed using GUI provided by the system. MySQL helps the proponents to accumulate the appropriate records in the database. It helps to handle the whole data and information in the certain school. Apache Server is a web server software program notable for playing a key role in the initial growth of the World Wide Web. Apache was the first viable alternative to the Netscape Communications Corporation web server (currently named Oracle iPlanet Web Server). Typically Apache is run on a Unix-like operating system, and was developed for use on Linux. Apache is developed and maintained by an open community of developers under the auspices of the Apache Software Foundation. The application is available for a wide variety of operating systems, including UNIX, FreeBSD, Linux, Solaris, Novell NetWare, OS X, Microsoft Windows, OS/2, TPF, and ComStation. Released under the Apache License, Apache is open-source software. (Robert McCool, February 2013) Apache Server was the most popular server software on the Web so that the researcher decided to use this server. This server serves as the temporary server for our websites. It enables a computer to host one or more websites that can be accessed over the Internet using a Web browser. It supports PHP so the developers use this as server. Apache is popular when it comes in Web Hosting because it is open source and free to use. CHAPTER III DESIGN AND METHODOLOGY This chapter presents the methodological study for creating the proposed system. It includes the methodologies, requirement specification, user interfaces, software interfaces, performance requirements, system overview, and system architecture. System Analysis and Design The Online Student Information system of Bernardo Lirio Memorial National High School access the student and faculty school information. It also improves the user’s accessibility in their information, and convenience in data handling and manipulation. System Design The following diagrams are the system design followed by the developers in order to achieve the necessary data that should be processed on the system. Figure 1 shows the general flow of the data accommodated within the system. It is compose of four entities wherein it sets as the user of the system, in each entity there are several operations that should be undergone. These processes are the functions of the system to imply on the actual operation of the system. Figure 1. Context Flow Diagram Figure 2 shows the registration process of a user to the IS wherein the system admin generates the newly registered user’s to its database. The users can have their own account. Figure 2. DFD of User Registration Figure 3 illustrates the data flow diagram of the grading system of BLMNHS that can handled by the system. The grades of the student to be computed by their teachers are from their assignments and their examinations. The grade that has been computed can be view by the student’s profile and also to their parent’s profile. Figure 3. DFD of Grading System Figure 4 shows the data flow on handling the student’s health record. The BLMNHS’s P. E. teacher is the one who is in charge of handling the health record of the students. Figure 4. DFD of Student Health Record Figure 5 shows the flow of submitting of schedule. The admin will submit the schedules in both teachers and student. And the teachers and students can view their schedules on the web, the same with the parents they can view the schedule of their children. Figure 5. DFD of Schedule System Implementation The Online Student Information System for BLMNHS was deployed over the web through a web server. The system’s main feature was implemented only for BLMNHS student, parents and faculty. The developers used web hosting for their system to be accessed via online by the students. The administrator is the one who maintain and update the system. The users of the site should have internet access in order to explore the said system. Project Concepts To meet the needs of the proponents in data handling specially the developers sets an objective in order to achieve a goal in creating the system. Figure 10 shows the Homepage of the Web Page. The users can see the Announcements, history, and admission policies of the school. Figure 10. Homepage Figure 11 shows the login page in order to have security on their profiles. Their student’s Information should be confidential and to avoid from intruders. For newly registered users they have to fill up some important details to fulfill the information that are needed by the school. The information that entered by the users can remain confidential generated by the system administrator. Figure 11. Log in Page Figure 12 shows the Student’s profile wherein they can view their grade record, Class schedule, school activities uploaded by their teachers; they can also submit their assignment. Their health record and status can also view on their profile. This data are manipulated by their P. E. teachers who are in charge in their health maintainability. The student account record can be view by the system. Figure 12. Student Profile Figure 13 shows the teachers’ profile that has the authority to view their student profile. They are also the one who upload schedules, school activities, student grades and class standings. Teachers can also compute their student’s grade on the website and sent it throughout the designated profile. Figure 13. Teacher’s Profile Figure 14 shows the Parent’s portal that have an access to their child’s class standing, grades, schedule, and health record. They can view the school activies of the school of their child. They can also send a message to the system admin. Figure 14. Parent’s Portal Figure 15 shows Rapid Application Development (RAD) whereby, it is use mostly by information systems and website to describe the process of building the system. The first phase is to define the problems of the school that we are using for our study. The developers also identify the possible solutions for the problem and how to help them in the most convenient way of data handling. The second phase is Analyze wherein the developers analyze the software to be use to create the system. The developers will also analyze the flow of the system throughout the operation of the system. The next phase is Design developers will now formulate design for the data flow of the system and also the design of the user interface that the user will view on the proposed system. This will help the users to easily understand and explore the system on the rest of the system operation. Develop is the fourth phase to follow by the developers, here the system’s design, operation and processes are being develop in order to improve the system’s performance. Here the user interface of the system and the functions should be developed to have a more efficient system to be use. It will also identify the possible risk that system will undergo. The next phase is to test the system if it is functional and can be used by the actual users. It will also test the website if it is effective and the other functions are usable. The last phase is support, as the system has been test and has no possible malfunction that has been identified it is now ready for the users to use throughout the net. The maintainability of the system should be operated in order to have a well created system. It will limit the system future risk within the operation. Development Model Figure 15. Rapid Application Development Development Approach The developers are referring to use the top-down approach. In this approach the developers has the overview of the system wherein it focuses on the formulation of the system. Top-down approach breaks down some parts of the system into categories which is essential for the developers. The IS are consisting of different divisions on different function that will be used by the users of the system. Each division should be identified to know the functionalities of each system for the appropriate users. Software Development Tools The developer prefered using open source software tools, since it is more accessible and free than using proprietary softwares. For front end software tools, we use html and css for the website interfaces. For the special website functionalities we use javascript. In order to code these softwares we use a text editor for the entire coding operation of the system. For the backend of the system, we use PHP for website conditions and also functionalities, in order to implement database within the website we use MySql. At first the developers worked offline in order to test the website’s effectivity with the use of XAMPP. For the live implementation of the website, the developers prefer to buy domain name, web host, and the database server. For the users who can access the website faster than using free web hosting sites that might commits problems in accessing the website. The developers also use Filezilla to import the files and links that has been use for the website within the net. Project Teams and their Responsibilities Each team members actively participated in every task all throughout with their own responsibilities in developing a web system. Some specified partitions of project task are as follows: Irish Opena is responsible in designing and development of the project. Angelica Montero is responsible for congregation of information, data and other related facts that would help in the development of the study. Lester Cueva is responsible for organizing group meetings, places, times, dates, communication requirements, etc Budget Cost Management Plan Table 9 shows the expense that has been used for the system. These are suggested to be bought in order to have an easier and accessible website for the user. Domain name is an identification string for the website so that it would be easier to be search by the web. Web host is a web service wherein it helps the website to be accessed by the users. Database server is a computer program that provides database services for the website that allows handling the data within the web. These preferences are bought to make a website implemented throughout the World Wide Web. Table 9 Budget Cost Verification, Validation and Testing Plans The system will test its functionalities with the use of server to test if it is actually works throughout the internet. As this test has been done, it will now evaluated by the faculty, parents and students of Bernardo Lirio Memorial National High school. Questionnaire. Preparation and construction of the questionnaire were done by reviewing concepts related from books, journals, theses and electronic resources. The responses provided by the respondents were given weights of 0 to 5 with 0 as lowest to 5 as highest rate. Corresponding verbal descriptions were also proided in different areas. The following scale was used to interpret and analyse the results: RateVerbal Interpretations 5 Exemplary 4Good 3Satisfactory 2 Needs Improvement 1 Poor 0 Unaacceptable/Absent, N/A A total of (40) respondent evaluated the system having number (5) as the highest possible rating and number (0) as the lowest. The scale used has the corresponding values such as 5 for exemplary, 4 for good, 3 for satisfactory, 2 for needs improvement, 1 for poor and 0 for unacceptable. The total points of the evaluation has corresponding verbal equivalent rating the system’s performace for the user. The respondents in the conducted survey were the faculty and students in Bernardo Lirio Memorial National High School (BLMNHS) and parents for they are the target user of the proposed system. In testing the system, the proponents used the content testing which involves checking of the human-interface of the web. In our system we check errors in font types, screen layout, colors, graphic resolutions and other features that may affect the end-user experience. Next is the white- box testing which is said to be very applicable in testing web architecture web. This type of testing is used to find navigational and structural structures in the system. Lastly, testing the end-user environment or the browser compatibility testing web [3] (Glenford J. Myres, Art of Software Testing. Second Edition. John Wiley Sons Inc, New Jersey, 2004). In this part of testing, the proponents focused in configuring the compatibility of the browser, operating system, and the programming language used in the system. Table 10 present’s respondents profile based on gender where in female got the highest frequency of 24 and having a percentage of 56% while male having a percentage of 44% and got the lowest frequency of 16. Table 10 Respondents Profile in terms of Gender Gender Frequency Percentage Male 16 44% Female 24 56% Total 40 100% CHAPTER IV RESULTS AND DISCUSSION This chapter will discuss the result and analysis of the development and testing of the program in tabulated format. Screenshots of the system are also included in this chapter. Observation 1. The proponents have collected the desirable information from Bernardo Lirio Memorial National High School (BLMNHS) which was used in developing the system suited in the need of the said school. The proponents noticed that the school had a problem in their record management method. They manually handled the files and information they have and sometimes they are having hard time in accessing it. Figure 16 shows the homepage of the website. It is divided into 4 major portals, the Student, Parent, Faculty, and Admin. Figure 16. Homepage To solve the problem, the proponents had designed and developed the system that can be used to manage and record the information of the students. Hereby, the developers identify the present student information system used by Bernardo Lirio Memorial National High School in terms of: 1. 1 facilities and resources As the system has been tested and evaluated the developers observed that the facility of staff should be increased in order to better serve the student population. It also decreases the time required to access and deliver student records. 1. 2 technology utilization By means of the new technology, the said institution offers more convenient transactions contrasting in their manual system beforehand. 2. Provide a better service for the students and faculty of BLMNHS with the following features: 2. 1 Submission of grades Submission of grades is more convenient than the manual system of grades. Figure 17 the subject to be graded. The faculty can choose the subject that they would like to upload the grade of their students. As they choose their designated subjects they can now search their students name a